Knowledge

Logging (computing)

Source 📝

36: 341: 417:
or other administrative person of an Internet service. A statistical analysis of the server log may be used to examine traffic patterns by time of day, day of week, referrer, or user agent. Efficient web site administration, adequate hosting resources and the fine tuning of sales efforts can be
323:
changes, the user status changes), making them more like a combined message/event log of the channel in question, but such a log is not comparable to a true IRC server event log, because it only records user-visible events for the time frame the user spent being connected to a certain channel.
268:
The use of data stored in transaction logs of Web search engines, Intranets, and Web sites can provide valuable insight into understanding the information-searching process of online searchers. This understanding can enlighten information system design, interface development, and devising the
197:
is a log of the communications between a system and the users of that system, or a data collection method that automatically captures the type, content, or time of transactions made by a person from a terminal with that system. For Web searching, a transaction log is an electronic record of
327:
Instant messaging and VoIP clients often offer the chance to store encrypted logs to enhance the user's privacy. These logs require a password to be decrypted and viewed, and they are often handled by their respective writing application. Some privacy focused messaging services, such as
226:
record events taking place in the execution of a system in order to provide. That can be used to understand the activity of the system and to diagnose problems. They are essential to understand particularly in the case of applications with little user interaction.
296:) commonly have the ability to automatically save textual communication, both public (IRC channel/IM conference/MMO public/party chat messages) and private chat between users, as message logs. Message logs are almost universally plain text files, but IM and 209:
5424. The Syslog standard enables a dedicated, standardized subsystem to generate, filter, record, and analyze log messages. This relieves software developers of having to design and code their ad hoc logging systems.
230:
It can also be useful to combine log file entries from multiple sources. It is a different combination that may yield between with related events on different servers. Other solutions employ network-wide querying and
511:
A log file is a text file or XML file used to register the automatically produced and time-stamped documentation of events, behaviors and conditions relevant to a particular system.
859: 311:
In the case of IRC software, message logs often include system/server messages and entries related to channel and user changes (e.g. topic change, user joins/exits/
265:
or other data errors and maintain the stored data in a consistent state. Thus, database systems usually have both general event logs and transaction logs.
198:
interactions that have occurred during a searching episode between a Web search engine and users searching for information on that Web search engine.
375:) versus the human readable standard. More recent entries are typically appended to the end of the file. Information about the request, including 832: 371:) for web server log files, but other proprietary formats exist. Some servers can log information to computer readable formats (such as 761: 558:
Rice, Ronald E.; Borgman, Christine L. (1983). "The use of computer-monitored data in information science and communication research".
155:
that occur in a computer system, such as problems, errors or just information on current operations. These events may occur in the
851: 779: 728: 312: 100: 167:
is recorded for each such event. These log messages can then be used to monitor and understand the operation of the system, to
72: 406:
are typically added. This data can be combined into a single file, or separated into distinct logs, such as an access log,
53: 671: 488: 79: 201:
Many operating systems, software frameworks and programs include a logging system. A widely used logging standard is
119: 86: 689: 466: 57: 68: 17: 747: 911: 460: 364: 360: 906: 653: 257:, which are not mainly intended as an audit trail for later analysis, and are not intended to be 46: 410:
log, or referrer log. However, server logs typically do not collect user-specific information.
329: 289: 93: 797:
Jansen, Bernard J. (2006). "Search log analysis: What it is, what's been done, how to do it".
610: 523:
Peters, Thomas A. (1993-02-01). "The history and development of transaction log analysis".
445: 206: 8: 277: 176: 376: 353: 814: 575: 540: 368: 281: 262: 261:. These logs record changes to the stored data to allow the database to recover from 152: 806: 600: 567: 532: 332:, record minimal logs about users, limiting their information to connection times. 316: 186:. Alternatively, the messages may be written to a dedicated logging system or to a 156: 439: – An approach dealing with large volumes of computer-generated log messages 244: 622: 613: 594: 810: 436: 427: 258: 187: 498: 413:
These files are usually not accessible to general Internet users, only to the
190:
software, where it is stored in a database or on a different computer system.
148: 900: 818: 579: 544: 454: – XML formatted record of the operations performed by computer programs 403: 383: 571: 352:
is a log file (or several files) automatically created and maintained by a
285: 672:"Turn Your Log Files into Searchable Data Using Regex and the XML Classes" 635: 493: 133: 399: 379: 305: 710: 605: 536: 414: 168: 140: 300:
clients (which support textual chat, e.g. Skype) might save them in
35: 320: 250: 160: 451: 391: 762:"Understanding the importance of transaction logs in SQL Server" 852:"Iran blocks encrypted messaging apps amid nationwide protests" 293: 232: 202: 182:
In the simplest case, messages are written to a file, called a
407: 395: 340: 179:, to have a central overview of the operation of the system. 172: 882: 387: 372: 301: 297: 27:
Chronological record of computer data processing operations
430: – One's unique set of traceable digital activities 560:
Journal of the American Society for Information Science
432:
Pages displaying short descriptions of redirect targets
344:
Apache access log showing Wordpress vulnerability bots
304:
files or in a custom format to ease reading or enable
363:
log which maintains a history of page requests. The
833:"LogFile Class (Microsoft.SqlServer.Management.Smo)" 456:
Pages displaying wikidata descriptions as a fallback
441:
Pages displaying wikidata descriptions as a fallback
748:"A beginner's guide to SQL Server transaction logs" 60:. Unsourced material may be challenged and removed. 269:information architecture for content collections. 356:consisting of a list of activities it performed. 898: 448: – Software architecture for ingesting logs 729:"The Transaction Log (SQL Server) - SQL Server" 463:- comparing software tracing with event logging 288:file sharing clients with chat functions, and 592: 557: 467:Security event management § Event logs 799:Library & Information Science Research 418:aided by analysis of the web server logs. 883:"How Logging Works - Caddy Documentation" 745: 604: 120:Learn how and when to remove this message 487:DeLaRosa, Alexander (February 8, 2018). 486: 339: 849: 461:Tracing (software) § Event logging 175:. Logging is particularly important in 14: 899: 796: 705: 703: 586: 522: 746:Stankovic, Ivan (February 11, 2014). 489:"Log Monitoring: not the ugly sister" 469:- with a focus on security management 58:adding citations to reliable sources 29: 850:Brandom, Russell (2 January 2018). 700: 238: 24: 880: 862:from the original on 22 March 2018 25: 923: 367:maintains a standard format (the 34: 874: 843: 825: 790: 772: 754: 739: 721: 272: 45:needs additional citations for 690:"Log File Viewer - SQL Server" 682: 664: 646: 628: 551: 516: 480: 335: 13: 1: 473: 218: 636:"XML Logging :: WinSCP" 7: 805:(3). Elsevier BV: 407–432. 421: 10: 928: 811:10.1016/j.lisr.2006.06.005 711:"Extended Log File Format" 625:. 593:R. Gerhards (March 2009). 242: 131: 599:. Network Working Group. 278:Internet Relay Chat (IRC) 213: 147:is the act of keeping a 132:Not to be confused with 69:"Logging" computing 654:"Use XML for Log Files" 359:A typical example is a 171:problems, or during an 572:10.1002/asi.4630340404 345: 282:instant messaging (IM) 253:maintain some kind of 343: 768:. November 11, 2004. 735:. 27 September 2023. 501:on February 14, 2018 446:Logging as a service 398:code, bytes served, 54:improve this article 881:Server, Caddy Web. 837:learn.microsoft.com 733:learn.microsoft.com 696:. 28 February 2023. 694:learn.microsoft.com 676:learn.microsoft.com 621:Obsoletes RFC  596:The Syslog Protocol 177:multi-user software 660:. August 22, 2008. 619:Proposed Standard. 