posts-powershell

Categories

Tags

Administration agent-based monitoring Agentless Monitoring alert responses alert thresholds alerting Alerts Amazon Aurora Amazon EC2 Amazon RDS Amazon RDS / Aurora Amazon RDS for SQL Server Amazon Redshift Amazon S3 Amazon Web Services (AWS) Analytics application monitoring Aqua Data Studio automation availability Azure Azure SQL Database azure sql managed instance Azure VM backup Backup and recovery backup and restore backup compression backup status Backup Strategy backups big data Blocking bug fixes business architecture business data objects business intelligence business process modeling business process models capacity planning change management cloud cloud database cloud database monitoring cloud infrastructure cloud migration cloud providers Cloud Readiness Cloud Services cloud storage cloud virtual machine cloud VM clusters code completion collaboration compliance compliance audit compliance audits compliance manager compliance reporting conference configuration connect to database cpu Cross Platform custom counters Custom Views customer survey customer testimonials Dark Theme dashboards data analysis Data Analytics data architect data architecture data breaches Data Collector data governance data lakes data lineage data management data model data modeler data modeling data models data privacy data protection data security data security measures data sources data visualization data warehouse database database administration database administrator database automation database backup database backups database capacity database changes database community database connection database design database developer database developers database development database diversity Database Engine Tuning Advisor database fragmentation database GUI database IDE database indexes database inventory management database locks database management database migration database monitoring database navigation database optimization database performance Database Permissions database platforms database profiling database queries database recovery database replication database restore database schema database security database support database synchronization database tools database transactions database tuning database-as-a-service databases DB Change Manager DB Optimizer DB PowerStudio DB2 DBA DBaaS DBArtisan dBase DBMS DDL Debugging defragmentation Demo diagnostic manager diagnostics dimensional modeling disaster recovery Download drills embedded database Encryption End-user Experience entity-relationship model ER/Studio ER/Studio Data Architect ER/Studio Enterprise Team Edition events execution plans free tools galera cluster GDPR Getting Started Git GitHub Google Cloud Hadoop Healthcare high availability HIPAA Hive hybrid clouds Hyper-V IDERA IDERA ACE Index Analyzer index optimization infrastructure as a service (IaaS) infrastructure monitoring installation Integrated Development Environment interbase Inventory Manager IT infrastructure Java JD Edwards JSON licensing load test load testing logical data model macOS macros managed cloud database managed cloud databases MariaDB memory memorystorage memoryusage metadata metric baselines metric thresholds Microsoft Azure Microsoft Azure SQL Database Microsoft PowerShell Microsoft SQL Server Microsoft Windows MongoDB monitoring Monitoring Tools Monyog multiple platforms MySQL news newsletter NoSQL Notifications odbc optimization Oracle PeopleSoft performance Performance Dashboards performance metrics performance monitoring performance schema performance tuning personally identifiable information physical data model Platform platform as a service (PaaS) PostgreSQL Precise Precise for Databases Precise for Oracle Precise for SQL Server Precise Management Database (PMDB) product updates Project Migration public clouds Query Analyzer query builder query monitor query optimization query performance Query Store query tool query tuning query-level waits Rapid SQL rdbms real time monitoring Real User Monitoring recovery regulations relational databases Releases Reporting Reports repository Restore reverse engineering Roadmap sample SAP Scalability Security Policy Security Practices server monitoring Server performance server-level waits Service Level Agreement SkySQL slow query SNMP snowflake source control SQL SQL Admin Toolset SQL CM SQL code SQL coding SQL Compliance Manager SQL Defrag Manager sql development SQL Diagnostic Manager SQL Diagnostic Manager for MySQL SQL Diagnostic Manager for SQL Server SQL Diagnostic Manager Pro SQL DM SQL Doctor SQL Enterprise Job Manager SQl IM SQL Inventory Manager SQL Management Suite SQL Monitoring SQL Performance SQL Quality SQL query SQL Query Tuner SQL Safe Backup SQL script SQL Secure SQL Security Suite SQL Server sql server alert SQL Server Migration SQL Server Performance SQL Server Recommendations SQL Server Security SQL statement history SQL tuning SQL Virtual Database sqlmemory sqlserver SQLyog Storage Storage Performance structured data Subversion Support tempdb tempdb data temporal data Tips and Tricks troubleshooting universal data models universal mapping unstructured data Uptime Infrastructure Monitor user experience user permissions Virtual Machine (VM) web services webinar What-if analysis WindowsPowerShell

Removing File Extensions (Unsafe)

Some users use Trim() to remove file extensions like this: 'c:\test\file.txt'.Trim('.txt') c:\test\file This seems to work great,...

Finding Useful WMI Classes

To find the most useful WMI classes you can use Get-WmiObject, and let PowerShell provide you with a hand-picked list: Select-XML...

Finding Type Definitions

PowerShell enhances many .NET types and adds additional information. These changes are defined in xml files. To list all .NET types that get...

Analyze Cmdlet Results

There are two great ways to analyze the results a cmdlet returns: you can send the results to Get-Member to get a formal analysis, telling you the...

Listing Process Owners

In a previous tip, you learned that there is a hidden host process named wsmprovhost.exe whenever someone else visits your computer using PowerShell...

Detecting Remote Visitors

Whenever someone connects to your computer using PowerShell remoting, there is a host process called wsmprovhost.exe. You can only see processes...

Echoing The Error Channel

To control which output from a batch file is considered "a result" and which output should rather always be visible to the user, you can...

Make Sure Folder Exists

To ensure that a given folder exists, you can stick to trial-and-error, and hide error messages: New-Item c:\somefolder\anotherfolder\yetanother...

List NTFS Permissions

To view NTFS permissions for folders or files, use Get-Acl. It won't show you the actual permissions at first, but you can make them visible...

Duplicate Output

Sometimes, you may want to store command results in a variable and at the same time, output it to the console. Once you assign results to a...

Multiple Text Replace (Fast)

In a previous tip, we showed you how to replace multiple different characters in a text using the Switch statement. While this works well, it is not...

Speed Up Loops

First, compare these two code samples: $array = 1..10000 Measure-Command { for ($x=0

Set Clipboard

If you are using Windows Vista or better, you can pipe text to clip.exe  to copy it to your clipboard: Dir $env:windir | clip   Here is...

Get-Clipboard

If your PowerShell host uses the STA mode, you can easily read clipboard content like this: function Get-Clipboard { if...

Test for STA mode

By default, the PowerShell console does not use the STA mode whereas the ISE editor does. STA is needed to run Windows Presentation Foundation...

Multiple Text Replace

Imagine that you need to replace a number of different characters in a text. For example, you need to remove special characters or escape something....

Switch Accepts Arrays

Did you know that the Switch statement can accept arrays? Use this sample to translate numbers into words: PS> switch ( 1,5,2,4,3,1 ) { 1 {...

Check For Numeric Characters

Try this if you need to check a single character and find out whether or not it is numeric: PS > [char]::IsNumber('1') True PS >...

Check Array Content With Wildcards

You may know the -contains operator. Try using it to check whether an array contains a specific element: PS > $names = dir $env:windir |...

Re-Assigning Types to Variables

You can no longer assign other types when you strongly type a variable: [Int]$a = 1 $a = 'does not work'   However, you can always...

Generate Random Passwords

In a previous tip, we showed you how to create random passwords. Thanks to your feedback, here is an even shorter version: -join...

Tile Windows

Do you remember the ancient feature where you could tile or cascade all open windows? These features are still available. However, before you try...

Case-Sensitive Hash Tables

PowerShell hash tables are, by default, not case sensitive: PS > $hash = @{} PS > $hash.Key = 1 PS > $hash.keY = 2 PS > $hash.KEY 2 If...

Creating Byte Arrays

You can try this to create a new empty byte array with 100 bytes: $byte = New-Object Byte[] 100   Try this if you need to create a byte array...

Quickly Changing File Extensions

If you want to quickly exchange a file extension to create a "bak" backup version or generate a new file name for output, you should use...

Grouping Files Based On Size

In a previous tip, we showed you how to group using your own criteria. Group-Object can also auto-create hash tables so that you can easily create...

Grouping Using Custom Criteria

Try using Group-Object to group objects by any property: PS> Get-Process | Group-Object -property Company You can also submit a script block and...

Parsing Text-Based Log Files

Extracting useful information from huge text-based log files isn’t necessarily  a difficult task. Check out this line: PS> Get-Content...

1 71 72 73 74 75 95