> Am 01.11.2016 um 23:35 schrieb Cox, Eric S <eric....@kroger.com>:
> 
> Currently we track all access logs realtime via an in house built log 
> aggregation solution. Various algorithms are setup to detect said IPS whether 
> it be by hit rate, country, known types of attacks etc. These IPS are 
> typically identified within a few mins and we reload to banned list every 60 
> seconds. We just moved some services from apache where we were doing this 
> without any noticable performance impact. Have this working in nginx but was 
> looking for general suggestion on how to optimize if at all possible. 


Ah, if you already have the data pre-processed…

I’d move blocking to the host’s firewall, as suggested.

Long term, I want to do this (or at least be able to), too. 

We (MSP) have a rather large number of firewalls and telling the network-guys 
„Block this IP at all of them“ does not work (it would probably take them the 
better part of the day).
They don’t believe in automation...
_______________________________________________
nginx mailing list
nginx@nginx.org
http://mailman.nginx.org/mailman/listinfo/nginx

Reply via email to