Obtener ayuda en vivo
The script knows how to shut down elegantly a core or an agent and then restart it in a functional manner.
To run script, Powershell 3.0 or later needs to be present accross the all machines and the execution policy needs to be set at least to remote-signed accross all machines as well.
Although it is simple to apply, it require a good understanding of the issues it addresses.
To sumarize, the script takes into consideration the following factors:
You have to enter the password twice. Please note that all passwords used by the script, with the exception on those entered in the credentials pop-up window (which are collected in a secure string format), need to be encoded. The easisest way to encode a password is to run an instance of the script with the -encoded parameter and follow the instructions on the screen. Please note that, to simplify the process, the generated encoded password is copied directly to the clipboard so it can be pasted wherever necessary.
Once these principles are clarified, it becomes very easy to run the script (and make whatever preparations may be necessary).
The list of parameters for the script is shown below:
It can be appassureagent, RapidRecoveryAgent,appassurecore,RapidRecoveryCore. It indicates the type of the target machines (agents or cores) and allows performing the deployment both on AppAssure or RapidRecovery machines
The names of the patches to be deployed without the .msi extension. In most cases there is only one patch but there are situations when multiple non exclusive patches are to be deployed.
The name of the webserver as it can be resolved by the target machines (i.e. IP address of FQDN)
mandatory -- the name of the machine(s) to run the report on or the path to file containing machines information
the username for the credentials to be used. if missing a dialogbox will pop up
the password for the credentials to be used. it MUST be encoded using the encoding function of the script. if missing a dialogbox will pop up
allows encoding a clear text password. all passwords MUST be encoded. this parameter is exclusive to any other parameters.
opens Notepad and sticks in the table header for the CSV file containing the cores.
The local path to the folder containing the patch to be served. By default it is the current directory.
The port on which the listener is setup. By default it is port 80
A few usage examples are shown below:
Prompts for a password, encodes it and sends the encoded string to the clipboard
InstallPatch.9.ps1 -servicename appassureagent -patchnames P-A64-1613 -computernames mymachines.txt
Installs patch P-A64-1613 via direct downloads using information located in my machines.txt (you need to use encoded passwords)
InstallPatch.9.ps1 -servicename appassurecore -patchnames P-A64-1613 -computernames 10.23.20.72,10.23.20.11 -username mydomain\Administrator -password QQBiAGXAXwAxADIAMwA0AA== -hostwebname zorro.mydomain.org -webport 8080
Installs patch P-A64-1613 on cores 10.23.20.72,10.23.20.11 which both take the same local user name and password, by downloading it from the computer the script is run on. The local computername may be resolved as zorro.mydomain.com and the file is downloaded on port 8080 from the directory in which the script is run.
InstallPatch.9.ps1 -servicename appassureagent -patchnames P-A64-1613 -computernames c:\temp\mycomputers.csv
© ALL RIGHTS RESERVED. Feedback Términos de uso Privacidad Cookie Preference Center