crowdsecurity/cloudflare-bouncerA bouncer that syncs the decisions made by CrowdSec with CloudFlare's firewall. Manages multi user, multi account, multi zone setup. Supports IP, Country and AS scoped decisions.
bashdocker run crowdsecurity/cloudflare-bouncer \ -g <CLOUDFLARE_TOKEN1> <CLOUDFLARE_TOKEN2> > cfg.yaml # auto-generate cloudflare config for provided space separated tokens vi cfg.yaml # review config and set `crowdsec_lapi_key`
The crowdsec_lapi_key can be obtained by running the following:
bashsudo cscli -oraw bouncers add cloudflarebouncer # -oraw flag can discarded for human friendly output.
The crowdsec_lapi_url must be accessible from the container.
bashdocker run \ -v $PWD/cfg.yaml:/etc/crowdsec/bouncers/crowdsec-cloudflare-bouncer.yaml \ -p 2112:2112 \ crowdsecurity/cloudflare-bouncer
Configuration file must be at /etc/crowdsec/bouncers/crowdsec-cloudflare-bouncer.yaml
yaml# CrowdSec Config crowdsec_lapi_url: http://localhost:8080/ crowdsec_lapi_key: ${API_KEY} crowdsec_update_frequency: 10s #Cloudflare Config. cloudflare_config: accounts: - id: token: ip_list_prefix: crowdsec default_action: challenge zones: - actions: - challenge # valid choices are either of challenge, js_challenge, block zone_id: update_frequency: 30s # the frequency to update the cloudflare IP list # Bouncer Config daemon: false log_mode: file log_dir: /var/log/ log_level: info # valid choices are either debug, info, error prometheus: enabled: true listen_addr: 127.0.0.1 listen_port: 2112
Background: In Cloudflare, each user can have access to multiple accounts. Each account can own/access multiple zones. In this context a zone can be ***ed as a domain. Each domain registered with cloudflare gets a distinct zone_id.
For obtaining the token:
To automatically generate config for cloudflare check the helper section below.
:::note If the zone is subscribed to a paid Cloudflare plan then it can be configured to support multiple types of actions. For free plan zones only one action is supported. The first action is applied as default action. :::
The bouncer's binary has built in helper scripts to do various operations.
Generates bouncer config by discovering all the accounts and the zones associated with provided list of tokens.
Example Usage:
bashdocker run crowdsecurity/cloudflare-bouncer -g <TOKEN_1>,<TOKEN_2>... > cfg.yaml
After reviewing the config you can bind mount it to the container at path /etc/crowdsec/bouncers/crowdsec-cloudflare-bouncer.yaml as shown in the setup gude.
:::note
This script only generates cloudflare related config. By default it refers to the config at /etc/crowdsec/bouncers/crowdsec-cloudflare-bouncer.yaml for crowdsec configuration.
:::
Using custom config:
bashdocker run crowdsecurity/cloudflare-bouncer -c /cfg.yaml -g <TOKEN_1>,<TOKEN_2>... -v $PWD/cfg.yaml:/cfg.yaml
Make sure that the custom config is mounted in the container.
This only creates the required IP lists and firewall rules at cloudflare and exits.
Example Usage:
bashdocker run \ -v $PWD/cfg.yaml:/etc/crowdsec/bouncers/crowdsec-cloudflare-bouncer.yaml \ -p 2112:2112 \ crowdsecurity/cloudflare-bouncer -s
This deletes all IP lists and firewall rules at cloudflare which were created by the bouncer.
Example Usage:
bashdocker run \ -v $PWD/cfg.yaml:/etc/crowdsec/bouncers/crowdsec-cloudflare-bouncer.yaml \ -p 2112:2112 \ crowdsecurity/cloudflare-bouncer -s
The service polls the CrowdSec Local API for new decisions. It then makes API calls to Cloudflare to update IP lists and firewall rules depending upon the decision.

探索更多轩辕镜像的使用方法,找到最适合您系统的配置方式
通过 Docker 登录认证访问私有仓库
在 Linux 系统配置镜像服务
在 Docker Desktop 配置镜像
Docker Compose 项目配置
Kubernetes 集群配置 Containerd
K3s 轻量级 Kubernetes 镜像加速
VS Code Dev Containers 配置
MacOS OrbStack 容器配置
在宝塔面板一键配置镜像
Synology 群晖 NAS 配置
飞牛 fnOS 系统配置镜像
极空间 NAS 系统配置服务
爱快 iKuai 路由系统配置
绿联 NAS 系统配置镜像
QNAP 威联通 NAS 配置
Podman 容器引擎配置
HPC 科学计算容器配置
ghcr、Quay、nvcr 等镜像仓库
无需登录使用专属域名
需要其他帮助?请查看我们的 常见问题Docker 镜像访问常见问题解答 或 提交工单
免费版仅支持 Docker Hub 访问,不承诺可用性和速度;专业版支持更多镜像源,保证可用性和稳定速度,提供优先客服响应。
专业版支持 docker.io、gcr.io、ghcr.io、registry.k8s.io、nvcr.io、quay.io、mcr.microsoft.com、docker.elastic.co 等;免费版仅支持 docker.io。
当返回 402 Payment Required 错误时,表示流量已耗尽,需要充值流量包以恢复服务。
通常由 Docker 版本过低导致,需要升级到 20.x 或更高版本以支持 V2 协议。
先检查 Docker 版本,版本过低则升级;版本正常则验证镜像信息是否正确。
使用 docker tag 命令为镜像打上新标签,去掉域名前缀,使镜像名称更简洁。
来自真实用户的反馈,见证轩辕镜像的优质服务