36:
341:
417:
or other administrative person of an
Internet service. A statistical analysis of the server log may be used to examine traffic patterns by time of day, day of week, referrer, or user agent. Efficient web site administration, adequate hosting resources and the fine tuning of sales efforts can be
323:
changes, the user status changes), making them more like a combined message/event log of the channel in question, but such a log is not comparable to a true IRC server event log, because it only records user-visible events for the time frame the user spent being connected to a certain channel.
268:
The use of data stored in transaction logs of Web search engines, Intranets, and Web sites can provide valuable insight into understanding the information-searching process of online searchers. This understanding can enlighten information system design, interface development, and devising the
197:
is a log of the communications between a system and the users of that system, or a data collection method that automatically captures the type, content, or time of transactions made by a person from a terminal with that system. For Web searching, a transaction log is an electronic record of
327:
Instant messaging and VoIP clients often offer the chance to store encrypted logs to enhance the user's privacy. These logs require a password to be decrypted and viewed, and they are often handled by their respective writing application. Some privacy focused messaging services, such as
226:
record events taking place in the execution of a system in order to provide. That can be used to understand the activity of the system and to diagnose problems. They are essential to understand particularly in the case of applications with little user interaction.
296:) commonly have the ability to automatically save textual communication, both public (IRC channel/IM conference/MMO public/party chat messages) and private chat between users, as message logs. Message logs are almost universally plain text files, but IM and
209:
5424. The Syslog standard enables a dedicated, standardized subsystem to generate, filter, record, and analyze log messages. This relieves software developers of having to design and code their ad hoc logging systems.
230:
It can also be useful to combine log file entries from multiple sources. It is a different combination that may yield between with related events on different servers. Other solutions employ network-wide querying and
511:
A log file is a text file or XML file used to register the automatically produced and time-stamped documentation of events, behaviors and conditions relevant to a particular system.
859:
311:
In the case of IRC software, message logs often include system/server messages and entries related to channel and user changes (e.g. topic change, user joins/exits/
265:
or other data errors and maintain the stored data in a consistent state. Thus, database systems usually have both general event logs and transaction logs.
198:
interactions that have occurred during a searching episode between a Web search engine and users searching for information on that Web search engine.
375:) versus the human readable standard. More recent entries are typically appended to the end of the file. Information about the request, including
832:
371:) for web server log files, but other proprietary formats exist. Some servers can log information to computer readable formats (such as
761:
558:
Rice, Ronald E.; Borgman, Christine L. (1983). "The use of computer-monitored data in information science and communication research".
155:
that occur in a computer system, such as problems, errors or just information on current operations. These events may occur in the
851:
779:
728:
312:
100:
167:
is recorded for each such event. These log messages can then be used to monitor and understand the operation of the system, to
72:
406:
are typically added. This data can be combined into a single file, or separated into distinct logs, such as an access log,
53:
671:
488:
79:
201:
Many operating systems, software frameworks and programs include a logging system. A widely used logging standard is
119:
86:
689:
466:
57:
68:
747:
911:
460:
364:
360:
906:
653:
257:, which are not mainly intended as an audit trail for later analysis, and are not intended to be
46:
17:
410:
log, or referrer log. However, server logs typically do not collect user-specific information.
329:
289:
93:
797:
Jansen, Bernard J. (2006). "Search log analysis: What it is, what's been done, how to do it".
610:
523:
Peters, Thomas A. (1993-02-01). "The history and development of transaction log analysis".
445:
206:
8:
277:
176:
376:
353:
814:
575:
540:
368:
281:
262:
261:. These logs record changes to the stored data to allow the database to recover from
152:
806:
600:
567:
532:
332:, record minimal logs about users, limiting their information to connection times.
316:
186:. Alternatively, the messages may be written to a dedicated logging system or to a
156:
439: – An approach dealing with large volumes of computer-generated log messages
244:
622:
613:
594:
810:
436:
427:
258:
187:
498:
413:
These files are usually not accessible to general
Internet users, only to the
190:
software, where it is stored in a database or on a different computer system.
148:
900:
818:
579:
544:
454: – XML formatted record of the operations performed by computer programs
403:
383:
571:
352:
is a log file (or several files) automatically created and maintained by a
285:
672:"Turn Your Log Files into Searchable Data Using Regex and the XML Classes"
635:
493:
133:
399:
379:
305:
710:
605:
536:
414:
168:
140:
300:
clients (which support textual chat, e.g. Skype) might save them in
35:
320:
250:
160:
451:
391:
762:"Understanding the importance of transaction logs in SQL Server"
852:"Iran blocks encrypted messaging apps amid nationwide protests"
293:
232:
202:
182:
In the simplest case, messages are written to a file, called a
407:
395:
340:
179:, to have a central overview of the operation of the system.
172:
882:
387:
372:
301:
297:
27:
Chronological record of computer data processing operations
430: – One's unique set of traceable digital activities
560:
Journal of the
American Society for Information Science
432:
Pages displaying short descriptions of redirect targets
344:
Apache access log showing
Wordpress vulnerability bots
304:
files or in a custom format to ease reading or enable
363:
log which maintains a history of page requests. The
833:"LogFile Class (Microsoft.SqlServer.Management.Smo)"
456:
Pages displaying wikidata descriptions as a fallback
441:
Pages displaying wikidata descriptions as a fallback
748:"A beginner's guide to SQL Server transaction logs"
60:. Unsourced material may be challenged and removed.
269:information architecture for content collections.
356:consisting of a list of activities it performed.
898:
448: – Software architecture for ingesting logs
729:"The Transaction Log (SQL Server) - SQL Server"
463:- comparing software tracing with event logging
288:file sharing clients with chat functions, and
592:
557:
467:Security event management § Event logs
799:Library & Information Science Research
418:aided by analysis of the web server logs.
883:"How Logging Works - Caddy Documentation"
745:
604:
120:Learn how and when to remove this message
487:DeLaRosa, Alexander (February 8, 2018).
486:
339:
849:
461:Tracing (software) § Event logging
175:. Logging is particularly important in
14:
899:
796:
705:
703:
586:
522:
746:Stankovic, Ivan (February 11, 2014).
489:"Log Monitoring: not the ugly sister"
469:- with a focus on security management
58:adding citations to reliable sources
29:
850:Brandom, Russell (2 January 2018).
700:
238:
24:
880:
862:from the original on 22 March 2018
25:
923:
367:maintains a standard format (the
34:
874:
843:
825:
790:
772:
754:
739:
721:
272:
45:needs additional citations for
690:"Log File Viewer - SQL Server"
682:
664:
646:
628:
551:
516:
480:
335:
13:
1:
473:
218:
636:"XML Logging :: WinSCP"
7:
805:(3). Elsevier BV: 407–432.
421:
10:
928:
811:10.1016/j.lisr.2006.06.005
711:"Extended Log File Format"
625:.
593:R. Gerhards (March 2009).
242:
131:
599:. Network Working Group.
278:Internet Relay Chat (IRC)
213:
147:is the act of keeping a
132:Not to be confused with
69:"Logging" computing
654:"Use XML for Log Files"
359:A typical example is a
171:problems, or during an
572:10.1002/asi.4630340404
345:
282:instant messaging (IM)
253:maintain some kind of
343:
768:. November 11, 2004.
735:. 27 September 2023.
501:on February 14, 2018
446:Logging as a service
398:code, bytes served,
54:improve this article
881:Server, Caddy Web.
837:learn.microsoft.com
733:learn.microsoft.com
696:. 28 February 2023.
694:learn.microsoft.com
676:learn.microsoft.com
621:Obsoletes RFC
596:The Syslog Protocol
177:multi-user software
660:. August 22, 2008.
619:Proposed Standard.
346:
292:games (especially
369:Common Log Format
130:
129:
122:
104:
16:(Redirected from
919:
912:Computer logging
891:
890:
878:
872:
871:
869:
867:
847:
841:
840:
829:
823:
822:
794:
788:
787:
776:
770:
769:
758:
752:
751:
743:
737:
736:
725:
719:
718:
707:
698:
697:
686:
680:
679:
668:
662:
661:
650:
644:
643:
632:
626:
617:
608:
606:10.17487/RFC5424
590:
584:
583:
555:
549:
548:
537:10.1108/eb047884
520:
514:
513:
508:
506:
497:. Archived from
484:
457:
442:
433:
251:database systems
239:Transaction logs
193:Specifically, a
157:operating system
125:
118:
114:
111:
105:
103:
62:
38:
30:
21:
927:
926:
922:
921:
920:
918:
917:
916:
907:Computer errors
897:
896:
895:
894:
887:caddyserver.com
879:
875:
865:
863:
848:
844:
831:
830:
826:
795:
791:
784:www.neurobs.com
778:
777:
773:
760:
759:
755:
744:
740:
727:
726:
722:
709:
708:
701:
688:
687:
683:
678:. 24 June 2011.
670:
669:
665:
652:
651:
647:
642:. 16 June 2022.
634:
633:
629:
591:
587:
556:
552:
525:Library Hi Tech
521:
517:
504:
502:
485:
481:
476:
455:
440:
431:
424:
338:
275:
255:transaction log
247:
245:Transaction log
241:
221:
216:
195:transaction log
163:. A message or
137:
126:
115:
109:
106:
63:
61:
51:
39:
28:
23:
22:
15:
12:
11:
5:
925:
915:
914:
909:
893:
892:
873:
842:
824:
789:
771:
753:
738:
720:
699:
681:
663:
645:
627:
585:
566:(4): 247–256.