346: 292:games (especially 369:Common Log Format 130: 129: 122: 104: 16:(Redirected from 919: 912:Computer logging 891: 890: 878: 872: 871: 869: 867: 847: 841: 840: 829: 823: 822: 794: 788: 787: 776: 770: 769: 758: 752: 751: 743: 737: 736: 725: 719: 718: 707: 698: 697: 686: 680: 679: 668: 662: 661: 650: 644: 643: 632: 626: 617: 608: 606:10.17487/RFC5424 590: 584: 583: 555: 549: 548: 537:10.1108/eb047884 520: 514: 513: 508: 506: 497:. Archived from 484: 457: 442: 433: 251:database systems 239:Transaction logs 193:Specifically, a 157:operating system 125: 118: 114: 111: 105: 103: 62: 38: 30: 21: 927: 926: 922: 921: 920: 918: 917: 916: 907:Computer errors 897: 896: 895: 894: 887:caddyserver.com 879: 875: 865: 863: 848: 844: 831: 830: 826: 795: 791: 784:www.neurobs.com 778: 777: 773: 760: 759: 755: 744: 740: 727: 726: 722: 709: 708: 701: 688: 687: 683: 678:. 24 June 2011. 670: 669: 665: 652: 651: 647: 642:. 16 June 2022. 634: 633: 629: 591: 587: 556: 552: 525:Library Hi Tech 521: 517: 504: 502: 485: 481: 476: 455: 440: 431: 424: 338: 275: 255:transaction log 247: 245:Transaction log 241: 221: 216: 195:transaction log 163:. A message or 137: 126: 115: 109: 106: 63: 61: 51: 39: 28: 23: 22: 15: 12: 11: 5: 925: 915: 914: 909: 893: 892: 873: 842: 824: 789: 771: 753: 738: 720: 699: 681: 663: 645: 627: 585: 566:(4): 247–256. 550: 515: 478: 477: 475: 472: 471: 470: 464: 458: 449: 443: 437:Log management 434: 428:Digital traces 423: 420: 337: 334: 274: 271: 259:human-readable 243:Main article: 240: 237: 220: 217: 215: 212: 188:log management 128: 127: 110:September 2017 42: 40: 33: 26: 9: 6: 4: 3: 2: 924: 913: 910: 908: 905: 904: 902: 888: 884: 877: 861: 858:. Vox Media. 857: 853: 846: 838: 834: 828: 820: 816: 812: 808: 804: 800: 793: 785: 781: 775: 767: 763: 757: 749: 742: 734: 730: 724: 716: 712: 706: 704: 695: 691: 685: 677: 673: 667: 659: 655: 649: 641: 637: 631: 624: 620: 615: 612: 607: 602: 598: 597: 589: 581: 577: 573: 569: 565: 561: 554: 546: 542: 538: 534: 530: 526: 519: 512: 500: 496: 495: 490: 483: 479: 468: 465: 462: 459: 453: 450: 447: 444: 438: 435: 429: 426: 425: 419: 416: 411: 409: 405: 401: 397: 393: 389: 385: 381: 378: 374: 370: 366: 362: 357: 355: 351: 342: 333: 331: 325: 322: 318: 314: 309: 307: 303: 299: 295: 291: 287: 283: 279: 270: 266: 264: 260: 256: 252: 246: 236: 234: 228: 225: 211: 208: 205:, defined in 204: 199: 196: 191: 189: 185: 180: 178: 174: 170: 166: 162: 158: 154: 150: 146: 142: 135: 124: 121: 113: 102: 99: 95: 92: 88: 85: 81: 78: 74: 71: –  70: 66: 65:Find sources: 59: 55: 49: 48: 43:This article 41: 37: 32: 31: 19: 18:Event logging 886: 876: 864:. Retrieved 855: 845: 836: 827: 802: 798: 792: 783: 774: 766:TechRepublic 765: 756: 741: 732: 723: 714: 693: 684: 675: 666: 657: 648: 639: 630: 618: 595: 588: 563: 559: 553: 531:(2): 41–66. 528: 524: 518: 510: 505:February 14, 503:. Retrieved 499:the original 492: 482: 412: 358: 349: 347: 326: 310: 286:peer-to-peer 276: 273:Message logs 267: 254: 248: 229: 223: 222: 200: 194: 192: 183: 181: 164: 159:or in other 144: 138: 116: 107: 97: 90: 83: 76: 64: 52:Please help 47:verification 44: 658:CodeProject 494:Pandora FMS 394:requested, 336:Server logs 290:multiplayer 134:Data logger 901:Categories 780:"Logfiles" 715:www.w3.org 640:winscp.net 474:References 400:user agent 382:, request 380:IP address 361:web server 350:server log 306:encryption 284:programs, 224:Event logs 219:Event logs 80:newspapers 856:The Verge 819:0740-8188 580:0002-8231 545:0737-8831 415:webmaster 233:reporting 165:log entry 141:computing 866:23 March 860:Archived 422:See also 404:referrer 321:nickname 207:IETF RFC 184:log file 161:software 452:XML log 294:MMORPGs 263:crashes 145:logging 94:scholar 817:  578:  543:  402:, and 377:client 354:server 330:Signal 203:Syslog 153:events 96:  89:  82:  75:  67:  408:error 313:kicks 249:Most 214:Types 173:audit 169:debug 101:JSTOR 87:books 868:2018 815:ISSN 623:3164 614:5424 576:ISSN 541:ISSN 507:2018 396:HTTP 392:page 388:time 384:date 373:JSON 317:bans 302:HTML 298:VoIP 73:news 807:doi 611:RFC 601:doi 568:doi 533:doi 365:W3C 151:of 149:log 139:In 56:by 903:: 885:. 854:. 835:. 813:. 803:28 801:. 782:. 764:. 731:. 713:. 702:^ 692:. 674:. 656:. 638:. 609:. 574:. 564:34 562:. 539:. 529:11 527:. 509:. 491:. 390:, 348:A 319:, 308:. 280:, 235:. 143:, 889:. 870:. 839:. 821:. 809:: 786:. 750:. 717:. 616:. 603:: 582:. 570:: 547:. 535:: 386:/ 315:/ 136:. 123:) 117:( 112:) 108:( 98:· 91:· 84:· 77:· 50:. 20:)

Index

Event logging

verification
improve this article
adding citations to reliable sources
"Logging" computing
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
Data logger
computing
log
events
operating system
software
debug
audit
multi-user software
log management
Syslog
IETF RFC
reporting
Transaction log
database systems
human-readable
crashes
Internet Relay Chat (IRC)

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.