A simple request, to POST data (in this case, a .csv) to an API endpoint; how hard can it be right?
Well, after scouring StackOverflow, Reddit, PowerShellBros and many other great, go-to sources of mine — I was stuck. Yes, there are functions that suffice the upload of some content to API endpoints, but nothing for my use case.
I was almost ready to throw in the towel and use cURL (which is native to Windows 10) when I read over the Invoke-RestMethod documentation once more. In PowerShell 6.10, the -Form parameter was introduced. …
There are many reasons an ARM (Azure Resource Manager) template is useful. For me, it’s about producing Repeatable Results. Business is driven by producing consistent, repeatable results. Where would we be without templates? Take a look around you, the chair your sitting on right now was likely created using die casts, the glass you drink from made using molds — everything is made using some kind of template. That’s what an ARM template is. It’s Azure’s very own answer to the die cast.
So what can we actually do with these templates? Looking at the Azure Quickstart Templates is a sure fire way to see just how limitless the potential of these are. For me, I’ve used them recently to simplify the deployment of new DNS Zones. …
After receiving a surprisingly positive response (thank you!) to my first PowerShell tips article — Level Up your Powershell with five tips in five minutes!, I’ve decided to release another short article with five more. If you haven’t read my first article, be sure to check it out.
As engineers, we’re fortunate enough to have the most diverse tool in Microsoft administration right at our fingertips. With these 5 tips, you’ll start to understand just how easily you can leverage PowerShell to your advantage in your daily operations.
Instead of a convoluted and messy block of code as below:
$files = Get-ChildItem -Path C:\Temp\* -Include *.txt …
Picture this, you wake up Monday morning — primed and ready for another week of work. You login, warm cup of coffee by your side and find that nothing is working. You can’t access your client database, or your website. Instead of being met with a productive day, you’re met with a popup telling you to fork over $10,000 in BTC or you can say goodbye to months, even years of work.
Enter Ransomware, this nasty little piece of software is commonly used to encrypt files with an indecipherable password. Unfortunately for you, once you’ve fallen victim to this attack, it’s too late. …
About