Quick Reference Guide
Delimiter Example Description
backslashes (\\), and the double
quotation mark (") is interpreted as a
string delimiter.
If an odd number of backslashes are
followed by a double quotation mark,
then one backslash (\) is taken for
every pair of backslashes (\\) and the
double quotation mark is interpreted
as an escape sequence by the
remaining backslash, causing a literal
double quotation mark (") to be placed
in the SYSCFG argument.
syscfg --option="\\
\"argument"
considers \ "argument as the
argument.
Read And Write Commands
Options can report a certain value or set of values based on the presence of an argument. These read or write actions
are implied in the DTK command line arguments. The get, read, set, or write commands, for example, are not required.
NOTE: You cannot combine options that specify read or write actions in a command line instance.
Table 5. Read and Write Command Examples
Valid/Invalid DTK Command Line Example
valid
syscfg --option1 --option2
valid
syscfg --option1=arg --option2=arg
invalid
syscfg --option1=arg --option2
File Input And Output Commands
• Specify the file input using the -i <filename> command, where <filename> is the name of the input file.
• Specify the file output using the -o <filename> command, where <filename> is the name of the output
file.
Log Files
If the log file already exists, information is appended to the file. This allows multiple tools to use the same log file to
record information. Use the -l option to record the output of a utility.
The log duplicates all standard output and error information to the specified file. Each log file begins with a time stamp
and utility name. For example, YYYY/MM/DD HH:MM:SS < utilname > - <output text> .
The following is an example of the logging behavior:
2003/11/28 10:23:17 syscfg - option1=on
2003/11/28 10:23:17 syscfg - option2=on
2003/11/28 10:23:17 syscfg - option3 =off
NOTE: The log files may contain sensitive information such as passwords and authentication information. To
protect such information, it is recommended that only the administrator accesses the log files.
16