Provided by: htcondor_8.6.8~dfsg.1-2ubuntu1_amd64 bug

Name

       condor_ping Attempt - a security negotiation to determine if it succeeds

Synopsis

       condor_ping [-help -version]

       condor_ping[-debug]  [-address  <a.b.c.d:port>]  [-pool  host name] [-name daemon name] [-type subsystem]
       [-config filename] [-quiet | -table | -verbose] token[token [...]]

Description

       condor_ping attempts a security negotiation to discover whether the configuration is set  such  that  the
       negotiation  succeeds.  The  target of the negotiation is defined by one or a combination of the address,
       pool, name, or typeoptions. If no target is specified, the default target is the  condor_schedddaemon  on
       the local machine.

       One  or  more  tokens may be listed, thereby specifying one or more authorization level to impersonate in
       security negotiation. A token is the value ALL, an authorization level, a command name,  or  the  integer
       value  of  a command. The many command names and their associated integer values will more likely be used
       by experts, and they are defined in the file condor_includes/condor_commands.h.

       An authorization level may be one of  the  following  strings.  If  ALLis  listed,  then  negotiation  is
       attempted for each of these possible authorization levels.

       READ

       WRITE

       ADMINISTRATOR

       SOAP

       CONFIG

       OWNER

       DAEMON

       NEGOTIATOR

       ADVERTISE_MASTER

       ADVERTISE_STARTD

       ADVERTISE_SCHEDD

       CLIENT

Options

       -help

          Display usage information

       -version

          Display version information

       -debug

          Print extra debugging information as the command executes.

       -config filename

          Attempt the negotiation based on the contents of the configuration file contents in file filename.

       -address <a.b.c.d:port>

          Target the given IP address with the negotiation attempt.

       -pool hostname

          Target  the  given  hostwith  the  negotiation attempt. May be combined with specifications defined by
          nameand typeoptions.

       -name daemonname

          Target the daemon given by daemonnamewith the negotiation attempt.

       -type subsystem

          Target the daemon identified by subsystem, one of the values of the predefined $(SUBSYSTEM)macro.

       -quiet

          Set exit status only; no output displayed.

       -table

          Output is displayed with one result per line, in a table format.

       -verbose

          Display all available output.

Examples

       The example Unix command

       condor_ping   -address "<127.0.0.1:9618>" -table READ WRITE DAEMON

       places double quote marks around the sinful string  to  prevent  the  less  than  and  the  greater  than
       characters from causing redirect of input and output. The given IP address is targeted with 3 attempts to
       negotiate:  one  at  the  READauthorization  level,  one  at the WRITEauthorization level, and one at the
       DAEMONauthorization level.

Exit Status

       condor_pingwill exit with the status value of the negotiation it  attempted,  where  0  (zero)  indicates
       success, and 1 (one) indicates failure. If multiple security negotiations were attempted, the exit status
       will be the logical OR of all values.

Author

       Center for High Throughput Computing, University of Wisconsin&ndash;Madison

Copyright

       Copyright  ©  1990-2016 Center for High Throughput Computing, Computer Sciences Department, University of
       Wisconsin-Madison, Madison, WI. All Rights Reserved. Licensed under the Apache License, Version 2.0.

                                                  January 2020                                    condor_ping(1)