CLI referenceEdit online Syntax diagramsA syntax diagram uses symbols to represent the elements of a command and to specify the rules for using these elements.Using wildcards in the CLIYou can use wildcards in the system command-line interface (CLI).Data types and value rangesThe maximum length of any single parameter entered into the command line is 2176 bytes.CLI flagsThe following flags are common to all command-line interface (CLI) commands.CLI messagesEnsure that you are familiar with the command-line interface (CLI) messages.CLI commands and parametersCommand-line interface (CLI) commands and parameters are represented in the syntax diagram.CLI special charactersThe following special characters are used in the command-line interface (CLI) command examples.CLI deprecated and discontinued commandsSome command-line interface (CLI) commands are discontinued or deprecated and replaced with new commands.Understanding capacity indicatorsThe system uses base-2 (binary numeral) as capacity indicators for volumes, drives, and other system objects. The management GUI and the command-line interface (CLI) use different abbreviations to indicate capacity. Attributes of the -filtervalue parametersThe -filtervalue parameter filters a view that is based on specific attribute values that relate to each object type. You can combine multiple filters to create specific searches, for example, -filtervalue name=fred:status=online. The help (-filtervalue) specifies the attributes that are available for each object type.UNIX commands available on the CLIYou can use several UNIX-based commands while working with interactive SSH sessions.Array commandsUse the array commands to manage arrays and their properties.Audit log commandsUse the audit log commands to track command specifications and related data. An audit log keeps track of successful action commands that are issued by users through all supported interfaces.Backup and restore commandsUse the backup and restore commands to back up and restore configuration information about the system.Cloud commands Use the cloud commands to create, change, or list details about cloud-related objects. Clustered system commandsUse the system commands to monitor and modify systems and their properties.Clustered system diagnostic and service-aid commandsUse the clustered system diagnostic and service-aid commands to diagnose and find system problems.Controller commandsUse the controller commands to modify the name of a storage controller.Copy Service commandsUse the Copy Service commands to work with the Metro Mirror, Global Mirror, and HyperSwap® services that are provided by the system.Drive commandsUse the drive commands to capture information to assist with managing drives.Enclosure commandsUse the enclosure commands to manage enclosures and their properties. Call home and event notification commandsUse the call home and event notification commands to enable your system to send notifications.Encryption commandsUse the encryption and security commands are used to create, change, or list system encryption feature details.Policy-based replication commandsPolicy-based replication uses volume group and replication policies to automatically deploy and manage the replication. Policy-based replication significantly simplifies configuring, managing, and monitoring replication between two systems. Use the following set of commands to change, create or delete the replication policies. Fibre Channel portsetUse the following set of commands to associate a Fibre Channel I/O port ID with portset, list the mapping between Fibre Channel I/O port ID and portset objects and to remove Fibre Channel I/O port ID association from the portset.FlashCopy commandsUse the FlashCopy® commands to work with FlashCopy® system methods and functions.FlashSystem grid commandsHost commandsUse the host commands to work with host objects on your system. Licensing and featurization commandsUse the licensing and featurization commands to work with licensed system functions.Livedump commandsUse the livedump commands to manage the node livedumps.Managed disk commandsUse the managed disk commands to work with managed disk options on a system.Migration commandsUse the migration commands to work with migration options for the system storage system.Multifactor authentication commandsUse the following set of commands to configure the system-wide IBM Security Verify and Duo Security multifactor authentication settings.IP addresses commandsUse the following set of commands to configure or create portset, IP objects and associate them with host objects.Partition commandsThe High Availability (HA) solution uses Storage Partitions, a configuration object that is designed to be the single point of management for HA objects. These partitions contain volumes, volume groups, hosts and host-to-volume mappings.Provisioning policies commandsUse the provisioning policies commands to simplify the provisioning of storage.Recovery access key commandUse the recovery access key command to unlock the system storage.Legacy Safeguarded policy commandsThese Safeguarded policy commands are used for a method of simplifying copies that are made on IBM® Copy Services Manager. This is legacy functionality that has been replaced by the Safeguarded Snapshots feature.Service information commandsUse the service information commands to view hardware status and to report hardware errors. Service task commandsUse the service task commands to service the node hardware (such as IBM Storage Virtualize™). Single sign-on commandsUse the following set of commands to configure the system-wide single sign-on authentication settings.System certificates commandsUse the System Certificates commands to manage the system certificate. The system certificate is used to enable secure connections between systems or applications across networks.Snapshot commandsUse the following set of commands to create a management model that allows a storage administrator or automation engine to handle the defined use-cases without having to manage the internal implementation.Snapshot policy commandsUse the following set of commands to set a schedule for snapshot creation and retention. Storage pool commandsUse the storage pool commands to work with storage pool options on the system.Use storage pool commands to work with managed disk group options.Truststore management commandsUse the truststore management commands to configure repositories of certificates and tag stores for use with network services.Two person integrity commandsUse two person integrity (TPI) commands to create, view, approve, cancel, and update role elevation requests. To use these commands, you must have the Restricted Security Administrator role or the Security Administrator role. For example, if you have Security Administrator role you already hold a valid approved TPI request, and you can approve or cancel your own or other TPI request.User management and access control commandsUse the user management and access control commands to configure remote authentication service, access control, and manage users and groups on the system.Volume commandsUse the volume commands to work with volume options for the system.Parent topic: Command-line interface