For a website that requires long-term maintenance, it is meaningful to make the website run stably for a long time.Some problems that are not exposed in the development phase may occur in the O M phase, which is also normal.Sometimes, we want to constantly optimize the website so that the website can respond to user requests more quickly,These events occur in the O M phase after development.
Unlike the development phase, the O M phase cannot allow debugging.Program, Discover various problem
Code highlighting produced by Actipro CodeHighlighter (freeware)http://www.CodeHighlighter.com/--> Logparser - O: CSV" Select C - IP, Count (C - IP) From Group By C - IP" > C: \ cccip.csv
C-IP
Applications: Mainly used with virtual host, can also be used for personal server
Background: 2005 a month, the normal operation of the virtual host crashed, let the computer room on duty to restart a number of times, are not, the display into the system to see, tips: C disk space is insufficient, the middle of the night to go to the room to deal with, to the computer room after the first break network, and then into the system found two places have problems, C:\WINDOWS\ System32\logfiles file
Application scenarios: Mainly used with virtual hosts, but also for personal servers
Background: a vm that has always been running normally crashed on a certain day of June 1, 2005, so that the personnel on duty in the IDC cannot restart the host several times. The system displays the VM and prompts that the disk C is insufficient, in the middle of the night, I had to go to the data center for processing. after going to the data center, I first cut off the network and went into the system to fi
reading the table of contents What IIS logs contain the configuration of the IIS log how to analyze the IIS logs recommended log profiling methods exception records in IIS logs talk about scwin32status=64 looking for performance p
Log records are critical to any server. This is no exception for IIS servers. In Windows 7, IIS logging has been greatly improved compared to 2003. The operating system administrator has more options than the log format or other optional items. As shown in, this is the basic page for
Many webmasters who use Windows IIS may encounter this problem, that is, the server's IIS log growth often leads to full disk space, and IIS does not automatically delete the log, so you need to focus on the instant cleanup log, s
IIS. You cannot change this restriction.* 403.12-access to the ing table is denied. The client certificate is required for the page to be accessed, but the user ID mapped to your client certificate has been denied access to the file. For additional information, click the following article number to view the article in the Microsoft Knowledge Base: 248075 (http://support.microsoft.com/kb/248075/) error message: HTTP 403.12-Access forbidden: mapper den
See a lot of friends often ask my station has been more than 10 days or nearly one months, has not been included, what is the cause, my answer is the number of spiders to come every day, the other answer is not know, the results of the IIS log can easily be overlooked, but often easily overlooked is the most important thing, We in the Shen Edge SEO: Web site Barometer I
SourceCodeThe log analysis tool Webalizer and AWStats has the following advantages:
User-friendly: You can directly call the corresponding language interface (Simplified Chinese Version) based on your browser)Reference output sample: http://www.chedong.com/cgi-bin/awstats/awstats.pl? Config = chedong
Perl-based: the system can run on GNU/Linux or Windows (after ActivePerl is installed), and the log
Windows server has the ability to log records of events that include the following information in its IIS log file: Who visited your site, what visitors viewed, and so on. By periodically checking these log files, site administrators can detect which areas of the server or site are vulnerable or have other security imp
There are some problems that have plagued us in our path of optimization, such as: do we have an effect on the outer chain of our hair? Can we buy a stable space? What do spiders like about our pages and what do they dislike? When spiders crawl our site frequently, when do we need to update content? And these problems we can actually through our server IIS log can be simply analyzed, as a qualified SEO, the
A few words:Yesterday, I chatted with netizens in the autumn open-source team. Some netizens mentioned a concept that must be known for the website:
IIS Log Analysis.
Then I went online and looked for some information. However, there was no IIS log in the subdirectories of the virtual directories. So I moved the autum
What the IIS logs meanIIS is an abbreviation for Internet Information Server, which means that the network Information service, the log is the running recordThe default directory for the IIS logs is%systemroot%\system32\logfiles\ (which can be customized as well)Log format: last two digits of the ex+ year + month + Dat
VPS is now a lot of webmaster accustomed to use one of the host, its function is basically similar to the server, but the price is much cheaper, and the virtual host compared to have more advantages. Website Log analysis is one of the necessary work every day, especially the analysis of the site is down right, which pages are included, and so on, the following author on the basis of the actual analysis of the VPS
We know that the IIS server is now a widely used Web platform and it is relatively simple to build a Web site. However, the Web cannot run properly due to the IIS server intrusion or other reasons, which is very common. Therefore, IIS security has become a heart disease for many people.
The IIS server can be used inde
'Iis log cleanup-IIS log generation system (createiislog. vbs)
'Create a folder
Function createfolder (folder)
On Error resume next
Set FSO = Createobject ("scripting. FileSystemObject ")
FSO. createfolder (folder)
If err> 0 then
Err. Clear
Createfolder = false
Else
Createfolder = true
End if
End Function
'Create a fil
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.