From: Erik Abele
The error log is usually written to a file (typically
- error_log
on unix systems and
- error.log
on Windows and OS/2). On unix systems it
+ error_log
on Unix systems and
+ error.log
on Windows and OS/2). On Unix systems it
is also possible to have the server send errors to
syslog
or pipe them to a
program.
The first item in the log entry is the date and time of the
- message. The second entry lists the severity of the error being
+ message. The second item lists the severity of the error being
reported. The LogLevel
directive is used to control the types of errors that are sent
to the error log by restricting the severity level. The third
- entry gives the IP address of the client that generated the
+ item gives the IP address of the client that generated the
error. Beyond that is the message itself, which in this case
indicates that the server has been configured to deny the
client access. The server reports the file-system path (as
@@ -111,14 +111,14 @@
It is not possible to customize the error log by adding or removing information. However, error log entries dealing with - particular requests have corresponding entries in the access log. For instance, the above example + particular requests have corresponding entries in the access log. For example, the above example entry corresponds to an access log entry with status code 403. Since it is possible to customize the access log, you can obtain more information about error conditions using that log file.
During testing, it is often useful to continuously monitor - the error log for any problems. On unix systems, you can + the error log for any problems. On Unix systems, you can accomplish this using:
@@ -224,7 +224,7 @@
identd
on the client's
+ the client determined by identd
on the clients
machine. This information is highly unreliable and should
almost never be used except on tightly controlled internal
networks. Apache httpd will not even attempt to determine
@@ -240,7 +240,7 @@
code for the request (see below) is 401, then this value
should not be trusted because the user is not yet
authenticated. If the document is not password protected,
- this entry will be "-
" just like the previous
+ this part will be "-
" just like the previous
one.[10/Oct/2000:13:55:36 -0700]
@@ -293,7 +293,7 @@
2326
(%b
)-
". To log "0
" for no content, use
diff --git a/docs/manual/logs.xml.es b/docs/manual/logs.xml.es
index 11272d11cc5..d0e6e014e96 100644
--- a/docs/manual/logs.xml.es
+++ b/docs/manual/logs.xml.es
@@ -1,7 +1,7 @@
-
+
+
+