You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* fix sidebar links problem
* fix appsec broken links
* fix broken links pointing to unversioned doc
* remove link with todo in favor of todo comments
* various broken links (typo,bad anchors...)
* enhance: Fix broken links that actually link to nowhere
---------
Co-authored-by: Laurence <laurence.jones@live.co.uk>
@@ -138,4 +138,4 @@ And if we look at it in a browser, the user is presented with the HTML page emit
138
138
## Et Voila !
139
139
140
140
Your application should now be protected from the most common exploitation attempts.
141
-
[If you have already enrolled your instance in the console](/docs/next/console/enrollment), you will see alerts appearing there too!
141
+
[If you have already enrolled your instance in the console](/u/getting_started/post_installation/console#engines-page), you will see alerts appearing there too!
Copy file name to clipboardExpand all lines: crowdsec-docs/docs/appsec/quickstart/nginxopenresty.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -81,7 +81,7 @@ Steps:
81
81
82
82
The two important directives in this configuration file are:
83
83
84
-
-`appsec_config` is the name of the [*AppSec Configuration*](/appsec/configuration.md#appsec-configuration) that was included in the [Collection](/concepts.md#colleccollectionstion) we just installed.
84
+
-`appsec_config` is the name of the [*AppSec Configuration*](appsec/configuration.md#appsec-configuration) that was included in the [Collection](/concepts.md#collections) we just installed.
85
85
- the `listen_addr` is the IP and port the AppSec Component will listen to.
Copy file name to clipboardExpand all lines: crowdsec-docs/docs/concepts.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -65,7 +65,7 @@ The `labels` part is here to tag the incoming logs with a type. `labels.type` ar
65
65
66
66
## Application Security Component
67
67
68
-
[[References](/appsec/intro.md)]
68
+
[[References](appsec/intro)]
69
69
70
70
The Application Security Component is a special datasource that allows the supported remediation components to forward HTTP requests to crowdsec for analysis, before they can reach the application.
71
71
Because CrowdSec can analyse the request and take a decision before it reaches the application, the combo of the Application Security Component and the remediation components acts as a Web Application Firewall (WAF).
@@ -142,9 +142,9 @@ You can as well [write your own](/scenarios/create.md)!
142
142
143
143
## AppSec Rules
144
144
145
-
[[References](/appsec/intro.md)]
145
+
[[References](appsec/intro)]
146
146
147
-
An AppSec rule is a YAML configuration file that describe a rule for the [Application Security Component](/appsec/intro.md).
147
+
An AppSec rule is a YAML configuration file that describe a rule for the [Application Security Component](appsec/intro).
148
148
149
149
An AppSec rule can match on various aspect of an HTTP request, such as the verb, the URI, the headers, the parameters, the body, etc.
150
150
You can use them to detect and block exploitation of specific vulnerabilities (virtual patching) or to write more generic WAF rules.
@@ -153,12 +153,12 @@ Contrary to scenarios, appsec rules can block a request before it reaches the ap
153
153
154
154
## AppSec Configs
155
155
156
-
An Appsec Config file is a YAML configuration file that tell the [Application Security Component](/appsec/intro.md) which rules should be loaded, and in which band (in-band or out-of-band).
156
+
An Appsec Config file is a YAML configuration file that tell the [Application Security Component](appsec/intro) which rules should be loaded, and in which band (in-band or out-of-band).
157
157
158
158
The config also expose hooks allowing you to customize at runtime the behavior of the AppSec component (disable a rule on a specific URL, apply a captcha if a specific rule is triggered, etc.)
This module allows you to enable the `Application Security Component` as a data source.
8
8
9
-
A more detailed documentation is available [here](/appsec/intro.md).
9
+
A more detailed documentation is available [here](/docs/next/appsec/intro).
10
10
11
-
A quickstart tutorial is available [here](/appsec/quickstart.md).
11
+
A quickstart tutorial is available for [Nginx/OpenResty](/docs/next/appsec/quickstart/nginxopenresty) and [Traefik](/docs/next/appsec/quickstart/traefik).
Copy file name to clipboardExpand all lines: crowdsec-docs/docs/getting_started/install_opnsense.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ Do not enable/start the services from the terminal like you would on a standard
27
27
28
28
Refresh the page and go to `Services > CrowdSec > Overview` to verify the running services and installed configurations.
29
29
30
-
Great, you now have CrowdSec installed on your system. Have a look at the [post installation steps](/getting_started/next_steps.md) to see how to to configure and optimize it,
30
+
Great, you now have CrowdSec installed on your system. Have a look at the [post installation steps](/u/getting_started/next_steps) to see how to to configure and optimize it,
Copy file name to clipboardExpand all lines: crowdsec-docs/docs/getting_started/install_pfsense.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -141,8 +141,7 @@ and `crowdsec-firewall-bouncer.log`.
141
141
142
142
## Service Management
143
143
144
-
Both services, Security Engine (crowdsec) and Remediation (crowdsec-firewall-bouncer) can be
145
-
controlled from [Status/Services](/status_services.php).
144
+
Both services, Security Engine (crowdsec) and Remediation (crowdsec-firewall-bouncer) can be controlled from `Status/Services`.
146
145
The equivalent shell commands are `service crowdsec.sh start/stop/restart` and `service crowdsec_firewall.sh start/stop/restart`. Note the ending **.sh**!
Copy file name to clipboardExpand all lines: crowdsec-docs/docs/getting_started/install_pyagent.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ sidebar_position: 1
6
6
7
7
# Using our Python SDK
8
8
9
-
This python SDK is designed for signal sharing partners to send signals and benefit from the community blocklist. Learn more about [signal sharing](TODO).
9
+
This python SDK is designed for signal sharing partners to send signals and benefit from the community blocklist. <!--Learn more about [signal sharing](TODO).-->
10
10
11
11
Our SDK does the heavy lifting of the CAPI connectivity so you can simply, sendSignals and getDecisions, as well as enroll your soft-agent into the console.
Copy file name to clipboardExpand all lines: crowdsec-docs/docs/intro.mdx
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,8 +49,8 @@ In addition to the core "detect and react" mechanism, CrowdSec is committed to s
49
49
50
50
Under the hood, the Security Engine has various components:
51
51
52
-
- The Log Processor is in charge of detection: it analyzes logs from [various data sources](/docs/data_sources/intro) or [HTTP requests](/appsec/intro.md) from web servers.
53
-
- The [Appsec](/appsec/intro.md) feature is part of the Log Processor and filters HTTP Requests from the compatible web servers.
52
+
- The Log Processor is in charge of detection: it analyzes logs from [various data sources](data_sources/intro) or [HTTP requests](appsec/intro) from web servers.
53
+
- The [Appsec](appsec/intro) feature is part of the Log Processor and filters HTTP Requests from the compatible web servers.
54
54
- The [Local API](/local_api/intro.md) acts as a middle man:
55
55
- Between the [Log Processors](/docs/data_sources/intro) and the [Remediation Components](/u/bouncers/intro) which are in charge of enforcing decisions.
56
56
- And with the [Central API](/central_api/intro.md) to share alerts and receive blocklists.
@@ -64,7 +64,7 @@ This architecture allows for both simple/standalone setups, or more distributed
64
64
- Already have a log pit (such as rsyslog or loki)? Run crowdsec next to it, not on the production workloads
65
65
- Running Kubernetes? Have a look at [our helm chart](/u/getting_started/installation/kubernetes)
66
66
- Running containers? The [docker data source](/docs/data_sources/docker) might be what you need
67
-
- Just looking for a WAF? Look at [our quickstart](/appsec/intro.md)
67
+
- Just looking for a WAF? Look at [our quickstart](appsec/intro)
0 commit comments