Lock down access to your NGINX reverse proxy to CloudFlare's IPs by doing essentially the same thing as target-list-with-crowdsec. Assume you have an auto-updating list of CloudFlare IPs, and once per day it checks for a change. If the list changes, it updates the list that is on your Port Forward to your server.
You need to replace the MSP_DOMAIN
,API_TOKEN
,FILE_PATH
,TARGET_LIST_ID
values in the scripts with real values, then run the scripts.
Contributors: @CozMedic