Modified README.md

This commit is contained in:
BlessedRebuS
2025-12-15 21:07:18 +01:00
parent f86597c509
commit 404f808460

View File

@@ -270,6 +270,12 @@ or **values.yaml** in the case of helm chart installation
Access the dashboard at `http://<server-ip>:<port>/<dashboard-path>` Access the dashboard at `http://<server-ip>:<port>/<dashboard-path>`
The dashboard shows:
- Total and unique accesses
- Suspicious activity detection
- Top IPs, paths, and user-agents
- Real-time monitoring
The attackers' triggered honeypot path and the suspicious activity (such as failed login attempts) are logged The attackers' triggered honeypot path and the suspicious activity (such as failed login attempts) are logged
![dashboard-1](img/dashboard-1.png) ![dashboard-1](img/dashboard-1.png)
@@ -278,34 +284,15 @@ The top IP Addresses is shown along with top paths and User Agents
![dashboard-2](img/dashboard-2.png) ![dashboard-2](img/dashboard-2.png)
The dashboard shows:
- Total and unique accesses
- Suspicious activity detection
- Honeypot triggers
- Top IPs, paths, and user-agents
- Real-time monitoring
### Retrieving Dashboard Path ### Retrieving Dashboard Path
Check server startup logs Check server startup logs or get the secret with
**Python/Docker:**
```bash
docker logs krawl | grep "Dashboard available"
```
**Kubernetes:**
```bash ```bash
kubectl get secret krawl-server -n krawl-system \ kubectl get secret krawl-server -n krawl-system \
-o jsonpath='{.data.dashboard-path}' | base64 -d && echo -o jsonpath='{.data.dashboard-path}' | base64 -d && echo
``` ```
**Helm:**
```bash
kubectl get secret krawl -n krawl-system \
-o jsonpath='{.data.dashboard-path}' | base64 -d && echo
```
## 🤝 Contributing ## 🤝 Contributing
Contributions welcome! Please: Contributions welcome! Please: