2020-06-07 22:55

@JFinal 测试通过,果然厉害。多谢波总

2020-06-02 08:37

@JFinal 是的。后来是做了个自动解析日志的工具,根据特征解析出对应的ip,然后在nginx上自动配置conf进行拦截,直接返回403。这样这类请求到不了后端jfinal-undertow了

2020-05-24 09:16

使用nginx做代理,记录下了详细日志:
111.224.235.80 - - [24/May/2020:00:43:58 +0800] "GET http://wujieliulan.com/ HTTP/1.1" 503 190 "-" "python-requests/2.6.0 CPython/2.7.5 Linux/3.10.0-693.11.1.el7.x86_64"
111.224.235.80 - - [24/May/2020:00:43:58 +0800] "CONNECT www.voanews.com:443 HTTP/1.0" 400 150 "-" "-"
111.224.235.80 - - [24/May/2020:00:43:58 +0800] "GET http://www.baidu.com/ HTTP/1.1" 503 190 "-" "python-requests/2.6.0 CPython/2.7.5 Linux/3.10.0-693.11.1.el7.x86_64"
111.224.235.80 - - [24/May/2020:00:43:58 +0800] "GET http://www.minghui.org/ HTTP/1.1" 503 190 "-" "python-requests/2.6.0 CPython/2.7.5 Linux/3.10.0-693.11.1.el7.x86_64"
111.224.235.80 - - [24/May/2020:00:43:58 +0800] "GET http://www.boxun.com/ HTTP/1.1" 503 190 "-" "python-requests/2.6.0 CPython/2.7.5 Linux/3.10.0-693.11.1.el7.x86_64"
111.224.235.80 - - [24/May/2020:00:43:58 +0800] "GET http://wujieliulan.com/ HTTP/1.1" 503 190 "-" "python-requests/2.6.0 CPython/2.7.5 Linux/3.10.0-693.11.1.el7.x86_64"
111.224.235.80 - - [24/May/2020:00:43:58 +0800] "GET http://www.epochtimes.com/ HTTP/1.1" 503 190 "-" "python-requests/2.6.0 CPython/2.7.5 Linux/3.10.0-693.11.1.el7.x86_64"
111.224.235.80 - - [24/May/2020:00:43:58 +0800] "GET http://www.123cha.com/ HTTP/1.1" 503 190 "-" "python-requests/2.6.0 CPython/2.7.5 Linux/3.10.0-693.11.1.el7.x86_64"
111.224.235.80 - - [24/May/2020:00:43:58 +0800] "GET http://www.baidu.com/ HTTP/1.1" 503 190 "-" "python-requests/2.6.0 CPython/2.7.5 Linux/3.10.0-693.11.1.el7.x86_64"
111.224.235.80 - - [24/May/2020:00:43:58 +0800] "GET http://www.123cha.com/ HTTP/1.1" 503 190 "-" "python-requests/2.6.0 CPython/2.7.5 Linux/3.10.0-693.11.1.el7.x86_64"
111.224.235.80 - - [24/May/2020:00:43:58 +0800] "GET http://www.boxun.com/ HTTP/1.1" 503 190 "-" "python-requests/2.6.0 CPython/2.7.5 Linux/3.10.0-693.11.1.el7.x86_64"
111.224.235.80 - - [24/May/2020:00:43:58 +0800] "GET http://www.bing.com/ HTTP/1.1" 503 190 "-" "python-requests/2.6.0 CPython/2.7.5 Linux/3.10.0-693.11.1.el7.x86_64"
111.224.235.80 - - [24/May/2020:00:43:58 +0800] "CONNECT www.voanews.com:443 HTTP/1.0" 400 150 "-" "-"
应该是爬虫之类的程序

2020-05-22 13:33

我也有类似问题出现。可能和网络中存在扫描工具有关系,参考https://issues.redhat.com/browse/UNDERTOW-592

2020-05-02 00:28

@JFinal 已极速升级至 jfinal-undertow 2.0 暂时无问题。

2020-05-01 18:55

@JFinal 并发不大,一共不超过100人。出现问题以后 undertow 被停掉了,提示undertow shutdown in 0 second,see you later. 然后cmd窗口(系统部署在window上)被关闭了。继续跟进看看 有眉目再来反馈

2020-05-01 15:42

多谢波总神速回复!近期计划调整为最新版本。后续找到根源再来反馈。

2019-07-06 15:40

使用undertow.serverName=MyServerName。测试通过。完美!

2019-06-19 22:05

测试通过,测试反馈附在原题下方。感谢各位。

2019-06-11 23:09

系统框架中使用了java8的nashorn,可以在线将代码保存在页面文件中,已达到实时在线开发和生效的目的。这样看方案2比较适合。回去测试一下再反馈。

2019-06-11 22:54

@JFinal @小徐同学 多谢二位如此详尽的解答。回头我测试一下看看。