beautypg.com

FUJITSU M8000 User Manual

Page 481

background image

snapshot(8)

System Administration

459

-e

Encrypts the zip archive. Required when using -P password.

-h

Displays usage statement.

When used with other options or operands, an error occurs.

-k

host-key

Used with the -t or -T option, sets the public key that the
Service Processor uses to log in to the network host. This
option is not valid with the -d option.

Possible values for host-key are as follows:

none

This literal value specifies that a public key should not be used
to authenticate the network host.

download

This literal value specifies that snapshot will use ssh to
download a public host key for the network host and download
the key from the host specified in the -t argument. snapshot
displays the key’s md5 fingerprint and prompts for confirmation.
If you accept the key, it is used for server authentication. If you
reject the key, snapshot exits without doing anything. This is
the default behavior in SSH Target Mode if -k is not specified.

public

The specified public key is used for server authentication. The
host-key argument should be the complete public key of the
network host, beginning with key type (the complete contents of
/etc/ssh/ssh_host_rsa_key.pub

on the network host).

Note –

The public key should be enclosed in quotes to ensure

that the shell treats it as a single word.

-L

{F|I|R}

Specifies which set of logs will be collected.

F

Full log set.

I

Initial log set.

R

Root Cause log set.

If no log set is specified, the Initial log set is collected by
default.

-l

Specifies collecting only log files. Does not collect command
output.

-n

Automatically answers "n" (no) to all prompts.

This manual is related to the following products: