mirror of
				https://git.lapiole.org/dani/ansible-roles.git
				synced 2025-10-31 10:51:27 +01:00 
			
		
		
		
	Update to 2021-12-01 19:13
This commit is contained in:
		
							
								
								
									
										97
									
								
								roles/crowdsec/defaults/main.yml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										97
									
								
								roles/crowdsec/defaults/main.yml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,97 @@ | ||||
| --- | ||||
|  | ||||
| # Version to install | ||||
| cs_version: 1.1.1 | ||||
| # URL of the archive | ||||
| cs_archive_url: https://github.com/crowdsecurity/crowdsec/releases/download/v{{ cs_version }}/crowdsec-release.tgz | ||||
| # Expected sha1 of the archive | ||||
| cs_archive_sha1: e128534e1fc5529441512451753ecb79c2cdcb85 | ||||
|  | ||||
| # Crowdsec usually should run as root to be able to access all your logs | ||||
| # but in some situations, when all your logs are readable by a less privileged user, you can run | ||||
| # crowdsec as another user account, for better security | ||||
| cs_user: root | ||||
|  | ||||
| # Directory where data will be stored | ||||
| cs_root_dir: /opt/crowdsec | ||||
|  | ||||
| # Can be sqlite or mysql | ||||
| cs_db_engine: sqlite | ||||
| # This is for mysql backend | ||||
| cs_db_server: "{{ mysql_server | default('localhost') }}" | ||||
| cs_db_port: 3306 | ||||
| cs_db_name: crowdsec | ||||
| cs_db_user: crowdsec | ||||
| # If not defined, a random one will be generated and store in /etc/crowdsec/meta/ansible_dbpass | ||||
| # cs_db_pass: S3cr3t. | ||||
|  | ||||
| # You can disable the Local API, if using a remote one for example | ||||
| cs_lapi_enabled: True | ||||
| # Set to true if Local API is enabled, and you intend to use it through a trusted reverse proxy | ||||
| cs_use_forwarded_headers: False | ||||
| # Port on which the Local API will listen | ||||
| cs_lapi_port: 8080 | ||||
| # List of IP/CIDR allowed to access cs_lapi_port | ||||
| cs_lapi_src_ip: [] | ||||
|  | ||||
| # Address of the Local API server | ||||
| # The default config will make it standalone | ||||
| cs_lapi_url: http://localhost:{{ cs_lapi_port }}/ | ||||
| cs_lapi_user: "{{ inventory_hostname }}" | ||||
| # On installation, ansible will register this host on the Local API | ||||
| # And will then validate the registration on the following server. | ||||
| # So set it to your own Local API server so ansible will delegate the task | ||||
| cs_lapi_server: "{{ inventory_hostname }}" | ||||
|  | ||||
| # Use the central API, to share your banned IP, and received list of IP to ban | ||||
| # Requires cs_lapi_enabled to be true too | ||||
| cs_capi_enabled: False | ||||
| # You can either register manuelly and the the user/pass with those variable | ||||
| # Else, ansible will register and configure the credentials | ||||
| # cs_capi_user: 123456789 | ||||
| # cs_capi_pass: azertyuiop | ||||
|  | ||||
| # Port on which the prometheus metric endpoint will bind to | ||||
| cs_prometheus_port: 6060 | ||||
| # List of IP/CIDR allowed to access the prometheus port | ||||
| cs_prometheus_src_ip: [] | ||||
|  | ||||
| # Default duration of a ban | ||||
| cs_trusted_countries: | ||||
|   - FR | ||||
| # Duration of bans for attacks from trusted countries | ||||
| cs_ban_trusted_duration: 15m | ||||
| # Default duration of a ban | ||||
| cs_ban_duration: 2h | ||||
|  | ||||
| # List of parsers to install from the hub | ||||
| cs_parsers: | ||||
|   - crowdsecurity/syslog-logs | ||||
|   - crowdsecurity/geoip-enrich | ||||
|   - crowdsecurity/dateparse-enrich | ||||
|   - crowdsecurity/whitelists | ||||
|   - crowdsecurity/sshd-logs | ||||
|   - crowdsecurity/iptables-logs | ||||
| # List of scenarios to install from the hub | ||||
| cs_scenarios: | ||||
|   - crowdsecurity/ban-defcon-drop_range | ||||
|   - crowdsecurity/ssh-bf | ||||
| # List of postoverflows to install from the hub | ||||
| cs_postoverflows: | ||||
|   - crowdsecurity/cdn-whitelist | ||||
|   - crowdsecurity/rdns | ||||
|   - crowdsecurity/seo-bots-whitelist | ||||
|  | ||||
| # If not set, crowdsec will look for yaml files in /etc/crowdsec/acquis/ | ||||
| # The default will only read syslog using journalctl | ||||
| # If defined, only acquisition set by ansible will be used | ||||
| # cs_aquis: | ||||
| #   - journalctl_filter: | ||||
| #       - '_SYSTEMD_UNIT=sshd.service' | ||||
| #     labels: | ||||
| #       type: syslog | ||||
| # | ||||
| #   - filename: | ||||
| #       - /var/log/nginx/access.log | ||||
| #     labels: | ||||
| #       type: nginx | ||||
		Reference in New Issue
	
	Block a user
	 Daniel Berteaud
					Daniel Berteaud