Next:
3.1 Introduction
Up:
Condor Version 6.0.3 Manual
Previous:
2.12 Potential Problems
3. Administrators' Manual
3.1 Introduction
3.1.1 The Different Roles a Machine Can Play
3.1.2 The Condor Daemons
3.2 Installation of Condor
3.2.1 Preparing to Install Condor
3.2.2 Installation Procedure
3.2.3 Condor is installed... now what?
3.2.4 Starting up the Condor daemons
3.2.5 The Condor daemons are running... now what?
3.3 Installing Contrib Modules
3.3.1 Installing The SMP-Startd Contrib Module
3.3.2 Installing CondorView Contrib Modules
3.3.3 Installing the CondorView Server Module
3.3.4 Installing the CondorView Client Contrib Module
3.3.5 Installing a Checkpoint Server
3.3.6 Installing the PVM Contrib Module
3.4 Configuring Condor
3.4.1 Introduction to Config Files
3.4.2 Condor-wide Config File Entries
3.4.3 Daemon Logging Config File Entries
3.4.4 DaemonCore Config File Entries
3.4.5 Shared Filesystem Config File Entries
3.4.6 Checkpoint Server Config File Entries
3.4.7 condor_master Config File Entries
3.4.8 condor_startd Config File Entries
3.4.9 condor_schedd Config File Entries
3.4.10 condor_shadow Config File Entries
3.4.11 condor_shadow.pvm Config File Entries
3.4.12 condor_starter Config File Entries
3.4.13 condor_submit Config File Entries
3.4.14 condor_preen Config File Entries
3.4.15 condor_collector Config File Entries
3.4.16 condor_negotiator Config File Entries
3.5 Configuring The Startd Policy
3.5.1 Startd ClassAd Attributes
3.5.2 Job ClassAd Attributes
3.5.3 condor_startd START expression
3.5.4 condor_startd RANK expression
3.5.5 condor_startd States
3.5.6 condor_startd Activities
3.5.7 condor_startd State and Activity Transitions
3.5.8 condor_startd State/Activity Transition Expression Summary
3.5.9 Example Policy Settings
3.6 DaemonCore
3.6.1 DaemonCore and UNIX signals
3.6.2 DaemonCore and Command-line Arguments
3.7 Setting Up IP/Host-Based Security in Condor
3.7.1 How does it work?
3.7.2 Security Access Levels
3.7.3 Configuring your Pool
3.7.4 Access Levels each Daemons Uses
3.7.5 Access Level Examples
3.8 Managing your Condor Pool
3.8.1 Shutting Down and Restarting your Condor Pool
3.8.2 Reconfiguring Your Condor Pool
3.9 Setting up Condor for Special Environments
3.9.1 Using Condor with AFS
3.9.2 Configuring Condor for Multiple Platforms
3.9.3 Full Installation of condor_compile
3.9.4 Installing the
condor_kbdd
3.10 Security In Condor
3.10.1 Running Condor as Non-Root
3.10.2 UIDs in Condor
3.10.3 Root Config Files
condor-admin@cs.wisc.edu