1, first check the Exchange event log for error;2. If you have previously created a custom view, you can view the IIS events in the view.650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M01/5C/98/wKioL1UePXPjHsQSAAOFplIYZos864.jpg "title=" Things log. png "alt=" wkiol1uepxpjhsqsaaofpliyzos864.jpg "/>3, the
performance issues, or what needs to be improved.What information is included in the IIS logsI said earlier that "IIS logs provide the most valuable information", what are the information? Let's look at this:Here's the record:1. At what point the request occurred,2. Which client IP has access to the port of the server IP,3. What is the client tool type, what version,4. The URL of the request and what the q
The server has recently suffered hacker intrusion. Intruders are skilled, delete IIS log files to erase traces, you can go to the Event Viewer to look at the warning message from W3SVC, often find some clues. Of course, for Web servers with very large access, it is almost impossible to rely on manual analysis-there's too much data! A Third-party
IIS log analysis is our Asp.net
Program Personnel must understand the knowledge, because the website we develop is based on the IIS server. When Website access is slow
Code In addition to the optimization program code, IIS logs are another way to find slow websites!
The location where
IIS log causes the disk to be full. iis log Disk
Only IIS is deployed on a server, and the application directory is on disk D. The size of disk C (97.5 GB) is full.
Display All system files and hidden files, and select all the C drive files and folders to view the ca
Download |iis| Log Analysis
IIS Log Analysis tool
You can consider using open source Awstats to analyzeThe following is my installation notes, I hope you can have a referenceAwstats's installation notes under IIS6.0What is Awstats? Awstats is a Perl-based Web
First, we will introduce the default log location. Only when we know the traces we leave on the server can we erase the traces we leave on the computer, and the log is where we leave the traces.Security log file: C: \ WINDOWS \ system32 \ config \ SecEvent. EvtSystem log file: C: \ WINDOWS \ system32 \ config \ SysEven
The log file sync (Log File sync) Wait event has a parameter: Buffer #. In Oracle Database 10 Gb, such wait events are located below commit wait events. When processing Log File sync wait events, pay attention to the following ideas:◎ Log File sync wait time is related to th
Ways to turn off Httperr
Run input regedit enter Registry Editor[Hkey_local_machine\system\currentcontrolset\services\http\parameters]
right mouse button to create new DWORD value enableerrorlogging reboot the server
"Enableerrorlogging" =dword:00000000
After the restart, 2003 no longer write to the Httperr log file, you can see the server CPU footprint significantly reduced!
C:\WINDOWS\system32\LogFiles\ solution to the problem of C disk space d
Code highlighting produced by Actipro CodeHighlighter (freeware)http://www.CodeHighlighter.com/--> Logparser - O: CSV" Select C - IP, Count (C - IP) From Group By C - IP" > C: \ cccip.csv
C-IP
There are some problems that have plagued us in our path of optimization, such as: do we have an effect on the outer chain of our hair? Can we buy a stable space? What do spiders like about our pages and what do they dislike? When spiders crawl our site frequently, when do we need to update content? And these problems we can actually through our server IIS log can be simply analyzed, as a qualified SEO, the
Applications: Mainly used with virtual host, can also be used for personal server
Background: 2005 a month, the normal operation of the virtual host crashed, let the computer room on duty to restart a number of times, are not, the display into the system to see, tips: C disk space is insufficient, the middle of the night to go to the room to deal with, to the computer room after the first break network, and then into the system found two places have problems, C:\WINDOWS\ System32\logfiles file
For a website that requires long-term maintenance, it is meaningful to make the website run stably for a long time.Some problems that are not exposed in the development phase may occur in the O M phase, which is also normal.Sometimes, we want to constantly optimize the website so that the website can respond to user requests more quickly,These events occur in the O M phase after development.
Unlike the development phase, the O M phase cannot allow debugging.Program, Discover various problem
Application scenarios: Mainly used with virtual hosts, but also for personal servers
Background: a vm that has always been running normally crashed on a certain day of June 1, 2005, so that the personnel on duty in the IDC cannot restart the host several times. The system displays the VM and prompts that the disk C is insufficient, in the middle of the night, I had to go to the data center for processing. after going to the data center, I first cut off the network and went into the system to fi
IIS. You cannot change this restriction.* 403.12-access to the ing table is denied. The client certificate is required for the page to be accessed, but the user ID mapped to your client certificate has been denied access to the file. For additional information, click the following article number to view the article in the Microsoft Knowledge Base: 248075 (http://support.microsoft.com/kb/248075/) error message: HTTP 403.12-Access forbidden: mapper den
reading the table of contents What IIS logs contain the configuration of the IIS log how to analyze the IIS logs recommended log profiling methods exception records in IIS logs talk about scwin32status=64 looking for performance p
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.