Skip to main content

What Happens Remote, Stays Remote

Ask yourself this question.  Is it better to have one node preform a 1 minute task 10 times or have 10 nodes perform a 1 minute task at the same time?  PowerShell remoting allows you to perform tasks against multiple nodes at once.  A common problem that I find is that IT Pros have a tendency to either not keep remote workloads remote or to try and perform tasks that cannot be completed remotely on remote nodes.  Let’s first take a look at Invoke-Command.

Invoke-Command -ComputerName <# The Remote Client #> -ScriptBlock {
    <# All this executes over there #>
}

Remoting is really not that hard.  You provide Invoke-Command’s –ComputerName parameter with the names of the clients to remote to and everything inside of the –ScriptBlock executes on the remote clients.  Very easy and very cool.  Let’s take a look at a few rules of the road.

  1. The first thing is to do as much as possible on the remote client.  That means put as much code as you can into the –ScriptBlock.  That way you are disrupting someone else’s video gaming experience at work and not your own.  Invoke-Command will reach out to 32 clients at the same time by default.  Take a look at the –ThrottleLimit parameter to adjust this.
  2. The second thing is to return objects.  More accurately, the same kind of object.  This is where having the skill set to create your own custom objects comes into play.  To learn more about the various ways to create an object, take a look at my Advanced Windows PowerShell Scripting training.  You will be interested in the chapter about Advanced Objects
  3. The third thing to remember is that if you need to compare values between different nodes, you must do this from your computer.  These remote sessions do not share information between target nodes so you need to bring that information back to you, make your decision and then act on it.
Enjoy your weekend!


Comments

Popular posts from this blog

How to list all the AD LDS instances on a server

AD LDS allows you to provide directory services to applications that are free of the confines of Active Directory.  To list all the AD LDS instances on a server, follow this procedure: Log into the server in question Open a command prompt. Type dsdbutil and press Enter Type List Instances and press Enter . You will receive a list of the instance name, both the LDAP and SSL port numbers, the location of the database, and its status.

How to run GPResult on a remote client with PowerShell

In the past, to run the GPResult command, you would need to either physically visit this client, have the user do it, or use and RDP connection.  In all cases, this will disrupt the user.  First, you need PowerShell remoting enabled on the target machine.  You can do this via Group Policy . Open PowerShell and type this command. Invoke-Command –ScriptBlock {GPResult /r} –ComputerName <ComputerName> Replace <ComputerName> with the name of the target.  Remember, the target needs to be online and accessible to you.

Where did a User’s Account Get Locked Out?

Updated: May 15, 2015 When this article was originally published, two extra carriage returns were add causing the code to malfunction.  The code below is correct.   My client for this week’s PowerShell class had a really interesting question. They needed to know where an account is being locked out at. OK, interesting. Apparently users hop around clients and forget to log off, leading to eventual lock out of their accounts. The accounts can be unlocked, but are then relocked after Active Directory replication. This problem is solved in two parts. The first one is to modify the event auditing on the network. The second part is resolved with PowerShell. The first part involves creating a group policy that will encompass your Domain Controllers. In this GPO, make these changes. Expand Computer Configuration \ Policies \ Windows Settings \ Security Settings \ Advanced Audit Policy Configuration \ Audit Policies \ Account Management Double click User Account Management C...