CLI Guide
Delimiter Example Description
quotation mark, then one backslash (\) is
taken for every pair of backslashes (\\), and
the double quotation mark (") is interpreted
as a string delimiter.
If an odd number of backslashes are
followed by a double quotation mark, then
one backslash (\) is taken for every pair of
backslashes (\\) and the double quotation
mark is interpreted as an escape sequence
by the remaining backslash, causing a literal
double quotation mark (") to be placed in
the SYSCFG argument.
syscfg --option="\\\"argument"
considers \ "argument as the argument.
Read And Write Commands
Options can report a certain value or set of values based on the presence of an argument. These read or write actions are implied in the
DTK command line arguments. The get, read, set, or write commands, for example, are not required.
NOTE: You cannot combine options that specify read or write actions in a command line instance.
Table 6. Read and Write Command Examples
Valid/Invalid DTK Command Line Example
valid
syscfg --option1 --option2
valid
syscfg --option1=arg --option2=arg
invalid
syscfg --option1=arg --option2
File Input And Output Commands
• Specify the le input using the -i <filename> command, where <filename> is the name of the input le.
• Specify the le output using the -o <filename> command, where <filename> is the name of the output le.
Log Files
If the log le already exists, information is appended to the le. This allows multiple tools to use the same log le to record information. Use
the -l option to record the output of a utility.
The log duplicates all standard output and error information to the specied le. Each log le begins with a time stamp and utility name. For
example, YYYY/MM/DD HH:MM:SS < utilname > - <output text> .
The following is an example of the logging behavior:
2003/11/28 10:23:17 syscfg - option1=on
2003/11/28 10:23:17 syscfg - option2=on
2003/11/28 10:23:17 syscfg - option3 =off
NOTE
: The log les may contain sensitive information such as passwords and authentication information. To protect such
information, it is recommended that only the administrator accesses the log les.
Command Syntax Overview 21