mirror of
https://github.com/lldap/lldap.git
synced 2026-04-25 08:15:52 +03:00
[GH-ISSUE #1281] [FEATURE REQUEST] Logging - Add more details to all the [info]: Login attempt for "admin" #449
Labels
No labels
backend
blocked
bug
cleanup
dependencies
docker
documentation
duplicate
enhancement
enhancement
frontend
github_actions
good first issue
help wanted
help wanted
integration
invalid
ldap
pull-request
question
rust
rust
tests
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/lldap-lldap#449
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @accforgithubtest on GitHub (Sep 8, 2025).
Original GitHub issue: https://github.com/lldap/lldap/issues/1281
Motivation
I would like to set up alerts if there has been admin logins outside of specific ip addresses / hostnames / etc.
Currently, LLDAP integrated with authelia / gitea / etc. keeps printing this generic log message every few minutes, making it impossible to set up an alert for admin logins from unknown sources.
Describe the solution you'd like
Would be great if this log statement can include more details of the login like client (application name / api / browser / etc info), ip address, hostnames, any other identification of
who/where/howan admin had logged-in would be very useful for monitoring and alerting.Describe alternatives you've considered
Pls let me know if / what other options are available.
I have already set up some alerts via web server / proxy logs, however it only cover access via browser and doesnt cover logins from applications on the internal docker network that do not use a browser.
Additional context
Deployed via docker. Other applications (Authelia, Gitea, etc) connect to LLDAP via integrations.
So the only way to monitor for admin logins is via LLDAP logs.
@nitnelave commented on GitHub (Sep 8, 2025):
Just mentioning that the request makes sense. However, I like the default of not logging things that we don't need. I think a good compromise would be to provide a customizable string template that gets logged for every login attempt, successful or not.
@accforgithubtest commented on GitHub (Sep 8, 2025):
Absolutely, a customizable string template would be great, providing flexibility when required, else use defaults.
Cheers!