-
Notifications
You must be signed in to change notification settings - Fork 2.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Bug] Fail2Ban lost logs after updating 1Panel! #7705
Comments
wanghe-fit2cloud
changed the title
[Bug] Fail2Ban 丢失日志,在更新1Panel 后!
[Bug] Fail2Ban lost logs after updating 1Panel!
Jan 13, 2025
反向说明问题:在Fail2Ban的拦截黑名单里,是有许多的IP,但在“SSH登录日志”里没有这些IP。 |
Reverse explanation of the problem: There are many IPs in Fail2Ban's interception blacklist, but there are no such IPs in the "SSH login log". |
感谢反馈,麻烦执行下面命令看看返回信息:
|
root@server:~# cat /var/log/auth.log* | grep -aE "(Failed password for|Connection closed by authenticating user|Accepted)"
2025-01-13T08:33:43.848352+08:00 server sshd[162239]: Accepted password for root from 120.224.115.62 port 51272 ssh2
2025-01-13T10:44:04.770993+08:00 server sshd[168022]: Accepted password for root from 120.224.115.62 port 11067 ssh2
Oct 10 01:24:54 server sshd[1545]: Accepted password for root from 120.224.115.62 port 21176 ssh2
Oct 10 01:39:50 server sshd[928]: Accepted password for root from 120.224.115.62 port 56357 ssh2
Oct 10 02:13:44 server sshd[954]: Accepted password for root from 120.224.115.62 port 52883 ssh2
2024-10-10T02:43:44.574792+00:00 server sshd[1046]: Accepted password for root from 120.224.115.62 port 46007 ssh2
2024-10-10T03:02:16.458496+00:00 server sshd[3752]: Accepted password for root from 120.224.115.62 port 17417 ssh2
2024-10-10T03:14:06.634116+00:00 server sshd[4105]: Connection closed by authenticating user root 127.0.0.1 port 58268 [preauth]
2024-10-10T03:18:13.831049+00:00 server sshd[4906]: Accepted password for root from 120.224.115.62 port 49931 ssh2
2024-10-10T03:20:38.619957+00:00 server sshd[4992]: Accepted password for root from 120.224.115.62 port 53910 ssh2
2024-10-10T03:40:17.420849+00:00 server sshd[8249]: Connection closed by authenticating user root 127.0.0.1 port 55354 [preauth]
2024-10-10T06:19:56.763093+00:00 server sshd[59737]: Accepted password for root from 120.224.115.62 port 48119 ssh2
2024-10-10T09:16:56.746702+00:00 server sshd[60012]: Accepted password for root from 120.224.115.62 port 60263 ssh2
2024-10-10T17:21:08.209281+08:00 server sshd[60174]: Accepted password for root from 120.224.115.62 port 3820 ssh2
2024-10-10T17:41:27.055717+08:00 server sshd[1725]: Accepted password for root from 120.224.115.62 port 47178 ssh2
2024-10-11T19:37:04.539409+08:00 server sshd[30304]: Accepted password for root from 123.168.249.237 port 1148 ssh2
2024-10-11T21:29:21.512881+08:00 server sshd[39992]: Failed password for root from 141.98.10.96 port 42440 ssh2
2024-10-11T21:29:42.632539+08:00 server sshd[39994]: Failed password for invalid user test from 141.98.10.96 port 44620 ssh2
2024-10-25T20:08:49.007311+08:00 server sshd[528561]: Accepted password for root from 123.168.249.237 port 4953 ssh2
root@server:~# cat /var/log/secure* | grep -aE '(Failed password for|Accepted)'
cat: '/var/log/secure*': No such file or directory |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Contact Information
[email protected]
1Panel Version
v1.10.23-lts
Problem Description
每天早上,我都会检查“SSH登录日志”,若新增了登录拦截则将IP复制到WAF黑名单里(手动减少被攻击的几率)。
但是,今天早上发现“SSH登录日志”的数量明显变少了,观察日期列,也不是最后一次的2024年12月了,而是以前的日期。
这意味着,日志丢失了一部分。最近一次查看“SSH登录日志”是在两天前的早上,更新1Panel的版本也是同样的时间,即2025-01-11 08。
详见附件的截图。
Steps to Reproduce
1.从 v1.10.22-lts 更新到 v1.10.23-lts
2.查看SSH登录日志,尤其是去年的。
The expected correct result
显示丢失的日志。
Related log output
No response
Additional Information
https://github.com/ahong18s/ISSUE/blob/master/1panel/%E6%9B%B4%E6%96%B01Panel%E7%89%88%E6%9C%AC%E5%90%8E%E4%B8%A2%E5%A4%B1%E6%97%A5%E5%BF%97%EF%BC%9F_2025-01-13_08-19-48.png
The text was updated successfully, but these errors were encountered: