Logging (computing): Difference between revisions

Content deleted Content added
bolding is not a suicide pact
unneeded subheaders
Line 23:
Most [[Database|database systems]] maintain some kind of ''transaction log'', which are not mainly intended as an audit trail for later analysis, and are not intended to be [[human-readable]]. These logs record changes to the stored data to allow the database to recover from [[Crash (computing)|crashes]] or other data errors and maintain the stored data in a consistent state. Thus, database systems usually have both general event logs and transaction logs.<ref>{{Cite web|url=https://learn.microsoft.com/en-us/sql/relational-databases/logs/the-transaction-log-sql-server|title=The Transaction Log (SQL Server) - SQL Server|website=learn.microsoft.com}}</ref><ref>{{Cite web|url=https://www.sqlshack.com/beginners-guide-sql-server-transaction-logs/|title=A beginner’s guide to SQL Server transaction logs|first=Ivan|last=Stankovic|date=February 11, 2014}}</ref><ref>{{Cite web|url=https://www.techrepublic.com/article/understanding-the-importance-of-transaction-logs-in-sql-server/|title=Understanding the importance of transaction logs in SQL Server|date=November 11, 2004|website=TechRepublic}}</ref><ref>{{Cite web|url=https://www.neurobs.com/pres_docs/html/03_presentation/07_data_reporting/01_logfiles/index.html|title=Logfiles|website=www.neurobs.com}}</ref>
 
=== Transaction log analysis ===
The use of data stored in transaction logs of Web search engines, Intranets, and Web sites can provide valuable insight into understanding the information-searching process of online searchers.<ref>Jansen, B. J. 2006. Search log analysis: What is it; what's been done; how to do it. Library and Information Science Research, 28(3), 407-432</ref> This understanding can enlighten information system design, interface development, and devising the information architecture for content collections.
 
Line 30 ⟶ 29:
[[Internet Relay Chat|Internet Relay Chat (IRC)]], [[Instant messaging|instant messaging (IM)]] programs, [[peer-to-peer]] file sharing clients with chat functions, and [[Multiplayer video game|multiplayer]] games (especially [[MMORPG]]s) commonly have the ability to automatically save textual communication, both public (IRC channel/IM conference/MMO public/party chat messages) and private chat between users, as message logs.<ref>{{Cite web|url=https://learn.microsoft.com/en-us/dotnet/api/microsoft.sqlserver.management.smo.logfile?view=sql-smo-preview|title=LogFile Class (Microsoft.SqlServer.Management.Smo)|website=learn.microsoft.com}}</ref>
Message logs are almost universally plain text files, but IM and [[VoIP]] clients (which support textual chat, e.g. Skype) might save them in [[HTML]] files or in a custom format to ease reading or enable [[encryption]].
 
=== Internet Relay Chat (IRC) ===
 
In the case of IRC software, message logs often include system/server messages and entries related to channel and user changes (e.g. topic change, user joins/exits/[[List of Internet Relay Chat commands#KICK|kicks]]/[[Block (Internet)|bans]], [[nickname]] changes, the user status changes), making them more like a combined message/event log of the channel in question, but such a log isn't comparable to a true IRC server event log, because it only records user-visible events for the time frame the user spent being connected to a certain channel.
 
=== Instant messaging ===
 
Instant messaging and VoIP clients often offer the chance to store encrypted logs to enhance the user's privacy. These logs require a password to be decrypted and viewed, and they are often handled by their respective writing application. Some privacy focused messaging services, such as [[Signal (software)|Signal]], record minimal logs about users, limiting their information to connection times.<ref>{{cite web|last1=Brandom|first1=Russell|title=Iran blocks encrypted messaging apps amid nationwide protests|url=https://www.theverge.com/2018/1/2/16841292/iran-telegram-block-encryption-protest-google-signal|website=The Verge|publisher=Vox Media|access-date=23 March 2018|date=2 January 2018|archive-date=22 March 2018|archive-url=https://web.archive.org/web/20180322015257/https://www.theverge.com/2018/1/2/16841292/iran-telegram-block-encryption-protest-google-signal|url-status=live}}</ref>
Line 41 ⟶ 36:
==Server log{{anchor|Server}}==
[[File:Apache Log.png|thumb|Apache access log showing Wordpress vulnerability bots]]
 
A ''server log'' is a log file (or several files) automatically created and maintained by a [[Server (computing)|server]] consisting of a list of activities it performed.