Skip to content

Commit 8cb51b7

Browse files
author
jdv
committed
trying to fix build
1 parent 949a810 commit 8cb51b7

File tree

1 file changed

+8
-16
lines changed

1 file changed

+8
-16
lines changed

crowdsec-docs/unversioned/troubleshooting/usecases.mdx

Lines changed: 8 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,6 @@ title: Use Cases and Quick Solutions
44
id: usecases
55
---
66

7-
import UnderlineTooltip from '@site/src/components/underline-tooltip';
8-
97
# Use Cases and Quick Solutions
108

119
This page provides quick recommendations for common CrowdSec implementation scenarios. Each use case includes practical implementation paths with links to relevant documentation.
@@ -14,10 +12,6 @@ This page provides quick recommendations for common CrowdSec implementation scen
1412
New to CrowdSec? Start with our [installation guide](/u/getting_started/installation/linux) and [health check guide](/u/getting_started/health_check).
1513
:::
1614

17-
import FormattedTabs from '@site/src/components/formatted-tabs';
18-
19-
TODO: use <UnderlineTooltip tooltip="..."></UnderlineTooltip> on key words to help the user understand
20-
2115
## Block Known-Bad IPs at the Edge
2216

2317
Pull up-to-date IP lists from CrowdSec **Blocklist as a Service** endpoints into your edge protection.
@@ -70,24 +64,22 @@ Good option if you need to optimize server performance and reduce log storage re
7064

7165
## Multi-Tenant Protection
7266

73-
Apply different security policies per customer, application, or environment without policy conflicts using flexible context management.
67+
Apply different security policies per customer, application, tier, [...] retrieving contextualized IP Lists.
7468

7569
**Is it for me?**
7670
Ideal if you're managing multiple customers, applications, or environments with different security requirements.
7771
Good option if you need granular policy control and want to avoid cross-tenant security policy interference.
7872

7973
**How it works:**
80-
- Configure separate contexts for each tenant using cscli context management.
81-
- Set up centralized allowlists with tenant-specific filtering rules.
82-
- Create distinct integration endpoints for different tenant policies.
83-
- Deploy separate AppSec rule sets tailored to each tenant's requirements.
74+
- Configure separate blocklist integrations for each context.
75+
- Assign context-specific blocklist AND allowlists.
76+
- Go further by creating custom lists based on detections made on your infrastructure.
8477

8578
**References**
86-
- [Context management with cscli](/docs/next/cscli/cscli_contexts)
87-
- [Centralized allowlists configuration](/docs/next/local_api/centralized_allowlists)
88-
- [Decision filtering by origin](/docs/next/cscli/cscli_decisions_delete)
89-
- [Collections per environment](/docs/next/cscli/cscli_collections)
90-
- [AppSec configuration guide](/docs/next/appsec/configuration)
79+
- [Blocklist integration Getting started guide](/u/integrations/intro)
80+
- [Blocklist Catalog doc](/u/console/blocklists/catalog)
81+
- [Blocklist Catalog ↗️](https://app.crowdsec.net/blocklists/search)
82+
- [Custom blocklists from the decisions of your Security engine ↗️](https://github.com/crowdsecurity/custom-bouncer-to-blocklist)
9183

9284
---
9385

0 commit comments

Comments
 (0)