Hackers and bots try to log into servers all the time. They do this by trying random ssh logins into your server. A deterrent to this is to disable the default ssh port and set it to something else. Also, disable root login as this is the most common user attempt I've seen on my server.
To disable the port globally, just edit the /etc/ssh/sshd_config file to have the line shown below (the 1234 should be any number you wish below 65535):
After disabling port 22, ansible did not work as expected because if uses this port by default. To fix this, the url used with my playbooks was changed from the terminal, as shown below.
ansible-playbook -i 'example.com:1234' -u 'guest' playbook.yml
Other alternatives I found while researching this include:
Editting every role to include the port required
- name: Example for port change set_fact: ansible_port: 1234
Setting the port directly with ansible_ssh_port:
ansible-playbook playbook.yml -e ansible_ssh_port=1234
Using ansibles inventory hosts and setting the port explicitly. Other inventory formats can be found in the ansible docs