Delete Kubernetes/Traefik-Crowdsec-PiHole/Helm/CrowdSec/values.yaml

This commit is contained in:
tehNooB 2023-10-20 12:13:16 +01:00 committed by GitHub
parent 012b8aefd6
commit e7326a6308
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23

View file

@ -1,127 +0,0 @@
container_runtime: containerd
# Here you can specify your own custom configuration to be loaded in crowdsec agent or lapi
# Each config needs to be a multi-line using '|' in YAML specs
# for the agent those configs will be loaded : parsers, scenarios, postoverflows, simulation.yaml
# for the lapi those configs will be loaded : profiles.yaml, notifications, console.yaml
config:
profiles.yaml: |
name: default_ip_remediation
#debug: true
filters:
- Alert.Remediation == true && Alert.GetScope() == "Ip"
decisions:
- type: ban
duration: 4h
#duration_expr: Sprintf('%dh', (GetDecisionsCount(Alert.GetValue()) + 1) * 4)
notifications:
# - slack_default # Set the webhook in /etc/crowdsec/notifications/slack.yaml before enabling this.
# - splunk_default # Set the splunk url and token in /etc/crowdsec/notifications/splunk.yaml before enabling this.
- http_default # Set the required http parameters in /etc/crowdsec/notifications/http.yaml before enabling this.
# - email_default # Set the required email parameters in /etc/crowdsec/notifications/email.yaml before enabling this.
notifications:
http.yaml: |
type: http # Don't change
name: http_default # Must match the registered plugin in the profile
# One of "trace", "debug", "info", "warn", "error", "off"
log_level: info
# group_wait: # Time to wait collecting alerts before relaying a message to this plugin, eg "30s"
# group_threshold: # Amount of alerts that triggers a message before <group_wait> has expired, eg "10"
# max_retry: # Number of attempts to relay messages to plugins in case of error
# timeout: # Time to wait for response from the plugin before considering the attempt a failure, eg "10s"
#-------------------------
# plugin-specific options
# The following template receives a list of models.Alert objects
# The output goes in the http request body
format: |
{{ range . -}}
{{ $alert := . -}}
{
"extras": {
"client::display": {
"contentType": "text/markdown"
}
},
"priority": 3,
{{range .Decisions -}}
"title": "{{.Type }} {{ .Value }} for {{.Duration}}",
"message": "{{.Scenario}} \n\n[crowdsec cti](https://app.crowdsec.net/cti/{{.Value -}}) \n\n[shodan](https://shodan.io/host/{{.Value -}})"
{{end -}}
}
{{ end -}}
# The plugin will make requests to this url, eg: https://www.example.com/
url: https://gotify.your-domain.co.uk/message # change this to your domain
# Any of the http verbs: "POST", "GET", "PUT"...
method: POST
headers:
X-Gotify-Key: SDFjsdfkjsdfsdjf # Add Gotify key here
Content-Type: application/json
skip_tls_verification: true
tls:
enabled: true
bouncer:
reflector:
namespaces: ["traefik"]
agent:
tolerations:
- key: node-role.kubernetes.io/control-plane
operator: Equal
effect: NoSchedule
# Specify each pod whose logs you want to process
acquisition:
# The namespace where the pod is located
- namespace: traefik
# The pod name
podName: traefik-*
# as in crowdsec configuration, we need to specify the program name to find a matching parser
program: traefik
env:
- name: PARSERS
value: "crowdsecurity/cri-logs crowdsecurity/whitelists"
- name: COLLECTIONS
value: "crowdsecurity/linux crowdsecurity/traefik crowdsecurity/home-assistant LePresidente/authelia Dominic-Wagner/vaultwarden crowdsecurity/unifi"
# When testing, allow bans on private networks
#- name: DISABLE_PARSERS
# value: "crowdsecurity/whitelists"
persistentVolume:
config:
enabled: false
nodeSelector:
worker: "true"
image:
pullPolicy: Always
lapi:
dashboard:
enabled: false
ingress:
host: dashboard.local
enabled: true
persistentVolume:
config:
enabled: true
resources:
limits:
memory: 200Mi
requests:
cpu: 250m
memory: 200Mi
env:
# For an internal test, disable the Online API
- name: DISABLE_ONLINE_API
value: "false"
- name: ENROLL_KEY
value: "ADD-YOUR-KEY-HERE"
- name: ENROLL_INSTANCE_NAME
value: "k3s_cluster"
- name: ENROLL_TAGS
value: "homelab"
nodeSelector:
worker: "true"
image:
pullPolicy: Always