![]() | |
Sun Java System Web Proxy Server User Interface |
The Server Status Tab
The Server Status tab contains the following pages:
The View Access Log PageThe View Access Log page is used to configure a customized view of the information about requests to the server and the responses from the server.
The following elements are displayed:
Number Of Entries. Specifies the number of entries to retrieve, starting with the most recent.
Only Show Entries With. Specifies a string or a character to filter the log entries. Case is important; the case of the string or character specified in this field must match the case of the entry in the access log. For example, if you want to see only access log entries that contain POST, type POST.
OK. Displays the log entries in the lower section of this page.
Reset. Erases your changes and resets the elements in the page to the values that they contained before your changes.
Last (number access logs). Displays the last number access log entries with the parameters specified in the upper section of this page.
The View Error Log PageThe View Error Log page is used to configure a customized view of the errors the server has encountered as well as the messages about the server, such as when the server was started and who was unsuccessful to log in to the server.
The following elements are displayed:
Number Of Errors To View? Specifies the number of entries to retrieve, starting with the most recent.
Only Show Entries With. Specifies a string or a character to filter the log entries. Case is important; the case of the string or character specified in this field must match the case of the entry in the error log. For example, if you want to see only those error messages that contain warning, type warning.
OK. Displays the log entries in the lower section of this page.
Reset. Erases your changes and resets the elements in the page to the values that they contained before your changes.
Last number errors. Displays the error log entries with the parameters specified in the upper section of this page.
The Archive Log PageThe Archive Log page is used to automatically rotate your access and error log files at regular intervals. When you archive log files, the server renames the current log files and then creates new log files with the original names. You can archive or delete the old log files, which are saved as the original file name followed by the date and time the file was archived. For example, access might become access.200307152400.
The Archive Log File page allows you to archive your log files immediately or specify days and times when archiving will take place.
The following elements are displayed:
Archive The Log Files Now. Archives the log file that is currently being written to and restarts the server when you click the Archive button. Note that clicking the Archive button archives both the access and error logs.
Internal Daemon Log Rotation. Specifies whether to use Proxy Server internal system daemon log settings for log rotation.
- Rotation Start Time. Specifies the time used as a basis to rotate log files and start a new log file. For example, if the rotation start time is 12:00 a.m., and the rotation interval is 1440 minutes (one day), a new log file will be created when you save and apply changes. The log file will rotate every day at 12:00 a.m., and the access log will be stamped at 12:00 a.m. and saved as access.200304241200. Likewise, if you set the interval at 240 minutes (4 hours), the 4 hour intervals begin at 12:00 a.m. so that the access log files will contain information gathered from 12:00 a.m. to 4:00 a.m., from 4:00 a.m. to 8:00 a.m., and so forth.
- Rotation Interval (minutes). Specifies the number of minutes until the next log rotation when a new log file is started. You must specify an interval of at least 30 minutes or more.
Cron Based Log Rotation. Specifies whether to use the operating system’s cron (job scheduling) facility to schedule log archiving.
OK. Saves your entries.
Reset. Erases your changes and resets the elements in the page to the values that they contained before your changes.
The Set Access Log Preferences PageThe Set Access Log Preferences page allows you to specify what information is recorded in your server’s logs. Server log files can help you monitor your server’s activity and troubleshoot problems.
The following elements are displayed:
Select. Click this button after selecting a resource from the drop-down list.
Regular Expression. Specify a regular expression. For more information, see "Understanding Regular Expressions" in the Proxy Server Administration Guide.
Log Client Accesses. Specifies whether to include client accesses in your log files. This requires Domain Name Service (DNS) to be enabled.
Log File. Specifies the absolute path for the access log file. As a default, the log files are kept in the logs directory in the server root. If you specify a partial path, the server assumes the path is relative to the logs directory in the server root.
If you are editing the entire server, the default value for this field is $accesslog, the variable that denotes the access log file for the server and virtual servers in the configuration file.
Record. Specifies whether the server should record domain names or IP addresses of the systems accessing the server in the access log.
Format. Specifies which type of log file format to use in the access log. You can select from the following:
- Use Common Logfile Format. Includes client’s host name, authenticated user name, date and time of request, HTTP header, status code returned to the client, and content length of the document sent to the client.
- Use Extended LogFile Format. Includes all of the fields of the common log file format as well as some additional fields such as remote status, proxy to client content length, remote to proxy content length, proxy to remote content length, client to proxy header length, proxy to client header length, proxy to remote header length, remote to proxy header length and transfer time.
- Use Extended2 LogFile Format.Includes all of the fields of the extended logfile format as well as some additional fields such as client status, server status, remote status, cache finish status, and actual route.
- Only Log. Allows you to choose which information will be logged. You can choose from the following:
- Client Hostname. The hostname (or IP address if DNS is disabled) of the client requesting access.
- Authenticate User Name. If authentication was necessary, you can have the authenticated user name listed in the access log.
- System Date. The date and time of the client request.
- Full Request. The exact request the client made.
- Status. The status code the server returned to the client.
- Content Length. The content length, in bytes, of the document sent to the client.
- HTTP Header, "referer". The referer specifies the page from which the client accessed the current page. For example, if a user was looking at the results from a text search query, the referer would be the page from which the user accessed the text search engine. Referers allow the server to create a list of backtracked links.
- HTTP Header, "user-agent". The user-agent information--which includes the type of browser the client is using, its version, and the operating system on which it is running--comes from the User-agent field in the HTTP header information the client sends to the server.
- Method. The HTTP request method used such as GET, PUT, or POST.
- URI. Universal Resource Identifier. The location of a resource on the server. For example, for http://www.a.com:8080/special/docs, the URI is special/docs.
- Query String Of The URI. Anything after the question mark in a URI. For example, for http://www.a.com:8080/special/docs?find_this, the query string of the URI is find_this.
- Protocol. The transport protocol and version used.
- Cache Finish Status.This field specifies whether the cache file was written, refreshed, or returned by an up-to-date check.
- Remote Server Finish Status. This field specifies if the request to the remote server was successfully carried out to completion, interrupted by the client clicking the Stop button in Netscape Navigator, or aborted by an error condition.
- Status Code From Server. The status code returned from the server.
- Route To Proxy (PROXY, SOCKS, DIRECT). The route used to retrieve the resource. The document can be retrieved directly, through a proxy, or through a SOCKS server.
- Transfer Time. The length of time of the transfer, in seconds or milliseconds.
- Header-length From Server Response. The length of the header from the server response.
- Request Header Size From Proxy To Server. The size of the request header from the proxy to the server.
- Response Header Size Sent To Client. The size of the response header sent to the client.
- Request Header Size Received From Client. The size of the request header received from the client.
- Content-length From Proxy To Server Request. The length, in bytes, of the document sent from the proxy to the server.
- Content-length Received From Client. The length, in bytes, of the document from the client.
- Content-length From Server Response. The length, in bytes, of the document from the server.
- Unverified User From Client. The user name given to the remote server during authentication.
Custom Format. Allows you to create a customized format for your access log.
Do Not Log Client Acesses From. If you do not want to log client access from certain host names or IP addresses, type them in the host names and IP Addresses fields. Type a wildcard pattern of hosts from which the server should not record accesses. For example, *.example.com does not log accesses from people whose domain is example.com. You can type wildcard patterns for host names, IP addresses, or both.
Include Format String In Log File? Choose whether to include the format string in the log file. If you are using the Proxy Server’s log analyzer, you should include a format string. If you are using a third-party analyzer, you may not want to include a format string in your logfile.
OK. Saves your entries.
Reset. Erases your changes and resets the elements in the page to the values that they contained before your changes
The Set Error Log Preferences PageThe Set Error Log Preferences page allows you to configure what information is recorded in your server’s error logs. Server error log files can help you monitor your server’s activity and troubleshoot problems.
For more information, see "Setting Access Log Preferences" in the Proxy Server Administration Guide.
The following elements are displayed:
Error Log File Name. Specifies the file that stores messages from the server
Log Level. Specifies the amount of information that can be logged in the errors log. The options include the following:
- finest: indicates a highly detailed tracing message.
- finer: indicates a fairly detailed tracing message.
- fine: a message level providing tracing information.
- info: a message level for informational messages.
- warning: a message level indicating a potential problem.
- failure: a message level indicating a failure
- config: message level for static configuration messages.
- security: a message level for a security issue.
- catastrophe: a message level indicating a serious failure.
LogStdout. Check this if you want stdout output to be redirected to the errors log.
Log Stderr. Check this if you want stderr output to be redirected to the errors log.
Log To Console. Check this to redirect log messages to the console.
Use System Logging. Check this if you want to use the UNIX syslog service or Windows Event Logging to produce and manage logs.
OK. Saves your entries.
Reset. Erases your changes and resets the elements in the page to the values that they contained before your changes.
The Generate Report PageThe Generate Report page allows you to generate a report about a server’s activity using the log analyzer. Use the log analyzer to generate statistics about your server, such as a summary of activity, most commonly accessed URLs, times during the day when the server is accessed most frequently, and so on. You can also run the log analyzer from the Server Manager or the command line.
Note
Before running the log analyzer, you should archive the server logs. For more information about archiving server logs, see "Archiving Log Files" in the Proxy Server Administration Guide.
For more information, see "Running the Log Analyzer" in the Proxy Server Administration Guide.
The following elements are displayed:
Server Name. Specifies the name of the server for which to generate the report.
Output Type. Specifies whether the report should be output to an HTML file or to a plain text (ASCII) file.
Log File. Specifies the log file and the log archives to generate the report from.
Output File. Specifies the absolute path to where the report should go. If you leave this field blank, the analyzer displays the results on the screen. For large log files, you should save the results to a file because displaying the output on the screen may take a long time.
Totals. Specifies whether you want to generate totals for statistics. Select Do Not Generate Totals if you do not want to generate totals for statistics. If you choose to generate totals, specify the items from the following list for which you would like to generate totals:
- Total Hits. Number of requests the server received since access logging was enabled.
