Update README.md

pull/3/head
DocArmoryTech 2020-11-03 13:56:57 +00:00 committed by GitHub
parent a616df19d4
commit 987b685321
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 19 additions and 6 deletions

View File

@ -18,6 +18,14 @@ git submodule init
git submodule update git submodule update
pip install -r REQUIREMENTS pip install -r REQUIREMENTS
~~~ ~~~
## Starting the server
~~~
cd bin
python tai-server.py
~~~
By the default, the server is listening on TCP port 8889.
# Alternative Installation # Alternative Installation
@ -27,6 +35,7 @@ This method involves:
- creating a python virtual environment - creating a python virtual environment
- installation of TAI - installation of TAI
- systemd configuraion of (arbitrarily) four instances - systemd configuraion of (arbitrarily) four instances
- configuring nginx as a reverse proxy to four instances
Installing a few dependencies Installing a few dependencies
~~~ ~~~
@ -59,15 +68,19 @@ sudo cp /home/tai/threat-actor-intelligence-server/debian/tai.target /etc/system
sudo systemctl daemon-reload sudo systemctl daemon-reload
~~~ ~~~
configuring nginx as a reverse proxy to four instances
# Starting the server
~~~ ~~~
cd bin sudo rm /etc/nginx/site-enabled/default
python tai-server.py sudo cp /home/tai/threat-actor-intelligence-server/debian/nginx-tai.conf /etc/nginx/sites-available/
sudo ln -s /etc/nginx/sites-available/nginx-tai.conf /etc/nginx/sites-enabled/
~~~
Lastly, configure systemd to start the TAI servers and nginx automatically
~~~
sudo systemctl enable tai.target
sudo systemctl enable nginx
~~~ ~~~
By the default, the server is listening on TCP port 8889.
# API and public API # API and public API