Deploying the HTTPD Log Analysis system

Source: Internet
Author: User

Use Awstats to deploy log analysis system to monitor records of HTTPD services

Control access to the Access log analysis system

The current environment is a CentOS6.5 server that has deployed HTTPD services

One, the deployment log analysis system

1. Download the awstats-7.3 package now

650) this.width=650; "src=" Http://s5.51cto.com/wyfs02/M01/87/57/wKioL1feC42SYCMAAAA0IsSNrvo618.png "style=" float: none; "title=" 1.png "alt=" Wkiol1fec42sycmaaaa0issnrvo618.png "/>

2. Unzip the package and choose where to store it

650) this.width=650; "src=" Http://s4.51cto.com/wyfs02/M01/87/5A/wKiom1feC46z6l-xAABHBSjUmv4489.png "style=" float: none; "title=" 2.png "alt=" Wkiom1fec46z6l-xaabhbsjumv4489.png "/>

3. Execute permissions on the file, otherwise it cannot execute, configure the profile file

650) this.width=650; "src=" Http://s4.51cto.com/wyfs02/M02/87/5A/wKiom1feC46xHA7VAAAmgcrajPA064.png "style=" float: none; "title=" 3.png "alt=" Wkiom1fec46xha7vaaamgcrajpa064.png "/>

4. Follow the prompts to enter the absolute path of the configuration file for the HTTPD service and the domain name, as prompted to complete the configuration

650) this.width=650; "src=" Http://s5.51cto.com/wyfs02/M00/87/57/wKioL1feC5DjC_AEAAK_Z1wyg68047.png "style=" float: none; "title=" 4.png "alt=" Wkiol1fec5djc_aeaak_z1wyg68047.png "/>

5. Modify the generated configuration file log storage path

650) this.width=650; "src=" Http://s1.51cto.com/wyfs02/M02/87/57/wKioL1feC5DjWTAjAAAidFR7_MQ618.png "style=" float: none; "title=" 5.png "alt=" Wkiol1fec5djwtajaaaidfr7_mq618.png "/>

650) this.width=650; "src=" Http://s1.51cto.com/wyfs02/M00/87/5A/wKiom1feC5GT-cItAAAfHdaDouI702.png "style=" float: none; "title=" 6.png "alt=" Wkiom1fec5gt-citaaafhdadoui702.png "/>

6. Configure scheduled tasks to perform updates regularly and perform the first more rows manually

650) this.width=650; "src=" Http://s2.51cto.com/wyfs02/M00/87/57/wKioL1feC5HxlogEAAHBiRRHNzM664.png "title=" 7.png " alt= "Wkiol1fec5hxlogeaahbirrhnzm664.png"/>

7. Restart the service

650) this.width=650; "src=" Http://s2.51cto.com/wyfs02/M02/87/5A/wKiom1feC5KyV-NyAADSht9uBOQ857.png "style=" float: none; "title=" 8.png "alt=" Wkiom1fec5kyv-nyaadsht9uboq857.png "/>

8. Access Path http://www.linuxfan.cn/awstats/awstats.pl?config=www.linuxfan.cn View Log Analysis System

650) this.width=650; "src=" Http://s2.51cto.com/wyfs02/M01/87/57/wKioL1feC5PyasPPAAF9pA_EF5o220.png "style=" float: none; "title=" 9.png "alt=" Wkiol1fec5pyasppaaf9pa_ef5o220.png "/>

9. Write Web page simplified access path to www.linuxfan.cn/aws.html

650) this.width=650; "src=" Http://s2.51cto.com/wyfs02/M01/87/5A/wKiom1feC5Txf-deAACXxQZCIOQ649.png "style=" float: none; "title=" 10.png "alt=" Wkiom1fec5txf-deaacxxqzcioq649.png "/>

Second, the Control access log Analysis system

1. Write a user or group file to control access

650) this.width=650; "src=" Http://s2.51cto.com/wyfs02/M02/87/5A/wKiom1feC5WyCl02AAEE_cgX78Y517.png "style=" float: none; "title=" 12.png "alt=" Wkiom1fec5wycl02aaee_cgx78y517.png "/>

650) this.width=650; "src=" Http://s4.51cto.com/wyfs02/M00/87/5A/wKiom1feC5WBHdlCAABFfJWk0WI061.png "style=" float: none; "title=" 13.png "alt=" Wkiom1fec5wbhdlcaabffjwk0wi061.png "/>

2. Modify the/usr/local/httpd/conf/httpd.conf file for access control to control the network segment, IP address, and user or group access

650) this.width=650; "src=" Http://s4.51cto.com/wyfs02/M02/87/57/wKioL1feC5XTFMLLAADGXTAZ0a4030.png "style=" float: none; "title=" 14.png "alt=" Wkiol1fec5xtfmllaadgxtaz0a4030.png "/>

3. Restart the HTTPD service after modifying the configuration file

650) this.width=650; "src=" Http://s1.51cto.com/wyfs02/M00/87/5A/wKiom1feC5aAnfMRAAAgeHF0I48921.png "style=" float: none; "title=" 15.png "alt=" Wkiom1fec5aanfmraaagehf0i48921.png "/>

4. Revisit the Log Analysis system page to prompt for user name password

650) this.width=650; "src=" Http://s1.51cto.com/wyfs02/M01/87/5A/wKiom1feC5bBxpmBAAB30IydBYw386.png "style=" float: none; "title=" 16.png "alt=" Wkiom1fec5bbxpmbaab30iydbyw386.png "/>

5. Only 192.168.100.1 host access is allowed in the configuration file, and other IP addresses are used as shown

650) this.width=650; "src=" Http://s4.51cto.com/wyfs02/M00/87/57/wKioL1feC5eykglbAAAyGLPepTM290.png "style=" float: none; "title=" 20.png "alt=" Wkiol1fec5eykglbaaayglpeptm290.png "/>


This article is from the "Ukkun" blog, make sure to keep this source http://xiaoayu.blog.51cto.com/12001978/1853555

Deploying the HTTPD Log Analysis system

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.