LogoLogo
Illumina Connected Software
  • Introduction
  • Get Started
    • About the Platform
    • Get Started
  • Home
    • Projects
    • Bundles
    • Event Log
    • Metadata Models
    • Docker Repository
    • Tool Repository
    • Storage
      • Connect AWS S3 Bucket
        • SSE-KMS Encryption
  • Project
    • Data
      • Data Integrity
    • Samples
    • Activity
    • Flow
      • Reference Data
      • Pipelines
        • Nextflow
        • CWL
        • XML Input Form
        • 🆕JSON-Based input forms
          • InputForm.json Syntax
          • JSON Scatter Gather Pipeline
        • Tips and Tricks
      • Analyses
    • Base
      • Tables
        • Data Catalogue
      • Query
      • Schedule
      • Snowflake
    • Bench
      • Workspaces
      • JupyterLab
      • 🆕Bring Your Own Bench Image
      • 🆕Bench Command Line Interface
      • 🆕Pipeline Development in Bench (Experimental)
        • Creating a Pipeline from Scratch
        • nf-core Pipelines
        • Updating an Existing Flow Pipeline
      • 🆕Containers in Bench
      • FUSE Driver
    • Cohorts
      • Create a Cohort
      • Import New Samples
      • Prepare Metadata Sheets
      • Precomputed GWAS and PheWAS
      • Cohort Analysis
      • Compare Cohorts
      • Cohorts Data in ICA Base
      • Oncology Walk-through
      • Rare Genetic Disorders Walk-through
      • Public Data Sets
    • Details
    • Team
    • Connectivity
      • Service Connector
      • Project Connector
    • Notifications
  • Command-Line Interface
    • Installation
    • Authentication
    • Data Transfer
    • Config Settings
    • Output Format
    • Command Index
    • Releases
  • Sequencer Integration
    • Cloud Analysis Auto-launch
  • Tutorials
    • Nextflow Pipeline
      • Nextflow DRAGEN Pipeline
      • Nextflow: Scatter-gather Method
      • Nextflow: Pipeline Lift
        • Nextflow: Pipeline Lift: RNASeq
      • Nextflow CLI Workflow
    • CWL CLI Workflow
      • CWL Graphical Pipeline
      • CWL DRAGEN Pipeline
      • CWL: Scatter-gather Method
    • Base Basics
      • Base: SnowSQL
      • Base: Access Tables via Python
    • Bench ICA Python Library
    • API Beginner Guide
    • Launch Pipelines on CLI
      • Mount projectdata using CLI
    • Data Transfer Options
    • Pipeline Chaining on AWS
    • End-to-End User Flow: DRAGEN Analysis
  • Reference
    • Software Release Notes
      • 2025
      • 2024
      • 2023
      • 2022
      • 2021
    • Document Revision History
      • 2025
      • 2024
      • 2023
      • 2022
    • Known Issues
    • API
    • Pricing
    • Security and Compliance
    • Network Settings
    • ICA Terminology
    • Resources
    • Data Formats
    • FAQ
Powered by GitBook
On this page
  • Downloading the Installer
  • Version Check
  • Integrity Check
  • Releases

Was this helpful?

Export as PDF
  1. Command-Line Interface

Releases

PreviousCommand IndexNextCloud Analysis Auto-launch

Last updated 3 days ago

Was this helpful?

Find the links to CLI builds in the Releases section below.

Downloading the Installer

In the below, select the matching operating system in the link column for the version you want to install. This will download the installer for that operating system.

Version Check

To determine which CLI version you are currently using, navigate to your currently installed CLI and use the CLI command icav2 version For help on this command use icav2 version -h.

Integrity Check

Checksums are provided alongside each downloadable CLI binary to verify file integrity. The checksums are generated using the SHA256 algorithm. To use the checksums:

  1. Download the CLI binary for your OS

  2. Download the corresponding checksum using the links in the table

  3. Calculate the SHA256 checksum of the downloaded CLI binary

  4. Diff the calculated SHA256 checksum with the downloaded checksum. If the checksums match, the integrity is confirmed.

There are a variety of open source tools for calculating the SHA256 checksum. See the below tables for examples.

For CLI v2.3.0 and later:

OS
Command

Windows

CertUtil -hashfile ica-windows-amd64.zip SHA256

Linux

sha256sum ica-linux-amd64.zip

Mac

shasum -a 256 ica-darwin-amd64.zip

For CLI v2.2.0
OS
Command

Windows

CertUtil -hashfile icav2.exe SHA256

Linux

sha256sum icav2

Mac

shasum -a 256 icav2

Releases

Version
Link
Checksum

2.35.0

2.34.0

2.33.0

2.32.2

2.31.0

2.30.0

2.29.0

2.28.0

2.27.0

2.26.0

2.25.0

2.24.0

2.23.0

2.22.0

2.21.0

2.19.0

2.18.0

2.17.0

2.16.0

2.15.0

2.12.0

2.10.0

2.9.0

2.8.0

2.4.0

2.3.0

2.2.0

2.1.0

2.0.0

Note: To access release history of CLI versions prior to v2.0.0, please see the ICA v1 documentation .

here
Releases section
Mac
sha256
windows
sha256
linux
sha256
Mac
sha256
windows
sha256
linux
sha256
mac
sha256
windows
sha256
linux
sha256
mac
sha256
windows
sha256
linux
sha256
mac
sha256
windows
sha256
linux
sha256
mac
sha256
windows
sha256
linux
sha256
mac
sha256
windows
sha256
linux
sha256
mac
sha256
windows
sha256
linux
sha256
mac
sha256
windows
sha256
linux
sha256
mac
sha256
windows
sha256
linux
sha256
mac
sha256
windows
sha256
linux
sha256
mac
sha256
windows
sha256
linux
sha256
mac
sha256
windows
sha256
linux
sha256
mac
sha256
windows
sha256
linux
sha256
mac
sha256
windows
sha256
linux
sha256
mac
sha256
windows
sha256
linux
sha256
mac
sha256
windows
sha256
linux
sha256
mac
sha256
windows
sha256
linux
sha256
mac
sha256
windows
sha256
linux
sha256
mac
sha256
windows
sha256
linux
sha256
mac
sha256
windows
sha256
linux
sha256
mac
sha256
windows
sha256
linux
sha256
mac
sha256
windows
sha256
linux
sha256
mac
sha256
windows
sha256
linux
sha256
mac
sha256
windows
sha256
linux
sha256
mac
sha256
windows
sha256
linux
sha256
mac
sha256
windows
sha256
linux
sha256
mac
windows
linux
mac
windows
linux