Windows SharePoint Services HTTP log file, configuration, deletion and "prevention"?

Posted on 2010-08-24
Last Modified: 2012-05-10
Dear guys,

A server with Windows Server 2003 SP2 and Microsoft Office SharePoint Server 2007.

Under "C:\Program Files\Common Files\Microsoft Shared\Web Server Extensions\12\Logs\[some ID]\" is for each (since a long time) day created one subfolder per day, having a name of the format "[YYYY-MM-DD]".
In each of the "[YYYY-MM-DD]" subfolder, is found one 00.log file.

The first line of a 00.log file says "Windows SharePoint Services HTTP log file".

In IIS exists a number of Web Sites, but none for which I see logging into the above mentioned subfolders.

Hence my questions:
1. What is creating the "[YYYY-MM-DD]" subfolders and the 00.log file?

2. Where is '1' configured?

3. Can I delete older files (and/or what is the impact)?

4. Can I prevent '1'?

Kind regards,
Question by:slemmesmi
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2

Accepted Solution

Pstry earned 500 total points
ID: 33509438
1) Usage Analysis Processing component. This is not related to IIS logging

2) Look at Central Administration > Operations > Usage Analysis Processing

3) You can safely delete ALL files (and folders). In fact, only the newest folder is being processed at night. Older (already processed) folders can be safely deleted. However - you must be sure that usage analysis processing already took place (it might not, eg. if server was down).

4) Turn off logging and processing in Central Administration > Operations > Usage Analysis Processing
LVL 11

Author Comment

ID: 33509788
Dear Pstry,

thank you very much for your reply/precise answers.
Can you clarify how I can determine if "usage analysis processing already took place"?

Kind regards,

Assisted Solution

Pstry earned 500 total points
ID: 33510040
Look at Central Administration > Operations > Timer Job Status. You will see three job types:

- Usage Analysis - WSS jobs for each web application - provide basic analysis
- Office Sharepoint Usage Analytics Log Import - imports 00.log file to the SSP database
- Office Sharepoint Usage Analytics Processing - prepares imported data for reporting

Now - check if jobs succeeded and what is their start time. Normally these jobs run at 1:00-2:00 for several minutes, so when you come to work at morning files are already processed and can be safely removed.

Note that if you do not need any usage analysis - you may delete files at once (and turn off processing in Central Admin Site).
LVL 11

Author Comment

ID: 33510864
Dear Pstry,

excellent - thanks for your exhaustive answers which I will fully accept and reward.
All the best to you!

Kind regards,

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Running classic asp applications under Windows Server 2008 R2 (x64) and IIS 7 is not as easy as one may think. It took me a while to figure it out while getting error 8002801d a few times. After you install the OS you will need to install the fol…
As tax season makes its return, so does the increase in cyber crime and tax refund phishing that comes with it
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question