joelmueller.ch | blog https://joelmueller.ch/ The little bit other blog Mon, 27 May 2024 16:03:51 +0000 de-CH hourly 1 https://wordpress.org/?v=6.7 https://joelmueller.ch/wp-content/uploads/2021/10/cropped-archlinux_icon_blog-32x32.png joelmueller.ch | blog https://joelmueller.ch/ 32 32 Adriatique – Zurich finest https://joelmueller.ch/adriatique-zurich-finest/ Fri, 23 Feb 2024 18:28:27 +0000 https://joelmueller.ch/?p=954 Weiterlesen Adriatique – Zurich finest]]>

I’m was in the middle twenty party hard was my weekend from Ibiza to Barcelona and also Zurich…. So the hazard wanted that I went to Zukunft a little Club in Zurich Kreis 4 at Langstrasse near the central station. The first time I saw Adriatique with a crowd of 100 peoples many times more come later. The latest one is at Afterlife in Tulum, Mexico. So there are 20 sets of her legacy from over 20 years making awesome music!

Afterlife

0:00
]]>
UPDATE: Burning Man Special https://joelmueller.ch/burning-man-special/ https://joelmueller.ch/burning-man-special/#respond Mon, 19 Jun 2023 16:02:26 +0000 https://joelmueller.ch/?p=706

Burning Woman 👩🔥

Everyone knows that festival in the desert. So no word needed. Just listen!

Hernan Cattaneo B2B Patrice Bäumel Burning Man 5 hrs Set

Acid_Pauli_Live-WEB-09-01-2022 Burning Man

Sasha Burning Man 2022 DJ Set

Rampa vs &ME – Live @ Mayan Warrior Virtual Burning Man – 31-Aug-2020

Carl Cox Live_at_Burning_Man_Festival-WEB-08-26-2018

Charlotte_De_Witte_B2B_Enrico_Sangiuliano_Live-WEB-09-02-2022

Oliver_Koletzki_Live-WEB-09-02-2022 Burning Man

UPDATE:

Lee Burridge Festival Burning Man 2022

Lee Burridge Live @ 5 Years Robot Heart Buring Man 2012

Lee Burridge Essential Mix 2015 @ Burning Man

Burning Man Virtual Festival 2020 Lisa Lashes Live-web-08-12-2020-cin_int

Pachanga Boys – Robot Heart – Burning Man 2013

Rebolledo vs Barnt – Mayan Warrior – Burning Man 2014

Last Night On Earth 063 – Sasha Live at Virtual Burning Man 06.09.2020

Carl Cox Live_at_burning_man-web-08-31-2022

Global #499 Part 1 & 2 – Carl Cox Live at Burning Man Festival 01.09.2012

]]>
https://joelmueller.ch/burning-man-special/feed/ 0
SKALA (Stil vor Talent) – The DJ from Berlin https://joelmueller.ch/skala-stil-vor-talent-the-dj-from-berlin/ https://joelmueller.ch/skala-stil-vor-talent-the-dj-from-berlin/#respond Wed, 19 Apr 2023 05:32:10 +0000 https://joelmueller.ch/?p=685 Weiterlesen SKALA (Stil vor Talent) – The DJ from Berlin]]>
  • SKALA DI … SKALA DA … SKALA DI … SKALA DAIn 2018, SKALA made her way to Berlin to conquer the techno capital with her pumping melodic sound. Her mission is for people to emotionally open up, so they leave feeling emotionally escalated, or what she likes to call it “eSKALAtion” The passionate producer has been making music since she was a child and combines her background with piano music and her current productions which have been released on well known labels like Katermukke or Stil vor Talent.
  • SKALA

