Skip to main content

Post Installation Steps

Your CrowdSec installation is running. Use the steps below to finish setup and tailor CrowdSec to your environment. Items marked recommended are the best starting points. Items marked optional add visibility or customization.

If you have not done it yet, run the 🩺 Health Check to confirm detection, connectivity, and remediation.
If you hit errors during install, start with the 🚨 troubleshooting guide.

1. CrowdSec Console ⭐

The CrowdSec Console is a web interface that helps you manage alerts, decisions, and settings across your deployments.

2. Whitelists ⭐

Whitelists are a way to tell CrowdSec to ignore certain events or IP addresses.

By default, CrowdSec whitelists private LAN IP addresses. You can add your own IPs or events to prevent false positives.

3. Acquisitions 🛠️

Acquisitions are sources of logs that CrowdSec can analyze.

By default, CrowdSec attempts to detect running services and install the right parsers and scenarios. If a service is missing or logs live in a custom path, you can add acquisitions and collections manually.

4. Profiles 🛠️

Profiles are a set of rules that drives what decisions will be taken by CrowdSec.

CrowdSec ships with a default profile that works for most setups. Create a custom profile if you need different ban durations, scopes, or behaviors.

5. Metrics 🛠️

Metrics are a way to monitor the behavior of CrowdSec.

CrowdSec exposes a Prometheus endpoint so you can monitor detections, parsing, and system health.