From: (no author) <(no author)@unknown> Date: Mon, 12 Apr 2004 17:23:20 +0000 (+0000) Subject: This commit was manufactured by cvs2svn to create branch X-Git-Tag: 2.0.50~214 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=04ff272af0f9ce385ff82e78da5c5e8d5d73f837;p=thirdparty%2Fapache%2Fhttpd.git This commit was manufactured by cvs2svn to create branch 'APACHE_2_0_BRANCH'. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/APACHE_2_0_BRANCH@103357 13f79535-47bb-0310-9956-ffa450edef68 --- diff --git a/docs/manual/mod/mod_log_forensic.html.en b/docs/manual/mod/mod_log_forensic.html.en new file mode 100644 index 00000000000..c6d2c98b3d4 --- /dev/null +++ b/docs/manual/mod/mod_log_forensic.html.en @@ -0,0 +1,160 @@ + + +
+Apache HTTP Server Version 2.1
+Available Languages: en
+Description: | Forensic Logging of the requests made to the server |
---|---|
Status: | Extension |
Module Identifier: | log_forensic_module |
Source File: | mod_log_forensic.c |
Compatibility: | mod_unique_id is no longer required since
+version 2.1 |
This module provides for forensic logging of client + requests. Logging is done before and after processing a request, so the + forensic log contains two log lines for each request. + The forensic logger is very strict, which means:
+ +CoreDumpDirectory
+ configuration).The check_forensic
script, which can be found in the
+ distribution's support directory, may be helpful in evaluating the
+ forensic log output.
Each request is logged two times. The first time before it's + processed further (that is, after receiving the headers). The second log + entry is written after the request processing at the same time + where normal logging occurs.
+ +In order to identify each request, a unique request ID is assigned.
+ This forensic ID can be cross logged in the normal transfer log using the
+ %{forensic-id}n
format string. If you're using
+ mod_unique_id
, its generated ID will be used.
The first line logs the forensic ID, the request line and all received
+ headers, separated by pipe characters (|
). A sample line
+ looks like the following (all on one line):
+ +yQtJf8CoAB4AAFNXBIEAAAAA|GET /manual/de/images/down.gif
+ HTTP/1.1|Host:localhost%3a8080|User-Agent:Mozilla/5.0 (X11;
+ U; Linux i686; en-US; rv%3a1.6) Gecko/20040216
+ Firefox/0.8|Accept:image/png, etc...
+
The plus character at the beginning indicates that this is first log + line of this request. The second line just contains a minus character and + the ID again:
+ +
+ -yQtJf8CoAB4AAFNXBIEAAAAA
+
The check_forensic
script takes as its argument the name
+ of the logfile. It looks for those +
/-
ID pairs
+ and complains if a request was not completed.
See the security tips + document for details on why your security could be compromised + if the directory where logfiles are stored is writable by + anyone other than the user that starts the server.
+Description: | Sets filename of the forensic log |
---|---|
Syntax: | ForensicLog filename|pipe |
Context: | server config, virtual host |
Status: | Extension |
Module: | mod_log_forensic |
The ForensicLog
directive is used to
+ log requests to the server for forensic analysis. Each log entry
+ is assigned a unique ID which can be associated with the request
+ using the normal CustomLog
+ directive. mod_log_forensic
creates a token called
+ forensic-id
, which can be added to the transfer log
+ using the %{forensic-id}n
format string.
The argument, which specifies the location to which + the logs will be written, can take one of the following two + types of values:
+ +ServerRoot
.|
", followed by the path
+ to a program to receive the log information on its standard
+ input. The program name can be specified relative to the ServerRoot
directive.
+
+ If a program is used, then it will be run as the user who + started httpd. This will be root if the server was started by root; + be sure that the program is secure or switches to a less privileged + user.
+When entering a file path on non-Unix platforms, care should be taken + to make sure that only forward slashed are used even though the platform + may allow the use of back slashes. In general it is a good idea to always + use forward slashes throughout the configuration files.
+Available Languages: en
+This module provides for forensic logging of client + requests. Logging is done before and after processing a request, so the + forensic log contains two log lines for each request. + The forensic logger is very strict, which means:
+ +The check_forensic
script, which can be found in the
+ distribution's support directory, may be helpful in evaluating the
+ forensic log output.
Each request is logged two times. The first time before it's + processed further (that is, after receiving the headers). The second log + entry is written after the request processing at the same time + where normal logging occurs.
+ +In order to identify each request, a unique request ID is assigned.
+ This forensic ID can be cross logged in the normal transfer log using the
+ %{forensic-id}n
format string. If you're using
+
The first line logs the forensic ID, the request line and all received
+ headers, separated by pipe characters (|
). A sample line
+ looks like the following (all on one line):
The plus character at the beginning indicates that this is first log + line of this request. The second line just contains a minus character and + the ID again:
+ +The check_forensic
script takes as its argument the name
+ of the logfile. It looks for those +
/-
ID pairs
+ and complains if a request was not completed.
See the security tips + document for details on why your security could be compromised + if the directory where logfiles are stored is writable by + anyone other than the user that starts the server.
+The forensic-id
, which can be added to the transfer log
+ using the %{forensic-id}n
format string.
The argument, which specifies the location to which + the logs will be written, can take one of the following two + types of values:
+ +|
", followed by the path
+ to a program to receive the log information on its standard
+ input. The program name can be specified relative to the If a program is used, then it will be run as the user who + started httpd. This will be root if the server was started by root; + be sure that the program is secure or switches to a less privileged + user.
+When entering a file path on non-Unix platforms, care should be taken + to make sure that only forward slashed are used even though the platform + may allow the use of back slashes. In general it is a good idea to always + use forward slashes throughout the configuration files.
+