    Quelle: Resident Advisor

    SKALA Mix Mission 2023

    SKALA The Fluffy Cloud at Burning Man 2020

    SKALA Sisyphos Dampfer 19.10.2019

    SKALA Radio Sunshine Live 01.01.2022

    SKALA Kater Blau 31.01.2020

    SKALA Haselhorst 13 – 11.12.0020

    SKALA Bucht Der Träumer Festival 2022 Atlantis Stage

    Tomorrowland One World Radio – The Future 4 – SKALA

    SKALA BEYOND MIX 002

    Solvane and Jonas Saalbach b2b Skala and Flo Forg Radio_Butzke- 07-24-2021

    One Track

    Jonas Saalbach, SKALA – The Future We See

    ]]>
    https://joelmueller.ch/skala-stil-vor-talent-the-dj-from-berlin/feed/ 0
    Innellea – New deep house rising star from Diynamic https://joelmueller.ch/innellea-new-deep-house-rising-star-from-diynamic/ https://joelmueller.ch/innellea-new-deep-house-rising-star-from-diynamic/#respond Sun, 25 Sep 2022 14:52:26 +0000 https://joelmueller.ch/?p=668 No much words needed. The new rising star of Hamburg with his deep Essential Mix on BBC Radio 1 who I like a lot but never heard live. Pete Tong has invited him a time ago and the mix is tremendous.

    Listen it – 2 hours of beautiful sound!

    ]]>
    https://joelmueller.ch/innellea-new-deep-house-rising-star-from-diynamic/feed/ 0
    Essential Mix from Jimi Jules and the Awakenings from Joris Delacroix https://joelmueller.ch/essential-mix-from-jimi-jules-and-the-awakenings-from-joris-delacroix/ Sat, 21 May 2022 18:20:07 +0000 https://joelmueller.ch/?p=639 Hi some new music which I like it. First the Essential Mix from Jimi Jules a DJ and Producer from Zurich. He is on the Innervision label of Ă‚me and Dixon.

    The Essential Mix was released few weeks ago on BBC Radio 1 exactly at 30-04-2022.

    The other favorite is a set from Joirs Delacroix at Awakenings in Amsterdam back in 2016. The set is tremendous. Listen it!

    ]]>
    My speedtest server landing page https://joelmueller.ch/my-speedtest-server/ Fri, 20 May 2022 13:26:34 +0000 https://joelmueller.ch/?p=636 Hi Guys! I just did a landing page for my speedtestserver. The email sending is experimental and doesn’t work out of box.

    https://speedtestserver.joelmueller.ch

    The speedtestserver is on ookla network localed at Bern and has the ID 42840. Speedtest is available over https://speedtest.net

    Enjoy it!

    ]]>
    PiKVM behind HAproxy on OPNsense (FreeBSD) https://joelmueller.ch/pikvm-behind-haproxy/ Thu, 19 May 2022 16:46:32 +0000 https://joelmueller.ch/?p=631 Weiterlesen PiKVM behind HAproxy on OPNsense (FreeBSD)]]> Hi here a short tutorial how to have a PiKVM behind a HAproxy with or without SSL Wildcard A+ Garde Cert

    First here a link to get a Wildcard SSL Cert with HAproxy on OPNsense

    https://forum.opnsense.org/index.php?topic=23339.0

    A PiKVM can you buy on

    https://pikvm.org/

    First you have to follow the instruction on pikvm.org to install PiKVM OS on a raspberry pi with a PiKVM hat v3

    After login in the shell of PiKVM (192.168.1.100) with ssh and password root

    ssh root@pikvm

    Open with vim /etc/nginx/nginx.conf and edit to following

    #user http;
    worker_processes  1;
    
    #error_log  logs/error.log;
    #error_log  logs/error.log  notice;
    #error_log  logs/error.log  info;
    
    #pid        logs/nginx.pid;
    
    
    events {
        worker_connections  1024;
    }
    
    
    http {
        include       mime.types;
        default_type  application/octet-stream;
    
        #log_format  main  '$remote_addr - $remote_user [$time_local] "$request" '
        #                  '$status $body_bytes_sent "$http_referer" '
        #                  '"$http_user_agent" "$http_x_forwarded_for"';
    
        #access_log  logs/access.log  main;
    
        sendfile        on;
        #tcp_nopush     on;
    
        #keepalive_timeout  0;
        keepalive_timeout  65;
    
        #gzip  on;
    
        server {
            listen       80;
            server_name  localhost;
    
            #charset koi8-r;
    
            #access_log  logs/host.access.log  main;
    
            location / {
                root   /usr/share/nginx/html;
                index  index.html index.htm;
            }
    
            #error_page  404              /404.html;
    
            # redirect server error pages to the static page /50x.html
            #
            error_page   500 502 503 504  /50x.html;
            location = /50x.html {
                root   /usr/share/nginx/html;
            }
    
            # proxy the PHP scripts to Apache listening on 127.0.0.1:80
            #
            #location ~ \.php$ {
            #    proxy_pass   http://127.0.0.1;
            #}
    
            # pass the PHP scripts to FastCGI server listening on 127.0.0.1:9000
            #
            #location ~ \.php$ {
            #    root           html;
            #    fastcgi_pass   127.0.0.1:9000;
            #    fastcgi_index  index.php;
            #    fastcgi_param  SCRIPT_FILENAME  /scripts$fastcgi_script_name;
            #    include        fastcgi_params;
            #}
    
            # deny access to .htaccess files, if Apache's document root
            # concurs with nginx's one
            #
            #location ~ /\.ht {
            #    deny  all;
            #}
        }
    
    
        # another virtual host using mix of IP-, name-, and port-based configuration
        #
        #server {
        #    listen       8000;
        #    listen       somename:8080;
        #    server_name  somename  alias  another.alias;
    
        #    location / {
        #        root   html;
        #        index  index.html index.htm;
        #    }
        #}
    
    
        # HTTPS server
        #
        #server {
        #    listen       443 ssl;
        #    server_name  localhost;
    
        #    ssl_certificate      cert.pem;
        #    ssl_certificate_key  cert.key;
    
        #    ssl_session_cache    shared:SSL:1m;
        #    ssl_session_timeout  5m;
    
        #    ssl_ciphers  HIGH:!aNULL:!MD5;
        #    ssl_prefer_server_ciphers  on;
    
        #    location / {
        #        root   html;
        #        index  index.html index.htm;
        #    }
        #}
    
    }
    

    My haproxy.conf with one backend for PiKVM named KVM_backend

    #
    # Automatically generated configuration.
    # Do not edit this file manually.
    #
    
    global
        uid                         80
        gid                         80
        chroot                      /var/haproxy
        daemon
        stats                       socket /var/run/haproxy.socket group proxy mode 775 level admin
        nbproc                      1
        nbthread                    4
        hard-stop-after             60s
        no strict-limits
        maxconn                     10000
        tune.ssl.default-dh-param   4096
        spread-checks               2
        tune.bufsize                16384
        tune.lua.maxmem             0
        log                         /var/run/log local0 info
        lua-prepend-path            /tmp/haproxy/lua/?.lua
    
    defaults
        log     global
        option redispatch -1
        maxconn 5000
        timeout client 1000s
        timeout connect 1000s
        timeout server 1000s
        retries 3
        default-server init-addr libc,last
        default-server maxconn 5000
    
    # autogenerated entries for ACLs
    
    # userlists generated from groups
    
    # NOTE: UserlistAddUsers called with empty group data
    
    
    # autogenerated entries for config in backends/frontends
    
    
    # autogenerated entries for stats
    
    
    
    
    # Frontend: SNI_frontend (Listening o)
    frontend SNI_frontend
        bind 0.0.0.0:443 name 0.0.0.0:443 
        bind 0.0.0.0:80 name 0.0.0.0:80 
        bind :::80 name :::80 
        bind :::443 name :::443 
        mode tcp
        default_backend SSL_backend
        # tuning options
        timeout client 1000s
    
        # logging options
    
    # Frontend: HTTP_frontend (Listening 127.0.0.1:80)
    frontend HTTP_frontend
        bind 127.0.0.1:80 name 127.0.0.1:80 accept-proxy 
        bind [::1]:80 name [::1]:80 accept-proxy 
        mode http
        option http-keep-alive
        option forwardfor
        # tuning options
        timeout client 1000s
    
        # logging options
        # ACL: NoSSL_condition
        acl acl_621d0b77c74989.24704837 ssl_fc
    
        # ACTION: HTTPtoHTTPS_rule
        http-request redirect scheme https code 301 if !acl_621d0b77c74989.24704837
    
    # Frontend: HTTPS_frontend (Listinging on 127.0.0.1:443)
    frontend HTTPS_frontend
        http-response set-header Strict-Transport-Security "max-age=63072000; includeSubDomains; preload"
        bind 127.0.0.1:443 name 127.0.0.1:443 accept-proxy ssl curves secp384r1  no-sslv3 no-tlsv10 no-tlsv11 no-tls-tickets ciphers ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES256-GCM-SHA384 ciphersuites TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256 alpn h2,http/1.1 crt-list /tmp/haproxy/ssl/621d11c7cad951.61400293.certlist 
        bind [::1]:443 name [::1]:443 accept-proxy ssl curves secp384r1  no-sslv3 no-tlsv10 no-tlsv11 no-tls-tickets ciphers ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES256-GCM-SHA384 ciphersuites TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256 alpn h2,http/1.1 crt-list /tmp/haproxy/ssl/621d11c7cad951.61400293.certlist 
        mode http
        option http-keep-alive
        default_backend WEBSERVER_backend
        option forwardfor
        # tuning options
        timeout client 15m
    
        # logging options
    
        # ACTION: PUBLIC_SUBDOMAINS_map-rule
        # NOTE: actions with no ACLs/conditions will always match
        use_backend %[req.hdr(host),lower,map_dom(/tmp/haproxy/mapfiles/621d0c7054ddb7.46420139.txt)] 
        # WARNING: pass through options below this line
      
    
    
    # Backend: SSL_backend ()
    backend SSL_backend
        # health checking is DISABLED
        mode tcp
        balance source
        # stickiness
        stick-table type ip size 50k expire 30m  
        stick on src
        # tuning options
        timeout connect 1000s
        timeout server 1000s
        server SSL_server 127.0.0.1 send-proxy-v2 check-send-proxy
     
    
    # Backend: KVM_backend ()
    backend KVM_backend
        # health checking is DISABLED
        mode http
        balance source
        # stickiness
        stick-table type ip size 50k expire 30m  
        stick on src
        # tuning options
        timeout connect 1000s
        timeout server 1000s
        # WARNING: pass through options below this line
        http-request set-header X-Forwarded-Proto https if { ssl_fc }
        http-reuse safe
        server KVM_server 192.168.1.100:80 

    The mapfile PUBLIC_SUBDOMAINS_map for HAproxy as sample

    #public access subdomains
    kvm KVM_backend

    You just did it! You have a SSL Cert with HAproxy and behind the proxy is a PiKVM on Port 80 with a nginx webserver and with PiKVM OS based on ArchLinux ARM

    Have fun!

    ]]>
    Belgian Technoladys Charlotte de Witte & Amelie Lens https://joelmueller.ch/belgian-technoladys-charlotte-de-witte-amelie-lens/ Mon, 11 Apr 2022 13:25:07 +0000 https://joelmueller.ch/?p=596 The founders of KNTXT and Lenske label and two good looking DJs with power techno at best

    Charlotte de Witte Essential Mix 2018 @BBC Radio 1

    Charlotte de Witte Essential Mix 2021 @BBC Radio 1

    Charlotte de Witte @Resident Advisor Podcast

    Charlotte de Witte @Drumcode Radio

    Charlotte de Witte @Beatport

    Amelie Lens Essential Mix 2020 @BBC Radio 1

    Amelie Lens @Exit Festival 2021

    Amelie Lens @Mix Mission 2020

    Amelie Lens @Resident Advisor Podcast

    ]]>
    Carl Cox https://joelmueller.ch/carl-cox/ Sun, 10 Apr 2022 19:11:17 +0000 https://joelmueller.ch/?p=573 The godfather of techno known from legendary party at space ibiza. The legend himself. I have him seen at Off Sonar in location Poble Espanyol in the center of Barcelona. The king of Essential Mix on BBC Radio One. Nothing more to say here some sets from Carl Cox!

