• We value your experience with Plesk during 2024
    Plesk strives to perform even better in 2025. To help us improve further, please answer a few questions about your experience with Plesk Obsidian 2024.
    Please take this short survey:

    https://pt-research.typeform.com/to/AmZvSXkx
  • The Horde webmail has been deprecated. Its complete removal is scheduled for April 2025. For details and recommended actions, see the Feature and Deprecation Plan.
  • We’re working on enhancing the Monitoring feature in Plesk, and we could really use your expertise! If you’re open to sharing your experiences with server and website monitoring or providing feedback, we’d love to have a one-hour online meeting with you.

/var/log/httpd/access_log logs local IP addresses not remote ones

La Linea

Basic Pleskian
Hi @AlL!

Currently I have two Plesk 12 Linux servers running. One of them uses apache only (a virtual server), the other (a bare metal server) has been "autoinstalled" and uses apache and nginx. Unfortunately the second server has a major security risk, since all attacks on the default domains - i.e. the server's IPs - are logged to /var/log/httpd/access_log with the local destination ips only, which is complete nonsense IMO and renders fail2ban useless. Additionally nginx logs the same requests with the source ips, but there doesn't seem to be any fail2ban filter available for that in Plesk 12. Which sick mind did come up with such a lousy/lunatic construct? However, what I need to know is:

How can this be changed safely so that apache logs the real source ips and fail2ban can drop them?
 
Back
Top