HTCondor Release Highlights
Feature Channel
Feature releases distribute HTCondor's new features and also incorporates bug fixes. Most people should use choose this channel and stay up-to-date with HTCondor's latest features.
- Prevent the startd from removing all files if EXECUTE is an empty string
- This problem first appeared in the withdrawn HTCondor 24.2.1 version
- Fixed DAGMan’s direct submission of late materialization jobs
- New
primary_unix_group
submit command that sets the job’s primary group - Initial implementation of broken slot detection and reporting
- New job attributes
FirstJobMatchDate
andInitialWaitDuration
condor_ssh_to_job
now sets the supplemental groups in ApptainerMASTER_NEW_BINARY_RESTART
now accepts theFAST
parameter- Avoid blocking on dead collectors at shutdown
- IPv6 networking is now fully supported on Windows
- Add
STARTER_ALWAYS_HOLD_ON_OOM
to minimize confusion about memory usage - Fix bug that caused
condor_ssh_to_job
sftp
andscp
modes to fail - Fix
KeyboardIdle
attribute in dynamic slots that could prevent job start - No longer signals the OAuth credmon when there is no work to do
- Fix rare
condor_schedd
crash when a$$()
macro could not be expanded - By default, put Docker jobs on hold when CPU architecture doesn’t match
- Can print contents of stored OAuth2 credential with htcondor CLI tool
- In DAGMan, inline submit descriptions work when not submitting directly
- By default, put Docker jobs on hold when CPU architecture doesn’t match
- Detects and deletes invalid checkpoint and reschedules job
- Fix issue where an unresponsive libvirtd blocked an EP from starting up
- Fix for output file transfer errors obscuring input file transfer errors
- Improvements to disk usage enforcement when using LVM
- Can encrypt job sandboxes when using LVM
- More precise tracking of disk usage when using LVM
- Reduced disk usage tracking overhead
- Improvements tracking CPU and memory usage with cgroup v2 (on EL9)
- Don’t count kernel cache pages against job’s memory usage
- Avoid rare inclusion of previous job’s CPU and peak memory usage
- HTCondor now re-checks DNS before re-connecting to a collector
- HTCondor now writes out per job epoch history
- HTCondor can encrypt network connections without requiring authentication
- htcondor CLI can now show status for local server, AP, and CM
- htcondor CLI can now display OAUTH2 credentials
- Uses job’s sandbox to convert image format for Singularity/Apptainer
- Bug fix to not lose GPUs in Docker jobs on systemd reconfig
- Bug fix for PID namespaces and
condor_ssh_to_job
on EL9
- Add config knob to not have cgroups count kernel memory for jobs on EL9
- Remove support for numeric unit suffixes (k,M,G) in ClassAd expressions
- In submit files, request_disk & request_memory still accept unit suffixes
- Hide GPUs not allocated to the job on cgroup v2 systems such as EL9
- DAGMan can now produce credentials when using direct submission
- Singularity jobs have a contained home directory when file transfer is on
- Avoid using IPv6 link local addresses when resolving hostname to IP addr
- New ‘htcondor credential’ command to aid in debugging
- Add new condor-ap package to facilitate Access Point installation
- HTCondor Docker images are now based on Alma Linux 9
- HTCondor Docker images are now available for the arm64 CPU architecture
- The user can now choose which submit method DAGMan will use
- Can add custom attributes to the User ClassAd with
condor_qusers -edit
- Add use-projection option to
condor_gangliad
to reduce memory footprint - Fix bug where interactive submit does not work on cgroup v2 systems (EL9)
- Warns about deprecated multiple queue statements in a submit file
- The semantics of
skip_if_dataflow
have been improved - Removing large DAGs is now non-blocking, preserving schedd performance
- Periodic policy expressions are now checked during input file transfer
- Local universe jobs can now specify a container image
- File transfer plugins can now advertise extra attributes
- DAGMan can rescue and abort if pending jobs are missing from the job queue
- Fix so
condor_submit -interactive
works on cgroup v2 execution points
- Fix bug where file transfer plugin error was not in hold reason code
- Add the ability to force vanilla universe jobs to run in a container
- Add the ability to override the entrypoint for a Docker image
- condor_q -better-analyze includes units for memory and disk quantities
- Old ClassAd based syntax is disabled by default for the job router
- Can efficiently manage/enforce disk space using LVM partitions
- GPU discovery is enabled on all Execution Points by default
- Prevents accessing unallocated GPUs using cgroup v1 enforcement
- New
condor_submit
commands for constraining GPU properties - Add ability to transfer EP’s starter log back to the Access Point
- Can use VOMS attributes when mapping identities of SSL connections
- The CondorVersion string contains the source git SHA
- condor_submit warns about unit-less request_disk and request_memory
- Separate condor-credmon-local RPM package provides local SciTokens issuer
- Fix bug where NEGOTIATOR_SLOT_CONSTRAINT was ignored since version 23.3.0
- The htcondor command line tool can process multiple event logs at once
- Prevent Docker daemon from keeping a duplicate copy of the job’s stdout
- HTCondor tarballs now contain Pelican 7.4.0
- Restore limited support for Enterprise Linux 7 systems
- Additional assistance converting old syntax job routes to new syntax
- Able to capture output to debug DAGMan PRE and POST scripts
- Execution Points advertise when jobs are running with cgroup enforcement
- All the fixes from HTCondor 23.0.3 LTS
- Add
periodic_vacate
submit command to restart jobs that are stuck - Execution Points now advertise whether or not the execute directory is on rotational storage
- Add termination log events that report the time a job was running and the time that a job occupied a slot
- Files written by HTCondor are now written in binary mode on Windows
- HTCondor now uses the Pelican Platform for OSDF file transfers
- Add HTCondor Python wheels in PyPI for the aarch64 CPU architecture
- Enhanced filtering with ‘condor_watch_q’
- The Access Point can now be told to use a non-standard ssh port when sending jobs to a remote scheduling system (such as Slurm).
- Laid groundwork to allow an Execution Point running without root access to accurately limit the job’s usage of CPU and Memory in real time via Linux kernel cgroups; this is particularly interesting for glidein pools.
- HTCondor file transfers using HTTPS can now utilize CA certificates in a non-standard location
- The condor_upgrade_check script now provides guidance on updating to 23.0
- The htchirp Python binding now properly locates the chirp configuration
- Fix bug that prevented deletion of HTCondor passwords on Windows
- Fold the classads, blahp, and procd RPMs into the main condor RPM
- Align the Debian packages and package names with the RPM packaging
- On Linux, the default configuration enforces memory limits with cgroups
- condor_status -gpus shows nodes with GPUs and the GPU properties
- condor_status -compact shows a row for each slot type
- New ENV command controls which environment variables are present in DAGMan
- Fix performance problem detecting futile nodes in a large and bushy DAG
- Support for Debian 12 (Bookworm)
- Can run defrag daemons with different policies on distinct sets of nodes
- Added want_io_proxy submit command
- Apptainer is now included in the HTCondor tarballs
- Fix 10.5.0 bug where reported CPU time is very low when using cgroups v1
- Fix 10.5.0 bug where .job.ad and .machine.ad were missing for local jobs
- Administrators can enable and disable job submission for a specific user
- Work around memory leak in libcurl on EL7 when using the ARC-CE GAHP
- Container images may now be transferred via a file transfer plugin
- Add ClassAd stringlist subset match function
- Add submit file macro ‘$(JobId)’ which expands to full ID of the job
- The job’s executable is no longer renamed to ‘condor_exec.exe’
- Fix issue with grid batch jobs interacting with older Slurm versions
- Can now define DAGMan save points to be able to rerun DAGs from there
- Expand default list of environment variables passed to the DAGMan manager
- Administrators can prevent users using “getenv = true” in submit files
- Improved throughput when submitting a large number of ARC-CE jobs
- Execute events contain the slot name, sandbox path, resource quantities
- Can add attributes of the execution point to be recorded in the user log
- Enhanced condor_transform_ads tool to ease offline job transform testing
- Fixed a bug where memory limits over 2 GiB might not be correctly enforced
- Fix bug than could cause the collector audit plugin to crash
- Fix bug where remote submission of batch grid universe jobs fail
- Fix bug where HTCondor-CE fails to handle jobs after HTCondor restarts
- Preliminary support for Ubuntu 20.04 (Focal Fossa) on PowerPC (ppc64el)
- DAGMan no longer carries the entire environment into the DAGMan job
- Allows EGI CheckIn tokens to be used the with SciTokens authentication
- Execution points now advertise if an sshd is available for ssh to job
- Now evicts OOM killed jobs when they are under their requested memory
- HTCondor glideins can now use cgroups if one has been prepared
- Can write job information an AP history file for every execution attempt
- Can now specify a lifetime for condor_gangliad metrics
- The condor_schedd now advertises a count of unmaterialized jobs
- Fix counting of unmaterialized jobs in the condor_schedd
- Improved counting of unmaterialized jobs in the condor_schedd
- Add a count of unmaterialized jobs to condor_schedd statistics
- Fixed bugs with configuration knob SINGULARITY_USE_PID_NAMESPACES
- Improved condor_schedd scalability when a user runs more than 1,000 jobs
- Fix issue where condor_ssh_to_job fails if the user is not in /etc/passwd
- The Python Schedd.query() now returns the ServerTime attribute
- Fixed issue that prevented HTCondor installation on Ubuntu 18.04
- Preliminary support for Enterprise Linux 9
- Preliminary support for cgroups v2
- Can now set minimum floor for number of CPUs that a submitter gets
- Improved validity testing of Singularity/Apptainer runtinme
- Improvements to jobs hooks, including new PREPARE_JOB_BEFORE_TRANSFER hook
- OpenCL jobs now work inside Singularity, if OpenCL drivers are on the host
- Improvements to jobs hooks, including new PREPARE_JOB_BEFORE_TRANSFER hook
- OpenCL jobs now work inside Singularity, if OpenCL drivers are on the host
- Improvements to job hooks and the ability to save stderr from a job hook
- Fix bug where Apptainer only systems couldn’t run with Docker style images
- Release HTCondor 10.0.0 bug fixes into 10.1.0
- Provide a mechanism to bootstrap secure authentication within a pool
- Add the ability to define submit templates
- Administrators can now extend the help offered by condor_submit
- Add DAGMan ClassAd attributes to record more information about jobs
- On Linux, advertise the x86_64 micro-architecture in a slot attribute
- Added -drain option to condor_off and condor_restart
- Administrators can now set the shared memory size for Docker jobs
- Multiple improvements to condor_adstash
- HAD daemons now use SHA-256 checksums by default
- In 9.11.0, STARTD_NOCLAIM_SHUTDOWN restarted instead. Now, it shuts down.
- File transfer errors are identified as occurring during input or output
- Modified GPU attributes to support the new ‘require_gpus’ submit command
-
Add (PREEMPT HOLD)_IF_DISK_EXCEEDED configuration templates - ADVERTISE authorization levels now also provide READ authorization
- Periodic release expressions no longer apply to manually held jobs
- If a #! interpreter doesn’t exist, a proper hold and log message appears
- Can now set the Singularity target directory with ‘container_target_dir’
- If SciToken and X.509 available, uses SciToken for arc job authentication
- ActivationSetupDuration is now correct for jobs that checkpoint
- With collector administrator access, can manage all HTCondor pool daemons
- SciTokens can now be used for authentication with ARC CE servers
- Preliminary support for ARM and POWER RC on AlmaLinux 8
- Prevent negative values when using huge files with a file transfer plugin
- Fix bug where jobs would not match when using a child collector
- A new authentication method for remote HTCondor administration
- Several changes to improve the security of connections
- Fix issue where DAGMan direct submission failed when using Kerberos
- The submission method is now recorded in the job ClassAd
- Singularity jobs can now pull from Docker style repositories
- The OWNER authorization level has been folded into the ADMINISTRATOR level
- Fix HTCondor startup failure with certain complex network configurations
- Support for Heterogeneous GPUs, some configuration required
- Allow HTCondor to utilize grid sites requiring multi-factor authentication
- Technology preview: bring your own resources from HPC clusters
- Fix recent bug where jobs may go on hold without a hold reason or code
- Support environment variables, other application elements in ARC REST jobs
- Container universe supports Singularity jobs with hard-coded command
- DAGMan submits jobs directly (does not shell out to condor_submit)
- Meaningful error message and sub-code for file transfer failures
- Add file transfer statistics for file transfer plugins
- Add named list policy knobs for SYSTEM_PERIODIC_ policies
This release contains important fixes for security issues. Affected users should update as soon as possible.
More details on the security issues are in the Vulnerability Reports:
- Initial implementation of Container Universe
- HTCondor will automatically detect container type and where it can run
- The blahp is no longer separate, it is now an integral part of HTCondor
- Docker Universe jobs can now self-checkpoint
- Added Debian 11 (bullseye) as a supported platform
- Since CentOS 8 has reached end of life, we build and test on Rocky Linux 8
Enhancements in the release include:
- Initial implementation of Job Sets in the htcondor CLI tool
- The access point administrator can add keywords to the submit language
- Add submit commands that limit job run time
- Fix bug where self check-pointing jobs may be erroneously held
NOTE: Globus GSI has been removed from this release. If you are currently using GSI, you must migrate to a different authorization mechanism.
Enhancements in the release include:
- Discontinue support for Globus GSI
- Discontinue support for grid type ‘‘nordugrid’’, use ‘‘arc’’ instead
- MacOS version strings now include the major version number (10 or 11)
- File transfer plugin sample code to aid in developing new plugins
- Add generic knob to set the slot user for all slots
This release contains all of the bug fixes from the 9.0.6 LTS release and the 9.1.4, 9.1.5, 9.1.6 limited patch releases.
Enhancements in the release include:
- Add SERVICE node that runs alongside the DAG for the duration of the DAG
- Fix problem where proxy delegation to older HTCondor versions failed
- Jobs are now re-run if the execute directory unexpectedly disappears
- HTCondor counts the number of files transfered at the submit node
- Fix a bug that caused jobs to fail when using newer Singularity versions
This release contains all of the bug fixes from the 9.0.5 stable release.
Enhancements in the release include:
- Globus GSI is no longer needed for X.509 proxy delegation
- Globus GSI authentication is disabled by default
- If a user job policy expression evaluates to undefined, it is ignored
- The job ad now contains a history of job holds and hold reasons
This release contains important fixes for security issues. Affected users should update as soon as possible. More details on the security issues are in the Vulnerability Reports:
This release contains all of the bug fixes from the 9.0.1 stable release.
Enhancements in the release include:
- Support for submitting to ARC-CE via the REST interface
- DAGMan can put failed jobs on hold (user can correct problems and release)
- Can run gdb and ptrace within Docker containers
- A small Docker test job is run on the execute node to verify functionality
- The number of instructions executed is reported in the job Ad on Linux
Try out our new helpful installation scripts
- Host based security is no longer the default security model
- Hardware accelerated integrity and AES encryption used by default
- Normally, AES encryption is used for all communication and file transfers
- Fallback to Triple-DES or Blowfish when interoperating with older versions
- Simplified and automated new HTCondor installations
- HTCondor now detects instances of multi-instance GPUs
- Fixed memory leaks (collector updates in 8.9 could leak a few MB per day)
- Many other enhancements and bug fixes, see version history for details
- Withdrawn due to compatibility issues with prior releases
- This release of HTCondor fixes security-related bugs described at
- https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2021-0001/
- https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2021-0002/
- Fix bug where negotiator stopped making matches when group quotas are used
- Support OAuth, SciTokens, and Kerberos credentials in local universe jobs
- The Python schedd.submit method now takes a Submit object
- DAGMan can now optionally run a script when a job goes on hold
- DAGMan now provides a method for inline jobs to share submit descriptions
- Can now add arbitrary tags to condor annex instances
- Runs the “singularity test” before running the a singularity job
- The RPM packages requires globus, munge, scitokens, and voms from EPEL
- Improved cgroup memory policy settings that set both hard and soft limit
- Cgroup memory usage reporting no longer includes the kernel buffer cache
- Numerous Python binding improvements, see version history
- Can create a manifest of files on the execute node at job start and finish
- Added provisioner nodes to DAGMan, allowing users to provision resources
- DAGMan can now produce .dot graphs without running the workflow
- Added htcondor.dags and htcondor.htchirp to the HTCondor Python bindings
- New condor_watch_q tool that efficiently provides live job status updates
- Added support for marking a GPU offline while other jobs continue
- The condor_master command does not return until it is fully started
- Deprecated several Python interfaces in the Python bindings
- Multiple enhancements in the file transfer code
- Support for more regions in s3:// URLs
- Much more flexible job router language
- Jobs may now specify cuda_version to match equally-capable GPUs
- TOKENS are now called IDTOKENS to differentiate from SCITOKENS
- Added the ability to blacklist TOKENS via an expression
- Can simultaneously handle Kerberos and OAUTH credentials
- The getenv submit command now supports a blacklist and whitelist
- The startd supports a remote history query similar to the schedd
- condor_q -submitters now works with accounting groups
- Fixed a bug reading service account credentials for Google Compute Engine
- Fixes addressing CVE-2019-18823
- https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2020-0001/
- https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2020-0002/
- https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2020-0003/
- https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2020-0004/
- Added a new mode that skips jobs whose outputs are newer than their inputs
- Added command line tool to help debug ClassAd expressions
- Added port forwarding to Docker containers
- You may now change some DAGMan throttles while the DAG is running
- Added support for session tokens for pre-signed S3 URLs
- Improved the speed of the negotiator when custom resources are defined
- Fixed interactive submission of Docker jobs
- Fixed a bug where jobs wouldn’t be killed when getting an OOM notification
- Amazon S3 file transfers using pre-signed URLs
- Further reductions in DAGMan memory usage
- Added -idle option to condor_q to display information about idle jobs
- Support for SciTokens authentication
- A tool, condor_evicted_files, to examine the SPOOL of an idle job
- TOKEN and SSL authentication methods are now enabled by default
- The job and global event logs use ISO 8601 formatted dates by default
- Added Google Drive multifile transfer plugin
- Added upload capability to Box multifile transfer plugin
- Added Python bindings to submit a DAG
- Python ‘JobEventLog’ can be pickled to facilitate intermittent readers
- 2x matchmaking speed for partitionable slots with simple START expressions
- Improved the performance of the condor_schedd under heavy load
- Reduced the memory footprint of condor_dagman
- Initial implementation to record the circumstances of a job’s termination
- The HTTP/HTTPS file transfer plugin will timeout and retry transfers
- A new multi-file box.com file transfer plugin to download files
- The manual has been moved to Read the Docs
- Configuration options for job-log time-stamps (UTC, ISO 8601, sub-second)
- Several improvements to SSL authentication
- New TOKEN authentication method enables fine-grained authorization control
- An efficient curl plugin that supports uploads and authentication tokens
- HTCondor automatically supports GPU jobs in Docker and Singularity
- File transfer times are now recorded in the user job log and the job ad
- Absent any configuration, HTCondor denies authorization to all users
- All HTCondor daemons under a condor_master share a security session
- Scheduler Universe jobs are prioritized by job priority
- Can now interactively submit Docker jobs
- The administrator can now add arguments to the Singularity command line
- The MUNGE security method is now supported on all Linux platforms
- The grid universe can create and manage VM instances in Microsoft Azure
- Added a single-node package to facilitate using a personal HTCondor
- Support for Debian 9, Ubuntu 16, and Ubuntu 18
- Improved Python bindings to support the full range of submit functionality
- Allows VMs to shutdown when the job is being gracefully evicted
- Can now specify a host name alias (CNAME) for NETWORK_HOSTNAME
- Added the ability to run a job immediately by replacing a running job
- The condor annex can easily use multiple regions simultaneously
- HTCondor now uses CUDA_VISIBLE_DEVICES to tell which GPU devices to manage
- HTCondor now reports GPU memory utilization
- condor_ssh_to_job now works with Docker Universe jobs
- A 32-bit condor_shadow is available for Enterprise Linux 7 systems
- Tracks and reports custom resources, e.g. GPUs, in the job ad and user log
- condor_q -unmatchable reports jobs that will not match any slots
- Several updates to the parallel universe
- Spaces are now allowed in input, output, and error paths in submit files
- In DAG files, spaces are now allowed in submit file paths
- Machines won’t enter “Owner” state unless using the Desktop policy
- One can use SCHEDD and JOB instead of MY and TARGET in SUBMIT_REQUIREMENTS
- HTCondor now reports all submit warnings, not just the first one
- The HTCondor Python bindings in pip are now built from the release branch
- Fixed an issue validating VOMS proxies
- Improvements to DAGMan including support for late job materialization
- Updates to condor_annex including improved status reporting
- When submitting jobs, HTCondor can now warn about job requirements
- Fixed a bug where remote CPU time was not recorded in the history
- Improved support for OpenMPI jobs
- The high availability daemon now works with IPV6 and shared_port
- The HTCondor Python bindings are now available for Python 2 and 3 in pip
- Further updates to the late job materialization technology preview
- An improved condor_top tool
- Enhanced the AUTO setting for ENABLE_IPV{4,6} to be more selective
- Fixed several small memory leaks
- Improved condor_schedd performance by turning off file checks by default
- condor_annex -status finds VM instances that have not joined the pool
- Able to update an annex’s lease without adding new instances
- condor_annex now keeps a command log
- condor_q produces an expanded multi-line summary
- Automatically retry and/or resume http file transfers when appropriate
- Reduced load on the condor_collector by optimizing queries
- A python based condor_top tool
- Several performance enhancements in the collector
- Further refinement and initial documentation of the HTCondor Annex
- Enable chirp for Docker jobs
- Job Router uses first match rather than round-robin matching
- The schedd tracks jobs counts by status for each owner
- Technology preview of late job materialization in the schedd
- Performance improvements in collector’s ingestion of ClassAds
- Added collector attributes to report query times and forks
- Removed extra white space around parentheses when unparsing ClassAds
- Technology preview of the HTCondor Annex
- The starter puts all jobs in a cgroup by default
- Added condor_submit commands that support job retries
- condor_qedit defaults to the current user’s jobs
- Ability to add SCRIPTS, VARS, etc. to all nodes in a DAG using one command
- Able to conditionally add Docker volumes for certain jobs
- Initial support for Singularity containers
- A 64-bit Windows release
- The schedd can perform job ClassAd transformations
- Specifying dependencies between DAGMan splices is much more flexible
- The second argument of the ClassAd ? : operator may be omitted
- Many usability improvements in condor_q and condor_status
- condor_q and condor_status can produce JSON, XML, and new ClassAd output
- To prepare for a 64-bit Windows release, HTCondor identifies itself as X86
- Automatically detect Daemon Core daemons and pass localname to them
- The -batch output for condor_q is now the default
- Python bindings for job submission and machine draining
- Numerous Docker usability changes
- New options to limit condor_history results to jobs since last invocation
- Shared port daemon can be used with high availability and replication
- ClassAds can be written out in JSON format
- More flexible ordering of DAGMan commands
- Efficient PBS and SLURM job monitoring
- Simplified leases for grid universe jobs
- Improvements for scalability of EC2 grid universe jobs
- Docker Universe jobs advertises remote user and system CPU time
- Improved systemd support
- The master can now run an administrator defined script at shutdown
- DAGMan includes better support for the batch name feature
- Fixed a bug that delays schedd response when significant attributes change
- Fixed a bug where the group ID was not set in Docker universe jobs
- Limit update rate of various attributes to not overload the collector
- To make job router configuration easier, added implicit “target” scoping
- To make BOSCO work, the blahp does not generate limited proxies by default
- condor_status can now display utilization per machine rather than per slot
- Improve performance of condor_history and other tools
- Use IPv6 (and IPv4) interfaces if they are detected
- Prefer IPv4 addresses when both are available
- Count Idle and Running jobs in Submitter Ads for Local and Scheduler universes
- Can submit jobs to SLURM with the new “slurm” type in the Grid universe
- HTCondor is built and linked with Globus 6.0
- condor_q now defaults to showing only the current user’s jobs
- condor_q -batch produces a single line report for a batch of jobs
- Docker Universe jobs now report and update memory and network usage
- immutable and protected job attributes
- improved performance when querying a HTCondor daemon’s location
- Added the ability to set ClassAd attributes within the DAG file
- DAGMan now provides event timestamps in dagman.out
- the shared port daemon is enabled by default
- the condor_startd now records the peak memory usage instead of recent
- the condor_startd advertises CPU submodel and cache size
- authorizations are automatically setup when “Match Password” is enabled
- added a schedd-constraint option to condor_q
- multiple enhancements to the python bindings
- the condor_schedd no longer changes the ownership of spooled job files
- spooled job files are visible to only the user account by default
- the condor_startd records when jobs are evicted by preemption or draining
- a script to tune Linux kernel parameters for better scalability
- support for python bindings on Windows platforms
- a mechanism to remove Docker images from the local machine
- default configuration settings have been updated to reflect current usage
- the ability to preempt dynamic slots, such that a job may match with a partitionable slot
- the ability to limit the number of jobs per submission and the number of jobs per owner by setting configuration variables
- initial Docker universe support
- IPv4/IPv6 mixed mode support
- new features that increase the power of job specification in the submit description file
- RPMs for Red Hat Enterprise Linux 6 and 7 are modularized and only distributed via our YUM repository
- The new condor-all RPM requires the other HTCondor RPMs of a typical HTCondor installation
- a bug fix for a problem that can cause jobs to not be matched to resources when the condor_schedd is flocking
- the ability to encrypt a job’s directory on Linux execute hosts
- enhancements to EC2 grid universe jobs
- a more efficient query protocol, including the ability to query the condor_schedd daemon’s autocluster set
- the next installment of IPv4/IPv6 mixed mode support: a submit node can simultaneously interact with an IPv4 and an IPv6 HTCondor pool
- scalability improvements: a reduced memory foot-print of daemons, a reduced number of TCP connections between submit and execute machines, and an improved responsiveness from a busy condor_schedd to queries
The HTCondor Team is pleased to announce the release of HTCondor version 8.3.1. This release contains a variety of changes that reduce memory usage and improve performance. If cgroups are used to limit memory utilization, HTCondor sets both the memory and swap limits. A complete list of bugs fixed and features can be found in the Version History. HTCondor 8.3.1 binaries and source code are available from our Downloads page.
The HTCondor Team is pleased to announce the release of HTCondor version 8.3.0. This development release contains all the bug fixes from the stable release version 8.2.2. This first release of the 8.3 series contains performance improvements. In one improvement, the condor_negotiator can request the batching of resource requests from the condor_schedd, improving performance over high latency (wide-area) network links. A complete list of bugs fixed and features can be found in the Version History. HTCondor 8.3.0 binaries and source code are available from our Downloads page.
The HTCondor Team is pleased to announce the release of HTCondor version 8.1.6. Major new features include: automatic recognition, scheduling, and management of GPUs; submit jobs to run on a BOINC server, using the grid universe; major new features for configuration: file inclusion to incorporate configuration, metaknobs–incorporation of predefined sets of configuration, conditional configuration using if/else syntax. A complete list of bugs fixed and features can be found in the Version History. HTCondor 8.1.6 binaries and source code are available from our Downloads page.
The HTCondor Team is pleased to announce the release of HTCondor version 8.1.5. Major new features include: a change to the default policy, such that it does not preempt jobs; several new instances of non-blocking I/O to improve performance; fewer server resources are used by the condor_schedd when handling condor_q requests; a bug fix, such that large submit description files do not cause condor_submit to crash; a bug fix, such that large configuration files do not cause the condor_master daemon to crash. A complete list of bugs fixed and features can be found in the Version History. HTCondor 8.1.5 binaries and source code are available from our Downloads page.
The HTCondor Team is pleased to announce the release of HTCondor version 8.1.4. This development release contains all the bug fixes from the stable release version 8.0.6. Major new features include: added grid universe support for Google Compute Engine; support for defining custom resources that easily manage GPUs; a new tool that does GPU discovery; improved scalability when using the shared port service; Python 3 support; enhanced resilience due to the prompt detection of network failures. A complete list of bugs fixed and features can be found in the Version History. HTCondor 8.1.4 binaries and source code are available from our Downloads page.
The HTCondor Team is pleased to announce the release of HTCondor version 8.1.3. This development release contains all the bug fixes from the stable release version 8.0.5. Major new features include: the parsing of configuration has changed such that comments are permitted within multi-line definitions; the condor_sos tool helps administrators manage overloaded daemons by causing commands to be handled with a higher priority; a new Python binding reads event logs. A complete list of bugs fixed and features can be found in the Version History. HTCondor 8.1.3 binaries and source code are available from our Downloads page.
The HTCondor team is pleased to announce the release of HTCondor 8.1.2. This development release contains all the bug fixes from the stable release version 8.0.4. Major new features include: partitionable slots can now be split into dynamic slots at negotiation time using new consumption policies; new condor_chirp commands permit updates to job ClassAd attributes to occur in a delayed fashion, reducing the overhead of making the update; there are many Python binding improvements including a new Negotiator class; condor_ssh_to_job now works for grid universe jobs on amazon EC2 resources; new command line options for condor_config_val and condor_history allow them to query remote machines; increased the scalability of the condor_shared_port daemon, condor_queue, and condor_status by increasing concurrency. A complete list of bugs fixed and features can be found in the Version History. HTCondor 8.1.2 binaries and source code are available from our Downloads page.
The HTCondor Team is pleased to announce the release of HTCondor version 8.1.1. This development release contains all the bug fixes from the stable release version 8.0.2. Major new features include: the condor_startd daemon now advertises statistics about preemption, parameter substitution in configuration now honors per-daemon overrides. A complete list of bugs fixed and features can be found in the Version History. HTCondor 8.1.1 binaries and source code are available from our Downloads page.
The HTCondor team is pleased to announce the release of HTCondor 7.9.6. This is the final release of the 7.9 series. This release contains new tools, VMware player support, Linux out of memory killer hints, python bindings, new configuration parameters, and many bug fixes. A complete list of bugs fixed and features can be found in the Version History. HTCondor 7.9.6 binaries and source code are available from our Downloads page.
The HTCondor team is pleased to announce the release of HTCondor 7.9.5. This release introduces a new tool - condor_tail - which can be used to see files in the sandbox of a running job. It improves to the transfer queue with a fair share policy and per-user transfer statistics. Per-submitter time limits are now honored by the Negotiator. There are bug fixes for grid universe, dagman, the Windows keyboard daemon and more. A complete list of bugs fixed and features can be found in the Version History. HTCondor 7.9.5 binaries and source code are available from our Downloads page.
The HTCondor team is pleased to announce the release of HTCondor 7.9.4. This release supports per job PID namespaces for Linux RHEL 6, improvements to the resource usage of the EC2 GAHP, support for capping the size of input and output file transfer, and new analysis modes for condor_q -analyze. A complete list of bugs fixed and features can be found in the Version History. HTCondor 7.9.4 binaries and source code are available from our Downloads page.
The HTCondor team is pleased to announce the release of HTCondor 7.9.3. This release contains all of the bug fixes added to the 7.8.7 stable release. The glexec problems we warned about in the 7.9.2 release notes have been fixed. Dynamic slots can now be given CPU affinity, there are number of improvements in the way grid universe jobs are handled, and there are some experimental improvements to condor_q -analyze A complete list of bugs fixed and features can be found in the Version History. HTCondor 7.9.3 binaries and source code are available from our Downloads page.
The HTCondor team is pleased to announce the release of HTCondor 7.9.2. Now with more HT. This release contains all of the bug fixes added to the 7.8.6 stable release, and most of those added to the upcoming 7.8.7 stable release. This release also contains improvements in DAGMan, use of cgroups, and changes to improve the privacy of user data. This release has known problems with glexec that we expect to have fixed in the next developer release. Users of glexec should skip this release. A complete list of bugs and features can be found in the Version History. HTCondor 7.9.2 binaries and source code are available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 7.9.1. This is a development release which includes many new features, as well as all bug and security fixes from 7.8.5. See the Version History for a complete list of changes. Condor 7.9.1 binaries and source code are available from our Downloads page.
The Condor team is pleased to announce the release of Condor 7.9.0. This is the first release in a new development series. Condor 7.9.0 contains all the bug fixes from Condor version 7.8.2. The Version History lists the changes. Condor 7.9.0 binaries and source code are available from our Downloads page.
The Condor team is pleased to announce the newest release in our development series, 7.7.6. This release represents the release candidate for Condor version 7.8, and it is the last release in the 7.7 development series. Please see the release notes for a complete list. Condor binaries and source code are available from our Downloads page.
The Condor team is pleased to announce the newest release in our development series, 7.7.5. This release represents the feature freeze for Condor version 7.8, and we expect it to be the penultimate release in the 7.7 development series. New features in this release include better statistics for monitoring a Condor pool, better support for absent ads in the collector, fast claiming of partitionable slots, and support for some newer Linux kernel features to better support process isolation. Please see the release notes for a complete list. Condor binaries and source code are available from our Downloads page.
The Condor team is pleased to announce the newest release in our development series, 7.7.4. This introduces support for IPv6 based networks, changes the way accounting group quotas are managed to be more compatible with the way it worked in 7.4.x, fixes a Chirp bug that caused problems for the vanilla universe, and contains initial support for draining off jobs out of startds. Please see the release notes for a complete list. Please note that we are skipping the 7.7.3 release, and that this 7.7.4 release is the next release available after 7.7.2. has a list of the major changes. Condor binaries and source code are available from our Downloads page.
The Condor team is pleased to announce the release of Condor version 7.7.2. This is the third release in the development series. This release dynamically links more libraries than before, resulting in a 30 percent decrease in download size on most operating systems. Please be aware that due to a difference in older condor_master binaries, condor_masters older than 7.7.2, including all 7.6 releases, can not re-exec a 7.7.2 master. That is, if you try to upgrade a pre-7.7.2 system just by copying over binaries, the condor_master will shutdown, and must be manually restarted. 7.7.2 masters can re-exec themselves without incident. The Version History has a list of the major changes. Condor binaries and source code are available from our Downloads page.
The Condor team is pleased to announce the release of Condor 7.7.1. This is the second release in the development series. This release of Condor now dynamically links the executables to the system security libraries, including openssl. In the past, these libraries have been statically linked into the binaries. As a result, system security updates will immediately benefit Condor. The downside is that binaries built for a given platform may not be as portable to other platforms as in the past. We have also seen a very rare, intermittent problem with DAGMan where the DAGMan program will ignore a successful job completion, and wait forever. We hope to resolve this problem in the next development release. The Version History has a list of the major changes. Condor binaries and source code are available from our Downloads page.
The Condor team is pleased to announce the release of Condor 7.7.0. This is the first release in a new development series. In addition to other major new features, the schedd now publishes performance statistics, and PERIODIC_HOLD can now send the hold reason and hold reason code fields. Condor 7.7.0 contains all the bug fixes from Condor version 7.6.2. A partial Version History has a list of some of the changes. Condor 7.7.0 binaries and source code are available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 7.5.6. This is a development release of Condor. This release is contains various new features, improvements, and bug fixes. Among these are several improvements for CREAM grid jobs, efficiency improvements in the schedd when handling large numbers of shadow processes, and added support for hierarchical accounting groups and group quotas. Please note that some platforms were discontinued in this release. For further details of changes and discontinued platforms, please refer the 7.5.6 version history. Condor 7.5.6 binaries and source code are available from our Downloads page. A large number of bugs have been fixed - more details are in the Version History. Condor 7.5.6 binaries and source code are available from our downloads page.
The Condor Team is pleased to announce the release of Condor 7.5.5. This is a development release of Condor. This release is primarily to improve scalability and performance. Additionally, of note to those people who build Condor from source, we have modernized our build system to use cmake instead of imake. A large number of bugs have been fixed - more details are in the Version History. Condor 7.5.5 binaries and source code are available from our downloads page.
The Condor Team is pleased to announce the release of Condor 7.5.4. This is a development release of Condor. New features include concurrency limits for parallel jobs, transfer of directories, condor_shared_port on Windows, and improved Amazon EC2 support. It also includes a security fix for users submitting Amazon EC2 jobs (universe=grid and grid_resource=amazon) with the amazon_keypair_file. See the Version History for a complete list of changes. Condor 7.5.4 binaries and source code are available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 7.5.3. This is a development release of Condor. Please note that we dropped our old repackaged tarball rpms, and now only provide the proper rpm and debian packages introduced in version 7.5.1. Therefore you will see fewer downloads offered for 7.5.3 compared to 7.5.2. See the Version History for a complete list of changes. Condor 7.5.3 binaries and source code are available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 7.5.2. This is a development release of Condor. The main new features are performance enhancements in the scheduler daemon, improved user job log locking support for distributed file systems, and DAGMan allowing lazy generation of DAGMan submit files in nested DAGs. All bug fixes currently scheduled to go into 7.4.3 are included in 7.5.2. See the Version History for a complete list of changes. Condor 7.5.2 binaries and source code are available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 7.5.1. This is a development release of Condor. The main new feature is the change from old to new ClassAds throughout the code. Proper native packages are now available for most flavors of linux. All bug fixes currently scheduled to go into 7.4.2 are included in 7.5.1. See the Version History for a complete list of changes. Condor 7.5.1 binaries and source code are available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 7.5.0. This is a development release of Condor. The main new feature is the ability to have Condor daemons share a single network port for incoming connections. This feature is available in UNIX only in this release. All bug fixes from 7.4.1 are included in 7.5.0. See the Version History for a complete list of changes. Condor 7.5.0 binaries and source code are available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 7.3.2. This release improves the behavior of the checkpoint server in mixed 32/64 bit architecture pools, provides a new tool called condor_ssh_to_job to allow interactive debugging of running jobs, some performance enhancements, lazy log file processing for DAGMan jobs, plugins for utilizing a host’s power management capabilities, and many other new features in addition to many bug fixes. Please see Version History for a complete list of changes. Condor 7.3.2 binaries and source code are available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 7.3.1. This release dramatically improves the performance of DAGMan for large dags. This is the first release with preview support for a multi-threaded collector, which is useful for large pool of machines with high-latency links to the collector. There are my other smaller bug fixes. See the Version History for a complete list of changes. Condor 7.3.1 binaries and source code are available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 7.3.0. This development release contains all bug fixes from the 7.2.1 stable release plus new features, including improved support for private networks, scalability, controlling cpu affinity, DAGMan enhancements, and more. See the version history for a detailed list of changes. Condor 7.3.0 binaries and source code are available from our downloads page.
The Condor Team is pleased to announce the release of Condor 7.1.4. This release in the development series contains the bug fixes from the v7.0.5 release, including the security related patches. In addition, several new features have been added such as preliminary support for “green computing”, dynamic startd provisioning, improvements to the “VM Universe”, improved event log rotation, and more. See our Release Notes for more details. As usual, binaries and source code are available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 7.1.3. This release in the development series contains the bug fixes from the v7.0.5 release, including the security related patches. In addition, several new features have been added such as Concurrency Limits (for management of resources such as floating software licenses), IBM Blue Gene support, profile management on Windows, and more. See our Release Notes for more details. As usual, binaries and source code are available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 7.1.2. This release in the development series includes bug fixes to the pulled 7.1.1 release. Condor 7.1.1 binaries and source code are available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 7.1.1. This release in the development series includes all new features added in the 7.0 stable series. See the version history section of the 7.1 manual for a complete list of changes. Condor 7.1.1 binaries and source code are available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 7.1.0 (not to be confused with our recent stable series release 7.0.1). This development series release introduces several new features. The condor_startd can be configured to fetch jobs from other sources using a simple plug-in mechanism. A new daemon condor_job_router has been added for dynamically transforming suitable Vanilla Universe jobs into Grid Universe jobs. DAGMan’s handling of rescue DAGs has been improved to better support nested DAGs. DAGIrl has been added to better support Irl workflows in the beginning of April. See the Version History for a complete list of changes. Condor 7.1.0 binaries and source code are available from our Downloads page.
The Condor Team announces the release of Condor 6.9.5. Condor 6.9.5 highlights include numerous scalability and performance improvements, updates between the starter and startd which allow more accurate job eviction policies, enhancements to Condor’s privilege separation, and numerous bug fixes including a critical bug in standard universe introduce in 6.9.4 that could result in data corruption of binary files. See the Version History and Release Notes for further details and a complete list of changes. Condor 6.9.5 is available from our Downloads page.
The Condor Team announces the release of Condor 6.9.4. Condor 6.9.4 highlights include a new implementation of Quill that can store more information than ever before into a relational database, a new job type (universe) enabling jobs to utilize VMWare and Xen virtual machines, and some performance improvements. See the Version History and Release Notes for further details. Condor 6.9.4 is available from our Downloads page.
The Condor Team is relieved to announce the release of Condor 6.9.3. Condor 6.9.3 has significant performance and scalability improvements and many other new features. See the Version History and Release Notes for further details. Condor 6.9.3 is available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 6.9.2. Condor 6.9.2 contains all bugfixes from the recent 6.8.4 release and adds several new features. See the Version History and Release Notes for further details. Condor 6.9.2 is available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 6.9.1. Condor 6.9.1 contains all bugfixes from the recent 6.8.3 release and adds several new features, including numerous performance improvements and improved GCB support. See the Version History and Release Notes for further details. Condor 6.9.1 is available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 6.9.0. Condor 6.9.0 is the first release of a new development series based on the 6.8.x stable code. The primary new feature in 6.9.0 is initial support for privilege separation using glexec. See the Version History and Release Notes for further details. As a development release, 6.9.0 is not recommended for production use. Condor 6.9.0 is available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 6.7.20. This release features many bugfixes and new features, including a variety of built-in functions that can be used in ClassAds and a unified mapfile providing more flexible identity management when using strong authentication. See the Version History and Release Notes for further details. Condor 6.7.20 is available from our Downloads page. We believe 6.7.20 is fairly stable, but it is not recommended for production systems, unless you require checkpointing support for a Linux distribution not supported by our 6.6 releases.
The Condor Team is pleased to announce the release of Condor 6.7.19. This release features an important security fix to checkpoint server, submission to PBS and LSF systems, ClassAd functions, and many other improvements. See the Version History and Release Notes for further details. Condor 6.7.19 is available from our Downloads page. We strongly recommend sites running earlier versions of Condor in the 6.7 development series upgrade to 6.7.19 as soon as feasible. We believe 6.7.19 is fairly stable, but it is not recommended for production systems, unless you require checkpointing support for a Linux distribution not supported by our 6.6 releases.
The Condor Team is pleased to announce the release of Condor 6.7.18. This release features important security fixes and many other improvements. See the Version History and Release Notes for further details. Condor 6.7.18 is available from our Downloads page. We strongly recommend sites running earlier versions of Condor in the 6.7 development series upgrade to 6.7.18 as soon as feasible. We believe 6.7.18 is fairly stable, but it is not recommended for production systems, unless you require checkpointing support for a Linux distribution not supported by our 6.6 releases.
The Condor Team is pleased to announce the release of Condor 6.7.17. This release features direct support for running backfill computations on unused nodes, parallel job support in DAGMan, improvements to condor_history, and many other improvements. See the Version History and Release Notes for further details. Condor 6.7.17 is available from our Downloads page. We believe 6.7.17 is fairly stable, but it is not recommended for production systems, unless you require checkpointing support for a Linux distribution not supported by our 6.6 releases.
The Condor Team is pleased to announce the release of Condor 6.7.16. This is a bugfix release for 6.7.15. Together, these two releases include a faster negotiation protocol, a clipped port for PowerPC under YellowDog Linux 3.0, and many other improvements. See the Version History and Release Notes for details. Condor 6.7.16 is available from our Downloads page. We believe 6.7.16 is fairly stable, but it is not recommended for production systems, unless you require checkpointing support for a Linux distribution not supported by our 6.6 releases.
The Condor Team is pleased to announce the release of Condor 6.7.14. Highlights include grid universe support for NorduGrid and Unicore, system job policy expressions, and job start time deferral. Users of prior version of 6.7.x are encouraged to upgrade. See the Version History and Release Notes for details. Condor 6.7.14 is available from our Downloads page. We believe 6.7.14 is fairly stable, but it is not recommended for production systems, unless you require checkpointing support for a Linux distribution not supported by our 6.6 releases.
The Condor Team is pleased to announce the release of Condor 6.7.13. Highlights include Generic Connection Brokering for traversing firewalls and private networks, Quill on Windows, and a new clipped port for Red Hat Enterprise Linux 3 on IA64. Users of prior version of 6.7.x are encouraged to upgrade. See the Version History and Release Notes for details. Condor 6.7.13 is available from our Downloads page. We believe 6.7.13 is fairly stable, but it is not recommended for production systems, unless you require checkpointing support for a Linux distribution not supported by our 6.6 releases.
The Condor Team is pleased to announce the release of Condor 6.7.12. This version is being released to fix several critical bugs in Condor 6.7.11. 6.7.11 was not widely advertised, but was available on our mirror site for a short period. Any users of 6.7.11, or any other prior version of 6.7.x are urged to upgrade. See the Version History and Release Notes for details. Condor 6.7.12 is available from our Downloads page. We believe 6.7.12 is fairly stable, but it is not recommended for production systems, unless you require checkpointing support for a Linux distribution not supported by our 6.6 releases.
The Condor Team is pleased to announce the release of Condor 6.7.11. This version is primarily for Quill. Quill maintains a read-only mirror of the job queue in a database, enabling faster and more powerful queries as well as reducing the load on the schedd. In addition, there were a number of bug fixes. See the Version History and Release Notes for details. Condor 6.7.11 contained several critical bugs and was pulled from the mirror site. Interested users should try 6.7.12 instead.
The Condor Team is pleased to announce the release of Condor 6.7.10. This version is primarily for bug fixes, including a number of serious bugs the Windows port. Many of the bugs were recently introduced in the 6.7 development series, so users of the 6.6 stable series need not upgrade. Users of prior versions of 6.7.x are urged to upgrade. See the Version History and Release Notes for details. Condor 6.7.10 is available from our Downloads page. We believe 6.7.10 is fairly stable, but it is not recommended for production systems, unless you require checkpointing support for a Linux distribution not supported by our 6.6 releases.
The Condor Team is pleased to announce the release of Condor 6.7.9. This version is primarily for the new parallel universe, but also includes many bug fixes and improvements to Condor-C. See the Version History and Release Notes for details. Condor 6.7.9 is available from our Downloads page. We believe 6.7.9 is fairly stable, but it is not recommended for production systems, unless you require checkpointing support for a Linux distribution not supported by our 6.6 releases.
The Condor Team is pleased to announce the release of Condor 6.7.8. 6.7.8 is primarily for bug fixes, but includes some scalability additions for DAGMan and the Standard Universe. See the Version History and Release Notes for details. Condor 6.7.8 is available from our Downloads page. We believe 6.7.8 is fairly stable, but it is not recommended for production systems, unless you require checkpointing support for a Linux distribution not supported by our 6.6 releases.
The Condor Team is pleased to announce the release of Condor 6.7.7. 6.7.7 is primarily for improvements to the grid universe. It includes support for strong authentication and multiple users for the “condor” gridtype, and full support for the Globus Toolkit 4.0.0 release. See the Version History and Release Notes for details. Condor 6.7.7 is available from our Downloads page. We believe 6.7.7 is fairly stable, but it is not recommended for production systems, unless you require checkpointing support for a Linux distribution not supported by our 6.6 releases. 6.7.6 users who are using the Globus Toolkit 4.0 are strongly urged to upgrade to 6.7.7.
The Condor Team is pleased to announce the release of Condor 6.7.6. It includes support for using the “grid” universe with resources managed by the beta releases of the Globus Toolkit 4.0, the Stork data movement server, and a high-availability daemon to provide backup central managers contributed by Technion - Israel Institute of Technology. See the Version History and Release Notes for details. Condor 6.7.6 is available from our Downloads page. We believe 6.7.6 is fairly stable, but it is not recommended for production systems, unless you require checkpointing support for a Linux distribution not supported by our 6.6 releases. Users of previous 6.7 versions are urged to upgrade.
The Condor Team is pleased to announce the release of Condor 6.7.5. 6.7.5 is the fifth release of our development series, and is primarily a new feature release. Condor 6.7.5 includes the SOAP interface to some Condor daemons, a option to DAGMan to abort a DAG when a node fails with a specific error code, enhancements to the MPI universe in scheduling and requirements, and speed-ups in claiming large number of machines. See the Version History and Release Notes for details. Condor 6.7.5 is available from our Downloads page. We believe 6.7.5 is fairly stable, but it is not recommended for production systems, unless you require checkpointing support for a Linux distribution not supported by our 6.6 releases. Users of previous 6.7 versions are urged to upgrade.
6.7.3 is the fourth release of our development series. 6.7.3 is primarily a new feature release. 6.7.3 is the first release to fully support checkpointing on Linux distributions Fedora Core 1, 2, and 3. 6.7.3 also includes preliminary support for a new remote submission feature that will complement flocking and the grid universe. See the Version History and Release Notes for details. Condor 6.7.3 is available from our Downloads page. We believe 6.7.3 is fairly stable, but it is not recommended for production systems, unless you require checkpointing support for a Linux distribution not supported by our 6.6 releases. Users of previous 6.7 versions are urged to upgrade.
6.7.2 is the third release of our development series. 6.7.2 is primarily a bug fix release. New features include support for multiple collectors and better support for the Linux 2.6 kernel. 6.7.2, and all future releases (including 6.6 series releases) will no longer support HP-UX 10.20, Digital UNIX 4.0f, and Solaris 7. See the Version History and Release Notes for details. Condor 6.7.2 is available from our Downloads page. 6.7.2 is not recommended for production systems, but is believed to be relatively stable. Users of 6.7.0 and 6.7.1 should upgrade to 6.7.2.
6.7.1 is the latest version of our current development release series. See the Version History and Release Notes for details. Condor 6.7.1 is available from our Downloads page.
6.7.0 is the first release of our development series. It includes some exciting new features, including support for jobs to tolerate network failures between the submit and execute sites, job mirroring between multiple submit points, high availability between some daemons, DRMAA support, the ability to submit into grids managed by GT3 web services, NorduGrid, and Oracle jobs, support for MyProxy Online Credential Management, over two gigabyte file transfer support, steaming output from vanilla jobs, and many other features. See the Version History and Release Notes for details. Condor 6.7.0 is available from our Downloads page.
Condor Version 6.3.1 has been released, and is available on the downloads page. 6.3.1 is the second release in the 6.3 development series. The main focus of this release was bug fixes over the 6.3.0 release and support for Redhat 7.1 Linux. The complete list of changes can be found here
Condor Version 6.3.0 has been released, and is available on the downloads page. 6.3.0 is the first release in the 6.3 development series. Future 6.3 releases will contain many new features, primarily in the areas of MPI support, Globus support, firewall support, an improved DAGMan, improved error handling / propagation, and bandwidth regulation. For more info on our version-number system, please read this. <p> The UNIX builds are now available on the website. The primary focus of 6.3.0 has been in preliminary support for MPI jobs on dedicated clusters of machines. 6.3.0 is not as well-tested as 6.2.0, and undoubtedly contains a number of bugs. It should not be used by those requiring a tried and tested system; for that we recommend the 6.2 stable series.
Condor Version 6.1.17 is now released, and is available on the downloads page. <p> 6.1.17 adds full support for Solaris 8 and some bug fixes. <p> 6.1.17 will likely be the last version of Condor until the 6.2.0 release. New users should choose it over 6.0.3.
Condor Version 6.1.16 is now released, and is available on the downloads page.
As our 6.1 development series winds down, we have released 6.1.15 which provides several enhancements, as well as numerous bug fixes, including the fix that avoids the 2.2.14 Linux kernel bug. <p> For complete details, you can read about what’s new in this version. <hr> If you install the Unix version of Condor 6.1.15 into a new pool, you will have ADD the following three lines into your condor_config.local file on your central manger: <pre>DAEMON_LIST = MASTER, COLLECTOR, NEGOTIATOR, STARTD, SCHEDD COLLECTOR = $(SBIN)/condor_collector NEGOTIATOR = $(SBIN)/condor_negotiator</pre> Naturally, if you run fewer things on your central manager, you should take them out of the DAEMON_LIST.
Soon after the 6.1.13 release of Condor we noticed that it had a bug with periodic checkpointing. 6.1.14 fixes this as well adds support for Red Hat 6.2. For complete details, you can read about what’s new in this version.
Condor version 6.1.13 contains full support for Solaris 2.7. In addition, it fixes a number of bugs in version 6.1.12. There are a few remaining known bugs, but they are all very minor. These known bugs are listed in the version history (see below) and will be fixed in the next release. There are a number of new features in 6.1.13, as well. For complete details, you can read about what’s new in this version.
Condor version 6.1.12 contains bug fixes for all the major bugs in 6.1.11. There are a few remaining known bugs, but they are all very minor. These known bugs are listed in the version history (see below) and will be fixed in the next release. Anyone who downloaded 6.1.11 should upgrade to 6.1.12 as soon as possible. For complete details, you can read about what’s new in this version.
Condor version 6.1.11 contains a large number of bug fixes, and new features. In particular, there is enhanced support for various remote system calls, a much better infrastructure for Condor-level I/O buffering, and better reporting in the notification email. In addition, limited support for network sockets within “standard universe” jobs is now available. This is also the first version with full support for checkpointing and remote system calls under Irix 6.5. For complete details, you can read about what’s new in this version.
Condor version 6.1.10 contains a fix to a bug in the checkpointing code for “standard” jobs introduced in 6.1.9. In addition, “clipped” support for Sparc Solaris 2.7 is available for the first time in 6.1.10. A few other minor features were added as well, including a -format option to condor_q. For complete details, you can read about what’s new in this version.
Condor 6.1.9 is now available from the main site (Madison, WI, USA). <p> Along with a whole series of bug fixes and new features, 6.1.9 is the first version of Condor to fully support all main Intel Linux distributions, including the 2.2.X kernel, and all 3 versions of the C library now in use (libc5, glibc 2.0 and glibc 2.1). For more info on Condor support for Linux, please see The Condor Linux README. <p> For complete details, you can read about what’s new in this version.
Condor 6.1.8 is now available from the main site (Madison, WI, USA), or from the mirror site (Bologna, Italy)</a>. <p> Of the major improvements in this release, the condor_schedd
has been fixed to handle clusters of hundreds/thousands of jobs more efficiently. For standard jobs you can now also specify file buffering, as well as file remapping. <p> For complete details, you can read about what’s new in this version.
Condor 6.1.7 is now available for download for Alpha Linux and Intel Linux with glibc. There are no other new features, and no bug fixes from 6.1.6, so we do not even provide binaries for 6.1.7 on any other platforms. On Alpha Linux, we only support vanilla jobs at this time. There is no support for checkpointing and remote system calls yet (though we’ll be working on that and making it available ASAP). For Intel, all of the linking problems with machines using glibc 2.0.X and the various versions of EGCS have been resolved in 6.1.7. Therefore, Red Hat 5.X and Debian 2.0.X should work. Red Hat 6.0 and the latest Debian release are NOT SUPPORTED by Condor yet. They use the new 2.2.X Linux kernel, and glibc version 2.1.X, which are not supported at this time. Sometime soon, we’ll support all combinations of kernels, compilers, and versions of libc that are available with Linux. For complete details, you can read about what’s new in this version.
Condor 6.1.6 is now available for download. Version 6.1.6 fixes many serious bugs from 6.1.5. In addition, it provides many new features, including the ability to dynamically reconfigure the number of virtual machines reported by the SMP startd, SMP support for Digital Unix machines and much more. There are still some unresolved problems with Linux running Red Hat 5.2 (LINUX-GLIBC). This platform is not supported in 6.1.6. A 6.1.7 release will follow very soon, which will support Red Hat 5.2. Red Hat 6.0 is NOT SUPPORTED by Condor yet. It uses the new 2.2.X Linux kernel, which is not supported at this time. Like all development releases, this release is INCOMPATIBLE with previous versions of Condor. DO NOT TRY TO USE IT IN A POOL WITH ANY 6.1.5 DAEMONS. For complete details, you can read about what’s new in this version.
Condor 6.1.5 is now available for download. Version 6.1.5 fixes many bugs. Major things that are fixed in this release are: Fortran under Linux, Redhat 5.2 support, condor_preen fixes, and others… NOTE: condor_userprio, condor_stats, the -pool option to many Condor tools, and Condor PVM are all broken by a change introduced in 6.1.5. These will all be fixed in 6.1.6. For complete details, you can read about what’s new in this version.
Long Term Support Channel
Long Term Support (LTS) releases only bug fixes to a particular, fixed set of features from the current LTS channel. As a result, each LTS channel tends to become more stable over time; read the release notes from the current channel to make sure you aren't missing any features you need.
If you can't regularly upgrade your machines, this may be the channel for you.
Periodically, we will update the set of features that we support with bug fixes and start a new LTS channel. This will not the change the set of features available to an existing or automatically-updated installation of a LTS channel; you have to make the decision to change manually. However, after a time, we will stop issuing additional bug fixes for older LTS channels.
- Add
STARTER_ALWAYS_HOLD_ON_OOM
to minimize confusion about memory usage - Fix bug that caused
condor_ssh_to_job
sftp
andscp
modes to fail - Fix
KeyboardIdle
attribute in dynamic slots that could prevent job start - No longer signals the OAuth credmon when there is no work to do
- Fix rare
condor_schedd
crash when a$$()
macro could not be expanded - By default, put Docker jobs on hold when CPU architecture doesn’t match
Improvements from the HTCondor 23.x feature series
- Improved tracking and enforcement of disk usage by using LVM
- Enhancements to the htcondor CLI tool
- cgroup v2 support for tracking and enforcement of CPU and memory usage
- Leverage cgroups to hide GPUs not allocated to the job
- DAGMan can now produce job credentials when using direct submit
- New submit commands to aid in matching specific GPU requirements
- New implementation of the Python bindings, htcondor2 and classad2
- Improved default security configuration
- Significant reduction in memory and CPU usage on the Central Manager
Additional highlights:
- Support for GPUs using AMD’s HIP 6 library
- Fix bugs when -divide or -repeat was used in GPU detection
- Proper error message and hold when Docker emits multi-line error message
- Fix issue where an unresponsive libvirtd blocked an EP from starting up
- The htcondor CLI now works on Windows
- Proper error message and hold when Docker emits multi-line error message
- The htcondor CLI now works on Windows
- Bug fix for PID namespaces and condor_ssh_to_job on EL9
- Augment condor_upgrade_check to find unit suffixes in ClassAd expressions
- Back-port all cgroup v2 fixes and enhancements from the 23.10.1 release
- Fix bug where Docker universe jobs reported zero memory usage on EL9
- Fix bug where Docker universe images would not be removed from EP cache
- Fix bug where
condor_watch_q
could crash - Fix bug that could cause the file transfer hold reason to be truncated
- Fix bug where a Windows job with a bad executable would not go on hold
- Docker and Container jobs run on EPs that match AP’s CPU architecture
- Fixed premature cleanup of credentials by the condor_credd
- Fixed bug where a malformed SciToken could cause a condor_schedd crash
- Fixed crash in condor_annex script
- Fixed daemon crash after IDTOKEN request is approved by the collector
- Remote
condor_history
queries now work the same as local queries - Improve error handling when submitting to a remote scheduler via ssh
- Fix bug on Windows where
condor_procd
may crash when suspending a job - Fix Python binding crash when submitting a DAG which has empty lines
- Preliminary support for Ubuntu 22.04 (Noble Numbat)
- Warns about deprecated multiple queue statements in a submit file
- Fix bug where plugins could not signify to retry a file transfer
- The ‘condor_upgrade_check’ script checks for proper token file permissions
- Fix bug where the ‘condor_upgrade_check’ script crashes on older platforms
- The bundled version of apptainer was moved to libexec in the tarball
- Fix bug where ssh-agent processes were leaked with grid universe jobs
- Fix DAGMan crash when a provisioner node was given a parent
- Fix bug that prevented use of
ftp:
URLs in file transfer - Fix bug where jobs that matched an offline slot never start
- Fix DAGMan where descendants of removed retry-able jobs are marked futile
- Ensure the
condor_test_token
works correctly when invoked as root - Fix bug where empty multi-line values could cause a crash
condor_qusers
returns proper exit code for errors in formatting options- Fix crash in job router when a job transform is missing an argument
- NVIDIA_VISIBLE_DEVICES environment variable lists full uuid of slot GPUs
- Fix problem where some container jobs would see GPUs not assigned to them
- Restore condor keyboard monitoring that was broken since HTCondor 23.0.0
- In condor_adstash, the search engine timeouts now apply to all operations
- Ensure the prerequisite perl modules are installed for condor_gather_info
- Preliminary support for openSUSE LEAP 15
- All non-zero exit values from file transfer plugins are now errors
- Fix crash in Python bindings when job submission fails
- Chirp uses a 5120 byte buffer and errors out for bigger messages
- condor_adstash now recognizes GPU usage values as floating point numbers
- Fixed a bug when Hashicorp Vault is configured to issue data transfer tokens (which is not the default), job submission could hang and then fail.
- Improved sandbox and ssh-agent clean up for
batch
grid universe jobs - Fix bug where daemons with a private network address couldn’t communicate
- Fix cgroup v2 memory enforcement for custom configurations
- Add
DISABLE_SWAP_FOR_JOB
support on cgroup v2 systems - Fix log rotation for OAuth and Vault credmon daemons
- Add HTCondor Python wheel in PyPI for Python 3.12
- Update to apptainer version 1.2.4 in the HTCondor tarballs
- Fix 10.6.0 bug that broke PID namespaces
- Fix Debian and Ubuntu install bug when ‘condor’ user was in LDAP
- Fix bug where execution times for ARC CE jobs were 60 times too large
- Fix bug where a failed ‘Service’ node would crash DAGMan
- Condor-C and Job Router jobs now get resources provisioned updates
- Update Windows binaries to address curl CVE-2023-38545
- Absent slot configuration, execution points will use a partitionable slot
- Linux cgroups enforce maximum memory utilization by default
- Can now define DAGMan save points to be able to rerun DAGs from there
- Much better control over environment variables when using DAGMan
- Administrators can enable and disable job submission for a specific user
- Can set a minimum number of CPUs allocated to a user
- condor_status -gpus shows nodes with GPUs and the GPU properties
- condor_status -compact shows a row for each slot type
- Container images may now be transferred via a file transfer plugin
- Support for Enterprise Linux 9, Amazon Linux 2023, and Debian 12
- Can write job information in AP history file for every execution attempt
- Can run defrag daemons with different policies on distinct sets of nodes
- Add condor_test_token tool to generate a short lived SciToken for testing
- The job’s executable is no longer renamed to ‘condor_exec.exe’
- The condor_upgrade_check script now provides guidance on updating to 23.0
- The htchirp Python binding now properly locates the chirp configuration
- Fix bug that prevented deletion of HTCondor passwords on Windows
- Avoid kernel panic on some Enterprise Linux 8 systems
- Fix bug where early termination of service nodes could crash DAGMan
- Limit email about long file transfer queue to once daily
- Various fixes to condor_adstash
- Fixed bug where held condor cron jobs would never run when released
- Improved daemon IDTOKENS logging to make useful messages more prominent
- Remove limit on certificate chain length in SSL authentication
- condor_config_val -summary now works with a remote configuration query
- Prints detailed message when condor_remote_cluster fails to fetch a URL
- Improvements to condor_preen
- In SSL Authentication, use the identity instead of the X.509 proxy subject
- Can use environment variable to locate the client’s SSL X.509 credential
- ClassAd aggregate functions now tolerate undefined values
- Fix Python binding bug where accounting ads were omitted from the result
- The Python bindings now properly report the HTCondor version
- remote_initial_dir works when submitting a grid batch job remotely via ssh
- Add a ClassAd stringlist subset match function
- Rename upgrade9to10checks.py script to condor_upgrade_check
- Fix spurious warning from condor_upgrade_check about regexes with spaces
- Provides script to assist updating from HTCondor version 9 to version 10
- Fixes a bug where rarely an output file would not be transferred back
- Fixes counting of submitted jobs, so MAX_JOBS_SUBMITTED works correctly
- Fixes SSL Authentication failure when PRIVATE_NETWORK_NAME was set
- Fixes rare crash when SSL or SCITOKENS authentication was attempted
- Can allow client to present an X.509 proxy during SSL authentication
- Fixes issue where a users jobs were ignored by the HTCondor-CE on restart
- Fixes issues where some events that HTCondor-CE depends on were missing
- GPU metrics continues to be reported after the startd is reconfigured
- Fixed issue where GPU metrics could be wildly over-reported
- Fixed issue that kept jobs from running when installed on Debian or Ubuntu
- Fixed DAGMan problem when retrying a proc failure in a multi-proc node
- HTCondor can optionally create intermediate directories for output files
- Improved condor_schedd scalability when a user runs more than 1,000 jobs
- Fix issue where condor_ssh_to_job fails if the user is not in /etc/passwd
- The Python Schedd.query() now returns the ServerTime attribute for Fifemon
- VM Universe jobs pass through the host CPU model to support newer kernels
- HTCondor Python wheel is now available for Python 3.11
- Fix issue that prevented HTCondor installation on Ubuntu 18.04
- Add Ubuntu 22.04 (Jammy Jellyfish) support
- Add file transfer plugin that supports stash:// and osdf:// URLs
- Fix bug where cgroup memory limits were not enforced on Debian and Ubuntu
- Fix bug where forcibly removing DAG jobs could crash the condor_schedd
- Fix bug where Docker repository images cannot be run under Singularity
- Fix issue where blahp scripts were missing on Debian and Ubuntu platforms
- Fix bug where curl file transfer plugins would fail on Enterprise Linux 8
- Users can prevent runaway jobs by specifying an allowed duration
- Able to extend submit commands and create job submit templates
- Initial implementation of htcondor
command line interface - Initial implementation of Job Sets in the htcondor CLI tool
- Add Container Universe
- Support for heterogeneous GPUs
- Improved File transfer error reporting
- GSI Authentication method has been removed
- HTCondor now utilizes ARC-CE’s REST interface
- Support for ARM and PowerPC for Enterprise Linux 8
- For IDTOKENS, signing key not required on every execution point
- Trust on first use ability for SSL connections
- Improvements against replay attacks
- Remove limit on certificate chain length in SSL authentication
- Can configure clients to present an X.509 proxy during SSL authentication
- Provides script to assist updating from HTCondor version 9 to version 10
- Fix file descriptor leak when schedd fails to launch scheduler jobs
- Fix failure to forward batch grid universe job’s refreshed X.509 proxy
- Fix DAGMan failure when the DONE keyword appeared in the JOB line
- Fix HTCondor’s handling of extremely large UIDs on Linux
- Fix bug where OAUTH tokens lose their scope and audience upon refresh
- Support for Apptainer in addition to Singularity
- Singularity now mounts /tmp and /var/tmp under the scratch directory
- Fix bug where Singularity jobs go on hold at the first checkpoint
- Fix bug where gridmanger deletes the X.509 proxy file instead of the copy
- Fix file descriptor leak when using SciTokens for authentication
- Report resources provisioned by the Slurm batch scheduler when available
- SciToken mapping failures are now recorded in the daemon logs
- Fix bug that stopped file transfers when output and error are the same
- Ensure that the Python bindings version matches the installed HTCondor
- $(OPSYSANDVER) now expand properly in job transforms
- Fix bug where context managed Python htcondor.SecMan sessions would crash
- Fix bug where remote CPU times would rarely be set to zero
- Schedd and startd cron jobs can now log output upon non-zero exit
- condor_config_val now produces correct syntax for multi-line values
- The condor_run tool now reports submit errors and warnings to the terminal
- Fix issue where Kerberos authentication would fail within DAGMan
- Fix HTCondor startup failure with certain complex network configurations
- Fix bug in parallel universe that could cause the schedd to crash
- Fix rare crash where a daemon tries to use a discarded security session
- The Job Router can now create an IDTOKEN for use by the job
- Fix bug where a self-checkpointing job may erroneously be held
- Fix bug where the Job Router could erroneously substitute a default value
- Fix bug where a file transfer error may identify the wrong file
- Fix bug where condor_ssh_to_job may fail to connect
This release contains important fixes for security issues. Affected users should update as soon as possible.
More details on the security issues are in the Vulnerability Reports:
- Added Debian 11 (bullseye) as a supported platform
- Since CentOS 8 has reached end of life, we build and test on Rocky Linux 8
- The OAUTH credmon is now packaged for Enterprise Linux 8
Highlights of this release are:
- Fix bug where huge values of ImageSize and others would end up negative
- Fix bug in how MAX_JOBS_PER_OWNER applied to late materialization jobs
- Fix bug where the schedd could choose a slot with insufficient disk space
- Fix crash in ClassAd substr() function when the offset is out of range
- Fix bug in Kerberos code that can crash on macOS and could leak memory
- Fix bug where a job is ignored for 20 minutes if the startd claim fails
Highlights of this release are:
- Fix bug where condor_gpu_discovery could crash with older CUDA libraries
- Fix bug where condor_watch_q would fail on machines with older kernels
- condor_watch_q no longer has a limit on the number of job event log files
- Fix bug where a startd could crash claiming a slot with p-slot preemption
- Fix bug where a job start would not be recorded when a shadow reconnects
Highlights of this release are:
- CUDA_VISIBLE_DEVICES can now contain GPU-
formatted values - Fixed a bug that caused jobs to fail when using newer Singularity versions
- Fixed a bug in the Windows MSI installer for the latest Windows 10 version
- Fixed bugs relating to the transfer of standard out and error logs
- MacOS 11.x now reports as 10.16.x (which is better than reporting x.0)
Highlights of this release are:
- Other authentication methods are tried if mapping fails using SciTokens
- Fix rare crashes from successful condor_submit, which caused DAGMan issues
- Fix bug where ExitCode attribute would be suppressed when OnExitHold fired
- condor_who now suppresses spurious warnings coming from netstat
- The online manual now has detailed instructions for installing on MacOS
- Fix bug where misconfigured MIG devices confused condor_gpu_discovery
- The transfer _checkpoint_file list may now include input files
This release contains important fixes for security issues. Affected users should update as soon as possible. More details on the security issues are in the Vulnerability Reports:
Highlights of this release are:
- HTCondor can be set up to use only FIPS 140-2 approved security functions
- If the Singularity test fails, the job goes idle rather than getting held
- Can divide GPU memory, when making multiple GPU entries for a single GPU
- Startd and Schedd cron job maximum line length increased to 64k bytes
- Added first class submit keywords for SciTokens
- Fixed MUNGE authentication
- Fixed Windows installer to work when the install location isn’t C:\Condor
Highlights of this release are:
- Fix problem where X.509 proxy refresh kills job when using AES encryption
- Fix problem when jobs require a different machine after a failure
- Fix problem where a job matched a machine it can’t use, delaying job start
- Fix exit code and retry checking when a job exits because of a signal
- Fix a memory leak in the job router when a job is removed via job policy
- Fixed the back-end support for the ‘bosco_cluster –add’ command
- An updated Windows installer that supports IDTOKEN authentication
After two years of development, this is the first release of the new stable series. It includes all the enhancements and bug fixes in the 8.9 series. Many of these changes have focused on improving the security of HTCondor and improving the utility of the file transfer plugins.
Highlights of this release are:
- Absent any configuration, a new HTCondor installation denies authorization to all user
- AES encryption is used for all communication and file transfers by default (Hardware accelerated when available)
- New IDTOKEN authentication method enables fine-grained authorization control designed to replace GSI authentication
- Improved support for GPUs, including machines with multiple GPUs
- New condor_watch_q tool that efficiently provides live job status updates
- Many improvements to the Python bindings, including new bindings for DAGMan and chirp
- Improved curl, https, box, Amazon S3, and google drive file transfer plugins supporting uploads and authentication
- File transfer times are now recorded in the job log
- Added support for jobs that need to acquire and use OAUTH tokens
- Many memory footprint and performance improvements in DAGMan
- Submitter ceilings allow administrators to set limits on the number of running jobs per user across the pool.
Try out our new helpful installation scripts
- Fixed a memory leak in the Job Router
This release contains an important fix for a security issue. Affected users should update as soon as possible.
More details on the security issue are in the Vulnerability Report:
- Fix for security issue
- https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2021-0003/
- condor_ssh_to_job now maps CR and NL to work with editors like nano
- Improved the performance of data transfer in condor_ssh_to_job
- HA replication now accepts SHA-2 checksums to prepare for MD5 removal
- Submission to NorduGrid ARC CE works with newer ARC CE versions
- Fixed condor_annex crashes on platforms with newer compilers
- Fixed “use feature: GPUsMonitor” to locate the monitor binary on Windows
- Fixed a bug that prevented using the ‘@’ character in an event log path
- Added a family of version comparison functions to ClassAds
- Increased default Globus proxy key length to meet current NIST guidance
- HTCondor now properly tracks usage over vanilla universe checkpoints
- New ClassAd equality and inequality operators in the Python bindings
- Fixed a bug where removing in-use routes could crash the job router
- Fixed a bug where condor_chirp would abort after success on Windows
- Fixed a bug where using MACHINE_RESOURCE_NAMES could crash the startd
- Improved condor c-gahp to prioritize commands over file transfers
- Fixed a rare crash in the schedd when running many local universe jobs
- With GSI, avoid unnecessary reverse DNS lookup when HOST_ALIAS is set
- Fix a bug that could cause grid universe jobs to fail upon proxy refresh
- condor_qedit can no longer be used to disrupt the condor_schedd
- Fixed a bug where the SHARED_PORT_PORT configuration setting was ignored
- Ubuntu 20.04 and Amazon Linux 2 are now supported
- In MacOSX, HTCondor now requires LibreSSL, available since MacOSX 10.13
- Proper tracking of maximum memory used by Docker universe jobs
- Fixed preempting a GPU slot for a GPU job when all GPUs are in use
- Fixed a Python crash when queue_item_data iterator raises an exception
- Fixed a bug where slot attribute overrides were ignored
- Calculates accounting group quota correctly when more than 1 CPU requested
- Updated HTCondor Annex to accommodate API change for AWS Spot Fleet
- Fixed a problem where HTCondor would not start on AWS Fargate
- Fixed where the collector could wait forever for a partial message
- Fixed streaming output to large files (>2Gb) when using the 32-bit shadow
- Fixes addressing CVE-2019-18823
- https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2020-0001/
- https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2020-0002/
- https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2020-0003/
- https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2020-0004/
- Updated condor_annex to work with upcoming AWS Lambda function changes
- Added the ability to specify the order that job routes are applied
- Fixed a bug that could cause remote condor submits to fail
- Fixed condor_wait to work when the job event log is on AFS
- Fixed RPM packaging to be able to install condor-all on CentOS 8
- Period (‘.’) is allowed again in DAGMan node names
- Initial support for CentOS 8
- Fixed a memory leak in SSL authentication
- Fixed a bug where “condor_submit -spool” would only submit the first job
- Reduced encrypted file transfer CPU usage by a factor of six
- “condor_config_val -summary” displays changes from a default configuration
- Improved the ClassAd documentation, added many functions that were omitted
- Fixed two performance problems on Windows
- Fixed Java universe on Debian and Ubuntu systems
- Added two knobs to improve performance on large scale pools
- Fixed a bug where requesting zero GPUs would require a machine with GPUs
- HTCondor can now recognize nVidia Volta and Turing GPUs
- Python 3 bindings - see version history for details (requires EPEL on EL7)
- Can configure DAGMan to dramatically reduce memory usage on some DAGs
- Improved scalability when using the python bindings to qedit jobs
- Fixed infrequent schedd crashes when removing scheduler universe jobs
- The condor_master creates run and lock directories when systemd doesn’t
- The condor daemon obituary email now contains the last 200 lines of log
- Fixed a bug where jobs were killed instead of peacefully shutting down
- Fixed a bug where a restarted schedd wouldn’t connect to its running jobs
- Improved file transfer performance when sending multiple files
- Fix a bug that prevented interactive submit from working with Singularity
- Orphaned Docker containers are now cleaned up on execute nodes
- Restored a deprecated Python interface that is used to read the event log
- Fixed problems with condor_ssh_to_job and Singularity jobs
- Fixed a problem that could cause condor_annex to crash
- Fixed a problem where the job queue would very rarely be corrupted
- condor_userprio can report concurrency limits again
- Fixed the GPU discovery and monitoring code to map GPUs in the same way
- Made the CHIRP_DELAYED_UPDATE_PREFIX configuration knob work again
- Fixed restarting HTCondor from the Service Control Manager on Windows
- Fixed a problem where local universe jobs could not use condor_submit
- Restored a deprecated Python interface that is used to read the event log
- Fixed a problem where condor_shadow reuse could confuse DAGMan
- Fixed excessive CPU consumption with GPU monitoring
- GPU monitoring is off by default; enable with “use feature: GPUsMonitor”
- HTCondor now works with the new CUDA version 10 libraries
- Fixed a bug where sometimes jobs would not start on a Windows execute node
- Fixed a bug that could cause DAGman to go into an infinite loop on exit
- The JobRouter doesn’t forward the USER attribute between two UID Domains
- Made Collector.locateAll() more efficient in the Python bindings
- Improved efficiency of the negotiation code in the condor_schedd
- Automatically add AWS resources to your pool using HTCondor Annex
- The Python bindings now include submit functionality
- Added the ability to run a job immediately by replacing a running job
- A new minicondor package makes single node installations easy
- HTCondor now tracks and reports GPU utilization
- Several performance enhancements in the collector
- The grid universe can create and manage VM instances in Microsoft Azure
- The MUNGE security method is now supported on all Linux platforms
- Made the Python ‘in’ operator case-insensitive for ClassAd attributes
- Python bindings are now built for the Debian and Ubuntu platforms
- Fixed a memory leak in the Python bindings
- Fixed a bug where absolute paths failed for output/error files on Windows
- Fixed a bug using Condor-C to run Condor-C jobs
- Fixed a bug where Singularity could not be used if Docker was not present
- Support for Debian 9, Ubuntu 16, and Ubuntu 18
- Fixed a memory leak that occurred when SSL authentication fails
- Fixed a bug where invalid transform REQUIREMENTS caused a Job to match
- Fixed a bug to allow a queue super user to edit protected attributes
- Fixed a problem setting the job environment in the Singularity container
- Fixed several other minor problems
- Can now do an interactive submit of a Singularity job
- Shared port daemon is more resilient when starved for TCP ports
- The Windows installer configures the environment for the Python bindings
- Fixed several other minor problems
- Fixed a problem where condor_preen would crash on an active submit node
- Improved systemd configuration to clean up processes if the master crashes
- Fixed several other minor problems
- Fixed a bug where some Accounting Groups could get too much surplus quota
- Fixed a Python binding bug where some queries could corrupt memory
- Fixed a problem where preen could block the schedd for a long time
- Fixed a bug in Windows where the job sandbox would not be cleaned up
- Fixed problems with the interaction between the master and systemd
- Fixed a bug where MAX_JOBS_SUBMITTED could be permanently reduced
- Fixed problems with very large disk requests
- Fixed an issue validating VOMS proxies
- Fixed a bug where memory limits might not be updated in cgroups
- Add SELinux type enforcement rules to allow condor_ssh_to_job to work
- Updated systemd configuration to shutdown HTCondor in an orderly fashion
- The curl_plugin utility can now do HTTPS transfers
- Specifying environment variables now works with the Python Submit class
- HTCondor daemons no longer crash on reconfig if syslog is used for logging
- HTCondor daemons now reliably leave a core file when killed by a signal
- Negotiator won’t match jobs to machines with incompatible IPv{4,6} network
- On Ubuntu, send systemd alive messages to prevent HTCondor restarts
- Fixed a problem parsing old ClassAd string escapes in the python bindings
- Properly parse CPU time used from Slurm grid universe jobs
- Claims are released when parallel univ jobs are removed while claiming
- Starter won’t get stuck when a job is removed with JOB_EXIT_HOOK defined
- To reduce audit logging, added cgroup rules to SELinux profile
- Fixed a memory leak that would cause the HTCondor collector to slowly grow
- Prevent the condor_starter from hanging when using cgroups on Debian
- Fixed several issues that occur when IPv6 is in use
- Support for using an ImDisk RAM drive on Windows as the execute directory
- Fixed a bug where condor_rm rarely removed another one of the user’s jobs
- Fixed a bug with parallel universe jobs starting on partitionable slots
- Python bindings are now available on MacOSX
- Fixed a bug where PASSWORD authentication could fail to exchange keys
- Pslot preemption now properly handles custom resources, such as GPUs
- condor_submit now checks X.509 proxy expiration
- Fixed a bug where using an X.509 proxy might corrupt the job queue log
- Fixed a memory leak in the Python bindings
- New metaknobs for mapping users to groups
- Now case-insensitive with Windows user names when storing credentials
- Signal handling in the OpenMPI script
- Report RemoteSysCpu for Docker jobs
- Allow SUBMIT_REQUIREMENT to refer to X509 secure attributes
- Linux kernel tuning script takes into account the machine’s role
- condor_q works in situations where user authentication is not configured
- Updates to work with Docker version 1.13
- Fix several problems with the Job Router
- Update scripts to support current versions of Open MPI and MPICH2
- Fixed a bug that could corrupt the job queue log when the disk is full
- condor_q shows shows only the current user’s jobs by default
- condor_q summarizes related jobs (batches) on a single line by default
- Users can define their own job batch name at job submission time
- Immutable/protected job attributes make SUBMIT_REQUIREMENTS more useful
- The shared port daemon is enabled by default
- Jobs run in cgroups by default
- HTCondor can now use IPv6 addresses (Prefers IPv4 when both present)
- DAGMan: Able to easily define SCRIPT, VARs, etc., for all nodes in a DAG
- DAGMan: Revamped priority implementation
- DAGMan: New splice connection feature
- New slurm grid type in the grid universe for submitting to Slurm
- Numerous improvements to Docker support
- Several enhancements in the python bindings
- Fixed a bug which delayed startd access to stard cron job results
- Fixed a bug in pslot preemption that could delay jobs starting
- Fixed a bug in job cleanup at job lease expiration if using glexec
- Fixed a bug in locating ganglia shared libraries on Debian and Ubuntu
- Updated SELinux profile for Enterprise Linux
- Fixed a performance problem in the schedd when RequestCpus was an expression
- Preserve permissions when transferring sub-directories of the job’s sandbox
- Fixed HOLD_IF_CPUS_EXCEEDED and LIMIT_JOB_RUNTIMES metaknobs
- Fixed a bug in handling REMOVE_SIGNIFICANT_ATTRIBUTES
- The condor_startd removes orphaned Docker containers on restart
- Job Router and HTCondor-C job job submission prompts schedd reschedule
- Fixed bugs in the Job Router’s hooks
- Improved systemd integration on Enterprise Linux 7
- Upped default number of Chirp attributes to 100, and made it configurable
- Fixed a bug where variables starting with STARTD. or STARTER. were ignored
- Fixed a memory leak triggered by the python htcondor.Schedd().query() call
- Fixed a bug that could cause Bosco file transfers to fail
- Fixed a bug that could cause the schedd to crash when using schedd cron jobs
- condor_schedd now rejects jobs when owner has no account on the machine
- Fixed a new bug in 8.4.7 where remote condor_history failed without -limit
- Fixed bugs triggered by the reconfiguration of the high-availability daemon
- Fixed a bug where condor_master could hang when using shared port on Windows
- Fixed a bug with the -xml option on condor_q and condor_status
- fixed a bug that could cause the schedd to become unresponsive
- fixed a bug where the Docker Universe would not set the group ID
- Docker Universe jobs now drop all Linux capabilities by default
- fixed a bug where subsystem specific configuration parameters were ignored
- fixed bugs with history file processing on the Windows platform
- fixed a bug that could cause a job to fail to start in a dynamic slot
- fixed a negotiator memory leak when using partitionable slot preemption
- fixed a bug that caused supplemental groups to be wrong during file transfer
- properly identify the Windows 10 platform
- fixed a typographic error in the LIMIT_JOB_RUNTIMES policy
- fixed a bug where maximum length IPv6 addresses were not parsed
- fixed a bug that would cause the condor_schedd to send no flocked jobs
- fixed a bug that caused a 60 second delay using tools when DNS lookup failed
- prevent using accounting groups with embedded spaces that crash the negotiator
- fixed a bug that could cause use of ports outside the port range on Windows
- fixed a bug that could prevent dynamic slot reuse when using many slots
- fixed a bug that prevented correct utilization reports from the job router
- tune kernel when using cgroups to avoid OOM killing of jobs doing heavy I/O
- fixed a bug that could cause the collector to crash when DNS lookup fails
- fixed a bug that caused Condor-C jobs with short lease durations to fail
- fixed bugs that affected EC2 grid universe jobs
- fixed a bug that prevented startup if a prior version shared port file exists
- fixed a bug that could cause the condor_shadow to hang on Windows
- fixed the processing of the -append option in the condor_submit command
- fixed a bug to run more that 100 dynamic slots on a single execute node
- fixed bugs that would delay daemon startup when using shared port on Windows
- fixed a bug where the cgroup VM limit would not be set for sizes over 2 GiB
- fixed a bug to use the ec2_iam_profile_name for Amazon EC2 Spot instances
- a bug fix to prevent the condor_schedd from crashing
- a bug fix to honor TCP_FORWARDING_HOST
- Standard Universe works properly in RPM installations of HTCondor
- the RPM packages no longer claim to provide Globus libraries
- bug fixes to DAGMan’s “maximum idle jobs” throttle
- four new policy metaknobs to make configuration easier
- a bug fix to prevent condor daemons from crashing on reconfiguration
- an option natural sorting option on condor_status
- support of admin to mount certain directories into Docker containers
- a Docker Universe to run a Docker container as an HTCondor job
- the submit file can queue a job for each file found
- the submit file can contain macros
- a dry-run option to condor_submit to test the submit file without any actions
- HTCondor pools can use IPv4 and IPv6 simultaneously
- execute directories can be encrypted upon user or administrator request
- Vanilla Universe jobs can utilize periodic application-level checkpoints
- the administrator can establish job requirements
- numerous scalability changes
- an updated RPM to work with SELinux on EL7 platforms
- fixes to the condor_kbdd authentication to the X server
- a fix to allow the condor_kbdd to work with shared port enabled
- avoid crashes when using more than 1024 file descriptors on EL7
- fixed a memory leak in the ClassAd split() function
- condor_vacate will error out rather than ignore conflicting arguments
- a bug fix to the JobRouter to properly process the queue on restart
- a bug fix to prevent sending spurious data on a SOAP file transfer
- a bug fix to always present jobs in order in condor_history
- a mechanism for the preemption of dynamic slots, such that the partitionable slot may use the dynamic slot in the match of a different job
- default configuration bug fixes for the desktop policy, such that it can both start jobs and monitor the keyboard
- a bug fix to reconnect a TCP session when an HTCondorView collector restarts
- a bug fix to avoid starting too many jobs, only to kill some chosen at random
- sendmail is used by default for sending notifications (CVE-2014-8126)
- corrected input validation, which prevents daemon crashes
- an update, such that grid jobs work within the current Google Compute Engine
- a bug fix to prevent an infinite loop in the python bindings
- a bug fix to prevent infinite recursion when evaluating ClassAd attributes
- a bug fix to the log rotation of the condor_schedd on Linux platforms
- transfer_input_files now works for directories on Windows platforms
- a correction of the flags passed to the mail program on Linux platforms
- a RHEL 7 platform fix of a directory permission that prevented daemons from starting
- an updated RPM installation script that preserves a modified condor_config.local file
- OpenSSL version 1.0.1j for Windows platforms
The HTCondor Team is pleased to announce the release of HTCondor version 8.2.4. This new version contains: a bug fix for an 8.2.3 condor_schedd that could not obtain a claim from an 8.0.x condor_startd; a bug fix for removed jobs that return to the queue; a workaround for a condor_schedd performance issue when handling a large number of jobs; a bug fix to prevent the condor_kbdd from crashing on Windows; a bug fix to correct the reporting of available disk on Windows. a complete list of bugs fixed and features can be found in the Version History. HTCondor 8.2.4 binaries and source code are available from our Downloads page.
The HTCondor Team is pleased to announce the release of HTCondor version 8.2.3. This new version contains support for Ubuntu 14.04 LTS, including support for the standard universe. It also contains many bug fixes for minor problems. A complete list of bugs fixed and features can be found in the Version History. HTCondor 8.2.3 binaries and source code are available from our Downloads page.
The HTCondor team is pleased to announce the release of HTCondor version 8.2.2. This new version contains: support for RHEL 7, and the RPM is modernized; a bug fix for the condor_shared_port daemon eliminates a periodic two-week restart; a bug fix in the detection of hyper-threaded cores on Linux and Mac OSX; a bug fix for condor_q when using the -format option; the condor_collector daemon on a Linux 3.14 or more recent kernel responds faster after a bug fix. A complete list of bugs fixed can be found in the Version History. HTCondor 8.2.2 binaries and source code are available from our Downloads page.
This release contains an important fix for a security issue introduced in version 8.1.4. Affected users should update as soon as possible. More details on the security issue can be found on the Vulnerability Page
The HTCondor team is pleased to announce the release of HTCondor 8.2.0. This new version contains: configuration is more powerful with new syntax and features, and the default configuration policy does not preempt jobs, monitoring is enhanced and now integrates with Ganglia, automated detection and management of GPUs, numerous scalability enhancements improve performance, an improved Python API including support for Python 3, new native packaging and ports are available for the latest Linux distributions including Red Hat 7 Beta and Debian 7, cloud computing improvements including support for EC2 spot instances, OpenStack, and condor_ssh_to_job directly into EC2 jobs, grid universe jobs can now target Google Compute Engine and BOINC servers, partitionable slots now are compatible with condor_startd RANK expressions, and consumption policies permit partitionable slots to be split into dynamic slots at negotiation time, improved data management including dynamic adjustment of the level of file transfer concurrency based on disk load, and experimental support to allow the execution of a job to be overlaid with the transfer of output files from the previous different job, and the new condor_sos tool helps administrators manage overloaded daemons. A complete list of bugs fixed can be found in the Version History. HTCondor 8.2.0 binaries and source code are available from our Downloads page.
The HTCondor team is pleased to announce the release of HTCondor 8.0.7. This new version contains: Bosco support for OS X Mavericks (10.9); experimental support for compiling standard universe programs with the Intel C Compiler; a fix for a memory leak when using cgroups; several bug fixes for crashes under rare circumstances. A complete list of bugs fixed can be found in the Version History. HTCondor 8.0.7 binaries and source code are available from our Downloads page.
The HTCondor team is pleased to announce the release of HTCondor 8.0.6. This new version contains a port of HTCondor for Red Hat Enterprise Linux 7.0 Beta on the x86_64 architecture that includes support for the standard universe. It also contains bug fixes for: transferring files larger then 4 GiB on Windows and 32-bit platforms; using a minimum of 1024-bit keys on proxy certificates generated by HTCondor; accepting DAG input files larger then 2 GiB; the Windows MSI installer setting up a proper configuration for the VM universe; honoring CPU affinity on Windows platforms; issues with a failing condor_schedd daemon, when HTCondor is compiled with gcc 4.8+, the default compiler on recent Fedora releases. A complete list of bugs fixed can be found in the Version History. HTCondor 8.0.6 binaries and source code are available from our Downloads page.
The HTCondor team is pleased to announce the release of HTCondor 8.0.5. This new version contains bug fixes for: a heavily loaded condor_schedd daemon crashing when starting a local universe job, a condor_schedd daemon failing to start due to illegal values in the job queue or accounting recovery logs, interactive jobs not running when using cgroups, permissions errors preventing java universe jobs from running, and VMware vm universe jobs removing useful devices. A complete list of bugs fixed can be found in the Version History. HTCondor 8.0.5 binaries and source code are available from our Downloads page.
The HTCondor team is pleased to announce the release of HTCondor 8.0.4. This new version contains a clipped version of HTCondor for Ubuntu 12.04 on the x86_64 architecture, and a fix for condor_ssh_to_job incorrectly removing jobs when cgroups are used. A complete list of bugs fixed can be found in the Version History. HTCondor 8.0.4 binaries and source code are available from our Downloads page.
The HTCondor team is pleased to announce the release of HTCondor 8.0.3. This new version contains a fix for DAGMan recovery mode when using Pegasus-generated sub-DAGs, and a fix for condor_ssh_to_job when using PID namespaces. A complete list of bugs fixed can be found in the Version History. HTCondor 8.0.3 binaries and source code are available from our Downloads page.
The HTCondor team is pleased to announce the release of HTCondor 8.0.2. This new version contains a workaround to avoid a Linux kernel panic when using cgroups, fixes for the python bindings, and a fix for vm universe jobs under Xen or KVM. A complete list of bugs fixed and features can be found in the Version History. HTCondor 8.0.2 binaries and source code are available from our Downloads page.
The HTCondor team is pleased to announce the release of HTCondor 8.0.1. This new version contains support for Debian 7 (wheezy) with standard universe, fixes in hierarchical group quotas, fixes for DAGMan restarting workflows on upgrade, a fix for CCB only using the first broker even when given a list. A complete list of bugs fixed and features can be found in the Version History. HTCondor 8.0.1 binaries and source code are available from our Downloads page.
The HTCondor team is pleased to announce the release of HTCondor 8.0.0. This release is the first in the new stable series. The major version number changed because of the project rename to HTCondor and not because of major incompatibility with the version 7.8 stable series. This new version contains Bosco, support for EC2 Spot instances, interactive jobs, improved job sandboxing, native python API and several new tools. A complete list of bugs fixed and features can be found in the Version History. HTCondor 8.0.0 binaries and source code are available from our Downloads page.
The HTCondor team is pleased to announce the release of HTCondor 7.8.8. This release contains bug fixes for reconnection failure when using CCB, introduces automatic retries for some glexec errors, and fixes several other grid related bugs. A complete list of bugs fixed can be found in the Version History. HTCondor 7.8.8 binaries and source code are available from our Downloads page.
The HTCondor team is pleased to announce the release of HTCondor 7.8.7. This release contains several bug fixes related to grid jobs, including EC2 resource jobs. It has bug fixes for glexec, privilege separation, condor_chirp, and a bug that prevented HTCondor from being stopped on system shutdown on Red Hat Linux systems. A complete list of bugs fixed can be found in the Version History. HTCondor 7.8.7 and source code are available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 7.8.6. which contains an important security fix that was incorrectly documented as being in the 7.8.5 release. This release is otherwise identical to the 7.8.5 release. Affected users should upgrade as soon as possible. More details on the security issue can be found on the Vulnerabilities Page.
The Condor Team is pleased to announce the release of Condor 7.8.5, which includes fixes for several bugs. Details on obugs fixed can be found here, and Condor binaries and source code are available from our Downloads page.
The Condor Team is pleased to announce the releases of Condor 7.6.10 and 7.8.4. These releases contain several important security fixes. However, none of the security vulnerabilities are rated worse than “Moderate” though users are still encouraged to upgrade as soon as possible. Condor binaries and source code are available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 7.8.3. This release fixes several important bugs in 7.8.2 and earlier versions of Condor. See the Version History for a complete list of changes. Condor 7.8.3 binaries and source code are available from our Downloads page.
All users should upgrade as soon as possible. More details on the security problem can be found on the Vulnerabilities Page.
All users should upgrade as soon as possible. More details on the security problem can be found on the Vulnerabilities Page.
The Condor Team is pleased to announce the release of Condor 7.8.1. This release fixes several important bugs in 7.8.0 and earlier versions of Condor. See the Version History for a complete list of changes. Condor 7.8.1 binaries and source code are available from our Downloads page.
The Condor team is pleased to announce the release of Condor 7.8.0. This is the first entry in a new stable series, contains all the features and bug fixes in the 7.7 development series. See the version History for a complete list of changes.
The Condor Team is pleased to announce the releases of Condor 7.6.10 and 7.8.4. These releases contain several important security fixes. However, none of the security vulnerabilities are rated worse than “Moderate” though users are still encouraged to upgrade as soon as possible. See the version history for a complete list of changes. Condor binaries and source code are available from our Downloads page.
Regrettably, due to an error in building 7.6.8, it is not a valid release and has been pulled from the web. Please update to version 7.6.9 or 7.8.2 instead to address the security issue posted yesterday. More details on the security problem can be found on the vulnerabilities page
The Condor team is pleased to announce the newest release in our development series, 7.6.7. This release fixes several important bugs, and we believe this will be the last release in the 7.6 series. Please see the release notes for a complete list. Condor binaries and source code are available from our Downloads page.
