工欲善其事 its prerequisiteThe Java development in the eyes of Stormy, an old Domino programmer, I mentioned the large number of logs that are being encountered in Java development. Server Console Brush-like scrolling, log files grow rapidly, debug when the relevant information is often flooded with examples, in many logger gushing output, to find out where the error is sometimes very cost-effective eye. The role of the
Assembly Binding Log Viewer (Fuslogvw.exe)
The Assembly Binding Log Viewer displays detailed information about the failed assembly bindings. This information helps you diagnose why the. NET Framework cannot find an assembly at run time. These failures are usually caused by an assembly deployment to the wrong location
When problems occur with our Windows system, the simplest way to analyze and locate failures is to use Event Viewer, such as Event Viewer in Windows XP, to let us analyze system logs, application logs, and security logs to find clues to possible problems. However, objectively speaking, before the Windows version includes the Windows XP Event Viewer in the use of
Carly Jacobson wrote that the server log is a log file created and updated by a server. A common example is the access log generated by Apache (open source Web server software), which provides a history of Web page requests. However, Apache does not just collect access information, it also collects information about error logs, and collects ID file processes, scr
What if the event log file is corrupted?
As one of the administrative tools included in the Microsoft Management Console, Event Viewer is used to maintain log information on your computer for related programs, security features, and system events. You can browse and manage event logs through Event Viewer, collect va
Apache Log Viewer is a relatively good log analysis software abroad, there is no Chinese version of the download. Analysis interface as shown:
You can customize the view of the breakdown information, such as IP, address, access date, access page, access status, routing address, browse identification (User Agent) as shown: (Open step: Edit->preferences->c
You can use the Event Log Service in the event viewer to view the computer's on and off time. Because the Event Log service starts and closes along with the computer, and records the event log.
It is necessary to introduce two IDCs: 6006 and 6005. In the event viewer, an
Mode one: Nginx cronolog log partition configuration document, according to the following method, split the Nginx access log every minute.1. nginx Log configuration access_log access_log/data/access_log_pipe main;2. Create a named
One. Nginx error logNginx software will log the fault information of its own operation and the logged information of user access to the specified log file.Typically in the second line of the nginx.conf configuration file, add:Error_log Logs/error.log error;↓↓↓Keyword log file log
TM Chat Log viewer (hint: Register 1 sets, can be used on 3 pcs) The software can view TM chat records without a password.
Use the method, run directly, then select the TM number you want to read, and then click the number you want to view the chat record. The software can see the previous chat record of installing the software.
Note: The software must be installed to the target number to use the computer
The SharePoint ULS Log Viewer project description is a Windows application that makes it easier to view SharePoint ULS log files. Supports filtering and simple views.Information: This is a WPF application, which is supported by LINQ. The current version has the following features: 1. Convert and open multiple SharePoint ULS logs (if multiple or merged logs are se
Nginx default log is unified write to the installation directory under the log, access log is Access.log, error log is Error.log
And does not provide a configurable place, for the production environment, the log is concentrated to
started with the following SQL statement:SELECT * FROM Msdb.dbo.sysjobhistorywhere step_id=0 and job_id= (select job_id from msdb.dbo.sysjobs where [name]= ' Job name ')and run_dateBecause I added a step_id query condition, so the first time cleaning did not clean up, the actual amount of data is still very large, because only delete a state of the2, to delete:Delete from Msdb.dbo.sysjobhistorywhere job_id= (select job_id from msdb.dbo.sysjobs where [name]= ' Job name ')and run_dateBecause my j
First, let's take a look at nginx log configurationLogs are advantageous for troubleshooting statistics. This article summarizes nginx log-Related configurations such as access_log, log_format, open_log_file_cache, log_not_found, log_subrequest, rewrite_log, and error_log.Nginx has a flexible logging mode. Each con
Nginx view log, nginx log
Nginx logs include access logs and error logs.
The access log records the users, pages, user browsers, ip addresses, and other access information.
The error log
Nginx log splitting script and nginx log splitting script#! /Bin/bash#01 00 ***/nginxlogs/ngx_logcut.sh>/dev/null 2> 1 # the script can be automatically executed in a scheduled task.
Pidfile =/var/run/nginx. pid # nginx process p
Nginx installed after the general is to configure access log and error log, which access log we do not say here, you can refer to the previous article. Here is the main description of Nginx error log, this is known to all, open th
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.