You can use an external tool to parse Nginx error log and block the IP in iptables/netfilter
On Wed, Aug 2, 2017 at 7:43 AM, Phani Sreenivasa Prasad < nginx-fo...@forum.nginx.org> wrote: > I assume it would help dropping connections . since we are setting rate > limit per ip and any client IP which is suspicious by sending requests in > bulk(lets say 10000 connections/requests), it makes sense to not to accept > connections/requests from that IP. > > Thoughts ?? > > Posted at Nginx Forum: https://forum.nginx.org/read. > php?2,275796,275798#msg-275798 > > _______________________________________________ > nginx mailing list > nginx@nginx.org > http://mailman.nginx.org/mailman/listinfo/nginx > -- *Anoop P Alias*
_______________________________________________ nginx mailing list nginx@nginx.org http://mailman.nginx.org/mailman/listinfo/nginx