此外,还可以在ADC本身中执行访问日志记录。
Or you might be able to perform your access logging on the ADC itself.
客户端提供了一组API,业务应用程序通过它能够访问日志客户端。
The client provides an API through which the business application can access the logging client.
访问日志是一个列表的所有请求人请求的单个文件从一个网站。
An access log is a list of all the requests for individual files that people have requested from a Web site.
在示例中,您使用Hadoop处理Apacheweb服务器访问日志。
In the example, you used Hadoop to process Apache web server access logs.
它的做法是:使用一个名称或电子邮件地址来命名每一个个体的网站访问日志。
It works like this: An individual logs into a website using a name or E-mail address.
服务器访问日志记录所有Web 服务器活动,包括关于每个请求的以下信息
The server access log records all Web server activity, including the following information for each request
对于此应用程序来说,URL作为键来服务(从Web服务器访问日志摄取)。
For this application, the URLs serve as the keys (as ingested from the Web server access logs).
每个S3bucket可以有访问日志记录,其中包含每个对象请求的详细信息。
Each S3 bucket can have access log records that contain details on each request for a contained object.
但是您可能并不始终具有访问日志的权限,或者并不总是能够登录到浏览器来获取信息。
But, you may not always have access to the logs or want to be logged in to your browser to get the information.
例如,如果您已使用日期对访问日志归档,则可以选择在某个特定日期范围内的所有文件。
For example, if you have filed your access logs using dates, you can then select all of the files within a specific range of dates.
例如,出于本文目的我创建了一个大约一兆字节的Apache访问日志文件的XML表示。
For example, for purposes of this article I created an XML representation of an approximately 1 Megabyte Apache access logfile.
服务提供商分析其访问日志,并为客户提供有关用户请求什么内容和在什么时间发出请求的报告。
The service provider analyzes its access logs and provides its customer with reports about what was requested and when.
访问日志记录包含关于请求的大量详细信息,包括请求类型、请求的资源和处理请求的日期和时间。
An access log record contains a lot of detail about the request, including the request type, the resource requested, and the time and date the request was processed.
即使您可能认为将Web民意测验和访问日志数据看作实验的结果是多此一举,但这样做确实很重要。
Even if you consider it a stretch to think of Web polls and access log data as the results of an experiment, it is critical for you to do so.
幸运的是,你可以做到这一点的访问日志,通过一个内置的情侣在命令和变量的日志少数。
Luckily, you can do that with the access logs through a couple built-in commands and a handful of log variables.
此技巧产生的结果是会更多地采用的并发的方式来访问存储以持久化事务信息,以便更快地访问日志中的数据。
This technique yields more concurrent access to storage for persisting transaction information, and faster access to that data from the logs.
想一想web服务器的访问日志,其中每一行都重复了IP地址和浏览器代理,这虽然占用了空间但却简化了批量处理。
Think of the access log of a web server where the IP address and browser agent are repeated in every row, taking up space but simplifying bulk processing.
在本例中,您想从Apache访问日志开始,将其转换为一个数据集,这个数据集包含您正从各种浏览器收到的那些请求。
In this example you want to start with Apache access logs and turn this into a dataset that just contains how many requests you are getting from the various browsers.
实验结果表明,这种实现能有效地对用户访问日志进行聚类,并能满足服务器预取机制在线分析的时间、空间要求。
Experimental results show that the implementation can cluster the user access logs effectively, and the temporal and special efficiency can meet the on-the-fly need of Web server pre-fetching.
如果您有多个虚拟主机服务器的名称记录(应为每个主机设定)会帮助你看到哪些连接,用于记录到的地点在相同的访问日志。
If you have multiple virtual hosts logging to the same access log, recording the server name (which should be set for each host) will help you see which connection was for which site.
以下部分逐步指导用户通过单一服务器IBMCognos10windows安装上的一个http连接进行访问日志所必需的设置。
The following section will step a user through the setup required to access the logs through an HTTP connection from a single server IBM Cognos 10 Windows install.
Apache的访问日志就是一个好例子;负载大的Web服务器可能在几分钟内生成数以千计的日志消息,每个消息都提供详细的信息,这其实用处不大。
Apache's access log is a good example-heavily used Web servers can generate thousands of log messages in a few minutes, each of which provides detailed information that isn't really useful.
之所以使用POST方法而不是GET方法,是因为GET方法的URL会被记录到Domino日志中,任何访问日志的用户都能看到您的用户名和口令——而且是明文。
You use the POST method instead of the GET method because URLs of the GET method are logged in the Domino log, and anyone who accesses the log can see the user name and password in plain text.
在前滚过程中可以更改此配置参数以允许您访问多个位置中的日志。
You can change this configuration parameter during the roll-forward process to allow you to access logs in multiple locations.
默认情况下,审计日志(比如违规访问)被发送到安全服务器。
Audit logs, for things such as access violations, are sent to the security server by default.
用户空间提供了许多读取和管理内核日志的访问方法。
User space provides a number of access points for reading and managing kernel logging.
事件(比如违规访问)审计日志还可以由安全服务器管理。
Audit logs for events such as access violations can also be managed by the security server.
对恢复日志的访问只有在持有排它锁定时进行。
Access to a recovery log is only performed when the exclusive lock is held.
使用文件锁定确保对组成恢复日志的文件的排它访问。
File locking is used to ensure exclusive access to the files that make up a recovery log.
使用文件锁定确保对组成恢复日志的文件的排它访问。
File locking is used to ensure exclusive access to the files that make up a recovery log.
应用推荐