tmsh::argv¶
Description¶
Contains the list of argument values. The first item in tmsh::argv
is always the name of the script. You can create an alias for the
command run cli script
“”name””
using the cli alias component.
Examples¶
proc script::run {} {
{ for { set idx 1 } { $idx < $tmsh::argc } { incr idx } {
lappend ::pool_ids [lindex $tmsh::argv $idx]
}
}
Sample Code¶
- Citrix Monitor for XenApp or XenDesktop - Creates an LTM monitor for Citrix XenApp or XenDesktop
- Citrix Xen Desktop Monitor - A tmsh Citrix Xen Desktop Monitor
- Config Search - Here’s a way to search the configuration using a custom tmsh script. This searchs all properties of all config objects (assuming you specify all-properties). including the name of the objec…
- Create LTM Virtuals - This example shows how to automate virtual server creation with tmsh scripting.
- Create LTM Pool Members - This example shows how to automate pool member creation with tmsh scripting.
- Delete LTM Pools - This example shows how to remove any pool members beginning with a given string. automatically.
- LTM Pool Status - Here’s a way to display the status of your pool members using a custom tmsh script.
- Remove iRule From Multiple Virtual Servers - Remove iRules from Multiple virtual servers. This script will search through the BIG-IP virtual servers for the specified iRule and remove it from the virtual server (not from the system)
- Show Interface Bit Rate Statistics -
- Show Pool Stats - Here’s a way to monitor a specified pool’s stats using a custom tmsh script.
- Toggle Virtual Address ARP - Toggle ARP for all the virtual addresses on an LTM
- Watch Command - Repeat any show command a specified number of times at a specified interval
Introduced: BIGIP-10.1
Note
For the full traffic management shell reference, see F5 TMSH Reference
The BIG-IP API Reference documentation contains community-contributed content. F5 does not monitor or control community code contributions. We make no guarantees or warranties regarding the available code, and it may contain errors, defects, bugs, inaccuracies, or security vulnerabilities. Your access to and use of any code available in the BIG-IP API reference guides is solely at your own risk.