Sun Java System Web Proxy Server 4.0.3 2006Q2 Administration Guide

ProcedureTo set the access log preferences for the Server Instance

Steps
  1. Access the Server Manager and click the Server Status tab.

  2. Click the Set Access Log Preferences link.

    The Set Access Log Preferences page displays.

  3. Select the resource from the drop-down list or click the Regular Expression button, enter a regular expression, and click OK.

  4. Specify whether or not to log client accesses.

    This requires Domain Name Service (DNS) to be enabled.

  5. Specify the absolute path for the access log file.

    As a default, the log files are kept in the logs directory in the server root. If you specify a partial path, the server assumes the path is relative to the logs directory in the server root.

    If you are editing the entire server, the default value for this field is $accesslog, the variable that denotes the access log file for the server in the configuration file.

  6. Choose whether or not to record domain names or IP addresses of the systems accessing the server in the access log.

  7. Choose the format the log file should be: common, extended, extended-2, only specified information (“Only log” radio button), or custom.

    If you click Only log, the following flexible log format items are available:

  8. Choose the type of log file format to use in the access log.

    Server access logs can be in Common Logfile Format, Extended Logfile Format, Extended2 Logfile format, flexible log format, or your own customizable format. The Common Logfile Format is a commonly supported format that provides a fixed amount of information about the server. The flexible log format allows you to choose (from Proxy Server) what to log. A customizable format uses parameter blocks that you specify to control what gets logged.

    • Use Common LogFile Format. Includes client’s host name, authenticated user name, date and time of request, HTTP header, status code returned to the client, and content length of the document sent to the client.

    • Use Extended LogFile Format. Includes all of the fields of the common log file format as well as some additional fields such as remote status, proxy to client content length, remote to proxy content length, proxy to remote content length, client to proxy header length, proxy to client header length, proxy to remote header length, remote to proxy header length and transfer time.

    • Use Extended2 LogFile Format. Includes all of the fields of the extended logfile format as well as some additional fields such as client status, server status, remote status, cache finish status, and actual route.

    • Only Log. Allows you to choose which information will be logged. You can choose from the following flexible log format items:

      • Client Hostname. The hostname (or IP address if DNS is disabled) of the client requesting access.

      • Authenticate User Name. If authentication was necessary, you can have the authenticated user name listed in the access log.

      • System Date. The date and time of the client request.

      • Full Request. The exact request the client made.

      • Status. The status code the server returned to the client.

      • Content Length. The content length, in bytes, of the document sent to the client.

      • HTTP Header, “referer”. The referer specifies the page from which the client accessed the current page. For example, if a user was looking at the results from a text search query, the referer would be the page from which the user accessed the text search engine. Referers allow the server to create a list of backtracked links.

      • HTTP Header, “user-agent”. The user-agent information--which includes the type of browser the client is using, its version, and the operating system on which it is running--comes from the User-agent field in the HTTP header information the client sends to the server.

      • Method. The HTTP request method used such as GET, PUT, or POST.

      • URI. Universal Resource Identifier. The location of a resource on the server. For example, for http://www.a.com:8080/special/docs, the URI is special/docs.

      • Query String Of The URI. Anything after the question mark in a URI. For example, for http://www.a.com:8080/special/docs?find_this, the query string of the URI is find_this.

      • Protocol. The transport protocol and version used.

      • Cache Finish Status.This field specifies whether the cache file was written, refreshed, or returned by an up-to-date check.

      • Remote Server Finish Status. This field specifies if the request to the remote server was successfully carried out to completion, interrupted by the client clicking the Stop button in Netscape Navigator, or aborted by an error condition.

      • Status Code From Server. The status code returned from the server.

      • Route To Proxy (PROXY, SOCKS, DIRECT). The route used to retrieve the resource. The document can be retrieved directly, through a proxy, or through a SOCKS server.

      • Transfer Time. The length of time of the transfer, in seconds or milliseconds.

      • Header-length From Server Response. The length of the header from the server response.

      • Request Header Size From Proxy To Server. The size of the request header from the proxy to the server.

      • Response Header Size Sent To Client. The size of the response header sent to the client.

      • Request Header Size Received From Client. The size of the request header received from the client.

      • Content-length From Proxy To Server Request. The length, in bytes, of the document sent from the proxy to the server.

      • Content-length Received From Client. The length, in bytes, of the document from the client.

      • Content-length From Server Response. The length, in bytes, of the document from the server.

      • Unverified User From Client. The user name given to the remote server during authentication.

    • If you choose a custom format, type it in the Custom Format field.

  9. If you do not want to log client access from certain host names or IP addresses, type them in the host names and IP Addresses fields.

    Type a wildcard pattern of hosts from which the server should not record accesses. For example, *.example.com does not log accesses from people whose domain is example.com. You can type wildcard patterns for host names, IP addresses, or both.

  10. Choose whether to include the format string in the log file.

    If you are using the Proxy Server’s log analyzer, you should include a format string. If you are using a third-party analyzer, you may not want to include a format string in your logfile.

  11. Click OK.

  12. Click Restart Required.

    The Apply Changes page appears.

  13. Click the Restart Proxy Server button to apply the changes.