Skip to content

Jdv interactive se install v0 #787

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Draft
wants to merge 25 commits into
base: main
Choose a base branch
from
Draft

Conversation

rr404
Copy link
Contributor

@rr404 rr404 commented Jun 3, 2025

Product Brief specs : https://app.clickup.com/2421256/v/dc/29wg8-28015/29wg8-40555

Health check step part of install guide:
https://pr-787.d1to60jd2gb6y6.amplifyapp.com/u/getting_started/health_check/

interractive guide test (will not be in final version of PR)
https://pr-787.d1to60jd2gb6y6.amplifyapp.com/u/user_guides/interactive_se_install/se_install_01/

First rought draft 75% complete
[ ] Need to clean up instructions (mainly explanations and linking to existing doc for now)
[ ] Need additional trouble shooting from reviewers
[ ] Need to choose basic markdown for first ugly but acceptable form of the pages
[ ] add progress bar in header (hard coded)
[ ] (optional) add real checkboxes triggering NEXT STEP green light
[ ] Make guick guides more uniform (remove remediation install or add high level hint for all and leave the command line for linux
[ ] flatten post install steps + add labels to steps (recommended/optionnal)
[ ] remove troubleshooting ? or make it regroup all trouble shootings ?

Copy link

This pull request is automatically being deployed by Amplify Hosting (learn more).

Access this pull request here: https://pr-787.d1to60jd2gb6y6.amplifyapp.com

@rr404 rr404 requested review from blotus, buixor and LaurenceJJones June 5, 2025 16:29
@rr404 rr404 marked this pull request as draft June 5, 2025 16:29
@rr404 rr404 force-pushed the jdv-interactive-se-install-v0 branch from ba7d90f to afb6496 Compare June 10, 2025 13:14
@rr404 rr404 force-pushed the jdv-interactive-se-install-v0 branch from afddcac to 88d3a4d Compare June 10, 2025 15:23
### Test HTTP detection

For this test, you'll add the following path to a URL of a website you're protecting: `/CRODWSEC/TEST`
_*// Any issue possible with .htaccess that would rewrite before this path reaches the log? – **Yes, this is a valid concern. Add a note: "Important: Ensure your web server configuration (e.g., .htaccess) does not rewrite or block this specific URL path `/CRODWSEC/TEST`."***_
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

  • show the user how to do it with curl
  • mention that if the test is done from a private IP you won't see it appear

### Test SSH detection

Try to authenticate to your server via SSH using the following user: `ABCDEFGH123456`.
Looking at your alerts for the specific scenario **crowdsec/test-ssh**, you should see a line related to your test.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

  • show the user the command to run

### Test AppSec detection

If you are using an AppSec-capable bouncer and have configured CrowdSec WAF, you can test it by [insert specific instructions based on typical AppSec setup; see notes below].
_[**Important Notes for AppSec Test:** The specific test and instructions here are heavily dependent on the WAF/bouncer being used (nginx-bouncer, cloudflare-bouncer, etc.) and the specific AppSec rules enabled. You need a generic but useful example. Suggestions:*
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

  • show the curl command


## Remediation checks

* Canary tester
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

suggest the user to ban himself for a minute ?

## 🚨 Detection Troubleshooting
*No alerts triggered? Let's investigate: Here are some tests to identify where the issue might be.*

<details>
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I would suggest first doing cscli metrics show acquisition and add a screenshot showcasing expected behavior and faulty behavior. The cscli metrics show parsers would come later as a further investigation if needed.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants