View vNet_Peering.ps1
New-NetFirewallRule -DisplayName "Allow ICMPv4-In" -Protocol ICMPv4
$vnet1Name = 'Pixel1'
$vnet1RG = 'Pixel1'
$vnet2Name = 'Pixel2'
$vnet2RG = 'Pixel2'
$vnet1 = Get-AzureRmVirtualNetwork -Name $vnet1Name -ResourceGroupName $vnet1RG
$vnet2 = Get-AzureRmVirtualNetwork -Name $vnet2Name -ResourceGroupName $vnet2RG
View Azure_subscription_selector.ps1
Login-AzureRmAccount
$SubscriptionId = (Get-AzureRmSubscription | select Name, State, SubscriptionId, TenantId | Out-GridView -Title "Azure Subscription Selector" -PassThru).SubscriptionId
Get-AzureRmSubscription -SubscriptionId $SubscriptionId | Select-AzureRmSubscription
View Delete_Empty_RGs_Azure.ps1
#Log in to Azure account
Login-AzureRmAccount
#Get list of Azure Subscription ID's
$Subs = (get-AzureRMSubscription).ID
#Loop through the subscriptions to find all empty Resource Groups and store them in $EmptyRGs
ForEach ($sub in $Subs) {
Select-AzureRmSubscription -SubscriptionId $Sub
$AllRGs = (Get-AzureRmResourceGroup).ResourceGroupName
View Azure Stack Polices.ps1
get-cloudrive
invoke-webrequest https://github.com/Azure/AzureStack-Tools/archive/master.zip -OutFile master.zip
expand-archive master.zip -DestinationPath . -Force
cd AzureStack-Tools-master
Import-Module .\Policy\AzureStack.Policy.psm1
Get-AzureRMSubscription
View Domain.json
{
"$schema": "https://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"adminUsername": {
"type": "string",
"metadata": {
"description": "The name of the administrator account of the new VM and domain"
}
},
View Hyper-V_Groups.ps1
# Create new VM Group
New-VMGroup -Name "BackEnd" -GroupType VMCollectionType -Verbose
# Add VMs to VM Collection Group
Add-VMGroupMember -Name "BackEnd" -VM (Get-VM "SQL01"),(Get-VM "SQL02")
# Verify Group Members
(Get-VMGroup -Name "BackEnd").VMMembers
# Find group VM is member of
View backup_and_delete_unlinked_gpos.ps1
.SYNOPSIS
Script used to find all unlinked gpos, back them up and then delete them.
.DESCRIPTION
The script searches your logged on domain for unlinked GPO's. It then backs them up to a folder on the C:\. It will then remove them. It also creates a log file in the same directory.
.LINK
http://www.pixelrobots.com
#>
View Nano_Install_Package.ps1
Enter-PSSession -ComputerName PIXEL-NANO01
Install-PackageProvider NanoServerPackage
Import-PackageProvider NanoServerPackage
Find-nanoserverPackage -name *
Install-NanoServerPackage -name Microsoft-NanoServer-IIS-Package -Culture en-us
View Set-ClusterQuorum.ps1
Set-ClusterQuorum -CloudWitness -AccountName <storageAccountName> -AccessKey <StorageAccountAccessKey>
View Install_ADDS_and_Add_To_Forest.ps1
# Install ADDS and all management tools
Add-WindowsFeature -Name “ad-domain-services” -IncludeAllSubFeature -IncludeManagementTools
# Add Domain Controller to existing Forest
write-Host "Add Dc to existing Forest"
$domainname = Read-Host "Enter Domain Name you want to join eg: ad.contoso.com"
$sitename = read-host "Enter name of site to join. eg: Default-First-Site"
Import-Module ADDSDeployment
Install-ADDSDomainController `
-NoGlobalCatalog:$false `
-CreateDnsDelegation:$false `