Solved

How to extract concurrent users checking access_log file

Posted on 2004-08-05
8
333 Views
Last Modified: 2012-06-27
I was wondering, how can I  find out how many concurrent users are accesing my webserver?
I've been checking around some log analyzers, but even the better ones dont give me thi stats. Any advice?
Thanks.
0
Comment
Question by:gmartelli
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 4
8 Comments
 
LVL 51

Expert Comment

by:ahoffmann
ID: 11729644
> .. how many concurrent users ..
how do you define a "user"?
i.g. this is impossible, or in paricular: there is no 99.999% reliable method to do it.
0
 

Author Comment

by:gmartelli
ID: 11729664
Ok, how many Different IP addresses would do :).
Lets say, which is the top distincts IPs in a 1 minute period.
The point is, I need to figure out a concurrence, ANY measure of concurrence will help...and I only have the access log file to do it.
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 11729865
awk '($5~/GET$/){print $3" "$4}' /var/log/httpd/access_log | awk -F: '($1=="16"&&$2=="15"){print}'

# replace 16 by your hour, and 15 by your minute
# to be improved in many ways (and adapted to you logfile format
0
Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

 

Author Comment

by:gmartelli
ID: 11729892
Hum, how about in ANY minute? I mean, I want to find the top one, if I knew it, It would be quite easy to find out the total count of users in it :)
0
 
LVL 51

Accepted Solution

by:
ahoffmann earned 500 total points
ID: 11730205
what is "ANY" minute? 1 or 17 or 42 or ..
or do you mean somthing like:
 awk '($5~/GET$/){print $3" :"$4}' /var/log/httpd/access_log | awk -F: '{print $1":"$2" "$NF}'|sort -u
0
 

Author Comment

by:gmartelli
ID: 11730221
You get the points, I realized  getting into the realm of analytical SQL (which is what I'm checking now). I meant "the most user accesses in any given minute", meaning I dont know which minute i'm checking, its like a window aggregate (yah, deep magic but seems like Oracle will make things a bit easier for me :)


Thanks
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 11730451
Oracle? hmm, sounds like breaking a fly on the wheel ;-)
Anyway, thanks for grading, hope it helps you anyway
KISS - keep it stupid simple
0
 

Author Comment

by:gmartelli
ID: 11730603
The problem is not the answer, but the question :)
Thanks for the help
0

Featured Post

Flexible connectivity for any environment

The KE6900 series can extend and deploy computers with high definition displays across multiple stations in a variety of applications that suit any environment. Expand computer use to stations across multiple rooms with dynamic access.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

As Wikipedia explains 'robots.txt' as -- the robot exclusion standard, also known as the Robots Exclusion Protocol or robots.txt protocol, is a convention to prevent cooperating web spiders and other web robots from accessing all or part of a websit…
Introduction As you’re probably aware the HTTP protocol offers basic / weak authentication, which in combination with the relevant configuration on your web server, provides the ability to password protect all or part of your host.  If you were not…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

697 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question