-
Notifications
You must be signed in to change notification settings - Fork 89
document "Service Discovery & Setup" #860
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Merged
Changes from 17 commits
Commits
Show all changes
23 commits
Select commit
Hold shift + click to select a range
54eaee1
document post-install behavior of "cscli setup unattended"
mmetc b2e2def
moved content
mmetc 6f3d358
formatting, title
mmetc c059a3e
typos
mmetc c6204a3
unit
mmetc 609c3af
Merge branch 'main' into cscli-setup
mmetc 0e24c8f
typo
mmetc c3dfda2
wip
mmetc cc2dc07
wip
mmetc 912c3c5
up
blotus 0ac9117
lint
blotus 5a29140
lint
blotus 8c91f71
lint
blotus 3a0c5ce
repetitions
mmetc 2dd95b4
add PlatformVersion
mmetc 94d2228
lint
mmetc 6277114
up
blotus a4c795a
fix datasources links
blotus 9a82b92
up
blotus 0b6cc9b
up
blotus 6fd4482
up
mmetc 8c1993f
up
blotus 59d5e42
fix name
blotus File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -4,13 +4,13 @@ title: Introduction | |
| sidebar_position: 1 | ||
| --- | ||
|
|
||
| The Log Processor is one of the core component of the Security Engine to: | ||
| The Log Processor is a core component of the Security Engine. It: | ||
|
|
||
| - Read logs from [Data Sources](log_processor/data_sources/introduction.md) in the form of Acquistions. | ||
| - Parse the logs and extract relevant information using [Parsers](log_processor/parsers/introduction.mdx). | ||
| - Enrich the parsed information with additional context such as GEOIP, ASN using [Enrichers](log_processor/parsers/enricher.md). | ||
| - Monitor the logs for patterns of interest known as [Scenarios](log_processor/scenarios/introduction.mdx). | ||
| - Push alerts to the Local API (LAPI) for alert/decisions to be stored within the database. | ||
| - Reads logs from [Data Sources](log_processor/data_sources/introduction.md) via Acquistions. | ||
| - Parses logs and extract relevant information using [Parsers](log_processor/parsers/introduction.mdx). | ||
| - Enriches the parsed information with additional context such as GEOIP, ASN using [Enrichers](log_processor/parsers/enricher.md). | ||
| - Monitors patterns of interest via [Scenarios](log_processor/scenarios/introduction.mdx). | ||
| - Pushes alerts to the Local API (LAPI), where alert/decisions are stored. | ||
|
|
||
| !TODO: Add diagram of the log processor pipeline | ||
|
||
| - Read logs from datasources | ||
|
|
@@ -19,9 +19,9 @@ The Log Processor is one of the core component of the Security Engine to: | |
| - Monitor the logs for patterns of interest | ||
|
|
||
|
|
||
| ## Introduction | ||
| ## Log Processor | ||
|
|
||
| The Log Processor is an internal core component of the Security Engine in charge of reading logs from Data Sources, parsing them, enriching them, and monitoring them for patterns of interest. | ||
| The Log Processor reads logs from Data Sources, parses and enriches them, and monitors them for patterns of interest. | ||
|
|
||
| Once a pattern of interest is detected, the Log Processor will push alerts to the Local API (LAPI) for alert/decisions to be stored within the database. | ||
|
|
||
|
|
@@ -35,10 +35,10 @@ Data Sources are individual modules that can be loaded at runtime by the Log Pro | |
|
|
||
| Acquisitions are the configuration files that define how the Log Processor should read logs from a Data Source. Acquisitions are defined in YAML format and are loaded by the Log Processor at runtime. | ||
|
|
||
| We have two ways to define Acquisitions within the [configuration directory](/u/troubleshooting/security_engine#where-is-configuration-stored) : | ||
| We support two ways to define Acquisitions in the [configuration directory](/u/troubleshooting/security_engine#where-is-configuration-stored): | ||
|
|
||
| - `acquis.yaml` file: This used to be only place to define Acquisitions prior to `1.5.0`. This file is still supported for backward compatibility. | ||
| - `acquis.d` folder: This is a directory where you can define multiple Acquisitions in separate files. This is useful when you want to auto generate files using an external application such as ansible. | ||
| - `acquis.yaml` file: the legacy, single-file configuration (still supported) | ||
| - `acquis.d` directory: a directory of multiple acquisition files (since v1.5.0, recommended for any non-trivial setup) | ||
|
|
||
| ```yaml title="Example Acquisition Configuration" | ||
| ## /etc/crowdsec/acquis.d/file.yaml | ||
|
|
@@ -87,3 +87,9 @@ You can see more information on Whitelists in the [documentation](log_processor/ | |
| Alert Context is additional context that can sent with an alert to the LAPI. This context can be shown locally via `cscli` or within the [CrowdSec Console](https://app.crowdsec.net/signup) if you opt in to share context when you enroll your instance. | ||
|
|
||
| You can read more about Alert Context in the [documentation](log_processor/alert_context/intro.md). | ||
|
|
||
| ### Service Discovery & Setup | ||
|
|
||
| On installation, CrowdSec can automatically detect existing services, download the relevant Hub collections, and generate acquisitions based on discovered log files. | ||
|
|
||
| You can [customize or override these steps](log_processor/service-discovery-setup/intro.md), for example when provisioning multiple systems or using configuration management tools. | ||
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Removing
.mdfrom these links breaks them