R. S. Doiel, rsdoiel@caltech.edu
Caltech Library, Digital Library Development
2025-03-26
Solution, use something simpler along side fail2ban.
{ipaddress}
can be used for the IP address found in the
log lineSearch for “BadBot” and ban it with iptables.
badbot.yaml
/var/log/nginx/access.log
sudo logagent badbot.yaml /var/log/nginx/access.log
For each IP address identified on a tagged log line the action will be executed. Given the example action that means the IP address associated with log lines containing “BadBot” are banned from connecting to ports 80 and 443.
Sometimes the bots aren’t the problem and the system runs well. Often I’ve found my self grepping the log for specific things to total up. LogAnalyst automates some of this activity. It reads in a stream of log entries, tokenizes them into a structured record then performs some analysis. The analyst is returned as a JSON object.
The tokenization part is the tricky bit, fortunately it’s implemented as a TypeScript module.
I suspect I will add different types of analysis over time. As the
logtok.ts
module improves what I learn in LogAnalyst will
be fed back into LogAgent.
LogAgent is an experimental “proof of concept” simple log processor written in TypeScript and compiled with Deno into a stand alone executable. It is a naive tool so take care with the action you assign for a tag.