Crowdsec log flooded

NethServer Version: 8
Module: Crowdsec

Hi,

I know i’ve a lot of question, but i’m still struggling with NS packages

I see every 10 seconds this in the crowdsec log

2024-10-14T16:25:03+02:00 [1:crowdsec2:crowdsec2] time="2024-10-14T14:25:03Z" level=info msg="127.0.0.1 - [Mon, 14 Oct 2024 14:25:03 UTC] \"GET /v1/decisions/stream HTTP/1.1 200 88.970784ms \"crowdsec-firewall-bouncer/v0.0.28-debian-pragmatic-af6e7e25822c2b1a02168b99ebbf8458bc6728e5\" \""
2024-10-14T16:25:13+02:00 [1:crowdsec2:crowdsec2] time="2024-10-14T14:25:13Z" level=info msg="127.0.0.1 - [Mon, 14 Oct 2024 14:25:13 UTC] \"GET /v1/decisions/stream HTTP/1.1 200 82.66505ms \"crowdsec-firewall-bouncer/v0.0.28-debian-pragmatic-af6e7e25822c2b1a02168b99ebbf8458bc6728e5\" \""
2024-10-14T16:25:23+02:00 [1:crowdsec2:crowdsec2] time="2024-10-14T14:25:23Z" level=info msg="127.0.0.1 - [Mon, 14 Oct 2024 14:25:23 UTC] \"GET /v1/decisions/stream HTTP/1.1 200 83.527731ms \"crowdsec-firewall-bouncer/v0.0.28-debian-pragmatic-af6e7e25822c2b1a02168b99ebbf8458bc6728e5\" \""
2024-10-14T16:25:33+02:00 [1:crowdsec2:crowdsec2] time="2024-10-14T14:25:33Z" level=info msg="127.0.0.1 - [Mon, 14 Oct 2024 14:25:33 UTC] \"GET /v1/decisions/stream HTTP/1.1 200 87.866835ms \"crowdsec-firewall-bouncer/v0.0.28-debian-pragmatic-af6e7e25822c2b1a02168b99ebbf8458bc6728e5\" \""
2024-10-14T16:25:33+02:00 [1:crowdsec2:crowdsec2] time="2024-10-14T14:25:33Z" level=info msg="127.0.0.1 - [Mon, 14 Oct 2024 14:25:33 UTC] \"GET /v1/heartbeat HTTP/1.1 200 405.837µs \"crowdsec/v1.6.3-4851945a-docker\" \""
2024-10-14T16:25:43+02:00 [1:crowdsec2:crowdsec2] time="2024-10-14T14:25:43Z" level=info msg="127.0.0.1 - [Mon, 14 Oct 2024 14:25:43 UTC] \"GET /v1/decisions/stream HTTP/1.1 200 96.75658ms \"crowdsec-firewall-bouncer/v0.0.28-debian-pragmatic-af6e7e25822c2b1a02168b99ebbf8458bc6728e5\" \""
2024-10-14T16:25:53+02:00 [1:crowdsec2:crowdsec2] time="2024-10-14T14:25:53Z" level=info msg="127.0.0.1 - [Mon, 14 Oct 2024 14:25:53 UTC] \"GET /v1/decisions/stream HTTP/1.1 200 85.63575ms \"crowdsec-firewall-bouncer/v0.0.28-debian-pragmatic-af6e7e25822c2b1a02168b99ebbf8458bc6728e5\" \""
2024-10-14T16:26:03+02:00 [1:crowdsec2:crowdsec2] time="2024-10-14T14:26:03Z" level=info msg="127.0.0.1 - [Mon, 14 Oct 2024 14:26:03 UTC] \"GET /v1/decisions/stream HTTP/1.1 200 98.351291ms \"crowdsec-firewall-bouncer/v0.0.28-debian-pragmatic-af6e7e25822c2b1a02168b99ebbf8458bc6728e5\" \""
2024-10-14T16:26:13+02:00 [1:crowdsec2:crowdsec2] time="2024-10-14T14:26:13Z" level=info msg="127.0.0.1 - [Mon, 14 Oct 2024 14:26:13 UTC] \"GET /v1/decisions/stream HTTP/1.1 200 84.184317ms \"crowdsec-firewall-bouncer/v0.0.28-debian-pragmatic-af6e7e25822c2b1a02168b99ebbf8458bc6728e5\" \""
2024-10-14T16:26:23+02:00 [1:crowdsec2:crowdsec2] time="2024-10-14T14:26:23Z" level=info msg="127.0.0.1 - [Mon, 14 Oct 2024 14:26:23 UTC] \"GET /v1/decisions/stream HTTP/1.1 200 86.079231ms \"crowdsec-firewall-bouncer/v0.0.28-debian-pragmatic-af6e7e25822c2b1a02168b99ebbf8458bc6728e5\" \""
2024-10-14T16:26:33+02:00 [1:crowdsec2:crowdsec2] time="2024-10-14T14:26:33Z" level=info msg="127.0.0.1 - [Mon, 14 Oct 2024 14:26:33 UTC] \"GET /v1/decisions/stream HTTP/1.1 200 88.519125ms \"crowdsec-firewall-bouncer/v0.0.28-debian-pragmatic-af6e7e25822c2b1a02168b99ebbf8458bc6728e5\" \""
2024-10-14T16:26:33+02:00 [1:crowdsec2:crowdsec2] time="2024-10-14T14:26:33Z" level=info msg="127.0.0.1 - [Mon, 14 Oct 2024 14:26:33 UTC] \"GET /v1/heartbeat HTTP/1.1 200 469.344µs \"crowdsec/v1.6.3-4851945a-docker\" \""
2024-10-14T16:26:43+02:00 [1:crowdsec2:crowdsec2] time="2024-10-14T14:26:43Z" level=info msg="127.0.0.1 - [Mon, 14 Oct 2024 14:26:43 UTC] \"GET /v1/decisions/stream HTTP/1.1 200 92.719564ms \"crowdsec-firewall-bouncer/v0.0.28-debian-pragmatic-af6e7e25822c2b1a02168b99ebbf8458bc6728e5\" \""
2024-10-14T16:26:53+02:00 [1:crowdsec2:crowdsec2] time="2024-10-14T14:26:53Z" level=info msg="127.0.0.1 - [Mon, 14 Oct 2024 14:26:53 UTC] \"GET /v1/decisions/stream HTTP/1.1 200 96.696593ms \"crowdsec-firewall-bouncer/v0.0.28-debian-pragmatic-af6e7e25822c2b1a02168b99ebbf8458bc6728e5\" \""
2024-10-14T16:27:03+02:00 [1:crowdsec2:crowdsec2] time="2024-10-14T14:27:03Z" level=info msg="127.0.0.1 - [Mon, 14 Oct 2024 14:27:03 UTC] \"GET /v1/decisions/stream HTTP/1.1 200 82.82194ms \"crowdsec-firewall-bouncer/v0.0.28-debian-pragmatic-af6e7e25822c2b1a02168b99ebbf8458bc6728e5\" \""
2024-10-14T16:27:13+02:00 [1:crowdsec2:crowdsec2] time="2024-10-14T14:27:13Z" level=info msg="127.0.0.1 - [Mon, 14 Oct 2024 14:27:13 UTC] \"GET /v1/decisions/stream HTTP/1.1 200 92.125656ms \"crowdsec-firewall-bouncer/v0.0.28-debian-pragmatic-af6e7e25822c2b1a02168b99ebbf8458bc6728e5\" \""
2024-10-14T16:27:23+02:00 [1:crowdsec2:crowdsec2] time="2024-10-14T14:27:23Z" level=info msg="127.0.0.1 - [Mon, 14 Oct 2024 14:27:23 UTC] \"GET /v1/decisions/stream HTTP/1.1 200 87.199172ms \"crowdsec-firewall-bouncer/v0.0.28-debian-pragmatic-af6e7e25822c2b1a02168b99ebbf8458bc6728e5\" \""
2024-10-14T16:27:25

Is this normal ?

When I google this i see more post, but no solution.

for example

1 Like

I can confirm and it is a lot of noise, unless it is required to evaluate the log to block IP’s?

1 Like

Oct 15 10:19:28 R2-pve.rocky9-pve2.org crowdsec1[101347]: time=“2024-10-15T08:19:28Z” level=info msg=“127.0.0.1 - [Tue, 15 Oct 2024 08:19:28 UTC] "GET /v1/decisions/stream HTTP/1.1 200 4.951014ms "crowdsec-firewall-bouncer/v0.0.28-debian-pragmatic-af6e7e25822c2b1a02168b99ebbf8458bc6728e5" "”

this is a normal communication between the crowdsec local intelligence and the its bouncer (the container which interacts with the firewall)

see all current ban, even done by the central intelligence (add --all)

[root@R2-pve ~]# runagent -m crowdsec1 podman exec -ti crowdsec1 cscli decisions list --all

see all ban done, even not active

[root@R2-pve ~]# runagent -m crowdsec1 podman exec -ti crowdsec1 cscli alerts list --all

journalctl --grep ‘localhost/crowdsec’
journalctl --grep ‘decision added’

it seems we can quiet the log

2 Likes

hello mates

could please test the version of crowdsec

4 Likes

Hi,
Thank you for the quick fix.
I’ve upgraded and the flooding is gone.

I\ll keep an eye on it for the next days

1 Like

You need also to demonstrate that the log lines of a ban are still there

What is the correct command for installing the dev version please (Github does not tell) ? Is there a risk on a prod server?

TIA

Hi @stephdl

I can confirm that.

2024-10-15T20:26:41+02:00 [1:crowdsec1:crowdsec1] time=“2024-10-15T18:26:41Z” level=info msg=“(localhost/crowdsec) LePresidente/http-generic-403-bf by ip xxx.xxx.101.119 (DE/3320) : 4m ban on Ip xxx.xxx.101.119”

Regards…

Uwe

1 Like

@LayLow

You can update the app directly from the app instance with a mouseclick on the top of the right side There where the 3 points are… There you get a offer to update the app vie test repo.

Regards…

Uwe

Uwe

1 Like

Ah! Another hidden feature to me!

Thanks @transocean

@davidep has already described this here.

1 Like

I don’t why, but i don’t have much bans.
After 1 week I had 2 bans.Still strange to my opinion becuase with fail2ban i had a few per day
Maybe Crowdsec operated differently and perhaps I am worrying about nothing

@MadPatrick

May be there is a firewall in front of your server with active geo ip blocker?

Regards…

Uwe

I’ve Nethsecurity installed in front of NS8
But this was the same as with ClearOS and NS7 with Fail2ban.
No change on the firewall

Yep, I remembered after my post, too many changes lately :wink: Thx

I can confirm.

After install the dev version log silent, info level

2024-10-15T21:47:38+02:00 [1:crowdsec1:crowdsec1-firewall-bouncer] time="2024-10-15T19:47:38Z" level=info msg="Processing new and deleted decisions . . ."
2024-10-15T21:47:39+02:00 [1:crowdsec1:crowdsec1-firewall-bouncer] time="2024-10-15T19:47:39Z" level=info msg="198 decisions deleted"
2024-10-15T21:47:40+02:00 [1:crowdsec1:crowdsec1-firewall-bouncer] time="2024-10-15T19:47:40Z" level=info msg="50941 decisions added"

and

Banned due to multiple ssh false login attempts:

2024-10-15T21:53:47+02:00 [1:crowdsec1:crowdsec1] time="2024-10-15T19:53:47Z" level=info msg="Ip 193.187.xxx.234 performed 'crowdsecurity/ssh-bf' (7 events over 14.49895905s) at 2024-10-15 19:53:47.447410715 +0000 UTC"
2024-10-15T21:53:48+02:00 [1:crowdsec1:crowdsec1] time="2024-10-15T19:53:48Z" level=info msg="(localhost/crowdsec) crowdsecurity/ssh-bf by ip 193.187.xxx.234 (XX/13xx87) : 4m ban on Ip 193.187.xxx.234"
2024-10-15T21:53:48+02:00 [1:crowdsec1:crowdsec1] time="2024-10-15T19:53:48Z" level=info msg="Signal push: 1 signals to push"
2024-10-15T21:53:50+02:00 [1:crowdsec1:crowdsec1-firewall-bouncer] time="2024-10-15T19:53:50Z" level=info msg="1 decision added"

Thanks.

In logs I trust.

Show me the iterations of bots trying to login. Then we will be sure we have something to fix

Watch your logs !