maximum of 10 connections on IIS. You cannot change this restriction.• 403.12-access to the ing table is denied. The client certificate is required for the page to be accessed, but the user ID mapped to your client certificate has been denied access to the file. For other information, click the following article number to view the article in the Microsoft Knowledge Base:248075 error message: HTTP 403.12-Access Forbidden: Mapper Denied Access (HTTP 40
What if the event log file is corrupted?
As one of the administrative tools included in the Microsoft Management Console, Event Viewer is used to maintain log information on your computer for related programs, security features, and system events. You can browse and manage event
, then this may cause the LGWR process can not get the CPU, will be queued, obviously, this will inevitably lead to log file Sync or log file parallel write waits The increase. Note: Oracle also has the ability to control the CPU prioritization of a process by means of an implicit _high_priority_processes. In a system where the CPU is relatively scarce, it can be mitigated by setting this number of paramete
files.
Three: How to analyze the IIS log of our site
1: Split analysis of IIS log files
We use FTP to download the log locally, you can open the file through Notepad, while searching for the main search engine spider name, which Baidu's spider named Baiduspider, Google's
Log files are part of the operating system, so there must be an application programming interface (API) to support logging
Instance:
HANDLE h;if ((h = RegisterEventSource (Null,text ("metalive")) = = NULL){return FALSE;}Const char* PS = "PSZS1PSZS2PSZS3";WORD Wtype=eventlog_error_type;//eventlog_information_type;DWORD dwid=5001;int ISTR = 1;BOOL BRet;DWORD DWORD;if (h){Bret=::reportevent (H,Wtype,0,Dwid,NULL,//SIDISTR,0,ps,NULL);
Dword=::getlasterror
Many webmasters who use Windows IIS may encounter this problem, that is, the server's IIS log growth often leads to full disk space, and IIS does not automatically delete the log, so you need to focus on the instant cleanup log, s
Log records are critical to any server. This is no exception for IIS servers. In Windows 7, IIS logging has been greatly improved compared to 2003. The operating system administrator has more options than the log format or other optional items. As shown in, this is the basic page for
You can use the Event Log Service in the event viewer to view the computer's on and off time. Because the Event Log service starts and closes along with the computer, and records the event log
Wait for the event log to wait for the event solution.
I insisted on reading three sets of RAC AWR every day and summarized it.
Query the SQL statement of the log wait event:
9i: select * from v $ event_name where name like '% log
By default, ASP. Net does not have the permission to write system logs. To write system logs in ASP. Net, you must have the permissions first. We can solve this problem by setting or modifying the Registry Permissions.
Method 1: "START-> Run", enter the command, "regedt32", and find "System-> CurrentControlSet-> Services-> Eventlog ", select "security"> "Permissions"> "add", find the "AspNet" user on the local machine, add the user, and grant the read permission, an "aspnet_wp account" is added
Label: style using Io strong file data problems ar I insisted on reading three sets of RAC AWR every day and summarized it. Query the SQL statement of the log wait event: 9i: Select * from V $ event_name where name like '% log %'; (about 14)10g: Select name, wait_class from V $ event_name where name like '% log %';
In the site optimization process is not to say that all the site problems can be directly from the Webmaster tools to get information, often webmaster tools to get the information are in the site after the problem can be detected. As a seoer, we need to learn the hidden information of the site. For example, what is the effect of the chain in the past few days? What are the areas where our content is more susceptible to search engine spiders? Search engine spiders for our site's crawling positive
'Iis log cleanup-IIS log generation system (createiislog. vbs)
'Create a folder
Function createfolder (folder)
On Error resume next
Set FSO = Createobject ("scripting. FileSystemObject ")
FSO. createfolder (folder)
If err> 0 then
Err. Clear
Createfolder = false
Else
Createfolder = true
End if
End Function
'Create a fil
See a lot of friends often ask my station has been more than 10 days or nearly one months, has not been included, what is the cause, my answer is the number of spiders to come every day, the other answer is not know, the results of the IIS log can easily be overlooked, but often easily overlooked is the most important thing, We in the Shen Edge SEO: Web site Barometer I
statistics system plays an important role in site user behavior analysis, especially for keyword access statistics from search engines: it is a very effective data source for user behavior analysis. With the development of the Internet over the years, Web Log statistics tools have become more and more mature and feature-rich. Many of them are openSource codeAWStats is an outstanding one. AWStats: advanced web statistics
AWStats is a fast-growing Per
SourceCodeThe log analysis tool Webalizer and AWStats has the following advantages:
User-friendly: You can directly call the corresponding language interface (Simplified Chinese Version) based on your browser)Reference output sample: http://www.chedong.com/cgi-bin/awstats/awstats.pl? Config = chedong
Perl-based: the system can run on GNU/Linux or Windows (after ActivePerl is installed), and the log
=chedong
Based on Perl: and solves the cross-platform problem well, the system itself can run on Gnu/linux or Windows (after installing ActivePerl ), and the parsed log directly supports the Apache format (combined) and the IIS format ( Need to be modified). Webalizer Although there are Windows platform version , but there is a lack of maintenance;Awstats can be implemented with a set of systems to comp
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.