另有更易使用的apachetop和goaccess
wtop is really cool application for web server log analysis and to see server stats at a glance. It also has powerful log grepping capability. It is just like 'top' for your webserver.
It can find out number of searches or signups per seconds. It can also create histogram of response time. There is also another tool called logrep a powerful command-line program for ad-hoc analysis and filtering for log files. You can dig up lots of information using wtop tools.
You need Python version 2.5 to run wtop.
Type the following command:$ cd /tmp
$ wget .5.
$ tar -zxvf wtop-0.5.
$ cd wtop-0.5.6
# python setup.py install
Once installed you can start using the tool immediately. You need to edit /etc/wtop.cfg file to setup parameters, Apache log files and other directives# vi /etc/wtop.cfg
Sample configuration file:
[main] LOG_ROOT=/var/log/lighttpd/cyberciti.biz/ LOG_FILE=access.log DEFAULT_OUTPUT_FIELDS=ts,class,ipcnt,ip,msec,uas,url# This must match your webserver log format. You MUST have at least %h, %r and %D LOG_FORMAT=%h %l %u %t "%r" %>s %B "%{Referer}i" "%{User-Agent}i" %D[wtop] # max time before a request is logged in the "slow" column MAX_REQUEST_TIME=5000 # minimum requests/second before a URL class appears in top mode MIN_RPS=0.2 [classes] # you can extend these to make any classes you wish home=^/(?:?.*)?$ xml=.xml(?:?.*)?$ js=.js(?:?.*)?$ css=.css(?:?.*)?$ img=.(?:png|gif|jpe?g|cur|ico|bmp)(?:?.*)?$[patterns] # the generic pattern is applied if a line does not match any # of the named classes. By default it uses the top-level directory. generic=^/([^/?]+)# incomplete list of known web robots robots = r'(?:nutch|le|Feedster|Nutch|Gaisbot|Snapbot|VisBot|libwww|CazoodleBot|polybot|VadixBot|Sogou|SBider|BecomeBot|Yandex|Pagebull|chudo|Pockey|nicebot|entireweb|FeedwhipBOT|ConveraCrawler|NG/2.0|WebImages|Factbot|information-online|gsa-crawler|Jyxobot|SentinelCrawler|BlogPulseLive|YahooFeedSeeker|GurujiBot|wwwster|Y!J-SRD|Findexa|SurveyBot|yetibot|discoveryengine|fastsearch|noxtrum|Googlebot|Snapbot|OGSearchSpider|heritrix|nutch-agent|Slurp|msnbot|cuill|Mediapartners|YahooSeeker|GrabPERF|keywen|ia_archiver|crawler.archive|Baiduspider|larbin|shopwiki)'
Now simply type wtop at a shell prompt:$ wtop$
See all human traffic, enter:$ logrep -m top -h access.log
See response times for all MSNBot homepage hits:$ logrep -m grep -g MSNBot -i home -o status,msec,url access.log
Display the current log for traffic to pages about wordpress or themes sent from google$ logrep -m tail --f 'url~wordpress|themes,ref~google' access.log
本文发布于:2024-01-28 19:43:00,感谢您对本站的认可!
本文链接:https://www.4u4v.net/it/17064421859816.html
版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系,我们将在24小时内删除。
留言与评论(共有 0 条评论) |