Raw Log File Storage

Basic log data is automatically archived on our servers. As a result, you will always be able to access basic information about your CDN activity data through the Core Reports module. Core reports are available by finding Analytics from within the main menu and then selecting Core Reports. However, you may wish to store more detailed log information or use a third-party tool to analyze your log data. For this reason, we allow you to store log information on CDN storage and/or to deliver them directly to your servers.

Key information:

To configure log storage options

  1. Navigate to the Raw Log Settings page.
  2. Perform one of the following:

    • Enable Log Storage: Perform the following steps:

      1. Select the Log storage is turned on option.
      2. Mark each platform for which you would like to store log data.
      3. Clear each platform for which log data will be discarded.
      4. In the Please keep log files for option, select the amount of time that the log files for each selected platform should be kept.

        If you choose "unlimited," then log files will not be automatically deleted from the CDN origin server.

    • Disable Log Storage: Select the Log storage is turned off option.
  3. Click Update to save your changes.

External Storage

In addition to storing log data on CDN storage, it may also be delivered to your web server via SFTP. Additionally, opt-in to receive email notifications whenever a log file cannot be delivered to your web server.

Due to the security risks inherent to FTP (e.g., authentication via cleartext passwords), log delivery over FTP was discontinued.

A prerequisite for archiving raw log files to your own server is enabling raw log file archival to CDN storage. If this is undesired, the length of time that raw log files will be stored on CDN storage can be minimized by setting the retention period to 1 day.

View information on the file naming convention for archived raw log files.

To configure log file delivery settings

  1. Navigate to the Raw Log Settings page.
  2. Verify that raw log file storage has been enabled for the desired platforms.

  3. Perform one of the following:

    • Enable Log Delivery: Archive log files to an external server by selecting the Enabled option from the FTP and SFTP Delivery Settings section.
    • Disable Log Delivery: If log files should not be archived to an external server, then make sure that the Disabled option is selected from the FTP and SFTP Delivery Settings section and then click Update. Skip all remaining steps.
  4. In the Log Delivery Type option, verify that SFTP is selected.
  5. In the Port option, select the port to which log data will be sent.
  6. In the Notification E-mail option, type the email address to which an email will be sent when a log file is not successfully delivered to the specified external server.
  7. In the Hostname option, type the hostname or IP address of the server where log files will be archived.

    Make sure to exclude protocol information (i.e., sftp://).

  8. In the Directory Path option, type the path to the folder where log files will be archived. This path starts at the root folder of the server specified in the previous step.

    Make sure to start this path with a forward slash (e.g., /Logs).

  9. In the Username option, type the name of the user that has SFTP access to the specified server.

    Make sure that the specified user has been granted read/write to the folder defined in the Directory Path option.

  10. Determine whether the above user will be authenticated via a password or a private key.

    • Password Authentication: In the Password option, type the password associated with the specified user account.
    • Private Key Authentication: Perform the following steps:

      1. Paste the desired private key into the Private Key Text option.
      2. Make sure that the same private key is stored in the home directory assigned to the user specified in the Username option.
  11. Click Update to save the updated configuration.
  12. Configure your firewall to allow access to the following subnetworks:

    93.184.209.128/25

    192.16.62.0/25

    192.16.61.128/25

    192.229.176.0/24