πŸ“– ~1 min read

Table of contents
  1. Symptom & Impact
  2. Environment & Reproduction
  3. Root Cause Analysis
  4. Quick Triage
  5. Step-by-Step Diagnosis
  6. Solution – Primary Fix
  7. Solution – Alternative Approaches
  8. Verification & Acceptance Criteria
  9. Rollback Plan
  10. Prevention & Hardening
  11. Related Errors & Cross-Refs
  12. References & Further Reading

Symptom & Impact

Repeated SSH brute-force attempts continue without bans despite fail2ban service active. Attack surface remains exposed and auth logs fill quickly.

Environment & Reproduction

Ubuntu 22.04 LTS where ssh logs are in journald, but fail2ban jail still expects legacy file path backend. Reproduce with failed login attempts.

Root Cause Analysis

Fail2ban filters parse configured log source. If backend and logpath do not match actual logging mechanism, no events are processed and no bans occur.

Quick Triage

Check fail2ban jail status and recent failed auth events to confirm detection gap versus actual attack traffic.

Step-by-Step Diagnosis

Inspect jail configuration backend, filter regex, and fail2ban logs to identify parsing mismatches and ignored log sources.

Illustrative mockup for ubuntu-22-04-lts β€” fail2ban_no_ban_logs
Fail2ban running but no matching log events detected β€” Illustrative mockup β€” Progressive Robot

Solution – Primary Fix

Set sshd jail backend to systemd and use proper journal match, then restart fail2ban and verify bans are created for repeated failures.

Still having issues? Our IT Solutions & Services team can diagnose and resolve this for you. Get in touch for a free consultation.

Illustrative mockup for ubuntu-22-04-lts β€” fail2ban_journal_backend_fix
Jail updated to systemd journal backend and bans applied β€” Illustrative mockup β€” Progressive Robot

Solution – Alternative Approaches

Forward auth logs to file and keep polling backend, use nftables rate-limiting, or enforce SSH key-only auth to reduce brute-force exposure.

Verification & Acceptance Criteria

Test attack simulation results in active bans, jail counters increase, and blocked IPs appear in firewall set with expected ban time.

Rollback Plan

Restore previous jail.local, restart fail2ban, and temporarily implement UFW rate-limits if journal backend change causes side effects.

Prevention & Hardening

Audit jail configs after OS logging changes, monitor ban metrics, and keep filter definitions updated for current OpenSSH log formats.

Related to wrong banaction backend, missing nftables dependencies, and invalid regex customizations in local filter overrides.

Related tutorial: View the step-by-step tutorial for Ubuntu 22.04 LTS.

View all Ubuntu 22.04 LTS tutorials on the Tutorials Hub β†’

Browse all common problems & solutions on the Tutorials Hub.

References & Further Reading

Refer to Fail2ban docs, Ubuntu hardening guides, and man pages for fail2ban-client(1), jail.conf(5), and journalctl(1).

Need Expert Help?

If you cannot resolve this yourself, our team offers hands-on Server Management, Managed IT Services, and flexible Support Plans. Contact us today β€” we respond within one business day.