I use a cheap Tapo C100 webcam to monitor my 3D prints. It supports RTSP.
- Go to the Cameras section at https://connect.prusa3d.com
- Add a new camera.
- Click the QR code link
- Click "Start Camera"
I use a cheap Tapo C100 webcam to monitor my 3D prints. It supports RTSP.
The set
lines
set -euxo pipefail
is short for:set -e
set -u
what does this product do?
""" | |
This class makes creating a REST handler for Splunk easier. | |
The class will automatically call a function within the class based on the path and the method. | |
For example, if a GET call is made to the path "ping", then this class will call the function | |
get_ping(). | |
Below is an example. |
$ ANSIBLE_CALLBACK_WHITELIST=cprofile CPROFILE_FILTERS=ansible.plugins.connection,ansible.executor.task_executor ansible-playbook -i localhosts whoami.yml | |
PLAY [My Cool Play] ************************************************************************************************************************************************************************************************************************** | |
TASK [Check who I am 1] ********************************************************************************************************************************************************************************************************************** | |
changed: [localhost0] | |
changed: [localhost1] | |
TASK [Check who I am 2] ********************************************************************************************************************************************************************************************************************** | |
changed: [localhost0] |
#!/bin/sh | |
[ -d "/opt/splunk" ] && SPLUNKPATH="/opt/splunk" | |
[ -d "/opt/splunkforwarder" ] && SPLUNKPATH="/opt/splunkforwarder" | |
[ -f "$SPLUNKPATH/etc/system/local/inputs.conf" ] && rm -f $SPLUNKPATH/etc/system/local/inputs.conf | |
[ -f "$SPLUNKPATH/etc/system/local/outputs.conf" ] && rm -f $SPLUNKPATH/etc/system/local/outputs.conf | |
[ -f "$SPLUNKPATH/etc/system/local/deploymentclient.conf" ] && rm -f $SPLUNKPATH/etc/system/local/deploymentclient.conf |
@echo off | |
del /f /q "%SPLUNK_HOME%\etc\system\local\inputs.conf" | |
del /f /q "%SPLUNK_HOME%\etc\system\local\outputs.conf" | |
del /f /q "%SPLUNK_HOME%\etc\system\local\deploymentclient.conf" |
#!/bin/bash | |
# Downloader script for Splunk Universal Forwarder | |
# | |
# Usage: | |
# bash forwardsplunker.sh | |
# | |
version="7.0.0" # Splunk product Version | |
hash="c8a78efdd40f" # Versioned HASH | |
# --- Dont edit below --- |
[WinEventLog:Security] | |
#Returns most of the space savings XML would provide | |
SEDCMD-clean0-null_sids = s/(?m)(^\s+[^:]+\:)\s+-?$/\1/g s/(?m)(^\s+[^:]+\:)\s+-?$/\1/g s/(?m)(\:)(\s+NULL SID)$/\1/g s/(?m)(ID\:)(\s+0x0)$/\1/g | |
SEDCMD-clean1-summary = s/This event is generated[\S\s\r\n]+$//g | |
SEDCMD-clean2-cert_summary = s/Certificate information is only[\S\s\r\n]+$//g | |
SEDCMD-clean3-blank_ipv6 = s/::ffff://g | |
SEDCMD-clean4-token_elevation_summary = s/Token Elevation Type indicates[\S\s\r\n]+$//g | |
SEDCMD-clean5-network_share_summary = s/(?ms)(A network share object was checked to see whether.*$)//g | |
SEDCMD-clean6-authentication_summary = s/(?ms)(The computer attempted to validate the credentials.*$)//g | |
SEDCMD-clean7-local_ipv6 = s/(?ms)(::1)//g |
import logging | |
from logging import handlers | |
import traceback | |
import sys | |
import re | |
import os | |
import json | |
import socket # Used for IP Address validation | |
from splunk.appserver.mrsparkle.lib.util import make_splunkhome_path |