1
0
-1
root@10-35-191-118:/etc/fail2ban# systemctl status fail2ban
× fail2ban.service - Fail2Ban Service
     Loaded: loaded (/lib/systemd/system/fail2ban.service; enabled; preset: enabled)
     Active: failed (Result: exit-code) since Fri 2024-12-27 09:26:22 +08; 3s ago
   Duration: 100ms
       Docs: man:fail2ban(1)
    Process: 12125 ExecStart=/usr/bin/fail2ban-server -xf start (code=exited, status=255/EXCEPTION)
   Main PID: 12125 (code=exited, status=255/EXCEPTION)
        CPU: 95ms

Dec 27 09:26:22 10-35-191-118 systemd[1]: Started fail2ban.service - Fail2Ban Service.
Dec 27 09:26:22 10-35-191-118 fail2ban-server[12125]: 2024-12-27 09:26:22,251 fail2ban.configreader   [12125]: WARNING 'allowipv6' not defined in 'Definition'. Using default one: 'auto'
Dec 27 09:26:22 10-35-191-118 fail2ban-server[12125]: 2024-12-27 09:26:22,259 fail2ban                [12125]: ERROR   Failed during configuration: Have not found any log file for sshd jail
Dec 27 09:26:22 10-35-191-118 fail2ban-server[12125]: 2024-12-27 09:26:22,264 fail2ban                [12125]: ERROR   Async configuration of server failed
Dec 27 09:26:22 10-35-191-118 systemd[1]: fail2ban.service: Main process exited, code=exited, status=255/EXCEPTION
Dec 27 09:26:22 10-35-191-118 systemd[1]: fail2ban.service: Failed with result 'exit-code'.


    Comment添加您的评论…

    1答案

    1.  
      1
      0
      -1

      /etc/fail2ban/jail.local

      [sshd]
      
      # To use more aggressive sshd modes set filter parameter "mode" in jail.local:
      # normal (default), ddos, extra or aggressive (combines all).
      # See "tests/files/logs/sshd" or "filter.d/sshd.conf" for usage example and details.
      #mode   = normal
      sshd_backend = systemd
      enabled = true
      port    = ssh
      logpath = %(sshd_log)s
      backend = %(sshd_backend)s


        Comment添加您的评论…