On 2024-03-05 04:14, Jason Long via Fail2ban-users wrote:
> How can I block someone who has entered the wrong password three times in any
> given time period?
--[ Jail definition ]--
bantime.increment = true
bantime.factor = 1
bantime.formula = ban.Time * (1<<(ban.Count if ban.Count<20 else 20))
> Why not just enable the nginx-http-auth config in jail.conf (using a
jail.local, preferably)?
> On 05/03/2024 09:57, Jason Long via Fail2ban-users wrote:
> Hello,
> GitLab uses Nginx and PostgreSQL internally. I want to protect Nginx with
> Fail2Ban. The GitLab log directory contains the follow
Hello,
How can I block someone who has entered the wrong password three times in any
given time period?
Thanks.
___
Fail2ban-users mailing list
Fail2ban-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/fail2ban-users
Why not just enable the nginx-http-auth config in jail.conf (using a
jail.local, preferably)?
On 05/03/2024 09:57, Jason Long via Fail2ban-users wrote:
Hello,
GitLab uses Nginx and PostgreSQL internally. I want to protect Nginx with
Fail2Ban. The GitLab log directory contains the following fil
Hello,
GitLab uses Nginx and PostgreSQL internally. I want to protect Nginx with
Fail2Ban. The GitLab log directory contains the following files:
# ls /var/log/gitlab/nginx/
access.log config current error.loggitlab_access.log
gitlab_access.log.1.gz gitlab_error.log lock
Is the foll