You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
APC NetBotz temperature/humidity monitoring with Grafana
The APC NetBotz computer lab monitoring units allow SNMP access. This gist summarizes how to collect and
present the metrics from these units via Grafana.
The units look like this:
The result looks like this:
This was tested for APC NetBotz Rack Monitor 200 with bunch of APC NetBotz Sensor Pod 150 attached.
Note: this was written before support for multiple handlers per logger was added to CircuitPython logging.
Logger hierarchy
In CPython, there is a hierarchy of loggers.
Each logger except the root logger has a parent. When a log record is handled for particular logger,
the hierarchy is traversed until either the propagate flag of given logger is found to be False,
or root logger is encountered.
This is meant for Ubuntu 20.04.4 LTS and Solokey Somu
The purpose of the key is backup key (in case all my Yubikeys and smart phone get lost), hence the resident SSH key and 2FA setup for the Github account.
The goal is to present basic metrics such as bytes passed through the external interface of the router.
The main idea is to run SNMP on the OpenBSD router that can get the metrics from PF. Then SNMP exporter from Prometheus will convert the data to Prometheus format that can be scraped by Grafana.
The constraint is that this should be done in reasonably secure way: the IoT devices are in separate VLAN, however the router should have miminal exposure. Using snmpd with privilege separation and in flight data protection is sufficient. Further, the data collection and graphing will be done on single machine.
This gist contains my notes about how the FIPS selftest signature check works in OpenSSL 1.x.
Assumes basic awareness of the OpenSSL FOM (FIPS Object Module). My focus for this case is Solaris on SPARC.
The goal is to examine some of the inner workings of FIPS signature verification.
The FOM is built as fipscanister.o using designated code and linked into common OpenSSL build.
When the libcrypto.so library is loaded, the FOM will perform self test. If the self test fails,
the running program is abort()ed.
These are my personal notes on how to run/use OpenBSD on Ubiquiti Edgerouter, specifically for Edgerouter 4. I installed OpenBSD bunch of releases back and keep upgrading. Perhaps some of the issues highlighted below would not happen on fresher install.
Upgrade
The upgrade should be done one release at a time, i.e. from x.y to x.(y+1).
Note: has to be done using serial console (in order to access U-boot)