Hack and / - Mutt Tweaks for System Administrators
Once I had colorized all my e-mail, it was great—I would browse through output and more critical e-mail would jump to my attention. As the number of messages started to grow though, I noticed I would spend a lot of time reading the less-important messages before I found the important ones. My solution was to use the limit feature in mutt. When you are in the index view in mutt (where mutt shows you only the From and the Subject lines), you can tell mutt to limit (the l key by default) the headers you currently can see based on a pattern.
For instance, if I wanted to see only all the headers that said Bob, I could type l and then Bob <Enter>. Then, to see all the headers again, I could type l and then all <Enter> to show all messages. You also can have mutt search within the body of messages, so I created a mutt macro that I bound to the F3 key, so that when I see the full list of headers and press F3, it limits the view only to new messages that contained error or fail in them. I could read those messages first and then change the limit back to all and tab through the rest. Here is the extra line in my .muttrc to create the macro:
macro index <F3> "l~N ~b \"([\^nN][\^oO].error|[Ff][Aa][Ii][Ll])\"<enter>"
I constantly am surprised with how far you can extend mutt. It is definitely one of those programs that gives your time back in gained productivity as you learn more about its configuration options. If you use your e-mail to remember things, or dig through a large stack of server e-mail every day (or even if you don't), mutt is an invaluable e-mail companion that always has new tricks.
Kyle Rankin is a Senior Systems Administrator in the San Francisco Bay Area and the author of a number of books, including Knoppix Hacks and Ubuntu Hacks for O'Reilly Media. He is currently the president of the North Bay Linux Users' Group.
Kyle Rankin is VP of engineering operations at Final, Inc., the author of many books including Linux Hardening in Hostile Networks, DevOps Troubleshooting and The Official Ubuntu Server Book, and a columnist for Linux Journal. Follow him @kylerankin
- Non-Linux FOSS: Don't Drink the Apple Kool-Aid; Brew Your Own!
- Preseeding Full Disk Encryption
- Returning Values from Bash Functions
- William Rothwell and Nick Garner's Certified Ethical Hacker Complete Video Course (Pearson IT Certification)
- Three EU Industries That Need HPC Now
- Hodge Podge
- FinTech and SAP HANA
- How to Calculate Flash Storage TCO
- Two Ways GDPR Will Change Your Data Storage Solution
- HOSTING Monitoring Insights
Pick up any e-commerce web or mobile app today, and you’ll be holding a mashup of interconnected applications and services from a variety of different providers. For instance, when you connect to Amazon’s e-commerce app, cookies, tags and pixels that are monitored by solutions like Exact Target, BazaarVoice, Bing, Shopzilla, Liveramp and Google Tag Manager track every action you take. You’re presented with special offers and coupons based on your viewing and buying patterns. If you find something you want for your birthday, a third party manages your wish list, which you can share through multiple social- media outlets or email to a friend. When you select something to buy, you find yourself presented with similar items as kind suggestions. And when you finally check out, you’re offered the ability to pay with promo codes, gifts cards, PayPal or a variety of credit cards.Get the Guide