Solved

awstats with iis6.0

Posted on 2006-10-20
7
985 Views
Last Modified: 2008-01-09
I am trying to setup awstats with iis 6.0 and I keep recieving all of my records corrupted? It keeps telling me that its an incorrect log format. In the config file I set it to 2. I do not know why this keeps happening?
0
Comment
Question by:thenone
  • 3
  • 3
7 Comments
 
LVL 9

Expert Comment

by:FixingStuff
ID: 17778987
Have you selected extended logging format and selected ONLY the columns that AWstats wants in the install doc?
Also, if you have previous logs that are not exactly setup like the install wants, delete or archive them somewhere and restart IIS.
Just did this today... worked perfect.
FS-
0
 
LVL 8

Author Comment

by:thenone
ID: 17779030
Yes but I need to know I have a custom config file format so I need to know exactly what parameters go into it such as

LogFormat = "%time2 %host %logname %method %url %code %bytesd %ua %referer"
0
 
LVL 9

Expert Comment

by:FixingStuff
ID: 17779075
Ok... is this your log column list?   if not exactly, please provide your exact IIS log format. thanks.
FS-
0
Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

 
LVL 8

Author Comment

by:thenone
ID: 17779094
ok here it is its the same list as awstat

Date
Time
C-ip
CS-username
CS-method
cs-uri-stem
cs-uri-query
sc-status
sc-bytes
cs-version
cs-user-agent
referrer
0
 
LVL 9

Accepted Solution

by:
FixingStuff earned 250 total points
ID: 17790374
Ok... you originally mentioned that your logformat was set to 2.... you should set your LogFormat to the following:
LogFormat="date time c-ip cs-username cs-method cs-uri-stem cs-uri-query sc-status sc-bytes cs-version cs(User-Agent) cs(Referer)"

Also, double check the following:
  your LogFile config to make sure it is pointing to the log you want.
  LogType=W
  LogSeparator=" "

Let me know how this works for you.
FS-

0
 
LVL 18

Assisted Solution

by:Sam Panwar
Sam Panwar earned 250 total points
ID: 17793025
Hi,

This is happenning due to the Awsts configure so please install awstats through the following steps.

Installation of Awstats


1.      Download the Latest version of Awstats from following url:
(http://awstats.sourceforge.net/)

2.      Install the Awstats using Downloaded Installer. (Recommended path is c:\Awstats).

3.      Create a Directory with the name of Data at c:\Awstats.

4.      Make the configuration of log format in IIS (Windows 2003) IIS>web site>properties>website tab>Active Log format>properties>Advanced Tab.

5.      Create a virtual directory in IIS through which you can view the Awstats through Helm CP or directly by url like (http://IPAddress/awstats/cgi-bin/awstats.pl?config=domainname.com)

6.      Add update. bat file in the schedule task, update. bat will be available in ‘C:\Awstats\wwwroot\cgi-bin’, it will be daily process the log files and update the stats.

7.      Make sure check the Awstats after one or two days to make sure that your stats are updating or not because if any problem in installation then you can’t recover the old logs. If the Awstats is working fine also the c:\Awstats\data directory, it should contain a data file for each domain on which Awstats has been enabled.

8.      If you want to update the logs manually then please use following command:

c:\awstats\wwwroot\cgi-bin> Awstats.pl config=domain name -update

Some useful Links:

http://forums.webhostautomation.com/viewtopic.php?t=13388&postdays=0&postorder=asc&highlight=awstats+icon&start=0

http://forums.webhostautomation.com/viewtopic.php?t=1792&highlight=awstats

http://www.allscoop.com/tools/awstats-log-format/index.php
0
 
LVL 8

Author Comment

by:thenone
ID: 17793296
Thanks guys for your help but I figured out my problem...
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Introduction This article explores the design of a cache system that can improve the performance of a web site or web application.  The assumption is that the web site has many more “read” operations than “write” operations (this is commonly the ca…
If you don't have the right permissions set for your WordPress location in IIS, you won't be able to perform automatic updates. Here's how to fix the problem.
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
Many functions in Excel can make decisions. The most simple of these is the IF function: it returns a value depending on whether a condition you describe is true or false. Once you get the hang of using the IF function, you will find it easier to us…

895 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now