I am trying to write a monitoring script to extract the value of
"
blade02\Group Memory(18:init.4214)\Memctl?
from resxtop and report if value == 0
Unfortunately its get more and more cludgy as I go as resxtop wont accept a password and now I find myseld hacking with expect and its not as clean.
Is this value easilyextractable some other way - for example via the perl API?
Thanks
-- dion
VMware Systems Admin
vExpert
VMUG Leader Saskatoon