How to enable software view Spider visit log

Source: Internet
Author: User

Intermediary transaction SEO diagnosis Taobao guest Cloud host technology Hall

Recently always on the internet to see some webmaster asked how to view the site log records, I am here to tell the main site log how to view, there is what software can view the spider visit Records.

1. How to enable logging

Because the Windows Server system's default IIS (Internet Information Services) is more widely used in quiet, we illustrate this system as an example.

Step① Open the Internet Information Services (IIS) Manager, and expand the Site list, select the right key to open the property bar on the site where you want to log records, check the Enable Logging checkbox, and then set the format for logging, which has four types to choose from, namely, the IIS log file format, The NCS common log file format, ODBC logging, and the default format for the log format file.

  

Stop② Select a log format, click the Properties button on the right to set the logging details, respectively, the time and manner in which the log was generated, and the directory in which the log files are stored. If the site traffic is large, you can set the option to set up a new log in file size, set the way: according to the size of the log file.

Tips:

Because the log file is stored in C disk by default, it is easy to reduce the usable capacity of the system disk, and also cause the security hidden trouble, so it is recommended to store the file in other disk.

Step③ if the default hosting directory already has a log record generated, you need to manually move it to a new folder. In the logging properties, you can also set advanced logging extension options, where you can set up your own requirements, such as shutting down Web site information that does not require logging, and thus effectively reducing the size of the log file.

  

There is to ensure that the log file security, and to avoid the default storage of C disk is full of large log files, you can store the log folder to modify.

2. Basic application of the analysis of the Web site data

Although we can use Notepad or other text editing software to open the Web log, but for a slightly larger site, the resulting log file has been large enough, at every turn on the hundred MB size, even after a brief system of suspended animation opened the log file, artificial also can not from the thousands of data analysis.

Here we need to use a special log analysis software for analysis, we have a nihuowebloganalyzer (Fire site Log analyzer) to explain, other analytical procedures and webtrends, awstats, etc., can be based on their own needs to choose to use,

(1) Using Web log analysis software

Step① download installation software. To carry out the analysis of the site log, you need to first software, this is recommended for this green-free version, software size of 51.15MB, the next direct decompression can be used.

Software can be directly used in the server, if running on other computers, it can be the Web log files down to the local hard disk, or use FTP for file acquisition.

  

Step② Add a quarantine site. Open the folder Nihuoweblogana 丨 Yzer under the Nwla.exe file, to start the analysis of the log file, you need to add a Web site. Click the "New-newproject" button, in the pop-up dialog box, follow the prompts to choose, and then enter the next step, enter such as Web site address, first page file name and other parameters. In the final steps you can choose the type of Web log file, the location, and so on.

Step③ detect and generate reports. After the site is added, click the right button to select "Analyze", the software will automatically start the analysis of the log file, if the log file is larger, it will need to wait for a long time. The progress of the analysis is shown as a percentage of the progress bar. When finished, the software generates a report document in HTML format.

(2) Website Statistics Chart

Software generated statistical documents are relatively thin, and there are statistical charts can be intuitively informed of the data. Can also be based on their own needs to generate more than 80 kinds of statistical charts, charts include a variety of forms, such as three-dimensional statistics and graphs.

  

The list of access resources allows you to view multiple data, such as how many people have visited the site and the total number of visitors to the page during a certain period of time. Their sources and the pages they browse can also be easily counted.

(3) Server log analysis

In-depth analysis of the site, you can effectively assess the current situation of the site, so that the development of the site detailed planning.

The software supports automatic log analysis, and can customize the running schedule, which enables software to run automatically on the server. also supports a variety of log formats, such as Apache and iisw3cextend, and compressed log files in GZ, BZ, and zip formats.

3. Search engine optimization Look at the footprints of spiders

In the statistical chart has a "network spider" The list, may display the search engine robot the crawling file and the time and so on each parameter, thus we can conveniently analyze the website to the search engine friendly degree.

To view the report, you can turn on the "browser and Platform one network spider" List, you can see the histogram chart, detailed data list and spider IP Ranking, and many other detailed parameters.

  

The search engine's "robot" program is known as the "Spider" Program, which is a software program that continuously performs the task of Judy. Because the robot program that is used to retrieve information is like a spider crawling over the network, it is commonly known as "network Spider" (Webspider). Only pages crawled by spiders will be saved to the search engine's servers and displayed in search results.

4. Advanced Web Yue Chi Security

Web log can not only play a statistical basic data effect, for the site security, can also play a role. If the most common site resources are referenced by other websites, if the external call of the picture or file traffic is too much, it will affect the server's normal service.

(1) The theft of resources is known

In a software-generated statistical report there is a list item "Access resources", where the list of hotlinking files clearly lists the files that are referenced by other sites in the server. And can be 淸 to know the file's clicks and the amount of traffic and the total network bandwidth consumption data.

  

(2) Anti-search invading geese over leaving marks

Because WEBH records all the data in the operation of the website, if the site is found to be malicious intrusion, it can be analyzed by logging. Analyze the log to be careful enough, for large volumes of data, you need to first remove the irrelevant records before viewing, here for a simple example:

#Software: MicrosoftInternetInformationServices5.0

#Version: 1.0

#Date: 2,008,121,803:091

#Fields:d Atetimecipcsusernaraesipsportcsmethodcsuristeracsuriqueryscstatuscs (useragent)

2008121803:091192.168.1.66192.168.1.8880get/test,asp200mozilla/4.0+ (compatib1e\;+msih+5.0\;+windows+98\;+ DIGHXT)

2012051103:094192.168.1.66192.168.1.8880get/testerror.gif200mozilla/4.0+ (compatible\;+msie+5.0\;+windows+98\;+ Digext)

Through this IIS logging, you can see that May 11, 2012, the IP address for 192.168.1.66 user access IP address for the 192.168.1.88 machine 80 port, Cha saw a page test,asp, The user's browser for Compatible\:+msie+5.0\;+windows+98+digext, experienced administrators can also through the server security log, FTP upload run logs and other data to determine the intruder's IP address and intrusion time.

If you do not understand where you can add me QQ935432468 contact. This article original author http://www.zzxiangnan.com/reprint please reserve www.quvsdou.com thank you.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.