Subj : preventing brute force attempts on privleged ports
To   : NuSkooler
From : bugz
Date : Wed Apr 14 2021 07:57 pm

-=> NuSkooler wrote to bugz <=-

Nu> On Saturday, April 10th bugz said...
Bu> Unfortunately, fail2ban doesn't parse json logs.  Doesn't look like  are
Bu> going to be adding that anytime/if ever.  You're stuck using regex to
Bu> parse the logs.  Ugh!  https://xkcd.com/1171/

Nu> You can always use jq or such in your pipeline as well, or even
Nu> 'bunyan' (the tool to accompany Bunyan style/JSON logs)

Not with fail2ban.  It only allows regex, and only reads from a file.
And I think it doesn't like UTC times as well.  (Unless the server TZ is
also in UTC.)  For being so popular, it has some major things it doesn't
do.

But bunyan -L is quite a nice way to read the logs.

And python.  It can digest json.  :D

Take care,
bugz

... You can tune a piano but you can't tuna fish.

--- MultiMail/Linux v0.52


--- Talisman v0.18-dev (Linux/x86_64)
* Origin: HappyLand v2.0 - telnet://happylandbbs.com:11892/ (21:1/182)