Skip to main content
Security Engine version:
Version: v1.6

LAPI

LAPI based whitelist are not your traditional whitelists, as in they wont prevent an overflow from happening, but they will prevent a decision being made by the LAPI this means log processors that forward alerts to the LAPI will not need to be configured individually to ignore certain conditions.

You can create a LAPI based whitelist by prepending a profile to the profiles.yaml file:

YAML
name: whitelist
debug: true
filters:
- Alert.GetValue() in ["2.2.2.2", "3.3.3.3"]
on_success: break
---

In this example, the LAPI will not make a decision if the source IP is 2.2.2.2 or 3.3.3.3.

The profiles.yaml file location differs based on the OS type here are the default locations:

  • Linux: /etc/crowdsec/profiles.yaml
  • FreeBSD: /usr/local/etc/crowdsec/profiles.yaml
  • Windows: C:\ProgramData\CrowdSec\config\profiles.yaml

You can use our extensive EXPR helpers to create more complex whitelists, for example, you can whitelist a range of IPs by using the following syntax:

YAML
name: whitelist
debug: true
filters:
- IpInRange(Alert.GetValue(), "192.168.1.0/24")
on_success: break
---

If you have implemented a LAPI based whitelist then you must reload the CrowdSec service for the changes to take effect.

Reload CrowdSec
SHReload CrowdSec
sudo systemctl reload crowdsec
CrowdSec Docs
We use cookies

This site uses cookies to help us improve your experience. You can accept or decline below.