Deye microinverter set register via modbus

tool: https://github.com/s10l/deye-logger-at-cmd

command for read:

./main -t ip.ip.ip.ip:48899 -xmb 00280001

0028 -> register
0001 -> length

answer:

+ok=0103022710A278

01      is the slave id
03      is the function code (read)
02      is the length of the payload (2 bytes)
2710    is the playload, in this case hex to dec -> 10000 -> register 53 (in hex 0035) power limit is 100% 
A278    is the crc16

known working registers via:
https://github.com/StephanJoubert/home_assistant_solarman/blob/main/custom_components/solarman/inverter_definitions/deye_2mppt.yaml

write via:

main -t <ip of the logger>:48899 -xmbw 00280001020064

0028    is the start address            (Active power regulation)
0001    is the number of registers      (1)
02      is the length of the value      (2 bytes)
0064    is the value                    (0x0064 -> 100)

 

openwrt acme

use own script:

export KAS_Login="user"
export KAS_Authdata="pw"
export KAS_Authtype="plain"
/usr/lib/acme/client/acme.sh --issue --server  letsencrypt --dns dns_kas -d openwrt.domain.eu
/usr/lib/acme/client/acme.sh --install-cert  -d openwrt.domain.eu \
--key-file       /etc/uhttpd.key  \
--fullchain-file /etc/uhttpd.crt \
--reloadcmd     "/etc/init.d/uhttpd reload"

doku: https://openwrt.org/docs/guide-user/services/tls/acmesh

rtl_433 with Hackrf One

install rtl_433  https://github.com/merbanan/rtl_433

apt install rtl-433

install soapysdr for hackrf driver

apt install soapysdr-tools soapysdr-module-hackrf

check if device is found

SoapySDRUtil --find

if yes use showed driver as following:

rtl_433 -d driver=hackrf

 

MacOS Forklift copy favorites and settings

You can find the plist which contains the preferences here:

~/Library/Preferences/com.binarynights.ForkLift.plist

The favorites are located in the

J3CP9BBBN6.com.binarynights.ForkLift

folder inside 

~/Library/Group Containers/

 

change apt from apt-key to gpg keyring

show available keys

apt-key list

export key and write into file:

gpg --export -a "FusionDirectory Packages Signing Key <contact@fusiondirectory.org>" | gpg --dearmour -o /usr/share/keyrings/fusiondirectory.gpg

change sources.list

vim /etc/apt/sources.list.d/fusiondirectory.list

add [signed-by=] behind deb see:

deb [signed-by=/usr/share/keyrings/fusiondirectory.gpg] https://public.fusiondirectory.org/debian/bullseye-fusiondirectory-release/ bullseye main

and finaly

apt update

without errors

unbrick hackrf one and flash mayhem

 

Plug hackrf in while holding the dfu button (closest to the ant. port). Release button.

Then run:

dfu-util --device 1fc9:000c --download hackrf_one_usb.dfu --reset

(firmware from hackrf releases)

Then run:

hackrf_spiflash -w portapack-h1_h2-mayhem.bin

 

(firmware from mayhem releases)

After unplug, plug back in and should come up with mayhem logo.

Linux WIFI WLAN cli: wpa supplicant

Client:

editieren der datei

vim /etc/wpa_supplicant/wpa_supplicant.conf

inhalt:

ctrl_interface=DIR=/var/run/wpa_supplicant GROUP=netdev
update_config=1
country=DE

network={
   ssid="<<ssid>>"
   psk="<<wpapsk>>"
}

starten mit:

wpa_supplicant -B -i wlan1 -c /etc/wpa_supplicant/wpa_supplicant.conf
#bzw auch wlan0, falls nur ein wifi device

dhcp aufm dem interface mit:

dhclient wlan1 -v

 

AP:

└─# cat /etc/hostapd/hostapd-wlan0.conf
interface=wlan0
country_code=DE
hw_mode=g

ssid=<<SSID>>
channel=6
ignore_broadcast_ssid=0

auth_algs=1
wpa=2
wpa_passphrase=<<wpapsk>>
wpa_key_mgmt=WPA-PSK

wmm_enabled=0
hostapd -B -i wlan0 /etc/hostapd/hostapd-wlan0.conf