1CONDOR_PING(1)                  HTCondor Manual                 CONDOR_PING(1)
2
3
4

NAME

6       condor_ping - HTCondor Manual
7
8       Attempt a security negotiation to determine if it succeeds
9
10

SYNOPSIS

12       condor_ping [-help | -version ]
13
14       condor_ping  [-debug  ]  [-address  <a.b.c.d:port>]  [-pool  host name]
15       [-name daemon name] [-type subsystem] [-config filename] [-quiet | -ta‐
16       ble | -verbose ] token [token [...] ]
17

DESCRIPTION

19       condor_ping  attempts  a  security  negotiation to discover whether the
20       configuration is set such that the negotiation succeeds. The target  of
21       the  negotiation  is  defined  by  one or a combination of the address,
22       pool, name, or type options. If no target  is  specified,  the  default
23       target is the condor_schedd daemon on the local machine.
24
25       One  or  more  token  s  may  be listed, thereby specifying one or more
26       authorization level to impersonate in security negotiation. A token  is
27       the  value  ALL, an authorization level, a command name, or the integer
28       value of a command. The many command names and their associated integer
29       values will more likely be used by experts, and they are defined in the
30       file condor_includes/condor_commands.h.
31
32       An authorization level may be one of the following strings. If  ALL  is
33       listed, then negotiation is attempted for each of these possible autho‐
34       rization levels.
35          READ WRITE ADMINISTRATOR SOAP CONFIG OWNER DAEMON NEGOTIATOR  ADVER‐
36          TISE_MASTER ADVERTISE_STARTD ADVERTISE_SCHEDD CLIENT
37

OPTIONS

39          -help  Display usage information
40
41          -version
42                 Display version information
43
44          -debug Print extra debugging information as the command executes.
45
46          -config filename
47                 Attempt the negotiation based on the contents of the configu‐
48                 ration file contents in file filename.
49
50          -address <a.b.c.d:port>
51                 Target the given IP address with the negotiation attempt.
52
53          -pool hostname
54                 Target the given host with the negotiation  attempt.  May  be
55                 combined   with  specifications  defined  by  name  and  type
56                 options.
57
58          -name daemonname
59                 Target the daemon given by daemonname  with  the  negotiation
60                 attempt.
61
62          -type subsystem
63                 Target  the daemon identified by subsystem, one of the values
64                 of the predefined $(SUBSYSTEM) macro.
65
66          -quiet Set exit status only; no output displayed.
67
68          -table Output is displayed with one result per line, in a table for‐
69                 mat.
70
71          -verbose
72                 Display all available output.
73

EXAMPLES

75       The example Unix command
76
77          condor_ping  -address "<127.0.0.1:9618>" -table READ WRITE DAEMON
78
79       places  double quote marks around the sinful string to prevent the less
80       than and the greater than characters from causing redirect of input and
81       output.  The given IP address is targeted with 3 attempts to negotiate:
82       one at the READ authorization level, one  at  the  WRITE  authorization
83       level, and one at the DAEMON authorization level.
84

EXIT STATUS

86       condor_ping  will  exit  with  the  status  value of the negotiation it
87       attempted, where 0 (zero) indicates  success,  and  1  (one)  indicates
88       failure.  If  multiple  security  negotiations were attempted, the exit
89       status will be the logical OR of all values.
90

AUTHOR

92       HTCondor Team
93
95       1990-2020, Center for  High  Throughput  Computing,  Computer  Sciences
96       Department,  University of Wisconsin-Madison, Madison, WI, US. Licensed
97       under the Apache License, Version 2.0.
98
99
100
101
1028.8                              Aug 06, 2020                   CONDOR_PING(1)
Impressum