If you're building from source and prefer your logs to have a bit more info, then the below patch would work to downgrade the beacon log messages to debug. Just save as a .patch file in package/network/services/hostapd/patches...
Au contraire my friend, I want to see less log info. The beacon requests and responses from hostapd were flooding my sytem log; and even if on the WiFi device I set the log to 4 (errors and fatal only), hostapd will always output level 2 (info, warnings and errors).
Thanks @NilsRo for your effort. I just installed usteer-ng on my single dump AP with 2.4GHz and 5GHz on the same SSID (wlan) for improving band steering towards 5GHz. Is my config below sufficient for my use case?
BTW: I added list ssid_list 'wlan' because I have a third SSID for IOT devices on 2.4GHz only.
You are fine in general. If you like you can reduce the band steering interval as it will be adapted dynamically now. I use 30s but if you like to move your device much earlier it would not be a problem anymore.
Actually I did not spend time on it as I hope it will be fixed automatically if merged into the main repository. But if anyone knows how to build packages I would be happy to merge a pull into my usteer-ng repo.
Agreed. NilsRo put a fair amount of effort into that PR. I use usteer on my APs and would love to see improvements, especially when it’s served up on a silver platter PR like this one.
He answered all reviewers concerns and the PR still sits.
useer-ng + luci-app-usteer. I keep seeing strange devices in my Hearing map that I don't have and never have had on my network. What's going on? Are these incompatibility bugs between useer-ng and luci-app-usteer?
I think it's just people passing by or neighbors. These MAC addresses can probably be seen elsewhere in the interface. I live in a private house, and my router reaches the sidewalk. So I get quite a few of these addresses all the time.
There are no passersby. Also, no one knows my Wi-Fi password. Right now, only five of my devices are connected. But there are a whole bunch of them in the Hearing Map. This can't be normal, can it?
They don't know your password and aren't trying to connect. They were simply exchanging low-level messages with your access point. A routine network scan. For example, on Android, as far as I remember, it's enabled by default. So any phone that accidentally overheard your access point could show up with its MAC address on this list.