Skip to content
This repository has been archived by the owner on Jun 11, 2024. It is now read-only.

higanworks-cookbooks/fail2ban_smartos

Repository files navigation

fail2ban_smartos Cookbook

Instal fail2ban to smartos and add simple rule for ssh.

Requirements

Attributes

TODO: List you cookbook attributes here.

Easy Setup with Chef-Client Local Mode

mkdir -p localmode/cookbooks
git clone https://github.com/higanworks-cookbooks/fail2ban_smartos.git localmode/cookbooks/fail2ban_smartos

cd localmode
chef-client -z -o 'fail2ban_smartos::tcp_wrapper'

-- snip --

Recipe: fail2ban_smartos::default
  * service[fail2ban] action reload
    - reload service service[fail2ban]

Usage

Just include fail2ban_smartos in your node's run_list:

{
  "name":"my_node",
  "run_list": [
    "recipe[fail2ban_smartos]"
  ]
}

Install fail2ban and enable ssh rule below:

[ssh-ipfilter]

enabled = true
maxretry = 8
filter = sshd
action = ipfilter
logpath = /var/log/authlog

Contributing

  1. Fork the repository on Github
  2. Create a named feature branch (like add_component_x)
  3. Write your change
  4. Write tests for your change (if applicable)
  5. Run the tests, ensuring they all pass
  6. Submit a Pull Request using Github

License and Authors

Authors: Sawanobori Yukihiko(HiganWorks LLC)

About

Installs/Configures fail2ban to Joynt SmartOS

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages