We Succeed When We Succeed Together
I have had some time to reflect on my values. I have always known that I think values are important but I did realise in the lagets time how important they were for me.
I have had some time to reflect on my values. I have always known that I think values are important but I did realise in the lagets time how important they were for me.
I listened on a pod this morning which was about cybersecurity threats today versus threats 10 years ago. I started to think of how it was to work with IT for twenty years ago versus today. I think i will write an article of it and publish here in a couple of days.
I am migration (reviving) the old blog. I have converted and bropught some of my old posts with me. It feels better not to start with a blank slate. Some of it is really old and might be outdated.
After last post we copy all backup files from the source to the destination. If all files is on the destination server we can now restore them into a database to complete the log shipping. I will not write about the functions that is the same in both files such as Import-MyModule. See last blog post if you have not read it.
This is a two-part blog post. The second part will be published within a week. The script was created a while ago and has some minor updates.
The need was found to have two database servers very similar, without a license for SQL Log shipping. We could use existing backups, as we did a log backup each hour, and copy them to another server for restoration. The process turned out to be more complex than anticipated, especially with SQL clusters.
I wanted to be able to search for a VM and get the free space on the LUN used for that VM. I put out some other data as well…
The customer has clients with locally stored application files. The files are from an earlier application and should not be used anymore. I needed to verify that the application files was removed from the clients. I did not want to walk to each 500+ clients so I created a small script to use “test-path” to see if the files were removed and then summarise it.
Last post we created a database and updated ci:s into it. Now we will continue to add data that will be used for billing.
This is a two blog post divided into two posts. The second will be published within a week from this one.
Today we lack information about virtual servers in our VMware environment which cause problems within each billing period with manual labour of verifying disk size, memory and cpu of each VM. With little to no money we needed a way to inventory and save the information for others to use and present it on a website.
If you have setup something in an Linux environment you have most likely done some troubleshooting. The command tail -f [path] is very convenient command. I had no idea that a similar existed on Windows until recently. In powershell to read a file, the command Get-Content is very neat. I had no idea that with “-wait” you could get the same result as in “-f” in tail. Very handy for parsing Windows firewall logs.