What I would say to do is write IP's from your toolkit or what ever you are
using for reading your access.log and those that trigger and spam the 503
error within milliseconds or what ever range it is you can do an API call
and add those IP's to be blocked at a router level.

With CloudFlare you can have CloudFlare block those IP's before they reach
your server like so
https://api.cloudflare.com/#user-level-firewall-access-rule-properties

If you use OVH you can write the IP's that trigger 503's to OVH's Firewall
https://api.ovh.com/console/#/ip/{ip}/firewall#POST

This should be of interest too
https://twitter.com/olesovhcom/status/779297257199964160

But anything the firewall does not get your server now has a way to
communicate with your router / firewall to prevent this requests even
hitting the machine any more.

Posted at Nginx Forum: 
https://forum.nginx.org/read.php?2,269873,269881#msg-269881

_______________________________________________
nginx mailing list
nginx@nginx.org
http://mailman.nginx.org/mailman/listinfo/nginx

Reply via email to