This unit is provided by:
Options
-
[Install]
-
WantedBy=multi-user.target
-
-
[Service]
-
Environment="PYTHONNOUSERSITE=1"
-
Environment="PYTHONNOUSERSITE=1" "PYTHONNOUSERSITE=yes"
-
EnvironmentFile=-/etc/sysconfig/fail2ban
-
ExecReload=/usr/bin/fail2ban-client reload
-
ExecStart=/usr/bin/fail2ban-server -xf $FAIL2BAN_OPTIONS start
-
ExecStart=/usr/bin/fail2ban-server -xf start
-
ExecStartPre=/bin/mkdir -p /run/fail2ban
-
ExecStop=/usr/bin/fail2ban-client stop
-
PIDFile=/run/fail2ban/fail2ban.pid
-
PrivateDevices
Introduced in systemd 209=yes -
ProtectClock
Introduced in systemd 245=yes -
ProtectControlGroups
Introduced in systemd 232=yes -
ProtectHome
Introduced in systemd 214=yes -
ProtectHostname
Introduced in systemd 242=yes -
ProtectKernelModules
Introduced in systemd 232=yes -
ProtectKernelTunables
Introduced in systemd 232=yes -
ProtectSystem
Introduced in systemd 214=full -
Restart=on-failure
-
RestartPreventExitStatus=0 255
-
RestrictRealtime
Introduced in systemd 231=yes -
RuntimeDirectory=fail2ban
-
Type=simple
-
-
[Unit]
-
After=network.target iptables.service firewalld.service ip6tables.service ipset.service nftables.service
-
Description=Fail2Ban Service
-
Documentation=man:fail2ban(1)
-
PartOf=firewalld.service
-
PartOf=iptables.service firewalld.service ip6tables.service ipset.service nftables.service
-
Additionnal notes
Nothing here.