docs: Update cron schedules to match actual configuration
- Correct permanent ban script cron schedule: 2:00 AM daily (not every 6 hours) - Correct geoip-shell update cron schedule: 4:08 AM daily (not 4:18 AM) - Add geoip-shell persistence cron job that runs on reboot
This commit is contained in:
@@ -28,11 +28,16 @@ sudo make install
|
|||||||
|
|
||||||
### Update Mechanism
|
### Update Mechanism
|
||||||
- **Cron Service:** ✅ Enabled
|
- **Cron Service:** ✅ Enabled
|
||||||
- **Update Schedule:** Daily at 4:18 AM (`18 4 * * *`)
|
- **Update Schedule:** Daily at 4:08 AM (`8 4 * * *`)
|
||||||
- **Last Update:** September 17, 2025 at 00:57:41
|
- **Last Update:** September 17, 2025 at 00:57:41
|
||||||
- **Persistence:** ✅ Enabled (survives reboots)
|
- **Persistence:** ✅ Enabled (survives reboots)
|
||||||
- **Backup:** ✅ Automatic IP lists backup enabled
|
- **Backup:** ✅ Automatic IP lists backup enabled
|
||||||
|
|
||||||
|
### Persistence Cron Job
|
||||||
|
- **Schedule:** On reboot (`@reboot`)
|
||||||
|
- **Command:** `/usr/bin/geoip-shell-run.sh restore -a`
|
||||||
|
- **Purpose:** Restores geoip-shell firewall rules after system reboot
|
||||||
|
|
||||||
## Inbound Geoblocking Configuration
|
## Inbound Geoblocking Configuration
|
||||||
|
|
||||||
### Blocking Mode
|
### Blocking Mode
|
||||||
|
|||||||
@@ -489,7 +489,7 @@ THRESHOLD=4 # Ban after 4 fail2ban bans
|
|||||||
- **Iptables Rules:** `/etc/iptables/iptables.rules`
|
- **Iptables Rules:** `/etc/iptables/iptables.rules`
|
||||||
|
|
||||||
#### Cron Schedule
|
#### Cron Schedule
|
||||||
- **Frequency:** Every 6 hours (`0 */6 * * *`)
|
- **Frequency:** Daily at 2:00 AM (`0 2 * * *`)
|
||||||
- **User:** root
|
- **User:** root
|
||||||
- **Command:** `/home/hoborg/homelab/scripts/permanent-ban-repeat-offenders.sh`
|
- **Command:** `/home/hoborg/homelab/scripts/permanent-ban-repeat-offenders.sh`
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user