-
-
Notifications
You must be signed in to change notification settings - Fork 266
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bandwidth and CPU drain #48
Comments
any ideas on how to filter that 80%? |
Use services that provide ddos mitigation |
For "services" you mean providers? because in that case will not work, since that mitigate only Layer 3/4 traffic, not layer 7 HTTP legitimate traffic |
This is where things get complex and I could solve it by allowing the script to take control of the servers built in firewall. For windows server users this would be I have the ability with Nginx Lua to access |
Check this https://github.com/juce/lua-resty-shell |
Seems like a useless tool antiddos then..
…On Mon, 13 Jul 2020 at 20:44 GiacomoDevIT ***@***.***> wrote:
You have to break 80% of attack before arriving to NGINX.. if the attack
arrives to nginx the host will go offline for high CPU Usage.
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub
<#48 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AE6DR6F3C2ECSC34RHZK5GDR3NBXPANCNFSM4NZTCDEQ>
.
|
Hi, you can try third-party free DDOS/HTTP Flood defense with unlimited traffic Layer L3-4 defense www.freecdn.pw FreeCDN Accelerated Defense |
Any tip to reduce the CPU and bandwidth usage?
I'm currently using 2x KVM VPS in round robin with 20 and 8 cores, but with a simple attack, I reach 700 Mbit on both and 100% CPU usage.
Maybe a mitigation system that ban the hosts in netflow could work?
If you have any suggestion please let me know
The text was updated successfully, but these errors were encountered: