Administration Interface Settings
Admin Server is a special virtual host dedicated to the web administration interface. It is very important to make Admin Server securely protected either by only allowing access from administrator's machines or by using encrypted SSL connection.
 
Table of Contents
General Enable Core Dump   
Virtual Host Log Use Server Log   File Name   Log Level   Rolling Size   
Access Log Log Control   File Name   Log Referrer   Log User Agent   Rolling Size   Keep Days   
Access Control Allowed List   Denied List   
 
Enable Core DumpGo to top
Description: Specifies whether to enable core dump when server is started by "root" user. In most modern Unix system, process that changes user id or group id is not allowed to dump a core file for security reasons, however, it is much easier to identify root cause of a problem with a core dump. This option only works on Linux with kernel 2.4.x. Solaris user should use command coreadm to control this.
Syntax: Select from radio box
Apply: On the fly with reload.
Tips: [Security] Only enable it when you see "no core file is created" in server log file and disable it immediately after producing the core file. Please submit a bug report.
Use Server LogGo to top
Description: Specifies whether to put log messages from this virtual host into server log file instead of creating its own log file.
Syntax: Select from radio box
Apply: On the fly with reload.
File NameGo to top
Description: Specifies the server log file.
Syntax: File name which can be an absolute path or relative to $SERVER_ROOT.
Apply: On the fly with reload.
Tips: [Performance] Place log file on a faster disk.
     Use separate disks for your web pages, log files, database and swapping directory.
Log LevelGo to top
Description: Specifies the level of logging. Available levels are ERROR, WARNING, NOTICE, INFO and DEBUG from high to low. Only messages with higher level than current setting will be logged. If you want to set it to DEBUG, you must set server log level to be DEBUG as well. The level of debugging is solely controlled by Debug Level.
Syntax: Select from drop down list
Apply: On the fly with reload.
Tips: [Performance] Use DEBUG only if you have to. Debug logging includes detailed information for each request and response; it has great impact on server performance and may fill up disk space quickly.
Rolling SizeGo to top
Description: Specifies when the current log file needs to be rolled over. When the file size is over the limit, the current log file will be renamed to your_log_name.mm_dd_yyyy(.sequence) in the same directory and a new log file will be created. The actual size of the rotated log file could be a little bigger.
Syntax: Integer number
Apply: On the fly with reload.
Tips: Append "K", "M", "G" to the number for kilo-, mega- and giga- bytes
Log ControlGo to top
Description: Specifies where to output access log. There are three options: 1. write to server's access log; 2. create its own access log; 3. disable access logging.
Syntax: Select from drop down list
Apply: On the fly with reload.
File NameGo to top
Description: Specifies the server level access log file. You can customize it at virtual host level.
Syntax: File name which can be an absolute path or relative to $SERVER_ROOT.
Apply: On the fly with reload.
Tips: [Performance] Put access log file on a separate or faster disk.
Log ReferrerGo to top
Description: Specifies whether to log Referrer HTTP header or not.
Syntax: Select from radio box
Apply: On the fly with reload.
Tips: [Performance] Turn it off if you do not care.
Log User AgentGo to top
Description: Specifies whether to log UserAgent HTTP header or not.
Syntax: Select from radio box
Apply: On the fly with reload.
Tips: [Performance] turn it off if you do not care.
Keep DaysGo to top
Description: Specifies for how many days the access log file will be preserved. Only rotated log file older than specified days will be removed, the current log file will not be touched no matter how many day's data it contains. If you want to keep all the old access log files or want to maintain by yourself, set this value to 0.
Syntax: Integer number
Apply: On the fly with reload.
Access ControlGo to top
Description: Specifies what sub network and/or IP address can access this virtual host in addition to server level access control. Virtual host setting does NOT override the server setting. Whether to block/allow an IP is determined by the combination of allowed list and denied list. If you want to block certain IP or sub-network, put * or ALL in the allowed list and list the blocked IP or sub-network in the denied list. If you want to only allow certain IP or sub-network, put * or ALL in the denied list and list the allowed IP or sub-network in the allowed list. The setting of the smallest scope that fits for an IP will be used to determine whether to block or allow.
Allowed ListGo to top
Description: Specifies the list of IP or sub-net allowed.
Syntax: comma-separated list of IP address or sub-network. * or ALL, sub-network can be like 192.168.1.0/255.255.255.0, 192.168.1 or 192.168.1.*.
Apply: On the fly with reload.
Denied ListGo to top
Description: Specifies the list of IP or sub-net disallowed.
Syntax: comma-separated list of IP address or sub-network, * or ALL, sub-network can be like 192.168.1.0/255.255.255.0 or 192.168.1.*
Apply: On the fly with reload.