Next:
3.1 Introduction
Up:
Condor Version 6.1.2 Manual
Previous:
2.13 Potential Problems
3. Administrators' Manual
3.1 Introduction
3.1.1 The Different Roles a Machine Can Play
3.1.2 The Condor Daemons
3.2 Installation of Condor
3.2.1 Preparing to Install Condor
3.2.2 Installation Procedure
3.2.3 Condor is installed... now what?
3.2.4 Starting up the Condor daemons
3.2.5 The Condor daemons are running... now what?
3.3 Installing Contrib Modules
3.3.1 Installing CondorView Contrib Modules
3.3.2 Installing the CondorView Server Module
3.3.3 Installing the CondorView Client Contrib Module
3.3.4 Installing a Checkpoint Server
3.3.5 Installing PVM Support in Condor
3.4 Configuring Condor
3.4.1 Introduction to Config Files
3.4.2 Condor-wide Config File Entries
3.4.3 Daemon Logging Config File Entries
3.4.4 DaemonCore Config File Entries
3.4.5 Shared Filesystem Config File Entries
3.4.6 Checkpoint Server Config File Entries
3.4.7 condor_master Config File Entries
3.4.8 condor_startd Config File Entries
3.4.9 condor_schedd Config File Entries
3.4.10 condor_shadow Config File Entries
3.4.11 condor_shadow.pvm Config File Entries
3.4.12 condor_starter Config File Entries
3.4.13 condor_submit Config File Entries
3.4.14 condor_preen Config File Entries
3.4.15 condor_collector Config File Entries
3.4.16 condor_negotiator Config File Entries
3.5 User Priorities in the Condor System
3.5.1 Real User Priority (RUP)
3.5.2 Effective User Priority (EUP)
3.5.3 Priorities and Preemption
3.5.4 Priority Calculation
3.6 Configuring The Startd Policy
3.6.1 Startd ClassAd Attributes
3.6.2 Job ClassAd Attributes
3.6.3 The START expression
3.6.4 The RANK expression
3.6.5 Machine States
3.6.6 Machine Activities
3.6.7 State and Activity Transitions
3.6.8 State/Activity Transition Expression Summary
3.6.9 Example Policy Settings
3.6.10 Differences from the Version 6.0 Policy Settings
3.7 DaemonCore
3.7.1 DaemonCore and UNIX signals
3.7.2 DaemonCore and Command-line Arguments
3.8 Setting Up IP/Host-Based Security in Condor
3.8.1 How does it work?
3.8.2 Security Access Levels
3.8.3 Configuring your Pool
3.8.4 Access Levels each Daemons Uses
3.8.5 Access Level Examples
3.9 Managing your Condor Pool
3.9.1 Shutting Down and Restarting your Condor Pool
3.9.2 Reconfiguring Your Condor Pool
3.10 Setting up Condor for Special Environments
3.10.1 Using Condor with AFS
3.10.2 Configuring Condor for Multiple Platforms
3.10.3 Full Installation of condor_compile
3.10.4 Installing the
condor_kbdd
3.10.5 Installing a Checkpoint Server
3.10.6 Flocking: Configuring a Schedd to Submit to Multiple Pools
3.10.7 Configuring The Startd for SMP Machines
3.11 Security In Condor
3.11.1 Running Condor as Non-Root
3.11.2 UIDs in Condor
3.11.3 Root Config Files
condor-admin@cs.wisc.edu