This message was deleted.
# citrix-app-layering
s
This message was deleted.
h
During the reseal process, I have it pop up with a text file called imageupdate.log to keep track of same things. I have that stored on the local system in a locked down folder only accessible to my team. That way the image has a running log with the update info. The format for updating is
Copy code
Time/date  updater name
      Installed app version
      Installed app version
      Removed app version
      Updated file at location
      Updated registry at location
      Etc
b
We do something similar to Hal. We have a log for each layer that matches the name in the ELM. These logs all sit in the same folder so you can easily see which layers loaded and check each log for changes.
Using @Ryan Butler’s module, I have a daily scheduled job to export each image definition to an XML file.
šŸ‘ 1
r
Where are the XML files stored? Source control, folder, etc?
b
I create a new XML each day and save it to a file share to document what an image definition looked like on what day. But it could be exported anywhere. If we need to rebuild or modify an old image definition, we have it documented.
šŸ‘ 2
c
Able to share the scheduled job details @Brandon Mitchell?
b
Set-Location $PSScriptRoot $pwdfile = ".\..\_credentials\passwordfile.txt" $keyfile = ".\..\_credentials\password_aes.key" $aplips= @("elm01", "elm02") $year = (Get-Date).Year $month = (Get-Date).Month $day = (Get-Date).Day if ((Test-Path -Path \\server\__App Layering\ImageDefinitions\$($year)\$($month)\$($day)) -eq $false) {New-Item -ItemType Directory -Path \\server\__App Layering\ImageDefinitions\$($year)\$($month)\$($day)} #App Layer Info $ALusername = "administrator" $ALpass = Get-Content $pwdfile | ConvertTo-SecureString -Key (Get-Content $keyfile) #Create AL Credential $CredentialAL = New-Object System.Management.Automation.PsCredential($ALusername, $ALpass) foreach ($aplip in $aplips) { #Connect to AL and create session $websession = Connect-alsession -aplip $aplip -Credential $CredentialAL -Verbose $images = Get-ALimage -websession $websession | Where-Object {($_.name -notlike "*delete*") -and ($_.name -notlike "*core*")} | Select-Object Name foreach ($image in $images) { Get-ALImageComp -websession $websession -name $image.name | Export-Clixml -path \\server\__App Layering\ImageDefinitions\$($year)\$($month)\$($day)\$($image.name).xml -Force } }
Probably not the most elegant script, but it does the job. @Carl Behrent
šŸ‘ 1
c
awesome thanks
šŸ‘ 1