Config stuff down below, can't find any log files for some reason.
Problem:
I keep getting locked out of api.github.com saying my use is above what is allowed. No idea what was causing it until I literally turned off all containers in a view to trying to troubleshoot, and it boils down to pialert. its been off for a day and i've not seen any attempts
When i am running PiAlert on my docker container, I'm seeing a LOT of attempts of connectivity to api.github.com which quickly causes my connection to said website to be blocked out as it exceeds the allowed access for unauthenticated access.
What is PiAlert needing connectivity to githubs API on such an aggressive manner?
(I've literally turned off all containers in a view to trying to troubleshoot what was causing my IP to be blocked from github, and it boils down to pialert. its been off for a day and i've not seen any attempts)
API_CUSTOM_SQL='SELECT * FROM Devices WHERE dev_PresentLastScan = 0'
NMAPSRV
---------------------------
NMAPSRV_RUN='disabled'
NMAPSRV_CMD='SELECT ns.MAC as Object_PrimaryID, cast({s-quote}http://{s-quote} || dv.dev_LastIP as VARCHAR(100)) || {s-quot
e})) as VARCHAR(100)) as Object_SecondaryID, datetime() as DateTime, ns.Service as Watched_Value1, ns.State as Watched_Val
ed_Value4, ns.Extra as Extra, ns.MAC as ForeignKey FROM (SELECT FROM Nmap_Scan) ns left JOIN (SELECT devName, dev
NMAPSRV_RUN_SCHD='0 2 '
NMAPSRV_WATCH=['Watched_Value1']
NMAPSRV_REPORT_ON=['new','watched-changed']
WEBMON
---------------------------
WEBMON_RUN='disabled'
WEBMON_CMD='python3 /home/pi/pialert/front/plugins/website_monitor/script.py urls={urls}'
WEBMON_RUN_SCHD='0 2 '
WEBMON_API_SQL='SELECT FROM plugin_website_monitor'
WEBMON_RUN_TIMEOUT=5
WEBMON_WATCH=['Watched_Value1']
WEBMON_REPORT_ON=['new','watched-changed']
WEBMON_urls_to_check=['https://google.com','https://duck.com']
WEBMON_SQL_internet_ip='SELECT dev_LastIP FROM Devices WHERE dev_MAC = {s-quote}Internet{s-quote}'
Config stuff down below, can't find any log files for some reason.
Problem: I keep getting locked out of api.github.com saying my use is above what is allowed. No idea what was causing it until I literally turned off all containers in a view to trying to troubleshoot, and it boils down to pialert. its been off for a day and i've not seen any attempts
When i am running PiAlert on my docker container, I'm seeing a LOT of attempts of connectivity to api.github.com which quickly causes my connection to said website to be blocked out as it exceeds the allowed access for unauthenticated access.
What is PiAlert needing connectivity to githubs API on such an aggressive manner?
(I've literally turned off all containers in a view to trying to troubleshoot what was causing my IP to be blocked from github, and it boils down to pialert. its been off for a day and i've not seen any attempts)
Generated: 2023-07-05_15-29-21
General
---------------------------
ENABLE_ARPSCAN=True SCAN_SUBNETS=['--localnet'] LOG_LEVEL='verbose' TIMEZONE='Europe/London' ENABLE_PLUGINS=True PIALERT_WEB_PROTECTION=False PIALERT_WEB_PASSWORD='' INCLUDED_SECTIONS=['internet','new_devices','down_devices','events'] SCAN_CYCLE_MINUTES=5 DAYS_TO_KEEP_EVENTS=90 REPORT_DASHBOARD_URL='http://pi.alert/' DIG_GET_IP_ARG='-4 myip.opendns.com @resolver1.opendns.com' UI_LANG='English' UI_PRESENCE=['online','offline','archived']
Email
---------------------------
REPORT_MAIL=False SMTP_SERVER='smtp.gmail.com' SMTP_PORT=587 REPORT_TO='user@gmail.com' REPORT_FROM='Pi.Alert user@gmail.com' SMTP_SKIP_LOGIN=False SMTP_USER='user@gmail.com' SMTP_PASS='password' SMTP_SKIP_TLS=False SMTP_FORCE_SSL=False
Webhooks
---------------------------
REPORT_WEBHOOK=False WEBHOOK_URL='http://n8n.local:5555/webhook-test/aaaaaaaa-aaaa-aaaa-aaaaa-aaaaaaaaaaaa' WEBHOOK_PAYLOAD='json' WEBHOOK_REQUEST_METHOD='GET'
Apprise
---------------------------
REPORT_APPRISE=False APPRISE_HOST='http://localhost:8000/notify' APPRISE_URL='mailto://smtp-relay.sendinblue.com:587?from=user@gmail.com&name=apprise&user=user@gmail.com&pass=password&to=us APPRISE_PAYLOAD='html'
NTFY
---------------------------
REPORT_NTFY=False NTFY_HOST='https://ntfy.sh' NTFY_TOPIC='replace_my_secure_topicname_91h889f28' NTFY_USER='user' NTFY_PASSWORD='passw0rd'
PUSHSAFER
---------------------------
REPORT_PUSHSAFER=False PUSHSAFER_TOKEN='ApiKey'
MQTT
---------------------------
REPORT_MQTT=False MQTT_BROKER='192.168.1.2' MQTT_PORT=1883 MQTT_USER='mqtt' MQTT_PASSWORD='passw0rd' MQTT_QOS=0 MQTT_DELAY_SEC=2
DynDNS
---------------------------
DDNS_ACTIVE=False DDNS_DOMAIN='your_domain.freeddns.org' DDNS_USER='dynu_user' DDNS_PASSWORD='A0000000B0000000C0000000D0000000' DDNS_UPDATE_URL='https://api.dynu.com/nic/update?'
PiHole
---------------------------
PIHOLE_ACTIVE=True DHCP_ACTIVE=True
Pholus
---------------------------
PHOLUS_ACTIVE=False PHOLUS_TIMEOUT=20 PHOLUS_FORCE=False PHOLUS_RUN='once' PHOLUS_RUN_TIMEOUT=600 PHOLUS_RUN_SCHD='0 4 *' PHOLUS_DAYS_DATA=0
Nmap
---------------------------
NMAP_ACTIVE=True NMAP_TIMEOUT=150 NMAP_RUN='none' NMAP_RUN_SCHD='0 2 *' NMAP_ARGS='-p -10000'
API
---------------------------
API_CUSTOM_SQL='SELECT * FROM Devices WHERE dev_PresentLastScan = 0'
NMAPSRV
---------------------------
NMAPSRV_RUN='disabled' NMAPSRV_CMD='SELECT ns.MAC as Object_PrimaryID, cast({s-quote}http://{s-quote} || dv.dev_LastIP as VARCHAR(100)) || {s-quot e})) as VARCHAR(100)) as Object_SecondaryID, datetime() as DateTime, ns.Service as Watched_Value1, ns.State as Watched_Val ed_Value4, ns.Extra as Extra, ns.MAC as ForeignKey FROM (SELECT FROM Nmap_Scan) ns left JOIN (SELECT devName, dev NMAPSRV_RUN_SCHD='0 2 ' NMAPSRV_WATCH=['Watched_Value1'] NMAPSRV_REPORT_ON=['new','watched-changed']
WEBMON
---------------------------
WEBMON_RUN='disabled' WEBMON_CMD='python3 /home/pi/pialert/front/plugins/website_monitor/script.py urls={urls}' WEBMON_RUN_SCHD='0 2 ' WEBMON_API_SQL='SELECT FROM plugin_website_monitor' WEBMON_RUN_TIMEOUT=5 WEBMON_WATCH=['Watched_Value1'] WEBMON_REPORT_ON=['new','watched-changed'] WEBMON_urls_to_check=['https://google.com','https://duck.com'] WEBMON_SQL_internet_ip='SELECT dev_LastIP FROM Devices WHERE dev_MAC = {s-quote}Internet{s-quote}'
DHCPSRVS
---------------------------
DHCPSRVS_RUN='disabled' DHCPSRVS_CMD='python3 /home/pi/pialert/front/plugins/dhcp_servers/script.py' DHCPSRVS_RUN_SCHD='0 2 *' DHCPSRVS_RUN_TIMEOUT=5 DHCPSRVS_WATCH=['Watched_Value1'] DHCPSRVS_REPORT_ON=['new','watched-changed']
DHCPLSS
---------------------------
DHCPLSS_RUN='disabled' DHCPLSS_CMD='python3 /home/pi/pialert/front/plugins/dhcp_leases/script.py paths={paths}' DHCPLSS_paths_to_check=['/mnt/dhcp1.leases','/mnt/dhcp2.leases'] DHCPLSS_RUN_SCHD='0 2 *' DHCPLSS_RUN_TIMEOUT=5 DHCPLSS_WATCH=['Watched_Value1','Watched_Value4'] DHCPLSS_REPORT_ON=['new','watched-changed']
UNDIS
---------------------------
UNDIS_RUN='disabled' UNDIS_CMD='python3 /home/pi/pialert/front/plugins/undiscoverables/script.py devices={devices}' UNDIS_RUN_TIMEOUT=10 UNDIS_devices_to_import=['dummy_router']
SNMPDSC
---------------------------
SNMPDSC_RUN='disabled' SNMPDSC_CMD='python3 /home/pi/pialert/front/plugins/snmp_discovery/script.py routers={s-quote}{routers}{s-quote}' SNMPDSC_routers=['snmpwalk -v 2c -c public -OXsq 192.168.1.1 .1.3.6.1.2.1.3.1.1.2'] SNMPDSC_RUN_SCHD='0 2 *' SNMPDSC_RUN_TIMEOUT=5 SNMPDSC_WATCH=['Watched_Value1'] SNMPDSC_REPORT_ON=['new','watched-changed']
UNFIMP
---------------------------
UNFIMP_RUN='disabled' UNFIMP_CMD='python3 /home/pi/pialert/front/plugins/unifi_import/script.py username={username} password={password} host={hos UNFIMP_username='' UNFIMP_password='' UNFIMP_protocol='https://' UNFIMP_host='192.168.1.1' UNFIMP_port='8443' UNFIMP_version='' UNFIMP_sites=['default'] UNFIMP_RUN_SCHD='0 2 *' UNFIMP_RUN_TIMEOUT=5 UNFIMP_WATCH=['Watched_Value1','Watched_Value4'] UNFIMP_REPORT_ON=['new','watched-changed']
-------------------IMPORTANT INFO-------------------
This file is ingested by a python script, so if
modified it needs to use python syntax
-------------------IMPORTANT INFO-------------------