skip to main content

Utilities : JUTIL

JUTIL
The JUTIL utility manages JISAM files.
Usage:
jutil [-e=encryptionKey]
      -info jisamFile [-x]
      -load jisamFile sequentialFile [A|U]
      -unload jisamFile sequentialFile
      -loadtext jisamFile sequentialFile [A|U]
      -unloadtext jisamFile sequentialFile
      -loadr2 jisamFile sequentialFile [A|U]
      -rebuild jisamFile [A] [F]
      -makeimg jisamFile imageString
      -gen [fileList outputDirectory]
Where:
encryptionKey is the key to decrypt encrypted files.
jisamFile is the name of the JISAM file to which the utility refers.
sequentialFile is the name of a binary or line sequential file.
imageString is a sequence of digits
fileList is a text file.
outputDirectory is an existing and writable directory.
Note - JUTIL doesn’t support files whose record is larger than 64KB.
JUTIL Commands:
JUTIL has a number of useful options:
Imports data from sequentialFile to jisamFile. JisamFile must exist. The data read from sequentialFile is appended to the existing records in JisamFile. If a unique key violation occurs, then the third parameter is evaluated. If “U” was passed, then the record is rewritten, otherwise the duplicated record read from sequentialFile is skipped.
Exports data from jisamFile to sequentialFile. If sequentialFile exists, it is overwritten.
Imports data from line sequentialFile to jisamFile. jisamFile must exist. The data read from sequentialFile is appended to the existing records in JisamFile. If a unique key violation occurs, then the third parameter is evaluated. If “U” was passed, then the record is rewritten, otherwise the duplicated record read from sequentialFile is skipped.
Exports data from jisamFile to line sequentialFile. If sequentialFile exists, it is overwritten.
Imports data from the sequentialFile generated by Recover2 RM utility to the jisamFile. jisamFile must exist. The data read from sequentialFile is appended to the existing records in JisamFile. If a unique key violation occurs, then the third parameter is evaluated. If “U” was passed, then the record is rewritten, otherwise the duplicated record read from sequentialFile is skipped.
Compresses jisamFile by removing deleted records.
Working on Encrypted Files
When processing an encrypted file, the -e option must be used along with the other options to specify the encryption key. For example, the following command unloads the content of an encrypted file with the key "i5C0B0L":
Note - Rebuilding (-rebuild) or shrinking (-shrink) a file with the wrong encryption key may garble the file content permanently. Pay particular attention when you use -rebuild and -shrink on encrypted files.
Image String format
The image string has the following format:
Where:
MaxRecSize is a five-digit number representing the maximum record length.
MinRecSize is a five-digit number representing the minimum record length.
NumKeys is a three-digit number representing the number of keys in the file.
NumSegs is a two-digit number representing the number of segments in a key.
Dups is a one-digit number representing the duplicate flag of a key. 0 means that duplicates are not allowed, 1 means that duplicates are allowed.
SegSize is a three-digit number representing the size of a segment in a key.
SegOffset is a five-digit number representing the offset of a segment in a key.
 
SegSize and SegOffset are repeated for each segment of the key
NumSegs, Dups and segments description are repeated for each key
Note - spaces in are shown to improve readability, they are not part of the format. Fields in the first pair of brackets are repeated for each key, fields in the second pair of brackets are repeated for each segment of the key.
Example - the following string applies to a file with a fixed record length of 108 bytes, a primary key composed by one segment of three bytes and an alternate key with duplicates composed by two segments, the first of two bytes in size and the second of three bytes in size:
Options shortcuts
JUTIL allows to use options thru shortcuts, you don't need to type the whole word, only the first unique bytes are tested.The following table explains which digits are testedby JUTIL when parsing options:
When the first digits of the option you type match with one of the strings in 'digits tested' column, then the corresponding option is checked and, if parameters are wrong or missing, the single option usage is shown.
In the other cases, the whole usage is shown.
Exit Status
JUTIL terminates with one of the following exit status:
Thin Client
JUTIL can be used in thin client environment as well. Use this command to start it:
iscclient -hostname <server-ip> -port <server-port> -utility jutil <arguments>
Server side paths must be used in the arguments.

Copyright (c) 2017 Veryant
Contact us
Please share your comments on this manual or on any
Veryant product documentation with the email button at the top left