Ports inventory
tcp/8080
exposes a REST API for bouncers,cscli
and communication between crowdsec agent and local apitcp/6060
(endpoint/metrics
) exposes prometheus metricstcp/6060
(endpoint/debug
) exposes pprof debugging metrics
Outgoing connections
- Local API connects to
tcp/443
onapi.crowdsec.net
(signal push and blocklists pull) - Local API connects to
tcp/443
onblocklists.api.crowdsec.net
(blocklists pull) cscli
connects totcp/443
onhub-cdn.crowdsec.net
to fetch scenarios, parsers etc. (1)cscli
connects totcp/443
onversion.crowdsec.net
to check latest version available. (1)cscli dashboard
fetches metabase configuration from a s3 bucket (https://crowdsec-statics-assets.s3-eu-west-1.amazonaws.com/
)
(1) - both FQDN are cloudfront entries to crowdsec's github repositories so people avoid hitting github's quotas
Communication between components
Bouncers -> Local API
- Bouncers are using Local API on
tcp/8080
by default
Agents -> Local API
- Agents connect to local API on port
tcp/8080
(only relevant )
warning
If there is an error in the agent configuration, it will also cause the Local API to fail if both of them are running in the same machine ! Both components need proper configuration to run (we decide to keep this behavior to detect agent or local API errors on start).
Local API -> Central API
- Central API is reached on port
tcp/443
by Local API. The FQDN isapi.crowdsec.net
Local API -> Database
- When using a networked database (PostgreSQL or MySQL), only the local API needs to access the database, agents don't have to be able to communicate with it.
Prometheus -> Agents
- If you're scrapping prometheus metrics from your agents or your local API, you need to allow inbound connections to
tcp/6060