Introduction
Whitelists are special parsers that let you discard events. They can exist at different stages:
-
Parser whitelists: Discard an event at parse time, so it never reaches buckets.
- Linux:
/etc/crowdsec/parsers/s02-enrich/ - Freebsd:
/usr/local/etc/crowdsec/parsers/s02-enrich/ - Windows:
c:/programdata/crowdsec/config/parsers/s02-enrich/
- Linux:
-
LAPI AllowLists: Centralized at the LAPI level. They discard decisions and alerts while still generating log entries. They support IP/range (CIDR) rules. See LAPI AllowLists.
-
PostOverflow whitelists: Checked after overflow. Best for expensive checks (for example reverse DNS or
whoislookups on IPs).- Linux:
/etc/crowdsec/postoverflows/s01-whitelist/ - Freebsd:
/usr/local/etc/crowdsec/postoverflows/s01-whitelist/ - Windows:
c:/programdata/crowdsec/config/postoverflows/s01-whitelist/
- Linux:
Postoverflow whitelist folders do not exist by default, so you MUST create them manually.
Whitelists can be based on:
- Specific IP addresses: if the event/overflow IP matches, the event is whitelisted.
- IP ranges: if the event/overflow IP is in a range, the event is whitelisted.
- A list of expr expressions: if any expression returns true, the event is whitelisted.