HP-UX Reference (11i v2 03/08) - 1 User Commands N-Z (vol 2)
n
nistbladm(1) nistbladm(1)
NAME
nistbladm - NIS+ table administration command
SYNOPSIS
nistbladm -a | -A [ -D
defaults ] colname=value ... tablename
nistbladm -a | -A [ -D
defaults ] indexedname
nistbladm -c [ -D defaults ][
-p path ][-s sep ] type colname=[flags][,access ] ...
tablename
nistbladm -d tablename
nistbladm -e | -E colname=value ... indexedname
nistbladm -m colname=value ... indexedname
nistbladm -r | -R [ colname=value ... ] tablename
nistbladm -r | -R indexedname
nistbladm -u [ -p path ][
-s sep ][-t type ][colname=access ... ] tablename
DESCRIPTION
The
nistbladm command is used to administer NIS+ tables. There are five primary operations that it
performs: creating and deleting tables, adding entries to, modifying entries within, and removing entries
from tables.
Though NIS+ does not place restrictions on the size of tables or entries, the size of data has an impact on
the performance and the disk space requirements of the NIS+ server. NIS+ is not designed to store huge
pieces of data, such as files; instead pointers to files should be stored in NIS+.
NIS+ design is optimized to support 10,000 objects with a total size of 10M bytes. If the requirements
exceed the above, it is suggested that a domain hierarchy be created, or the data stored in the tables be
pointers to the actual data, instead of the data itself.
When creating tables, a table type, type, and a list of column definitions must be provided.
type is a string that is stored in the table and later used by the service to verify that entries being added
to it are of the correct type.
Syntax for column definitions is:
colname
=[flags][,access]
flags is a combination of:
S Searchable. Specifies that searches can be done on the column’s values (see nismatch (1)).
I Case-insensitive (only makes sense in combination with
S). Specifies that searches should
ignore case.
C Crypt. Specifies that the column’s values should be encrypted.
B Binary data (does not make sense in combination with S). If not set, the column’s values
are expected to be null terminated ASCII strings.
X XDR encoded data (only makes sense in combination with B).
access is specified in the format as defined by the nischmod(1) command.
When manipulating entries, this command takes two forms of entry name. The first uses a series of space
separated colname=value pairs that specify column values in the entry. The second is an NIS+ indexed
name, indexedname, of the form:
[ colname=value, ... ],tablename
Options
-a | A Add entries to a NIS+ table. The difference between the lowercase ‘a’ and the
uppercase ‘A’ is in the treatment of preexisting entries. The entry’s contents are
specified by the column=value pairs on the command line. Note: Values for all
columns must be specified when adding entries to a table.
Normally, NIS+ reports an error if an attempt is made to add an entry to a table
that would overwrite an entry that already exists. This prevents multiple parties
from adding duplicate entries and having one of them get overwritten. If you wish
to force the add, the uppercase ‘A’ specifies that the entry is to be added, even if it
Section 1−−622 Hewlett-Packard Company − 1 − HP-UX 11i Version 2: August 2003