In contrast to other process choreographer database tables, the audit log entries are not deleted automatically when a process completes or on a delete request.
与其它流程编排器数据库表相比,该审核日志条目并没有在流程结束或者有删除请求时被自动删除。
An access log record contains a lot of detail about the request, including the request type, the resource requested, and the time and date the request was processed.
访问日志记录包含关于请求的大量详细信息,包括请求类型、请求的资源和处理请求的日期和时间。
The default log level should be WARN which will write a message to the log file only if a request has been blocked.
默认的日志记录级别应该是WARN,它只在已经阻止了请求的情况下在日志文件中写消息。
When the database is configured to retain logs, each time a log is filled, a request is issued for allocation and initialization of a new log.
当将数据库配置成保留日志,每当写满一个日志时,就会发出一个分配和初始化一个新日志的请求。
If you now run the test again, both verification points pass, and if you look at the details in the test log, all of the appropriate values are in each request and response XML.
如果现在您再次运行测试,两个校验点都会通过,如果查看测试日志中的细节信息,所有的使用值都在每一个请求和响应XML中。
If this is not the case — in other words, if any given request can potentially be handled by multiple machines — analyzing the log messages in different log files becomes more difficult.
如果不是这种情况——换而言之,如果任何给定的请求都可以由多台机器进行处理——那么对不同日志文件中的日志消息进行分析就会变得更加困难。
Keep a log of all service providers connected to it, so that it can route a service-consumption request from a service consumer to the appropriate service provider.
记录所有连接的服务提供者,以便它能将服务使用请求从服务使用者路由到正确的服务提供者。
Figure 5 shows the detailed (and structured) content from a SOAP request used to log status information.
图5显示了一个来自SOAP请求用于记录状态信息的详细(且结构清晰的)信息。
If the user credentials are not provided while connecting, DB2 implicitly USES the user id and password that were used to log in to the workstation where the request originated.
在连接时如果没有提供用户凭证,DB2将使用用来登录到发出请求的工作站的用户ID和密码。
You can confirm this by retrieving the resource via a GET request, or you can log into the WebSphere CloudBurst administrative console and view the hypervisor.
可以通过两种方法来确认这一点:通过一个GET请求来检索这个资源,或者登录到WebSphereCloudBurst管理控制台并查看这个系统管理程序。
To make tests into objects, they used the Command pattern, which encapsulates "a request as an object, thereby letting you […] queue or log requests."
为了使测试成为对象,他们使用了Command模式,该模式“将请求封装成对象,从而可以……建立请求队列或者记录请求”。
Figure 6 shows a sample request message flow log in the Database Explorer for V6.
图6显示了V6的DatabaseExplorer中的示例请求消息流日志。
The request message flow receives the Web service request, writes it to the PROVIDER queue and completes (after writing a message to the LOG queue).
请求消息流接收Web服务请求,并将其写到PROVIDER队列,直至最后完成(在将消息写到 LOG 队列之后)。
The request URI of the log record starts with /Portlet/.
该日志记录的请求URI以 /Portlet/开头。
The service dashboard can include the ability to log the raw request and response that enables the enhancement of the simulator to include this scenario in its simulation set.
服务指示板可包含记录原始请求和响应的功能,能够扩展模拟器以使其将该场景添加到模拟集中。
Then you can use the form found here to request deletion. Remember not to log into your account at any point after that.
接着你就可以使用此表格递交删除请求,记得,此后再也不要登录你的账号了。
The log excerpt in Listing 1 shows that this example is is a WAP request.
列表1中的这个日志表明这个例子是一个WAP 请求。
The mediation flow may simply log that a request was passed from requester to provider, block requests from unknown or unauthorized requesters, or block requests based on provider availability.
中介流可以简单地记录某个请求已从请求者传递到了提供者,阻止来自未知或未经授权的请求者的请求,或者基于提供者可用性来阻止请求。
Finally it will log the IP of the client who sent the request.
最后,它记录发送请求的客户机的IP。
Users may more frequently request the why.html page according to the log files, but if you know it's more important they know the how.html, simply provide corresponding scores for correct sorting.
从日志文件可以看出,用户对why.html页面的请求比较频繁,但是如果您认为how.html 对于用户更为重要,那么只需修改相应的作用域值对排序做出纠正。
They can then be easily parsed by any of the open source or commercial log analysis tools, such as Webalizer, to give you a human-readable report and pretty graphs upon request.
然后,可以使用任何开放源码或商业日志分析工具(比如webalizer)轻松地解析它们,从而提供适合人阅读的报告和漂亮的图表。
The server access log records all Web server activity, including the following information for each request
服务器访问日志记录所有Web 服务器活动,包括关于每个请求的以下信息
Figure 11 shows the request message flow log in the Database Explorer.
图11显示了Database Explorer中的请求消息流日志。
If the log level is set to INFO it will log an entry whenever a request passes the servlet filter and whether that request has been forwarded to Dispatcher or not.
如果把日志级别设置为INFO,那么每当有请求经过servlet筛选器时都记录一个条目,无论是否把请求转发给Dispatcher。
After you make the POST request, log into the WebSphere CloudBurst admin console to see your deployment (Figure 2).
发出POST请求后,登录WebSphereCloudBurst管理控制台以查看您的部署(见图2)。
The Command Pattern: encapsulates a request as an object, thereby letting you parameterize other objects with different requests, queue or log requests, and support undoable operations.
命令模式:将“请求”封装成对象,以便使用不同的请求队列或者日志来参数化其他对象。命令模式也支持可撤销的操作。
The log should be turned in to supervisors on request.
当主管需要时,应上交该日志。
After you have implemented one of the domain control verifications methods described above, log into your account, and click on the pending request for your common name.
当你执行了域的控制方法之一上述核查,登录到您的帐户,并点击您的通用名称挂起的请求。
After you have implemented one of the domain control verifications methods described above, log into your account, and click on the pending request for your common name.
当你执行了域的控制方法之一上述核查,登录到您的帐户,并点击您的通用名称挂起的请求。
应用推荐