但是您可能并不始终具有访问日志的权限,或者并不总是能够登录到浏览器来获取信息。
But, you may not always have access to the logs or want to be logged in to your browser to get the information.
例如,如果您已使用日期对访问日志归档,则可以选择在某个特定日期范围内的所有文件。
For example, if you have filed your access logs using dates, you can then select all of the files within a specific range of dates.
默认情况下,审计日志(比如违规访问)被发送到安全服务器。
Audit logs, for things such as access violations, are sent to the security server by default.
客户端提供了一组API,业务应用程序通过它能够访问日志客户端。
The client provides an API through which the business application can access the logging client.
用户空间提供了许多读取和管理内核日志的访问方法。
User space provides a number of access points for reading and managing kernel logging.
事件(比如违规访问)审计日志还可以由安全服务器管理。
Audit logs for events such as access violations can also be managed by the security server.
服务提供商分析其访问日志,并为客户提供有关用户请求什么内容和在什么时间发出请求的报告。
The service provider analyzes its access logs and provides its customer with reports about what was requested and when.
作业分配器将单个作业日志存储在提交者可以访问的位置。
Job Dispatcher stores the single job log in a location where the submitter can access it.
访问日志记录包含关于请求的大量详细信息,包括请求类型、请求的资源和处理请求的日期和时间。
An access log record contains a lot of detail about the request, including the request type, the resource requested, and the time and date the request was processed.
对恢复日志的访问只有在持有排它锁定时进行。
Access to a recovery log is only performed when the exclusive lock is held.
使用文件锁定确保对组成恢复日志的文件的排它访问。
File locking is used to ensure exclusive access to the files that make up a recovery log.
它的做法是:使用一个名称或电子邮件地址来命名每一个个体的网站访问日志。
It works like this: An individual logs into a website using a name or E-mail address.
当操作者使用手动对等恢复引发对出现故障的服务器的对等恢复处理时,可对恢复日志进行强制访问。
When using manual peer recovery, this access is enforced by the operator who only triggers peer recovery processing for servers that are unavailable.
数据访问服务:这些服务负责数据访问授权、限制和日志记录。
Data access services: These services are responsible for authorization, restrictions and logging access to data.
因此,建议您使用审核日志视图,并且不要直接访问该审核日志表格。
It is, therefore, recommended that you use the audit log views and do not access the audit log table directly.
它统计每个请求的有关IP地址、应该连接、和用户帐户的异常分数,当出现较高的异常分数时,会记录日志并完全的阻止访问。
It keeps anomaly scores for each request, IP addresses, application sessions, and user accounts. Requests with high anomaly scores are either logged or rejected altogether.
此技巧产生的结果是会更多地采用的并发的方式来访问存储以持久化事务信息,以便更快地访问日志中的数据。
This technique yields more concurrent access to storage for persisting transaction information, and faster access to that data from the logs.
访问数据库中的审核日志数据。
想一想web服务器的访问日志,其中每一行都重复了IP地址和浏览器代理,这虽然占用了空间但却简化了批量处理。
Think of the access log of a web server where the IP address and browser agent are repeated in every row, taking up space but simplifying bulk processing.
编写JDBC应用程序来访问审核日志数据。
以下部分逐步指导用户通过单一服务器IBMCognos10windows安装上的一个http连接进行访问日志所必需的设置。
The following section will step a user through the setup required to access the logs through an HTTP connection from a single server IBM Cognos 10 Windows install.
在本例中,您想从Apache访问日志开始,将其转换为一个数据集,这个数据集包含您正从各种浏览器收到的那些请求。
In this example you want to start with Apache access logs and turn this into a dataset that just contains how many requests you are getting from the various browsers.
每个S3bucket可以有访问日志记录,其中包含每个对象请求的详细信息。
Each S3 bucket can have access log records that contain details on each request for a contained object.
HPEL还提供了更灵活的日志和跟踪数据访问。
HPEL also provides more flexible access to log and trace data.
其他的应用领域还包括侵入检测、Web日志分析、数据库访问模式等等。
Other application areas include intrusion detection, web log analysis, database access patterns, and so on.
服务器访问日志记录所有Web 服务器活动,包括关于每个请求的以下信息
The server access log records all Web server activity, including the following information for each request
在默认的情况下,该payroll组下的所有用户均拥有访问此日志文件的权限。
By default, all users under the payroll group are allowed to access this log file.
即使您可能认为将Web民意测验和访问日志数据看作实验的结果是多此一举,但这样做确实很重要。
Even if you consider it a stretch to think of Web polls and access log data as the results of an experiment, it is critical for you to do so.
从前在Linux平台上,用户根本没有办法(非命令行)访问IM聊天日志。
Until recently on Linux, there was no user accessible (non-command line) way to access IM chat logs at all.
在示例中,您使用Hadoop处理Apacheweb服务器访问日志。
In the example, you used Hadoop to process Apache web server access logs.
应用推荐