Hi,
Please allow me some time. I’m currently working on this and will get back to you with an update as soon as possible.
Hi,
Based on the logs you shared, I’ve written a sample decoder and rule to trigger alerts and display them on the Wazuh dashboard. I’ve tested it in my environment, and it’s working as expected. You can try the following sample decoder and rule on your Wazuh setup:

The decoder is identified but doesn't extract any fields. The log goes to archives without being decoded.
Has anyone successfully created a Fail2ban decoder that handles both formats? What am I missing in my regex pattern?
Thank you in advance!