|
Back
Midas
Rome
Roody
Rootana
|
Midas DAQ System |
Not logged in |
|
|
16 May 2023, Konstantin Olchanski, Bug Report, excessive logging of http requests
|
16 May 2023, Konstantin Olchanski, Bug Report, excessive logging of http requests
|
16 May 2023, Stefan Ritt, Bug Report, excessive logging of http requests
|
02 Aug 2023, Konstantin Olchanski, Bug Report, excessive logging of http requests
|
03 Aug 2023, Konstantin Olchanski, Bug Report, excessive logging of http requests
|
14 Aug 2023, Konstantin Olchanski, Bug Report, excessive logging of http requests
|
16 Aug 2023, Konstantin Olchanski, Bug Report, excessive logging of http requests
|
17 Aug 2023, Konstantin Olchanski, Bug Report, excessive logging of http requests
|
|
Message ID: 2568
Entry time: 02 Aug 2023
In reply to: 2517
Reply to this: 2573
|
Author: |
Konstantin Olchanski |
Topic: |
Bug Report |
Subject: |
excessive logging of http requests |
|
|
> > Our default configuration of apache httpd logs every request. MIDAS custom web pages can easily make a huge number of RPC calls creating a
> > huge log file and filling system disk to 100% capacity
> perhaps use existing logrotate, add limit on file size (size) and limit of 2 old log files (rotate).
logrotate was ineffective.
following apache httpd config seems to disable logging of mjsonrpc requests. note that we cannot filter on the "mjsonrpc" string because
Request_URI excludes the query string (ouch!).
#SetEnvIf Request_URI "^POST /?mjsonrpc.*" nolog
SetEnvIf Request_Method "POST" envpost
SetEnvIf Request_URI "^\/$" envuri
SetEnvIfExpr "-T reqenv('envpost') && -T reqenv('envuri')" envnolog
CustomLog logs/ssl_request_log "%t %h %{SSL_PROTOCOL}x %{SSL_CIPHER}x \"%r\" %b" env=!envnolog
K.O. |