False positive for scenario
detect flooding
Unable to parse NGINX logs
cscli metrics show acquisition
Here is the example of a line going through the parser:
```
line: 79.174.34.55 - - [04/Nov/2025:02:53:02 +0100] "GET /xleet-shell.php HTTP/1.1" 404 207 "-" "Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0"
β s00-raw...Migrating Security Engine Reputation
community-blocklist update
CrowdSec Windows Firewall Bouncer Isn't Making Decisions
Whitelist
RE2 feature flags don't work on Windows - CrowdSec crashes
friewall bouncer : crowdsec-chain-input empty
Logs from SQLite
CrowdSec 1.7.3 parser: evt.StrTime not being set when using microsecond timestamps
Setting http nonfictions for gotify crashes Crowdsec on Windows Machine
Include instance name in slack notification
Getting hostname in notification in a distributed setup
env "HOST" for freebsd, env "HOST_HOSTNAME" for docker, and {{ Hostname }} for Windows. (All of those variables are already built in and do not have to be added)
In a distributed setup, is the only way to get the actual host being attacked name using a lookup table based on the Machine property in the alert?
Below is a snippit of my discord.yaml:...Issue crowdsec agent upgrade
pfSense, rule not being re-added after unchecking/checking 'Enable CrowdSec IPv4 blocklist'
Testing Cloudflare Worker Bouncer on free plan
Email template ModSec ruleid/message
My own serverβs IP got banned
ModSecurity parser not parsing response rules (Phase 4)
``
WARNING Line 0/1 is missing evt.StrTime. It is most likely a mistake as it will prevent your logs to be processed in time-machine/forensic mode. file=/tmp/user/0/cscli_explain4047805967/parser-dump.yaml
line: 2025/10/27 19:47:46 [error] 273240#273240: *657 [client 1.1.1.1] ModSecurity: Access denied with code 403 (phase 4). Matched "Operator Contains' with parameter evil.webshell' against variable RESPONSE_BODY' (Value: `<title> evil.webshell </title>\x0a<h1> evil.webshell </h1>\x0a' ) [file "/etc/modsecurity/test.conf"] [line "190"] [id "955003"] [rev ""] [msg ""] [data ""] [severity "0"] [ver ""] [maturity "0"] [accuracy "0"] [hostname "example.com"] [uri "/evil-webshell.txt"] [unique_id "176155486667.073983"] [ref "o8,13v619,56"] while sending to client, client: 1.1.1.1, server: example.com, request: "GET /evil-webshell.txt HTTP/2.0", upstream: "https://2.2.2.2:443/evil-webshell.txt", host: "example.com"
β s00-raw...