Skip to main content

psexec tool to deploy application to servers or execute commands

 to download it here http://technet.microsoft.com/en-us/sysinternals/bb897553.aspx



Example for commands to change the peer of the NTP servers are as below

Code:
psexec @C:\Fouad\servers.txt -u admin -p password -d w32tm /config /manualpeerlist:"rentime3.egyeng.com,0x8 rentime2.egyeng.com,0x8" /syncfromflags:MANUAL >> c:\Fouad\report.txt 2>&1
psexec @C:\Fouad\servers.txt -u admin -p password -d w32tm /config /update  >> c:\Fouad\report.txt 2>&1
psexec @C:\Fouad\servers.txt -u admin -p password -d net stop w32time  >> c:\Fouad\report.txt 2>&1
psexec @C:\Fouad\servers.txt -u admin -p password -d net start w32time  >> c:\Fouad\report.txt 2>&1


pause
@C:\Fouad\servers.txt >> put all servers list in servers.txt to execute the commands on all servers.
-u admin -p password : admin and password to be used on servers / delete this part if you will use same account you run the batch with it.


Small simple batch
Code:
psexec.exe \\Servername cmd \c \\mybatch.bat

NOTE: put PsExec.exe , Servers.txt and your batch on same folder which named here Fouad under c drive mybatch.bat

Comments

Popular posts from this blog

Integration with vCloud Director failing after NSXT upgrade to 4.1.2.0 certificate expired

  Issue Clarification: after upgrade from 3.1.3 to 4.1.2.0 observed certificate to be expired related to various internal services.   Issue Verification: after Upgrade from 3.1.3 to 4.1.2.0 observed certificate to be expired related to various internal services.   Root Cause Identification: >>we confirmed the issue to be related to the below KB NSX alarms indicating certificates have expired or are expiring (94898)   Root Cause Justification:   There are two main factors that can contribute to this behaviour: NSX Managers have many certificates for internal services. In version NSX 3.2.1, Cluster Boot Manager (CBM) service certificates were incorrectly given a validity period of 825 days instead of 100 years. This was corrected to 100 years in NSX 3.2.3. However any environment originally installed on NSX 3.2.1 will have the internal CBM Corfu certs expire after 825 regardless of upgrade to the fixed version or not. On NSX-T 3.2.x interna...

Calculate how much data can be transferred in 24 hours based on link speed in data center

  In case you are planning for migration via DIA or IPVPN link and as example you have 200Mb stable speed so you could calculate using the below formula. (( 200Mb /8)x60x60x24) /1024/1024 = 2TB /per day In case you have different speed you could replace the 200Mb by any rate to calculate as example below. (( 5 00Mb /8)x60x60x24) /1024/1024 =  5.15TB  /per day So approximate each 100Mb would allow around 1TB per day.

Device expanded/shrank messages are reported in the VMkernel log for VMFS-5

    Symptoms A VMFS-5 datastore is no longer visible in vSphere 5 datastores view. A VMFS-5 datastore is no longer mounted in the vSphere 5 datastores view. In the  /var/log/vmkernel.log  file, you see an entry similar to: .. cpu1:44722)WARNING: LVM: 2884: [naa.6006048c7bc7febbf4db26ae0c3263cb:1] Device shrank (actual size 18424453 blocks, stored size 18424507 blocks) A VMFS-5 datastore is mounted in the vSphere 5 datastores view, but in the  /var/log/vmkernel.log  file you see an entry similar to: .. cpu0:44828)LVM: 2891: [naa.6006048c7bc7febbf4db26ae0c3263cb:1] Device expanded (actual size 18424506 blocks, stored size 18422953 blocks)   Purpose This article provides steps to correct the VMFS-5 partition table entry using  partedUtil . For more information see  Using the partedUtil command line utility on ESX and ESXi (1036609) .   Cause The device size discrepancy is caused by an incorrect ending sector for the VMFS-5 partition on the ...