This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// immuta-tag-hierarchy-extractor.js | |
// Version 8.0 - Multi-format tag hierarchy extractor with CSV and JSON outputs | |
// For use with Immuta Governance interface | |
(function extractImmutaTagHierarchy() { | |
console.log("Starting Immuta Tag Hierarchy extraction..."); | |
// Find the governance section | |
const governanceSection = document.querySelector('[class*="governance"], .governance, div.governance'); | |
if (!governanceSection) { |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[CmdletBinding()] | |
param( | |
[Parameter(Mandatory = $false)] | |
[ValidateSet("Dev", "Prod")] | |
[string]$Env = "Prod", | |
[Parameter(Mandatory = $false)] | |
[string]$DnsServer = "ServerName1", | |
[Parameter(Mandatory = $false)] |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Save this script as Test-gMSAConfiguration.ps1 | |
param( | |
[Parameter(Mandatory = $true)] | |
[string]$gMSAName, | |
[Parameter(Mandatory = $false)] | |
[string]$ServiceName = "", | |
[Parameter(Mandatory = $false)] |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# gMSA Service AutoFix Solution | |
# This script creates a reliable startup fix for services using gMSA accounts | |
# Save as Fix-gMSAService.ps1 | |
param( | |
[Parameter(Mandatory = $true)] | |
[string]$ServiceName, | |
[Parameter(Mandatory = $false)] | |
[int]$StartupDelaySeconds = 120, |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Save this script as Create-gMSAStartupFix.ps1 | |
param( | |
[Parameter(Mandatory = $true)] | |
[string]$ServiceName | |
) | |
# Service startup fix script content | |
$scriptContent = @" | |
# gMSA Service Startup Fix Script |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Save this script as Reset-gMSAServiceCredential.ps1 | |
param( | |
[Parameter(Mandatory = $true)] | |
[string]$ServiceName, | |
[Parameter(Mandatory = $false)] | |
[switch]$SetupAutoRestart = $false | |
) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# autoFailoverMonitor.ps1 | |
# This script monitors the active server for COMException errors in EventLog | |
# and automatically triggers a complete failover cycle when threshold is met. | |
# Enhanced with simplified email reporting capabilities. | |
[CmdletBinding()] | |
param( | |
[Parameter(Mandatory = $false)] | |
[ValidateSet("Dev", "Prod")] | |
[string]$Env = "Dev", |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# COMExceptionEventSimulator.ps1 | |
# This script creates simulated COMException events in the Windows Event Log for testing purposes. | |
[CmdletBinding()] | |
param ( | |
[Parameter(Mandatory = $false)] | |
[int]$EventCount = 3, | |
[Parameter(Mandatory = $false)] | |
[int]$TimeSpanMinutes = 10, |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
param ( | |
[Parameter(Mandatory=$true)] | |
[int]$Days, | |
[Parameter(Mandatory=$false)] | |
[string[]]$LogNames = @("Application", "System"), | |
[Parameter(Mandatory=$false)] | |
[string]$OutputPath = "$env:USERPROFILE\Desktop\COMExceptionEvents.csv" | |
) |