Skip to content

itc-interns/logmon

Repository files navigation

logmon

Logmon is a simple yet intuitive Django based server monitoring web application designed for server admins to get in and out report of the server through the log files, given as an input to the web app.


Installation

Begin by installing Python and pip on your computer.

Using pip to install Pipenv and its dependencies,

pip install pipenv

Create a virtual environment and install the dependencies with the given pipfile,

pipenv install

After the installation go ahead and run this command to run the server,

python manage.py runserver

or,

python manage.py runserver [IP_ADDRESS]:[PORT]

Usage

After running the server successfully, go to,

localhost:[PORT]/index

alt text

Paste / Type your logs folder path in the input and submit,

Now you will be redirected to the dashboard page.

(or)

If you already done that, go to

localhost:[PORT]/dadshboard

alt text

You can download the CSV files for Success, Client Errors and Server Errors by clicking the respective gauges.

alt text

You can see the IP address heat map, generated on the basis of the access location. You can search any IP using the search option provided in the heat map.

alt text

In Hits based graph, You can see the yearly and weekly hits counts of each status codes and total hits.

alt text

These are the bar charts showing monthly and hourly bandwidth consumption.

alt text alt text alt text

A Chart is showing the error counts.

The table below is listing the top 10 IP that consumed high amount of bandwidths.

alt text

The left panel is clickable and if you click the status code tab, which will show the IP Addresses and count of them in that status code.

alt text

alt text

Hit count tab will show the following

  • Total hit count
  • Current month's hit count
  • Today's hit Count

alt text

Users Tab will show the new users and already accessed users.

alt text

API hits will show the API and the number of hits.

alt text

Bots tab will show the total count of bots and bots IP and the Http User Agent that is used by the bot.

The following bots are identified by this project,

  • APIs-Google
  • AdSense-Google
  • AdsBot-Google-Mobile
  • AdsBot
  • Googlebot-Images
  • Googlebot-News
  • Googlebot-video
  • Googlebot
  • Google_Bot_Smartphone
  • Google-Mediapartners
  • AdsBot-Google-Mobile-Apps
  • FeedFetcher
  • Google-Bot
  • Google_Speaker
  • Microsoft_Bot
  • Microsoft_Bing
  • Microsoft_Mobile
  • Facebook_Bot
  • Sogou_Web_Spider
  • Baidu_Spider
  • Proximic_Spider
  • IPIP.NET-crawler

alt text

On the nav bar you can go to these pages,

  • View all
  • View all errors
  • Threats

View all page will show all the details from the access.log.

alt text

You can search for anything from the viewall page, and also you can download the whole log by clicking Download as CSV button.

alt text

View all error will show all the errors fetched from error.log file.

alt text

Threats will show the threat name and IP's that tried and attacked.

The following threats can be identified by this project

  • sql_injection
  • sql_server_shell_command_injection
  • remote_file_inclusion
  • session_corruption
  • broken_authentication
  • insecure_object_refrence_intrusion
  • script_inclusion_detection_xss_attack
  • inclusion_of_img_tags
  • directory_traversal_attack
  • shellsock_vulnerability

alt text

It is in development, for any quries contact:

Aakash Nilavan : [email protected]

Anish Tiwari : [email protected]

Hesen Nivas : [email protected]