Web Traffic Analysis Tool
First Claim
1. A computer-implemented method for analyzing web traffic, the method comprising computer-implemented operations for:
- receiving a log file including a line, the line corresponding to a request received at a web server;
receiving a rules file including a sequence of rules that are applied in a specified order, the sequence of rules associated with a plurality of request identifiers, the sequence of rules including a first rule associated with a first request identifier and a second rule associated with a second request identifier;
determining whether the line matches the first rule;
in response to determining that the line matches the first rule, updating identification data to associate the first request identifier with the line;
in response to determining that the line does not match the first rule, determining whether the line matches the second rule; and
in response to determining that the line matches the second rule, updating the identification data to associate the second request identifier with the line.
2 Assignments
0 Petitions
Accused Products
Abstract
A log file may include a line corresponding to a request received at a web server. A rules file may include rules that are applied in a specified order. The rules may include a first rule associated with a first request identifier and a second rule associated with a second request identifier. A determination is made as to whether the line matches the first rule. If the line matches the first rule, then identification data is updated to associate the first request identifier with the line. If the line does not match the first rule, then a determination is made as to whether the line matches the second rule. If the line matches the second rule, then the identification data is updated to associate the second request identifier with the line. If the line does not match the second rule, additional rules in the rules may be similarly applied
41 Citations
20 Claims
-
1. A computer-implemented method for analyzing web traffic, the method comprising computer-implemented operations for:
-
receiving a log file including a line, the line corresponding to a request received at a web server; receiving a rules file including a sequence of rules that are applied in a specified order, the sequence of rules associated with a plurality of request identifiers, the sequence of rules including a first rule associated with a first request identifier and a second rule associated with a second request identifier; determining whether the line matches the first rule; in response to determining that the line matches the first rule, updating identification data to associate the first request identifier with the line; in response to determining that the line does not match the first rule, determining whether the line matches the second rule; and in response to determining that the line matches the second rule, updating the identification data to associate the second request identifier with the line. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer system, comprising:
-
a processor; a memory communicatively coupled to the processor; and a web traffic analysis tool (i) which executes in the processor from the memory and (ii) which, when executed by the processor, causes the computer system to analyze web traffic by receiving a log file including a first line and a second line, the first line corresponding a first request received at a web server, the second line corresponding to a second request received at the web server, receiving a rules file including a sequence of rules that are applied in a specified order, the sequence of rules associated with a plurality of request identifiers, the sequence of rules including a first rule associated with a first request identifier and a second rule associated with a second request identifier, determining whether the first line matches the first rule, in response to determining that the first line matches the first rule, updating identification data to associate the first request identifier with the first line, in response to determining that the first line does not match the first rule, determining whether the first line matches the second rule, in response to determining that the first line matches the second rule, updating the identification data to associate the second request identifier with the first line, upon updating the identification data to associate the first request identifier with the first line, determining whether the second line matches the first rule, in response to determining that the second line matches the first rule, updating identification data to associate the first request identifier with the second line, in response to determining that the second line does not match the first rule, determining whether the second line matches the second rule, and in response to determining that the second line matches the second rule, updating the identification data to associate the second request identifier with the second line. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer-readable storage medium having computer-executable instructions stored thereon which, when executed by a computer, cause the computer to:
receiving a log file including a first line and a second line, the first line corresponding a first request received at a web server, the second line corresponding to a second request received at the web server, receive a rules file including a sequence of rules that are applied in a specified order, the sequence of rules associated with a plurality of request identifiers, the sequence of rules including a first rule associated with a first request identifier and a second rule associated with a second request identifier, the first rule comprising a first set of field conditions, the second rule comprising a second set of field conditions; determine whether the first line matches the first rule by determining whether the first line satisfies each of the first set of field conditions; in response to determining that the first line matches the first rule, update identification data to associate the first request identifier with the first line; in response to determining that the first line does not match the first rule, determine whether the first line matches the second rule by determining whether the first line satisfies each of the second set of field conditions; in response to determining that the first line matches the second rule, update the identification data to associate the second request identifier with the first line; upon updating the identification data to associate the first request identifier with the line, determine whether the second line matches the first rule by determining whether the second line satisfies each of the first set of field conditions; in response to determining that the second line matches the first rule, update identification data to associate the first request identifier with the second line; in response to determining that the second line does not match the first rule, determine whether the second line matches the second rule by determining whether the second line satisfies each of the second set of field conditions; and in response to determining that the second line matches the second rule, update the identification data to associate the second request identifier with the second line. - View Dependent Claims (20)
Specification