?
Solved

Windows SharePoint Services HTTP log file, configuration, deletion and "prevention"?

Posted on 2010-08-24
4
Medium Priority
?
1,716 Views
Last Modified: 2012-05-10
Dear guys,

Scenario:
A server with Windows Server 2003 SP2 and Microsoft Office SharePoint Server 2007.

Under "C:\Program Files\Common Files\Microsoft Shared\Web Server Extensions\12\Logs\[some ID]\" is for each (since a long time) day created one subfolder per day, having a name of the format "[YYYY-MM-DD]".
In each of the "[YYYY-MM-DD]" subfolder, is found one 00.log file.

The first line of a 00.log file says "Windows SharePoint Services HTTP log file".

In IIS exists a number of Web Sites, but none for which I see logging into the above mentioned subfolders.

Hence my questions:
1. What is creating the "[YYYY-MM-DD]" subfolders and the 00.log file?

2. Where is '1' configured?

3. Can I delete older files (and/or what is the impact)?

4. Can I prevent '1'?

Kind regards,
Soren
0
Comment
Question by:slemmesmi
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 4

Accepted Solution

by:
Pstry earned 2000 total points
ID: 33509438
1) Usage Analysis Processing component. This is not related to IIS logging

2) Look at Central Administration > Operations > Usage Analysis Processing

3) You can safely delete ALL files (and folders). In fact, only the newest folder is being processed at night. Older (already processed) folders can be safely deleted. However - you must be sure that usage analysis processing already took place (it might not, eg. if server was down).

4) Turn off logging and processing in Central Administration > Operations > Usage Analysis Processing
 
0
 
LVL 11

Author Comment

by:slemmesmi
ID: 33509788
Dear Pstry,

thank you very much for your reply/precise answers.
Can you clarify how I can determine if "usage analysis processing already took place"?

Kind regards,
Soren
0
 
LVL 4

Assisted Solution

by:Pstry
Pstry earned 2000 total points
ID: 33510040
Look at Central Administration > Operations > Timer Job Status. You will see three job types:

- Usage Analysis - WSS jobs for each web application - provide basic analysis
- Office Sharepoint Usage Analytics Log Import - imports 00.log file to the SSP database
- Office Sharepoint Usage Analytics Processing - prepares imported data for reporting

Now - check if jobs succeeded and what is their start time. Normally these jobs run at 1:00-2:00 for several minutes, so when you come to work at morning files are already processed and can be safely removed.

Note that if you do not need any usage analysis - you may delete files at once (and turn off processing in Central Admin Site).
0
 
LVL 11

Author Comment

by:slemmesmi
ID: 33510864
Dear Pstry,

excellent - thanks for your exhaustive answers which I will fully accept and reward.
All the best to you!

Kind regards,
Soren
0

Featured Post

What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Summary In SharePoint 2010 it is easy to create custom color themes to jazz up a site. Theme colors can also be created in PowerPoint 2010 with a few clicks. But how do the chosen colors actually look in the SharePoint site? The attached PowerPoint…
If you don't have the right permissions set for your WordPress location in IIS, you won't be able to perform automatic updates. Here's how to fix the problem.
Visualize your data even better in Access queries. Given a date and a value, this lesson shows how to compare that value with the previous value, calculate the difference, and display a circle if the value is the same, an up triangle if it increased…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question