> I'm wondering what to do in case of future attacks like this.

I'm using a fail2ban+ipsets to catch these quickly & ban them efficiently.  
Works well.  Simply use a regex like in those grep commands to match.

Make sure you test your matches -- using a combo or online regex tester & 
fail2ban-regex works for me.

On smaller boxes I manage runaway logs, getting over-filled by anything I 
missed, with a logrotate policy that compressed at size limits.  If it's still 
a problem, move the logs to a remote as they rotated, and/or use remote 
real-time logging.

Jason

Reply via email to