PoshCode Archive  Artifact [22660f3570]

Artifact 22660f3570f9266c08a15dcc88f0982cc9b6f9d1dc084c2350f179f5e4766b9a:

  • File Monitor-ESX-with-WS-MAN.ps1 — part of check-in [75ac63ac66] at 2018-06-10 14:26:21 on branch trunk — This script shows how to monitor ESX with PowerShell v2 CTP3’s new WSMan cmdlets. (user: unknown size: 2312)

# encoding: ascii
# api: powershell
# title: Monitor ESX with WS-MAN
# description: This script shows how to monitor ESX with PowerShell v2 CTP3’s new WSMan cmdlets.
# version: 0.1
# type: function
# license: CC0
# function: Get-VMHostWSManInstance
# x-poshcode-id: 903
# x-derived-from-id: 928
# x-archived: 2011-02-21T09:18:55
#
#
# WS-MAN monitoring of ESX with PowerShell.
# This requires PowerShell v2 CTP3 and requires the new WS-MAN CTP
# from MS (currently 64 bit only)
# You will also need to allow basic auth.
# (run winrm set winrm/config/client/auth @{Basic="true"} from command prompt)
function Get-VMHostWSManInstance {
	param (
	[Parameter(Mandatory=$TRUE,HelpMessage="VMHosts to probe")]
	[VMware.VimAutomation.Client20.VMHostImpl[]]
	$VMHost,

	[Parameter(Mandatory=$TRUE,HelpMessage="Resource URI")]
	[string]
	$resourceUri,

	[switch]
	$ignoreCertFailures
	)

	if ($ignoreCertFailures) {
		$option = New-WSManSessionOption -SkipCACheck -SkipCNCheck -SkipRevocationCheck
	} else {
		$option = New-WSManSessionOption
	}
	foreach ($H in $VMHost) {
		$hView = $H | Get-View -property Value
		$ticket = $hView.AcquireCimServicesTicket()
		$password = convertto-securestring $ticket.SessionId -asplaintext -force
		$credential = new-object -typename System.Management.Automation.PSCredential -argumentlist $ticket.SessionId, $password
		$uri = "https`://" + $h.Name + "/wsman"
		Get-WSManInstance -Authentication basic -ConnectionURI $uri -Credential $credential -Enumerate -Port 443 -UseSSL  -SessionOption $option -ResourceURI $resourceUri
	}
}

# Example
# First, connect to your VI Server.
# Connect-VIServer <your ESX or VC>

# Now we're ready to enumerate stuff. This will get processor
# information for all hosts.
# Get-VMHostWSManInstance -VMHost (get-vmhost) `
#   -resourceUri http`://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/CIM_Processor `
#   -ignoreCertFailures

# Other resource URIs of note
# http`://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/CIM_Chassis
# http`://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/CIM_Processor
# http`://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/CIM_Memory
# http`://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/CIM_SoftwareElement
# Some of these may not be supported on your hardware.