> > -----Original Message-----
> > From: Krist van Besien [mailto:[EMAIL PROTECTED]
> > Sent: Tuesday, June 21, 2005 8:22 AM
> > 
> > > On 6/21/05, Michael Caplan <[EMAIL PROTECTED]> wrote:
> > >
> > > I am looking for some advice on how to go about debugging Apache 1.3.33/
> > > PHP 5.0.4 on a production Linux box (RHE 3).  The scenario is this:
> > > Once a day we find a segfault in our apache logs.  From our current 
> > > position,
> > > we don't know what page was accessed, and our 400+ users haven't brought
> > > the issue to our attention.  All we know is the date/time and PID of when
> > > the segfault occurred.  The question is this:  how can we go about 
> > > isolating
> > > the offending requested page that bombs?
> > 
> > What you could do is  set up a proxy in front of you server. Let the
> > proxy log all requests. The request that causes the server to bomb
> > will probably be listed with an error  message in the proxy's log,
> > otherwise you always have the timestamps.
> > 
> > Krist
> > 

Would adding the PID to your access_log help any?  %P in your logFormat.
We use the following in our httpd.conf:

LogFormat "%h %l %u %{[%d/%b/%Y:%T %z]}t \"%r\" %>s %b \"%{User-Agent}i\" 
%{VHOST}e[%P]"
icombined
CustomLog /usr/local/apache/logs/access_log icombined

I believe the access_log entries are written at the end of the process, ie the 
seg
fault probably happens before the access_log entry is written.  But you may be 
able 
to see where the user is headed..?

marc



---------------------------------------------------------------------
The official User-To-User support forum of the Apache HTTP Server Project.
See <URL:http://httpd.apache.org/userslist.html> for more info.
To unsubscribe, e-mail: [EMAIL PROTECTED]
   "   from the digest: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to