nginx limit_req and limit_conn not working to prevent DoS attack
anoopalias01 at gmail.com
Wed Aug 2 03:26:39 UTC 2017
You can use an external tool to parse Nginx error log and block the IP in
On Wed, Aug 2, 2017 at 7:43 AM, Phani Sreenivasa Prasad <
nginx-forum at forum.nginx.org> wrote:
> I assume it would help dropping connections . since we are setting rate
> limit per ip and any client IP which is suspicious by sending requests in
> bulk(lets say 10000 connections/requests), it makes sense to not to accept
> connections/requests from that IP.
> Thoughts ??
> Posted at Nginx Forum: https://forum.nginx.org/read.
> nginx mailing list
> nginx at nginx.org
*Anoop P Alias*
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the nginx