[next] [previous] [contents] [full-page]16.1 - Event Categories
16.2 - Request Filtering
16.3 - Report Format
16.4 - Usage Suggestions
16.5 - Command-Line Use
The WATCH facility is a powerful adjunct in server administration. From the administration menu it provides an online, real-time, in-browser-window view of request processing in the running server. The ability to observe live request processing on an ad hoc basis, without changing server configuration or shutting-down/restarting the server process, makes this facility a great configuration and problem resolution tool. It allows (amongst other uses)
A single client per server process can access the WATCH facility at any one time. It can be used in one of two modes.
An event is considered any significant point for which the server code has a reporting call provided. These have been selected to provide maximum information with minimum clutter and impact on server performance. Obvious examples are connection acceptance and closure, request path resolution, error report generation, network reads and writes, etc. Events are collected together into groupings to allow clearly defined areas of interest to be selected for reporting.
The report menu provides for the inclusion of any combination of the
following categories.
Request
By default all requests to all services are WATCHed. Fine control may be exercised over exactly which requests are reported, allowing only a selected portion of all requests being processed to be concentrated on, even on a live and busy server. This is done by filtering requests according the following criteria.
These filters are controlled using fully-specified or wildcarded strings. Requests that do not match the filter are not reported. In the case of originating client and destination service, requests are eliminated before ever appearing in the report. Path and track filtering is slightly different, requiring some request processing before the target can be determined. Depending on the categories selected this may result in some events begin displayed. It will be eliminated, with an accompanying explanatory message, as soon the path or track identifier has been determined.
The following examples are grouped in the same order as the categories
listed above; client, service and path.
alpha.wasd.dsto.defence.gov.au
*.wasd.dsto.gov.au
131.185.250.202
131.185.250.*
beta.wasd.dsto.defence.gov.au:8000
beta.wasd.dsto.defence.gov.au:*
http://*
https:*
*:80
/ht_root/src/*
/cgi-bin/*
/web/*/cyrillic/*
$ORoKJAOef8sAAAkuACc
http://proxied.host.name/*
16.3 - Report Format
The following example illustrates the format of the WATCH report. It begins with multi-line heading. The first two record the date, time and official server name, with underline. The third provides the WASD server version. The fourth provides some TCP/IP agent information. Lines following can show OpenSSL version (if deployed), system infomation, server startup command-line, and then current server process quotas. The last three lines of the header provide a list of the categories being recorded, the filters in use, and the last, column headings described as follows:
Note that some items also include a block of data. The request header
category does this, providing the blank-line terminated text comprising the
HTTP header. Rule mapping also provides a block of information representing
each rule as it is interpreted. Generally WATCH-generated information can be
distinguished from other data by it's uniform format and delimiting vertical
bars. Initiative and imagination is sometimes required to interpret the
free-form data but a basic understanding of HTTP serving and a little
consideration is generally all that is required to deduce the essentials
of any report.
31-MAY-2000 18:20:25 WATCH REPORT delta.wasd.dsto.defence.gov.au:80
---------------------------------------------------------------------
HTTPd-WASD/7.0.0 OpenVMS/AXP SSL (30-MAY-2000 22:56:54.37 VMS 7.2-1 DECC 60290003)
Compaq-TCP/IP TCPIP$IPC_SHR V5.0A-1 (20-MAY-1999 22:31:52.08)
OpenSSL 0.9.5 28 Feb 2000 (5-MAR-2000 14:58:56.83)
AlphaServer DS20 500 MHz VMS V7.2-1 (ODS-5 enabled, VMS NAML, VMS FIB)
$ HTTPD /PRIORITY=4 /SYSUAF=(ID)
AST:1995/2000 BIO:509/512 BYT:479200/499296 DIO:512/512 ENQ:504/512 FIL:295/300 PGFL:192992/200000 PRC:0/100 TQ:98/100
BYTLM-available:495008 BYTLM-per-subproc:14592 (approx 26 subprocesses) BYTLM-net-accept:1024 BYTLM-net-listen:1024
Watching: connect, request, response (19)
Client: "*" Service: "*" Path: "*"
|Time_______|Module__|Line|Item|Category|Event...|
|18:20:46.91 NET 1626 0001 CONNECT ACCEPT 131.185.250.108,47111 on https://131.185.250.203:443|
|18:20:47.00 REQUEST 1211 0001 REQUEST HEADER 285 bytes|
GET /ht_root/ HTTP/1.0
If-Modified-Since: Thursday, 07-Oct-99 03:51:23 GMT; length=4644
Connection: Keep-Alive
User-Agent: Mozilla/3.0Gold (X11; I; OSF1 V4.0 alpha)
Pragma: no-cache
Host: delta.wasd.dsto.defence.gov.au
