OBS Virtual Camera on Fedora – Signing kernel modules for Secure Boot

Having been a Linux user since my teenage years, I decided to install Fedora again and use it as my primary desktop OS. Out of the box, everything worked just fine on my Dell Precision 7730 with the WD19TB dock attached. Everything apart from OBS, which was not able to start a virtual camera.

Thus began my journey through loads of horrible advice and the official docs… (Updated 2022-07-16 with a script to sign extra kernel modules)

Continue reading “OBS Virtual Camera on Fedora – Signing kernel modules for Secure Boot”

90 Day Challenge – Nutrition and before/after

Due to demand, I will add a little follow-up to my first post (https://www.janhendrikpeters.de/2020/12/09/90daychallenge/ ) detailing what I ate before the challenge and how I eat now. I will also show you what amount of training I did before the challenge, and how little I do since. And lastly, semi-nude pictures of my insulated upper body – now with less insulation!

Continue reading “90 Day Challenge – Nutrition and before/after”

DSC Configuration data encryption done right

So – you have gained some experience with Desired State Configuration and you have even encrypted credentials in your configurations through certificates. But how do you manage the credentials, and how are they integrated in your automated build process?

The open-source DSC Workshop (https://github.com/automatedlab/dscworkshop) contains great resources to get you started. In this post, I would like to show you how to use the layering to define credentials at different layers, e.g. domain-wide or node-specific.

Continue reading “DSC Configuration data encryption done right”

Converting GPO to DSC – Part 2

Testing the infrastructure

*Update 2020-01-14: Lab Script updated due to new cmdlets*
If you have not yet read about Desired State Configuration, now would be the time. Head to docs.microsoft.com and understand the concepts before reading further.

The configurations we compiled in the previous blog post require two community resources, AuditPolicyDsc and SecurityPolicyDsc. Registry settings are built-in. Both resources contain the necessary code that your clients need to test the configuration. If you don’t trust external code or are not able to get code in your environment, why not create a test environment instead?

Continue reading “Converting GPO to DSC – Part 2”

Converting Group Policies to DSC configurations

Desired State Configuration is a powerful tool in any Windows environment when it comes to automation. In customer projects, I personally like to do a greenfield approach whenever possible.

However, there are certainly situations where taking something that already exists might be beneficial. This was the case at one customer, who wanted to convert Group Policies to DSC configurations in order to test them. Suffice to say, my interest was piqued.

Continue reading “Converting Group Policies to DSC configurations”

Add telemetry to your PowerShell module

Ah, telemetry. Very ubiquitous today, telemetry is collected from many software companies, device vendors and so on. Often telemetry includes PII, personally identifiable information, which of course is a no-go.

This post aims to explain how you can responsibly collect telemetry for your PowerShell module to track its usage, version distribution and much more. I will show you the steps you need to take to use Azure ApplicationInsights to collect and Power BI to visualize your telemetry.

Continue reading “Add telemetry to your PowerShell module”

Automating Windows Admin Center

We all know that Windows Admin Center, formerly known as Project Honolulu, provides excellent and modern management methods for Windows operating systems. Administrators can easily customize their own dashboard and add connections to servers, workstations and storage as well as compute clusters.

However, this is a manual task. As a PowerShell aficionado I cannot abide by that. But let’s start at the beginning.

Continue reading “Automating Windows Admin Center”