Module mod_log_common
This module is contained in the mod_log_common.c
file,
and is compiled in by default. It provides for logging of the requests
made to the server using the Common Logfile Format. This module has
been replaced by mod_log_config in Apache 1.2
Log file format
The log file contains a separate line for each request. A line is composed
of several tokens separated by spaces:
host ident authuser date request status bytes
If a token does not have a value then it is represented by a hyphen (-).
The meanings and values of these tokens are as follows:
- host
- The fully-qualified domain name of the client, or its IP number if the
name is not available.
- ident
- If IdentityCheck is enabled and the
client machine runs identd, then this is the identity information reported
by the client.
- authuser
- If the request was for an password protected document, then this is
the userid used in the request.
- date
- The date and time of the request, in the following format:
date = [day/month/year:hour:minute:second zone]
day = 2*digit
month = 3*letter
year = 4*digit
hour = 2*digit
minute = 2*digit
second = 2*digit
zone = (`+' | `-') 4*digit
- request
- The request line from the client, enclosed in double quotes
(
"
).
- status
- The three digit status code returned to the client.
- bytes
- The number of bytes in the object returned to the client, not including
any headers.
Directives
TransferLog
Syntax: TransferLog file-pipe
Default: TransferLog logs/transfer_log
Context: server config, virtual host
Status: Base
Module: mod_log_common
The TransferLog directive sets the name of the file to which the server will
log the incoming requests. File-pipe is one
of
- A filename
- A filename relative to the ServerRoot.
- `|' followed by a command
- A program to receive the agent log information on its standard input.
Note the a new program will not be started for a VirtualHost if it inherits
the TransferLog from the main server.
Security: if a program is used, then it will be
run under the user who started httpd. This will be root if the server
was started by root; be sure that the program is secure.
Security: See the security tips document for
details on why your security could be compromised if the directory
where logfiles are stored is writable by anyone other than the user
that starts the server.