Earlier this month Powershell 7 went GA and it is a new major release 2 years after the previous one. I always think that whenever a new major version is out it is definitely time to install it.
What I generally do and suggest everybody do the same is to look at the new features, at the deprecated ones if any and most importantly to see what’s the impact or implications for the code that I will consider to run on PowerShell core in this case. Continue reading “Powershell 7 is out. Haven’t you installed it yet?”
Monitoring is an important activity in IT operations, it’s essential for correlating the state of all the moving parts of our systems and applications and create a big picture of the health of the whole environment. Before going down the rabbit hole of complicated monitoring tools and techniques let’s start with define a that monitoring can be subjective and on a case-by-case can be very basic or detailed and can let you choose a specific tool or strategy. There is no one-size-fits-all. This week I needed to implement a custom check to monitor the network load/usage on any Windows OS and instead of looking for a third-party tool and deploying maybe another agent on servers I wrote a Powershell script to perform this activity.
Continue reading “Monitoring the Network Load with Powershell”
I started reading this book during the holiday season with high expectations after reading The Phoenix Project a couple of years ago.
I must admit, I recognize myself at least in a couple of characters (Brett and Maxine) of this novel and a couple of my professional experiences are in some sort described in this book.
Continue reading “Book Review: The Unicorn Project by Gene Kim”
Last December NIST announced this vulnerability CVE-2019-19781 and soon after that Citrix published this page CVE-2019-19781 – Vulnerability in Citrix Application Delivery Controller, Citrix Gateway, and Citrix SD-WAN WANOP appliance and released a verification tool supporting clients for finding out if they were vulnerable or not: CVE-2019-19781 – Verification Tool
A verification tool is addressed to an IT specialist who works these solutions and needs to quickly assess if the software or appliance is affected by this vulnerability. Continue reading “Comparing Citrix CVE Verification Tool to a one-liner bash script”