• If you are still using CentOS 7.9, it's time to convert to Alma 8 with the free centos2alma tool by Plesk or Plesk Migrator. Please let us know your experiences or concerns in this thread:
    CentOS2Alma discussion
  • Inviting everyone to the UX test of a new security feature in the WP Toolkit
    For WordPress site owners, threats posed by hackers are ever-present. Because of this, we are developing a new security feature for the WP Toolkit. If the topic of WordPress website security is relevant to you, we would be grateful if you could share your experience and help us test the usability of this feature. We invite you to join us for a 1-hour online session via Google Meet. Select a convenient meeting time with our friendly UX staff here.

/var/log/httpd/access_log logs local IP addresses not remote ones

La Linea

New Pleskian
Hi @AlL!

Currently I have two Plesk 12 Linux servers running. One of them uses apache only (a virtual server), the other (a bare metal server) has been "autoinstalled" and uses apache and nginx. Unfortunately the second server has a major security risk, since all attacks on the default domains - i.e. the server's IPs - are logged to /var/log/httpd/access_log with the local destination ips only, which is complete nonsense IMO and renders fail2ban useless. Additionally nginx logs the same requests with the source ips, but there doesn't seem to be any fail2ban filter available for that in Plesk 12. Which sick mind did come up with such a lousy/lunatic construct? However, what I need to know is:

How can this be changed safely so that apache logs the real source ips and fail2ban can drop them?
 
Back
Top