The Condor team is pleased to announce the newest release in our stable series, 7.6.6. This release fixes several important bugs in 7.6.5 and earlier versions of Condor, including a problem which would cause the schedd to abort, a problem which prevented the checkpoint server from running on RHEL 6, and a memory leak in the schedd. Please see the release notes for a complete list. Condor binaries and source code are available from our Downloads page.
The Condor team is pleased to announce the newest release in our development series, 7.6.5. This release fixes several important bugs, including a problem with chirp. It includes changes to the negotiation to fix incompatibilities with group quotas which were introduced in the 7.4 series. Please see the release notes for a complete list. Condor binaries and source code are available from our Downloads page.
The Condor team is pleased to announce the release of Condor version 7.6.4. This is the fourth release in the stable series. This release fixes a rare, but serious bug which can cause the collector to crash. The Version History has a list of the major changes. Condor binaries and source code are available from our Downloads page.
The Condor team is pleased to announce the release of Condor 7.6.3. This is the third release in the stable series. This release fixes some critical bugs in the parallel universe dealing with job leases and the ability to restart parallel jobs when the schedd restarts.. The Version History has a list of the major changes. Condor binaries and source code are available from our Downloads page.
The Condor team is pleased to announce the release of Condor 7.6.2. This version fixes problems with ssh_to_job. It fixes a crash in the schedd that was common with parallel universe jobs. 7.6 still has a known problem running parallel universe jobs that will be fixed in 7.6.3, which is planned for the first half of August. See the Version History for a complete list of changes. Condor 7.6.2 binaries and source code are available from our Downloads page.
The Condor team is pleased to announce the release of Condor 7.6.1. See the Version History for a complete list of changes. Condor 7.6.1 binaries and source code are available from our Downloads page.
The Condor team is pleased to announce the release of Condor 7.6.0. This is the first entry in a new stable series, contains all the features and bug fixes in the 7.5 development series. See the version History for a complete list of changes.
The Condor Team is pleased to announce the release of Condor 7.4.4. This is a stable release of Condor. It includes a security fix for users submitting Amazon EC2 jobs (universe=grid and grid_resource=amazon) with the amazon_keypair_file. See the Version History for a complete list of changes. Condor 7.4.4 binaries and source code are available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 7.4.3. This is a stable release of Condor. This fixes several bugs in the 7.4.2 release. See the Version History for a complete list of changes. Condor 7.4.3 binaries and source code are available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 7.4.2. This is a stable release of Condor which includes numerous bug fixes to 7.4.1. See the Version History for a complete list of changes. Condor 7.4.2 binaries and source code are available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 7.4.1. This release patches a security vulnerability and includes many fixes for bugs found in 7.4.0. See the Version History for a complete list of changes. Condor 7.4.1 binaries and source code are available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 7.4.0. This first release in a new stable series includes all new features added in the 7.3 development series. See the Version History for a complete list of changes. Condor 7.4.0 binaries and source code are available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 7.2.5. This release patches a security vulnerability and includes a few fixes for bugs found in 7.2.4. See the Version History for a complete list of changes. Condor 7.2.5 binaries and source code are available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 7.2.4. This is a bugfix release to the stable series of Condor. See the Version History for a complete list of changes. Condor 7.2.4 binaries and source code are available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 7.2.3. This release adds standard universe support for Debian 5.0 on x86_64. It also fixes a memory leak in the collector that has affected many users. Other bug fixes include file descriptor leaks in the schedd, encryption working with parallel jobs, and remote attributes in Condor-C job ads. See the Version History for a complete list of changes. Condor 7.2.3 binaries and source code are available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 7.2.2. This release includes a new full port to Debian 5.0 x86 and a clipped port to Debian 5 x86_64. Also, it includes a large number of bug fixes in the Hibernation code as well as the SOAP interface, among other systems. This release has also been made to be forward compatible with the up and coming 7.3 release, when using CCB (which will be detailed in the next 7.3 release). See the Version History for a complete list of changes. Condor 7.2.2 binaries and source code are available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 7.2.1. This release addresses a handful of critical Windows-specific problems that were discovered after the release of Condor 7.2.0. This release also adds a native clipped port to Debian 5.0 (Lenny), support for the gfortran compiler in standard universe, support for standard output and error files larger than 2GB, and several other bug fixes. See the version history for a detailed list of changes. Condor 7.2.1 binaries and source code are available from our downloads page.
The Condor Team is pleased to announce the release of Condor 7.2.0. This first release in a new stable series contains all the new features from the 7.1.X development series in addition to numerous bug fixes. See our Release Notes for more details. As usual, binaries and source code are available from our Downloads page.
The Condor Team announces the release of Condor 7.0.5. This release contains many bug fixes and some improvements to error handling of Local Universe jobs. Note that some of the bug fixes are security-related; therefore, we recommend sites either upgrade Condor, or restrict permissions on who is allowed to submit Condor jobs to trusted users. Bug fixes that are security related are clearly marked in the Bugs Fixed section of the Release Notes, with a description of the potential security impact. The Condor Project believes in the full disclosure of information, and therefore publishes complete vulnerability details. However, in order to give an adequate upgrade window for production installations, we will delay posting the full vulnerability details fixed in this release for 30 days (until the week of November 3rd 2008). In addition, we took just the security bug fixes in v7.0.5 and back-ported them to v6.8; this effort has been released as version 6.8.9. Binaries for both releases, as well as sources for v7.0.5, are available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 7.0.4. This release fixes a problem with DENY lists in the authorization policy that could allow access when it should be denied. Additional changes include guarding against administrative tools cleaning up in-use files in the system’s temporary directory and improving memory usage in the collector. Bugs fixed on Windows include daemons failing to start and crashes related to Condor-C and parallel jobs. See the version history for a complete list of bugs that have been fixed. Condor 7.0.4 binaries and source code are available from our downloads page.
The Condor Team is pleased to announce the release of Condor 7.0.3. This release fixes a bug in 7.0.2 which resulted in very poor performance in some situations. Therefore, we recommend that users of 7.0.2 upgrade to 7.0.3 as soon as it is convenient. See the version history for a complete list of bugs that have been fixed. Condor 7.0.3 binaries and source code are available from our downloads page.
The Condor Team is pleased to announce the availability of Condor 7.0.2. This release is the latest in our stable series, and contains a large number of bug fixes. This release also adds an improved permissions model on Condor’s EXECUTE directory on Unix platforms, and support for building Condor on FreeBSD 7. See the version history for a complete list of changes. Condor 7.0.2 binaries and source code are available from our download page.
The Condor Team is pleased to announce the release of Condor 7.0.1. This release introduces several fixes for bugs, including security-related problems and a new port to Redhat Enterprise Linux 5.0. See the Version History for a complete list of changes. Condor 7.0.1 binaries and source code are available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 7.0.0. This first release in a new stable series includes all new features added in the 6.9 development series. See the Version History for a complete list of changes. Condor 7.0.0 binaries and source code are available from our Downloads page.
The Condor Team announces the release of Condor 7.0.5. This release contains many bug fixes and some improvements to error handling of Local Universe jobs. Note that some of the bug fixes are security-related; therefore, we recommend sites either upgrade Condor, or restrict permissions on who is allowed to submit Condor jobs to trusted users. Bug fixes that are security related are clearly marked in the Bugs Fixed section of the Release Notes, with a description of the potential security impact. The Condor Project believes in the full disclosure of information, and therefore publishes complete vulnerability details. However, in order to give an adequate upgrade window for production installations, we will delay posting the full vulnerability details fixed in this release for 30 days (until the week of November 3rd 2008). In addition, we took just the security bug fixes in v7.0.5 and back-ported them to v6.8; this effort has been released as version 6.8.9. Binaries for both releases, as well as sources for v7.0.5, are available from our Downloads page.
The Condor Team announces the release of Condor 6.8.8. Condor 6.8.8 introduces several fixes for bugs, including a security-related problem. See the Version History for a complete list of changes. Condor 6.8.8 is available from our Downloads page.
The Condor Team announces the release of Condor 6.8.7. Condor 6.8.7 introduces several fixes for bugs. See the Version History for a complete list of changes. Condor 6.8.7 is available from our Downloads page.
The Condor Team announces Condor 6.8.6. This new stable series release fixes numerous bugs, faster submission to Globus WS-GRAM, and also adds official support for Microsoft Vista and MacOS 10.4 on Intel CPUs. See the Version History and Release Notes for further details. Condor 6.8.6 is available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 6.8.5. Condor 6.8.5 is primarily a bugfix release. See the Version History and Release Notes for further details. Condor 6.8.5 is available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 6.8.4. Condor 6.8.4 is primarily a bugfix release, including fixes in Quill, DAGMan, and the “local universe”. See the Version History and Release Notes for further details. Condor 6.8.4 is available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 6.8.3. Condor 6.8.3 fixes a number of bugs, adds several minor features, and adds clipped support for SuSE Linux Enterprise Server 9 on PowerPCs. See the Version History and Release Notes for further details. Condor 6.8.3 is available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 6.8.2. Condor 6.8.2 release fixes a number of bugs and adds support for x86_64 standard universe. See the Version History and Release Notes for further details. Condor 6.8.2 is available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 6.8.1. Condor 6.8.1 release fixes a number of important bugs, including some potential security vulnerabilities. All users are encouraged to upgrade immediately. See the Version History and Release Notes for further details. Condor 6.8.1 is available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 6.8.0. Condor 6.8.0 begins a new stable series of Condor and contains the new features and bug fixes from the Condor 6.7 development series. See the Version History and Release Notes for further details. Condor 6.8.0 is available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 6.6.11. Version 6.6.11 is strictly for bug and security fixes. See the Version History and Release Notes for details. Condor 6.6.11 is available from our Downloads page.
The Condor Team is pleased to announce the release of Condor 6.6.10. Version 6.6.10 is strictly for bug fixes. See the Version History and Release Notes for details. Condor 6.6.10 is available from our Downloads page.
6.6.9 is the latest release of our stable series. 6.6.9 contains several critical bug fixes and all users are encouraged to upgrade immediately. See the Version History and Release Notes for details. Condor 6.6.9 is available from our Downloads page.
6.6.8 is the latest release of our stable series. 6.6.8 is primarily a bug fix release. 6.6.8, and all future releases will no longer support Redhat Linux on IA64, Digital UNIX 4.0f, and Solaris 7. See the Version History and Release Notes for details. Condor 6.6.8 is available from our Downloads page.
6.6.7 is the latest release of our stable series. 6.6.7 is primarily a bug fix release. New features include support for the Windows Firewall on Windows XP SP2. 6.6.7, and all future releases will no longer support HP-UX 10.20, Digital UNIX 4.0f, and Solaris 7. See the Version History and Release Notes for details. Condor 6.6.7 is available from our Downloads page.
6.6.6 is the latest version of our current stable release series. See the Version History and Release Notes for details. Condor 6.6 is available from our Downloads page.
6.6.5 is the latest version of our current stable release series. See the Version History and Release Notes for details. Condor 6.6 is available from our Downloads page.
6.6.4 and 6.6.3 are the latest version of our current stable release series. 6.6.4 is for MacOS X and Windows only, and is otherwise identical to 6.6.3. 6.6.3 includes support for Globus 3.2, and removes support for Globus releases prior to 2.2. If you are not using the Globus universe, there is very little difference between 6.6.2 and 6.6.3. See the Version History and Release Notes for details. Condor 6.6 is available from our Downloads page.
6.6.4 and 6.6.3 are the latest version of our current stable release series. 6.6.4 is for MacOS X and Windows only, and is otherwise identical to 6.6.3. 6.6.3 includes support for Globus 3.2, and removes support for Globus releases prior to 2.2. If you are not using the Globus universe, there is very little difference between 6.6.2 and 6.6.3. See the Version History and Release Notes for details. Condor 6.6 is available from our Downloads page.
Condor 6.4.7 for both UNIX and Windows has been released. 6.4.7 corrects a critical bug with Condor that caused a misreporting of jobs in the pool. It is available from our Downloads page.
Condor Version 6.2.1 has been released, and is available on the downloads page. 6.2.1 is the second release in the 6.2 stable series. The main focus of this release was bug fixes over the 6.2.0 release, and all 6.2.0 users are urged to upgrade to 6.2.1. The complete list of changes can be found here
Condor Version 6.2.0 has been released, and is available on the downloads page. 6.2.0 is the first release in the 6.2 stable series. Future 6.2.X releases will be mainly bug fixes. For more info on our version-number system, please read this. <p> The UNIX and NT builds are now available on the website, and 6.0 and 6.1 releases have been removed. The 6.2.0 manual is also available, and includes a section on how to upgrade your pool from 6.0.3 to 6.2.0. The 6.3 DAGMan will also be released very soon.
This is the new, stable version of Condor. It fully supports Solaris 2.5.1 and 2.6 on Intel and Sparc platforms, Linux for Intel (libc5 and glibc), SGI IRIX 6.2 through 6.4, Digital Unix 4.0, and HPUX 10.20. You can read about what’s new in this version. This version only fixes bugs in Condor’s interaction with NIS, and with the benchmarking code that was causing a floating point exception (SIGFPE) on extremely fast machines (like the fastest Alphas). If you don’t use NIS, or you weren’t having problems with the condor_startd exiting with signal 8, there’s no need to upgrade.
This is the new, stable version of Condor. It fully supports Solaris 2.5.1 and 2.6 on Intel and Sparc platforms, Linux for Intel (libc5 and glibc), SGI IRIX 6.2 through 6.4, Digital Unix 4.0, and HPUX 10.20. You can read about what’s new in this version. It contains only bug fixes to Condor Version 6.0.1. A new development release of Condor (version 6.1.0) will be released soon with new features, such as support for running multiple jobs on SMP machines.
This is the new, stable version of Condor. It fully supports Solaris 2.5.1 and 2.6 on Intel and Sparc platforms, Linux for Intel (libc5 and glibc), SGI IRIX 6.2 through 6.4, Digital Unix 4.0, and HPUX 10.20. You can read about what’s new in this version.
You can read about what’s new in this version.