Alban Staehli
Regular Pleskian
- Server operating system version
- AlmaLinux 8.10 (Cerulean Leopard)
- Plesk version and microupdate number
- 18.0.68 Update #2
Hi,
I see many attempts of connection from user agent Go-http-client, within short period of time to the Plesk Admin panel, seem to be a bad bot.
Requests show up in the following log file: /var/log/plesk/httpsd_access_log
This usually triggers same time the following alert - "The threshold of Apache & PHP-FPM memory usage has been exceeded", which is well documented here How to Avoid High CPU Load & Block Bad Bots with Plesk.
While fail2ban is well configured for Apache & Nging hosted domains, and according to previours Plesk page on banning bad bot, with up to 8000 IPs now being banned, I don't think that Plesk Panel itself log files are checked by fail2ban.
Am I correct? If yes, how to prevent specific user-agent to access Plesk Panel? Any Nginx conf file?
Or any better approach to protect Plesk Admin panel?
Thanks.
I see many attempts of connection from user agent Go-http-client, within short period of time to the Plesk Admin panel, seem to be a bad bot.
Requests show up in the following log file: /var/log/plesk/httpsd_access_log
This usually triggers same time the following alert - "The threshold of Apache & PHP-FPM memory usage has been exceeded", which is well documented here How to Avoid High CPU Load & Block Bad Bots with Plesk.
While fail2ban is well configured for Apache & Nging hosted domains, and according to previours Plesk page on banning bad bot, with up to 8000 IPs now being banned, I don't think that Plesk Panel itself log files are checked by fail2ban.
Am I correct? If yes, how to prevent specific user-agent to access Plesk Panel? Any Nginx conf file?
Or any better approach to protect Plesk Admin panel?
Thanks.