Skip to content

Releases: crowdsecurity/helm-charts

crowdsec-0.15.0

26 Nov 15:36
4b5d134
Compare
Choose a tag to compare

Crowdsec helm chart is an open-source, lightweight agent to detect and respond to bad behaviours. ## Get Repo Info helm repo add crowdsec https://crowdsecurity.github.io/helm-charts helm repo update ## Installing the Chart Before installing the chart, you need to understand some concepts of Crowdsec. So you can configure well the chart and being able to parse logs and detect attacks inside your Kubernetes cluster. Here is a blog post about crowdsec in kubernetes. # Create namespace for crowdsec kubectl create ns crowdsec # Install helm chart with proper values.yaml config helm install crowdsec crowdsec/crowdsec -f crowdsec-values.yaml -n crowdsec ## Uninstalling the Chart helm delete crowdsec -n crowdsec ## Setup for High Availability Below a basic configuration for High availability # your-values.yaml # Configure external DB (https://docs.crowdsec.net/docs/configuration/crowdsec_configuration/#configuration-example) config: config.yaml.local: | db_config: type: postgresql user: crowdsec password: ${DB_PASSWORD} db_name: crowdsec host: 192.168.0.2 port: 5432 sslmode: require lapi: # 2 or more replicas for HA replicas: 2 # You can specify your own CS_LAPI_SECRET, or let the chart generate one. Length must be >= 64 secrets: csLapiSecret: <anyRandomSecret> # Specify your external DB password here extraSecrets: dbPassword: <externalDbPassword> persistentVolume: # When replicas for LAPI is greater than 1, two options, persistent volumes must be disabled, or in ReadWriteMany mode config: enabled: false # data volume is not required, since SQLite isn't used data: enabled: false # DB Password passed through environment variable env: - name: DB_PASSWORD valueFrom: secretKeyRef: name: crowdsec-lapi-secrets key: dbPassword

crowdsec-0.14.1

19 Nov 13:03
fd63689
Compare
Choose a tag to compare

Crowdsec helm chart is an open-source, lightweight agent to detect and respond to bad behaviours. ## Get Repo Info helm repo add crowdsec https://crowdsecurity.github.io/helm-charts helm repo update ## Installing the Chart Before installing the chart, you need to understand some concepts of Crowdsec. So you can configure well the chart and being able to parse logs and detect attacks inside your Kubernetes cluster. Here is a blog post about crowdsec in kubernetes. # Create namespace for crowdsec kubectl create ns crowdsec # Install helm chart with proper values.yaml config helm install crowdsec crowdsec/crowdsec -f crowdsec-values.yaml -n crowdsec ## Uninstalling the Chart helm delete crowdsec -n crowdsec ## Setup for High Availability Below a basic configuration for High availability # your-values.yaml # Configure external DB (https://docs.crowdsec.net/docs/configuration/crowdsec_configuration/#configuration-example) config: config.yaml.local: | db_config: type: postgresql user: crowdsec password: ${DB_PASSWORD} db_name: crowdsec host: 192.168.0.2 port: 5432 sslmode: require lapi: # 2 or more replicas for HA replicas: 2 # You can specify your own CS_LAPI_SECRET, or let the chart generate one. Length must be >= 64 secrets: csLapiSecret: <anyRandomSecret> # Specify your external DB password here extraSecrets: dbPassword: <externalDbPassword> persistentVolume: # When replicas for LAPI is greater than 1, two options, persistent volumes must be disabled, or in ReadWriteMany mode config: enabled: false # data volume is not required, since SQLite isn't used data: enabled: false # DB Password passed through environment variable env: - name: DB_PASSWORD valueFrom: secretKeyRef: name: crowdsec-lapi-secrets key: dbPassword

crowdsec-0.14.0

18 Nov 16:39
9f49f64
Compare
Choose a tag to compare

Crowdsec helm chart is an open-source, lightweight agent to detect and respond to bad behaviours. ## Get Repo Info helm repo add crowdsec https://crowdsecurity.github.io/helm-charts helm repo update ## Installing the Chart Before installing the chart, you need to understand some concepts of Crowdsec. So you can configure well the chart and being able to parse logs and detect attacks inside your Kubernetes cluster. Here is a blog post about crowdsec in kubernetes. # Create namespace for crowdsec kubectl create ns crowdsec # Install helm chart with proper values.yaml config helm install crowdsec crowdsec/crowdsec -f crowdsec-values.yaml -n crowdsec ## Uninstalling the Chart helm delete crowdsec -n crowdsec ## Setup for High Availability Below a basic configuration for High availability # your-values.yaml # Configure external DB (https://docs.crowdsec.net/docs/configuration/crowdsec_configuration/#configuration-example) config: config.yaml.local: | db_config: type: postgresql user: crowdsec password: ${DB_PASSWORD} db_name: crowdsec host: 192.168.0.2 port: 5432 sslmode: require lapi: # 2 or more replicas for HA replicas: 2 # You can specify your own CS_LAPI_SECRET, or let the chart generate one. Length must be >= 64 secrets: csLapiSecret: <anyRandomSecret> # Specify your external DB password here extraSecrets: dbPassword: <externalDbPassword> persistentVolume: # When replicas for LAPI is greater than 1, two options, persistent volumes must be disabled, or in ReadWriteMany mode config: enabled: false # data volume is not required, since SQLite isn't used data: enabled: false # DB Password passed through environment variable env: - name: DB_PASSWORD valueFrom: secretKeyRef: name: crowdsec-lapi-secrets key: dbPassword

crowdsec-0.13.0

23 Sep 12:58
675c6c7
Compare
Choose a tag to compare

Crowdsec helm chart is an open-source, lightweight agent to detect and respond to bad behaviours. ## Get Repo Info helm repo add crowdsec https://crowdsecurity.github.io/helm-charts helm repo update ## Installing the Chart Before installing the chart, you need to understand some concepts of Crowdsec. So you can configure well the chart and being able to parse logs and detect attacks inside your Kubernetes cluster. Here is a blog post about crowdsec in kubernetes. # Create namespace for crowdsec kubectl create ns crowdsec # Install helm chart with proper values.yaml config helm install crowdsec crowdsec/crowdsec -f crowdsec-values.yaml -n crowdsec ## Uninstalling the Chart helm delete crowdsec -n crowdsec ## Setup for High Availability Below a basic configuration for High availability # your-values.yaml # Configure external DB (https://docs.crowdsec.net/docs/configuration/crowdsec_configuration/#configuration-example) config: config.yaml.local: | db_config: type: postgresql user: crowdsec password: ${DB_PASSWORD} db_name: crowdsec host: 192.168.0.2 port: 5432 sslmode: require lapi: # 2 or more replicas for HA replicas: 2 # You can specify your own CS_LAPI_SECRET, or let the chart generate one. Length must be >= 64 secrets: csLapiSecret: <anyRandomSecret> # Specify your external DB password here extraSecrets: dbPassword: <externalDbPassword> persistentVolume: # When replicas for LAPI is greater than 1, two options, persistent volumes must be disabled, or in ReadWriteMany mode config: enabled: false # data volume is not required, since SQLite isn't used data: enabled: false # DB Password passed through environment variable env: - name: DB_PASSWORD valueFrom: secretKeyRef: name: crowdsec-lapi-secrets key: dbPassword

crowdsec-0.12.0

03 Sep 10:06
0d7573b
Compare
Choose a tag to compare

Crowdsec helm chart is an open-source, lightweight agent to detect and respond to bad behaviours. ## Get Repo Info helm repo add crowdsec https://crowdsecurity.github.io/helm-charts helm repo update ## Installing the Chart Before installing the chart, you need to understand some concepts of Crowdsec. So you can configure well the chart and being able to parse logs and detect attacks inside your Kubernetes cluster. Here is a blog post about crowdsec in kubernetes. # Create namespace for crowdsec kubectl create ns crowdsec # Install helm chart with proper values.yaml config helm install crowdsec crowdsec/crowdsec -f crowdsec-values.yaml -n crowdsec ## Uninstalling the Chart helm delete crowdsec -n crowdsec ## Setup for High Availability Below a basic configuration for High availability # your-values.yaml # Configure external DB (https://docs.crowdsec.net/docs/configuration/crowdsec_configuration/#configuration-example) config: config.yaml.local: | db_config: type: postgresql user: crowdsec password: ${DB_PASSWORD} db_name: crowdsec host: 192.168.0.2 port: 5432 sslmode: require lapi: # 2 or more replicas for HA replicas: 2 # You can specify your own CS_LAPI_SECRET, or let the chart generate one. Length must be >= 64 secrets: csLapiSecret: <anyRandomSecret> # Specify your external DB password here extraSecrets: dbPassword: <externalDbPassword> persistentVolume: # When replicas for LAPI is greater than 1, two options, persistent volumes must be disabled, or in ReadWriteMany mode config: enabled: false # data volume is not required, since SQLite isn't used data: enabled: false # DB Password passed through environment variable env: - name: DB_PASSWORD valueFrom: secretKeyRef: name: crowdsec-lapi-secrets key: dbPassword

crowdsec-traefik-bouncer-0.1.4

27 Aug 07:56
30eb837
Compare
Choose a tag to compare

A http service to verify request and bounce them according to decisions made by CrowdSec.

crowdsec-0.11.1

27 Aug 09:46
a7015ca
Compare
Choose a tag to compare

Crowdsec helm chart is an open-source, lightweight agent to detect and respond to bad behaviours. ## Get Repo Info helm repo add crowdsec https://crowdsecurity.github.io/helm-charts helm repo update ## Installing the Chart Before installing the chart, you need to understand some concepts of Crowdsec. So you can configure well the chart and being able to parse logs and detect attacks inside your Kubernetes cluster. Here is a blog post about crowdsec in kubernetes. # Create namespace for crowdsec kubectl create ns crowdsec # Install helm chart with proper values.yaml config helm install crowdsec crowdsec/crowdsec -f crowdsec-values.yaml -n crowdsec ## Uninstalling the Chart helm delete crowdsec -n crowdsec ## Setup for High Availability Below a basic configuration for High availability # your-values.yaml # Configure external DB (https://docs.crowdsec.net/docs/configuration/crowdsec_configuration/#configuration-example) config: config.yaml.local: | db_config: type: postgresql user: crowdsec password: ${DB_PASSWORD} db_name: crowdsec host: 192.168.0.2 port: 5432 sslmode: require lapi: # 2 or more replicas for HA replicas: 2 # You can specify your own CS_LAPI_SECRET, or let the chart generate one. Length must be >= 64 secrets: csLapiSecret: <anyRandomSecret> # Specify your external DB password here extraSecrets: dbPassword: <externalDbPassword> persistentVolume: # When replicas for LAPI is greater than 1, two options, persistent volumes must be disabled, or in ReadWriteMany mode config: enabled: false # data volume is not required, since SQLite isn't used data: enabled: false # DB Password passed through environment variable env: - name: DB_PASSWORD valueFrom: secretKeyRef: name: crowdsec-lapi-secrets key: dbPassword

crowdsec-0.11.0

28 Jun 07:17
e690dda
Compare
Choose a tag to compare

Crowdsec helm chart is an open-source, lightweight agent to detect and respond to bad behaviours. ## Get Repo Info helm repo add crowdsec https://crowdsecurity.github.io/helm-charts helm repo update ## Installing the Chart Before installing the chart, you need to understand some concepts of Crowdsec. So you can configure well the chart and being able to parse logs and detect attacks inside your Kubernetes cluster. Here is a blog post about crowdsec in kubernetes. # Create namespace for crowdsec kubectl create ns crowdsec # Install helm chart with proper values.yaml config helm install crowdsec crowdsec/crowdsec -f crowdsec-values.yaml -n crowdsec ## Uninstalling the Chart helm delete crowdsec -n crowdsec ## Setup for High Availability Below a basic configuration for High availability # your-values.yaml # Configure external DB (https://docs.crowdsec.net/docs/configuration/crowdsec_configuration/#configuration-example) config: config.yaml.local: | db_config: type: postgresql user: crowdsec password: ${DB_PASSWORD} db_name: crowdsec host: 192.168.0.2 port: 5432 sslmode: require lapi: # 2 or more replicas for HA replicas: 2 # You can specify your own CS_LAPI_SECRET, or let the chart generate one. Length must be >= 64 secrets: csLapiSecret: <anyRandomSecret> # Specify your external DB password here extraSecrets: dbPassword: <externalDbPassword> persistentVolume: # When replicas for LAPI is greater than 1, two options, persistent volumes must be disabled, or in ReadWriteMany mode config: enabled: false # data volume is not required, since SQLite isn't used data: enabled: false # DB Password passed through environment variable env: - name: DB_PASSWORD valueFrom: secretKeyRef: name: crowdsec-lapi-secrets key: dbPassword

crowdsec-0.10.0

22 Apr 14:27
238943c
Compare
Choose a tag to compare

Crowdsec helm chart is an open-source, lightweight agent to detect and respond to bad behaviours. ## Get Repo Info helm repo add crowdsec https://crowdsecurity.github.io/helm-charts helm repo update ## Installing the Chart Before installing the chart, you need to understand some concepts of Crowdsec. So you can configure well the chart and being able to parse logs and detect attacks inside your Kubernetes cluster. Here is a blog post about crowdsec in kubernetes. # Create namespace for crowdsec kubectl create ns crowdsec # Install helm chart with proper values.yaml config helm install crowdsec crowdsec/crowdsec -f crowdsec-values.yaml -n crowdsec ## Uninstalling the Chart helm delete crowdsec -n crowdsec ## Setup for High Availability Below a basic configuration for High availability # your-values.yaml # Configure external DB (https://docs.crowdsec.net/docs/configuration/crowdsec_configuration/#configuration-example) config: config.yaml.local: | db_config: type: postgresql user: crowdsec password: ${DB_PASSWORD} db_name: crowdsec host: 192.168.0.2 port: 5432 sslmode: require lapi: # 2 or more replicas for HA replicas: 2 # You can specify your own CS_LAPI_SECRET, or let the chart generate one. Length must be >= 64 secrets: csLapiSecret: <anyRandomSecret> # Specify your external DB password here extraSecrets: dbPassword: <externalDbPassword> persistentVolume: # When replicas for LAPI is greater than 1, two options, persistent volumes must be disabled, or in ReadWriteMany mode config: enabled: false # data volume is not required, since SQLite isn't used data: enabled: false # DB Password passed through environment variable env: - name: DB_PASSWORD valueFrom: secretKeyRef: name: crowdsec-lapi-secrets key: dbPassword

crowdsec-traefik-bouncer-0.1.3

15 Feb 08:33
5478451
Compare
Choose a tag to compare

A http service to verify request and bounce them according to decisions made by CrowdSec.