HSI Reference Manual

HSI Reference Manual

HSI Reference Manual Hierarchical Storage Interface, Version 8.3, 10 July 2020 HSI Reference Manual Hierarchical Storage Interface, Version 8.3, 10 July 2020 Table of Contents ............................................................................................................................................................... vi 1. Introduction ........................................................................................................................................ 1 2. Authentication Methods .................................................................................................................... 2 3. Restricted TCP ports and restricted Mover hosts ............................................................................. 3 3.1. HSI port ranges and reserved ports ........................................................................................ 3 3.2. HSI restricted Mover hosts .................................................................................................... 4 4. HSI command line ............................................................................................................................. 5 5. FTP compatibility and differences .................................................................................................... 8 6. Path names ......................................................................................................................................... 9 6.1. Syntax for renaming files in put and get commands ............................................................ 9 6.2. Using put and get commands with just one pathname ......................................................... 9 6.3. Using UNIX PIPES ................................................................................................................ 9 6.4. UNIX-style pathname prefixes ............................................................................................. 10 7. HSI Checksum Feature ................................................................................................................... 11 7.1. Checksum hashing algorithms .............................................................................................. 11 7.2. Transfer Rate Performance Impact ...................................................................................... 11 7.3. New Commands ................................................................................................................... 11 7.4. New hsirc options ................................................................................................................. 12 7.5. New Command Line Options for put and get commands ................................................... 12 8. Access Control Lists (ACLs) .......................................................................................................... 13 9. Using PIPEs for input and output ................................................................................................... 15 9.1. Using stdin and stdout for input/output ............................................................................... 15 9.2. Using UNIX PIPE commands for input and output ............................................................ 16 10. HSI COS selection with and without piped files .......................................................................... 18 11. Customizing the HSI prompt ........................................................................................................ 20 12. Using HSI with multiple HPSS systems ....................................................................................... 21 12.1. Using HSI to access multiple HPSS systems .................................................................... 21 12.2. Commands used for Multi-HPSS HSI Sessions ................................................................ 23 12.3. Example scenario for a multi-HPSS session ...................................................................... 23 13. HSI environment variables ............................................................................................................ 28 14. HPSS.conf settings (client) ........................................................................................................... 31 15. HSI special topics .......................................................................................................................... 32 15.1. How to pipe an HPSS file into "cmp", "head", "less", etc. ................................................ 32 15.2. How to retrieve a set of files in optimal tape/position order ............................................. 33 15.3. Working with pathnames containing special characters .................................................... 33 16. HSI keywords ................................................................................................................................ 35 17. HSI commands (alphabetical list) ................................................................................................. 37 18. HSI commands (by function) ........................................................................................................ 41 18.1. HPSS File and Directory Commands ................................................................................ 41 18.2. Local File and Directory Commands ................................................................................. 42 18.3. Access Control List (ACL) Commands ............................................................................. 42 18.4. Accounting/Metadata Commands ...................................................................................... 42 18.5. File and Directory Administration Commands .................................................................. 43 18.6. Multi-HPSS Commands ..................................................................................................... 43 18.7. HSI Settings Commands and Keywords ............................................................................ 44 18.8. Miscellaneous HSI Commands .......................................................................................... 45 19. Command reference ....................................................................................................................... 46 iii HSI Reference Manual 19.1. ADOPT command .............................................................................................................. 46 19.2. ANNOTATE command ...................................................................................................... 46 19.3. BELL command ................................................................................................................. 48 19.4. CD command ...................................................................................................................... 48 19.5. CDLS command ................................................................................................................. 50 19.6. CGET command ................................................................................................................. 51 19.7. CHACCT command ........................................................................................................... 53 19.8. CHACL command .............................................................................................................. 54 19.9. CHCOS command .............................................................................................................. 55 19.10. CHGRP command ............................................................................................................ 57 19.11. CHMOD command ........................................................................................................... 58 19.12. CHOWN command .......................................................................................................... 60 19.13. CLOSE command ............................................................................................................. 61 19.14. COPIES keyword ............................................................................................................. 62 19.15. COSID keyword ............................................................................................................... 62 19.16. CP and CCP commands ................................................................................................... 63 19.17. CPUT command ............................................................................................................... 65 19.18. CRENAME command ...................................................................................................... 66 19.19. DEBUG command ............................................................................................................ 68 19.20. DIRn keyword .................................................................................................................. 69 19.21. DU command .................................................................................................................... 69 19.22. DUMP command .............................................................................................................. 70 19.23. ECHO command ............................................................................................................... 71 19.24. END command ................................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    147 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us