Wayne,
You might want to ask this of the EZProzy list. I can tell you what we do
here. First, we have the following options open:
Option LogUser
LogFormat %h %l %u %t "%r" %s %b %u
Basically the LogUser option was added to track possible abuse. It also,
combined with the LogFormat, allows me to pick out only 302 returns for
initial log-ins and connections (connections are added because one can to a
different DB having once logged in).
I am sure others use some sort of web-analyzing tool. I've been content
running the log through Microsoft Access and extracting the part of the log
I need usage statistics. (OK, I also make use of Google Analytics and
looking a bit, I just might make more use of the regular expressions to
filter the results accordingly).
--jimm
On Mon, Nov 15, 2010 at 10:12 PM, Wayne Lam <[log in to unmask]> wrote:
> Hi,
>
>
> Just wonder if anyone use ezproxy or other mechanism that logs down the
> usage of journals, databases, etc.
>
> It seems customization of ezproxy log would not provide a "type" of users
> (ptype for III users). On the other hand if you use external
> authentication,
> you will have to
> combine ezproxy log and the log with user type.
>
>
> I would like to hear how the statistic work-flow is done in other
> institute.
>
>
> Thanks
>
> Wayne
>
>
> --
> -----------------------------------------
> Wayne Lam
> Assistant Library Officer I
> Systems Development & Support
> Fong Sum Wood Library
> Lingnan University
> 8 Castle Peak Road
> Tuen Mun, New Territories
> Hong Kong SAR
> China
> Phone: +852 26168585
> Email: [log in to unmask]
> Website: http://www.library.ln.edu.hk
>
--
jimm wetherbee <http://sites.wingate.edu/jmw/>
Information Systems Librarian <http://library.wingate.edu>
Wingate University <http://www.wingate.edu>
--lux et fides--
|