550:
515:
478:
477:
475:
472:
471:
470:
464:
458:
449:
443:
437:Log management
434:
428:Digital traces
423:
420:
337:
334:
274:
271:
259:human-readable
243:Main article:
240:
237:
220:
217:
215:
212:
188:log management
128:
127:
110:September 2017
42:
40:
33:
26:
9:
6:
4:
3:
2:
924:
913:
910:
908:
905:
904:
902:
888:
884:
877:
861:
858:. Vox Media.
857:
853:
846:
838:
834:
828:
820:
816:
812:
808:
804:
800:
793:
785:
781:
775:
767:
763:
757:
749:
742:
734:
730:
724:
716:
712:
706:
704:
695:
691:
685:
677:
673:
667:
659:
655:
649:
641:
637:
631:
624:
620:
615:
612:
607:
602:
598:
597:
589:
581:
577:
573:
569:
565:
561:
554:
546:
542:
538:
534:
530:
526:
519:
512:
500:
496:
495:
490:
483:
479:
468:
465:
462:
459:
453:
450:
447:
444:
438:
435:
429:
426:
425:
419:
416:
411:
409:
405:
401:
397:
393:
389:
385:
381:
378:
374:
370:
366:
362:
357:
355:
351:
342:
333:
331:
325:
322:
318:
314:
309:
307:
303:
299:
295:
291:
287:
283:
279:
270:
266:
264:
260:
256:
252:
246:
236:
234:
228:
225:
211:
208:
205:, defined in
204:
199:
196:
191:
189:
185:
180:
178:
174:
170:
166:
162:
158:
154:
150:
146:
142:
135:
124:
121:
113:
102:
99:
95:
92:
88:
85:
81:
78:
74:
71: –
70:
66:
65:Find sources:
59:
55:
49:
48:
43:This article
41:
37:
32:
31:
19:
886:
876:
864:. Retrieved
855:
845:
836:
827:
802:
798:
792:
783:
774:
766:TechRepublic
765:
756:
741:
732:
723:
714:
693:
684:
675:
666:
657:
648:
639:
630:
618:
595:
588:
563:
559:
553:
531:(2): 41–66.
528:
524:
518:
510:
505:February 14,
503:. Retrieved
499:the original
492:
482:
412:
358:
349:
347:
326:
310:
286:peer-to-peer
276:
273:Message logs
267:
254:
248:
229:
223:
222:
200:
194:
192:
183:
181:
164:
159:or in other
144:
138:
116:
107:
97:
90:
83:
76:
64:
52:Please help
47:verification
44:
658:CodeProject
494:Pandora FMS
394:requested,
336:Server logs
290:multiplayer
134:Data logger
901:Categories
780:"Logfiles"
715:www.w3.org
640:winscp.net
474:References
400:user agent
382:, request
380:IP address
361:web server
350:server log
306:encryption
284:programs,
224:Event logs
219:Event logs
80:newspapers
856:The Verge
819:0740-8188
580:0002-8231
545:0737-8831
415:webmaster
233:reporting
165:log entry
141:computing
866:23 March
860:Archived
422:See also
404:referrer
321:nickname
207:IETF RFC
184:log file
161:software
452:XML log
294:MMORPGs
263:crashes
145:logging
94:scholar
18:Logfile
817:
578:
543:
402:, and
377:client
354:server
330:Signal
203:Syslog
153:events
96:
89:
82:
75:
67:
408:error
313:kicks
249:Most
214:Types
173:audit
169:debug
101:JSTOR
87:books
868:2018
815:ISSN
623:3164
614:5424
576:ISSN
541:ISSN
507:2018
396:HTTP
392:page
388:time
384:date
373:JSON
317:bans
302:HTML
298:VoIP
73:news
807:doi
611:RFC
601:doi
568:doi
533:doi
365:W3C
151:of
149:log
139:In
56:by
903::
885:.
854:.
835:.
813:.
803:28
801:.
782:.
764:.
731:.
713:.
702:^
692:.
674:.
656:.
638:.
609:.
574:.
564:34
562:.
539:.
529:11
527:.
509:.
491:.
390:,
348:A
319:,
308:.
280:,
235:.
143:,
889:.
870:.
839:.
821:.
809::
786:.
750:.
717:.
616:.
603::
582:.
570::
547:.
535::
386:/
315:/
136:.
123:)
117:(
112:)
108:(
98:·
91:·
84:·
77:·
50:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.