1condor_ping(1) General Commands Manual condor_ping(1)
2
3
4
6 condor_pingAttempt a security negotiation to determine if it succeeds
7
9 condor_ping[-help | -version]
10
11 condor_ping[-debug] [-address <a.b.c.d:port>] [-pool host name] [-name
12 daemon name] [-type subsystem] [-config filename] [-quiet | -table |
13 -verbose] token[token [...]]
14
16 condor_pingattempts a security negotiation to discover whether the con‐
17 figuration is set such that the negotiation succeeds. The target of the
18 negotiation is defined by one or a combination of the address, pool,
19 name, or typeoptions. If no target is specified, the default target is
20 the condor_schedddaemon on the local machine.
21
22 One or more tokens may be listed, thereby specifying one or more autho‐
23 rization level to impersonate in security negotiation. A token is the
24 value ALL, an authorization level, a command name, or the integer value
25 of a command. The many command names and their associated integer val‐
26 ues will more likely be used by experts, and they are defined in the
27 file condor_includes/condor_commands.h.
28
29 An authorization level may be one of the following strings. If ALLis
30 listed, then negotiation is attempted for each of these possible autho‐
31 rization levels.
32
33 READ
34
35
36
37
38
39 WRITE
40
41
42
43
44
45 ADMINISTRATOR
46
47
48
49
50
51 SOAP
52
53
54
55
56
57 CONFIG
58
59
60
61
62
63 OWNER
64
65
66
67
68
69 DAEMON
70
71
72
73
74
75 NEGOTIATOR
76
77
78
79
80
81 ADVERTISE_MASTER
82
83
84
85
86
87 ADVERTISE_STARTD
88
89
90
91
92
93 ADVERTISE_SCHEDD
94
95
96
97
98
99 CLIENT
100
101
102
103
104
106 -help
107
108 Display usage information
109
110
111
112 -version
113
114 Display version information
115
116
117
118 -debug
119
120 Print extra debugging information as the command executes.
121
122
123
124 -config filename
125
126 Attempt the negotiation based on the contents of the configuration
127 file contents in file filename.
128
129
130
131 -address <a.b.c.d:port>
132
133 Target the given IP address with the negotiation attempt.
134
135
136
137 -pool hostname
138
139 Target the given hostwith the negotiation attempt. May be combined
140 with specifications defined by nameand typeoptions.
141
142
143
144 -name daemonname
145
146 Target the daemon given by daemonnamewith the negotiation attempt.
147
148
149
150 -type subsystem
151
152 Target the daemon identified by subsystem, one of the values of the
153 predefined $(SUBSYSTEM)macro.
154
155
156
157 -quiet
158
159 Set exit status only; no output displayed.
160
161
162
163 -table
164
165 Output is displayed with one result per line, in a table format.
166
167
168
169 -verbose
170
171 Display all available output.
172
173
174
176 The example Unix command
177
178 condor_ping -address "<127.0.0.1:9618>" -table READ WRITE DAEMON
179
180 places double quote marks around the sinful string to prevent the less
181 than and the greater than characters from causing redirect of input and
182 output. The given IP address is targeted with 3 attempts to negotiate:
183 one at the READauthorization level, one at the WRITEauthorization
184 level, and one at the DAEMONauthorization level.
185
187 condor_pingwill exit with the status value of the negotiation it
188 attempted, where 0 (zero) indicates success, and 1 (one) indicates
189 failure. If multiple security negotiations were attempted, the exit
190 status will be the logical OR of all values.
191
193 Center for High Throughput Computing, University of Wisconsin-Madison
194
196 Copyright (C) 1990-2019 Center for High Throughput Computing, Computer
197 Sciences Department, University of Wisconsin-Madison, Madison, WI. All
198 Rights Reserved. Licensed under the Apache License, Version 2.0.
199
200
201
202 date condor_ping(1)