Usually I am going to blog about solutions and ideas we will use in a constructive way. In this blog post I am going to talk about a destructive solution, which will be hopefully rarely used. As we all know Azure Log Analytics is a great log and analytics platform, where we can insert data […]
There are sometimes alerts which might contain some strange id’s which are not as informational as you might would like have. One way to find out what is hiding behind this id is to use a SCOM Powershell command. As an example, today I received an alert that looked like this…
In part 1 and part 2 we installed the emulator and the UCS management pack. At this moment we are able to explore the huge amount of information we get out of UCS.