3.8 KiB
Readme
Synopsis
Fail2Ban is an intrusion prevention software framework that protects computer servers from brute-force attacks.
confdroid_fail2ban is a Puppet module to automate installation, configuration and management of fail2ban settings and rules.
WARNING
Attention: Never use this puppet module on systems which have been previously configured manually. It is impossible to predict how and what would have been configured, hence previous configurations outside the scope of this module may be overwritten! Automated configurations require a test environment to verify that the module suits the purpose intended by the user, as well as tune the parameters, before deploying into live production
Features
Installation
- install required binaries
Configuration
- manage directory structure (file system permissions, selinux context)
- manage configuration files (file system permissions, selinux context, content based on parameters)
- fail2ban.conf
- fail2ban.local (overrides default settings in fail2ban.conf)
- jail.conf
- jail.local ( overrides default settings in jail.conf)
Every setting in .local files has a parameter in params.pp, which can be overridden in ENC based on fqdn, hostgroup etc. (recommended) or directly in params.pp. Typical parameters to override are:
fn_destemail: the email address to be notifiedfn_bantime: the the time an attacker IP is banned.
Service
- manage service status
Dependencies
All dependencies must be included in the catalogue.
- puppetlabs-firewall to manage firewall settings (optional)
Deployment
- native Puppet deployment
via site.pp or nodes.pp
node 'example.example.net' {
include cd_elasticsearch
}
- through Foreman:
In order to apply parameters through Foreman, confdroid_fail2ban::params must be added to the host or host group in question.
See more details about class deployment on Confdroid.com.
Parameters
The parameters are documented via puppet strings and listed here. Simply open in web browser.
SELINUX
All files and directories are configured with correct selinux context. If selinux is disabled, these contexts are ignored.
Known Problems
Support
- OS: Rocky 9
- Puppet 8
Tests
- Puppet Lint
- excluded tests:
--no-variable_scope-check: not applicable as we are inheriting parameters from params class. the lint check does not distinguish between facts and inherited parameters.
- excluded tests:
- Puppet Parser
- ERB Template Parser
- Sonar Quality Gate
Contact Us
Disclaimer
ConfDroid as entity is entirely independent from Puppet. We provide custom configuration modules, written for specific purposes and specific environments. The modules are tested and supported only as documented, and require testing in designated environments (i.e. lab or development environments) for parameter tuning etc. before deploying into production environments.