Deploying the Awstats Log Analysis system
Awstats can perform log analysis for services such as Apache,samba,vsftpd,iis
Here we have a log analysis of Apache website
Installing the Awstats Package
650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M02/7B/0F/wKioL1bFlsmBfsqzAAAaO5XWuvU231.jpg "title=" Azawsb.jpg "alt=" Wkiol1bflsmbfsqzaaaao5xwuvu231.jpg "/>
-
Establish profile
650) this.width=650 for the site to be counted; "src=" http://s1.51cto.com/wyfs02/M02/7B/0F/ Wkiom1bfl2-j6xuuaaajtud5ghi079.jpg "title=" jlpzwj.jpg "alt=" wkiom1bfl2-j6xuuaaajtud5ghi079.jpg "/>
Enter interactive operation
650) this.width=650; "src=" Http://s4.51cto.com/wyfs02/M01/7B/0F/wKiom1bFmdvBO-XLAAF7s91qG4k113.jpg "title=" Jhscz.jpg "alt=" Wkiom1bfmdvbo-xlaaf7s91qg4k113.jpg "/> After a few steps are pressed enter key
650) this.width=650;" src= "/HTTP/ S4.51cto.com/wyfs02/m02/7b/0f/wkiom1bfnghbk1ataadwz6_wot8818.jpg "title=" awstlj.jpg "alt=" wKiom1bFnGHBK1ATAADwz6 _wot8818.jpg "/>
The path above the arrow is the page that we configured to access the Awstats log Analysis system.
-
Modify the site statistics configuration file
650) this.width=650; "Src=" http://s1.51cto.com/wyfs02/M00/7B/0F/ Wkiom1bfnx6t-lraaaaua0mzdtm284.jpg "title=" xgtjpzwj.jpg "alt=" wkiom1bfnx6t-lraaaaua0mzdtm284.jpg "/>
650 ) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M00/7B/0F/wKioL1bFntmhdeNNAAAN5JeRxA0542.jpg "title=" Tjrzlj.jpg "alt=" wkiol1bfntmhdennaaan5jerxa0542.jpg "/> (Specify log path) need to add
650) this.width=650, "src=" http://s4.51cto.com/wyfs02/M02/7B/0F/wKiom1bFnpLhGPJIAAAKsOdc06Q928.jpg "title=" tjshml.jpg "alt=" wkiom1bfnplhgpjiaaaksodc06q928.jpg "/> &NBS P (The catalog of statistics) can find the
Create directory
650) this.width=650; "Src=" http://s2.51cto.com/wyfs02/M00/7B/0F/ Wkiom1bfn5vxkjweaaato12h3nw418.jpg "title=" cjml.jpg "alt=" wkiom1bfn5vxkjweaaato12h3nw418.jpg "/>
Update all Sites
650) this.width=650; "src=" http://s4.51cto.com/wyfs02/M00/7B/0F/wKiom1bFoI6DXYArAAAZ-ST9pYE717.jpg "title=" zx.jpg "alt=" Wkiom1bfoi6dxyaraaaz-st9pye717.jpg "/>
Create a task schedule
Crontab-e
650) this.width=650; "src=" http://s4.51cto.com/wyfs02/M01/7B/0F/wKioL1bFoWfRzQ2zAAATaPt_VvQ873.jpg "title=" jb.jpg "alt=" Wkiol1bfowfrzq2zaaatapt_vvq873.jpg "/>
650) this.width=650; "src=" Http://s2.51cto.com/wyfs02/M01/7B/0F/wKiom1bFoV7wxkUTAAANETqNmgg379.jpg "title=" Kaiqi.jpg "alt=" Wkiom1bfov7wxkutaaanetqnmgg379.jpg "/>
Verify
650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M00/7B/42/wKioL1bJq1PzlpZpAAOXlxFRiLs090.jpg "title=" Awsaccess.jpg "alt=" Wkiol1bjq1pzlpzpaaoxlxfrils090.jpg "/>
We access the Awstats log analysis system, directly input access to the path can be, do not need to provide accounts and passwords, so as to increase the security risks, then how to solve it? access control for HTTPD services
This article is from the "Yangwang" blog, make sure to keep this source http://yangwang.blog.51cto.com/10855137/1744120
Awstats Log Analysis System