Log formats of Wcol-E and its exampleGoto examplesOverivewWcol-E, the prefetching proxy server writes logfile. Using logfile analysis, you will know number of access, traffic and fashion of users. This page shows its format and examples. | |
OverviewLog typesSelect log-type which you want. Type is located in 7th field in specified logfile or system logfile.Tips |
deamons logSTART1 time(sec.usec) 2 START 3 version of Wcol-E 4 ID of information format 5 mode, PROXY/CATALYSTEND 1 time(sec.usec) 2 END 3 version of Wcol-E 4 ID of information format sessions logGeneric pattern: 1 time(sec.usec) 2 session, FETCH/SEND/PREFETCH 3 service port 4 peer-address (client or child proxy) 5 request protocol, HTTP/ICP 6 request protocol version 7 no-cache ('n' if no-cache) 8 if-modified-since[IMS] ('*' if specified time) 9 auth ('X' if authorized) 10 method, GET/HEAD/POST 11 URL 12 HTTP response-code 13 content-type 14 size to client (bytes) 15 response time to client (msec) 16 : HTTP1 time(sec.usec) 2 session, FETCH 3 service port 4 peer-address (client or child proxy) 5 request protocol, HTTP 6 request protocol version 7 no-cache ('n' if no-cache) 8 if-modified-since[IMS] ('*' if specified time) 9 auth ('X' if authorized) 10 method, GET/HEAD/POST 11 URL 12 HTTP response-code 13 content-type 14 size to client (bytes) 15 response time to client (msec) 16 : 17 server-type, ORIGIN/PARENT/SIBLING 18 server 19 server-port 20 size from server (bytes) 21 response time from server (msec)PREFECH 1 time(sec.usec) 2 session, PREFETCH 3 service port 4 peer-address (client or child proxy) 5 request protocol, HTTP 6 request protocol version 7 no-cache ('n' if no-cache) 8 if-modified-since[IMS] ('*' if specified time) 9 auth ('X' if authorized) 10 method, GET/HEAD/POST 11 URL 12 HTTP response-code 13 content-type 14 size to client (bytes) 15 response time to client (msec) 16 : 17 server-type, ORIGIN/PARENT/SIBLING 18 server 19 server-port 20 size from server (bytes) 21 response time from server (msec)SEND 1 time(sec.usec) 2 session, SEND 3 service port 4 peer-address (client or child proxy) 5 request protocol, HTTP 6 request protocol version 7 no-cache ('n' if no-cache) 8 if-modified-since[IMS] ('*' if specified time) 9 auth ('X' if authorized) 10 method, GET/HEAD/POST 11 URL 12 HTTP response-code 13 content-type 14 size to client (bytes) 15 response time to client (msec) 16 : 17 date-source, CACHE 18 - 19 -1 20 size from server (bytes) 21 response time from server (msec) 22 : 23 reason, FETCH/PREFETCH 24 apperence countERROR 1 time(sec.usec) 2 session, ERROR 3 service port 4 peer-address (client or child proxy) 5 request protocol, HTTP 6 request protocol version 7 no-cache ('n' if no-cache) 8 if-modified-since[IMS] ('*' if specified time) 9 auth ('X' if authorized) 10 method, GET/HEAD/POST 11 URL 12 HTTP response-code 13 content-type 14 size to client (bytes) 15 response time to client (msec) 16 : ICP1 time(sec.usec) 2 session, QUERY 3 service port 4 peer-address (client or sibling proxy) 5 request protocol, ICP 6 request protocol version 7 no-cache ('n' if no-cache) 8 if-modified-since[IMS] ('*' if specified time) 9 auth ('X' if authorized) 10 method, QUERY 11 URL 12 response, HIT/MISS 13 - 14 size to client (bytes) 15 - 16 : GC (Garbage Collector)GC START1 GC 2 START 3 time (sec) 4 buffer legth for GC 5 path of GC working fileGC END 1 GC 2 END 3 time (sec) 4 take time for GC 5 cache size after GC 6 cache size before GC 7 cache size before GC (directories) 8 cache size before GC (files) 9 cache legth before GC (number of files) 10 size of expired unused cache |