Skip to content

Commit c356a14

Browse files
authored
Merge branch 'main' into se_intro_schema_update
2 parents 8485505 + 5a3a18a commit c356a14

File tree

12 files changed

+46
-23
lines changed

12 files changed

+46
-23
lines changed

crowdsec-docs/docs/contributing/test_environment.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,12 @@ title: Creating a test environment
44
sidebar_position: 10
55
---
66

7+
:::warning
8+
The following documentation is written for use on Linux systems. If you are using a different operating system, please adjust the commands accordingly if we have prebuilt binaries for your system.
9+
10+
**However, please note we do not compile for MacOS so you will need to compile from source.**
11+
:::
12+
713
You need a test environment for several reasons:
814

915
- Creation of new parsers or scenarios
@@ -13,7 +19,7 @@ You need a test environment for several reasons:
1319
This can be done directly with the tarball of the release :
1420

1521
```bash
16-
VER=1.4.6 # Please check https://github.com/crowdsecurity/crowdsec/releases/latest for latest version
22+
VER=1.6.3 # Please check https://github.com/crowdsecurity/crowdsec/releases/latest for latest version
1723
wget https://github.com/crowdsecurity/crowdsec/releases/download/v$VER/crowdsec-release.tgz
1824
tar xvzf crowdsec-release.tgz
1925
cd crowdsec-v$VER

crowdsec-docs/docs/whitelist/expr_based_whitelist.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ Let's whitelist a **specific** user-agent (of course, it's just an example, don'
88
Since we are using data that is present from the parsing stage we can do this within `Parsing Whitelist` level. Please see [introduction](/whitelist/introduction.md) for your OS specific paths.
99

1010
```yaml
11-
name: crowdsecurity/whitelists
11+
name: "my/whitelist" ## Must be unique
1212
description: "Whitelist events from private ipv4 addresses"
1313
whitelist:
1414
reason: "private ipv4 ranges"
@@ -116,7 +116,7 @@ line: 5.5.8.5 - - [04/Jan/2020:07:25:02 +0000] "GET /.well-known/acme-challenge/
116116
| ├ create evt.Parsed.static_ressource : false
117117
| ├ create evt.Parsed.file_dir : /.well-known/acme-challenge/
118118
| ├ create evt.Meta.http_args_len : 0
119-
| └ 🟢 crowdsecurity/whitelists (unchanged)
119+
| └ 🟢 my/whitelist (unchanged)
120120
├-------- parser success 🟢
121121
├ Scenarios
122122
├ 🟢 crowdsecurity/http-crawl-non_statics

crowdsec-docs/docs/whitelist/format.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ sidebar_position: 2
77
## Whitelist configuration example
88

99
```yaml
10-
name: crowdsecurity/my-whitelists
10+
name: "my/whitelist" ## Must be unique
1111
description: "Whitelist events from my ipv4 addresses"
1212
#it's a normal parser, so we can restrict its scope with filter
1313
filter: "1 == 1"

crowdsec-docs/docs/whitelist/fqdn_based_whitelist.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ You might want to whitelist a fully qualified domain name (FQDN eg foo.com), in
1414
Let's create the following file `FQDN-whitelists.yaml` (See [introduction](/whitelist/introduction.md) for your OS specific path) :
1515

1616
```yaml
17-
name: me/FQDN-whitlists
17+
name: "my/FQDN-whitlists" ## Must be unique
1818
description: "Whitelist postoverflows from FQDN"
1919
whitelist:
2020
reason: "do whitelistings by FQDN"

crowdsec-docs/docs/whitelist/ip_based_whitelist.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ IP whitelists are best suited at `Parser whitelists` level because once the log
88
We will create the file `mywhitelist.yaml` please see [introduction](/whitelist/introduction.md) for your OS specific paths.
99

1010
```yaml
11-
name: crowdsecurity/whitelists
11+
name: "my/whitelist" ## Must be unique
1212
description: "Whitelist events from my ip addresses"
1313
whitelist:
1414
reason: "my ip ranges"

crowdsec-docs/docs/whitelist/postoverflow_based_whitelist.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ First of all, install the [crowdsecurity/rdns postoverflow](https://hub.crowdsec
2424
Let's create `mywhitelist.yaml` again but remember this is a postoverflow whitelist so the paths will be different to `Parsing whitelists` please see [introduction](/whitelist/introduction.md) for your OS specific path.
2525

2626
```yaml
27-
name: me/my_cool_whitelist
27+
name: "my/po_whitelist" ## Must be unique
2828
description: lets whitelist our own reverse dns
2929
whitelist:
3030
reason: dont ban my ISP

crowdsec-docs/unversioned/beta_program.mdx

Lines changed: 24 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -22,18 +22,35 @@ To join the CrowdSec Beta program, click the [Beta opt-in option directly in the
2222

2323
### CrowdSec Threat Forecast Blocklist - Beta starts 2024-10-25
2424

25-
#### What is it ?
25+
#### What is it and what to expect?
2626

27-
The Threat Forecast Blocklist is a dynamic, adaptive blocklist customized to your organization's signals. By identifying attacks on similar profiles, it predicts threats that will likely target your organization in the coming days.
27+
The **Threat Forecast Blocklist** is a dynamic, adaptive blocklist customized to your organization's signals.
28+
By identifying attacks on similar profiles, it predicts threats that will likely target your organization in the coming days.
29+
It will update every 24 hours, and the signals of all your Security Engines will be considered to build the prediction.
2830

29-
The Threat Forecast Blocklist will update every 24 hours, and the signals of all your Security Engines will be considered to build the prediction.
31+
It's tailored to your organization; hence, we expect that it should allow preemptive remediation, resulting in a **drop in the number of alerts**.
32+
Optionally, if you have an iptables of nftables remediation component, you'll be able to see some [metrics about this blocklist's efficiency](https://docs.crowdsec.net/docs/next/observability/usage_metrics)
3033

31-
#### Who will have access to it ?
34+
#### Who will have access to it?
3235

33-
If you have at least one enrolled security engine with an average of more than 100 alerts a week (total on your organization) you have a chance to be invited.
34-
You'll receive an email on Friday October the 25th 2024.
36+
If you have at least one enrolled security engine with an average of more than 100 alerts a week (total for your organization) you have a chance to be invited.
37+
You'll receive an email on Friday, October the 25th, 2024.
3538

36-
**Important note**: You will have 15 days to start using the Threat Forecast Blocklist and 30 days total starting today to test it out. If you do not use it within 15 days, your access will be reallocated to someone else.
39+
**Important note**: You will have 15 days to start using the Threat Forecast Blocklist and 30 days in total starting today to test it out. If you do not use it within 15 days, your access will be reallocated to someone else.
40+
41+
#### How to subscribe to this blocklist
42+
43+
- Log into your console account
44+
- Go to the blocklist catalog and search "forecast": https://app.crowdsec.net/blocklists?page=1&q=forecast
45+
- If you're part of the this beta, you should see the **Threat Forecast Blocklist**
46+
- Click on it
47+
- You should have landed in the details page for this blocklist
48+
- Click on subscribe to open the subscription popup and follow its instructions to subscribe to the blocklist.
49+
- We recommend subscribing your organization to the list as this will make sure that newly added security engines automatically benefit from the blocklist as well.
50+
-- If you want to have more finegrained controll, you can also select only specific engines to subscribe to the list.
51+
- Click confirm subscription
52+
53+
Note that you must have a [remediation component](https://doc.crowdsec.net/u/bouncers/intro) on those engines to effectively block the IPs.
3754

3855
## Your feedback is key
3956

crowdsec-docs/versioned_docs/version-v1.3.4/whitelist/create.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ sudo cscli decisions list
4343
Let's create a `/etc/crowdsec/parsers/s02-enrich/mywhitelists.yaml` file with the following content :
4444

4545
```yaml
46-
name: crowdsecurity/whitelists
46+
name: my/whitelist
4747
description: "Whitelist events from my ip addresses"
4848
whitelist:
4949
reason: "my ip ranges"
@@ -85,7 +85,7 @@ Now, let's make something more tricky : let's whitelist a **specific** user-agen
8585
Let's change our whitelist to :
8686

8787
```yaml
88-
name: crowdsecurity/whitelists
88+
name: my/whitelist
8989
description: "Whitelist events from private ipv4 addresses"
9090
whitelist:
9191
reason: "private ipv4 ranges"

crowdsec-docs/versioned_docs/version-v1.4.0/whitelist/create.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ sudo cscli decisions list
4343
Let's create a `/etc/crowdsec/parsers/s02-enrich/mywhitelists.yaml` file with the following content :
4444

4545
```yaml
46-
name: crowdsecurity/whitelists
46+
name: my/whitelist
4747
description: "Whitelist events from my ip addresses"
4848
whitelist:
4949
reason: "my ip ranges"
@@ -85,7 +85,7 @@ Now, let's make something more tricky : let's whitelist a **specific** user-agen
8585
Let's change our whitelist to :
8686

8787
```yaml
88-
name: crowdsecurity/whitelists
88+
name: my/whitelist
8989
description: "Whitelist events from private ipv4 addresses"
9090
whitelist:
9191
reason: "private ipv4 ranges"

crowdsec-docs/versioned_docs/version-v1.5.0/whitelist/create.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ sudo cscli decisions list
4343
Let's create a `/etc/crowdsec/parsers/s02-enrich/mywhitelists.yaml` file with the following content :
4444

4545
```yaml
46-
name: crowdsecurity/whitelists
46+
name: my/whitelist
4747
description: "Whitelist events from my ip addresses"
4848
whitelist:
4949
reason: "my ip ranges"
@@ -85,7 +85,7 @@ Now, let's make something more tricky : let's whitelist a **specific** user-agen
8585
Let's change our whitelist to :
8686

8787
```yaml
88-
name: crowdsecurity/whitelists
88+
name: my/whitelist
8989
description: "Whitelist events from private ipv4 addresses"
9090
whitelist:
9191
reason: "private ipv4 ranges"

0 commit comments

Comments
 (0)