From 404f808460706ddea7c566e78900656301083171 Mon Sep 17 00:00:00 2001 From: BlessedRebuS Date: Mon, 15 Dec 2025 21:07:18 +0100 Subject: [PATCH] Modified README.md --- README.md | 27 +++++++-------------------- 1 file changed, 7 insertions(+), 20 deletions(-) diff --git a/README.md b/README.md index 0057831..9ee8455 100644 --- a/README.md +++ b/README.md @@ -270,6 +270,12 @@ or **values.yaml** in the case of helm chart installation Access the dashboard at `http://:/` +The dashboard shows: +- Total and unique accesses +- Suspicious activity detection +- Top IPs, paths, and user-agents +- Real-time monitoring + The attackers' triggered honeypot path and the suspicious activity (such as failed login attempts) are logged ![dashboard-1](img/dashboard-1.png) @@ -278,34 +284,15 @@ The top IP Addresses is shown along with top paths and User Agents ![dashboard-2](img/dashboard-2.png) -The dashboard shows: -- Total and unique accesses -- Suspicious activity detection -- Honeypot triggers -- Top IPs, paths, and user-agents -- Real-time monitoring - ### Retrieving Dashboard Path -Check server startup logs +Check server startup logs or get the secret with -**Python/Docker:** -```bash -docker logs krawl | grep "Dashboard available" -``` - -**Kubernetes:** ```bash kubectl get secret krawl-server -n krawl-system \ -o jsonpath='{.data.dashboard-path}' | base64 -d && echo ``` -**Helm:** -```bash -kubectl get secret krawl -n krawl-system \ - -o jsonpath='{.data.dashboard-path}' | base64 -d && echo -``` - ## 🤝 Contributing Contributions welcome! Please: