JSON alerts for Munin

Sunday 2018-01-07

Munin is a great and easy way to monitor your servers. The documentation for Munin is kind of all over the place, and sometimes not all that clear.

  • There is the recent “Munin Guide” which is quite informative and well laid out.
  • Sometimes additional info and background can be found on the old munin wiki.

Getting the standard mail alerts working on munin is simplest, but as soon as you want custom layouts or send alerts as a push message to a phone, it can take quite some work. Here’s what I figured out to get the Munin alert available to you as JSON inside your own Python script so you can do anything you want with it.
Read the rest of this entry »


Fixing a Jenkins 1.5 Slave on Windows 2016

Monday 2018-01-01

Jenkins is one funny butler.

When you configure a Jenkins 1.5x slave on a Windows 2016 machine according to the instructions on wiki.jenkins-ci.org you will probably get a warning that the .Net 2.0 is not available. This is reported as issue 21484 and the fix is to upgrade, which sometimes can be a problem.

If you can’t upgrade to the latest version for whatever reason, you can easily fix the .Net problem by changing the jenkins-slave.exe.config file from:

    <generatePublisherEvidence enabled="false"/>


<!-- see http://support.microsoft.com/kb/936707 -->
    <generatePublisherEvidence enabled="false"/>
  	 <supportedRuntime version="v2.0.50727" />
     <supportedRuntime version="v4.0" />

Hope this works for you. Cheers!

Mattermost Delete Channel “fixed”

Thursday 2017-10-26

Users of Mattermost have probably noticed the less-than-optimal interface design where de Delete option is right above the Leave option in the Channel menu. On a busy server, you can imagine having quite a few incidents where people accidentally completely delete a channel.

In the Open Source version of Mattermost, everybody van do anything, because there is no sensible security model with roles. Mattermost Inc. seems to think that the Open Source community is not entitled to roles, which I (and others with me) strongly disagree with.

Forking Mattermost, learning Golang and enabeling security, improving a few other issues for the open source community along the way is a plan. But there is a simpler workaround for people running Mattermost inside Nginx.

Read the rest of this entry »

Installing GPG keys for Debian Backports

Friday 2017-06-09

For Let’s Encrypt to automatically renew certificates on your Raspberry Pi, you probably want to install certbot. The installation instructions of certbot tell you to make use of the Debian Backports packages. Following the instructions to install backports packages into apt-get on raspbian (which is a Debian Jessie), you will probably run into the following error:

$ sudo apt-get update
W: GPG error: http://ftp.debian.org jessie-backports InRelease:
   The following signatures couldn't be verified because the public
   key is not available: NO_PUBKEY 8B48AD6246925553 NO_PUBKEY

Read the rest of this entry »

Make the ESP8266 talk 9600 baud

Monday 2017-01-02

Surprise videoThe default serial speed on the ESP8266 WiFi chip is 115200 baud. If you connect this chip to an Arduino and want to use SoftSerial to talk to it, it will not work. The SoftSerial library is limited to 9600 baud because of hardware limitations of the Arduino. If you want to talk to the ESP8266 with an Arduino at lower speeds, you need to tell the ESP8266 to slow down.

Read the rest of this entry »

Seeed ESP8266 WiFi Breakout Board Pinout

Sunday 2017-01-01
WiFi Serial Transceiver Module Breakout Board w& ESP8266 pinout

WiFi Serial Transceiver Module Breakout Board w& ESP8266 pinout

This is the pinout for the Seeed WiFi ESP8266 breakout board. Please be careful, it only accepts 3.3 Volt nominal input voltage and logic. Putting 5 Volts on any of the pins may permanently damage the chip.

The ESP8266 on this board is programmed to do serial communications at 115.2 kilobaud, and accepts AT commands.

macOS Sierra SSH “Permission Denied”

Saturday 2016-11-12

keychain-mac-tutoIf you used DSA keys to log in to your SSH server and have upgraded your client machine to macOS Sierra (or OSX Sierra if you like), you probably ran into this problem:

client$ ssh -p 8123 george@ -i ~/.ssh/id_dsa 
Permission denied (publickey).

The answer to this problem is replacing the DSA key with an RSA key, but how do you do on the server when your only means for connecting is the OSX client machine you just upgraded? Here’s how:

Read the rest of this entry »