[Feature] Easily accessible log file for fail2ban #18174
Closed
DrD4ffy
started this conversation in
Feature Request
Replies: 1 comment 2 replies
-
By writing to stdout we let docker do the log handling, which offers much more flexibility. For an overview of which drivers you can use with docker out of the box, check out https://docs.docker.com/engine/logging/configure/#supported-logging-drivers :) |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
I have searched the existing feature requests, both open and closed, to make sure this is not a duplicate request.
The feature
Short
Immich should write a log file to the host system outside the Docker container to improve accessibility. This would considerably simplify the installation of fail2ban.
Long
I tried to setup fail2ban for my immich instance on a Synology NAS. Once I successfully setup fail2ban for Vaultwarden I thought this couln't be so hard, another logfile, another filter expression ...
But the issue is the log file.
While Vaultwardens log file is accessible on the host system and can be mapped to the fail2ban container for scanning, this is not possible with Immich. I had a look at the community guide about fail2ban, but this is not so much a guide, but more of a riddle where you have to put a lot of parts together: journald or syslog? And where exactly are my logs redirected to? /var/log/messages? /var/log/syslog? And even then you can't be sure that it applies to your setup.
All these problems and ambiguities are solved if the log file is accessible outside the container on the host system, as is the case with Vaultwarden. Without special toosl or OS knowledge you know where it is, you can see it, you can check it and you can make it accessible to fail2ban.
Platform
Beta Was this translation helpful? Give feedback.
All reactions