View Only
  • 1.  Executing .CFG files via Putty/SSH

    Posted Thu June 01, 2023 01:02 PM

    How do we execute .CFG files using SSH/Putty? It appears that clients are now using this technique to deploy objects into the DataPower appliances using scripts.

    1. how is the username and password conveyed to the ssh/putty session? When logging on to the DataPower CLI, it prompts for the username twice?
    2. how is the domain conveyed to the ssh/putty session? 



    Paul Dango

  • 2.  RE: Executing .CFG files via Putty/SSH

    IBM Champion
    Posted Thu June 01, 2023 03:21 PM


    Once on the command line, you just use the CLI "exec" command like so:

    exec config:///MyConfigFile.cfg

    Of course, it doesn't have to be located in "config", but wherever you put it.

    Not sure what your SSH problem might be.  Are you trying to SSH in manually to run the CFG file, or through some kind of code?

    FWIW:  KumbaSoft's DPAA will connect to SSH and aggregate such commands across appliances.

    Joseph Morgan

  • 3.  RE: Executing .CFG files via Putty/SSH

    Posted Fri June 02, 2023 01:52 AM
    I think the requirement to use SSH/Putty is quite restrictive.  I think it should not be limited to just scripts script in general.  I've just conferred with another IBM DataPower SME who have implemented the solution using XMI , and it has worked with great results.

  • 4.  RE: Executing .CFG files via Putty/SSH

    Posted Fri June 02, 2023 10:13 AM

    PuTTY is just a client that can establish connections to remote servers. In this case you're using PuTTY to establish an SSH session to the DataPower SSH server (a CLI session). When you read "Establish an SSH session", you'll find the answer to you question about the prompts, for this is from this SSH client. Now you might also be interested in "Defining SSH authentication from CLI", where you can configure PuTTY to establish an SSH session to DataPower without prompts.

    As implied, is that this is just establish the SSH session, so the user starts with what's defined by RBM that can control domain and object access. You have the information about how to run a *.cfg file, but you should read up on "Configuration management" because there are considerations with what is the running versus persisted configuration.

    Basically, what's being discussed appears "too manual" for anything that would be considered "business processes" for a company. 

    F Hackerman