Skip to content

Commit c9b8692

Browse files
author
jdv
committed
ok summary jsut need space :D
1 parent ed4ccb9 commit c9b8692

File tree

1 file changed

+11
-5
lines changed

1 file changed

+11
-5
lines changed

crowdsec-docs/unversioned/getting_started/healthcheck.mdx

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,8 @@ The HTTP collection and the Linux collection contain **dummy scenarios** allowin
2727
:::
2828

2929
<details>
30-
<summary>Test HTTP detection</summary>
30+
<summary>☑️ Test **HTTP** detection</summary>
31+
3132
Let's trigger the `crowdsecurity/http-generic-test` dummy scenario by calling a *probe path* on your web server.
3233

3334
1️⃣ Request your service URL with the following path: `/crowdsec-test-NtktlJHV4TfBSK3wvlhiOBnl`
@@ -37,11 +38,15 @@ Let's trigger the `crowdsecurity/http-generic-test` dummy scenario by calling a
3738

3839
<CodeBlock className="language-bash">sudo cscli alerts list -s crowdsecurity/http-generic-test</CodeBlock>
3940

40-
Note that this scenario has a delay of 5 minutes before it can re-trigger _(blackhole parameter of the scenario)_.
41+
Notes:
42+
- If it's done from a private IP the alert won't appear as private IPs are whitelisted by default.
43+
- You can call the test url via a browser if you prefer, it might make it easier to test from an other device.
44+
- This scenario has a delay of 5 minutes before it can re-trigger _(blackhole parameter of the scenario)_.
4145
</details>
4246

4347
<details>
44-
<summary>Test SSH detection</summary>
48+
<summary>☑️ Test **SSH** detection</summary>
49+
4550
Let's trigger the `crowdsecurity/ssh-generic-test` dummy scenario by logging in to your server via SSH with a specific user.
4651

4752
1️⃣ Try to authenticate to your server via SSH using the following user: `crowdsec-test-NtktlJHV4TfBSK3wvlhiOBnl`.
@@ -55,7 +60,8 @@ Note that this scenario has a delay of 5 minute before it can re-trigger _(black
5560
</details>
5661

5762
<details>
58-
<summary>Test CrowdSec WAF with an AppSec detection</summary>
63+
<summary>☑️ Test CrowdSec WAF with an **AppSec** detection</summary>
64+
5965
If you are using an AppSec-capable bouncer and have configured CrowdSec WAF, you can test the detection of an AppSec scenario.
6066
It's similar to the HTTP detection test, but it will trigger `crowdsecurity/appsec-generic-test`.
6167

@@ -81,7 +87,7 @@ If so, you can proceed to the next phase of the health check: [**Connectivity ch
8187
If not, check the troubleshooting section below
8288

8389
<details>
84-
<summary>🚨 Detection Troubleshooting</summary>
90+
<summary>🚨 **Detection Troubleshooting**</summary>
8591

8692
*No alerts triggered? Let's investigate: Here are some tests to identify where the issue might be.*
8793

0 commit comments

Comments
 (0)