Documentation for PowerShell. Fixes #66

This commit is contained in:
Pēteris Caune 2016-06-30 22:40:20 +03:00
parent a4375aa5b5
commit f9c1a174b7
2 changed files with 23 additions and 0 deletions

View File

@ -15,6 +15,7 @@
<li><a href="{% url 'hc-docs' %}#node">Node</a></li>
<li><a href="{% url 'hc-docs' %}#php">PHP</a></li>
<li><a href="{% url 'hc-docs' %}#browser">Browser</a></li>
<li><a href="{% url 'hc-docs' %}#powershell">PowerShell</a></li>
<li><a href="{% url 'hc-docs' %}#email">Email</a></li>
</ul>
</li>

View File

@ -134,6 +134,28 @@ thing: they fire off a HTTP GET method.</p>
</p>
{% include "front/snippets/browser.html" %}
<a name="powershell"></a>
<h3>PowerShell</h3>
<p>
You can use <a href="https://msdn.microsoft.com/en-us/powershell/mt173057.aspx">PowerShell</a>
and Windows Task Scheduler to automate various tasks on a Windows system.
From within a PowerShell script it is also easy to ping healthchecks.io.
</p>
<p>Here is a simple PowerShell script that pings healthchecks.io.
When scheduled to run with Task Scheduler, it will essentially
just send regular "I'm alive" messages. You can of course extend it to
do more things.</p>
{% include "front/snippets/powershell.html" %}
<p>Save the above to e.g. <code>C:\Scripts\healthchecks.ps1</code>. Then use
the following command in a Scheduled Task to run the script:
</p>
<pre>
powershell.exe -ExecutionPolicy bypass -File C:\Scripts\healthchecks.ps1
</pre>
<a name="email"></a>
<h3>Email</h3>
<p>