Ioto is a compact device agent that includes an MQTT client, HTTP web
server, HTTP client and integration with AWS IoT. It can run as a stand-
alone as a device agent or the Ioto library can be embedded in
The Ioto web server supports HTTP/1.0, HTTP/1.1, TLS, user
authentication, sessions, chunked transfers, file upload, and security
Ioto normally reads a set of JSON configuration files. It reads the
config.json file for general configuration, the web.json for web server
configuration, auth.json for authentication configuration, and state.json
for persisted device state.
Ioto can trace activities to a file that defaults to 'stdout'. This can
be modified via the --trace command line option.
The --trace option specifies a destination file for trace messages. This
will override the trace property in the Ioto config.json file. The trace
argument syntax is fileName[:types:sources]. The types are a comma
separated list of message types. Valid types include: info, debug, error,
and trace. Sources are the code module names originating the trace
messages. You can use "all" for types and sources to match all
types/sources. You can also use "!type" and "!source" to negate a type or
Ioto responds to the SIGUSR2 signal and increases the trace level.
Run Ioto in the background and detach from the console.
Enable debug tracing. The -T option is an alias for --tracing.
Change to the specified directory before running Ioto.
request and session timeouts.
Run with more verbose tracing.
Output the product version number.
Report bugs to firstname.lastname@example.org.
Copyright (c) Embedthis Software.
ioto June 2022 IOTO(1)
Man(1) output converted with