You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: crowdsec-docs/docs/contributing/test_environment.md
+7-1Lines changed: 7 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,6 +4,12 @@ title: Creating a test environment
4
4
sidebar_position: 10
5
5
---
6
6
7
+
:::warning
8
+
The following documentation is written for use on Linux systems. If you are using a different operating system, please adjust the commands accordingly if we have prebuilt binaries for your system.
9
+
10
+
**However, please note we do not compile for MacOS so you will need to compile from source.**
11
+
:::
12
+
7
13
You need a test environment for several reasons:
8
14
9
15
- Creation of new parsers or scenarios
@@ -13,7 +19,7 @@ You need a test environment for several reasons:
13
19
This can be done directly with the tarball of the release :
14
20
15
21
```bash
16
-
VER=1.4.6# Please check https://github.com/crowdsecurity/crowdsec/releases/latest for latest version
22
+
VER=1.6.3# Please check https://github.com/crowdsecurity/crowdsec/releases/latest for latest version
Copy file name to clipboardExpand all lines: crowdsec-docs/docs/whitelist/expr_based_whitelist.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ Let's whitelist a **specific** user-agent (of course, it's just an example, don'
8
8
Since we are using data that is present from the parsing stage we can do this within `Parsing Whitelist` level. Please see [introduction](/whitelist/introduction.md) for your OS specific paths.
9
9
10
10
```yaml
11
-
name: crowdsecurity/whitelists
11
+
name: "my/whitelist"## Must be unique
12
12
description: "Whitelist events from private ipv4 addresses"
Copy file name to clipboardExpand all lines: crowdsec-docs/docs/whitelist/postoverflow_based_whitelist.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ First of all, install the [crowdsecurity/rdns postoverflow](https://hub.crowdsec
24
24
Let's create `mywhitelist.yaml` again but remember this is a postoverflow whitelist so the paths will be different to `Parsing whitelists` please see [introduction](/whitelist/introduction.md) for your OS specific path.
The Threat Forecast Blocklist is a dynamic, adaptive blocklist customized to your organization's signals. By identifying attacks on similar profiles, it predicts threats that will likely target your organization in the coming days.
27
+
The **Threat Forecast Blocklist** is a dynamic, adaptive blocklist customized to your organization's signals.
28
+
By identifying attacks on similar profiles, it predicts threats that will likely target your organization in the coming days.
29
+
It will update every 24 hours, and the signals of all your Security Engines will be considered to build the prediction.
28
30
29
-
The Threat Forecast Blocklist will update every 24 hours, and the signals of all your Security Engines will be considered to build the prediction.
31
+
It's tailored to your organization; hence, we expect that it should allow preemptive remediation, resulting in a **drop in the number of alerts**.
32
+
Optionally, if you have an iptables of nftables remediation component, you'll be able to see some [metrics about this blocklist's efficiency](https://docs.crowdsec.net/docs/next/observability/usage_metrics)
30
33
31
-
#### Who will have access to it?
34
+
#### Who will have access to it?
32
35
33
-
If you have at least one enrolled security engine with an average of more than 100 alerts a week (total on your organization) you have a chance to be invited.
34
-
You'll receive an email on Friday October the 25th 2024.
36
+
If you have at least one enrolled security engine with an average of more than 100 alerts a week (total for your organization) you have a chance to be invited.
37
+
You'll receive an email on Friday, October the 25th, 2024.
35
38
36
-
**Important note**: You will have 15 days to start using the Threat Forecast Blocklist and 30 days total starting today to test it out. If you do not use it within 15 days, your access will be reallocated to someone else.
39
+
**Important note**: You will have 15 days to start using the Threat Forecast Blocklist and 30 days in total starting today to test it out. If you do not use it within 15 days, your access will be reallocated to someone else.
40
+
41
+
#### How to subscribe to this blocklist
42
+
43
+
- Log into your console account
44
+
- Go to the blocklist catalog and search "forecast": https://app.crowdsec.net/blocklists?page=1&q=forecast
45
+
- If you're part of the this beta, you should see the **Threat Forecast Blocklist**
46
+
- Click on it
47
+
- You should have landed in the details page for this blocklist
48
+
- Click on subscribe to open the subscription popup and follow its instructions to subscribe to the blocklist.
49
+
- We recommend subscribing your organization to the list as this will make sure that newly added security engines automatically benefit from the blocklist as well.
50
+
-- If you want to have more finegrained controll, you can also select only specific engines to subscribe to the list.
51
+
- Click confirm subscription
52
+
53
+
Note that you must have a [remediation component](https://doc.crowdsec.net/u/bouncers/intro) on those engines to effectively block the IPs.
0 commit comments