While you’re in Palacios, check out Wananavu Outfitters. They are totally awesome! http://wananavuoutfitters.com
Installing Pi-Aware aka FlightAware
Buy the following:
Nooelec Dual-Band NESDR Nano 3 Premium ADS-B (978MHz UAT & 1090MHz 1090ES) Bundle for Stratux™, Avare, Foreflight, FlightAware & Other Applications. Includes 2 SDRs, 4 Antennas, 5 Adapters.
Nooelec Omnidirectional 7dBi ADS-B Antenna – 23″ Outdoor Fiberglass Antenna w/Female N-Connector, 10m RG58 Cable Extension w/SMA Connector & Mounting Hardware. Weatherproof. 1090MHz Center Frequency
https://www.amazon.com/gp/product/B076GWF6FF
https://www.amazon.com/gp/product/B08NRQF9TK
Once you have all the parts together, head over to FlightAware’s page for a download of the image, or you can hand load it, which is what I did. since the Pi I used also hosts this website.
Hand Load:
https://flightaware.com/adsb/piaware/install
Image Download:
Happy New Year 2021! – App_Offline
Greetings 2021! I’m in the middle of a software deployment right now. Hoping adoption goes well and that everyone enjoys using the application.
Some basic tool I learned a moment ago: Use the app_offline.htm file in your ASP.net 2.0 (minimum) to quickly notify your users that the page – or your app is down for maintenance.
Enable SNMP on a Raspberry Pi
sudo apt-get update
sudo apt-get upgrade -y
sudo apt-get install snmpd -y
sudo apt-get install snmp -y
sudo nano /etc/snmp/snmpd.conf
To get it running, you will need to modify the sudo nano /etc/snmp/snmpd.conf file:
First, I commented out this line:
#agentAddress udp:127.0.0.1:161
and below the line ‘#agentAddress udp:161,udp6:[::1]:161′ I added:
agentAddress udp:161
then below this line:
rocommunity public localhost
I added:
rocommunity public 190.0.10.0/24
Finally, restart the service:
service snmpd restart
Check-MK Debian Linux Agent Install
First you’ll need to install xinetd which is a requirement for the Check_MK agent:
apt-get install xinetd
Then, latest Check_MK agent installer from your Check_MK website and install:
cd /tmp/
wget http://%yourcheck_mk_server%/download/check-mk-agent_***.deb
dpkg -i check*
How to Enable SNMP ESXi 6.5
Open your favorite (Putty) ssh application and connect to your ESX host and then run the following commands:
esxcli system snmp set –communities public
esxcli system snmp set –enable true
esxcli network firewall ruleset set –ruleset-id snmp –allowed-all true
esxcli network firewall ruleset set –ruleset-id snmp –enabled true
/etc/init.d/snmpd restart
The –ruleset should be a dash dash not a bar, same with the –allowed and –enabled; I don’t know why WordPress does that.
Schannel Fatal Alert 40… 70
This has to do with FIPS Compliant Algorithms group policy, but the policy was disabled. Microsoft’s documentation states that the GPO controls the reg key [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\FipsAlgorithmPolicy]. This key was disabled (set to 1), I created a GPO at my workstation level and caused an update/replace entry [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa] and set fipsalgorithmpolicy to 0. On the next reboot the machine should no longer cause the Schannel errors.
Default Passwords for San Gear and Others
Here is a collection of default passwords for EMC, HP, Cisco, Pure, VMware, TrendMicro and IBM hardware & software.
EMC Secure Remote Support (ESRS) Axeda Policy Manager Server:
Username: admin
Password: EMCPMAdm7n
EMC VNXe Unisphere (EMC VNXe Series Quick Start Guide, step 4):
Username: admin
Password: Password123#
EMC vVNX Unisphere:
Username: admin
Password: Password123#
NB You must change the administrator password during this first login.
EMC CloudArray Appliance:
Username: admin
Password: password
NB Upon first login you are prompted to change the password.
EMC CloudBoost Virtual Appliance:
https://
Username: local\admin
Password: password
NB You must immediately change the admin password.
$ password
EMC Ionix Unified Infrastructure Manager/Provisioning (UIM/P):
Username: sysadmin
Password: sysadmin
EMC VNX Monitoring and Reporting:
Username: admin
Password: changeme
EMC RecoverPoint:
Username: admin
Password: admin
Username: boxmgmt
Password: boxmgmt
Username: security-admin
Password: security-admin
EMC XtremIO:
XtremIO Management Server (XMS)
Username: xmsadmin
password: 123456 (prior to v2.4)
password: Xtrem10 (v2.4+)
XtremIO Management Secure Upload
Username: xmsupload
Password: xmsupload
XtremIO Management Command Line Interface (XMCLI)
Username: tech
password: 123456 (prior to v2.4)
password: X10Tech! (v2.4+)
XtremIO Management Command Line Interface (XMCLI)
Username: admin
password: 123456 (prior to v2.4)
password: Xtrem10 (v2.4+)
XtremIO Graphical User Interface (XtremIO GUI)
Username: tech
password: 123456 (prior to v2.4)
password: X10Tech! (v2.4+)
XtremIO Graphical User Interface (XtremIO GUI)
Username: admin
password: 123456 (prior to v2.4)
password: Xtrem10 (v2.4+)
XtremIO Easy Installation Wizard (on storage controllers / nodes)
Username: xinstall
Password: xiofast1
XtremIO Easy Installation Wizard (on XMS)
Username: xinstall
Password: xiofast1
Basic Input/Output System (BIOS) for storage controllers / nodes
Password: emcbios
Basic Input/Output System (BIOS) for XMS
Password: emcbios
EMC ViPR Controller :
http://ViPR_virtual_ip (the ViPR public virtual IP address, also known as the network.vip)
Username: root
Password: ChangeMe
EMC ViPR Controller Reporting vApp:
http://
Username: admin
Password: changeme
EMC Solutions Integration Service:
https://
Username: root
Password: emc
EMC VSI for VMware vSphere Web Client:
https://
Username: admin
Password: ChangeMe
Note:
After the Solutions Integration Service password is changed, it cannot be modified.
If the password is lost, you must redeploy the Solutions Integration Service and use the default login ID and password to log in.
EMC Avamar Backup Service
username: admin
password: changeme
openSSH key
ssh-agent bash
ssh-add ~admin/.ssh/admin_key
Password: P3t3rPan
Pure Storage Arrays
Username: pureuser
Password: pureuser
Cisco Integrated Management Controller (IMC) / CIMC / BMC:
Username: admin
Password: password
Cisco UCS Director:
Username: admin
Password: admin
Username: shelladmin
Username: changeme
Hewlett Packard P2000 StorageWorks MSA Array Systems:
Username: admin
Password: !admin (exclamation mark ! before admin)
Username: manage
Password: !manage (exclamation mark ! before manage)
IBM Security Access Manager Virtual Appliance:
Username: admin
Password: admin
VCE Vision:
Username: admin
Password: 7j@m4Qd+1L
Username: root
Password: V1rtu@1c3!
VMware vSphere Management Assistant (vMA):
Username: vi-admin
Password: vmware
VMware Data Recovery (VDR):
Username: root
Password: vmw@re (make sure you enter @ as Shift-2 as in US keyboard layout)
VMware vCenter Hyperic Server:
https://Server_Name_or_IP:5480/
Username: root
Password: hqadmin
https://Server_Name_or_IP:7080/
Username: hqadmin
Password: hqadmin
VMware vCenter Chargeback:
https://Server_Name_or_IP:8080/cbmui
Username: root
Password: vmware
VMware vCenter Server Appliance (VCSA) 5.5:
https://Server_Name_or_IP:5480
Username: root
Password: vmware
VMware vCenter Operations Manager (vCOPS):
Console access:
Username: root
Password: vmware
Manager:
https://Server_Name_or_IP
Username: admin
Password: admin
Administrator Panel:
https://Server_Name_or_IP/admin
Username: admin
Password: admin
Custom UI User Interface:
https://Server_Name_or_IP/vcops-custom
Username: admin
Password: admin
VMware vCenter Support Assistant:
http://Server_Name_or_IP
Username: root
Password: vmware
VMware vCenter / vRealize Infrastructure Navigator:
https://Server_Name_or_IP:5480
Username: root
Password: specified during OVA deployment
VMware ThinApp Factory:
Username: admin
Password: blank (no password)
VMware vSphere vCloud Director Appliance:
Username: root
Password: vmware
VMware vCenter Orchestrator :
https://Server_Name_or_IP:8281/vco – VMware vCenter Orchestrator
https://Server_Name_or_IP:8283 – VMware vCenter Orchestrator Configuration
Username: vmware
Password: vmware
VMware vCloud Connector Server (VCC) / Node (VCN):
https://Server_Name_or_IP:5480
Username: admin
Password: vmware
Username: root
Password: vmware
VMware vSphere Data Protection Appliance:
Username: root
Password: changeme
VMware HealthAnalyzer:
Username: root
Password: vmware
VMware vShield Manager:
https://Server_Name_or_IP
Username: admin
Password: default
type enable to enter Privileged Mode, password is ‘default’ as well
Teradici PCoIP Management Console:
The default password is blank
Trend Micro Deep Security Virtual Appliance (DS VA):
Login: dsva
password: dsva
Citrix Merchandising Server Administrator Console:
User name: root
password: C1trix321
VMTurbo Operations Manager:
User name: administrator
password: administrator
If DHCP is not enabled, configure a static address by logging in with these credentials:
User name: ipsetup
password: ipsetup
Console access:
User name: root
password: vmturbo
Check-MK Redhat Linux Agent Install
Following is the simple steps to install the CheckMK agent onto a Linux 6x OS.
yum -y install xinetd
cd /tmp
cp xinetd.conf /etc/xinetd.d/check_mk
(Above file is at this link.)
wget http://%checkmkurl%/check_mk/agents/check_mk_agent.linux
cp check_mk_agent.linux check_mk_agent
chmod 776 check_mk_agent
cp /tmp/check_mk_agent /usr/bin/check_mk_agent
mkdir /usr/lib/check_mk_agent
mkdir /usr/lib/check_mk_agent/plugins
cd /usr/lib/check_mk_agent/plugins
wget http://
%checkmkurl%/check_mk/agents/plugins/mk_inventory.linux
cp mk_inventory.linux mk_inventory.sh
chmod 776 mk_inventory.sh
/etc/init.d/xinetd restart
.
CheckMK Agent xinetd.d Config
# +——————————————————————+
# | ____ _ _ __ __ _ __ |
# | / ___| |__ ___ ___| | __ | \/ | |/ / |
# | | | | ‘_ \ / _ \/ __| |/ / | |\/| | ‘ / |
# | | |___| | | | __/ (__| < | | | | . \ |
# | \____|_| |_|\___|\___|_|\_\___|_| |_|_|\_\ |
# | |
# | Copyright Mathias Kettner 2014 mk@mathias-kettner.de |
# +——————————————————————+
#
# This file is part of Check_MK.
# The official homepage is at http://mathias-kettner.de/check_mk.
#
# check_mk is free software; you can redistribute it and/or modify it
# under the terms of the GNU General Public License as published by
# the Free Software Foundation in version 2. check_mk is distributed
# in the hope that it will be useful, but WITHOUT ANY WARRANTY; with-
# out even the implied warranty of MERCHANTABILITY or FITNESS FOR A
# PARTICULAR PURPOSE. See the GNU General Public License for more de-
# ails. You should have received a copy of the GNU General Public
# License along with GNU Make; see the file COPYING. If not, write
# to the Free Software Foundation, Inc., 51 Franklin St, Fifth Floor,
# Boston, MA 02110-1301 USA.
service check_mk
{
type = UNLISTED
port = 6556
socket_type = stream
protocol = tcp
wait = no
user = root
server = /usr/bin/check_mk_agent
# If you use fully redundant monitoring and poll the client
# from more then one monitoring servers in parallel you might
# want to use the agent cache wrapper:
#server = /usr/bin/check_mk_caching_agent
# configure the IP address(es) of your Nagios server here:
only_from = 127.0.0.1 %YOUR IP ADDRESSES HERE!!!%
# Don’t be too verbose. Don’t log every check. This might be
# commented out for debugging. If this option is commented out
# the default options will be used for this service.
log_on_success =
disable = no
}