Red Hat Directory Server 8.0 Configuration, Command, and File Reference
4.7. logconv.pl (Log Converter)
Analyzes the access logs of a Directory Server to extract usage statistics and count the
occurrences of significant events. It is compatible with log formats from previous releases of
Directory Server. For information on access logs, see Chapter 5, Access Log and Connection
Code Reference.
The tool will extract the following information from access logs:
• Number of restarts
• Total number of connections
• Total operations requested
• Total results returned
• Results to requests ratio
• Number of searches
• Number of modifications
• Number of adds
• Number of deletes
• Number of modified RDNs
• Persistent searches
• Internal operations (with verbose logs)
• Entry operations (with verbose logs)
• Extended operations
• Abandoned requests
• Smart referrals received (verbose logs)
• VLV (virtual list view) operations
• VLV unindexed searches
• Server-side sorting operations
• SSL connections
• Performance lowering operations:
• Entire database searches
• Unindexed searches (details optional)
• FDs (file descriptors) taken
• FDs returned
• Highest FD taken
• Disruptions:
• Broken pipes
• Connections reset by peer
• Unavailable resources (and detail)
• Total binds and types of binds
• Most frequent occurrence lists (optional)
• Error and return codes
• Failed logins
• Connection codes
• Client IP addresses and connection codes
• Bind DNs
• Base DNs for searching
• Search filters
• Etimes (elapsed operation time)
• Longest etimes
• Nentries (number of entries in result)
• Largest Nentries
• Extended operations
• Most requested attributes
• Recommendations (optional)
Table 7.24. Information Extracted from Access Logs
The logconv.pl tool displays two types of statistics useful for monitoring and optimizing
directory usage:
• Simple counts of events such as the total number of binds and the total number of searches
provide overall usage information. This is the basic information that the tool will always print.
• Lists of the most frequently occurring parameters in LDAP requests provide insight into how
the directory information is being accessed. For example, lists of the top ten bind DNs, base
DNs, filter strings, and attributes returned can help administrators optimize the directory for its
Chapter 7. Command-Line Scripts
266