Recently, some customers have requested website logs for analysis. Because the newly installed server has an external system installed, a binary (. IBL) log function. This function is enabled by default in the off-star system. After this function is enabled, all websites on the server write log data to a single log file. The
Code highlighting produced by Actipro CodeHighlighter (freeware)http://www.CodeHighlighter.com/--> Logparser - O: CSV" Select C - IP, Count (C - IP) From Group By C - IP" > C: \ cccip.csv
C-IP
1, install log Parser 2.2https://www.microsoft.com/en-us/download/details.aspx?displaylang=enid=24659https://gallery.technet.microsoft.com/Log-Parser-Studio-cd458765 Download and then unzip2. Run Log Parser StudioRun LPS.exe in th
example: I found the log I needed:This file is a whole bunch of characters, how can I analyze it now?A tool called log Parser can specifically parse the IIS log, which we can use to view the information in the log.For example, I can run the following command line (note: In
-up window. If it is found, it indicates that your website has a dead link. Everyone knows that the dead link has an impact on website indexing. I don't need to talk about how to deal with it.
3. Check for program errors on the website through IIS logs:
Enter "500" to search. If the page is displayed, it indicates that the website program encountered an error during running and needs to be modified.
4. Use I
files consisting of strings enclosed by double quotation marks
"Fileversion", "productversion", and "companyName" fields are added to the FS input format.
All IIS input formats support the use of "*" and "?" When specifying the site name Wildcard, for example, "select * from
You can use a URL as the input path for all text-based input formats, such as "select * From http://www.adatum.com/table.csv"
The TPL output format Section supports the environm
Com through. NET FrameworkInterOP(COM Interactive Operation) features, can be easily applied in. netProgramUsing Log parser,. NET Framework comInterOPIs implemented through runtime callable wrappers (RCW) for com operations, RCW is a class in. net.
Compiling environment: vs2005 C # First, add reference: logparser. DLL to your new project, and then it appears in the reference bar of your solution: msuti
simultaneouslyThen the above example, if during the startup process, suspected Moduleb behavior is an exception to hinder the execution of Modulea. The general practice is to divide two searches, one search Modulea related, one search Moduleb related. Can actually be put together to search:If Moduleb has the following log:Moduleb xxx run in step xxxModuleb xxx Run pass step XXXWe can use the regular expression "modulea.*event|moduleb.*step" to search, so that the
IIS log causes the disk to be full. iis log Disk
Only IIS is deployed on a server, and the application directory is on disk D. The size of disk C (97.5 GB) is full.
Display All system files and hidden files, and select all the C drive files and folders to view the ca
The server has recently suffered hacker intrusion. Intruders are skilled, delete IIS log files to erase traces, you can go to the Event Viewer to look at the warning message from W3SVC, often find some clues. Of course, for Web servers with very large access, it is almost impossible to rely on manual analysis-there's too much data! A Third-party log analysis tool
Download |iis| Log Analysis
IIS Log Analysis tool
You can consider using open source Awstats to analyzeThe following is my installation notes, I hope you can have a referenceAwstats's installation notes under IIS6.0What is Awstats? Awstats is a Perl-based Web
generate a file name.
Click Select field. The following dialog box is displayed:
Note:[Number of sent fields] and [number of received bytes] are not selected by default.We recommend that you select them.For other fields, you can decide whether to select them as needed. How to analyze IIS logs
If you set IIS log parameters according to the method describe
corresponding log file in the directory (by default, the directory is differentiated according to the application pool ordinal).
For example: I found the log I needed:
This file is a lot of dense characters, now how do I analyze it.
A tool called log Parser can specifically parse the
Ways to turn off Httperr
Run input regedit enter Registry Editor[Hkey_local_machine\system\currentcontrolset\services\http\parameters]
right mouse button to create new DWORD value enableerrorlogging reboot the server
"Enableerrorlogging" =dword:00000000
After the restart, 2003 no longer write to the Httperr log file, you can see the server CPU footprint significantly reduced!
C:\WINDOWS\system32\LogFiles\ solution to the problem of C disk space d
First, we will introduce the default log location. Only when we know the traces we leave on the server can we erase the traces we leave on the computer, and the log is where we leave the traces.Security log file: C: \ WINDOWS \ system32 \ config \ SecEvent. EvtSystem log file: C: \ WINDOWS \ system32 \ config \ SysEven
Applications: Mainly used with virtual host, can also be used for personal server
Background: 2005 a month, the normal operation of the virtual host crashed, let the computer room on duty to restart a number of times, are not, the display into the system to see, tips: C disk space is insufficient, the middle of the night to go to the room to deal with, to the computer room after the first break network, and then into the system found two places have problems, C:\WINDOWS\ System32\logfiles file
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.