Access log filters

Access logs record the activity of the host machine, the proxy, and the cache. For each access request that your proxy receives, an entry in the appropriate access log includes the following information:

Access errors are logged in the server's error log.

Reasons to control what is logged

There are several reasons to restrict what is logged:

Information that is excluded from access logs is not recorded in any access report and is not available for future use. Therefore, if you are unsure about how much access information you need to track, apply exclusion filters conservatively until you gain experience in monitoring your server.

Configuring access log filters

Access log entries can be filtered based on any of the following attributes:

To specify your filters, in the Configuration and Administration forms, select Server Configuration -> Logging -> Access Log Exclusions. Specify only those exclusions that you want. You do not need to use all the categories.

Click Submit.

Related configuration file directives

To set access log filters by using the proxy configuration file, see the reference sections in Appendix B. Configuration file directives for the following directives: