Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
other people
Jun 27, 2004
Associate Christ

Buttcoin purse posted:

You can still just attach two IP addresses to a single interface too, without using VLANs, right? I mean if there are two separate IP networks on the same physical network.

Yeah separate broadcast domains are for scrubs :rolleyes:.

Adbot
ADBOT LOVES YOU

Viktor
Nov 12, 2005

bobfather posted:

Going to try and set up a secured Wordpress tomorrow. I hear iffy things about keeping Wordpress secure though. Any words of wisdom?

Just remember any sort of web framework will require patching asap. Wordpress is fine same for Drupal, both will introduce a worker engine proxy that can be used for many frameworks. You will find some more permissions and more on Selinux contexts for rw content and maybe some boolean settings.

What I would suggest now that you have the steps down is to work on learning how to implement these tasks in CM. Grab a copy of Chef or such and start a simple recipe.

a dmc delorean
Jul 2, 2006

Live the dream

telcoM posted:

My first guess is, you're running sudo outside a terminal session. By default, sudo will refuse to work in that situation.
Sudo also wants you to record in the sudoers file the actual full pathname of whatever you are planning to run, even if you actually run it using $PATH or via a symbolic link.

If your Linux username is "angelwolf", you can allow yourself (only) to run sudo outside terminal sessions by adding this to the sudoers file:
code:
Defaults:angelwolf !requiretty
If you are trying to run a terminal-based program as root from IceWM menu, you'll want to do 'xterm -e sudo someprogram' rather than 'sudo xterm -e someprogram', if at all possible. Less chance of things to go wrong that way.

Thats amazing, that's exactly what I needed. Thank you.

Pablo Bluth
Sep 7, 2007

I've made a huge mistake.

DeaconBlues posted:

Is there a hard disk health reporting utility I can run on my little Ubuntu server?

I've got two 2.5" hard disks in there, and one of 'em must be well over three years old.

Something that runs a daily S.M.A.R.T scan (that doesn't abuse the drive) and dumps a report into a file would be great. Even better if I could just run it as a cron job and experiment with different intervals.

I want to be aware when bad sectors start appearing and if I see them rapidly getting worse I can replace the disk.
smartctl is the command line SMART utility ―wrap that in your favourite scripting language to record the data you want and do something useful such as fire off an email if there's an error found.

mystes
May 31, 2006

Angelwolf posted:

Only thing I cant seem to work out is how to run as root. Adding sudo doesn't help even though I've configured visudo to not make sudo require a password.
You probably shouldn't do what you're trying to do. At the very least, make a setuid wrapper script to the program that only your account can excecute and that only root can edit or something. This will still be insecure depending on the program though, but making sudo not require a password is like running as root all the time. (Although in practice if the account you use to sudo is compromised you're screwed anyway.)

mystes fucked around with this message at 18:05 on Jul 31, 2016

RFC2324
Jun 7, 2012

http 418

mystes posted:

You probably shouldn't do what you're trying to do. At the very least, make a setuid wrapper script to the program that only your account can excecute and that only root can edit or something. This will still be insecure depending on the program though, but making sudo not require a password is like running as root all the time. (Although in practice if the account you use to sudo is compromised you're screwed anyway.)

It helps protect things like a forgotten console login. I can't count the number of times I've logged into a console and found it logged in with someone else's account, or a DC tech has come to me asking what is going on.

DeaconBlues
Nov 9, 2011

Pablo Bluth posted:

smartctl is the command line SMART utility ―wrap that in your favourite scripting language to record the data you want and do something useful such as fire off an email if there's an error found.

Brilliant! I've installed smartmontools and I'll have a play with smartctl. Thanks.

TimWinter
Mar 30, 2015

https://timsthebomb.com
I want to 3d render a new home I'm finalizing the sale of now. It's both for figuring out what furniture and paint colors make sense, and possibly designing expansions or additions.

I'm honestly thinking of breaking out HL2's source tools and doing basic map making through that, as I'm a programmer by day and for some reason I'd like something I can hack on a bit. Also, as a programmer, I have no idea how to scope projects and think this will be easy.

Buttcoin purse
Apr 24, 2014

Kaluza-Klein posted:

Yeah separate broadcast domains are for scrubs :rolleyes:.

Yeah I was kind of overwhelmed by the number of things I could say about why people don't normally do that, and gave up trying to think of what to write :shrug: I don't think we ever figured out what the OP was trying to do did we?

DeaconBlues posted:

Brilliant! I've installed smartmontools and I'll have a play with smartctl. Thanks.

smartmontools comes with a daemon, smartd, which you might want to take a look at. I don't think it will actually do offline scans (which is what I think you were asking for) but it does do periodic checks for attributes and sends out mail when they change, for example.

TimWinter posted:

I want to 3d render a new home I'm finalizing the sale of now. It's both for figuring out what furniture and paint colors make sense, and possibly designing expansions or additions.

I'm honestly thinking of breaking out HL2's source tools and doing basic map making through that, as I'm a programmer by day and for some reason I'd like something I can hack on a bit. Also, as a programmer, I have no idea how to scope projects and think this will be easy.

I know the feeling, you're used to some game mapping tool and these 3D tools aren't easy to learn :v: I once came across BRL-CAD, which is open source, cross platform, and uses Constructive solid geometry (CSG) mapping as we're used to from our game engines (at least I think that's what HL uses from a quick web search), although I never actually got beyond installing it so I can't tell you if it is any good.

evol262
Nov 30, 2010
#!/usr/bin/perl

TimWinter posted:

I want to 3d render a new home I'm finalizing the sale of now. It's both for figuring out what furniture and paint colors make sense, and possibly designing expansions or additions.

I'm honestly thinking of breaking out HL2's source tools and doing basic map making through that, as I'm a programmer by day and for some reason I'd like something I can hack on a bit. Also, as a programmer, I have no idea how to scope projects and think this will be easy.

Sketchup in wine is really king

fuf
Sep 12, 2004

haha

bobfather posted:

Going to try and set up a secured Wordpress tomorrow. I hear iffy things about keeping Wordpress secure though. Any words of wisdom?

oh hey, my wordpress sites get hacked all the time.

Some wordpress-specific lessons that are finally sinking in:
* Keep WP and all plugins updated
* Use as few plugins as possible and try to stick to those that are well-maintained
* Don't call your admin user "admin"
* Don't author posts / pages with your admin user and disable /author/ listing pages so that your admin username isn't easily discoverable
* Change the login url from /wp-admin/ to something else (there are plugins that can do this)
* Disable xmlrpc.php unless you know you definitely need it (you almost certainly don't)
* Disable write access to everywhere except wp-content/uploads if you can get away with it (but an annoying number of plugins need write access to random folders in wp-content/)
* Disable php execution in wp-content/uploads/
* Install a security plugin like Wordfence or iThemes Security. BUT, pay attention to what it is actually doing, especially how it is banning hosts after failed logins. I thought iThemes was taking care of bans for me, but turns out it was just writing new rules to an .htaccess file, which my server wasn't implementing anyway because I was using nginx.
* If you're getting a lot of brute force login attempts, just rename wp-login.php to wp-login.php.disabled for a while

Server specific stuff I've started doing because I'm paranoid now:
* Watch the WP directory for new or modified php files. Check for files that contain "eval" or "base64_decode", or which have a very long first line
* Watch server logs for suspicious POST requests (basically to any file other than wp-login.php, admin-ajax.php and wp-cron.php)

Thermopyle
Jul 1, 2003

...the stupid are cocksure while the intelligent are full of doubt. —Bertrand Russell

evol262 posted:

Sketchup in wine is really king

This is the best solution.

Mr Shiny Pants
Nov 12, 2012

fuf posted:

oh hey, my wordpress sites get hacked all the time.

Some wordpress-specific lessons that are finally sinking in:
* Keep WP and all plugins updated
* Use as few plugins as possible and try to stick to those that are well-maintained
* Don't call your admin user "admin"
* Don't author posts / pages with your admin user and disable /author/ listing pages so that your admin username isn't easily discoverable
* Change the login url from /wp-admin/ to something else (there are plugins that can do this)
* Disable xmlrpc.php unless you know you definitely need it (you almost certainly don't)
* Disable write access to everywhere except wp-content/uploads if you can get away with it (but an annoying number of plugins need write access to random folders in wp-content/)
* Disable php execution in wp-content/uploads/
* Install a security plugin like Wordfence or iThemes Security. BUT, pay attention to what it is actually doing, especially how it is banning hosts after failed logins. I thought iThemes was taking care of bans for me, but turns out it was just writing new rules to an .htaccess file, which my server wasn't implementing anyway because I was using nginx.
* If you're getting a lot of brute force login attempts, just rename wp-login.php to wp-login.php.disabled for a while

Server specific stuff I've started doing because I'm paranoid now:
* Watch the WP directory for new or modified php files. Check for files that contain "eval" or "base64_decode", or which have a very long first line
* Watch server logs for suspicious POST requests (basically to any file other than wp-login.php, admin-ajax.php and wp-cron.php)

Don't if you are the guy, there was somebody on this forum who runs WP as a hoster an he also had some good tips.

Like making the whole WP dir readonly etc. Can't seem to find the post anymore though.

fuf
Sep 12, 2004

haha

Mr Shiny Pants posted:

Don't if you are the guy, there was somebody on this forum who runs WP as a hoster an he also had some good tips.

Like making the whole WP dir readonly etc. Can't seem to find the post anymore though.

Nah I'm just the guy who shows up every few months saying "help all my wordpress sites got hacked again and I have no idea what I'm doing" :)

I get a little better each time though.

Making the WP directory read only is ideal if it's your own site and you're the only one who updates it, but it's less feasible when you're hosting for clients who want to install their own plugins etc. You also have to come up with some way to turn on write access when WP needs to update itself.

dpkg chopra
Jun 9, 2007

Fast Food Fight

Grimey Drawer
Some time ago I had Transmission installed on my home server (Ubuntu 14.04 LTS if it changes anything). It worked fine. The daemon was always on and I had the web interface up (I honestly don't remember if I could access it outside the LAN, probably yes).

For whatever reason, I was checking active connections on the machine and noticed a whole bunch of incoming connections from different parts of the world, including some sketchy ones like Iran and Russia (also "normal" countries like the US, et al). Netstat pointed to Transmission as the destination so I freaked out and uninstalled it and the connections stopped for good.

I understand how torrents work, but when the connections were active there were no active torrents, which is why I got worried.

Is it normal for Transmission to have open connections while the daemon is open and I was just worrying about nothing?

Could it have been bruteforcing attempts at the Transmission web interface and if so, can I get around it by using fail2ban or should I just not have it up?

Edit: I've since moved over to a new disk and a fresh CentOS 7 install with selinux set to enforcing.

jre
Sep 2, 2011

To the cloud ?



Mr Shiny Pants posted:

Don't if you are the guy, there was somebody on this forum who runs WP as a hoster an he also had some good tips.

Like making the whole WP dir readonly etc. Can't seem to find the post anymore though.

Making the WP dir readonly is good idea if you setup a cron job with permissions to update it regularly, otherwise you are better off turning on wordpress auto update feature

Really common way to get owned is to download pirated wordpress themes.

Peristalsis
Apr 5, 2004
Move along.
I'm having issues with Evolution's calendar. Specifically, it's attached to the MS Exchange Server at work, and it's all out of sync. It simply doen't match what's in my Outlook 365 calendar (old, deleted meetings show up, meetings that have moved are in original place, etc.), and I can't delete or add things to make it match. I wanted to detach Evolution from Exchange and re-attach, but the only way I see to do that is to delete the calendar, which Evolution says will delete it from the server. I very much don't want to do that. I guess I can uninstall evolution, reinstall it, and hope I can re-attach it to exchange properly and that everything will just work, but is there any less drastic way to re-sync the calendar?

Part of the problem may be that I'm trying to deal with three different calendars (I ran into trouble while trying to consolidate down to just one).

bobfather
Sep 20, 2001

I will analyze your nervous system for beer money

fuf posted:

oh hey, my wordpress sites get hacked all the time.

Some wordpress-specific lessons that are finally sinking in:
* Keep WP and all plugins updated
* Use as few plugins as possible and try to stick to those that are well-maintained
* Don't call your admin user "admin"
* Don't author posts / pages with your admin user and disable /author/ listing pages so that your admin username isn't easily discoverable
* Change the login url from /wp-admin/ to something else (there are plugins that can do this)
* Disable xmlrpc.php unless you know you definitely need it (you almost certainly don't)
* Disable write access to everywhere except wp-content/uploads if you can get away with it (but an annoying number of plugins need write access to random folders in wp-content/)
* Disable php execution in wp-content/uploads/
* Install a security plugin like Wordfence or iThemes Security. BUT, pay attention to what it is actually doing, especially how it is banning hosts after failed logins. I thought iThemes was taking care of bans for me, but turns out it was just writing new rules to an .htaccess file, which my server wasn't implementing anyway because I was using nginx.
* If you're getting a lot of brute force login attempts, just rename wp-login.php to wp-login.php.disabled for a while

Server specific stuff I've started doing because I'm paranoid now:
* Watch the WP directory for new or modified php files. Check for files that contain "eval" or "base64_decode", or which have a very long first line
* Watch server logs for suspicious POST requests (basically to any file other than wp-login.php, admin-ajax.php and wp-cron.php)

Thanks! I just did all of these things. Most of them were even doable with plugins.

I now have a LEMP stack running Wordpress on CentOS 7 with selinux intact! Turns out keeping selinux up wasn't so bad. I just had to get real used to grep-ing /var/log/audit/audit.log for denied entries, then use audit2allow to approve them one by one. Thanks for all the great advice everyone!

evol262
Nov 30, 2010
#!/usr/bin/perl
audit2allow -a will scan the log and generate rules for you, if that's easier

RFC2324
Jun 7, 2012

http 418

bobfather posted:

Thanks! I just did all of these things. Most of them were even doable with plugins.

I now have a LEMP stack running Wordpress on CentOS 7 with selinux intact! Turns out keeping selinux up wasn't so bad. I just had to get real used to grep-ing /var/log/audit/audit.log for denied entries, then use audit2allow to approve them one by one. Thanks for all the great advice everyone!

And this makes my 9 beers in rear end love linux logs even more.

:cheers:

Boris Galerkin
Dec 17, 2011

I don't understand why I can't harass people online. Seriously, somebody please explain why I shouldn't be allowed to stalk others on social media!
Is there a way for me to send a magic packet to my computer at work every morning (say from my home network or whatever) for wake on lan, when I have no control of the network at work? I'm pretty sure the answer is no right?

thebigcow
Jan 3, 2001

Bully!

Boris Galerkin posted:

Is there a way for me to send a magic packet to my computer at work every morning (say from my home network or whatever) for wake on lan, when I have no control of the network at work? I'm pretty sure the answer is no right?

You need something on that network. Alternatively you might have a BIOS option to turn on at a certain time of day.

telcoM
Mar 21, 2009
Fallen Rib

Boris Galerkin posted:

Is there a way for me to send a magic packet to my computer at work every morning (say from my home network or whatever) for wake on lan, when I have no control of the network at work? I'm pretty sure the answer is no right?

If the network admins at your work are at all competent, the answer should be "haha no".

When your computer at work is off, it won't answer to ARP requests. As a result, it won't be reachable by its ordinary IP address: if you try, the packet will go as far as the gateway of the segment containing your work computer. Then the gateway will see that its ARP table entry for that IP address is expired, and will fire off an ARP request. After getting no answer for that, you might get a "host not found" ICMP message back (unless some firewall is blocking those in order to prevent outsiders from mapping your work network just like that).

So, you would have to send the WoL magic packet as a directed broadcast to the network segment that is known to contain your work computer. This is certainly possible, technically. The problem is that directed broadcasts used to be mostly known for Smurf attacks, Windows Messenger Service pop-up spam and other kinds of nuisance, and there is no "universally accepted and useful" service that would use directed broadcasts for anything.

As a result, "block all directed broadcasts at every router ever" is standard practice and part of Network Firewalls 101.

The standard ways to use Wake-on-LAN seem to be either:
a) set up something in each network segment that can send WOL packets for hosts in that segment as necessary (a RasPi would be more than adequate for this job), or
b) choose one or two special network management servers/workstations and set up the necessary special firewall rules to allow them to send WOL packets anywhere inside an organization's network.

Saukkis
May 16, 2003

Unless I'm on the inside curve pointing straight at oncoming traffic the high beams stay on and I laugh at your puny protest flashes.
I am Most Important Man. Most Important Man in the World.

Boris Galerkin posted:

Is there a way for me to send a magic packet to my computer at work every morning (say from my home network or whatever) for wake on lan, when I have no control of the network at work? I'm pretty sure the answer is no right?

telcoM's answer covered WoL. But an alternative that may work for you is to not shutdown your computer. Just put it to sleep and configure your NIC's Power Management settings in such way that it is allowed to wake your computer. Then even just a ping should be able to wake the computer from sleep. It's been years since I last tried this, but in my testing you could take a RDP connection to a sleeping computer and you didn't even notice any delay.

The biggest shortcoming is that anything may wake up the computer, for example your company's management system trying to contact it.

Trillary Flinton
Aug 3, 2016
Couldn't find a megathread, and all my email stuff runs linux, sorry if this is the wrong place:
If I've got SPF TXT records for my domain and I add a TXT record with DMARC data and set p=none, will receiving email servers continue to check the SPF records?

some kinda jackal
Feb 25, 2003

 
 
Any sed gurus here?

I need to replace an entire line based on the string it begins with.

Example:

From:
>system.log arg1=xyz arg2=xyz arg3=xyz

To:
>system.log blah7=bla blah8=bla blah9=bla

so if I were looking to just replace arg1='s name I could just s/arg1/arg2/, but I want to change the entire line's contents. Essentially I will be replacing the line with something completely different except for the ">system.log" lead-in. The contents of the line I want to replace will be static so I don't need to do any sub-field replacements.

Essentially I want to tell sed to:

sed "replace any line you find that starts with '>system.log' (I don't care what follows) with '>system.log new=content is=here'"

anthonypants
May 6, 2007

by Nyc_Tattoo
Dinosaur Gum

Martytoof posted:

Any sed gurus here?

I need to replace an entire line based on the string it begins with.

Example:

From:
>system.log arg1=xyz arg2=xyz arg3=xyz

To:
>system.log blah7=bla blah8=bla blah9=bla

so if I were looking to just replace arg1='s name I could just s/arg1/arg2/, but I want to change the entire line's contents. Essentially I will be replacing the line with something completely different except for the ">system.log" lead-in. The contents of the line I want to replace will be static so I don't need to do any sub-field replacements.

Essentially I want to tell sed to:

sed "replace any line you find that starts with '>system.log' (I don't care what follows) with '>system.log new=content is=here'"
code:
sed 's/^(\>system\.log).*/$1 new=content is=here/g' file > newfile
e: missed that angle bracket

anthonypants fucked around with this message at 16:06 on Aug 5, 2016

evol262
Nov 30, 2010
#!/usr/bin/perl

Martytoof posted:

Any sed gurus here?

I need to replace an entire line based on the string it begins with.

Example:

From:
>system.log arg1=xyz arg2=xyz arg3=xyz

To:
>system.log blah7=bla blah8=bla blah9=bla

so if I were looking to just replace arg1='s name I could just s/arg1/arg2/, but I want to change the entire line's contents. Essentially I will be replacing the line with something completely different except for the ">system.log" lead-in. The contents of the line I want to replace will be static so I don't need to do any sub-field replacements.

Essentially I want to tell sed to:

sed "replace any line you find that starts with '>system.log' (I don't care what follows) with '>system.log new=content is=here'"

's/arg\(.\)=[[:alnum:]]\+/blah\1=bla/g'

Combat Pretzel
Jun 23, 2004

No, seriously... what kurds?!
Apparently it has some to light that the RAID5/6 code in BTRFS is a total clusterfuck. Am I the only one who finds it amusing that after all those years, BTRFS is still this in this Heisenberg-ish state, when meanwhile some FOSS keep creating storms in a tea cup in regards to shipping ZoL included in distros?

some kinda jackal
Feb 25, 2003

 
 
Bless you, generous sed gurus.

I am a fairly competent linux mans but when it comes to anything beyond basic sed or regex I fall to pieces.

Tigren
Oct 3, 2003

Martytoof posted:

Bless you, generous sed gurus.

I am a fairly competent linux mans but when it comes to anything beyond basic sed or regex I fall to pieces.

Well good news, it's the weekend and you have free time to go through all of the puzzles on https://regexcrossword.com/. I recommend all of my tier 1s go through that. Once you see regex/sed/awk as a puzzle, it all falls into place. At least it did for me.

dpkg chopra
Jun 9, 2007

Fast Food Fight

Grimey Drawer

Tigren posted:

Well good news, it's the weekend and you have free time to go through all of the puzzles on https://regexcrossword.com/. I recommend all of my tier 1s go through that. Once you see regex/sed/awk as a puzzle, it all falls into place. At least it did for me.

FFS, I was doing ok until I got to this:

Some of those aren't even in the loving cheat sheet agggggh

.?.+: = any character (none or once), any character (1 or more times)

.+ = (any character (1 or more times)

[*]+ = ?????? (is this the same as [.+] )

/* = ???????????????? (what the gently caress is that forward slash)

dpkg chopra fucked around with this message at 20:05 on Aug 5, 2016

peepsalot
Apr 24, 2007

        PEEP THIS...
           BITCH!

* is a literal character when used inside a character class.

anthonypants
May 6, 2007

by Nyc_Tattoo
Dinosaur Gum

Ur Getting Fatter posted:

FFS, I was doing ok until I got to this:

Some of those aren't even in the loving cheat sheet agggggh

.?.+: = any character (none or once), any character (1 or more times)

.+ = (any character (1 or more times)

[*]+ = ?????? (is this the same as [.+] )

/* = ???????????????? (what the gently caress is that forward slash)
I'd guess it's:
**
//

e: you're gonna love experienced #4

anthonypants fucked around with this message at 20:43 on Aug 5, 2016

anthonypants
May 6, 2007

by Nyc_Tattoo
Dinosaur Gum
My change request to update our Linux servers is finally getting approved, but my boss wants a rollback plan. So, if I wanted to generate a list of pending updates and cross-reference those with the current version, is there a flag I can add to yum check-update to do that or will I have to run yum list installed and compare them by hand?

kujeger
Feb 19, 2004

OH YES HA HA

Combat Pretzel posted:

Apparently it has some to light that the RAID5/6 code in BTRFS is a total clusterfuck. Am I the only one who finds it amusing that after all those years, BTRFS is still this in this Heisenberg-ish state, when meanwhile some FOSS keep creating storms in a tea cup in regards to shipping ZoL included in distros?

I don't think raid56 has ever been claimed to be other than very experimental, and not recommended outside of testing. It's just new that it's been very definitely confirmed that that it will almost certainly eat data during rebuild.

raid1/0 has been for a good while, and is still considered, safe

fletcher
Jun 27, 2003

ken park is my favorite movie

Cybernetic Crumb
I need a tool to monitor things like CPU, disk, network, jvm (tomcat), etc for a few dozen machines. I was thinking of setting up Cacti but I was wondering if there's any other tools I should consider before going down that route. Cacti just seems old and ugly, I think it would get the job done though.

One of the main criteria is that I can run it and host it myself, so I can retain my historical data as long as I want

fletcher fucked around with this message at 00:08 on Aug 6, 2016

Thermopyle
Jul 1, 2003

...the stupid are cocksure while the intelligent are full of doubt. —Bertrand Russell

fletcher posted:

I need a tool to monitor things like CPU, disk, network, jvm (tomcat), etc for a few dozen machines. I was thinking of setting up Cacti but I was wondering if there's any other tools I should consider before going down that route. Cacti just seems old and ugly, I think it would get the job done though.

One of the main criteria is that I can run it and host it myself, so I can retain my historical data as long as I want

Grafana + InfluxDB + collectd

There's other choices for InfluxDB/collectd that are good too

Mao Zedong Thot
Oct 16, 2008


Yeah Grafana and Influx is kinda hot. I like Munin a lot too, sorta depends on what you do or don't care about.

Prometheus sounds neat, but I've never used it, it just barely missed the cut, last time I was picking a monitoring thing.

Mao Zedong Thot fucked around with this message at 17:05 on Aug 6, 2016

Adbot
ADBOT LOVES YOU

fletcher
Jun 27, 2003

ken park is my favorite movie

Cybernetic Crumb
collectd looks pretty cool! Gonna play with it some more on Monday. Looks like it has plugins for pretty much everything I'm looking for. So that collects the stats, InfluxDB stores them, and Grafana to display them? How much fiddling does it take to get them all to play nicely with each other?

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply