mirror of
https://github.com/fail2ban/fail2ban.git
synced 2025-11-26 14:20:19 +08:00
Added Vagrantfile with Ubuntu Trusty64 configured. Both VMs are sharing the same network 192.168.200.0/24. Options for using saltstack are pre-configured but commented out. VM "secure" can be used for testing fail2ban code. VM "attacker" can be used to perform attack against our "secure" VM.
31 lines
963 B
Ruby
31 lines
963 B
Ruby
Vagrant.configure("2") do |config|
|
|
|
|
config.vm.define "secure" do |secure|
|
|
secure.vm.box = "ubuntu/trusty64"
|
|
secure.vm.hostname = "secure.dev.fail2ban.org"
|
|
secure.vm.network "private_network", ip: "192.168.200.100"
|
|
|
|
# secure.vm.synced_folder 'salt/roots', '/srv/salt'
|
|
|
|
# secure.vm.provision :salt do |salt|
|
|
# salt.minion_config = 'salt/minion'
|
|
# salt.run_highstate = true
|
|
# salt.verbose = true
|
|
# end
|
|
end
|
|
|
|
config.vm.define "attacker" do |attacker|
|
|
attacker.vm.box = "ubuntu/trusty64"
|
|
attacker.vm.hostname = "attacker.dev.fail2ban.org"
|
|
attacker.vm.network "private_network", ip: "192.168.200.150"
|
|
|
|
# attacker.vm.synced_folder 'salt/roots', '/srv/salt'
|
|
|
|
# attacker.vm.provision :salt do |salt|
|
|
# salt.minion_config = 'salt/minion'
|
|
# salt.run_highstate = true
|
|
# salt.verbose = true
|
|
# end
|
|
end
|
|
end
|