Log formats of Wcol-E and its exampleGoto examplesOverivewWcol-E, the prefetching proxy server writes logfile. Using logfile analysis, you will know number of access, traffic and fashion of users. This page shows its format and examples.  | |
OverviewLog typesSelect log-type which you want. Type is located in 7th field in specified logfile or system logfile.Tips | 
deamons logSTART
     1 time(sec.usec)
     2 START
     3 version of Wcol-E
     4 ID of information format
     5 mode, PROXY/CATALYST
END
     1 time(sec.usec)
     2 END
     3 version of Wcol-E
     4 ID of information format
sessions logGeneric pattern: 
     1 time(sec.usec)
     2 session, FETCH/SEND/PREFETCH
     3 service port
     4 peer-address (client or child proxy)
     5 request protocol, HTTP/ICP
     6 request protocol version
     7 no-cache ('n' if no-cache)
     8 if-modified-since[IMS] ('*' if specified time)
     9 auth ('X' if authorized)
    10 method, GET/HEAD/POST
    11 URL
    12 HTTP response-code
    13 content-type
    14 size to client (bytes)
    15 response time to client (msec)
    16 :
HTTP 
     1 time(sec.usec)
     2 session, FETCH
     3 service port
     4 peer-address (client or child proxy)
     5 request protocol, HTTP
     6 request protocol version
     7 no-cache ('n' if no-cache)
     8 if-modified-since[IMS] ('*' if specified time)
     9 auth ('X' if authorized)
    10 method, GET/HEAD/POST
    11 URL
    12 HTTP response-code
    13 content-type
    14 size to client (bytes)
    15 response time to client (msec)
    16 :
    17 server-type, ORIGIN/PARENT/SIBLING
    18 server
    19 server-port
    20 size from server (bytes)
    21 response time from server (msec)
PREFECH
     1 time(sec.usec)
     2 session, PREFETCH
     3 service port
     4 peer-address (client or child proxy)
     5 request protocol, HTTP
     6 request protocol version
     7 no-cache ('n' if no-cache)
     8 if-modified-since[IMS] ('*' if specified time)
     9 auth ('X' if authorized)
    10 method, GET/HEAD/POST
    11 URL
    12 HTTP response-code
    13 content-type
    14 size to client (bytes)
    15 response time to client (msec)
    16 :
    17 server-type, ORIGIN/PARENT/SIBLING
    18 server
    19 server-port
    20 size from server (bytes)
    21 response time from server (msec)
SEND
     1 time(sec.usec)
     2 session, SEND
     3 service port
     4 peer-address (client or child proxy)
     5 request protocol, HTTP
     6 request protocol version
     7 no-cache ('n' if no-cache)
     8 if-modified-since[IMS] ('*' if specified time)
     9 auth ('X' if authorized)
    10 method, GET/HEAD/POST
    11 URL
    12 HTTP response-code
    13 content-type
    14 size to client (bytes)
    15 response time to client (msec)
    16 :
    17 date-source, CACHE
    18 -
    19 -1
    20 size from server (bytes)
    21 response time from server (msec)
    22 :
    23 reason, FETCH/PREFETCH
    24 apperence count
ERROR
     1 time(sec.usec)
     2 session, ERROR
     3 service port
     4 peer-address (client or child proxy)
     5 request protocol, HTTP
     6 request protocol version
     7 no-cache ('n' if no-cache)
     8 if-modified-since[IMS] ('*' if specified time)
     9 auth ('X' if authorized)
    10 method, GET/HEAD/POST
    11 URL
    12 HTTP response-code
    13 content-type
    14 size to client (bytes)
    15 response time to client (msec)
    16 :
ICP 
     1 time(sec.usec)
     2 session, QUERY
     3 service port
     4 peer-address (client or sibling proxy)
     5 request protocol, ICP
     6 request protocol version
     7 no-cache ('n' if no-cache)
     8 if-modified-since[IMS] ('*' if specified time)
     9 auth ('X' if authorized)
    10 method, QUERY
    11 URL
    12 response, HIT/MISS
    13 -
    14 size to client (bytes)
    15 -
    16 :
GC (Garbage Collector)GC START
     1 GC
     2 START
     3 time (sec)
     4 buffer legth for GC
     5 path of GC working file
GC END
     1 GC
     2 END
     3 time (sec)
     4 take time for GC
     5 cache size after GC
     6 cache size before GC
     7 cache size before GC (directories)
     8 cache size before GC (files)
     9 cache legth before GC (number of files)
    10 size of expired unused cache
 |