Sponsored Content
Top Forums Programming NodeMCU ESP8266 Blynk SSL Application for Linux Server Load Averages Post 303043543 by Neo on Friday 31st of January 2020 03:01:18 AM
Old 01-31-2020
WeMos D1 with ESP8266 Running the same Load Avg sketch:

NodeMCU ESP8266 Blynk SSL Application for Linux Server Load Averages-s__66502661_blynkjpg


Two iPhones running the same Blynk app:

NodeMCU ESP8266 Blynk SSL Application for Linux Server Load Averages-s__66502658_blynkjpg


This is awesome really. I think I will use some of the sonar modules I have to create a home surveillance Blynk app when I am bored. This app of course will let me know when anyone is moving around in my home when I'm not there Smilie LOL . Normally I am not really into home automation and surveillance apps (been there and done that a decade, maybe two, ago), but this ESP8266 is really amazing combined with the Arduino IDE for programming. They are so cheap, the sky is the limit!

A downside of this, of course, is the fact all of this kind of this very cheap, robust "IoT" tech can be used in the "new surveillance society" that civilization is marching toward.

The net is pregnant with "ESP8266 WIFI cams" and so many "surveillance-oriented" applications (and also "relay control" applications). I'm trying to think of a few ESP8266 apps that are a bit different (like this Linux server monitoring app) than what's well covered already in blogs and on YTubie.
 

9 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Server load (Unix/Linux, Redhat, CPanel)

Hello, I'm facing a big problem with my hosting server (Dual Xeon 2.4GHz), I'm having a load in the CPU usage and the memory (maybe it's related) ALSO mySQL: Server Load 5.34 (2 cpus) (to 22 sometime) Memory Used 68.4 % (to 70% sometime) When I go to 'CPU/Memory/MySQL Usage' I found: ... (3 Replies)
Discussion started by: Kh@lid
3 Replies

2. Cybersecurity

linux prog for server space, load etc

Hi all what are the ways by which we can know and generate a report of the space remaining, memory(ram) used and the load on the server over a period of time. (1 Reply)
Discussion started by: arlan
1 Replies

3. UNIX for Advanced & Expert Users

Sun: High kernel usage & very high load averages

Hi, I am seeing very high kernel usage and very high load averages on my system (Although we are not loading much data to our database). Here is the output of top...does anyone know what i should be looking at? Thanks, Lorraine last pid: 13144; load averages: 22.32, 19.81, 16.78 ... (4 Replies)
Discussion started by: lorrainenineill
4 Replies

4. Linux

how to setup a virtual IP to control 2 server load for linux

Hi anyone know how to setup a setup a virtual IP to control 2 server load for linux? i only have 2 server, i don want to buy another just for the load balance... is there a way to do it? Sumemr (0 Replies)
Discussion started by: summerpeh
0 Replies

5. Shell Programming and Scripting

Create a list of load averages

`/proc/loadavg` give me three indicators of how much work the system has done during the last 1, 5 & 15 minutes. How can i get a list of load averages that each averaged over the last minute for 10 minutes? (2 Replies)
Discussion started by: navidlog
2 Replies

6. Solaris

Sparc Solaris 10 load averages

our server is running oracle database, it has: load average: 1.77, 1.76, 1.73 using only one cpu. is that too high? thanks. (4 Replies)
Discussion started by: orange47
4 Replies

7. Red Hat

Red Hat application server ssl keystore problem

A client is accessing our JBoss server. In the past, we set up a keystore and everything worked fine. That certificat expired and we've installed the new one. Now the client is getting the following error - HTTP/1.1 500 Internal Server Error Date: Mon, 14 Apr 2014 13:25:44 GMT Server:... (1 Reply)
Discussion started by: kkinney
1 Replies

8. AIX

AIX LDAP client authenticate against Linux Openldap server over TLS/SSL

Hi folks, How can i configure an AIX LDAP client to authenticate against an Linux Openldap server over TLS/SSL? It works like a charm without TLS/SSL. i would like to have SSL encrypted communication for ldap (secldapclntd) and ldapsearch etc. while accepting every kind of certificate/CA.... (6 Replies)
Discussion started by: paco699
6 Replies

9. Programming

Wuhan Coronavirus Status for China - Rapid Prototype Blynk App with ESP8266

Here is a rapid prototype app I just put together which might be of interest to some people. Basically, I have parsed the data from a Chinese web site which is tracking the Wuhan coronavirus, and cache that data every minute via a local cron file and make a simple API available to a Blink app. ... (6 Replies)
Discussion started by: Neo
6 Replies
ATTACH(5)							File Formats Manual							 ATTACH(5)

NAME
attach, session, nop - messages to initiate activity SYNOPSIS
Tnop tag[2] Rnop tag[2] Tsession tag[2] chal[8] Rsession tag[2] chal[8] authid[28] authdom[48] Tattach tag[2] fid[2] uid[28] aname[28] ticket[72] auth[13] Rattach tag[2] fid[2] qid[8] rauth[13] DESCRIPTION
The nop request does nothing overt but may be used to synchronize the channel between two service hosts initially. The session request is used to initialize a connection between a client and a server. All outstanding I/O on the connection is aborted. The set of messages between session requests is called a session. The host's user name (authid) and its authentication domain (authdom) identify the key to be used when authenticating to this host. The exchanged challenges (chal) are used in the authentication algorithm. If authid is a null string no authentication is performed in this session. The tag should be NOTAG (value 0xFFFF) for a nop or session message. The attach message serves as a fresh introduction from a user on the client machine to a server. The message identifies the user (uid) and may select the file tree to access (aname). The ticket and auth arguments contains authorization data derived from the exchanged chal- lenges of the session message; see auth(6). As a result of the attach transaction, the client will have a connection to the root directory of the desired file tree, represented by fid. An error is returned if fid is already in use. The server's idea of the root of the file tree is represented by the returned qid. ENTRY POINTS
An attach transaction will be generated for kernel devices (see intro(3)) when a system call evaluates a file name beginning with Pipe(2) generates an attach on the kernel device pipe(3). The mount system call (see bind(2)) generates an attach messages to the remote file server. When the kernel boots, an attach is made to the root device, root(3), and then an attach is made to the requested file server machine. SEE ALSO
auth(6) ATTACH(5)
All times are GMT -4. The time now is 09:07 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy