Skip to main content

Post Installation Steps

Your CrowdSec installation is running. Use the steps below to finish setup and tailor CrowdSec to your environment. Items marked recommended are the best starting points. Items marked optional add visibility or customization.

If you have not done it yet, run the ๐Ÿฉบ Health Check to confirm detection, connectivity, and remediation.
If you hit errors during install, start with the ๐Ÿšจ troubleshooting guide.

1. CrowdSec Console โญโ€‹

The CrowdSec Console is a web interface that helps you manage alerts, decisions, and settings across your deployments.

2. Whitelists โญโ€‹

info

Whitelists are a way to tell CrowdSec to ignore certain events or IP addresses.

By default, CrowdSec whitelists private LAN IP addresses. You can add your own IPs or events to prevent false positives.

3. Acquisitions ๐Ÿ› ๏ธโ€‹

info

Acquisitions are sources of logs that CrowdSec can analyze.

By default, CrowdSec attempts to detect running services and install the right parsers and scenarios. If a service is missing or logs live in a custom path, you can add acquisitions and collections manually.

4. Profiles ๐Ÿ› ๏ธโ€‹

info

Profiles are a set of rules that drives what decisions will be taken by CrowdSec.

CrowdSec ships with a default profile that works for most setups. Create a custom profile if you need different ban durations, scopes, or behaviors.

5. Metrics ๐Ÿ› ๏ธโ€‹

info

Metrics are a way to monitor the behavior of CrowdSec.

CrowdSec exposes a Prometheus endpoint so you can monitor detections, parsing, and system health.

CrowdSec Docs
We use cookies

This site uses cookies to help us improve your experience. You can accept or decline below.