monitoring-plugins-fail2ban-0.10.4-104.4.noarch.rpm


Advertisement

Description

monitoring-plugins-fail2ban - Check fail2ban server and how many IPs are currently banned

Property Value
Distribution openSUSE Tumbleweed
Repository Security all
Package filename monitoring-plugins-fail2ban-0.10.4-104.4.noarch.rpm
Package name monitoring-plugins-fail2ban
Package version 0.10.4
Package release 104.4
Package architecture noarch
Package type rpm
Category System/Monitoring
Homepage http://www.fail2ban.org/
License GPL-2.0-or-later
Maintainer -
Download size 52.38 KB
Installed size 33.33 KB
This plugin checks if the fail2ban server is running and how many IPs are
currently banned.  You can use this plugin to monitor all the jails or just a
specific jail.
How to use
----------
Just have to run the following command:
$ ./check_fail2ban --help

Alternatives

Package Version Architecture Repository
monitoring-plugins-fail2ban-0.10.4-1.1.noarch.rpm 0.10.4 noarch openSUSE Oss
monitoring-plugins-fail2ban - - -

Requires

Name Value
/usr/bin/perl -

Provides

Name Value
monitoring-plugins-fail2ban = 0.10.4-104.4
nagios-plugins-fail2ban = 0.10.4

Obsoletes

Name Value
nagios-plugins-fail2ban < 0.10.4

Download

Type URL
Mirror widehat.opensuse.org
Binary Package monitoring-plugins-fail2ban-0.10.4-104.4.noarch.rpm
Source Package fail2ban-0.10.4-104.4.src.rpm

Install Howto

  1. Add the Security repository:
    # zypper addrepo http://widehat.opensuse.org/opensuse/repositories/security/openSUSE_Tumbleweed/ security
  2. Install monitoring-plugins-fail2ban rpm package:
    # zypper install monitoring-plugins-fail2ban

Files

Path
/usr/lib/nagios/
/usr/lib/nagios/plugins/check_fail2ban
/usr/share/doc/packages/monitoring-plugins-fail2ban/COPYING
/usr/share/doc/packages/monitoring-plugins-fail2ban/README

Changelog

2019-02-16 - chris@computersalat.de
- ver. 0.10.4 (2018/10/04) - ten-four-on-due-date-ten-four
* https://github.com/fail2ban/fail2ban/blob/0.10.4/ChangeLog
- Fixes
* `filter.d/dovecot.conf`:
- failregex enhancement to catch sql password mismatch errors (gh-2153);
- disconnected with "proxy dest auth failed" (gh-2184);
* `filter.d/freeswitch.conf`:
- provide compatibility for log-format from gh-2193:
* extended with new default date-pattern `^(?:%%Y-)?%%m-%%d[ T]%%H:%%M:%%S(?:\.%%f)?` to cover
`YYYY-mm-dd HH:MM::SS.ms` as well as `mm-dd HH:MM::SS.ms` (so year is optional);
* more optional arguments in log-line (so accept [WARN] as well as [WARNING] and optional [SOFIA] hereafter);
- extended with mode parameter, allows to avoid matching of messages like `auth challenge (REGISTER)`
(see gh-2163) (currently `extra` as default to be backwards-compatible), see comments in filter
how to set it to mode `normal`.
* `filter.d/domino-smtp.conf`:
- recognizes failures logged using another format (something like session-id, IP enclosed in square brackets);
- failregex extended to catch connections rejected for policy reasons (gh-2228);
* `action.d/hostsdeny.conf`: fix parameter in config (dynamic parameters stating with '_' are protected
and don't allowed in command-actions), see gh-2114;
* decoding stability fix by wrong encoded characters like utf-8 surrogate pairs, etc (gh-2171):
- fail2ban running in the preferred encoding now (as default encoding also within python 2.x), mostly
`UTF-8` in opposite to `ascii` previously, so minimizes influence of implicit conversions errors;
- actions: avoid possible conversion errors on wrong-chars by replace tags;
- database: improve adapter/converter handlers working on invalid characters in sense of json and/or sqlite-database;
additionally both are exception-safe now, so avoid possible locking of database (closes gh-2137);
- logging in fail2ban is process-wide exception-safe now.
* repaired start-time of initial seek to time (as well as other log-parsing related data),
if parameter `logpath` specified before `findtime`, `backend`, `datepattern`, etc (gh-2173)
* systemd: fixed type error on option `journalflags`: an integer is required (gh-2125);
- New Features
* new option `ignorecache` to improve performance of ignore failure check (using caching of `ignoreip`,
`ignoreself` and `ignorecommand`), see `man jail.conf` for syntax-example;
* `ignorecommand` extended to use actions-similar replacement (capable to interpolate
all possible tags like `<ip-host>`, `<family>`, `<fid>`, `F-USER` etc.)
- Enhancements
* `filter.d/dovecot.conf`: extended with tags F-USER (and alternatives) to collect user-logins (gh-2168)
* since v.0.10.4, fail2ban-client, fail2ban-server and fail2ban-regex will return version without logo info,
additionally option `-V` can be used to get version in normalized machine-readable short format.
- rebase patches
* fail2ban-opensuse-locations.patch
* fail2ban-opensuse-service.patch
- add signature file

See Also

Package Description
ndpmon-2.1.0-4.6.i586.rpm IPv6 Neighbor Discovery Protocol Monitor
ndpmon-2.1.0-4.6.x86_64.rpm IPv6 Neighbor Discovery Protocol Monitor
nikto-2.1.6-2.2.noarch.rpm Web server scanner
nitrokey-app-1.3.2-1.27.i586.rpm Nitrokey's Application
nitrokey-app-1.3.2-1.27.x86_64.rpm Nitrokey's Application
nkmkpasswd-0.0.2-2.4.noarch.rpm Create Passwords with various Levels of Strength
nsjail-2.8-11.1.x86_64.rpm A light-weight process isolation tool
nwipe-0.22-1.17.i586.rpm Standalone secure disk eraser
nwipe-0.22-1.17.x86_64.rpm Standalone secure disk eraser
oath-toolkit-2.6.2-21.11.i586.rpm Toolkit for one-time password authentication systems
oath-toolkit-2.6.2-21.11.x86_64.rpm Toolkit for one-time password authentication systems
oath-toolkit-xml-2.6.2-21.11.noarch.rpm XML data files needed by liboath
openCryptoki-3.11.0-140.4.i586.rpm An Implementation of PKCS#11 (Cryptoki) v2.11 for IBM Cryptographic Hardware
openCryptoki-3.11.0-140.4.x86_64.rpm An Implementation of PKCS#11 (Cryptoki) v2.11 for IBM Cryptographic Hardware
openCryptoki-32bit-3.11.0-140.4.i586.rpm An Implementation of PKCS#11 (Cryptoki) v2.11 for IBM Cryptographic Hardware
Advertisement
Advertisement