Back to home page

Project CMSSW displayed by LXR

 
 

    


File indexing completed on 2021-02-14 13:12:01

0001 ## Configuration for testing the FED processing monitor module
0002 ##=============================================================
0003 
0004 import FWCore.ParameterSet.Config as cms
0005 from Configuration.AlCa.GlobalTag import GlobalTag
0006 
0007 process = cms.Process('SPYDISPLAY')
0008 
0009 process.source = cms.Source(
0010     "PoolSource",
0011     fileNames = cms.untracked.vstring(
0012 #       'file:/afs/cern.ch/work/j/jblee/public/SpyChannel/CMSSW_9_4_0/src/DQM/SiStripMonitorHardware/test/SpyMatchedEvents298270.root',
0013        'file:SpyMatchedEvents298270_TEST.root'
0014        )
0015     )
0016 
0017 process.maxEvents = cms.untracked.PSet( input = cms.untracked.int32(-1))
0018 
0019 ## ---- Services ----
0020 process.load("DQM.SiStripCommon.MessageLogger_cfi")
0021 
0022 ## ---- Conditions ----
0023 
0024 ## Global tag see SWGuideFrontierConditions
0025 process.load("Configuration.StandardSequences.FrontierConditions_GlobalTag_cff")
0026 process.GlobalTag = GlobalTag(process.GlobalTag, 'auto:run2_data', '')
0027 process.load("Configuration.Geometry.GeometryRecoDB_cff")
0028 
0029 ## ---- Retrieve the ZS digis from the mainline ----
0030 ## ---- if running on matched events     ----
0031 process.load('EventFilter.SiStripRawToDigi.SiStripDigis_cfi')
0032 #process.siStripDigis.ProductLabel = cms.InputTag('source')
0033 #process.siStripDigis.UnpackCommonModeValues = cms.bool(True)
0034 
0035 
0036 ## ---- SpyChannel Monitoring ----
0037 ## For my plugin for the spy channel monitoring
0038 process.load('DQM.SiStripMonitorHardware.SiStripSpyDisplay_cfi')
0039 
0040 ## Select the detIDs of choice here
0041 process.SiStripSpyDisplay.detIDs = cms.vuint32(
0042 470079220, 470083621, 470083622, 470083625, 470083626, 470083653, 470083654, 470083657, 470083658, 470083684, 470083688, 470083692, 470083716, 470083720, 470083724, 470083728, 470083780, 470083784, 470083788,
0043 369124565, 369124566, 369124569, 369124570, 369124573, 369124574, 369125557, 369125558, 369125561, 369125562, 369125565, 369125566, 369125573, 369125574, 369125577, 369125578, 369125581, 369125582, 369125589,
0044 402672433, 402672434, 402672265, 402672266, 402672269, 402672270, 402672273, 402672274, 402672261, 402672262, 402672301, 402672302, 402672305, 402672306, 402672901, 402672902, 402672905, 402672906, 402672945,
0045 436298448, 436298452, 436298456, 436298404, 436298408, 436298412, 436298416, 436298420, 436298424, 436298372, 436298376, 436298380, 436298384, 436298388, 436298392, 436298916, 436298920, 436298924, 436298928,
0046     )
0047 process.SiStripSpyDisplay.InputScopeModeRawDigiLabel = cms.InputTag("SiStripSpyEventMatcher","SpyScope")
0048 process.SiStripSpyDisplay.InputPayloadRawDigiLabel   = cms.InputTag("SiStripSpyEventMatcher", "SpyPayload")
0049 process.SiStripSpyDisplay.InputReorderedPayloadRawDigiLabel = cms.InputTag("SiStripSpyEventMatcher", "SpyReordered")
0050 process.SiStripSpyDisplay.InputReorderedModuleRawDigiLabel = cms.InputTag("SiStripSpyEventMatcher", "SpyVirginRaw")
0051 #process.SiStripSpyDisplay.InputPedestalsLabel               = cms.InputTag("SiStripFEDEmulator","ModulePedestals")
0052 #process.SiStripSpyDisplay.InputNoisesLabel                  = cms.InputTag("SiStripFEDEmulator","ModuleNoises")
0053 #process.SiStripSpyDisplay.InputPostPedestalRawDigiLabel     = cms.InputTag("SiStripFEDEmulator","PedSubtrModuleDigis")
0054 #process.SiStripSpyDisplay.InputPostCMRawDigiLabel           = cms.InputTag("SiStripFEDEmulator","CMSubtrModuleDigis")
0055 #process.SiStripSpyDisplay.InputZeroSuppressedDigiLabel      = cms.InputTag("SiStripFEDEmulator","ZSModuleDigis")
0056 ##mainline data - if running on matched events
0057 # process.SiStripSpy.InputCompZeroSuppressedDigiLabel  = cms.InputTag("siStripDigis","ZeroSuppressed")
0058 process.SiStripSpyDisplay.InputCompVirginRawDigiLabel  = cms.InputTag("siStripDigis","VirginRaw")
0059 process.SiStripSpyDisplay.OutputFolderName = cms.string("Display")
0060 
0061 ## ---- Sequence ----
0062 process.p = cms.Path(
0063     process.siStripDigis*    ## if running on matched events
0064     process.SiStripSpyDisplay
0065     )
0066 
0067 ## ------ TFileService
0068 process.TFileService = cms.Service(
0069     "TFileService",
0070     fileName = cms.string('SpyDisplay298270_Test.root')
0071     )
0072