Logs Not Being Parsed

Hi - I'm running CrowdSec on my CloudPanel VPS (Ubuntu 24.04 LTS) and noticed that none of my logs are being parsed, even though lines are being read. Screenshots are attached for reference. The CrowdSec engine and firewall bouncer are running fine. Following is the sample log format in /var/log/auth.log file: 2025-07-18T21:57:39.443985+05:00 MY-SERVER sudo: pam_unix(sudo:session): session opened for user root(uid=0) by USERNAME(uid=XXXX) I am facing the same issue with all my VPSes. I need your help to resolve my problem. Thanks
No description
No description
18 Replies
CrowdSec
CrowdSecβ€’2mo ago
Important Information
Thank you for getting in touch with your support request. To expedite a swift resolution, could you kindly provide the following information? Rest assured, we will respond promptly, and we greatly appreciate your patience. While you wait, please check the links below to see if this issue has been previously addressed. If you have managed to resolve it, please use run the command /resolve or press the green resolve button below.
Log Files
If you possess any log files that you believe could be beneficial, please include them at this time. By default, CrowdSec logs to /var/log/, where you will discover a corresponding log file for each component.
Guide Followed (CrowdSec Official)
If you have diligently followed one of our guides and hit a roadblock, please share the guide with us. This will help us assess if any adjustments are necessary to assist you further.
Screenshots
Please forward any screenshots depicting errors you encounter. Your visuals will provide us with a clear view of the issues you are facing.
© Created By WhyAydan for CrowdSec ❀️
iiamloz
iiamlozβ€’2mo ago
2025-07-18T21:57:39.443985+05:00 MY-SERVER sudo: pam_unix(sudo:session): session opened for user root(uid=0) by USERNAME(uid=XXXX) this is a sudo command to which we do not have a parser for as this is already a user has been authenticated, you have installed ssh parser and nginx parser, so what are you expecting to be parsed? you also might be interested in https://www.crowdsec.net/blog/monitoring-suspicious-behavior-on-shared-hosting-platforms if you wanted to detect bad users
qamarulhassan
qamarulhassanOPβ€’2mo ago
Hi - Thanks for your response. I put this sudo command just for reffering the format of logs which are being stored in /var/log/auth.log. Please review my screenshots. The logs are not being parsed at all. This is the issue I am facing.
iiamloz
iiamlozβ€’2mo ago
The only logs which would be parsed from auth.log is sshd / ssh logs so if you run
grep ssh /var/log/auth.log | tail -n1 | cscli explain -f- --type syslog
grep ssh /var/log/auth.log | tail -n1 | cscli explain -f- --type syslog
qamarulhassan
qamarulhassanOPβ€’2mo ago
PFA output against the command you shared.
No description
iiamloz
iiamlozβ€’2mo ago
Yeah sorry my grep didnt account for successful logs. If you view the log file do you see any failed attempts? like these maybe:
grep "Failed password" /var/log/auth.log
grep "Failed password" /var/log/auth.log
or
grep "authentication failure" /var/log/auth.log
grep "authentication failure" /var/log/auth.log
qamarulhassan
qamarulhassanOPβ€’2mo ago
grep "Failed password" /var/log/auth.log No output grep "authentication failure" /var/log/auth.log One failure log and that's me. πŸ˜€
iiamloz
iiamlozβ€’2mo ago
Yes so you get very minimal login attempts hence why there no metrics
grep "authentication failure" /var/log/auth.log | cscli explain -f- --type syslog
grep "authentication failure" /var/log/auth.log | cscli explain -f- --type syslog
qamarulhassan
qamarulhassanOPβ€’2mo ago
No description
iiamloz
iiamlozβ€’2mo ago
interesting, can you DM me the log line?
qamarulhassan
qamarulhassanOPβ€’2mo ago
Ok
iiamloz
iiamlozβ€’2mo ago
Okay I see, sorry this is still not an ssh log line so thats why. Do you have ssh firewalled or on another port cause it seems nobody is attacking this port πŸ˜„ Plus for nginx, CLP places logs in each user home directory so you should create an entry for these files
#/etc/crowdsec/acquis.d/nginx.yaml
filenames:
- /home/*/logs/nginx/access.log
- /home/*/logs/nginx/error.log
labels:
type: nginx
#/etc/crowdsec/acquis.d/nginx.yaml
filenames:
- /home/*/logs/nginx/access.log
- /home/*/logs/nginx/error.log
labels:
type: nginx
qamarulhassan
qamarulhassanOPβ€’2mo ago
Hahaha πŸ˜€ Yes, I changed my default SSH port to some custom one
iiamloz
iiamlozβ€’2mo ago
yeah so you will get minimal threats unless somebody goes to find it, you should configure crowdsec to find CLP nginx logs for each host then you might see an improvement.
qamarulhassan
qamarulhassanOPβ€’2mo ago
Ok. Thank you. Is there any document/guide to cover this as I am not pro in Linux/CrowdSec. πŸ™‚
iiamloz
iiamlozβ€’2mo ago
Add new log sources | CrowdSec
We will be adding a file based acquisition. If you need to use a different source then alter the instructions to match your needs.
iiamloz
iiamlozβ€’2mo ago
but I already put the contents of the file you just need to create it under /etc/crowdsec/acquis.d/nginx.yaml
qamarulhassan
qamarulhassanOPβ€’2mo ago
Noted with thanks. I appreciate your support.

Did you find this page helpful?