Solved

Web log analyser  analyzer for Linux / Apache

Posted on 2015-02-06
4
111 Views
Last Modified: 2015-02-15
Hi I have an Unbuntu Apache webserver and wondered what are the best open source / paid for web log analysers analyzers the 2 I have looked at are:

http://www.apacheviewer.com/
https://help.ubuntu.com/community/AWStats

Can anyone suggest anything they think is good ?

Terry
0
Comment
Question by:ncomper
  • 2
4 Comments
 
LVL 13

Expert Comment

by:Mark Bullock
ID: 40595224
I have used Splunk.

It has dashboards, ad hoc queries, and alerts. It is super useful for troubleshooting and understanding when and how often certain events happened.
0
 
LVL 25

Accepted Solution

by:
madunix earned 500 total points
ID: 40596802
I do also splunk for general logs  and data correlation in my environment http://www.splunk.com/view/free-vs-enterprise/SP-CAAAE8W

General solution for logs  and data correlation solutions:
Cisco CS-MARS http://www.cisco.com/en/US/products/ps6241/index.html
Sawmill:  http://www.sawmill.net
Manage Engine with OpManager:  http://www.manageengine.com


If you are looking for apache web I use both Webalizer and AWStats, also check others:
(1) http://ftp.ics.uci.edu/pub/websoft/wwwstat/ 
(2) http://en.wikipedia.org/wiki/Web_log_analysis_software 
(3) http://http-analyze.org/index.php
(4) http://piwik.org/
(5) http://www.abiglime.com/webmaster/articles/cgi/110497.htm
(6) http://www.w3perl.com/
(7) http://www.webalizer.org/
(8) http://www.awstats.org/
0
 
LVL 61

Expert Comment

by:gheist
ID: 40597284
Piwik has dashboards and does not lock up when you reach 1GB logs per day.
0
 
LVL 61

Expert Comment

by:gheist
ID: 40610725
Splunk is a pain in the ass when you get your site refered in top tech site and you need to pay ransom to know how popular you really  were...
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
AWS EC2 Linux 1 54
Java / Linux and Regular Expressions 11 70
Fixing Non-Standard characters in text 8 91
VirtualBox in Fedora 25 Linux:  Unable to Install OS 11 141
The task of choosing a web design company to build a website for your business should never be taken in a light manner. Provided the fact that your website will act as a representative to your business and will be responsible for imposing an online …
Online collaboration is quickly becoming embedded in the workplace, and its benefits are tangible. See what the current landscape looks like and what the future holds for collaboration tools and the future of work.
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now