![]() |
|
![]() |
Brief introduction of log file formatsYou can choose the format that your Web server uses to record user activity. The following formats are available: |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
The W3C Extended log file format, Microsoft IIS log file format, and NCSA log file format are all ASCII text formats. The W3C Extended and NCSA formats record logging data in four-digit year format. The W3C Extended log file format provides the most features of all of the log formats because you can customise the fields which are logged thereby reducing the size of log files. W3C Extended Log File FormatW3C Extended format is a customizable ASCII format with a variety of different fields. ![]() ![]() ![]() The example below shows lines from a file using the following fields: Time, Client IP Address, Method, URI Stem, HTTP Status, and HTTP Version. #Software: Microsoft Internet Information Services 5.0 #Version: 1.0 #Date: 1998-05-02 17:42:15 #Fields: time c-ip cs-method cs-uri-stem sc-status cs-version 17:42:15 172.16.255.255 GET /default.htm 200 HTTP/1.0 The preceding entry indicates that: ![]()
![]() ![]() ![]() Any of the fields can be selected, but some fields may not have information available for some requests. For fields that are selected, but for which there is no information, a dash (—) appears in the field as a placeholder. If you have your site configured for Anonymous user authentication the user shows as a dash (—). Microsoft IIS Log FormatMicrosoft IIS format is a fixed (non-customizable) ASCII format. It records more items of information than the NCSA Common format. The Microsoft IIS format includes basic items such as: ![]() ![]() ![]() ![]() ![]() In addition, it includes detailed items such as: ![]() ![]() ![]() ![]() ![]() When you open a Microsoft IIS format file in a text editor, the entries are similar to the following examples: 192.168.114.201,—,03/20/98,7:55:20,W3SVC2,SALES1,192.168.114.201,4502,163,3223,200,0,GET,DeptLogo.gif The preceding sample entries are interpreted as follows: ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() So as text we have: ![]() ![]() ![]()
In the log file: ![]() ![]() NCSA Common format is a fixed (non-customizable) ASCII format, available for Web sites but not for FTP sites. It records basic information about user requests, such as: ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() When you open an NCSA Common format file in a text editor, the entries are similar to the following example: 172.21.13.45 — REDMOND\fred [08/Apr/1997:17:39:04 -0800] Note: In the preceding entry, the second field (which would show the remote log name of the user) is empty and is represented by the hyphen following the IP address 172.21.13.45. The preceding sample entry is interpreted as follows: ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() The entry indicates that a user named Fred in the REDMOND domain, with the IP address of 172.21.13.45, issued an HTTP GET command (that is, downloaded a file) at 5:39 P.M. on April 8, 1998. The request returned, without error, 3401 bytes of data to the user named Fred. ODBC LoggingODBC logging format is a record of a fixed set of data fields in an ODBC-compliant database, such as Microsoft Access or Microsoft SQL Server. Some of the items logged are: ![]() ![]() ![]() ![]() ![]() ![]()
![]() ![]() ![]() To use ODBC logging, you must complete the following steps:
Process accounting is a new feature in IIS 5+. It adds additional fields to the W3C Extended log file to record information about how Web sites use CPU resources on the server. This information is used to determine if sites are using a disproportional amount of CPU resources, or to detect malfunctioning scripts or CGI processes. Process accounting can be enabled on a per-site basis. It does not provide details: ![]() ![]() ![]() ![]() The process accounting information is interspersed with other logging information in the file. To enable process accounting use the following procedure:
The information gained from process accounting can be used to determine if process throttling should be enabled on a Web site. Process throttling limits the amount of processor time a Web site can use - Process throttling can cause clients to be denied access to your web site. Log File Size and the Creation of New Log FilesWhen IIS logging is enabled, as it is by default, new log entries are generated whenever users are accessing the server. This causes a progressive increase in log file size or in the number of log files. You may need to balance the gathering of detailed data against the need to limit files to a manageable size and number. IIS offers two options for managing the generation of log data and the creation of new log files. One way to manage log data is to use W3C Extended logging and customize it so that you gather only the data you need. Another option for managing log files is to limit log size by changing the frequency of log file creation. Log files are simply ASCII (text) files. If you find you have created many small files when you prefer one large file, you can combine the files by using the copy command. Note: If your server runs out of disk space when IIS is attempting to add a log entry to a file, IIS logging shuts down. At the same time, in the Application log of Windows Event Viewer, an event is logged. When disk space is once again available, IIS logging resumes. This causes an additional event to be logged in the Application log of Windows Event Viewer. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
Home | Features | Free Trial | Buy Now! | Support Contact us | Privacy Policy | Reseller Copyright © 2001-2014 Nihuo Software,Inc |