Administrators’ Manual¶
- Introduction
- Starting Up, Shutting Down, Reconfiguring, and Restarting HTCondor
- Introduction to Configuration
- HTCondor Configuration Files
- Ordered Evaluation to Set the Configuration
- Configuration File Macros
- Comments and Line Continuations
- Multi-Line Values
- Executing a Program to Produce Configuration Macros
- Including Configuration from Elsewhere
- Reporting Errors and Warnings
- Conditionals in Configuration
- Function Macros in Configuration
- Macros That Will Require a Restart When Changed
- Pre-Defined Macros
- Configuration Templates
- Configuration Macros
- HTCondor-wide Configuration File Entries
- Daemon Logging Configuration File Entries
- DaemonCore Configuration File Entries
- Network-Related Configuration File Entries
- Shared File System Configuration File Macros
- condor_master Configuration File Macros
- condor_startd Configuration File Macros
- condor_schedd Configuration File Entries
- condor_shadow Configuration File Entries
- condor_starter Configuration File Entries
- condor_submit Configuration File Entries
- condor_preen Configuration File Entries
- condor_collector Configuration File Entries
- condor_negotiator Configuration File Entries
- condor_procd Configuration File Macros
- condor_credd Configuration File Macros
- condor_gridmanager Configuration File Entries
- condor_job_router Configuration File Entries
- condor_lease_manager Configuration File Entries
- Configuration File Entries for DAGMan
- Configuration File Entries Relating to Security
- Configuration File Entries Relating to Virtual Machines
- Configuration File Entries Relating to High Availability
- MyProxy Configuration File Macros
- Configuration File Entries Relating to condor_ssh_to_job
- condor_rooster Configuration File Macros
- condor_shared_port Configuration File Macros
- Configuration File Entries Relating to Hooks
- Configuration File Entries Only for Windows Platforms
- condor_defrag Configuration File Macros
- condor_gangliad Configuration File Macros
- condor_annex Configuration File Macros
- User Priorities and Negotiation
- Real User Priority (RUP)
- Effective User Priority (EUP)
- Priorities in Negotiation and Preemption
- Priority Calculation
- Negotiation
- The Layperson’s Description of the Pie Spin and Pie Slice
- Group Accounting
- Accounting Groups with Hierarchical Group Quotas
- Setting Accounting Group automatically per user
- Policy Configuration for Execute Hosts and for Submit Hosts
- Security
- Security Overview
- Security Terms
- Quick Configuration of Security
- HTCondor’s Security Model
- Security Negotiation
- Authentication
- The Unified Map File for Authentication
- Encryption
- Integrity
- Authorization
- FIPS
- Security Sessions
- Host-Based Security in HTCondor
- Examples of Security Configuration
- Changing the Security Configuration
- Using HTCondor w/ Firewalls, Private Networks, and NATs
- User Accounts in HTCondor on Unix Platforms
- Networking (includes sections on Port Usage and CCB)
- DaemonCore
- Monitoring
- The High Availability of Daemons
- Setting Up for Special Environments
- Using HTCondor with AFS
- Enabling the Transfer of Files Specified by a URL
- Enabling the Transfer of Public Input Files over HTTP
- Enabling the Fetching and Use of OAuth2 Credentials
- Configuring HTCondor for Multiple Platforms
- Full Installation of condor_compile
- The condor_kbdd
- Configuring The HTCondorView Server
- Running HTCondor Jobs within a Virtual Machine
- HTCondor’s Dedicated Scheduling
- Configuring HTCondor for Running Backfill Jobs
- Per Job PID Namespaces
- Group ID-Based Process Tracking
- Cgroup-Based Process Tracking
- Limiting Resource Usage with a User Job Wrapper
- Limiting Resource Usage Using Cgroups
- Concurrency Limits
- Java Support Installation
- Setting Up the VM and Docker Universes
- Singularity Support
- Power Management
- Windows Installer
- Directories