First, we will introduce the default log location. Only when we know the traces we leave on the server can we erase the traces we leave on the computer, and the log is where we leave the traces.Security log file: C: \ WINDOWS \ system32 \ config \ SecEvent. EvtSystem log
Ways to turn off Httperr
Run input regedit enter Registry Editor[Hkey_local_machine\system\currentcontrolset\services\http\parameters]
right mouse button to create new DWORD value enableerrorlogging reboot the server
"Enableerrorlogging" =dword:00000000
After the restart, 2003 no longer write to the Httperr log file, you can see the server CPU footprint significantly reduced!
C:\WINDOWS\system32\LogFil
IIS. You cannot change this restriction.* 403.12-access to the ing table is denied. The client certificate is required for the page to be accessed, but the user ID mapped to your client certificate has been denied access to the file. For additional information, click the following article number to view the article in the Microsoft Knowledge Base: 248075 (http://support.microsoft.com/kb/248075/) error mess
Applications: Mainly used with virtual host, can also be used for personal server
Background: 2005 a month, the normal operation of the virtual host crashed, let the computer room on duty to restart a number of times, are not, the display into the system to see, tips: C disk space is insufficient, the middle of the night to go to the room to deal with, to the computer room after the first break network, and then into the system found two places have problems, C:\WINDOWS\ System32\logfiles
the client tool type and version,4. The request URL and query string Parameters,5. The request method is get or post,6. What is the request processing result: HTTP status code and the underlying status code of the operating system,7. How much data is uploaded by the client and how much data is sent by the server during the request,8. The total length of time the request occupies the server, and so on.
What is the purpose of this information for analysis? I will talk about it later. First, you
Application scenarios: Mainly used with virtual hosts, but also for personal servers
Background: a vm that has always been running normally crashed on a certain day of June 1, 2005, so that the personnel on duty in the IDC cannot restart the host several times. The system displays the VM and prompts that the disk C is insufficient, in the middle of the night, I had to go to the data center for processing. after going to the data center, I first cut off the network and went into the system to fi
follows (this article takes the interface of IIS 8 for example).
In IIS Manager, select a Web site, double-click the log icon, and refer to the following figure:
At this point (the main part) the interface is as follows:
In the screenshot, the way the log is created is to generate a new
maximum of 10 connections on IIS. You cannot change this restriction.• 403.12-access to the ing table is denied. The client certificate is required for the page to be accessed, but the user ID mapped to your client certificate has been denied access to the file. For other information, click the following article number to view the article in the Microsoft Knowledge Base:248075 error message: HTTP 403.12-Ac
Many webmasters who use Windows IIS may encounter this problem, that is, the server's IIS log growth often leads to full disk space, and IIS does not automatically delete the log, so you need to focus on the instant cleanup log, s
Log records are critical to any server. This is no exception for IIS servers. In Windows 7, IIS logging has been greatly improved compared to 2003. The operating system administrator has more options than the log format or other optional items. As shown in, this is the basic page for
links, not to allow spiders to crawl; If you don't have the habit of checking IIS logs, you don't know even if there are dead links, let alone shielding the dead links. Spiders have a lot of dead links to the site is not good, and will not give such a high weight of the site. Some friends say check dead links I can use webmaster tools, such as Chinaz dead link detection, Google webmaster crawl errors and so on these tools, but do not forget that the
is very important, before we buy space must first say hello support does not support IIS log download, because some service providers do not provide this services, If the support of the space background generally have log weblog log download this function to download it to the root directory in the FTP upload to the l
configuration in the header of each specific configuration file, and then overwrites the corresponding attributes in the general configuration with other configurations, such:Include = "common. conf"Logfile = "/path/to/BBS/access_log"Sitename = "bbs.chedong.com" Minimal configuration file modification: logfile sitedomain logformat
For Statistics of Apache logs on GNU/Linux, you only need to modify the two
following are two log statistics examples for a single site:One is CGI-based output on GNU/Linux,One is static page-based export on Windows 2000 Download/install
Http://sourceforge.net/projects/awstats/ download installation package:
GNU/Linux: Tar zxf awstats-version.tgzBy default, AWStats scripts and static files are stored in the wwwroot Directory: deploy AWStats. pl programs to/home/Apache/cgi-bin/AWStats /.MV AWStats-version/cgi-bin/path/to/A
'Iis log cleanup-IIS log generation system (createiislog. vbs)
'Create a folder
Function createfolder (folder)
On Error resume next
Set FSO = Createobject ("scripting. FileSystemObject ")
FSO. createfolder (folder)
If err> 0 then
Err. Clear
Createfolder = false
Else
Createfolder = true
End if
End Function
'Create a
truncation rule, but the log format for IIS is less appropriate for Awstats statistics.So it's best to get rid of all the log fields, and then strictly follow these list settings
Dates Date
Time
Client IP Address C-ip
User name Cs-username
Method Cs-method
URI Resource Cs-uri-stem
Protocol Status Sc-status
Nu
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.