Enter this in the search box along with your search terms:
Get all gists from the user santisbon.
user:santisbon
or
user:@me
Find all gists with a .yml extension.
extension:yml
| When invoking from PowerShell, you can pass a stream of file names in a pipeline as follows: | |
| ls VP_CLIENT/*.sql -rec | select -expand FullName | py ../InternalTools/Export-VP_DDL/fix-anonymous-sequences.py | |
| (The ``select -expand`` is key -- The list of filenames will appear on this script's stdin as lines of text.) |
| # ls *.xml | % {[xml] $xml = cat $_; $xml.Cloud["Cloud.Tabls"].Tables.CloudTable | % { [PSCustomObject] @{ Server = $_["CloudTable.ConnectionProperties"].SqlServerConnectionProperties.Server; Database = $_["CloudTable.ConnectionProperties"].SqlServerConnectionProperties.Database}}} | |
| ls .\*.xml ` | |
| | % {[xml] $xml = cat $_; # Cast to [xml] magically parses XML text into an XmlElement (document). | |
| # $xml | gm # Then you just have to navigate the various children and attributes. | |
| $xml.Cloud["Cloud.Tables"].Tables.CloudTable ` | |
| | % { | |
| # $_ | gm | |
| [PSCustomObject] @{ # Cast to [PSCustomObject] "magically" turns a hash into an object w/hash key-value pairs as properties. | |
| Server = $_["Clou |
| # Wrap your entire script in a try-catch block: | |
| try { | |
| # Do stuff | |
| } | |
| catch { | |
| Write-Error ("{0}`n{1}" -f $_, $_.ScriptStackTrace) | |
| } |
| get-service sisense* | select Status,Name,StartType | ft -au -wr | |
| Get-CimInstance -ComputerName p8SisMnWeb01s,p8SisMnWeb02s,p8SisMnWeb03s -ClassName Win32_Service ` | |
| | ? {$_.Name -match 'sisense.*'} ` | |
| | select PSComputerName,State,ProcessID,Name,StartMode,StartName ` | |
| | sort PSComputerName,Name ` | |
| | ft -au -wr | |
| ps *Sisense*,*Elasticube* | select ProcessName,StartTime,Path,Description | sort StartTime -desc | ft -au -wr | |
Enter this in the search box along with your search terms:
Get all gists from the user santisbon.
user:santisbon
or
user:@me
Find all gists with a .yml extension.
extension:yml
| <# | |
| .SYNOPSIS | |
| Process pipeline junk | |
| .DESCRIPTION | |
| Longer description of script/cmdlet/function goes here. | |
| .EXAMPLE | |
| Sample usages, if helpful. Can be repeated for multiple examples. | |
| .NOTES | |
| [Stuff of interest not necessarily required as part of Description section. Could maybe put futures/todos here. | |
| ls $src | ? {$_.LastWriteTime -ge (Get-Date).AddMinutes( -5)} | cp -dest $dest -for -pass |
| # Hash table syntax is @{ name = value; name = value; ... } -- Curly braces and semicolons | |
| $map = @{ key1 = "value1"; key2 = 3.14 } | |
| echo $map.key1 # "value1" | |
| echo $map["key2"] # 3.14 | |
| # Coerce it to a new object | |
| [PSCustomObject] $map | |
| # Btw, you can SELECT a "calculated property" (or synthetic property, if that's how your brain works): |
| import os | |
| import yaml | |
| import logging.config | |
| import logging | |
| import coloredlogs | |
| def setup_logging(default_path='logging.yaml', default_level=logging.INFO, env_key='LOG_CFG'): | |
| """ | |
| | **@author:** Prathyush SP | |
| | Logging Setup |
| <# | |
| This might help in finding that pesky windows service that's always locking you out when you change your password and reboot. | |
| #> | |
| # ft is Format-Table; -auto is auto column width; -wrap is wrap text if necessary | |
| Get-WmiObject win32_service | sort startname,startmode,state,displayname | select StartMode,State,StartName,DisplayName | ft -auto -wrap | |
| # Or you can select only certain services. | |
| # '?' is 'where' alias; -match uses regular expressions; -not is (obviously) a 'not' operator. | |
| Get-WmiObject win32_service | ? {-not ($_.state -match 'running')} | sort startname,displayname | select StartMode,State,StartName,DisplayName | ft -auto -wrap |