Skip to main content

New Syntax for Hash Tables with Select-Object

Wow!  I am actually getting around to blogging this year.  This has been an epic year in terms of how busy I have been.  Between speaking at both the PowerShell Conferences in Europe and Asia, but also expanding my client base in Asia and the Pacific islands, I have been busy.  Oh, let’s not forget adding Windows Server 2016 classes, Security+ and my work on the Azure platform. 

OK, yes I have been busy.  At some point, what I have been learning does get spilled over into my classes and this blog.

One of the sticky points with learning PowerShell has been the creation of calculated properties with Select-Object.  To do so you need to use a hash table, associative table, or dictionary.  What you call it depends on your background.   Just remember that most IT pros who take my PowerShell classes are not programmers and have never been trained as such.  Makes for an interesting week for me.  
Below is an example of how we have been teaching calculated properties.
Get-Process |
    Select-Object -Property Name,
        @{
            Name = 'VirtMemory'
            Expression = {$PSItem.VM}
        }

You could short hand it as such.

Get-Process |
    Select-Object -Property Name, @{N = 'VirtMemory'; E = {$PSItem.VM}}

Well, that hash table is the problem.  I have not found a way to eliminate it, but I have found a way to write it a different way.

$Hash1 = @{ 'Name' = 'VirtMemory'; Expression = {$PSItem.VM}}
Get-Process | Select-Object -Property Name, $Hash1

The idea is to break it up into multiple parts so the student can focus more on what is going on and less on the confusing syntax used with Select-Object. You can add additional calculated properties as shown below.

$Hash1 = @{ 'Name' = 'VirtMemory'; Expression = {$PSItem.VM}}
$Hash2 = @{ 'Name' = 'WorkMemory'; Expression = {$PSItem.WS}}
Get-Process | Select-Object -Property Name, $Hash1, $Hash2

This technique will not work for all.  If what you are using works for you, then continue to use your technique.  I will be introducing this syntax in my PowerShell class next week in Phoenix to gauge the class response to this technique as a step in their understanding of how to perform this very common task and understand it.
 


Comments

Popular posts from this blog

How to list all the AD LDS instances on a server

AD LDS allows you to provide directory services to applications that are free of the confines of Active Directory.  To list all the AD LDS instances on a server, follow this procedure: Log into the server in question Open a command prompt. Type dsdbutil and press Enter Type List Instances and press Enter . You will receive a list of the instance name, both the LDAP and SSL port numbers, the location of the database, and its status.

How to run GPResult on a remote client with PowerShell

In the past, to run the GPResult command, you would need to either physically visit this client, have the user do it, or use and RDP connection.  In all cases, this will disrupt the user.  First, you need PowerShell remoting enabled on the target machine.  You can do this via Group Policy . Open PowerShell and type this command. Invoke-Command –ScriptBlock {GPResult /r} –ComputerName <ComputerName> Replace <ComputerName> with the name of the target.  Remember, the target needs to be online and accessible to you.

Where did a User’s Account Get Locked Out?

Updated: May 15, 2015 When this article was originally published, two extra carriage returns were add causing the code to malfunction.  The code below is correct.   My client for this week’s PowerShell class had a really interesting question. They needed to know where an account is being locked out at. OK, interesting. Apparently users hop around clients and forget to log off, leading to eventual lock out of their accounts. The accounts can be unlocked, but are then relocked after Active Directory replication. This problem is solved in two parts. The first one is to modify the event auditing on the network. The second part is resolved with PowerShell. The first part involves creating a group policy that will encompass your Domain Controllers. In this GPO, make these changes. Expand Computer Configuration \ Policies \ Windows Settings \ Security Settings \ Advanced Audit Policy Configuration \ Audit Policies \ Account Management Double click User Account Management C...