1CONDOR_PING(1) HTCondor Manual CONDOR_PING(1)
2
3
4
6 condor_ping - HTCondor Manual
7
8 Attempt a security negotiation to determine if it succeeds
9
10
12 condor_ping [-help | -version ]
13
14 condor_ping [-debug ] [-address <a.b.c.d:port>] [-pool host name]
15 [-name daemon name] [-type subsystem] [-config filename] [-quiet | -ta‐
16 ble | -verbose ] token [token [...] ]
17
19 condor_ping attempts a security negotiation to discover whether the
20 configuration is set such that the negotiation succeeds. The target of
21 the negotiation is defined by one or a combination of the address,
22 pool, name, or type options. If no target is specified, the default
23 target is the condor_schedd daemon on the local machine.
24
25 One or more token s may be listed, thereby specifying one or more au‐
26 thorization level to impersonate in security negotiation. A token is
27 the value ALL, an authorization level, a command name, or the integer
28 value of a command. The many command names and their associated integer
29 values will more likely be used by experts, and they are defined in the
30 file condor_includes/condor_commands.h.
31
32 An authorization level may be one of the following strings. If ALL is
33 listed, then negotiation is attempted for each of these possible autho‐
34 rization levels.
35 READ WRITE ADMINISTRATOR SOAP CONFIG OWNER DAEMON NEGOTIATOR ADVER‐
36 TISE_MASTER ADVERTISE_STARTD ADVERTISE_SCHEDD CLIENT
37
39 -help Display usage information
40
41 -version
42 Display version information
43
44 -debug Print extra debugging information as the command executes.
45
46 -config filename
47 Attempt the negotiation based on the contents of the configu‐
48 ration file contents in file filename.
49
50 -address <a.b.c.d:port>
51 Target the given IP address with the negotiation attempt.
52
53 -pool hostname
54 Target the given host with the negotiation attempt. May be
55 combined with specifications defined by name and type op‐
56 tions.
57
58 -name daemonname
59 Target the daemon given by daemonname with the negotiation
60 attempt.
61
62 -type subsystem
63 Target the daemon identified by subsystem, one of the values
64 of the predefined $(SUBSYSTEM) macro.
65
66 -quiet Set exit status only; no output displayed.
67
68 -table Output is displayed with one result per line, in a table for‐
69 mat.
70
71 -verbose
72 Display all available output.
73
75 The example Unix command
76
77 condor_ping -address "<127.0.0.1:9618>" -table READ WRITE DAEMON
78
79 places double quote marks around the sinful string to prevent the less
80 than and the greater than characters from causing redirect of input and
81 output. The given IP address is targeted with 3 attempts to negotiate:
82 one at the READ authorization level, one at the WRITE authorization
83 level, and one at the DAEMON authorization level.
84
86 condor_ping will exit with the status value of the negotiation it at‐
87 tempted, where 0 (zero) indicates success, and 1 (one) indicates fail‐
88 ure. If multiple security negotiations were attempted, the exit status
89 will be the logical OR of all values.
90
92 HTCondor Team
93
95 1990-2021, Center for High Throughput Computing, Computer Sciences De‐
96 partment, University of Wisconsin-Madison, Madison, WI, US. Licensed
97 under the Apache License, Version 2.0.
98
99
100
101
1028.8 Aug 23, 2021 CONDOR_PING(1)