Published on 25 Dec 2014
In large deployments using PowerShell Desired State Configuration (DSC) it is inevitable to implement a pull server because of the centralized configuration management. The nodes connecting to a pull server are identified by a globally unique identifier (GUID). Those GUIDs are - for a start - entirely independent from the hostname. I will present several approaches to managing the GUIDs used for DSC nodes.
Published on 23 Dec 2014
If you are planning to use PowerShell Desired State Configuration on a larger scale you need to take a step back and think about the design of your node configurations. In this post I will give you some hints how to approach this.
Published on 19 Dec 2014
If you are using push mode for PowerShell Desired State Configuration you will be dearly missing that modules can be dynamically loaded when they are needed. The following example demonstrates how to deploy all resources from the current wave. It only uses resources contained in PowerShell 4.0.
Published on 15 Dec 2014
In a previous post I described how to inject the meta as well as the node configuration. As it is, the Local Configuration Manager (LCM) does not create the scheduled tasks necessary to apply, monitor and correct the configuration. In this post I will explain how to make sure that LCM kicks off.
Published on 12 Dec 2014
Many resources for Desired State Configuration require credentials to successfully execute the specified task. For example, if you are copying files or directories using the file resource, the Local Configuration Manager needs appropriate credentials to access the source location. This is a crucial requirements when the configuration is applied on a workgroup host and the source location is inaccessible by the system account. In this post, I will explain how to use credentials in the configuration.
Published on 10 Dec 2014
When learning about DSC you will likely read dozens of articles and try to make sense of them. I will give you a head start and point you to the most helpful articles that I have used in the past.
Published on 07 Dec 2014
In large environments, you will need to automate the meta configuration necessary to kick off the local configuration manager. Microsoft has published a lengthy article about injecting a meta as well as a node configuration into VMs and VHDs. I will present a such easier method fully integrated and supported by the LCM. This article only describes which location can be used to inject MOFs.
Published on 05 Dec 2014
I have invested quite some time into learning about PowerShell Desired State Configuration (DSC). After reading many posts about DSC, I am still missing a comprehensive example that discusses working with configuration data. I will present two variants of the same example to demonstrate how parameters can be passed to a DSC configuration. In addition I will provide some thoughts about advantages and disadvantages of both methods. The content is closely related to separating configuration and environment data.
Published on 19 Nov 2014
When you are using SQL Server Mirroring to implement high availability for the XenApp database, you may see that a site upgrade fails while moving from XenApp 7.5 to 7.6.
Published on 07 Nov 2014
When you are tracing issues in Remote Desktop Services (RDS), you will have to look for events across several event logs. This makes it very hard to bring the individual events in the appropriate order to analyze the issue at hand.