    Carl Cox @Exit Festival Novi Sad Serbia

    Carl Cox NYE 1991

    Carl Cox Mix Mission 2020

    Carl Cox Essential Mix 2016 @Space Ibiza

    Carl Cox Essential Mix 1994 First Essential Mix

    Carl Cox Essential Mix 2015 @Space Ibiza

    Carl Cox Essential Mix with Sven Väth 1999 @BBC Radio One

    Carl Cox & Moby Ultra Festival @Miami 2008

    Carl Cox Jeff Mills DJ Rush @Clubnight 2000 Hafentunnel Rave

    Carl Cox & Jose Padilla Live @Cream Liverpool 1999

    Carl Cox & Richie Hawtin 2002 @Chicago

    Carl Cox, Umek, Dj Rush, Chris Liebing, Sven Vath – Live @ Timewarp 2003

    Last but no least Carl Cox @Space Ibiza 2003

    ]]>
    Distribute your Wildcard SSL Certs to the servers with OPNsense https://joelmueller.ch/distribute-your-wildcard-ssl-certs-to-the-servers-with-opnsense/ https://joelmueller.ch/distribute-your-wildcard-ssl-certs-to-the-servers-with-opnsense/#respond Sun, 10 Apr 2022 10:10:44 +0000 https://joelmueller.ch/?p=559 First write your csh shell script

    #!/bin/csh
    set latestcert=`find /var/etc/acme-client/* -name "fullchain.pem" -type f -print0 | xargs -0 stat -f "%m %N" | sort -rn | head -1 | cut -f2- -d" "`
    sshpass -p "YOURPASSWORD" scp $latestcert YOURUSERNAME@192.168.1.100:/home/ookla/certs/fullchains.cer
    set latestkey=`find /var/etc/acme-client/* -name "joelmueller.ch.key" -type f -print0 | xargs -0 stat -f "%m %N" | sort -rn | head -1 | cut -f2- -d" "`
    sshpass -p "YOURPASSWORD" scp $latestkey YOURYOUSERNAME@192.168.1.100:/home/ookla/certs/joelmueller.ch.key
    set latestcertftp=`find /var/etc/acme-client/* -name "fullchain.pem" -type f -print0 | xargs -0 stat -f "%m %N" | sort -rn | head -1 | cut -f2- -d" "`
    sshpass -p "YOURPASSWORD" scp $latestcertftp YOURUSERNAME@192.168.1.100:/etc/vsftpd/certs/fullchain.cer
    set latestkeyftp=`find /var/etc/acme-client/* -name "joelmueller.ch.key" -type f -print0 | xargs -0 stat -f "%m %N" | sort -rn | head -1 | cut -f2- -d" "`
    sshpass -p "YOURPASSWORD" scp $latestkeyftp YOURUSERNAME@192.168.1.100:/etc/vsftpd/certs/joelmueller.ch.key

    Enable FreeBSD Repository for installing sshpass

    vim /usr/local/etc/pkg/repos/FreeBSD.conf
    # Change the value to yes
    pkg install sshpass

    Add indvidual service to cron webinterface of OPNsense

    vim /usr/local/opnsense/service/conf/actions.d/actions_sslcerts.conf
    [start]                                                                         
    command:sh /var/etc/acme-client/certs.sh start                                  
    parameters:                                                                     
    type:script                                                                     
    message:distribute ssl letsencrypt cert                                         
    description:start distribute ssl cert         
    service restart configd
    configctl shellscerts start

    Go to your Webui of OPNsense under -> System -> Cron -> +

    Now you have under command start distribute ssl cert and execute the command every first day of the month to distribute ssl cert to the the remote machines

    ]]>
    https://joelmueller.ch/distribute-your-wildcard-ssl-certs-to-the-servers-with-opnsense/feed/ 0