condor_ping(1) | General Commands Manual | condor_ping(1) |
condor_ping Attempt - a security negotiation to determine if it succeeds
condor_ping [-help -version]
condor_ping[-debug] [-address <a.b.c.d:port>] [-pool host name] [-name daemon name] [-type subsystem] [-config filename] [-quiet | -table | -verbose] token[token [...]]
condor_ping attempts a security negotiation to discover whether the configuration is set such that the negotiation succeeds. The target of the negotiation is defined by one or a combination of the address, pool, name, or typeoptions. If no target is specified, the default target is the condor_schedddaemon on the local machine.
One or more tokens may be listed, thereby specifying one or more authorization level to impersonate in security negotiation. A token is the value ALL, an authorization level, a command name, or the integer value of a command. The many command names and their associated integer values will more likely be used by experts, and they are defined in the file condor_includes/condor_commands.h.
An authorization level may be one of the following strings. If ALLis listed, then negotiation is attempted for each of these possible authorization levels.
READ
WRITE
ADMINISTRATOR
SOAP
CONFIG
OWNER
DAEMON
NEGOTIATOR
ADVERTISE_MASTER
ADVERTISE_STARTD
ADVERTISE_SCHEDD
CLIENT
-help
-version
-debug
-config filename
-address <a.b.c.d:port>
-pool hostname
-name daemonname
-type subsystem
-quiet
-table
-verbose
The example Unix command
condor_ping -address "<127.0.0.1:9618>" -table READ WRITE DAEMON
places double quote marks around the sinful string to prevent the less than and the greater than characters from causing redirect of input and output. The given IP address is targeted with 3 attempts to negotiate: one at the READauthorization level, one at the WRITEauthorization level, and one at the DAEMONauthorization level.
condor_pingwill exit with the status value of the negotiation it attempted, where 0 (zero) indicates success, and 1 (one) indicates failure. If multiple security negotiations were attempted, the exit status will be the logical OR of all values.
Center for High Throughput Computing, University of Wisconsin-Madison
Copyright (C) 1990-2016 Center for High Throughput Computing, Computer Sciences Department, University of Wisconsin-Madison, Madison, WI. All Rights Reserved. Licensed under the Apache License, Version 2.0.
May 2022 |