Identifying boundaries of substrings to be extracted from log files
First Claim
Patent Images
1. A computing system comprising:
- at least one processor; and
memory storing instructions that, when executed by the at least one processor, cause the at least one processor to perform acts comprising;
detecting that a user has selected a character in a string of a log file;
responsive to receiving user selection of the character, setting forth a suggestion, wherein the suggestion is set forth by the at least one processor, and further wherein the suggestion is indicative of a potential substring in the string that is to be extracted from the log file;
receiving confirmation that the user has accepted the suggestion; and
constructing a table responsive to receiving the confirmation that the user has selected the suggestion, wherein entries of the table are based upon records in the log file, and wherein an entry in the table is based upon the potential substring.
1 Assignment
0 Petitions
Accused Products
Abstract
Described herein are various technologies pertaining to identifying boundaries of a substring in a log file, wherein the substring is to be extracted from the log file and used to construct a table. An indication is received that a user has selected a beginning boundary of the substring, and the ending boundary of the substring is automatically identified.
-
Citations
20 Claims
-
1. A computing system comprising:
-
at least one processor; and memory storing instructions that, when executed by the at least one processor, cause the at least one processor to perform acts comprising; detecting that a user has selected a character in a string of a log file; responsive to receiving user selection of the character, setting forth a suggestion, wherein the suggestion is set forth by the at least one processor, and further wherein the suggestion is indicative of a potential substring in the string that is to be extracted from the log file; receiving confirmation that the user has accepted the suggestion; and constructing a table responsive to receiving the confirmation that the user has selected the suggestion, wherein entries of the table are based upon records in the log file, and wherein an entry in the table is based upon the potential substring. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method executed by a computing device that comprises at least one processor, the method comprising:
-
detecting that a user has identified at least one character in a string of a data line in a log file; responsive to detecting that the user has identified the at least one character, identifying a potential ending boundary of a substring in the string; setting forth a suggestion responsive to identifying the potential ending boundary of the substring in the string, wherein the suggestion indicates that the substring begins with the at least one character and ends at the ending boundary of the substring, and further wherein the suggestion is set forth by the at least one processor; determining that the user has accepted the suggestion; extracting the substring from the log file responsive to determining that the user has accepted the suggestion; and constructing a table based upon the extracted substring, wherein the table has a plurality of entries, and further wherein an entry in the plurality of entries is based upon the substring. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer-readable storage medium comprising instructions that, when executed by at least one processor, cause the at least one processor to perform acts comprising:
-
detecting that a user has identified a beginning boundary of a substring that is to be extracted from a string of a log file; responsive to detecting that the user has identified the beginning boundary, identifying a potential ending boundary of the substring, wherein the substring comprises characters that have failed to be identified by the user; receiving confirmation of the ending boundary of the substring from the user; and responsive to receiving confirmation of the ending boundary of the substring from the user, extracting the substring from the log file. - View Dependent Claims (19, 20)
-
Specification