1CONDOR_PING(1) HTCondor Manual CONDOR_PING(1)
2
3
4
6 condor_ping - HTCondor Manual
7
8 Attempt a security negotiation to determine if it succeeds
9
10
12 condor_ping [-help | -version ]
13
14 condor_ping [-debug ] [-address <a.b.c.d:port>] [-pool host name]
15 [-name daemon name] [-type subsystem] [-config filename] [-quiet | -ta‐
16 ble | -verbose ] token [token [...] ]
17
19 condor_ping attempts a security negotiation to discover whether the
20 configuration is set such that the negotiation succeeds. The target of
21 the negotiation is defined by one or a combination of the address,
22 pool, name, or type options. If no target is specified, the default
23 target is the condor_schedd daemon on the local machine.
24
25 One or more token s may be listed, thereby specifying one or more au‐
26 thorization level to impersonate in security negotiation. A token is
27 the value ALL, an authorization level, a command name, or the integer
28 value of a command. The many command names and their associated integer
29 values will more likely be used by experts, and they are defined in the
30 file condor_includes/condor_commands.h.
31
32 An authorization level may be one of the following strings. If ALL is
33 listed, then negotiation is attempted for each of these possible autho‐
34 rization levels. Note that OWNER is no longer used in HTCondor, but is
35 kept here for use when talking to older daemons (prior to 9.9.0).
36 READ WRITE ADMINISTRATOR SOAP CONFIG OWNER DAEMON NEGOTIATOR ADVER‐
37 TISE_MASTER ADVERTISE_STARTD ADVERTISE_SCHEDD CLIENT
38
40 -help Display usage information
41
42 -version
43 Display version information
44
45 -debug Print extra debugging information as the command executes.
46
47 -config filename
48 Attempt the negotiation based on the contents of the configu‐
49 ration file contents in file filename.
50
51 -address <a.b.c.d:port>
52 Target the given IP address with the negotiation attempt.
53
54 -pool hostname
55 Target the given host with the negotiation attempt. May be
56 combined with specifications defined by name and type op‐
57 tions.
58
59 -name daemonname
60 Target the daemon given by daemonname with the negotiation
61 attempt.
62
63 -type subsystem
64 Target the daemon identified by subsystem, one of the values
65 of the predefined $(SUBSYSTEM) macro.
66
67 -quiet Set exit status only; no output displayed.
68
69 -table Output is displayed with one result per line, in a table for‐
70 mat.
71
72 -verbose
73 Display all available output.
74
76 The example Unix command
77
78 $ condor_ping -address "<127.0.0.1:9618>" -table READ WRITE DAEMON
79
80 places double quote marks around the sinful string to prevent the less
81 than and the greater than characters from causing redirect of input and
82 output. The given IP address is targeted with 3 attempts to negotiate:
83 one at the READ authorization level, one at the WRITE authorization
84 level, and one at the DAEMON authorization level.
85
87 condor_ping will exit with the status value of the negotiation it at‐
88 tempted, where 0 (zero) indicates success, and 1 (one) indicates fail‐
89 ure. If multiple security negotiations were attempted, the exit status
90 will be the logical OR of all values.
91
93 HTCondor Team
94
96 1990-2023, Center for High Throughput Computing, Computer Sciences De‐
97 partment, University of Wisconsin-Madison, Madison, WI, US. Licensed
98 under the Apache License, Version 2.0.
99
100
101
102
103 Oct 02, 2023 CONDOR_PING(1)