1condor_ping(1)              General Commands Manual             condor_ping(1)
2
3
4

Name

6       condor_pingAttempt a security negotiation to determine if it succeeds
7

Synopsis

9       condor_ping[-help | -version]
10
11       condor_ping[-debug]  [-address <a.b.c.d:port>] [-pool host name] [-name
12       daemon name] [-type subsystem] [-config filename] [-quiet  |  -table  |
13       -verbose] token[token [...]]
14

Description

16       condor_pingattempts a security negotiation to discover whether the con‐
17       figuration is set such that the negotiation succeeds. The target of the
18       negotiation  is  defined  by one or a combination of the address, pool,
19       name, or typeoptions. If no target is specified, the default target  is
20       the condor_schedddaemon on the local machine.
21
22       One or more tokens may be listed, thereby specifying one or more autho‐
23       rization level to impersonate in security negotiation. A token  is  the
24       value ALL, an authorization level, a command name, or the integer value
25       of a command. The many command names and their associated integer  val‐
26       ues  will  more  likely be used by experts, and they are defined in the
27       file condor_includes/condor_commands.h.
28
29       An authorization level may be one of the following  strings.  If  ALLis
30       listed, then negotiation is attempted for each of these possible autho‐
31       rization levels.
32
33       READ
34
35
36
37
38
39       WRITE
40
41
42
43
44
45       ADMINISTRATOR
46
47
48
49
50
51       SOAP
52
53
54
55
56
57       CONFIG
58
59
60
61
62
63       OWNER
64
65
66
67
68
69       DAEMON
70
71
72
73
74
75       NEGOTIATOR
76
77
78
79
80
81       ADVERTISE_MASTER
82
83
84
85
86
87       ADVERTISE_STARTD
88
89
90
91
92
93       ADVERTISE_SCHEDD
94
95
96
97
98
99       CLIENT
100
101
102
103
104

Options

106       -help
107
108          Display usage information
109
110
111
112       -version
113
114          Display version information
115
116
117
118       -debug
119
120          Print extra debugging information as the command executes.
121
122
123
124       -config filename
125
126          Attempt the negotiation based on the contents of  the  configuration
127          file contents in file filename.
128
129
130
131       -address <a.b.c.d:port>
132
133          Target the given IP address with the negotiation attempt.
134
135
136
137       -pool hostname
138
139          Target  the  given hostwith the negotiation attempt. May be combined
140          with specifications defined by nameand typeoptions.
141
142
143
144       -name daemonname
145
146          Target the daemon given by daemonnamewith the negotiation attempt.
147
148
149
150       -type subsystem
151
152          Target the daemon identified by subsystem, one of the values of  the
153          predefined $(SUBSYSTEM)macro.
154
155
156
157       -quiet
158
159          Set exit status only; no output displayed.
160
161
162
163       -table
164
165          Output is displayed with one result per line, in a table format.
166
167
168
169       -verbose
170
171          Display all available output.
172
173
174

Examples

176       The example Unix command
177
178       condor_ping  -address "<127.0.0.1:9618>" -table READ WRITE DAEMON
179
180       places  double quote marks around the sinful string to prevent the less
181       than and the greater than characters from causing redirect of input and
182       output.  The given IP address is targeted with 3 attempts to negotiate:
183       one at the  READauthorization  level,  one  at  the  WRITEauthorization
184       level, and one at the DAEMONauthorization level.
185

Exit Status

187       condor_pingwill  exit  with  the  status  value  of  the negotiation it
188       attempted, where 0 (zero) indicates  success,  and  1  (one)  indicates
189       failure.  If  multiple  security  negotiations were attempted, the exit
190       status will be the logical OR of all values.
191

Author

193       Center  for  High   Throughput   Computing,   University   of   Wiscon‐
194       sin&ndash;Madison
195
197       Copyright  ©  1990-2019  Center for High Throughput Computing, Computer
198       Sciences Department, University of Wisconsin-Madison, Madison, WI.  All
199       Rights Reserved. Licensed under the Apache License, Version 2.0.
200
201
202
203                                     date                       condor_ping(1)
Impressum