Command-line interface
You can use the command-line interface (CLI) to enter commands that enable you to manage the system.
- Syntax diagrams
A syntax diagram uses symbols to represent the elements of a command and to specify the rules for using these elements. - Using wildcards in the CLI
You can use wildcards in the system command-line interface (CLI). - Data types and value ranges
The maximum length of any single parameter entered into the command line is 2176 bytes. - Terminology
Terms that are most commonly used for the command-line interface (CLI) operations. - CLI flags
The following flags are common to all command-line interface (CLI) commands. - CLI messages
Ensure that you are familiar with the command-line interface (CLI) messages. - CLI commands and parameters
Command-line interface (CLI) commands and parameters are represented in the syntax diagram. - CLI special characters
The following special characters are used in the command-line interface (CLI) command examples. - CLI deprecated and discontinued commands
Some command-line interface (CLI) commands are discontinued or deprecated and replaced with new commands. - Understanding capacity indicators
The system uses base-2 (binary numeral) as capacity indicators for volumes, drives, and other system objects. The management GUI and the command-line interface (CLI) use different abbreviations to indicate capacity. - Attributes of the -filtervalue parameters
The -filtervalue parameter filters a view that is based on specific attribute values that relate to each object type. You can combine multiple filters to create specific searches, for example, -filtervalue name=fred:status=online. The help (-filtervalue) specifies the attributes that are available for each object type. - Setting up an SSH client
Secure Shell (SSH) is a client/server network application. It is used as a communication vehicle between the host system and the system command-line interface (CLI). - Copying the software update files by using PuTTY pscp or openssh scp
PuTTY pscp (or scp) provides a file transfer application for secure shell (SSH) to copy files either between two directories on the configuration node or between the configuration node and another host. - Using the CLI
The command-line interface (CLI) is a collection of commands that you can use to manage the clustered system (system). - Array commands
Use the array commands to manage arrays and their properties. - Audit log commands
Use the audit log commands to track command specifications and related data. An audit log keeps track of action commands that are issued through a Secure Shell (SSH) session or through the management GUI. - Backup and restore commands
Use the backup and restore commands to back up and restore configuration information about the system. - Cloud commands
Use the cloud commands to create, change, or list details about cloud-related objects. - Clustered system commands
Use the clustered system (system) commands to monitor and modify systems and their properties. - Clustered system diagnostic and service-aid commands
Use the clustered system diagnostic and service-aid commands to diagnose and find clustered system (system) problems. - Controller commands
Use the controller commands to modify the name of a storage controller. - Copy Service commands
Use the Copy Service commands to work with the Metro Mirror, Global Mirror, and HyperSwap® services that are provided by the system. - Drive commands
Use the drive commands to capture information to assist with managing drives. - Enclosure commands
Use the enclosure commands to manage enclosures and their properties. - Email and event notification commands
Use the email and event notification commands to enable your system to send notifications. - Encryption commands
Use the encryption and security commands are used to create, change, or list system encryption feature details. - FlashCopy commands
Use the FlashCopy® commands to work with FlashCopy system methods and functions. - Host commands
Use the host commands to work with host objects on your system. - Information commands
Use the the information commands to display specific types of system information. - Licensing and featurization commands
Use the licensing and featurization commands to work with licensed system functions. - Livedump commands
Use the livedump commands to manage the node livedumps on your system. - Managed disk commands
Use the managed disk commands to work with managed disk options on a system. - Migration commands
Use the migration commands to work with migration options for the system . - Service information commands
Use the service information commands to view hardware status and to report hardware errors. - Service task commands
Use the service task commands to service the node hardware (such as IBM Spectrum Virtualize™). - Storage pool commands
Use the storage pool commands to work with storage pool options on the system. - User management commands
Use the user management commands to configure remote authentication service and manage users and groups on the clustered system. - Volume commands
Use the volume commands enable to work with volume options for the system.
Related concepts: