Skip to content

Instantly share code, notes, and snippets.

@tandyuk
tandyuk / update.sh
Created January 21, 2016 17:29
Make observium full width on 1920x screens again
#!/bin/bash
cd /opt/observium
svn up
perl -i -lne 's/1874px/2000px/g; print' html/css/bootstrap.css
perl -i -lne 's/1875px/2001px/g; print' html/css/bootstrap.css
perl -i -lne 's/^(\@media \(min-width: 2001px\) {)/\@media \(min-width: 1800px\) {.container { width: 1950px; max-width: 1950px; } }\n$1/g; print' html/css/bootstrap.css
./discovery.php -u
./poller-wrapper.py 32
[2.1.5-RELEASE][root@pfsense.office.tandyukservers.co.uk]/root(26): cat /tmp/rules.debug | grep -i 'icmp'
# IPv6 ICMP is not auxilary, it is required for operation
# See man icmp6(4)
pass quick inet6 proto ipv6-icmp from any to any icmp6-type {1,2,135,136} keep state
# Allow only bare essential icmpv6 packets (NS, NA, and RA, echoreq, echorep)
pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type {129,133,134,135,136} keep state
pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type {129,133,134,135,136} keep state
pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type {128,133,134,135,136} keep state
pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type {128,133,134,135,136} keep state
pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type {128,133,134,135,136} keep state
Local to remote:
17:04:34.009312 IP6 2a02:13a0:a006:1:0:dead:beef:cafe > 2001:1b40:5000:22::123: ICMP6, echo request, seq 298, length 40
17:04:34.018291 IP6 2001:1b40:5000:22::123 > 2a02:13a0:a006:1:0:dead:beef:cafe: ICMP6, echo reply, seq 298, length 40
17:04:34.557687 IP6 fe80::202:a5ff:fe4f:2a81 > ff02::1: ICMP6, router advertisement, length 168
17:04:35.013180 IP6 2a02:13a0:a006:1:0:dead:beef:cafe > 2001:1b40:5000:22::123: ICMP6, echo request, seq 299, length 40
17:04:35.023234 IP6 2001:1b40:5000:22::123 > 2a02:13a0:a006:1:0:dead:beef:cafe: ICMP6, echo reply, seq 299, length 40
17:04:36.016248 IP6 2a02:13a0:a006:1:0:dead:beef:cafe > 2001:1b40:5000:22::123: ICMP6, echo request, seq 300, length 40
17:04:36.025199 IP6 2001:1b40:5000:22::123 > 2a02:13a0:a006:1:0:dead:beef:cafe: ICMP6, echo reply, seq 300, length 40
17:04:37.019342 IP6 2a02:13a0:a006:1:0:dead:beef:cafe > 2001:1b40:5000:22::123: ICMP6, echo request, seq 301, length 40
C:\WINDOWS\system32>tracert -d -6 tandyuk.com
Tracing route to tandyuk.com [2001:1b40:5000:22:1::85]
over a maximum of 30 hops:
1 <1 ms 1 ms <1 ms 2001:4d48:ad53:2f00:1::
Trace complete.
C:\WINDOWS\system32>tracert -d -4 tandyuk.com
W W W W
a a a a
n n n n
1 2 3 4
V V V V
L L L L
A A A A
N N N N
1 2 3 4
0 0 0 0
The config:
input {
udp {
port => 515
type => esxi
}
}
filter {
<166>2014-11-11T09:25:01.578Z esxi-2.tandyuk.com hostd-probe: [FFD14CB0 warning 'Default'] Unrecognized log/level 'audit' using 'info'
<166>2014-11-11T09:25:01.578Z esxi-2.tandyuk.com hostd-probe: [FFD14CB0 info 'Default'] Logging uses fast path: true
<166>2014-11-11T09:25:01.579Z esxi-2.tandyuk.com hostd-probe: [FFD14CB0 info 'Default'] Handling bora/lib logs with VmaCore facilities
<166>2014-11-11T09:25:01.579Z esxi-2.tandyuk.com hostd-probe: [FFD14CB0 info 'Default'] Initialized channel manager
<166>2014-11-11T09:25:01.579Z esxi-2.tandyuk.com hostd-probe: [FFD14CB0 info 'Default'] Current working directory: /var/log/vmware
<166>2014-11-11T09:25:01.581Z esxi-2.tandyuk.com hostd-probe: [FFD14CB0 info 'Default'] Vmacore::InitSSL: handshakeTimeoutUs = 20000000
<166>2014-11-11T09:25:01.582Z esxi-2.tandyuk.com Rhttpproxy: [358C6B90 verbose 'Proxy Req 16576'] New proxy client TCP(local=127.0.0.1:80, peer=127.0.0.1:55717)
<166>2014-11-11T09:25:01.584Z esxi-2.tandyuk.com hostd-probe: [FFDFAB90 info 'Libs'] VThreadB
filter {
if ("syslog" in [type]) {
grok {
match => { "message" => "(?:%{SYSLOGTIMESTAMP:timestamp}|%{TIMESTAMP_ISO8601:timestamp8601}) (?:%{SYSLOGHOST:logsource}) (?:%{SYSLOGPROG}): (?<messagebody>(?:\[(?<esxi_thread_id>[0-9A-Z]{8,8}) %{DATA:esxi_loglevel} \'%{DATA:esxi_service}\'\] %{GREEDYDATA:esxi_message}|%{GREEDYDATA}))" }
add_field => [ "received_at", "%{@timestamp}" ]
add_field => [ "received_from", "%{host}" ]
}
grok {
match => { "message" => "%{SYSLOGTIMESTAMP:syslog_timestamp} %{SYSLOGHOST:syslog_hostname} %{DATA:syslog_program}(?:\[%{POSINT:syslog_pid}\])?: %{GREEDYDATA:syslog_message}" }
filter {
if [type] == "syslog" {
grok {
match => { "message" => "%{SYSLOGTIMESTAMP:syslog_timestamp} %{SYSLOGHOST:syslog_hostname} %{DATA:syslog_program}(?:\[%{POSINT:syslog_pid}\])?: %{GREEDYDATA:syslog_message}" }
add_field => [ "received_at", "%{@timestamp}" ]
add_field => [ "received_from", "%{host}" ]
}
syslog_pri { }
date {
match => [ "syslog_timestamp", "MMM d HH:mm:ss", "MMM dd HH:mm:ss" ]
input {
file {
path => "/tmp/*_log"
}
tcp {
port => 5000
type => syslog
}
udp {
port => 5000