forked from SciDAS/htcondor-docker-centos
-
Notifications
You must be signed in to change notification settings - Fork 0
/
condor_config.local.submitter
46 lines (39 loc) · 2.51 KB
/
condor_config.local.submitter
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
# Flocking to OSG requires GSI
SEC_DAEMON_AUTHENTICATION_METHODS = FS,CLAIMTOBE,PASSWORD,GSI
SEC_DEFAULT_AUTHENTICATION_METHODS = FS,CLAIMTOBE,PASSWORD,GSI
SEC_NEGOTIATOR_AUTHENTICATION_METHODS = FS,CLAIMTOBE,PASSWORD,GSI
SEC_CLIENT_AUTHENTICATION_METHODS = FS,CLAIMTOBE,PASSWORD, GSI
GSI_DAEMON_DIRECTORY = /etc/grid-security
# When a daemon acts as the client within authentication,
# the daemon needs a listing of those from which it will accept certificates.
# This is done with GSI_DAEMON_NAME.
# This name is specified with the following format:
# GSI_DAEMON_NAME = /X.509/name/of/server/1,/X.509/name/of/server/2,...
GSI_DAEMON_NAME=$(GSI_DAEMON_NAME),/DC=org/DC=opensciencegrid/O=Open Science Grid/OU=Services/CN=osg-flock.grid.iu.edu
# This macro defines a list of collector host names
# (not including the local $(COLLECTOR_HOST) machine)
# for pools in which the condor_schedd should attempt to run jobs.
# Hosts in the list should be in order of preference.
# The condor_schedd will only send a request to a central manager in the list
# if the local pool and pools earlier in the list are not satisfying all the job requests.
# $(HOSTALLOW_NEGOTIATOR_SCHEDD) (see section 3.5.4) must also be configured to allow negotiators
# from all of the pools to contact the condor_schedd at the NEGOTIATOR authorization level.
# Similarly, the central managers of the remote pools must be configured to allow this condor_schedd
# to join the pool (this requires ADVERTISE_SCHEDD authorization level, which defaults to WRITE).
#
# This defaults to FLOCK_TO
# FLOCK_COLLECTOR_HOSTS = $(FLOCK_TO)
# FLOCK_NEGOTIATOR_HOSTS = $(FLOCK_TO)
FLOCK_TO = osg-flock.grid.iu.edu
#CONDOR_HOST = osg-flock.grid.iu.edu
# This specifies the host or IP address that should be used as the public address of this daemon.
# This setting is useful if HTCondor on this host may be reached through a NAT or firewall by
# connecting to an IP address that forwards connections to this host.
TCP_FORWARDING_HOST = 152.54.8.183
# If set to a directory writable by the HTCondor user, when a job leaves the condor_schedd's queue,
# a copy of the job's ClassAd will be written in that directory. The files are named history,
# with the job's cluster and process number appended.
# For example, job 35.2 will result in a file named history.35.2.
# HTCondor does not rotate or delete the files, so without an external entity to clean the directory,
# it can grow very large. This option defaults to being unset. When not set, no files are written.
PER_JOB_HISTORY_DIR = /var/lib/gratia/data