diff --git a/ansible/roles/gateway/files/haproxy-fail2ban-filter.conf b/ansible/roles/gateway/files/haproxy-fail2ban-filter.conf deleted file mode 100644 index 615b2b0..0000000 --- a/ansible/roles/gateway/files/haproxy-fail2ban-filter.conf +++ /dev/null @@ -1,4 +0,0 @@ -[Definition] - -failregex = ^.*haproxy\[[0-9]+\]: :.*$ -ignoreregex = diff --git a/ansible/roles/gateway/files/haproxy-fail2ban-jail.conf b/ansible/roles/gateway/files/haproxy-fail2ban-jail.conf deleted file mode 100644 index f19b266..0000000 --- a/ansible/roles/gateway/files/haproxy-fail2ban-jail.conf +++ /dev/null @@ -1,8 +0,0 @@ -[haproxy] -enabled = true -bantime = 600 -findtime = 120 -maxretry = 15 -filter = haproxy-basic -logpath = /var/log/haproxy.log -port = http,https diff --git a/ansible/roles/gateway/tasks/fail2ban.yml b/ansible/roles/gateway/tasks/fail2ban.yml deleted file mode 100644 index 77ae933..0000000 --- a/ansible/roles/gateway/tasks/fail2ban.yml +++ /dev/null @@ -1,25 +0,0 @@ -- name: Install fail2ban - apt: - name: fail2ban - become: true - -- name: fail2ban filter - template: - src: files/haproxy-fail2ban-filter.conf - dest: /etc/fail2ban/filter.d/haproxy-basic.conf - become: true - register: fail2ban_filter - -- name: fail2ban jail - template: - src: files/haproxy-fail2ban-jail.conf - dest: /etc/fail2ban/jail.d/haproxy.conf - become: true - register: fail2ban_jail - -- name: Restart fail2ban - service: - name: haproxy - state: restarted - become: true - when: fail2ban_filter.changed or fail2ban_jail.changed diff --git a/ansible/roles/gateway/tasks/main.yml b/ansible/roles/gateway/tasks/main.yml index aa8f8f9..65b7421 100644 --- a/ansible/roles/gateway/tasks/main.yml +++ b/ansible/roles/gateway/tasks/main.yml @@ -3,6 +3,3 @@ - name: Configure wireguard include: wireguard.yml - -- name: Configure fail2ban - include: fail2ban.yml