Mass Deleteing hosts in LibreNMS
I recently worked on a network where we re-piped around four hundred hosts. These four hundred hosts were being monitored by LibreNMS. The question is how to delete this many hosts. I credit https://www.incredigeek.com/home/librenms-bulk-delete/ for this tutorial. I will only add that …
Mikrotik releases Apple Mac native App
With the release of Mikrotik Winbox version 4 we now have a Mac native application. This looks the same as the Windows and Linux versions. Way to go, Mikrotik! https://mikrotik.com/download
New podcasts coming soon
Picked up something new to get back into the podcasts.
Alta labs network at a glance
A quick post about the Alta Labs network view front eh iPhone app.
Amazon Tech Deal: Portable power
With a 600W AC inverter, 268Wh LiFePO4 battery pack, and 9 outlets, this is perfect for Tower crews on the job site. Many times, these crews are in remote areas, so you don’t want to fire up a generator or …
Amazon Prime Deal: Keep your stuff charged
If you are like me, you spend a lot of time in data centers. One challenge is keeping your phone charged. I like carrying a battery around so I don’t have to find outlets. https://amzn.to/4cBkhESINIU Portable Charger, Slimmest 10000mAh 5V/3A …
LibreNMS new install and all devices were in warn
I recently installed LibreNMS for monitoring some LTE clients. These clients reboot every morning at 3am. This is important to know. When I added them, they all showed up in a warning state. Some google searches said this was due …
/127s for IPv6 Point -To-Point links
/127’s for point-to-point links (RFC 6164) instead of /64’s https://datatracker.ietf.org/doc/html/rfc6164 [RFC4291] specifies that interface IDs for all unicast addresses, except those that start with the binary value 000, are required to be 64 bits long and to be constructed in …
Two-Factor authentication trends for modern security
In the ever-evolving landscape of cybersecurity, authentication is one of the most fundamental aspects of protecting digital identities. While traditional password-based authentication has been the norm for decades, it’s increasingly proving insufficient against sophisticated cyber threats. This is where Two-Factor …
Republish: Tales from the Data Center
Originally Published in 2015So, I have a very heartwarming story today related to the WISP industry. So this started back in March. A client was having issues with a circuit. The transport provider had so many failures in troubleshooting the …