The asinfo script allows access to the services port on the server. 
This allows the user to query the server for any statistics available, 
and set any dynamic configuration values. This list is extensive, 
please contact support for a full list. 

Usage: asinfo [OPTIONS]
  -h HOST, --host HOST  server host name (default: 127.0.0.1)
  -p PORT, --port PORT  server port (default: 3000)
  -t TLS_NAME, --tls_name TLS_NAME
                        TLS name of host to verify for TLS connection. It is
                        required if tls_enable is set.
  -U USER, --user USER  user name
  -P [PASSWORD], --password [PASSWORD]
                        password
  -v VALUE, --value VALUE
                        fetch single value (default all)
  -l, --lineseperator   print in seperate lines (default: False)
  -u, --usage           show program usage
  --tls_enable          Enable TLS on connections. By default TLS is disabled.
  --tls_encrypt_only    Enable mode to only encrypt connections, so
                        connections won't verify certificates.
  --tls_cafile TLS_CAFILE
                        Path to a trusted CA certificate file.
  --tls_capath TLS_CAPATH
                        Path to a directory of trusted CA certificates.
  --tls_protocols TLS_PROTOCOLS
                        Specifies enabled protocols. This format is the same
                        as Apache's SSLProtocol documented at https://httpd.ap
                        ache.org/docs/current/mod/mod_ssl.html#sslprotocolIf
                        not specified (NULL) the client will use '-all
                        +TLSv1.2' if installed OpenSSL module supports
                        TLSv1.2,otherwise it will be '-all +TLSv1'.
  --tls_cipher_suite TLS_CIPHER_SUITE
                        Specifies enabled cipher suites. The format is the
                        same as OpenSSL's Cipher List Format documented at htt
                        ps://www.openssl.org/docs/man1.0.1/apps/ciphers.html
  --tls_keyfile TLS_KEYFILE
                        Path to the client's key for mutual authentication (if
                        Aerospike Cluster is supporting it).
  --tls_certfile TLS_CERTFILE
                        Path to the client's chain file for mutual
                        authentication (if Aerospike Cluster is supporting
                        it).
  --tls_cert_blacklist TLS_CERT_BLACKLIST
                        Path to a certificate blacklist file. The file should
                        contain one line for each blacklisted certificate
                        entry. Each line starts with the certificate serial
                        number expressed in hex. Each entry may optionally
                        specify the issuer name of the certificate (serial
                        numbers are only required to be unique per
                        issuer).Example: 867EC87482B2
                        /C=US/ST=CA/O=Acme/OU=Engineering/CN=TestChainCA
  --tls_crl_check       Enable CRL checking for the certificate chain leaf
                        certificate. An error occurs if a suitable CRL files
                        cannot be found in tls_capath.
  --tls_crl_check_all   Enable CRL checking for the entire certificate chain.
                        An error occurs if a suitable CRL files cannot be

Here are some basic commands that are often used:

This command lists all the nodes listed as available for this node
in it's services list

	asinfo -v 'services'

This queries for information on the namespace named "users":

	asinfo -v 'namespace/users' 

This command queries for the same information as above, 
but on a remote node specified by -h and on port 3000 specified by -p:

	asinfo -h 192.168.120.101 -p 3000 -v 'namespace/users'

This command queries for the same information as above,
but on a remote node and tls connection enabled:

	asinfo -h 192.168.120.101 -p 3000 -t t3.t-cluster.aerospike.com --tls_enable --tls_cafile ~/x509_certificates/Platinum/cacert.pem -v 'namespace/users'

