posts-powershell

Categories

Tags

Administration agent-based monitoring Agentless Monitoring alert responses alert thresholds alerting Alerts Amazon Aurora Amazon EC2 Amazon RDS Amazon RDS / Aurora Amazon RDS for SQL Server Amazon Redshift Amazon S3 Amazon Web Services (AWS) Analytics application monitoring Aqua Data Studio automation availability Azure Azure SQL Database azure sql managed instance Azure VM backup Backup and recovery backup and restore backup compression backup status Backup Strategy backups big data Blocking bug fixes business architecture business data objects business intelligence business process modeling business process models capacity planning change management cloud cloud database cloud database monitoring cloud infrastructure cloud migration cloud providers Cloud Readiness Cloud Services cloud storage cloud virtual machine cloud VM clusters code completion collaboration compliance compliance audit compliance audits compliance manager compliance reporting conference configuration connect to database cpu Cross Platform custom counters Custom Views customer survey customer testimonials Dark Theme dashboards data analysis Data Analytics data architect data architecture data breaches Data Collector data governance data lakes data lineage data management data model data modeler data modeling data models data privacy data protection data security data security measures data sources data visualization data warehouse database database administration database administrator database automation database backup database backups database capacity database changes database community database connection database design database developer database developers database development database diversity Database Engine Tuning Advisor database fragmentation database GUI database IDE database indexes database inventory management database locks database management database migration database monitoring database navigation database optimization database performance Database Permissions database platforms database profiling database queries database recovery database replication database restore database schema database security database support database synchronization database tools database transactions database tuning database-as-a-service databases DB Change Manager DB Optimizer DB PowerStudio DB2 DBA DBaaS DBArtisan dBase DBMS DDL Debugging defragmentation Demo diagnostic manager diagnostics dimensional modeling disaster recovery Download drills embedded database Encryption End-user Experience entity-relationship model ER/Studio ER/Studio Data Architect ER/Studio Enterprise Team Edition events execution plans free tools galera cluster GDPR Getting Started Git GitHub Google Cloud Hadoop Healthcare high availability HIPAA Hive hybrid clouds Hyper-V IDERA IDERA ACE Index Analyzer index optimization infrastructure as a service (IaaS) infrastructure monitoring installation Integrated Development Environment interbase Inventory Manager IT infrastructure Java JD Edwards JSON licensing load test load testing logical data model macOS macros managed cloud database managed cloud databases MariaDB memory memorystorage memoryusage metadata metric baselines metric thresholds Microsoft Azure Microsoft Azure SQL Database Microsoft PowerShell Microsoft SQL Server Microsoft Windows MongoDB monitoring Monitoring Tools Monyog multiple platforms MySQL news newsletter NoSQL Notifications odbc optimization Oracle PeopleSoft performance Performance Dashboards performance metrics performance monitoring performance schema performance tuning personally identifiable information physical data model Platform platform as a service (PaaS) PostgreSQL Precise Precise for Databases Precise for Oracle Precise for SQL Server Precise Management Database (PMDB) product updates Project Migration public clouds Query Analyzer query builder query monitor query optimization query performance Query Store query tool query tuning query-level waits Rapid SQL rdbms real time monitoring Real User Monitoring recovery regulations relational databases Releases Reporting Reports repository Restore reverse engineering Roadmap sample SAP Scalability Security Policy Security Practices server monitoring Server performance server-level waits Service Level Agreement SkySQL slow query SNMP snowflake source control SQL SQL Admin Toolset SQL CM SQL code SQL coding SQL Compliance Manager SQL Defrag Manager sql development SQL Diagnostic Manager SQL Diagnostic Manager for MySQL SQL Diagnostic Manager for SQL Server SQL Diagnostic Manager Pro SQL DM SQL Doctor SQL Enterprise Job Manager SQl IM SQL Inventory Manager SQL Management Suite SQL Monitoring SQL Performance SQL Quality SQL query SQL Query Tuner SQL Safe Backup SQL script SQL Secure SQL Security Suite SQL Server sql server alert SQL Server Migration SQL Server Performance SQL Server Recommendations SQL Server Security SQL statement history SQL tuning SQL Virtual Database sqlmemory sqlserver SQLyog Storage Storage Performance structured data Subversion Support tempdb tempdb data temporal data Tips and Tricks troubleshooting universal data models universal mapping unstructured data Uptime Infrastructure Monitor user experience user permissions Virtual Machine (VM) web services webinar What-if analysis WindowsPowerShell

Finding IP Addresses

Sometimes, classic tools like ipconfig.exe can yield useful information that you'd like to integrate with PowerShell. Here is sample code that...

Calculate Total Folder Size

Here is a useful function that you can use to calculate the total size of a folder: function Get-FolderSize($path) { Get-ChildItem $path -Recurse...

Use WMI to Create Hardware Inventory

You can use Get-WMIObject to create a high-level hardware report. Instead of submitting a specific device class name, you should use a generic...

Remove Keys From a Hash Table

Once you create a hash table, it is easy for you to add new key-value pairs like this: PS > $myHash = @{} PS > $myHash.Name = 'Tobias'...

Copy Registry Hives

You can use Copy-Item to quickly copy entire structures of registry keys and sub-keys in a matter of milliseconds. Take a look at this example...

Getting Full Admin Privileges

You may sometimes get "Access Denied" exceptions, even though  you have Admin privileges and used an elevated shell. For ...

RegEx Magic

The [RegEx] type has a method called Replace(), which can be used to replace text by using regular expressions. This line would replace the last...

Find Dependent Services

If you would like to check the implications of stopping  a service, you should have a look at its dependent services: (Get-Service...

Restart required

Check out this line to determine when an installation required a system restart: Get-EventLog -InstanceId 1038 -LogName Application | ForEach-Object...

Finding multiple RegEx matches

In a previous tip, you learned that Select-Object can find multiple matches. Here is a function called matches. You can submit a regular expressions...

Find multiple matches

When you want to find matches based on regular expressions, PowerShell will only support the -match operator which finds the first match. There does...

Translate EventID to InstanceID

Sometimes, you may need to have the event ID for a system event, though what you really need is the instance ID. For example, Get-EventLog will only...

Windows license validation

Search for the appropriate events in your event log to discover when Windows has validated your license: get-eventlog -LogName Application...

Analyze automatic defragmentation

Check out this line to visualize when your system defragmented your hard drives: get-eventlog -LogName Application -InstanceId 258 | ForEach-Object...

Find system restore points

Windows Update and Software installations will frequently create system restore points. Run this to get a list of such events: Get-EventLog -LogName...

Secret history shortcut

PowerShell will keep a history of the commands you entered and then you can list the history with Get-History, configuring the maximum length of...

Error handling for native commands

When you need to handle errors created by native commands, you can use a wrapper function like Call. It will automatically discover when a native...

Calculate time zones

If you need to find out the time in another time zone, you can convert your local time to Universal Time and then add the number of offset hours to...

Checking all event logs

What if you would like to get a quick overview of all error events in any event log. Get-EventLog can only query one event log at a time. So, you...

Creating IP segment lists

If you need a list of consecutive IP addresses, you can check out this function. You can see that it takes a start and an end address and then...

Getting significant bytes

If you need to split a decimal into bytes, you can use  a function called ConvertTo-HighLow, which uses a clever combination of type casts to...

Test Internet connection

Try this line if you would like to know whether a machine is currently connected to the Internet:...

Splitting hex dumps

Imagine you have a text string with a hex dump so that each hex number consists of two characters. How would you split this into individual hex...

Finding new processes

Get-Process will return a list of all processes. If you just want to see those started within the last 10 minutes, you can check StartTime. Both...

Load registry user hive

If you need to manipulate registry data from another user, you may be out of luck because HKEY_CURRENT_USER always points to your own user data....

Dump enumerations

You can create a simple helper function called Get-Enum  to list all the values in an enumeration: function Get-Enum($name){...

Compare services on two computers

Ever wondered why one computer runs well and another does not? Here is an example of how you can compare service configuration on two machines as...

1 72 73 74 75 76 95