Home Operation and Maintenance Nginx How to use Nginx Proxy Manager to collect and analyze website access logs

How to use Nginx Proxy Manager to collect and analyze website access logs

Sep 26, 2023 am 08:15 AM
nginx proxy Log analysis

如何利用Nginx Proxy Manager实现网站访问日志的采集与分析

How to use Nginx Proxy Manager to collect and analyze website access logs

Introduction:
With the rapid development of the Internet, website log analysis has become important of a link. By collecting and analyzing website access logs, we can understand users' behavioral habits, optimize website performance, and improve user experience. This article will introduce how to use Nginx Proxy Manager to collect and analyze website access logs, including specific steps such as configuring Nginx Proxy Manager, collecting website access logs, and storing and analyzing log data. At the same time, relevant code examples are provided for reference.

1. Configure Nginx Proxy Manager

  1. Install Nginx Proxy Manager
    First, we need to install Nginx Proxy Manager. You can download the latest version of Nginx Proxy Manager through the official website (https://nginxproxymanager.com/) and install it according to the documentation.
  2. Configuring Nginx
    After the installation is completed, Nginx needs to be configured. In the Nginx configuration file, add the following configuration section:
server {
    listen 80;
    server_name example.com;

    location / {
        proxy_pass http://localhost:8080;
        proxy_set_header Host $host;
        proxy_set_header X-Real-IP $remote_addr;
        # 其他代理相关配置...
    }
}
Copy after login

Among them, example.com is the domain name to be proxied, http://localhost:8080 is the actual web server address.

  1. Configure SSL certificate
    If you need to enable HTTPS access, you need to configure an SSL certificate. Certificate configuration and management can be completed through the web interface of Nginx Proxy Manager.

2. Collect website access logs

  1. Enable Nginx access logs
    In the Nginx configuration file, add the following configuration section:
http {
    access_log /var/log/nginx/access.log;
    # 其他日志相关配置...
}
Copy after login

Among them, /var/log/nginx/access.log is the path of the log file.

  1. Configure log format
    In order to facilitate analysis and storage, you can configure a custom log format. In the Nginx configuration file, add the following configuration section:
http {
    log_format main '$remote_addr - $remote_user [$time_local] "$request" '
                    '$status $body_bytes_sent "$http_referer" '
                    '"$http_user_agent" "$http_x_forwarded_for"';

    access_log /var/log/nginx/access.log main;
    # 其他日志相关配置...
}
Copy after login
  1. Restart Nginx
    After completing the above configuration, restart the Nginx service to make the configuration take effect.

3. Store and analyze log data

  1. Install ELK Stack
    In order to store and analyze log data, you can use ELK Stack (Elasticsearch, Logstash, Kibana). You can download the latest version of ELK Stack through the official website (https://www.elastic.co/) and install it according to the documentation.
  2. Configuring Logstash
    In the Logstash configuration file, add the following configuration section:
input {
    file {
        path => "/var/log/nginx/access.log"
        start_position => "beginning"
        sincedb_path => "/dev/null"
        ignore_older => 0
    }
}

filter {
    # 数据过滤配置...
}

output {
    elasticsearch {
        hosts => ["localhost"]
        index => "nginx-%{+YYYY.MM.dd}"
    }
}
Copy after login

Among them, /var/log/nginx/access.logThe path to the Nginx access log file.

  1. Configuring Kibana
    In the Kibana configuration file, modify the following configuration items:
elasticsearch.hosts: ["http://localhost:9200"]
Copy after login

4. Log analysis and visualization

  1. Access Kibana
    Access Kibana’s address in the browser (default is http://localhost:5601).
  2. Create index
    In Kibana, create an index named "nginx-*" so that Nginx access logs can be queried and visualized.
  3. Application Query and Visualization
    In Kibana, you can create various queries and visualization charts to analyze Nginx access logs. For example, you can create a dashboard that includes charts such as number of visits, visit sources, visit frequency, and more.

