Andrei D.
                                            Andrei D.
                                        
                                    Their L3 support escalated it up to the developers for review! (case id EA4D-26) So far so good :)
For anyone following, Cloudlinux ended up taking my suggestion and added the mod_remoteip patch from https://alex-at.net/blog/apache-mod_remoteip-mod_rpaf in to their EasyApache builds (EA4D-26) - https://www.cloudlinux.com/cloudlinux-os-blog/entry/beta-easyapache-4-updated-1-31
Would this fix have any impact on #42 ?
The upstream being behind a reverse proxy makes no difference. Unless you're thinking of utilizing the PROXY protocol, in which case it doesn't make much sense to even use this...
proxy_pass http://$http_host does not support keep-alive; you have to use a named upstream {} and uncomment both proxy_set_header Connection "" & proxy_http_version 1.1; the timeout you changed and timestamps referenced...
I forgot to mention, you might want to look into lua & dynamic upstreams On Thu, May 6, 2021 at 10:46 PM Andrei ***@***.***> wrote: > proxy_pass http://$http_host does not...
If anything redis would be better considering it can store in both ram and disk
This is actually way easier than using if's and should not require any major code changes. **Ignore everything you see in that cyberciti.biz link.** You can simply use bash variable...
Why have a function check for a variable and replace the default value vs just allowing substitution on the default var. Bash variable substitution is there to avoid extra checks...
Seems like a useless tool antiddos then.. On Mon, 13 Jul 2020 at 20:44 GiacomoDevIT ***@***.***> wrote: > You have to break 80% of attack before arriving to NGINX.. if...