I'm trying to get unauthorized kernel modules loaded in memory, I'm using the script below, unfortunately it's not working 😞
Foreach ($VMHost in Get-VMHost ) {
$ESXCli = Get-EsxCli -VMHost $VMHost -V2
$ESXCli.system.module.list.invoke() | ForEach-Object {
$ESXCli.system.module.get.invoke($_.Name) | Select-Object @{N="VMHost";E={$VMHost}}, Module, License, Modulefile, Version, SignedStatus, SignatureDigest, SignatureFingerPrint } }
I read that incorrectly.
You are trying to list unauthorized modules. Correct?
And what specifically is not working?
Blog: lucd.info Twitter: @LucD22 Co-author PowerCLI Reference
Ok, just looked closer at your script.
You have to provide the parameter to the get command in a hash table.
Like this
Foreach ($VMHost in Get-VMHost ) {
$ESXCli = Get-EsxCli -VMHost $VMHost -V2
$ESXCli.system.module.list.Invoke() | ForEach-Object {
$ESXCli.system.module.get.Invoke(@{module=$_.Name}) |
Select-Object @{N="VMHost";E={$VMHost}},
Module, License, Modulefile, Version, SignedStatus, SignatureDigest, SignatureFingerPrint
}
}
Blog: lucd.info Twitter: @LucD22 Co-author PowerCLI Reference
Thank LucD it's OK 🙂
by the way do you know what mean if the Module is unsigned despite that the image used is the one from HPE: a Customized Image?
Unsigned means there is no digital signature on the module.
Blog: lucd.info Twitter: @LucD22 Co-author PowerCLI Reference