What is AutomatedLab?
AutomatedLab is simply PowerShell module. In some ways it’s a framework because it encourages a particular workflow for managing named labs consisting of VMs with prefined applications / “roles” or custom roles.
The benefit using AutomatedLab is the simplicity it offers to quickly fire up and throw away environments, and rebuild again. It also offers a huge range of functions to build out whatever you want.
Generally, the workflow goes something like:
Those commands have a bunch of different parameters to further configure your lab. But generally, you 1) define your lab, 2) define the VMs and 3) initiate the build.
Resources for AutomatedLab aren’t hard to find. I personally found everything I needed by looking at the wiki on GitHub, reviewing the documentation on their website, and checking out the sample scripts folder.
In my experience so far the support by the developers in GitHub issues have been very helpful and proactive. At the time of writing this it’s in active development and has been for years.
As per the documentation, at the time of writing this, the requirements are:
- Windows Management Framework 5+
- Windows Server 2012 R2+/Windows 8.1+
- Recommended OS language is en-us
- Admin privileges are required
- ISO files for all operating systems and roles to be deployed
- Intel VT-x or AMD/V capable CPU
- A decent amount of RAM
- An SSD for your machines is highly recommended as many issues arise from slow HDDs
AutomatedLab operates on an opt-out telemetry system. The documentation on this heavily suggests no personal identifiable information is collected and it’s used purely for supportability and usage statistics. Snippets of json data which is sent back are included in the docs to give you insight to the amount of detail shared.
To opt out, you either set environment variable
0. Or simply use
Disable-LabTelemetry after installing.
They even share the PowerBi dashboard of the data collected.
Before you get started, you should know about some changes AutomatedLab wants to make to your computer when you first call an AutomatedLab script.
You’re prompted yes/no to a series of questions which will likely dictate whether you want to use this in a production network or not:AutomatedLab security warning prompts
Below I’ll lay out what those changes are and the commands/options it sets.
Enabling WinRM CredSSP
Enable-WSManCredSSP -Role Client -DelegateComputer * -Force
The documentation on this gives the following reason for this change:
“Every machine deployed with AL has CredSsp enabled as a CredSsp server. This is like running “Enable-WSManCredSSP -Role Server”. Invoke-LabCommand always tries to make a connection with CredSsp. If this does not work you will see a warning and a connection without CredSsp is tried. This is definitely not a best practice for a production environment but makes life much easier in a lab. Using CredSsp you can create a remote session from a remote session which is extremely helpful when installing or setting up a lab. For example, reading an AD user account from a remote session does not work without CredSsp as reading data from Active Directory requires and authentication from the remote machine to a domain controller. Inside an AL lab the following code works out of the box.”
Enters a wildcard in your system’s TrustedHosts file
Set-Item -Path Microsoft.WSMan.Management\WSMan::localhost\Client\TrustedHosts -Value '*' -Force
The exception message thrown if you choose not to accept reads:
“AutomatedLab requires the host to connect to any possible lab machine using NTLM... “
If a remote system is not part of a domain, or is part of an untrusted domain, an attempt to connect using remoting may fail. The remote system must either be listed in trusted hosts or must use SSL.
Putting a wild card in your TrustedHosts file will effectively mean your computer trusts all and any remote systems to make connections to, not from. In other words, this wildcard is not the config for allowing all and any remote systems to connect to your computer.
Allow credential delegation via local group policy settings
The following settings are configured with a link to their description:
- Allow Delegating Fresh Credentials
- Allow Delegating Fresh Credentials when NTLM only
- Allow Delegating Saved Credentials
- Allow Delegating Saved Credentials when NTLM only
These settings are relevant to allowing use of CredSSP; letting you feed “fresh” and “saved” credentials to remote systems in your lab.
Relaxes a setting for CredSSP patch CVE-2019-0886
The setting it changes for CVE-2018-0886 / KB4093492 is
This workaround enables you to connect to lab machines that may not have the CredSSP patch installed.
With all of the the above in mind I encourage you to make an informed decision as to whether you can use AutomatedLab or not.
These are the resources I used to help me understand what I needed to know the risks were, explaining things like Kerberos authentication, CredSSP and double-hopping with PowerShell:
- PowerShell Remoting Kerberos Double Hop Solved Securely
- Understanding Kerberos Double Hop
- Kerberos for the Busy Admin
- Accidental Sabotage: Beware of CredSSP
Decided to use it still? Great! I personally use it in my home lab.
I’m not going to reinvent the wheel. The Installation docs are good enough!
Once installed, you’ll see C:\LabSources folder. During installation you can configure where to store LabSources if you don’t want to save it on C.
LabSources is not the directory where VMs are stored. It’s where installation media / sources and scripts are kept. By default, VMs are stored in in a directory named AutomatedLab-VMs but this is also configurable on a per lab basis using -VmPath parameter.
If you don’t explicitly define -VmPath then the fastest available drive on your computer will be used for the AutomatedLab-VMs folder.
AutomatedLab LabSources folder contents
Within each folder for LabSources you’ll have some description detailed within a README.md but I’ll offer some more insight.
AutomatedLab has a concept of “roles” that are installed after a VM OS is installed. Here is a list of predefined / “built in” roles. Associating a role with a VM will install applications such as Exchange, Active Directory, SharePoint, SQL, lots of good stuff and more. You associate a role with a VM using the
-Roles parameter with the
Custom roles is the ability to create your own role. Your custom role’s name is the name of the directory you save in LabSources\CustomRoles and AutomatedLab calls LabSources\CustomRoles\MyCustomRole\HostStart.ps1 once the VM’s OS is installed. From there, your imagination is the limit.
VMs need ISO media for operating system installs and some applications sources for roles such as SQL. This is where you must store ISOs. This directory is scanned at runtime when initiating a build and an error will be thrown if what’s required isn’t present.
See the README.md for more information, but essentially, it’s a folder to store updates for you to then trigger regeneration of a new ISO for your lab’s operating systems.
A folder that you shouldn’t need to touch. It’s used internally by AutomatedLab to achieve some customisations for some predefined / “builtin” roles.
A nice folder containing lots of examples where you can glean insight on how to build your own AutomatedLab scripts.
Software to-be-installed on VMs in your lab download to this folder and copied to the VMs. In your scripts, if you need to do any similar type of functions of downloading and installing, use this directory.
This folder can be copied to all VMs in a lab so if there’s files/folders you want in common, populate this folder with what you want and use the
-ToolsPath parameter with the
Creating a simple lab
Before you save the below script and execute it, ensure you have a Windows Server 2019 ISO saved in your LabSources\ISOs folder.
The above will:
- Create an AutomatedLab named whatever you passed for the
- Create a three VM lab all running Windows Server 2019 Datacenter (Desktop Experience)
- The domain will be whatever you passed for the
- All VMs will be networked only with each other using 192.168.123.0/24 address space
- DC name will be “DC01” and other 2 non-role servers will be named “GENSRV-01” and “GENSRV-02”
- Each server has just 1 vCPU but dynamic memory configured (min 1GB max 4GB)
Adding or removing lab machines
While you can delete the Hyper-V virtual machines from the VMM service and vhdx/vmcx files off disk, AutomatedLab will still think they exist. AutomatedLab keeps track of what’s where within the realm of AutomatedLab via XML files which can be found in
To delete individual VMs, use Remove-LabVM. To remove all VMs associated with a lab, use Remove-Lab.
Using these functions is important because not only does it take care of tidying up for you, it also does extra things like removes lab VMs from your hosts file.
As for adding machines to an existing lab, at the time of writing this, there’s no function available within AutomatedLab to specifically add a new VM to an existing lab. It’s only achievable by modifying or creating a new AutomatedLab script with the same properties (e.g. domain, address space etc) and calling
It seems more appropriate functionality to add machines to an existing lab or domain created from AutomatedLab is incoming in version 6 of AutomatedLab!
Build a ConfigMgr lab with AutomatedLab
Check out this post to build a ConfIgMgr lab using AutomatedLab!
Adam Cook Admin/Contributor
Adam loves technology and helping people, focusing on PowerShell, Azure, ConfigMgr, and Linux.