This unit is provided by:
Options
-
[Install]-
WantedBy=multi-user.target
-
-
[Service]-
Environment="PYTHONNOUSERSITE=1" -
Environment="PYTHONNOUSERSITE=1" "PYTHONNOUSERSITE=yes" -
EnvironmentFile=-/etc/sysconfig/fail2ban -
ExecReload=/usr/bin/fail2ban-client reload -
ExecStart=/usr/bin/fail2ban-server -xf $FAIL2BAN_OPTIONS start -
ExecStart=/usr/bin/fail2ban-server -xf start -
ExecStartPre=/bin/mkdir -p /run/fail2ban -
ExecStop=/usr/bin/fail2ban-client stop -
PIDFile=/run/fail2ban/fail2ban.pid -
PrivateDevicesIntroduced in systemd 209=yes -
ProtectClockIntroduced in systemd 245=yes -
ProtectControlGroupsIntroduced in systemd 232=yes -
ProtectHomeIntroduced in systemd 214=yes -
ProtectHostnameIntroduced in systemd 242=yes -
ProtectKernelModulesIntroduced in systemd 232=yes -
ProtectKernelTunablesIntroduced in systemd 232=yes -
ProtectSystemIntroduced in systemd 214=full -
Restart=on-failure -
RestartPreventExitStatus=0 255 -
RestrictRealtimeIntroduced in systemd 231=yes -
RuntimeDirectory=fail2ban -
Type=simple
-
-
[Unit]-
After=network.target iptables.service firewalld.service ip6tables.service ipset.service nftables.service -
Description=Fail2Ban Service -
Documentation=man:fail2ban(1) -
PartOf=firewalld.service -
PartOf=iptables.service firewalld.service ip6tables.service ipset.service nftables.service
-
Additionnal notes
Nothing here.