Skip to content

Instantly share code, notes, and snippets.

mike fettis ridingintraffic

Block or report user

Report or block ridingintraffic

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile

Keybase proof

I hereby claim:

  • I am ridingintraffic on github.
  • I am ridingintraffic ( on keybase.
  • I have a public key whose fingerprint is B373 055B 724E C1BA 92BA D90A 4481 E6C9 4946 E550

To claim this, I am signing this object:

View rfsniffer.ino
Hacked from
by @justy to provide a handy RF code sniffer
#include <RCSwitch.h>
RCSwitch mySwitch = RCSwitch();
View jenkins_beacons.ino
#include <RCSwitch.h>
#include <Arduino.h>
#include <ESP8266WiFi.h>
#include <ESP8266mDNS.h>
#include <WiFiClient.h>
#include <ESP8266HTTPClient.h>
#include <PubSubClient.h>
RCSwitch mySwitch = RCSwitch();
View opsbot_snippets.js
module.exports = function (req, res, next) {
var userName = req.body.user_name;
var words = req.body.text;
var channel = req.body.channel_name;
var trigger = req.body.trigger_word;
var mqtt = require('mqtt')
var client = mqtt.connect('mqtt:')
var botPayload
var words = words.toLowerCase();
var splunkBunyan = require("../index");
View opsbot_beaconsOfJenkins
Splunk Blog about arduino and http collectors:
Splunk docker logging driver
Arduino Huzzah esp8266 microcontrollers with embedded wifi
ridingintraffic /
Last active Oct 5, 2018
rainforest automation python script
#!/usr/bin/env python
from raven import raven
from raven import _version
import argparse
import logging as log
from splunk_hec_handler import SplunkHecHandler
#splunk hec collector info
token = "<your splunk token>"
splunkhost="<your splunk ip>"
View gist:df6bf2f9b3a6e5c036402e69da8321bf
event: {
demand: 0.882
divisor: 1000
multiplier: 1
raw_demand: 882
timestamp: 2018-10-04T23:30:49Z
host: gate
index: default
View snippet
chmod +x /home/pi/ # setting the python script to executable
cp emu.service /etc/systemd/system # copy the service template
sudo systemctl daemon-reload # systemd refresh the system folder for templates
sudo systemctl enable emu.service # install and enable the service
sudo systemctl start emu.service # start it up!
sudo systemctl status emu # did it work?
View emu.service
Description=emu power
View curl http collector
$ curl -u admin:changme https://<yoursplunkIP>:8089/servicesNS/nobody/system/data/inputs/http/?output_mode=json \
-d name=test_thing2 \
-d sourcetype=testing \
-d index=default \
--insecure -X POST | jq .entry[0].content.token -r
$ 38985917-f6c1-xxxx-xxxx-2c4e8c77798d
You can’t perform that action at this time.