Solved

Sybase SQL Anywhere ISQL from command line

Posted on 2000-04-26
3
3,448 Views
Last Modified: 2012-08-14
I want to execute ISQL.exe from the command line to execute a
stored procedure.  This is what I have:

c:\sqlany50\win32\isql.exe
-c "ENG=test;DBN=Testdb;UID=User1;PWD=pass"
-d "User1.TestStoredProcedure"

This works fine until it gets to the -d parameter. What do I need to be
able to execute the SP that's in -d ?   Is the -d parameter even correct?
0
Comment
Question by:vd
  • 2
3 Comments
 
LVL 2

Accepted Solution

by:
jkotek earned 50 total points
ID: 2755010
I think there isn't a '-d' switch in SQL Any 5 ISQL.
Use isql.exe -c "" "<sql command>", where <sql command> should be 'call User1.TestStoredProcedure'.
0
 

Author Comment

by:vd
ID: 2755436
With some modification, your answer worked!
I had to put the call User1.TestStoredProcedure
in a separate file (with extension SQL).
So, the <sql command> above became file.sql instead of the actual command.

Is this info. in  the Sybase SQL Anywhere reference manuals somewhere? I could only find vague references to this method of executing SQL ....  
0
 
LVL 2

Expert Comment

by:jkotek
ID: 2767177
I have found this in SQL Any Users Guide - Part 6, Chapter 39, The ISQL utility (or in index ISQL, about/command line)
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Is your phone running out of space to hold pictures?  This article will show you quick tips on how to solve this problem.
This article describes how to reset your Windows 10 password when you've forgotten it.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question