Files
confdroid_fail2ban/README.md
Arne Teuke 07c547eb4a fix typo
2021-09-10 12:53:35 +02:00

3.5 KiB

Readme

Build Status

[[TOC]]

Synopsis

Fail2Ban is an intrusion prevention software framework that protects computer servers from brute-force attacks.

cd_fail2ban is a Puppet module to automate installation, configuration and management of fail2ban settings and rules.

WARNING

**__!!! Attention: Never use this puppet module on systems which have been previously configured manually. It is impossible to predict how and what would have been configured, hence previous configurations outside the scope of this module may be overwritten! Automated configurations require a test environment to verify that the module suits the purpose intended by the user, as well as tune the parameters, before deploying into live production!!! __**

Features

Installation

  • install required binaries

Configuration

  • manage directory structure (file system permissions, selinux context)
  • manage configuration files (file system permissions, selinux context, content based on parameters)

Service

  • manage service status (running or stopped)

Dependencies

All dependencies must be included in the catalogue.

Deployment

  • native Puppet deployment

via site.pp or nodes.pp

node 'example.example.net' {
  include cd_elasticsearch
}
  • through Foreman:

In order to apply parameters through Foreman, cd_fail2ban::params must be added to the host or host group in question.

See more details about class deployment on Confdroid.com.

Parameters

The parameters are documented via puppet strings and listed here. Simply open in web browser.

SELINUX

All files and directories are configured with correct selinux context. If selinux is disabled, these contexts are ignored.

Known Problems

  • firewalld: firewalld is auto-installed on CentOS7 as dependency of fail2ban by yum.

Support

  • OS: CentOS 7
  • Puppet 5

Tests

  • Puppet Lint
    • excluded tests:
      • --no-class_inherits_from_params_class-check:relevant only to non-supported outdated puppet versions
      • --no-variable_scope-check: not applicable as we are inheriting parameters from params class. the lint check does not distinguish between facts and inherited parameters.
      • --no-80chars-check: it is not always possible to stay within 80 characters, although typically only occurring on the parameter vault params.pp.
      • --no-arrow_alignment-check: this check leads to actually not having am easily readable arrow alignment, as this checks per block, not per class.
  • Puppet Parser
  • ERB Template Parser
  • Test for unwanted UTF8 files in the Puppet code (see tests/UTF_Files)
  • Markdown-lint
  • Spellcheck
  • Sonar Quality Gate

Contact Us

contact Us

Disclaimer

ConfDroid as entity is entirely independent from Puppet. We provide custom configuration modules, written for specific purposes and specific environments. The modules are tested and supported only as documented, and require testing in designated environments (i.e. lab or development environments) for parameter tuning etc. before deploying into production environments.