PowerCLI

 View Only
  • 1.  unauthorized kernel modules loaded in memory

    Posted Nov 20, 2020 09:48 AM

    I'm trying to get unauthorized kernel modules loaded in memory, I'm using the script below, unfortunately it's not working  

     

    Foreach ($VMHost in Get-VMHost ) {

    $ESXCli = Get-EsxCli -VMHost $VMHost -V2
    $ESXCli.system.module.list.invoke() | ForEach-Object {
    $ESXCli.system.module.get.invoke($_.Name) | Select-Object @{N="VMHost";E={$VMHost}}, Module, License, Modulefile, Version, SignedStatus, SignatureDigest, SignatureFingerPrint } }



  • 2.  RE: unauthorized kernel modules loaded in memory

    Posted Nov 20, 2020 10:33 AM

    I read that incorrectly.
    You are trying to list unauthorized modules. Correct?

    And what specifically is not working?



  • 3.  RE: unauthorized kernel modules loaded in memory

    Posted Nov 20, 2020 11:37 AM

    Ok, just looked closer at your script.
    You have to provide the parameter to the get command in a hash table.
    Like this

    Foreach ($VMHost in Get-VMHost ) {
    
        $ESXCli = Get-EsxCli -VMHost $VMHost -V2
        $ESXCli.system.module.list.Invoke() | ForEach-Object {
            $ESXCli.system.module.get.Invoke(@{module=$_.Name}) | 
            Select-Object @{N="VMHost";E={$VMHost}}, 
                Module, License, Modulefile, Version, SignedStatus, SignatureDigest, SignatureFingerPrint
        }
    }


  • 4.  RE: unauthorized kernel modules loaded in memory

    Posted Nov 20, 2020 01:33 PM

    Thank LucD it's OK

    by the way do you know what mean if the Module is unsigned despite that the image used is the one from HPE: a Customized Image?

     



  • 5.  RE: unauthorized kernel modules loaded in memory

    Posted Nov 20, 2020 02:13 PM

    Unsigned means there is no digital signature on the module.