In peacetime operation and maintenance work, our OPS personnel need to know the total number of daily visits, total bandwidth, IP statistics and URL statistics of their website.Although the website has already done CDN acceleration in the service
Today, found the picture verification code, always verify the wrong; The verification code picture is Call verification code system generation;The results looked at Nginx log access.logAppeared a lot at the same time, requested 2 times the picture
Next, let's take a look at the log configuration commands in linux and windows.Linux system configuration method:Change it The code is as follows:Copy code ErrorLog "|/usr/local/apache/bin/rotatelogs/home/logs/www/% Y _ % m _ % d_error_log 86400
I suspect there are other crawlers who will be crawling several of my websites tomorrow.
I found a method to lose weight for access. log and error. log on the Internet.
As follows:
CustomLog "|
One, Apache user authenticationvim/usr/local/apache/conf/extra/httpd-vhosts.conf//The 11.com virtual host is edited into the following contentDocumentRoot "/data/wwwroot/www.123.com"ServerName www.123.com//Designation of certified
11.18 Apache user authentication11.19/11.20 Domain Jumphttpd.conf, delete the # in front of Rewrite_module (shared)Curl-x127.0.0.1:80-i 123.com//Status Code 30111.21 Apache Access LogChange the virtual host configuration file to the
User authentication for Apachevim/usr/local/apache2.4/conf/extra/httpd-vhosts.conf//The 111.com virtual host is edited into the following contentDocumentRoot "/data/wwwroot/111.com"ServerName 111.comServeralias www.example.comAllowOverride
This article is the use of PHP to achieve the spider access log statistics of the code for a detailed analysis of the introduction, the need for a friend reference under the
copy code code as follows:
$useragent = addslashes (Strtolower
Reference address
http://www.ttlsa.com/nginx/nginx-modules-ngxtop-ttlsa/
Ngxtop Real-time parsing nginx access log, and the processing results output to the terminal, functions similar to the system command top, so the software named Ngxtop. With
%a-remote IP Address
%a-local IP Address
%b-bytes sent, excluding HTTP headers, or '-' if no Bytes were sent
%b-bytes sent, excluding HTTP headers
%h-remote host name (or IP address if enablelookups for the connector is false)
%h-request
Tomcat5.5 configuration instructions------------------------------ Configure Tomcat --------------------------------------------1. Enable the access log file and modify the configuration file server. XML in Tomcat.Prefix = "localhost_access_log."
Tomcat access log Source Code Analysis and Application
Tomcat logs can be divided into two types:
1. Access logs record the access time, source, data, and other relevant information (all information available for ServletRequest can be recorded );
2.
1. Modify the parameters of the Finesse runtime in Build.xml1 Targetname= "Run"depends= "Compile, compile-bootstrap-less, retrieve"Description= "Start fitnesse from the command line">2 Ivy:cachepathPathid= "Standalone.classpath"conf=
In high concurrency scenarios, disk IO is often the bottleneck of performance, and access logs involve frequent write operations, so this part needs to be optimized as much as possible, or it will slow down the overall performance of the system.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.