Back to home page

Project CMSSW displayed by LXR

 
 

    


File indexing completed on 2021-02-14 13:12:01

0001 ## Configuration for testing the FED processing monitor module
0002 ##=============================================================
0003 
0004 import FWCore.ParameterSet.Config as cms
0005 from Configuration.AlCa.GlobalTag import GlobalTag
0006 
0007 process = cms.Process('SPYDISPLAY')
0008 
0009 process.source = cms.Source(
0010     "PoolSource",
0011     fileNames = cms.untracked.vstring(
0012 #       'file:/afs/cern.ch/work/j/jblee/public/SpyChannel/CMSSW_9_4_0/src/DQM/SiStripMonitorHardware/test/SpyMatchedEvents298270.root',
0013 #       'file:SpyMatchedEvents298270_TEST.root'
0014 #   'file:SpyMatchedEvents234824_TEST.root'
0015 'file:SpyMatched_FEDemulated234824_TEST.root'
0016 #'file:/eos/cms/store/user/jblee/SpyFEDemulated234824_TEST.root'
0017        )
0018     )
0019 
0020 process.maxEvents = cms.untracked.PSet( input = cms.untracked.int32(-1))
0021 
0022 ## ---- Services ----
0023 process.load("DQM.SiStripCommon.MessageLogger_cfi")
0024 
0025 ## ---- Conditions ----
0026 
0027 ## Global tag see SWGuideFrontierConditions
0028 process.load("Configuration.StandardSequences.FrontierConditions_GlobalTag_cff")
0029 process.GlobalTag = GlobalTag(process.GlobalTag, 'auto:run2_data', '')
0030 process.load("Configuration.Geometry.GeometryRecoDB_cff")
0031 
0032 ## ---- Retrieve the ZS digis from the mainline ----
0033 ## ---- if running on matched events     ----
0034 process.load('EventFilter.SiStripRawToDigi.SiStripDigis_cfi')
0035 #process.siStripDigis.ProductLabel = cms.InputTag('source')
0036 #process.siStripDigis.UnpackCommonModeValues = cms.bool(True)
0037 
0038 
0039 ## ---- SpyChannel Monitoring ----
0040 ## For my plugin for the spy channel monitoring
0041 process.load('DQM.SiStripMonitorHardware.SiStripSpyDisplay_cfi')
0042 
0043 ## Select the detIDs of choice here
0044 process.SiStripSpyDisplay.detIDs = cms.vuint32(
0045 470079220, 470083621, 470083622, 470083625, 470083626, 470083653, 470083654, 470083657, 470083658, 470083684, 470083688, 470083692, 470083716, 470083720, 470083724, 470083728, 470083780, 470083784, 470083788,
0046 369124565, 369124566, 369124569, 369124570, 369124573, 369124574, 369125557, 369125558, 369125561, 369125562, 369125565, 369125566, 369125573, 369125574, 369125577, 369125578, 369125581, 369125582, 369125589,
0047 402672433, 402672434, 402672265, 402672266, 402672269, 402672270, 402672273, 402672274, 402672261, 402672262, 402672301, 402672302, 402672305, 402672306, 402672901, 402672902, 402672905, 402672906, 402672945,
0048 436298448, 436298452, 436298456, 436298404, 436298408, 436298412, 436298416, 436298420, 436298424, 436298372, 436298376, 436298380, 436298384, 436298388, 436298392, 436298916, 436298920, 436298924, 436298928,
0049     )
0050 process.SiStripSpyDisplay.InputScopeModeRawDigiLabel = cms.InputTag("SiStripSpyEventMatcher","SpyScope")
0051 process.SiStripSpyDisplay.InputPayloadRawDigiLabel   = cms.InputTag("SiStripSpyEventMatcher", "SpyPayload")
0052 process.SiStripSpyDisplay.InputReorderedPayloadRawDigiLabel = cms.InputTag("SiStripSpyEventMatcher", "SpyReordered")
0053 process.SiStripSpyDisplay.InputReorderedModuleRawDigiLabel = cms.InputTag("SiStripSpyEventMatcher", "SpyVirginRaw")
0054 process.SiStripSpyDisplay.InputPedestalsLabel               = cms.InputTag("SiStripFEDEmulator","ModulePedestals")
0055 process.SiStripSpyDisplay.InputNoisesLabel                  = cms.InputTag("SiStripFEDEmulator","ModuleNoises")
0056 process.SiStripSpyDisplay.InputPostPedestalRawDigiLabel     = cms.InputTag("SiStripFEDEmulator","PedSubtrModuleDigis")
0057 process.SiStripSpyDisplay.InputPostCMRawDigiLabel           = cms.InputTag("SiStripFEDEmulator","CMSubtrModuleDigis")
0058 process.SiStripSpyDisplay.InputZeroSuppressedDigiLabel      = cms.InputTag("SiStripFEDEmulator","ZSModuleDigis")
0059 ##mainline data - if running on matched events
0060 process.SiStripSpyDisplay.InputCompZeroSuppressedDigiLabel  = cms.InputTag("siStripDigis","ZeroSuppressed")
0061 #process.SiStripSpyDisplay.InputCompVirginRawDigiLabel  = cms.InputTag("siStripDigis","VirginRaw")
0062 process.SiStripSpyDisplay.OutputFolderName = cms.string("Display")
0063 
0064 ## ---- Sequence ----
0065 process.p = cms.Path(
0066     process.siStripDigis*    ## if running on matched events
0067     process.SiStripSpyDisplay
0068     )
0069 
0070 ## ------ TFileService
0071 process.TFileService = cms.Service(
0072     "TFileService",
0073     fileName = cms.string('SpyDisplay234824_Test.root')
0074     )
0075