- 304 (Not Modified) Status Codes. Number of times the requesting client used a local copy of the requested document, rather than retrieving it from the server.
- 302 (Redirects) Status Codes. Number of times the server redirected to a new URL because the original URL moved.
- 404 (Not Found) Status Codes. Number of times the server could not find the requested document or the server did not serve the document because the client was not an authorized user.
- 500 (Server Error) Status Codes. Number of times server-related error occurred.
- Total Unique URLs. Number of unique URLs accessed since access logging was enabled.
- Total Unique Hosts. Number of unique client hosts who have accessed the server since access logging was enabled.
- Total Kilobytes Transferred. Number of kilobytes the server transferred since access logging was enabled.
General Statistics. Specifies whether to generate general statistics. Choose Do Not Generate General Statistics if you do not want to generate general statistics. If you choose to generate statistics, choose from the following:
- Find Top Number Seconds Of Log. Generates statistics based on information from the most recent number of seconds.
- Find Top Number Minutes Of Log. Generates statistics based on information from the most recent number of minutes.
- Find Top Number Hours Of Log. Generates statistics based on information from the most recent number of hours.
- Find Number Users (If Logged). Generates statistics based on information from the number of users.
- Find Top Number Referers (If Logged). Generates statistics based on information from the number of referers.
- Find Top Number User Agents (If Logged). Generates statistics based on information on the user agents, for example, the browser type, its version, and the operating system.
- Find Top Number Miscellaneous Logged Items (If Logged). Generates statistics based on information from the number of user.
Generate Lists. Specifies whether to generate lists. Choose Do Not Generate Any List if you do not want to generate any lists. If you choose to generate lists, specify the items from the following list for which you would like to generate lists:
- URLs Accessed. Displays the URLs that were accessed.
- Hosts Accessing Your Server. Displays the hosts that accessed the Proxy Server.
- Number Hosts Most Often Accessing Your Server. Displays the hosts most often accessing your server or hosts that have accessed your server more than a specified number of times
- Hosts That Accessed Your Server More Than Number Times. Displays the hosts that accessed your server more times than the number specified.
Output Order. Specifies the order of the output. Prioritize the following items from 1 to 3 in the order that you would like each section to appear in the report. If you chose to not generate any of them, the section will automatically be left out. The options include the following:
OK. Saves your entries.
Reset. Erases your changes and resets the elements in the page to the values that they contained before your changes.
The Monitor Current Activity PageIf your server is running, the Monitor Current Activity page allows you to enable statistics profiling and launch a program to monitor your server’s current resource usage in a number of categories. This program will give you a feel for how many resources your server needs.
Once you enable statistics, you can view statistics in the following areas:
The following elements are displayed:
Activate Statistics/Profiling. To see the statistics for your server, you must first enable statistics/profiling. This function is turned off by default because it uses system resources. Once you turn statistics/profiling on, you must restart your server to apply the changes.
OK. Saves your entries. Displays a page showing the statistics you’ve requested. The statistics are updated every n seconds, where n is the refresh interval you selected.
Reset. Erases your changes and resets the elements in the page to the values that they contained before your changes.
Monitor Proxy Server Statistics
Once you have enabled statistics, you can get a variety of information on how your Proxy Server instance is running. The statistics are broken up into functional areas.
Select Refresh Interval. From the drop-down list, select the refresh interval, in seconds, to display updated statistics on your browser.
Select Statistics To Be Displayed. The type of statistics displayed: Connections, DNS, Keep-Alive, or Server Requests.
Submit. Once you click this button, the selected statistics are displayed.
The Configure SNMP Subagent PageSimple Network Management Protocol (SNMP) is a protocol used to exchange data about network activity. With SNMP, data travels between a managed device and a network management station (NMS) where administrators remotely monitor and manage the network. The Configure SNMP Subagent page allows you to configure SNMP to monitor your server.
The following elements are displayed:
Master Host. Specifies the name and domain of the server.
Description. Specifies the description of the server (including operating system information).
Organization. Specifies the organization responsible for the server.
Location. Specifies the absolute path for the server.
Contact. Specifies the person responsible for the server and the person’s contact information.
Enable SNMP Statistics Collection. Specifies whether the SNMP statistics collection is enabled.
OK. Saves your entries.
Reset. Erases your changes and resets the elements in the page to the values that they contained before your changes.
The Control SNMP Subagent PageEvery managed device contains an SNMP agent that gathers information regarding the network activity of the device. This agent is known as the subagent. Each server instance has a subagent. All subagents can communicate with the master agent. The Control SNMP Subagent page allows you to configure SNMP to monitor your UNIX/Linux server.
For more information, see "Enabling the Subagent" in the Proxy Server Administration Guide.
The following elements are displayed:
Start. Start the SNMP subagent for this server instance.
Stop. Stops the SNMP subagent for this server instance.
Restart. Stops and then starts the SNMP subagent for this server instance.