Conclusion:
By using Nginx Proxy Manager to collect and analyze website access logs, we can better understand user behavior, optimize website performance, and thereby improve user experience. I hope this article can provide some reference for readers to use Nginx Proxy Manager to collect and analyze website access logs in actual projects. Wish you happy using it!

The above is the detailed content of How to use Nginx Proxy Manager to collect and analyze website access logs. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
WWE 2K25: How To Unlock Everything In MyRise
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

How to allow external network access to tomcat server How to allow external network access to tomcat server Apr 21, 2024 am 07:22 AM

To allow the Tomcat server to access the external network, you need to: modify the Tomcat configuration file to allow external connections. Add a firewall rule to allow access to the Tomcat server port. Create a DNS record pointing the domain name to the Tomcat server public IP. Optional: Use a reverse proxy to improve security and performance. Optional: Set up HTTPS for increased security.

How to run thinkphp How to run thinkphp Apr 09, 2024 pm 05:39 PM

Steps to run ThinkPHP Framework locally: Download and unzip ThinkPHP Framework to a local directory. Create a virtual host (optional) pointing to the ThinkPHP root directory. Configure database connection parameters. Start the web server. Initialize the ThinkPHP application. Access the ThinkPHP application URL and run it.

Welcome to nginx!How to solve it? Welcome to nginx!How to solve it? Apr 17, 2024 am 05:12 AM

To solve the "Welcome to nginx!" error, you need to check the virtual host configuration, enable the virtual host, reload Nginx, if the virtual host configuration file cannot be found, create a default page and reload Nginx, then the error message will disappear and the website will be normal show.

How to generate URL from html file How to generate URL from html file Apr 21, 2024 pm 12:57 PM

Converting an HTML file to a URL requires a web server, which involves the following steps: Obtain a web server. Set up a web server. Upload HTML file. Create a domain name. Route the request.

How to deploy nodejs project to server How to deploy nodejs project to server Apr 21, 2024 am 04:40 AM

Server deployment steps for a Node.js project: Prepare the deployment environment: obtain server access, install Node.js, set up a Git repository. Build the application: Use npm run build to generate deployable code and dependencies. Upload code to the server: via Git or File Transfer Protocol. Install dependencies: SSH into the server and use npm install to install application dependencies. Start the application: Use a command such as node index.js to start the application, or use a process manager such as pm2. Configure a reverse proxy (optional): Use a reverse proxy such as Nginx or Apache to route traffic to your application

Can nodejs be accessed from the outside? Can nodejs be accessed from the outside? Apr 21, 2024 am 04:43 AM

Yes, Node.js can be accessed from the outside. You can use the following methods: Use Cloud Functions to deploy the function and make it publicly accessible. Use the Express framework to create routes and define endpoints. Use Nginx to reverse proxy requests to Node.js applications. Use Docker containers to run Node.js applications and expose them through port mapping.

How to deploy and maintain a website using PHP How to deploy and maintain a website using PHP May 03, 2024 am 08:54 AM

To successfully deploy and maintain a PHP website, you need to perform the following steps: Select a web server (such as Apache or Nginx) Install PHP Create a database and connect PHP Upload code to the server Set up domain name and DNS Monitoring website maintenance steps include updating PHP and web servers, and backing up the website , monitor error logs and update content.

How to use Fail2Ban to protect your server from brute force attacks How to use Fail2Ban to protect your server from brute force attacks Apr 27, 2024 am 08:34 AM

An important task for Linux administrators is to protect the server from illegal attacks or access. By default, Linux systems come with well-configured firewalls, such as iptables, Uncomplicated Firewall (UFW), ConfigServerSecurityFirewall (CSF), etc., which can prevent a variety of attacks. Any machine connected to the Internet is a potential target for malicious attacks. There is a tool called Fail2Ban that can be used to mitigate illegal access on the server. What is Fail2Ban? Fail2Ban[1] is an intrusion prevention software that protects servers from brute force attacks. It is written in Python programming language

See all articles