andryyy 8 年之前
父节点
当前提交
78f75deccb
共有 1 个文件被更改,包括 18 次插入2 次删除
  1. 18 2
      docs/u_and_e.md

+ 18 - 2
docs/u_and_e.md

@@ -79,10 +79,10 @@ Open `data/conf/postfix/main.cf` and find `smtpd_sender_restrictions`. Prepend `
 smtpd_sender_restrictions = check_sasl_access hash:/opt/postfix/conf/check_sender_access reject_authenticated_sender [...]
 ```
 
-Run postmap on check_sasl_access:
+Run postmap on check_sender_access:
 
 ```
-docker-compose exec postfix-mailcow postmap /opt/postfix/conf/check_sasl_access
+docker-compose exec postfix-mailcow postmap /opt/postfix/conf/check_sender_access
 ``` 
 
 Restart the Postfix container.
@@ -266,6 +266,22 @@ The bayes statistics are written to Redis as keys `BAYES_HAM` and `BAYES_SPAM`.
 
 You can also use Rspamd's web ui to learn ham and/or spam.
 
+### Learn ham or spam from existing directory
+
+You can use a one-liner to learn mail in plain-text (uncompressed) format:
+```
+# Ham
+for file in /my/folder/cur/*; do docker exec -i $(docker-compose ps -q rspamd-mailcow) rspamc learn_ham < $file; done
+# Spam
+for file in /my/folder/.Junk/cur/*; do docker exec -i $(docker-compose ps -q rspamd-mailcow) rspamc learn_spam < $file; done
+```
+
+Consider attaching a local folder as new volume to `rspamd-mailcow` in `docker-compose.yml` and learn given files inside the container. This can be used as workaround to parse compressed data with zcat. Example:
+
+```
+for file in /data/old_mail/.Junk/cur/*; do rspamc learn_spam < zcat $file; done
+```
+
 ### CLI tools
 
 ```