Each S3 bucket can have access log records that contain details on each request for a contained object.
每个S3bucket可以有访问日志记录,其中包含每个对象请求的详细信息。
The server access log records all Web server activity, including the following information for each request
服务器访问日志记录所有Web 服务器活动,包括关于每个请求的以下信息
An access log is a list of all the requests for individual files that people have requested from a Web site.
访问日志是一个列表的所有请求人请求的单个文件从一个网站。
Even if you consider it a stretch to think of Web polls and access log data as the results of an experiment, it is critical for you to do so.
即使您可能认为将Web民意测验和访问日志数据看作实验的结果是多此一举,但这样做确实很重要。
Think of the access log of a web server where the IP address and browser agent are repeated in every row, taking up space but simplifying bulk processing.
想一想web服务器的访问日志,其中每一行都重复了IP地址和浏览器代理,这虽然占用了空间但却简化了批量处理。
An access log record contains a lot of detail about the request, including the request type, the resource requested, and the time and date the request was processed.
访问日志记录包含关于请求的大量详细信息,包括请求类型、请求的资源和处理请求的日期和时间。
If you have multiple virtual hosts logging to the same access log, recording the server name (which should be set for each host) will help you see which connection was for which site.
如果您有多个虚拟主机服务器的名称记录(应为每个主机设定)会帮助你看到哪些连接,用于记录到的地点在相同的访问日志。
Apache's access log is a good example-heavily used Web servers can generate thousands of log messages in a few minutes, each of which provides detailed information that isn't really useful.
Apache的访问日志就是一个好例子;负载大的Web服务器可能在几分钟内生成数以千计的日志消息,每个消息都提供详细的信息,这其实用处不大。
For instance, most important system processes, such as E-mail transport and remote access, continuously log activity, appending each new entry to the end of the file.
例如,最重要的一些系统处理,如电子邮件传输和远程访问、持续日志记录活动,都会在文件的末尾添加新的条目。
To maintain the integrity of a recovery log file, only a single client process can access the log at a time; this access can be assured using the exclusive network file locks discussed previously.
要保持恢复日志文件的完整性,一次只能允许单个客户端流程对其进行访问。 通过使用先前讨论到的排它网络文件锁定来确保访问的进行。
Once logged in, users must have access to any part of the application without having to log in again during a single visit (unless they log off).
一旦登录进去,用户必须具有对应用的任意部分的访问权,而无需在单次访问期间再登录一次(除非他们已注销了)。
Job Dispatcher stores the single job log in a location where the submitter can access it.
作业分配器将单个作业日志存储在提交者可以访问的位置。
It is, therefore, recommended that you use the audit log views and do not access the audit log table directly.
因此,建议您使用审核日志视图,并且不要直接访问该审核日志表格。
Whenever you access audit log data for BPEL processes, you should use the AUDIT_LOG_B view to do this.
无论您何时访问用于BPEL流程的审核日志数据,都应该使用 AUDIT_LOG_B视图来完成该操作。
File locking is used to ensure exclusive access to the files that make up a recovery log.
使用文件锁定确保对组成恢复日志的文件的排它访问。
A requirement of a recovery log is that only one server has access to it (either for recovery processing or standard logging) at any time.
对于恢复日志来说,要求任何时间都只能有一台服务器对其进行访问(恢复处理或是标准的日志记录)。
Access to the log buffer is provided at the core through the multi-purpose syslog system call.
多用途的syslog系统调用提供了内核的日志缓冲区访问方法。
Customizable log entries for Access and Error logs and compression statistics.
具有针对访问和错误日志以及压缩统计数据的定制日志条目。
Other application areas include intrusion detection, web log analysis, database access patterns, and so on.
其他的应用领域还包括侵入检测、Web日志分析、数据库访问模式等等。
To prevent such problems from occurring, WebSphere Application Server USES network file locking technology to ensure exclusive access to recovery log files.
要避免这样的危险发生,WebSphereApplicationServer使用网络文件锁定技术来确保对恢复日志文件的排它访问。
GRANT: Provides any user on any host the ability to access the db2 backup images and log files associated with databases generated on the node issuing the GRANT option.
GRANT:为任意主机上的任意用户提供访问db2备份镜像和日志文件的能力,这些镜像和日志文件与发出GRANT选项的节点上生成的数据库有关。
WebSphere Application Server offers performance benefits, such as statement caching and allows you to access audit log information from any remote location using a Web browser.
WebSphereApplicationServer提供了可以提高性能的优点,例如语句的缓存功能,并且允许用户使用Web浏览器从任意远程位置来访问审核日志信息。
Customizable log entries for HTTP access and compression statistics.
具有针对HTTP访问和压缩统计数据的定制日志条目。
Commands such as SVN log, which access many different paths and revisions, are much more dependent on the authentication method.
诸如svnlog之类的访问很多路径的命令对认证方法的依赖则强得多。
Many WebSphere Application Server processes need read access to numerous files and write access to the log and transaction directories.
许多WebSphereApplicationServer进程都需要对无数文件具有读访问权限,并且对log和transaction目录具有写访问权限。
Users first must log in to access the system; they can then view the client list and details about each client.
用户首先必须登录以访问系统;然后他们能浏览客户列表和每个客户的详细信息。
You can log in to any computer within the organization and have automatic access to your e-mail.
您可以登录组织内的任何计算机并获得对您的电子邮件的自动访问。
As an example scenario, if the user repeatedly attempts to access the site, but fails to log on with the correct password, access is denied.
作为一个场景示例,如果用户反复尝试访问站点,但是没有使用正确的口令登录,访问就被拒绝。
As an example scenario, if the user repeatedly attempts to access the site, but fails to log on with the correct password, access is denied.
作为一个场景示例,如果用户反复尝试访问站点,但是没有使用正确的口令登录,访问就被拒绝。
应用推荐