% doas pfctl -a f2b/nginx-http-auth -s rules
pfctl: Anchor does not exist
% doas pfctl -a f2b/nginx-http-auth -t f2b-nginx-http-auth -T show
pfctl: Table does not exist
% fail2ban-regex --print-all-missed systemd-journal 'nginx-http-auth[mode=aggressive]'
Running tests
=============
Use jail : nginx-http-auth
Use jail/flt options : {'mode': 'aggressive'}
Use datepattern : {^LN-BEG} : Default Detectors
Error: systemd library not found. Exiting...
% fail2ban-client -vvvd
['add', 'nginx-http-auth', 'polling']
['set', 'nginx-http-auth', 'usedns', 'warn']
['set', 'nginx-http-auth', 'addfailregex', '^\\s*\\[error\\] \\d+#\\d+: \\*\\d+\\s+user "(?:[^"]+|.*?)":? (?:password mismatch|was not found in "[^\\"]*"), client: <HOST>, server: \\S*, request: "\\S+ \\S+ HTTP/\\d+\\.\\d+", host: "\\S+"(?:, referrer: "\\S+")?\\s*$']
['set', 'nginx-http-auth', 'datepattern', '{^LN-BEG}']
['set', 'nginx-http-auth', 'maxretry', 5]
['set', 'nginx-http-auth', 'maxmatches', 5]
['set', 'nginx-http-auth', 'findtime', '3600']
['set', 'nginx-http-auth', 'bantime', '86400']
['set', 'nginx-http-auth', 'ignorecommand', '']
['set', 'nginx-http-auth', 'addignoreip', '127.0.0.1', '127.0.0.0/8', '10.0.0.0/8', '172.16.0.0/12', '192.168.0.0/16']
['set', 'nginx-http-auth', 'logencoding', 'auto']
['set', 'nginx-http-auth', 'addlogpath', '/var/www/logs/error.log', 'head']
['set', 'nginx-http-auth', 'addaction', 'pf-nginx']
['multi-set', 'nginx-http-auth', 'action', 'pf-nginx', [['actionstart', 'echo "table <f2b-nginx> persist counters" | pfctl -a f2b/nginx -f-\nport="80,443,25,587,465,110,995,143,993,4190"; if [ "$port" != "" ] && case "$port" in \\{*) false;; esac; then port="{$port}"; fi\nprotocol="tcp"; if [ "$protocol" != "all" ]; then protocol="proto $protocol"; else protocol=all; fi\necho "block quick $protocol from <f2b-nginx> to any port $port" | pfctl -a f2b/nginx -f-'], ['actionstart_on_demand', False], ['actionstop', 'pfctl -a f2b/nginx -sr 2>/dev/null | grep -v f2b-nginx | pfctl -a f2b/nginx -f-\npfctl -a f2b/nginx -t f2b-nginx -T flush\npfctl -a f2b/nginx -t f2b-nginx -T kill'], ['actionflush', 'pfctl -a f2b/nginx -t f2b-nginx -T flush'], ['actioncheck', 'pfctl -a f2b/nginx -sr | grep -q f2b-nginx'], ['actionban', 'pfctl -a f2b/nginx -t f2b-nginx -T add <ip>'], ['actionunban', 'pfctl -a f2b/nginx -t f2b-nginx -T delete <ip>'], ['name', 'nginx'], ['port', '80,443,25,587,465,110,995,143,993,4190'], ['protocol', 'tcp'], ['actname', 'pf-nginx'], ['tablename', 'f2b'], ['block', 'block quick'], ['actiontype', '<multiport>'], ['allports', 'any'], ['multiport', 'any port $port']]]
['set', 'nginx-http-auth', 'addaction', 'banned_db-nginx']
['multi-set', 'nginx-http-auth', 'action', 'banned_db-nginx', [['actionstart', ''], ['actionstop', '/usr/local/bin/fail2ban_banned_db cleanup nginx'], ['actioncheck', ''], ['actionban', '/usr/local/bin/fail2ban_banned_db ban <ip> 80,443,25,587,465,110,995,143,993,4190 tcp nginx <ipjailfailures> <ipjailmatches>'], ['actionunban', '/usr/local/bin/fail2ban_banned_db unban <ip>'], ['name', 'nginx'], ['port', '80,443,25,587,465,110,995,143,993,4190'], ['protocol', 'tcp'], ['actname', 'banned_db-nginx']]]