You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Jan 7, 2026. It is now read-only.
@@ -119,6 +124,34 @@ If you selected the NVR option, you need to configure Frigate:
119
124
120
125
* Edit the `frigate_config.yml` file to define your cameras and settings.
121
126
127
+
### 3a. Configure CompreFace and Double-Take (NVR Only - Fixes #5)
128
+
129
+
CompreFace provides face recognition capabilities for Double-Take, enabling facial detection in your NVR setup.
130
+
131
+
**Automatic Configuration:**
132
+
133
+
The `COMPREFACE_API_KEY` is automatically generated by `create_secrets.sh`. This key is used for secure communication between Double-Take and CompreFace.
134
+
135
+
**Double-Take Configuration:**
136
+
137
+
After the stack is running, configure Double-Take to use CompreFace:
138
+
139
+
1. Access Double-Take at `http://doubletake.<BASE_DOMAIN>` or `http://<host_ip>:3001`
140
+
2. Navigate to Settings → Detectors
141
+
3. Add CompreFace as a detector with:
142
+
-**URL:**`http://compreface:8000`
143
+
-**API Key:** Use the `COMPREFACE_API_KEY` from your `secrets.env` file
144
+
4. Configure face recognition settings as needed
145
+
146
+
**CompreFace Face Training:**
147
+
148
+
To train CompreFace to recognize faces:
149
+
150
+
1. Access CompreFace at `http://compreface.<BASE_DOMAIN>` or `http://<host_ip>:8000`
151
+
2. Create a new application or use the existing one
152
+
3. Upload reference images for face recognition
153
+
4. Double-Take will automatically use these trained faces for detection
154
+
122
155
### 4. Run the Stack
123
156
124
157
After completing the manual configuration in `secrets.env`, run the setup again:
@@ -416,14 +449,135 @@ For more information on Grafana security and sharing options, refer to the [offi
416
449
- The Grafana UI will show a "Sign in" button in the top right for anonymous users
417
450
- Admin users can still log in to create/edit dashboards
418
451
452
+
## Node-RED Configuration (Fixes #14)
453
+
454
+
Node-RED provides flow-based automation for the IoT/SCADA stack. It includes support for MQTT and syslog ingestion.
455
+
456
+
### MQTT Integration
457
+
458
+
Node-RED can communicate with the Mosquitto MQTT broker on the internal network. To configure MQTT in your flows:
459
+
460
+
1. Add an **mqtt in** or **mqtt out** node to your flow
The stack exposes port 514 (UDP and TCP) for syslog log ingestion. This allows network devices (routers, switches, servers, etc.) to send logs to Node-RED for processing, aggregation, and visualization.
475
+
476
+
**Installing node-red-contrib-syslog-input:**
477
+
478
+
1. Access Node-RED at `http://nodered.<BASE_DOMAIN>` or `http://<host_ip>:1880`
479
+
2. Go to **Menu → Manage palette → Install**
480
+
3. Search for `node-red-contrib-syslog-input`
481
+
4. Click **Install**
482
+
483
+
**Setting up Syslog Input Flow:**
484
+
485
+
1. Add a **syslog input** node to your flow
486
+
2. Configure the node:
487
+
-**Port:**`514`
488
+
-**Protocol:**`UDP` or `TCP` (depending on your device configuration)
489
+
3. Connect to processing nodes (function, debug, dashboard, etc.)
Configure your network devices to send syslog messages to the Home-IOT-SCADA-Stack host IP address on port 514. Refer to your device's documentation for specific syslog configuration instructions.
499
+
500
+
## go2rtc and Camera Streams in Grafana (Fixes #15)
501
+
502
+
go2rtc is included in all stack profiles (IoT/SCADA, NVR, and combined) to enable displaying camera RTSP streams in Grafana dashboards.
503
+
504
+
### go2rtc Configuration
505
+
506
+
1. Access go2rtc at `http://go2rtc.<BASE_DOMAIN>` or `http://<host_ip>:1984`
507
+
2. Configure your camera streams in the go2rtc web interface or by creating a config file
508
+
509
+
**Example go2rtc configuration (create in the go2rtc_data volume):**
0 commit comments