You can use an external tool to parse Nginx error log and block the IP in
iptables/netfilter

On Wed, Aug 2, 2017 at 7:43 AM, Phani Sreenivasa Prasad <
nginx-fo...@forum.nginx.org> wrote:

> I assume it would help dropping connections . since we are setting rate
> limit per ip and any client IP which is suspicious by sending requests in
> bulk(lets say 10000 connections/requests), it makes sense to not to accept
> connections/requests from that IP.
>
> Thoughts ??
>
> Posted at Nginx Forum: https://forum.nginx.org/read.
> php?2,275796,275798#msg-275798
>
> _______________________________________________
> nginx mailing list
> nginx@nginx.org
> http://mailman.nginx.org/mailman/listinfo/nginx
>



-- 
*Anoop P Alias*
_______________________________________________
nginx mailing list
nginx@nginx.org
http://mailman.nginx.org/mailman/listinfo/nginx

Reply via email to