⇐
↙
↓
⇑
⇒
Contents
Index
Chapter 3
Administrators’ Manual
3.1
Introduction
3.1.1
The Different Roles a Machine Can Play
3.1.2
The HTCondor Daemons
3.2
Installation, Start Up, Shut Down, and Reconfiguration
3.2.1
Obtaining the HTCondor Software
3.2.2
Installation on Unix
3.2.3
Installation on Windows
3.2.4
Upgrading – Installing a New Version on an Existing Pool
3.2.5
Shutting Down and Restarting an HTCondor Pool
3.2.6
Reconfiguring an HTCondor Pool
3.3
Introduction to Configuration
3.3.1
HTCondor Configuration Files
3.3.2
Ordered Evaluation to Set the Configuration
3.3.3
Configuration File Macros
3.3.4
Comments and Line Continuations
3.3.5
Multi-Line Values
3.3.6
Executing a Program to Produce Configuration Macros
3.3.7
Including Configuration from Elsewhere
3.3.8
Reporting Errors and Warnings
3.3.9
Conditionals in Configuration
3.3.10
Function Macros in Configuration
3.3.11
Macros That Will Require a Restart When Changed
3.3.12
Pre-Defined Macros
3.4
Configuration Templates
3.4.1
Configuration Templates: Using Predefined Sets of Configuration
3.4.2
Available Configuration Templates
3.4.3
Configuration Template Transition Syntax
3.4.4
Configuration Template Examples
3.5
Configuration Macros
3.5.1
HTCondor-wide Configuration File Entries
3.5.2
Daemon Logging Configuration File Entries
3.5.3
DaemonCore Configuration File Entries
3.5.4
Network-Related Configuration File Entries
3.5.5
Shared File System Configuration File Macros
3.5.6
Checkpoint Server Configuration File Macros
3.5.7
condor_master Configuration File Macros
3.5.8
condor_startd Configuration File Macros
3.5.9
condor_schedd Configuration File Entries
3.5.10
condor_shadow Configuration File Entries
3.5.11
condor_starter Configuration File Entries
3.5.12
condor_submit Configuration File Entries
3.5.13
condor_preen Configuration File Entries
3.5.14
condor_collector Configuration File Entries
3.5.15
condor_negotiator Configuration File Entries
3.5.16
condor_procd Configuration File Macros
3.5.17
condor_credd Configuration File Macros
3.5.18
condor_gridmanager Configuration File Entries
3.5.19
condor_job_router Configuration File Entries
3.5.20
condor_lease_manager Configuration File Entries
3.5.21
Grid Monitor Configuration File Entries
3.5.22
Configuration File Entries Relating to Grid Usage
3.5.23
Configuration File Entries for DAGMan
3.5.24
Configuration File Entries Relating to Security
3.5.25
Configuration File Entries Relating to Virtual Machines
3.5.26
Configuration File Entries Relating to High Availability
3.5.27
MyProxy Configuration File Macros
3.5.28
Configuration File Entries Relating to condor_ssh_to_job
3.5.29
condor_rooster Configuration File Macros
3.5.30
condor_shared_port Configuration File Macros
3.5.31
Configuration File Entries Relating to Hooks
3.5.32
Configuration File Entries Only for Windows Platforms
3.5.33
condor_defrag Configuration File Macros
3.5.34
condor_gangliad
Configuration File Macros
3.5.35
condor_annex
Configuration File Macros
3.6
User Priorities and Negotiation
3.6.1
Real User Priority (RUP)
3.6.2
Effective User Priority (EUP)
3.6.3
Priorities in Negotiation and Preemption
3.6.4
Priority Calculation
3.6.5
Negotiation
3.6.6
The Layperson’s Description of the Pie Spin and Pie Slice
3.6.7
Group Accounting
3.6.8
Accounting Groups with Hierarchical Group Quotas
3.7
Policy Configuration for Execute Hosts and for Submit Hosts
3.7.1
condor_startd
Policy Configuration
3.7.2
condor_schedd
Policy Configuration
3.8
Security
3.8.1
HTCondor’s Security Model
3.8.2
Security Negotiation
3.8.3
Authentication
3.8.4
The Unified Map File for Authentication
3.8.5
Encryption
3.8.6
Integrity
3.8.7
Authorization
3.8.8
Security Sessions
3.8.9
Host-Based Security in HTCondor
3.8.10
Examples of Security Configuration
3.8.11
Changing the Security Configuration
3.8.12
Using HTCondor w/ Firewalls, Private Networks, and NATs
3.8.13
User Accounts in HTCondor on Unix Platforms
3.9
Networking (includes sections on Port Usage and CCB)
3.9.1
Port Usage in HTCondor
3.9.2
Reducing Port Usage with the
condor_shared_port
Daemon
3.9.3
Configuring HTCondor for Machines With Multiple Network Interfaces
3.9.4
HTCondor Connection Brokering (CCB)
3.9.5
Using TCP to Send Updates to the
condor_collector
3.9.6
Running HTCondor on an IPv6 Network Stack
3.10
The Checkpoint Server
3.10.1
Preparing to Install a Checkpoint Server
3.10.2
Installing the Checkpoint Server Module
3.10.3
Configuring the Pool to Use Multiple Checkpoint Servers
3.10.4
Checkpoint Server Domains
3.11
DaemonCore
3.11.1
DaemonCore and Unix signals
3.11.2
DaemonCore and Command-line Arguments
3.12
Monitoring
3.12.1
Ganglia
3.12.2
Absent ClassAds
3.13
The High Availability of Daemons
3.13.1
High Availability of the Job Queue
3.13.2
High Availability of the Central Manager
3.14
Setting Up for Special Environments
3.14.1
Using HTCondor with AFS
3.14.2
Enabling the Transfer of Files Specified by a URL
3.14.3
Enabling the Transfer of Public Input Files over HTTP
3.14.4
Configuring HTCondor for Multiple Platforms
3.14.5
Full Installation of condor_compile
3.14.6
The
condor_kbdd
3.14.7
Configuring The HTCondorView Server
3.14.8
Running HTCondor Jobs within a Virtual Machine
3.14.9
HTCondor’s Dedicated Scheduling
3.14.10
Configuring HTCondor for Running Backfill Jobs
3.14.11
Per Job PID Namespaces
3.14.12
Group ID-Based Process Tracking
3.14.13
Cgroup-Based Process Tracking
3.14.14
Limiting Resource Usage with a User Job Wrapper
3.14.15
Limiting Resource Usage Using Cgroups
3.14.16
Concurrency Limits
3.15
Java Support Installation
3.16
Setting Up the VM and Docker Universes
3.16.1
The VM Universe
3.16.2
The Docker Universe
3.17
Singularity Support
3.18
Power Management
3.18.1
Entering a Low Power State
3.18.2
Returning From a Low Power State
3.18.3
Keeping a ClassAd for a Hibernating Machine
3.18.4
Linux Platform Details
3.18.5
Windows Platform Details
⇐
↙
↑
⇑
⇒
Contents
Index