I want to create a postoverflow whitelist, so my dynamic IP address from my ISP won't get blocked, when I access and test configurations on my cloud machines.
──────────────────────────────────────────────────────────────────────────────────────────── POSTOVERFLOWS ──────────────────────────────────────────────────────────────────────────────────────────── Name 📦 Status Version Local Path ──────────────────────────────────────────────────────────────────────────────────────────── crowdsecurity/rdns ✔️ enabled 0.3 /etc/crowdsec/postoverflows/s00-enrich/rdns.yaml
──────────────────────────────────────────────────────────────────────────────────────────── POSTOVERFLOWS ──────────────────────────────────────────────────────────────────────────────────────────── Name 📦 Status Version Local Path ──────────────────────────────────────────────────────────────────────────────────────────── crowdsecurity/rdns ✔️ enabled 0.3 /etc/crowdsec/postoverflows/s00-enrich/rdns.yaml
When a whitelist is present in parsing /etc/crowdsec/parsers/..., it will be checked/discarded before being poured to any bucket. These whitelists intentionally generate no logs and are useful to discard noisy false positive sources.