IDENTIFYING BOUNDARIES OF SUBSTRINGS TO BE EXTRACTED FROM LOG FILES
First Claim
Patent Images
1. A computing system comprising:
- at least one processor; and
memory storing instructions that, when executed by the at least one processor, cause the at least one processor to perform acts comprising;
receiving an indication that a user has selected a portion of text in a log file;
responsive to receiving the indication, setting forth a suggestion, wherein the suggestion is indicative of a potential substring that is to be extracted from the log file;
receiving an indication that the user has selected the suggestion; and
constructing a table based upon the indication that the user has selected the suggestion, wherein entries of the table are based upon records in the log file, and wherein an entry in the table is based upon the potential substring.
1 Assignment
0 Petitions
Accused Products
Abstract
Described herein are various technologies pertaining to identifying boundaries of a substring in a log file, wherein the substring is to be extracted from the log file and used to construct a table. An indication is received that a user has selected a beginning boundary of the substring, and the ending boundary of the substring is automatically identified.
-
Citations
20 Claims
-
1. A computing system comprising:
-
at least one processor; and memory storing instructions that, when executed by the at least one processor, cause the at least one processor to perform acts comprising; receiving an indication that a user has selected a portion of text in a log file; responsive to receiving the indication, setting forth a suggestion, wherein the suggestion is indicative of a potential substring that is to be extracted from the log file; receiving an indication that the user has selected the suggestion; and constructing a table based upon the indication that the user has selected the suggestion, wherein entries of the table are based upon records in the log file, and wherein an entry in the table is based upon the potential substring. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method executed by a computing device that comprises at least one processor, the method comprising:
-
receiving an indication that a user has identified at least one character in a string of a data line in a log file; responsive to receiving the indication, identifying a potential ending boundary of a substring in the string; setting forth a suggestion responsive to identifying the potential ending boundary of the substring in the string, wherein the suggestion indicates that the substring begins with the at least one character and ends at the ending boundary of the substring; determining that the user has accepted the suggestion; extracting the substring from the log file responsive to determining that the user has accepted the suggestion; and constructing a table based upon the extracted substring, wherein the table has a plurality of entries, and further wherein an entry in the plurality of entries is based upon the substring. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer-readable storage medium comprising instructions that, when executed by at least one processor, cause the at least one processor to perform acts comprising:
-
receiving an indication that a user has identified a beginning boundary of a substring that is to be extracted from a string of a log file; responsive to receiving the indication that the user has identified the beginning boundary, identifying a potential ending boundary of the substring, wherein the substring comprises characters that have failed to be identified by the user; receiving confirmation of the ending boundary of the substring from the user; and responsive to receiving confirmation of the ending boundary of the substring from the user, extracting the substring from the log file. - View Dependent Claims (19, 20)
-
Specification