Skip to main content

A small tool that is capable to sniff and visualize the control messages between Operators.

Project description

Overview

This is an experimental tool be able to sniff the control information of the channels between the operators. This sniffer is only capable to sniff kafka based channels i.e., if 2 or more operators are connected via KafkaInput/OutputChannels (evtl. plugins). The sniffer uses tkInter for visualization.

Building into exe

The sniffer can be built into an executable. The package pyinstaller was tested, hence it is proposed to be used for this purpose. You can install the pyinstaller via pip. Once it is installed, you shall execute the following command: console pyinstaller -F path/to/SnifferRunnable.py or you can navigate to the folder containing the script and simply execute: console pyinstaller -F SnifferRunnable.py The final executable will be placed into ./dist folder in the execution's location.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

pypz-io-sniffer-0.9.0b4.tar.gz (9.4 kB view hashes)

Uploaded Source

Built Distribution

pypz_io_sniffer-0.9.0b4-py3-none-any.whl (11.7 kB view hashes)

Uploaded Python 3

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page