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, */*
|18:20:47.00 NET 1148 0001 CONNECT VIRTUAL delta.wasd.dsto.defence.gov.au:443|
|18:20:47.00 REQUEST 2270 0001 REQUEST GET /ht_root/|
|18:20:47.00 MAPURL 0312 0001 MAPPING PATH /ht_root/|
/ht_root/ .. REDIRECT /*.*.htmlx /*.htmlx?httpd=ssi&__part=*
/ht_root/ .. PASS /httpd/-/change/* /httpd/-/change/*
/ht_root/ .. MAP /htroot/* /ht_root/*
/ht_root/ .. SET /web/* stmLF
/ht_root/ .. SET /ht_root/* stmLF
/ht_root/ .. MAP /httpd-internal-icons/* /httpd/-/*
/ht_root/ .. PASS /ht_root/runtime/* /ht_root/runtime/*
/ht_root/ .. PASS /*/-/* /ht_root/runtime/*/*
/ht_root/ Y- PASS /ht_root/*
|18:20:47.00 MAPURL 0335 0001 MAPPING RESULT /ht_root/ /ht_root/ HT_ROOT:[000000] - -|
|18:20:47.00 CACHE 0604 0001 RESPONSE CACHE DSA811:[HT_ROOT.][000000]HOME.HTML|
|18:20:47.00 NET 2427 0001 RESPONSE HEADER 231 bytes|
HTTP/1.0 200 Success
Server: HTTPd-WASD/7.0.0 OpenVMS/AXP Digital-TCPIP SSL
Date: Wed, 31 May 2000 18:20:47 GMT
Last-Modified: Tue, 30 May 2000 03:51:23 GMT
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 4644
|18:20:47.00 REQUEST 0407 0001 REQUEST STATUS 200 rx:457 tx:5084 bytes 0.0000 seconds|
|18:20:47.00 REQUEST 0252 0001 CONNECT KEEP-ALIVE 131.185.250.108,47111|
|18:20:52.06 NET 1502 0001 CONNECT CLOSE 131.185.250.108,47111|
16.4 - Usage Suggestions
The following provides a brief explanation on the way WATCH operates and any usage implications.
A single client may be connected to the WATCH facility at any given time. When connecting the client is sent an HTTP response header and the WATCH report heading lines. The request then remains connected until the WATCH duration expires or the client overtly aborts the connection. During this period the browser behaves as if receiving a sometimes very slow, sometimes stalled, plain-text document. As the server processes WATCHable events the text generated is sent to the WATCH-connected client.
If the connection is aborted by the user some browsers will consider document retrieval to be incomplete and attempt to reconnect to the service if an attempt is made to print or save the resulting document. As the printing of WATCH information is often quite valuable during problem resolution this behaviour can result in loss of information and generally be quite annoying. Appropriate use of the duration selector when requesting a report can work around this, as at expiry the server disconnects, browsers generally interpreting this as legitimate end-of-document (when no content-length has been specified).
During report processing some browsers may not immediately update the on-screen information to reflect received data without some application activity. If scroll-bars are present on the document window manipulating either the horizonal or vertical slider will often accomplish this. Failing that minimizing then restoring the application will usually result in the most recent information being visible.
Browser reload/refresh may be used to restart the report. A browser will quite commonly attempt to remain at the current position in the document, which with a WATCH report's sustained but largely indeterminate data stream may take some time to reach. It is suggested the user ensure that any vertical scroll-bar is at the beginning of the current report, then refresh the report.
Selecting a large number of categories, those that generate copious output for a single event (e.g. response body) or collecting for extended periods can all result in the receipt of massive reports. Some browsers do not cope well with documents megabytes in size.
NOTE
WATCH reports are written using blocking I/O. This means when large bursts of data are being generated (e.g. when WATCHing network data, response bodies, etc.) significant granularity may be introduced to server processing. Also if the WATCH client fails or blocks completely server processing could halt completely! (This has been seen when WATCHing through a firewall.)
When supplying WATCH output as part of a problem report
please ZIP the file and include it an an e-mail attachment. Mailers often
mangle the report format making it difficult to interpret.
16.5 - Command-Line Use
Although intended primarily as a tool for online use WATCH can be deployed at server startup with a command-line qualifier and provide report output to the server process log. This is slightly more cumbersome than the Web interface but may still be useful in some circumstances. Full control over event categories and filters is possible.
The category integer must be the bitwise-OR of the constants found in the ADMIN.H source code header file. The end of the category list in the on-line WATCH report header contains a parenthesized integer. This is the number representing the enabled categories for that report and can be used for those same categories from the command line.
The following examples illustrate the command-line WATCH specification.
/NOWATCH
/WATCH=88
/WATCH="88,*,*,/cgi-bin/*"