IIS 7 Full Introduction log logging configurationFountain of origin "IT168 Zhuangao" In addition to the logging capabilities that Windows provides, IIS 7.0 provides additional logging capabilities. For example, you can select the log file format and specify the request to lo
, select the appropriate logging level.
In the IIS7.0 version, the system administrator can choose the appropriate logging level to suit their needs. If you can manage logging at the server level, you can also implement it at the
. First, select the appropriate logging level. in the IIS7.0 version, the system administrator can select the appropriate logging level to suit their needs. If you can manage logging at the server level, you can also implement
HTTP Error 500.19-internal Server ErrorThe requested page cannot be accessed because the associated configuration data for the page is invalid.Verbose error message module IIS WEB CoreNotify BeginRequestHandler not yet determinedError code 0x80070021Configuration Error This configuration section cannot be used in this path. This behavior occurs if the section is locked at the parent level. The lock is set
anonymous user is represented by a connector.
S-sitename: Service name, record the number of the name and instance of the Internet service that logged the event running on the client.
S-computername: The name of the server.
S-IP: The IP address of the server.
S-port: The server port number configured for the service.
Cs-method: HTTP method used in the request, Get/post.
Cs-uri-stem:uri A resource that records the Uniform Resource Identifier (URI) that is the target of the operation, that is, th
Install Advanced Logging in IIS and configure X-Forwarded-,
: Https://www.microsoft.com/en-gb/download/details.aspx? Id = 7211
1. Start the IIS manager and click the server name on the left. (Note: Do not click the site or virtual directory under the website. Otherwise, the following content cannot be found"Enable Advanced Lo
Reference: http://www.jbxue.com/article/7521.htmlWhen IIS is placed behind a reverse proxy, the client IP in the log is the IP of the reverse proxy server, not the real IP address of the user.This article introduces you to the use x-forwarded-for gets the method to the user's real IP address. Download X-forwarded-for, that is, the file is F5XForwardedFor.dllsuch as DLL files are located in: C:\ISAPIFilter\F5XForwardedFor.dllAdd the following ISAPI fil
that this is not the only place to record the Exception log, as well as in application_beginrequest,application_endrequest and so on. Therefore, the table design field should contain the current context, the reported exception source, exception information and other fields. This will be very important for us to quickly locate errors and troubleshoot anomalies in the future.It is also important to note that Server.Transfer does not change the URL, and if you need to change the URL, you can use R
After IIS7, Microsoft provided the URL rewrite version 2.0, which can be implemented by installing rewrite components. Applies to IIS7 or later versions.Installation can be selected in two ways, one is to download the installation files, and the second is to install through the "Web Platform Installer"1. Download the installation file: https://www.microsoft.com/zh-cn/download/details.aspx?id=7435OrHttps://www.iis.net/downloads/microsoft/url-rewrite2. "Web Platform Installer" installationThe URL
Import Logging ''' Log Level: critical> error> warning> info> Debug. The higher the notset level, the fewer logs are printed, and vice versa. That is, debug: prints all logs (notset is equivalent to debug) info: print info, warning, error, and critical-level logs warning: Print warning, error, and critical-
The Org.apache.log4j.Level class provides the following levels, but can also be customized by subclasses of the level class.
Level
Description
All
Levels include custom levels
DEBUG
Specifying fine-grained information events is the most useful debugging for applications
ERROR
Error events may still allow applications to contin
TraceIn functions which, the details every parameter and operation to help diagnose subtle bugs.This should is enabled for specific areas of interest or the log volume would be overwhelming.Some system performance degradation should be expected.Define TRACE Logging LevelTRACE is a logging keyword, which is understood by the most logging tools.OpenStack have repur
ANNOTATION,SPRING,AOP concepts such as this is not introduced here, the relevant knowledge on the Internet in a large pile, but also the major companies interview must test content. A large part of the current AOP technology scenario should be used to implement operational logging, since almost every company has its own development framework, and many frameworks are highly encapsulated in such operations as CRUD, and the service
Guidance:
MySQL has four transaction isolation levels: Read-uncommitted, Read-committed, Repeatable-read, and Seriailizable. I believe everyone knows their similarities and differences, if you are not clear, you can refer to another technical article: transaction and lock details of MySQL_InnoDB. However, the performance differences and application scenarios between the second and third isolation levels are prone to some misunderstandings, especially those who are familiar with Oracle, for this
process such asStandardize code management with daily builds Daily builds, in addition to resolving some version integration issues, can also be prescriptive about the programmer's source code check-in behavior.As we all know, if the programmer does not follow a certain specification check-in, check out the source code, it is likely to lead to other programmers code module failure or confusion. A correct and prudent approach should be to get all the new versions and compile all the code before
Application protection level for IIS:
A. Low (IIS Process): Web applications run in the Inetinfo.exe process with the highest performance, but with the greatest risk, when an application error occurs, the entire IIS server may be unavailable.
B. In (common): All applications at this
Under the primary domain name (first.com) new two domain name (sub.first.com), first need to add a record to the domain Name service provider, the level two domain name point to your server IP, the following is two examples:
GoDaddy configuration level two domain name:
Dnsprod configuration Level two domain name:
A record is configured to wait a perio
Because IIS 7 employs a more secure Web. config management mechanism, the configuration items are locked by default and do not allow changes. Run the command line%windir%\system32\inetsrv\appcmd unlock config-section:system.webserver/handlers.The handlers is the name of the node in the error message that is displayed in red characters.If modules is also locked, you can run%windir%\system32\inetsrv\appcmd unlock config-section:system.webserver/modulesN
The internationalization of ASP. Publishing to IIS with resource files error: compiler errors message: CS0122: "Resources.resource" is not accessible because it is protected by a level limitLater on the internet for a long time, only to find a solutionSelect the build action as "content" on the resource file properties, and do not select "Embedded Resource"The internationalization of an ASP. NET Web site is
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.