To wrap up multiple pieces of information, you best store them in custom objects. The easiest and fastest way is to use the PSCustomObject:...
database-tools
Exploiting Your Command History
PowerShell “records” all your interactive command input to its command history, and Get-History shows them. If you played around with...
HOWTO – Monitor MS-SQL Clusters and Always-On Availability Groups
Problem: Monitoring a traditional Microsoft SQL Server cluster, one that typically has 1 active and 1 passive node, is a challenge because at any...
Getting Latest PowerShell Gallery Module Version
On www.powershellgallery.com, Microsoft hosts a public script and module repository where you can exchange PowerShell code with others (see more on...
Testing Files and Folders (separately)
Test-Path is highly useful to test whether a file or folder exists, and it can be used with any of the PowerShell drives, so it can also test...
Getting Help for Cmdlet Parameters
There seems to be a bug in PowerShell 5.0 that limits the usefulness of the built-in help window. Whenever you run Get-Help with -ShowWindow, the...
Updating PowerShell Help with One-Liner
To get the most out of PowerShell, you should at least update PowerShell help once. This downloads and installs the base set of help files that show...
Getting IntelliSense for Cmdlet (PowerShell ISE)
If you’re reviewing some PowerShell code loaded into the PowerShell ISE, it’s really simple to get additional information. Click the...
TOP IT HORROR STORIES AND HOW TO SURVIVE THEM
Tis the season for spooks and spoils so to get in the spirit here is a cauldron of scary, strange and sometimes humorous tales gathered from the...
Downloading Pictures from Website
There are awesome websites out there, and one is www.metabene.de (at least for German visitors)-- on 33 pages, the artist presents his drawings for...
Simple Strategy for Cmdlet Error Reporting
In PowerShell, you can create complex error handlers but sometimes you might just want to know what went wrong so you can log it. No overkill...
Check File Names for Illegal Characters
File names are quite sensitive and may not contain a number of reserved characters. To validate file names and make sure they are legal, here is a...
Finding Illegal Characters in Paths (File System)
Previously we illustrated how you can use a simple RegEx-based approach to find illegal characters in strings. We encourage you to expand this...
RETRIEVE ALERT STATISTICS SQL DM
Dear All, I am trying to understand if there is a procedure to retrieve alert stats from past one month. scenario : lets say we are...
Finding Multiple Illegal Characters
Previously, we illustrated how to use the -match operator to find illegal characters in a text. The -match operator finds only the first match,...
Must Have DBA Resource: 5 Costly DBA Mistakes
We've has published many popular white papers that have become the go-to guide on best practices and insider reports for database...
Checking Email Addresses (and Other Text) for Illegal Chars
Here is a quick approach to do sanity checks and validate data. Let’s assume you’d like to find out whether an email address contains...
PowerShell Remoting and HTTP 403 Error
If you use PowerShell remoting and get “HTTP 403” errors, one of the more obscure reasons for this is a proxy that interferes with your...
Index Insanity: How to Avoid Database Chaos
Index Insanity: How to Avoid Database Chaos In early October, Oracle ACE and IDERA senior product manager Bert Scalzo joined Dr. Robin Bloor and Dez...
Enabling CredSSP Trust from One Side
As previously shown, CredSSP can be used to remote code without double hop issues. To use CredSSP authentication, though, you need to make...
Solving Double Hop Remoting with CredSSP
In a previous tip we illustrated the double hop problem that can occur in remoting when your remote code tries to authenticate against a third...
ER/Studio Model Repository Database Sizing Guide for Oracle Database
Howdy! In a previous article, I showcased on how to implement table statistics and Index Re-orgs in SQL Server for the Model...
Understanding the Double-Hop Problem in Remoting
Whenever you execute PowerShell code remotely with Invoke-Command, your credentials are locked to the machine you initially contacted. PowerShell...
Finding Hidden Autostart Programs
Ever wondered why some programs launch whenever you log into Windows? Here’s a one liner listing autostarts that affect your login: #requires...