Provided by: python3-lib389_1.4.3.6-2_all bug

NAME

       dsctl

SYNOPSIS

       dsctl               [-h]               [-v]               [-j]               [-l]              [instance]
       {restart,start,stop,status,remove,db2index,db2bak,db2ldif,dbverify,bak2db,ldif2db,backups,ldifs,tls,healthcheck,get-
       nsstate} ...

OPTIONS

       instance
              The name of the instance to act upon

   Sub-commands
       dsctl restart
              Restart an instance of Directory Server, if it is running: else start it.

       dsctl start
              Start an instance of Directory Server, if it is not currently running

       dsctl stop
              Stop an instance of Directory Server, if it is currently running

       dsctl status
              Check running status of an instance of Directory Server

       dsctl remove
              Destroy an instance of Directory Server, and remove all data.

       dsctl db2index
              Initialise a reindex of the server database. The server must be stopped for this to proceed.

       dsctl db2bak
              Initialise a BDB backup of the database. The server must be stopped for this to proceed.

       dsctl db2ldif
              Initialise an LDIF dump of the database. The server must be stopped for this to proceed.

       dsctl dbverify
              Perform a db verification. You should only do this at direction of support

       dsctl bak2db
              Restore a BDB backup of the database. The server must be stopped for this to proceed.

       dsctl ldif2db
              Restore an LDIF dump of the database. The server must be stopped for this to proceed.

       dsctl backups
              List backup's found in the server's default backup directory

       dsctl ldifs
              List all the LDIF files located in the server's LDIF directory

       dsctl tls
              Manage TLS certificates

       dsctl healthcheck
              Run a healthcheck report on a local Directory Server  instance.  This  is  a  safe  and  read-only
              operation.   Do  not attempt to run this on a remote Directory Server as this tool needs access to
              local resources, otherwise the report may be inaccurate.

       dsctl get-nsstate
              Get the replication nsState in a human readable format

              Replica DN:           The DN of the replication  configuration  entry  Replica  SUffix:        The
              replicated  suffix Replica ID:           The Replica identifier Gen Time              The time the
              CSN generator was created Gen  Time  String:       The  time  string  of  generator  Gen  as  CSN:
              The  generation  CSN  Local Offset:         The offset due to the local clock being set back Local
              Offset String:  The offset in a nice human format Remote Offset:        The offset  due  to  clock
              difference  with remote systems Remote Offset String: The offset in a nice human format Time Skew:
              The time skew between this server and its replicas Time Skew String:     The time skew in  a  nice
              human  format  Seq  Num:               The  number  of  multiple csns within a second System Time:
              The local system time Diff in Seconds:      The time difference in seconds from the CSN  generator
              creation  to now Diff in days/secs:    The time difference broken up into days and seconds Endian:
              Little/Big Endian

OPTIONS 'dsctl restart'

       usage: dsctl [instance] restart [-h]

OPTIONS 'dsctl start'

       usage: dsctl [instance] start [-h]

OPTIONS 'dsctl stop'

       usage: dsctl [instance] stop [-h]

OPTIONS 'dsctl status'

       usage: dsctl [instance] status [-h]

OPTIONS 'dsctl remove'

       usage: dsctl [instance] remove [-h] [--do-it]

       --do-it
              By default we do a dry run. This actually initiates the removal of the
              instance.

OPTIONS 'dsctl db2index'

       usage: dsctl [instance] db2index [-h] backend

       backend
              The backend to reindex. IE userRoot

OPTIONS 'dsctl db2bak'

       usage: dsctl [instance] db2bak [-h] [archive]

       archive
              The destination for the archive. This will be created during the db2bak
              process.

OPTIONS 'dsctl db2ldif'

       usage: dsctl [instance] db2ldif [-h] [--replication] [--encrypted]
                                       backend [ldif]

       backend
              The backend to output as an LDIF. IE userRoot

       ldif   The path to the ldif output location.

       --replication
              Export replication information, suitable for importing on a new consumer or
              backups.

       --encrypted
              Export encrypted attributes

OPTIONS 'dsctl dbverify'

       usage: dsctl [instance] dbverify [-h] backend

       backend
              The backend to verify. IE userRoot

OPTIONS 'dsctl bak2db'

       usage: dsctl [instance] bak2db [-h] archive

       archive
              The archive to restore. This will erase all current server databases.

OPTIONS 'dsctl ldif2db'

       usage: dsctl [instance] ldif2db [-h] [--encrypted] backend ldif

       backend
              The backend to restore from an LDIF. IE userRoot

       ldif   The path to the ldif to import

       --encrypted
              Import encrypted attributes

OPTIONS 'dsctl backups'

       usage: dsctl [instance] backups [-h] [--delete DELETE]

       --delete DELETE
              Delete backup directory

OPTIONS 'dsctl ldifs'

       usage: dsctl [instance] ldifs [-h] [--delete DELETE]

       --delete DELETE
              Delete LDIF file

OPTIONS 'dsctl tls'

       usage: dsctl [instance] tls [-h]
                                   {list-ca,list-client-ca,show-server-cert,show-cert,generate-server-cert-
       csr,import-client-ca,import-ca,import-server-cert,import-server-key-cert,remove-cert}
                                   ...

   Sub-commands
       dsctl tls list-ca
              list server certificate authorities including intermediates

       dsctl tls list-client-ca
              list client certificate authorities including intermediates

       dsctl tls show-server-cert
              Show the active server certificate that clients will see and verify

       dsctl tls show-cert
              Show a certificate's details referenced by it's nickname. This is  analogous  to  certutil  -L  -d
              <path> -n <nickname>

       dsctl tls generate-server-cert-csr
              Generate  a  Server-Cert  certificate  signing  request  -  the  csr is then submitted to a CA for
              verification, and when signed you import with import-ca and import-server-cert

       dsctl tls import-client-ca
              Import a CA trusted to issue user (client) certificates. This is part of  how  client  certificate
              authentication functions.

       dsctl tls import-ca
              Import a CA or intermediate CA for signing this servers certificates (aka Server-Cert). You should
              import all the CA's in the chain as required.

       dsctl tls import-server-cert
              Import a new Server-Cert after the csr has been signed from a CA.

       dsctl tls import-server-key-cert
              Import  a  new key and Server-Cert after having been signed from a CA. This is used if you have an
              external csr tool or a service like lets encrypt that generates PEM keys externally.

       dsctl tls remove-cert
              Delete a certificate from this database. This will remove it from acting as a CA, a client  CA  or
              the Server-Cert role.

OPTIONS 'dsctl tls list-ca'

       usage: dsctl [instance] tls list-ca [-h]

OPTIONS 'dsctl tls list-client-ca'

       usage: dsctl [instance] tls list-client-ca [-h]

OPTIONS 'dsctl tls show-server-cert'

       usage: dsctl [instance] tls show-server-cert [-h]

OPTIONS 'dsctl tls show-cert'

       usage: dsctl [instance] tls show-cert [-h] nickname

       nickname
              The nickname (friendly name) of the certificate to display

OPTIONS 'dsctl tls generate-server-cert-csr'

       usage: dsctl [instance] tls generate-server-cert-csr [-h] [--subject SUBJECT]
                                                            [alt_names [alt_names ...]]

       alt_names
              Certificate requests subject alternative names. These are auto-detected if not
              provided

       --subject SUBJECT, -s SUBJECT
              Certificate Subject field to use

OPTIONS 'dsctl tls import-client-ca'

       usage: dsctl [instance] tls import-client-ca [-h] cert_path nickname

       cert_path
              The path to the x509 cert to import as a client trust root

       nickname
              The name of the certificate once imported

OPTIONS 'dsctl tls import-ca'

       usage: dsctl [instance] tls import-ca [-h] cert_path nickname

       cert_path
              The path to the x509 cert to import as a server CA

       nickname
              The name of the certificate once imported

OPTIONS 'dsctl tls import-server-cert'

       usage: dsctl [instance] tls import-server-cert [-h] cert_path

       cert_path
              The path to the x509 cert to import as Server-Cert

OPTIONS 'dsctl tls import-server-key-cert'

       usage: dsctl [instance] tls import-server-key-cert [-h] cert_path key_path

       cert_path
              The path to the x509 cert to import as Server-Cert

       key_path
              The path to the x509 key to import associated to Server-Cert

OPTIONS 'dsctl tls remove-cert'

       usage: dsctl [instance] tls remove-cert [-h] nickname

       nickname
              The name of the certificate to delete

OPTIONS 'dsctl healthcheck'

       usage: dsctl [instance] healthcheck [-h]

OPTIONS 'dsctl get-nsstate'

       usage: dsctl [instance] get-nsstate [-h] [--suffix SUFFIX] [--flip FLIP]

       --suffix SUFFIX
              The DN of the replication suffix to read the state from

       --flip FLIP
              Flip between Little/Big Endian, this might be required for certain
              architectures

       -v, --verbose
              Display verbose operation tracing during command execution

       -j, --json
              Return result in JSON object

       -l, --list
              List available Directory Server instances

AUTHORS

       lib389 was written by Red Hat Inc. <389-devel@lists.fedoraproject.org>.

DISTRIBUTION

       The        latest        version        of        lib389        may        be       downloaded       from
       http://www.port389.org/docs/389ds/FAQ/upstream-test-framework.html

                                                     Manual                                             dsctl(8)