Replies: 16 comments 33 replies
-
|
that would be nice |
Beta Was this translation helpful? Give feedback.
-
|
+1 🙂 |
Beta Was this translation helpful? Give feedback.
-
|
+1 🙂 |
Beta Was this translation helpful? Give feedback.
-
|
+1 🙂 |
Beta Was this translation helpful? Give feedback.
-
|
pls.... |
Beta Was this translation helpful? Give feedback.
-
|
+1 |
Beta Was this translation helpful? Give feedback.
-
|
Just switched from NPM today. Really impressed! |
Beta Was this translation helpful? Give feedback.
-
|
I've been testing this for the last couple of days and have log parsing working in Crowdsec. You'll need to install Crowdsec, the relevant firewall bouncer, and the base HTTP scenarios... cscli collections install crowdsecurity/base-http-scenariosThen you'll need to create an acquisition file (/etc/crowdsec/acquis.d/zoraxy.yaml) to point to your log file location... Finally create the parser file (/etc/crowdsec/parsers/s01-parse/zoraxy-logs.yaml)... I've submitted a pull request to Crowdsec. Hopefully it will be approved, and you should then be able to just install the collection with the following. This would then install the latest base-http-scenarios and zoraxy-logs parser, leaving you to just set up the acquisition file. cscli collections install raithmir/zoraxy-logs |
Beta Was this translation helpful? Give feedback.
-
|
It would be useful if we could get the HTTP user-agent included in the logs, that can be further filtered in the Crowdsec base-http-scenarios. I might have a look at the logging code and submit a pull request if I get chance. I'm not familiar with Go though. Looks like r.UserAgent() is already captured for the Statistical Analysis view, so presuming it would be easy enough to add to the logs. |
Beta Was this translation helpful? Give feedback.
-
|
Also, I've not tested this as I'm not running in Docker, but the following may work for the acquisition file if you are (/etc/crowdsec/acquis.d/zoraxy.yaml)... |
Beta Was this translation helpful? Give feedback.
-
|
Updated parser file (/etc/crowdsec/parsers/s01-parse/zoraxy-logs.yaml) if you're running the v3.2.0 pre-release (which adds in the useragent in the logs). |
Beta Was this translation helpful? Give feedback.
-
|
Hello, thank you very much for the instructions. One question is how to install the crowdsec bouncer. Use zoraxy as Docker on unraid. I also have a crowdsec docker running. I'm just wondering whether I still need the bouncer. |
Beta Was this translation helpful? Give feedback.
-
|
Updated parser file (/etc/crowdsec/parsers/s01-parse/zoraxy-logs.yaml) to include [router:root-no_resp] log entries where Zoraxy blocks requests for unknown hosts. The pull request to add this to a new Crowdsec hub collection is still awaiting review over there. |
Beta Was this translation helpful? Give feedback.
-
|
Merged @Raithmir collection for Zoraxy please find the collection via https://app.crowdsec.net/hub/author/Raithmir/collections/zoraxy note parser supports version |
Beta Was this translation helpful? Give feedback.
-
Or if you've installed Zoraxy via Docker...
|
Beta Was this translation helpful? Give feedback.
-
|
Have installed in TrueNAS so I had to modify the IP and port lines to fit TrueNAS's requirement for dedicated IP Using this plugin for Zoraxy: https://github.com/AnthonyMichaelTDM/zoraxy_crowdsec_bouncer/tree/main All are configured and working properly except when I use cscli decisions add --ip to ban my IP for a test, I can still access to services. Now I get |
Beta Was this translation helpful? Give feedback.


Uh oh!
There was an error while loading. Please reload this page.
-
would be nice, if there was a crowdsec parser plugin
Beta Was this translation helpful? Give feedback.
All reactions