Hi Luke,
Yes that's the case with ARC it uses the condor binaries. The CERTIFICATE_MAPFILE maps the hostnames to a canonical representation of their function. The schedd allow read and allow write is created using the canonical names. It appears to have been an approach implemented temporarily by my predecessor whilst they came up with a better approach. It's actually something we're planning on spending time on make it less of a pain point. As it happens it appears to have been down to a mis-setting in the ALLOW_READ and ALLOW_WRITE sections. It now works and I've been able to submit jobs again so thank you to Brian and you for your advice and suggestions. Thanks, Iain From: HTCondor-users [htcondor-users-bounces@xxxxxxxxxxx] on behalf of L Kreczko [L.Kreczko@xxxxxxxxxxxxx]
Sent: 27 March 2015 12:14 To: HTCondor-Users Mail List Subject: Re: [HTCondor-users] Configuring a CE/Schedd Hi Ian,
If the ARC is the only one that is using that scheduler, then the messages will disappear. But it does not mean that the ARC is causing it.SCHEDD.ALLOW_READ = *@cern.ch/ce501.cern.ch,central-manager@xxxxxxx/*.cern.ch,computing-element@xxxxxxx/*.cern.ch,schedd@xxxxxxx/*.cern.ch,worker-node@xxxxxxx/*.cern.ch SCHEDD.ALLOW_WRITE = *@fsauth/ce501.cern.ch,central-manager@xxxxxxx/*.cern.ch,computing-element@xxxxxxx/*.cern.ch condor_ping -addr "<127.0.0.1:9618>" -table READ WRITE DAEMON give you on the CE? For me it looks like: Instruction Authentication Encryption Integrity Decision Identity READ FS BLOWFISH MD5 ALLOW condor@xxxxxxxxxxxxxx WRITE FS BLOWFISH MD5 ALLOW condor@xxxxxxxxxxxxxx DAEMON FS BLOWFISH MD5 ALLOW condor@xxxxxxxxxxxxxx On 27 March 2015 at 09:31, Iain Bradford Steers
<iain.steers@xxxxxxx> wrote:
Hi Brian, -- *********************************************************
Dr Lukasz Kreczko +44 (0)117 928 8724 CMS Group School of Physics University of Bristol ********************************************************* |