I don't know about iptables, but you can limit port 80 and 443 with ipfw. I run mine at 10 per IP. I've had corporations behind NAT trigger lesser limits. My point being you don't have to parse the log (swatch).
You can use an external tool to parse Nginx error log and block the IP in iptables/netfilter On Wed, Aug 2, 2017 at 7:43 AM, Phani Sreenivasa Prasad <nginx-fo...@forum.nginx.org> wrote: I assume it would help dropping connections . since we are setting rate Anoop P Alias |
_______________________________________________ nginx mailing list nginx@nginx.org http://mailman.nginx.org/mailman/listinfo/nginx