Tracking SQL under SQL Server uses Profiler, and how do you track sql under MySQL?In fact, the method is very simple, turn on the log logging function of MySQL, by viewing the trace log.To turn on MySQL logs log method:Configuration methods in the Windows environment:Version I am using: version:5.0.37-community-nt-log
Executed as user: WTC \ EBW. admin. transaction (process ID 95) was deadlocked on lock resources with another process and has been chosen as the deadlock victim. rerun the transaction. [sqlstate 40001] (error 1205 ). the step failed.This indicates that a deadlock occurs during job execution. We can useDBCC traceon (1222,-1)Command to capture the deadlock information. Every time a deadlock occurs, it is recorded in the error log. The error
Use only the page trace of log4net and Asp.net. Recently, SSO failed to use CAS and found that its log was not output to the file. It took some time to add the following configuration to Web. config:
Note: The Source Name must match the full log name, and cannot be automatically matched with the namespace level in the same way as log4net.
System. Diag
important diagnostic tool for reviewing the WebSphere Application Server product code when messages, logs, and trails process your applications.
When you run code on application server,MessageProvides a high-level view of important events (such as successful completion and severe errors.
When the Management Server is initialized and running,LogsProvides information about server management. When an error or problem occurs, you can view the log to view
Tags: http using io file ar art LinuxTracking SQL under SQL Server uses Profiler, and how do you track sql under MySQL?In fact, the method is very simple, turn on the log logging function of MySQL, by viewing the trace log.To turn on MySQL logs log method:Configuration methods in the Windows environment:Version I am using: version:5.0.37-community-nt-
A good article. Thanks to the author for the original article address.
Http://bootloader.wikidot.com/linux:android:crashlog
An android crash in C/C ++ code often generates some crash log which looks like the following. they can be seen either with "ADB logcat" or found in one of the tombstones under/data/tombstones. this article briefly explains the structure of the log,How to read it, and how to translate
F5 converted. This is true even if viewed from the server.Note that headers can only be viewed from the Inbox, which is not visible from the sent messages.The second type: from the server to seeIn the first step, we can get the IP address of the CAS server that the message passes through, then we'll go to the Cas/hub server's messagetracking log.Copy the log out, and then open with Excel, Note: The txt dragged directly into Excel, so that the format
#!/bin/bash #-------------------------------------------------------------# Migrate the trace logs from Oracle to the data hard drive #----------- --------------------------------------------------# @author Alexander #------------------------------------------
-------------------# @time 20160105 #-------------------------------------------------------------# get trace l
Ways to turn off Httperr
Run input regedit enter Registry Editor[Hkey_local_machine\system\currentcontrolset\services\http\parameters]
right mouse button to create new DWORD value enableerrorlogging reboot the server
"Enableerrorlogging" =dword:00000000
After the restart, 2003 no longer write to the Httperr log file, you can see the server CPU footprint significantly reduced!
C:\WINDOWS\system32\LogFiles\ solution to the problem of C disk space d
First, we will introduce the default log location. Only when we know the traces we leave on the server can we erase the traces we leave on the computer, and the log is where we leave the traces.Security log file: C: \ WINDOWS \ system32 \ config \ SecEvent. EvtSystem log file: C: \ WINDOWS \ system32 \ config \ SysEven
Code highlighting produced by Actipro CodeHighlighter (freeware)http://www.CodeHighlighter.com/--> Logparser - O: CSV" Select C - IP, Count (C - IP) From Group By C - IP" > C: \ cccip.csv
C-IP
Applications: Mainly used with virtual host, can also be used for personal server
Background: 2005 a month, the normal operation of the virtual host crashed, let the computer room on duty to restart a number of times, are not, the display into the system to see, tips: C disk space is insufficient, the middle of the night to go to the room to deal with, to the computer room after the first break network, and then into the system found two places have problems, C:\WINDOWS\ System32\logfiles file
For a website that requires long-term maintenance, it is meaningful to make the website run stably for a long time.Some problems that are not exposed in the development phase may occur in the O M phase, which is also normal.Sometimes, we want to constantly optimize the website so that the website can respond to user requests more quickly,These events occur in the O M phase after development.
Unlike the development phase, the O M phase cannot allow debugging.Program, Discover various problem
Application scenarios: Mainly used with virtual hosts, but also for personal servers
Background: a vm that has always been running normally crashed on a certain day of June 1, 2005, so that the personnel on duty in the IDC cannot restart the host several times. The system displays the VM and prompts that the disk C is insufficient, in the middle of the night, I had to go to the data center for processing. after going to the data center, I first cut off the network and went into the system to fi
reading the table of contents What IIS logs contain the configuration of the IIS log how to analyze the IIS logs recommended log profiling methods exception records in IIS logs talk about scwin32status=64 looking for performance p
IIS log options
Table
Field
Name
Description
Date
Date
The date when the action occurred.
Time
Time
The time when the action occurred.
Customer IP Address
C-IP
The IP address of the client that accesses the server.
User Name
CS-Username
The username used to access the server through authentication. It does not includ
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.