Subj : preventing brute force attempts on privleged ports To : NuSkooler From : bugz Date : Wed Apr 14 2021 07:57 pm -=> NuSkooler wrote to bugz <=- Nu> On Saturday, April 10th bugz said... Bu> Unfortunately, fail2ban doesn't parse json logs. Doesn't look like are Bu> going to be adding that anytime/if ever. You're stuck using regex to Bu> parse the logs. Ugh! https://xkcd.com/1171/ Nu> You can always use jq or such in your pipeline as well, or even Nu> 'bunyan' (the tool to accompany Bunyan style/JSON logs) Not with fail2ban. It only allows regex, and only reads from a file. And I think it doesn't like UTC times as well. (Unless the server TZ is also in UTC.) For being so popular, it has some major things it doesn't do. But bunyan -L is quite a nice way to read the logs. And python. It can digest json. :D Take care, bugz .... You can tune a piano but you can't tuna fish. --- MultiMail/Linux v0.52 --- Talisman v0.18-dev (Linux/x86_64) * Origin: HappyLand v2.0 - telnet://happylandbbs.com:11892/ (21:1/182) .