Has anybody managed to jail f.e. false login attempts out of numerous wordpress instances on one server? Every virtual wordpress site writes its logs in its own subdirectory but the Fail2Ban architecture is made for a consolidated operation. I know there is a wordpress plugin that beams messages into the /var/log/auth.log file. But I am hoping for a more clever solution that solves the task without having to touch every virtual server.
Any help will be rewarded with the gold medal of honor. Thanks!
I don’t use word press but i would hope you could conigure the log to and directory/file. If that is possible get each instance to log to the same file then use fail2ban to scan that. Or you could write a script that scans /home for the existance of the log files and then process from there
Thank you jimr1 for your suggestion. It is certainly the path of the solution. With wordfence we are again on the level of virtualmin. I hope to solve the problem once and for all for the whole server.
I am a bit confused. This is the Webmin area but it appears that the OP is using Virtualmin ?
On my RHEL based servers whether running Virtualmin or not, all access and error logs are written to the same directory then Virtualmin uses symlinks to allow the logs to be seen in each domain.
I created a filter to catch all xmlrpc entries and set
logpath = /var/log/virtualmin/*access_log
fail2ban is not simple to setup. most Issues are from DNA settings, spa, ptr, etc. once these are fixed you should be fine with email reputation. I use mxtoolbox as a start and it has helped me. Moving on, you need a web firewall which I now use malcare.
Thank you for the lively discussion. A solution at Wordpress level is not an option for me. If I have a Webmin machine with 20 Wordpress sites, then that is simply not a way forward. Webmin and Virtualmin are made exactly for such an architecture. While Virtualmin manages the individual servers, Webmin takes care of the backend. We have a real 3-tier architecture here. There simply have to be more ingenious approaches. And I know there are.