ansible-personal/roles/common/tasks/fail2ban.yml

46 lines
1.2 KiB
YAML
Raw Normal View History

---
- name: Configure fail2ban sshd filter
2022-09-11 08:21:08 +02:00
ansible.builtin.template:
src: etc/fail2ban/jail.d/sshd.local.j2
dest: /etc/fail2ban/jail.d/sshd.local
owner: root
mode: 0644
notify: restart fail2ban
- name: Configure fail2ban nginx filter
when:
- extra_fail2ban_filters is defined
- "'nginx' in extra_fail2ban_filters"
2022-09-11 08:21:08 +02:00
ansible.builtin.template:
src: etc/fail2ban/jail.d/nginx.local.j2
dest: /etc/fail2ban/jail.d/nginx.local
owner: root
mode: 0644
notify: restart fail2ban
- name: Create fail2ban service override directory
2022-09-11 08:21:08 +02:00
ansible.builtin.file:
path: /etc/systemd/system/fail2ban.service.d
state: directory
owner: root
mode: 0755
# See Arch Linux's example: https://wiki.archlinux.org/index.php/Fail2ban
- name: Configure fail2ban service override
2022-09-11 08:21:08 +02:00
ansible.builtin.template:
src: etc/systemd/system/fail2ban.service.d/override.conf.j2
dest: /etc/systemd/system/fail2ban.service.d/override.conf
owner: root
mode: 0644
notify:
- reload systemd
- restart fail2ban
- name: Start and enable fail2ban service
2022-09-11 08:21:08 +02:00
ansible.builtin.systemd:
name: fail2ban
state: started
enabled: true
# vim: set sw=2 ts=2: