#/bin/bash #通过shell实现分析nginx日志,自动封单个IP访问量大于指定值的国外IP PATH=/bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin:~/bin export PATH #当单个IP访问量大于这个值得时候,封IP max=1000 #nginx访问日志文件路径 logDir=/www/wwwlogs/*.log basePath='/home/blockip/' month=$(date -d yesterday +"%Y%m") day=$(date -d yesterday +"%d") mkdir -p $basePath/$month/$day #nginx封锁配置文件路径 confDir=$basePath/$month/$day/${day}.conf #截取IP段 cat $logDir|awk '{print $1}'|sort|uniq -c|sort -n|while read line do a=(`echo $line`) #比较每个访问IP是否大于设定的max值 if [ $a -ge $max ] then #判断是否是IP地址格式,这里并非严格意义上的判断 echo ${a[1]}|egrep -q '([0-9]+\.){3}[0-9]+' if [ $? -eq 0 ]; then curlResult=`curl http://ip-api.com/json/${a[1]}` chinaStr=China successStr=success if [[ $curlResult =~ $successStr && ! $curlResult =~ $chinaStr ]] then #把“deny IP;”语句写入封锁配置文件中 echo "deny ${a[1]};">>$confDir fi fi fi done #nginx重新载入配置 /www/server/nginx/sbin/nginx -s reload 1.在nginx的nginx.conf中http段或者server段中引入拒绝访问的IP列表 include /usr/local/nginx/conf/blockip/*/*/*.conf; #/bin/bash #通过shell实现分析nginx日志,自动封单个IP访问量大于指定值的国外IP PATH=/bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin:~/bin export PATH #当单个IP访问量大于这个值得时候,封IP max=500 #nginx访问日志文件路径 logDir=/www/wwwlogs/*.log basePath='/home/blockip/' day=$(date +"%Y%m_%d") mkdir $basePath #nginx封锁配置文件路径 confDir=$basePath/${day}.conf touch ${confDir} #截取IP段 cat $logDir|awk '{print $1}'|sort|uniq -c|sort -n|while read line do a=(`echo $line`) #比较每个访问IP是否大于设定的max值 if [ $a -ge $max ] then #判断是否是IP地址格式,这里并非严格意义上的判断 echo ${a[1]}|egrep -q '([0-9]+\.){3}[0-9]+' if [ $? -eq 0 ]; then curlResult=`curl http://ip-api.com/json/${a[1]}` chinaStr=China successStr=success if [[ $curlResult =~ $successStr && ! $curlResult =~ $chinaStr ]] then #把IP写入封锁配置文件中 echo "deny ${a[1]};">>$confDir fi fi fi done #nginx重新载入配置 /www/server/nginx/sbin/nginx -s reload