ASP reads the IIS log file code, which you can write to implement an IIS log browsing program, can read the IIS log access time, client IP, request target, protocol status, etc., if you
Basic knowledge of the format of IIS files
The IIS format is a fixed (not customizable) ASCII format, and the IIS format includes some basic items, such as the user's IP address, user name, request date and time, service status code, and number of bytes received. In addition, the
As we all know, Microsoft products always attract hackers, and IIS is no exception.
What is IIS
As one of the popular Web servers, IIS provides powerful Internet and Intranet services. Therefore, there are still many units that use IIS as Web server software. By default, these servers must allow public access to their
Because of the monitoring needs of the server often generate a lot of log files, such as IIS log files (C:\inetpub\logs\LogFiles), a slightly traffic web site, its log can reach hundreds of megabytes per day, these
1. Open the IIS log file
2. View the location of the log file
3 File address found
The default will be in C:\inetpub\logs\LogFiles (Win7), which will have a series of file names, similar to W3SVC file name.IIS log f
1. Create a new DWORD value in Registry hkey_local_machine\system\currentcontrolset\services\http\parameters: Enableerrorlogging, set the value to 0.2. Run the following command on the command line, respectively:NET stop httpNET start HTTPIISReset3. Can change the storage location of log files, also new string value in Parameters: Errorloggingdir, set the value for the new storage path, also need to restart
One, find the "application pool" name1. Open "IIS"(1), click on the Start menu to find the management tools, such as(2) , open the Administrative tools, and locate the "Internet infomation Services (IIS) ..." module, such as2 . Find the website you want to adjustClick the Small triangle icon on the left to expand the child nodes,3. get the application pool name used by the current siteOpen the site's "Adva
In the use of workman a PHP aspect of the scheduled task framework.
By timing the log to record the success or failure of the scheduled task, the log file size of 70M when the level of the scheduled task is broken, the background read logs can not read.
Ask, PHP write log fi
example: I found the log I needed:This file is a whole bunch of characters, how can I analyze it now?A tool called log Parser can specifically parse the IIS log, which we can use to view the information in the log.For example, I can run the following command line (note: In order not to affect the width of the page I w
successful repair ( turn off other query windows if an error occurs )
ALTER DATABASE Bigdata_testinfo set Multi_userYou refresh the database and you find out, okay ~
Scared to the point, quickly check the data there is no problem (formerly)
The size of the wood is also changed
Expand:
Someone attached to the time found ... Tips for rejecting xxx
Uh.. is actually not open permission:
Leave the current user's permission open and OK.
If y
IIS log analysis is our Asp.net
Program Personnel must understand the knowledge, because the website we develop is based on the IIS server. When Website access is slow
Code In addition to the optimization program code, IIS logs are another way to find slow websites!
The location where
The server has recently suffered hacker intrusion. Intruders are skilled, delete IIS log files to erase traces, you can go to the Event Viewer to look at the warning message from W3SVC, often find some clues. Of course, for Web servers with very large access, it is almost impossible to rely on manual analysis-there's too much data! A Third-party
IIS log causes the disk to be full. iis log Disk
Only IIS is deployed on a server, and the application directory is on disk D. The size of disk C (97.5 GB) is full.
Display All system files and hidden
the client tool type and version,4. The request URL and query string Parameters,5. The request method is get or post,6. What is the request processing result: HTTP status code and the underlying status code of the operating system,7. How much data is uploaded by the client and how much data is sent by the server during the request,8. The total length of time the request occupies the server, and so on.
What is the purpose of this information for analysis? I will talk about it later. First, you
corresponding log file in the directory (by default, the directory is differentiated according to the application pool ordinal).
For example: I found the log I needed:
This file is a lot of dense characters, now how do I analyze it.
A tool called log Parser can specifically parse the IIS
Recently, some customers have requested website logs for analysis. Because the newly installed server has an external system installed, a binary (. IBL) log function. This function is enabled by default in the off-star system. After this function is enabled, all websites on the server write log data to a single log file. The
First, we will introduce the default log location. Only when we know the traces we leave on the server can we erase the traces we leave on the computer, and the log is where we leave the traces.Security log file: C: \ WINDOWS \ system32 \ config \ SecEvent. EvtSystem log file: C: \ WINDOWS \ system32 \ config \ SysEven
Applications: Mainly used with virtual host, can also be used for personal server
Background: 2005 a month, the normal operation of the virtual host crashed, let the computer room on duty to restart a number of times, are not, the display into the system to see, tips: C disk space is insufficient, the middle of the night to go to the room to deal with, to the computer room after the first break network, and then into the system found two places have problems, C:\WINDOWS\ System32\logfiles file
Log records are critical to any server. This is no exception for IIS servers. In Windows 7, IIS logging has been greatly improved compared to 2003. The operating system administrator has more options than the log format or other optional items. As shown in, this is the basic page for
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.