plataleas: > > the haproxy health checks produced the postfix/anvil logs. > > After adding the haproxy IP to the "smtpd_client_event_limit_exeptions" > the postfix/anvil logs showed correctly the originating IP of the brute > force attacks. > > smtpd_client_event_limit_exceptions = $mynetworks $haproxy
Thanks, that makes sense. There is no way for the proxy's IP address to leak into Postfix after a 'normal' HaProxy handshake. Wietse