-
-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for reverse proxies in audit log #2964
Comments
This is probably similar to #2762 however I am seeing this in the audit log |
Hi @Cave-Johnson, BookStack/.env.example.complete Lines 45 to 51 in ca764ca
Will require the |
Apologies, I completely missed that! Set up my instance a while ago so hadn't seen the new env options. That has solved the issue although I now have a separate odd issue, it now shows up the source IP as a cloudflare IP (my instance is also behind cloudflare). It looks like cloudflare use a different header, the Is there anything that I can do to get this to show the true origin IP? |
@Cave-Johnson I have not tried this but could you map the cloudflare header across to the expected header on the nginx proxy side? Via a rule such as: proxy_set_header X-Forwarded-For $http_true_client_ip; |
Had to use All working now, thanks for the help! |
Infodocker-compose.yml
proxy network
i know this is a old topic but i could not get this running with Nginx Proxy Manager. Bookstack and NPM share a network
tried:
@Cave-Johnson @ssddanbrown should i open a new issue? |
@Sazzels Yes, and in that issue please detail where you're setting those environment variables and any actions performed after setting them before re-testing. |
Is there a way to to use X-Forwarded-for headers in the audit log for IP addresses?
My bookstack instance is behind an nginx reverse proxy that handles SSL/TLS, in the audit log it shows up as the proxy IP address rather than the actual clients IP address
The text was updated successfully, but these errors were encountered: