Skip to content

Commit 04105cd

Browse files
rr404jdv
andauthored
Jdv fix links datasources + sophos doc (#694)
* quick data sources & sophos link fix --------- Co-authored-by: jdv <[email protected]>
1 parent b555fd4 commit 04105cd

File tree

4 files changed

+17
-17
lines changed

4 files changed

+17
-17
lines changed

crowdsec-docs/docs/log_processor/data_sources/introduction.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
id: intro
3-
title: Introduction
3+
title: Acquisition Datasources Introduction
44
sidebar_position: 1
55
---
66

@@ -12,19 +12,19 @@ DataSources are configured via the [acquisition](/configuration/crowdsec_configu
1212

1313
Name | Type | Stream | One-shot
1414
-----|------|--------|----------
15-
[Appsec](/data_sources/appsec.md) | expose HTTP service for the Appsec component | yes | no
16-
[AWS cloudwatch](/data_sources/cloudwatch.md) | single stream or log group | yes | yes
17-
[AWS kinesis](/data_sources/kinesis.md)| read logs from a kinesis strean | yes | no
18-
[AWS S3](/data_sources/s3.md)| read logs from a S3 bucket | yes | yes
19-
[docker](/data_sources/docker.md) | read logs from docker containers | yes | yes
20-
[file](/data_sources/file.md) | single files, glob expressions and .gz files | yes | yes
21-
[HTTP](/data_sources/http.md) | read logs from an HTTP endpoint | yes | no
22-
[journald](/data_sources/journald.md) | journald via filter | yes | yes
23-
[Kafka](/data_sources/kafka.md)| read logs from kafka topic | yes | no
24-
[Kubernetes Audit](/data_sources/kubernetes_audit.md) | expose a webhook to receive audit logs from a Kubernetes cluster | yes | no
25-
[Loki](/data_sources/loki.md) | read logs from loki | yes | yes
26-
[syslog service](/data_sources/syslog_service.md) | read logs received via syslog protocol | yes | no
27-
[Windows Event](/data_sources/windows_event_log.md)| read logs from windows event log | yes | yes
15+
[Appsec](/log_processor/data_sources/appsec.md) | expose HTTP service for the Appsec component | yes | no
16+
[AWS cloudwatch](/log_processor/data_sources/cloudwatch.md) | single stream or log group | yes | yes
17+
[AWS kinesis](/log_processor/data_sources/kinesis.md)| read logs from a kinesis strean | yes | no
18+
[AWS S3](/log_processor/data_sources/s3.md)| read logs from a S3 bucket | yes | yes
19+
[docker](/log_processor/data_sources/docker.md) | read logs from docker containers | yes | yes
20+
[file](/log_processor/data_sources/file.md) | single files, glob expressions and .gz files | yes | yes
21+
[HTTP](/log_processor/data_sources/http.md) | read logs from an HTTP endpoint | yes | no
22+
[journald](/log_processor/data_sources/journald.md) | journald via filter | yes | yes
23+
[Kafka](/log_processor/data_sources/kafka.md)| read logs from kafka topic | yes | no
24+
[Kubernetes Audit](/log_processor/data_sources/kubernetes_audit.md) | expose a webhook to receive audit logs from a Kubernetes cluster | yes | no
25+
[Loki](/log_processor/data_sources/loki.md) | read logs from loki | yes | yes
26+
[syslog service](/log_processor/data_sources/syslog_service.md) | read logs received via syslog protocol | yes | no
27+
[Windows Event](/log_processor/data_sources/windows_event_log.md)| read logs from windows event log | yes | yes
2828

2929
## Common configuration parameters
3030

crowdsec-docs/unversioned/console/blocklists/integrations/firewall.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Every product product has its way to handle external blocklists. We provide a si
3636
| [F5](https://techdocs.f5.com/kb/en-us/products/big-ip-afm/manuals/product/big-ip-network-firewall-policies-and-implementations-14-0-0/07.html) | Custom | `192.168.38.187,32,BL,crowdsec-myf5Integration`<br /> `192.168.38.188,32,BL,crowdsec-myf5Integration` |
3737
| [Fortinet](https://docs.fortinet.com/document/fortigate/6.4.5/administration-guide/891236/external-blocklist-policy) | Plain text | `192.168.38.187`<br />`192.168.38.186` |
3838
| [Palo Alto](https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/policy/use-an-external-dynamic-list-in-policy/external-dynamic-list#idf36cb80a-77f1-4d17-9c4b-7efe9fe426af) | Plain text | `192.168.38.187`<br />`192.168.38.186` |
39-
| [Sophos](https://docs.sophos.com/nsg/sophos-firewall/21.0/help/en-us/webhelp/onlinehelp/AdministratorHelp/ActiveThreatResponse/ThirdPartyThreatFeeds/index.html) | Plain text | `192.168.38.187`<br />`192.168.38.186` |
39+
| [Sophos](https://docs.sophos.com/nsg/sophos-firewall/latest/Help/en-us/webhelp/onlinehelp/AdministratorHelp/ActiveThreatResponse/ConfigureFeeds/ThirdPartyThreatFeeds/index.html) | Plain text | `192.168.38.187`<br />`192.168.38.186` |
4040
| Generic vendor | Plain text | `192.168.38.187`<br />`192.168.38.186` |
4141

4242
## How to bypass provider limit?

crowdsec-docs/unversioned/integrations/sophos.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ Once the integration is generated you will be presented with a credentials scree
4848
}}
4949
/>
5050

51-
[Sophos Documentation](https://docs.sophosnetworks.com/pan-os/11-1/pan-os-admin/policy/use-an-external-dynamic-list-in-policy/external-dynamic-list#idf36cb80a-77f1-4d17-9c4b-7efe9fe426af)
51+
[Sophos Documentation ↗️](https://docs.sophos.com/nsg/sophos-firewall/latest/Help/en-us/webhelp/onlinehelp/AdministratorHelp/ActiveThreatResponse/ConfigureFeeds/ThirdPartyThreatFeeds/index.html)
5252

5353
## Format example
5454

crowdsec-docs/unversioned/service_api/integrations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ For some constructors, the integrations can generate vendor-specific format, see
1414
| F5 | Basic Auth | Yes | [F5 doc](https://techdocs.f5.com/kb/en-us/products/big-ip-afm/manuals/product/big-ip-network-firewall-policies-and-implementations-14-0-0/07.html ) | `f5` |
1515
| Fortinet | Basic Auth | Yes | [Fortinet doc](https://docs.fortinet.com/document/fortigate/6.4.5/administration-guide/891236/external-blocklist-policy) | `fortigate` |
1616
| Palo alto | Basic Auth | Yes | [PaloAlto doc](https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/policy/use-an-external-dynamic-list-in-policy/configure-the-firewall-to-access-an-external-dynamic-list) | `paloalto` |
17-
| Sophos | Basic Auth | Yes | [Sophos doc](https://docs.sophos.com/nsg/sophos-firewall/21.0/help/en-us/webhelp/onlinehelp/AdministratorHelp/ActiveThreatResponse/ThirdPartyThreatFeeds/index.html) | `sophos` |
17+
| Sophos | Basic Auth | Yes | [Sophos doc](https://docs.sophos.com/nsg/sophos-firewall/latest/Help/en-us/webhelp/onlinehelp/AdministratorHelp/ActiveThreatResponse/ConfigureFeeds/ThirdPartyThreatFeeds/index.html) | `sophos` |
1818

1919

2020
For all the other providers, the `plain_text` format consists of one ip per line, and should be supported by most devices. If a specific format is missing, reach out to us and we'll help you support it!

0 commit comments

Comments
 (0)