Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #-------------------------------------------------------------------------------
- # Pi.Alert
- # Open Source Network Guard / WIFI & LAN intrusion detector
- #
- # pialert.conf - Back module. Configuration file
- #-------------------------------------------------------------------------------
- # Puche 2021 [email protected] GNU GPLv3
- #-------------------------------------------------------------------------------
- PIALERT_PATH = '/home/pi/pialert'
- DB_PATH = PIALERT_PATH + '/db/pialert.db'
- LOG_PATH = PIALERT_PATH + '/log'
- VENDORS_DB = '/usr/share/arp-scan/ieee-oui.txt'
- PRINT_LOG = False
- TIMEZONE = 'Africa/Johannesburg'
- PIALERT_WEB_PROTECTION = False
- PIALERT_WEB_PASSWORD = '8d969eef6ecad3c29a3a629280e686cf0c3f5d5a86aff3ca12020c923adc6c92'
- # EMAIL settings
- # ----------------------
- SMTP_SERVER = 'smtp.gmail.com'
- SMTP_PORT = 587
- SMTP_USER = '[email protected]'
- SMTP_PASS = 'mailpassword'
- SMTP_SKIP_TLS = False
- SMTP_SKIP_LOGIN = False
- REPORT_MAIL = True
- REPORT_FROM = 'Pi.Alert <' + SMTP_USER +'>'
- REPORT_TO = '[email protected]'
- REPORT_DEVICE_URL = 'http://pi.alert/deviceDetails.php?mac='
- REPORT_DASHBOARD_URL = 'http://pi.alert/'
- # Webhook settings
- # ----------------------
- REPORT_WEBHOOK = False
- WEBHOOK_URL = 'http://n8n.local:5555/webhook-test/aaaaaaaa-aaaa-aaaa-aaaaa-aaaaaaaaaaaa'
- # webhook payload data format for the "body > attachements > text" attribute in https://github.com/jokob-sk/Pi.Alert/blob/main/docs/webhook_json_sample.json
- # supported values: 'json' or 'html'
- # e.g.: for discord use 'html'
- WEBHOOK_PAYLOAD = 'json'
- # Apprise settings
- #-----------------------
- REPORT_APPRISE = False
- APPRISE_HOST = 'http://localhost:8000/notify'
- APPRISE_URL = 'mailto://smtp-relay.sendinblue.com:587[email protected]&name=apprise&[email protected]&pass=password&[email protected]'
- # NTFY (https://ntfy.sh/) settings
- # ----------------------
- REPORT_NTFY = False
- NTFY_TOPIC = 'choose_any_alert_topic'
- # PUSHSAFER (https://www.pushsafer.com/) settings
- # ----------------------
- REPORT_PUSHSAFER = False
- PUSHSAFER_TOKEN = 'ApiKey'
- # DynDNS
- # ----------------------
- # QUERY_MYIP_SERVER = 'https://diagnostic.opendns.com/myip'
- QUERY_MYIP_SERVER = 'http://ipv4.icanhazip.com'
- DDNS_ACTIVE = False
- DDNS_DOMAIN = 'your_domain.freeddns.org'
- DDNS_USER = 'dynu_user'
- DDNS_PASSWORD = 'A0000000B0000000C0000000D0000000'
- DDNS_UPDATE_URL = 'https://api.dynu.com/nic/update?'
- # PIHOLE settings
- # ----------------------
- PIHOLE_ACTIVE = False
- PIHOLE_DB = '/etc/pihole/pihole-FTL.db'
- DHCP_ACTIVE = False
- DHCP_LEASES = '/etc/pihole/dhcp.leases'
- # arp-scan options & samples
- # ----------------------
- #
- # Scan local network (default)
- # SCAN_SUBNETS = '--localnet'
- #
- # Scan two subnets
- # SCAN_SUBNETS = '192.168.11.0/24 192.168.144.0/24'
- #
- # Scan using interface eth0
- # SCAN_SUBNETS = '--localnet --interface=eth0'
- #
- # Scan multiple interfaces (eth1 and eth0):
- # SCAN_SUBNETS = [ '192.168.1.0/24 --interface=eth1', '192.168.1.0/24 --interface=eth0' ]
- SCAN_SUBNETS = '--localnet'
- # Maintenance Tasks Cron
- # ----------------------
- DAYS_TO_KEEP_EVENTS = 90
Advertisement
Comments
-
Comment was deleted
-
- This is an example of the pialert.conf config file for Pi.Alert that I'm using.
- Config file has network scan as default local option. Can run from CLI `ip link show` to see broadcast interface is available (below loopback). Can manually run `sudo arp-scan --interface=enp4s0 192.168.1.0/24` to see what is returned, or try `sudo arp-scan -l` also to see it returns valid data.
Add Comment
Please, Sign In to add comment