![]() ![]() The amount of data transferred, in kilobytes, is displayed as well.įigure 21-5 shows an example of a webalizer output file for a Web server that has been running for several months. It also shows data for the number of visits and the number of sites that visited in the right column. On the bar chart, for each month a green bar represents the number of hits on the Web site, the dark blue bar shows the number of different files hit, and the light blue bar shows the number of pages opened. The output report shows a 12-month summary of Web server activity. Based on the information in the /etc/nf file, the /var/log/httpd/access_log log file is read and an index.html file is copied to the /var/For example, you could type the following: If all goes well, the command should run for a few moments and exit silently. To use the defaults, simply run the following: As an alternative, you can use command-line options to override settings in the nf file. You can run webalizer with no options and have it take the values in the /etc/nf files to get the information it needs. ![]() To use the webalizer command, the webalizer package must be installed. Information is produced in both table and graph form. Those reports are created in HTML format so you can display the information graphically. Technical details Remote Address: 49.195.190. More details can be found in the server log. If this happens again, please send the technical details below to the server administrator. The webalizer command can take Apache log files and produce usage reports for your server. The server was unable to complete your request. To accomplish this, simply change the filename in the Location directive, as in the lines below: If all of your lines are corrupted and the LogFormat parameter in AWStats configuration file is correct, then there may be a setup problem with your web server log format. This is an example of "security through obscurity," which should not be relied on but which can make it just a little more difficult for unauthorized individuals to obtain information about your Web server's configuration (particularly if you cannot restrict such connections to the local network). It may also be beneficial to change the URL used to reference both of the aforementioned pages. Also, be aware that, in the wrong hands, the information displayed by the server-info and server-status pages can make it much easier for the security of your entire machine to be compromised. If you must allow other machines or networks access to such detailed configuration information, allow only as many machines as is necessary, and preferably only those machines on your local network. You can restrict that information only to the local host however, in some environments that may not be practical. Further security of server-info and server-statusīecause both the server-info and server-status pages contain private information that should not be accessible to just anyone on the network, there are a few extra ways you can secure that information. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |