System, method, and computer readable media for identifying a user-initiated log file record in a log file

ABSTRACT

A system, a method, and a computer readable media for identifying a user-initiated log file record in a log file are provided. The log file has a user-initiated log file record and a repeating pattern of log file records automatically generated by a software program. The system allows a user to identify first and second timestamp values corresponding to first and second times which identify a time interval of interest in the log file. The system further analyzes the log file to identify the user-initiated log file record having a timestamp value between the first and second timestamp values. The system further identifies the repeating pattern of log file records in the log file.

CROSS REFERENCE TO RELATED APPLICATION

This application is a Continuation application of U.S. patentapplication Ser. No. 12/109,516 filed on Apr. 25, 2008, and now U.S.Published Patent Application No. 2009-0271448 A1.

FIELD OF INVENTION

This application relates to a system, a method, and a computer readablemedia for identifying a user-initiated log file record in a log file.

BACKGROUND OF INVENTION

When developing or working with various software applications, it isoften necessary to make use of log files which indicate commands ortasks that are being executed within a software application. Forexample, a user may desire to capture the commands needed to perform anaction in a software application. In this case, the user could instructthe software application to perform a task and then could view a logfile to view log file records to determine the commands that weregenerated to perform the task.

One drawback with the foregoing approach is that some softwareapplications perform tasks known as cron task commands that can berepeated at scheduled intervals, which can introduce log file recordshaving commands to perform the tasks in a log file. Thus, it may bedifficult to determine which log file records in a log file havecommands corresponding to the cron task commands. The drawback isexacerbated as a number of active running cron task commands isincreased.

Accordingly, the inventors herein have recognized a need for a system, amethod, and a computer readable media for identifying a user-initiatedlog file record that minimizes and/or eliminates the above-identifieddrawback.

SUMMARY OF INVENTION

A method for identifying a user-initiated log file record in a log filein accordance with an exemplary embodiment is provided. The methodincludes selecting the log file having a plurality of log file recordstherein. The plurality of log file records have at least in part arepeating pattern of log file records automatically generated by asoftware program. The method further includes executing a first softwarecommand to store a first timestamp value in a memory device. The firsttimestamp value indicates a first time. The method further includesexecuting at least a first user-initiated software command that inducesa computer to store at least a first log file record having a secondtime stamp value in the log file. The second timestamp value indicates asecond time after the first time. The method further includes executinga second software command to store a third timestamp value in the memorydevice. The third timestamp value indicates a third time. The third timeis after the second time and after execution of the first user-initiatedsoftware command is completed. The method further includes analyzing theplurality of log file records in the log file to identify the repeatingpattern of log file records stored therein. The method further includesextracting the repeating pattern of log file records from the pluralityof commands to identify the first log file record having the secondtimestamp value that was generated between the first and third times.The method further includes storing the first log file record associatedwith the first user-initiated software command in the memory device.

A system for identifying a user-initiated log file record in a log filein accordance with another exemplary embodiment is provided. The systemincludes a memory device having the log file stored therein. The systemfurther includes a computer operably communicating with the memorydevice. The computer is configured to display first and second graphicaluser interfaces on a display device. The first graphical user interfaceis configured to allow a user to select the log file. The log file has aplurality of log file records therein. The plurality of log file recordshave at least in part a repeating pattern of log file records. The firstgraphical user interface is further configured to allow the user toexecute a first software command to store a first timestamp value in thememory device. The first timestamp value indicates a first time. Thesecond graphical user interface is configured to allow the user toexecute at least a first user-initiated software command that inducesthe computer to store at least a first log file record having a secondtime stamp value in the log file. The second timestamp value indicates asecond time after the first time. The first graphical user interface isfurther configured to allow the user to execute a second softwarecommand to store a third timestamp value in the memory device. The thirdtimestamp value indicates a third time. The third time is after thesecond time and after execution of the first user-initiated softwarecommand is completed. The computer is further configured to analyze theplurality of log file records in the log file to identify the repeatingpattern of log file records stored therein. The computer is furtherconfigured to extract the repeating pattern of log file records from theplurality of commands to identify the first log file record having thesecond timestamp value that was generated between the first and thirdtimes. The computer is further configured to store the first log filerecord associated with the first user-initiated software command in thememory device.

One or more computer readable media having computer-executableinstructions implementing a method for identifying a user-initiated logfile record in a log file in accordance with another exemplaryembodiment is provided. The method includes selecting the log filehaving a plurality of log file records therein, the plurality of logfile records having at least in part a repeating pattern of log filerecords automatically generated by a software program. The methodfurther includes executing a first software command to store a firsttimestamp value in a memory device. The first timestamp value indicatesa first time. The method further includes executing at least a firstuser-initiated software command that induces a computer to store atleast a first log file record having a second time stamp value in thelog file. The second timestamp value indicates a second time after thefirst time. The method further includes executing a second softwarecommand to store a third timestamp value in the memory device. The thirdtimestamp value indicates a third time. The third time is after thesecond time and after execution of the first user-initiated softwarecommand is completed. The method further includes analyzing theplurality of log file records in the log file to identify the repeatingpattern of log file records stored therein. The method further includesextracting the repeating pattern of log file records from the pluralityof commands to identify the first log file record having the secondtimestamp value that was generated between the first and third times.The method further includes storing the first log file record associatedwith the first user-initiated software command in the memory device.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 is a schematic of a system for identifying user-initiated logfile records in a log file in accordance with an exemplary embodiment;

FIG. 2 is a schematic of a graphical user interface generated by thesystem of FIG. 1;

FIG. 3 is a schematic of exemplary log file records displayed in thefirst graphical user interface of FIG. 2;

FIG. 4 is a schematic of another graphical user interface generated bythe system of FIG. 1;

FIG. 5 is a schematic of another graphical user interface generated bythe system of FIG. 1;

FIG. 6 is a schematic of exemplary log file records displayed in thegraphical user interface of FIG. 5; and

FIGS. 7-9 are flowcharts of a method for identifying a user-initiatedlog file record in a log file in accordance with another exemplaryembodiment.

DESCRIPTION OF EXEMPLARY EMBODIMENTS

Referring to FIG. 1, a system 10 for identifying a user-initiated logfile record in a log file is illustrated. The system 10 includes acomputer 20, a memory device 22, a display device 24, a keyboard 26, anda mouse 28. An advantage of the system 10 is that the system 10 canidentify at least one user-initiated log file record in a log file thatalso has a repeating pattern of log file records automatically generatedby a software program.

The computer 20 is configured to execute software routines foridentifying at least one user-initiated log file record in a log file30. The computer 20 is operably coupled to the memory device 22, thedisplay device 24, the keyboard 26, and the mouse 28.

The memory device 22 is configured to store data generated by thecomputer 20. In particular, the memory device 22 is configured to storethe log file 30 generated by the computer 20.

The keyboard 26 is configured to allow a user to input data on graphicaluser interfaces displayed on the display device 24. The keyboard 26 isoperably coupled to the computer 20.

The mouse 28 is configured to allow a user to select items on graphicaluser interfaces displayed on the display device 24. The mouse 28 isoperably coupled to the computer 20.

The computer 20 is further configured to induce the display device 24 todisplay graphical user interfaces thereon which will be utilized by thecomputer 20 for identifying a user-initiated log file record in the logfile 30.

Referring to FIG. 2, a graphical user interface 40 that is configured todisplay log file records in a log file 30 will now be explained. Thegraphical user interface 40 includes a text box 42, a browse commandbutton 44, a perform pre-analysis command button 46, a start user actioncommand button 48, a stop user action command button 50, a text frame52, a filter command button 54, and an analyze-and-filter command button56.

The log file text box 42 is configured to allow a user to input adirectory path and file name of the log file 30 therein, utilizing thekeyboard 26, such that the computer 20 can access the log file 30 in thememory device 22.

The browse command button 44 is configured to allow user to viewdirectories and file names stored in the memory device 22 such that theuser can select the log file 30, utilizing the mouse 28.

The perform pre-analysis command button 46 is configured to allow a userto instruct the computer 20 to analyze the log file 30 specified in thelog file text box 42, to determine a repeating pattern of log filerecords automatically generated by a software program and stored in thelog file 30. In particular, when the user selects the pre-analysiscommand button 46, the computer 20 analyzes each record in the log file30 to determine substantially similar log file records that areduplicated in the log file 30 at predetermined time intervals. Thesubstantially similar log file records that are duplicated in the logfile 30 at predetermined time intervals are identified and flagged bythe computer 20. It should be noted that the log file records in the logfile 30 that are not part of a repeating pattern of log file records areuser-initiated log file records.

The start user action command button 48 is configured to allow a user toinstruct the computer 20 when a user action or command in the graphicaluser interface 100 (that will cause log file records to be stored in thelog file 30), will subsequently be executed. In particular, when theuser selects the start user action command button 48 utilizing the mouse28, the computer 20 will either: (i) store a first timestamp value inthe memory device 22 indicating when the user selected the button 48, or(ii) store an identifying marker in the log file 30 indicating when theuser selected the button 48.

The stop user action command button 50 is configured to allow a user toinstruct the computer 20 when a user action or command in the graphicaluser interface 100 (that will cause log file records to be stored in thelog file 30), is not being executed or has ended. In particular, whenthe user selects the stop user action command button 50 utilizing themouse 28, the computer 20 will either: (i) store a second timestampvalue in the memory device 22 indicating when the user selected thebutton 50, or (ii) store an identifying marker in the log file 30indicating when the user selected the button 50.

The text frame 52 is configured to display log file records in the logfile 30 that were output to the log file 30 between the pressing of thestart user action command button 48 and the stop user action commandbutton 50. In particular, when a user selects the log file 30 utilizingthe log file text box 42, the computer 20 displays the associated logfile records in the text frame 52. Referring to FIG. 3, exemplaryrecords in the log file 30 will now be discussed. As shown, theexemplary log file 30 includes exemplary records 70, 72, 74, 76, 78 and80. Of course, in an alternative embodiment, the log file 30 could haveone or more records with a different format from that shown in FIG. 3.In one exemplary embodiment, the computer 20 stores the marker 71 in thefile 30 when the user selected the start user action command button 48.In the exemplary embodiment, the computer 20 stores the marker 81 in thelog file 30 when the user selected the stop user action command button50. Accordingly, marker 71, 81 delineate a time interval in which a useris interested in identifying user initiated log file records in the logfile 30. Accordingly, one or more of the log file records between themarker 71 and the marker 81 correspond to a user initiated log filerecord. In this example, the log file records 74, 80 are a repeatingpattern of log file records that are automatically generated by asoftware program. Accordingly, the remaining log file records 72, 76 and78 correspond to user-initiated log file records in the log file 30 thatwere generated by user commands in the graphical user interface 100.

Referring to FIGS. 2 and 5, the filter command button 54 is configuredto allow a user to instruct the computer 20 to display the graphicaluser interface 130 on the display device 24, for displaying theuser-initiated log file records. The graphical user interface 130 willbe explained in greater detail below.

The analyze-and-filter command button 56 is configured to instruct thecomputer 20 to analyze the log file 30 specified in the log file textbox 52 to: (i) determine a repeating pattern of log file recordsautomatically generated by a software program and stored in the log file30, and (ii) to display only the user-initiated log file records in thelog file 30 in the graphical user interface 130. In particular, when theuser selects the analyze-and-filter command button 56, the computer 20analyzes each record in the log file 30 to determine substantiallysimilar log file records that are duplicated in the log file 30 atpredetermined time intervals. The computer 20 also identifies theuser-initiated log file records which are not part of a repeatingpattern of log file records and induces the graphical user interface 130to display the user-initiated log file records therein.

Referring to FIGS. 5 and 6, the graphical user interface 130 will now beexplained in greater detail. The graphical user interface 130 includes atext frame 132, a filter file text box 134, a browse command button 136,and a save command button 138. The text frame 132 is configured todisplay user-initiated log file records in the log file 30 therein. Inone exemplary embodiment, the user-initiated log file records 72, 76 and78 are displayed in the text frame 132. The filter file text box 134 isconfigured to allow a user to input a directory path and a file name,utilizing the keyboard 26, for a file that will be stored in the memorydevice 22 having only the user-initiated log file records. The browsecommand button 136 is configured to allow user to select a directory anda file name for a file that the computer 20 will store theuser-initiated log file records therein. The browse command button 136is selected via the mouse 28. The save command 138 is configured toallow a user to save the file specified in the filter file text box 134.

Referring to FIG. 4, the graphical user interface 100 is configured toallow a user to select at least one user-initiated command that will beexecuted by the computer 20 and will induce the computer 20 to generatea corresponding user-initiated log file record that is stored in the logfile 30. The graphical user interface 100 includes a migrate commandbutton 102, an assign command button 103, a submit command button 104,option selection boxes 105, 106, 107, and a perform action button 110.

When a user selects the migrate command button 102 utilizing the mouse28, the graphical user interface 100 displays a check mark in the optionselection box 105. Further, when the user selects the perform actionbutton 110, the computer 20 executes at least one migrate softwarecommand for performing a migrate task and generates a user-initiated logfile record corresponding to the migrate software command that is storedin the log file 30.

When the user selects the assign command button 103 utilizing the mouse28, the graphical user interface 100 displays a check mark in the optionselection box 106. Further, when the user subsequently selects theperform action button 110 the computer 20 executes at least one assignsoftware command for performing an assign task and generates auser-initiated log file record corresponding to the assign softwarecommand that is stored in the log file 30.

When the user selects the submit command button 104 utilizing the mouse28, the graphical user interface 100 displays a check mark in the optionselection box 107. Further, when the user subsequently selects theperform action button 110 the computer 20 executes at least one submitsoftware command for performing a submit task and generates auser-initiated log file record corresponding to the submit softwarecommand that is stored in the log file 30.

Referring to FIGS. 7-9, a flowchart of a method for identifying auser-initiated log file record in a log file will now be explained. Itshould be noted that although only one user-initiated log file record isidentified in the method for purposes of simplicity, the method could beutilized to identify a plurality of user-initiated log file records in alog file.

At step 150, the computer 20 executes first software program thatautomatically generates a repeating pattern of log file records that arebeing stored in the log file 30. After step 150, the method advances tostep 152.

At step 152, the computer 20 induces the display device 24 to displaygraphical user interfaces 40, 100 and 130. After step 152, the methodadvances to step 154.

At step 154, the user selects the log file 30 having a plurality of logfile records utilizing the graphical user interface 40. The plurality oflog file records have at least in part the repeating pattern of log filerecords that are being automatically generated by the first softwareprogram. After step 154, the method advances to step 156.

At step 156, the computer 20 makes a determination as to whether a userhas chosen to perform pre-analysis of the log file 30 utilizing thegraphical user interface 40. In particular, the computer 20 determineswhether the user has selected the perform pre-analysis command button56. If the value of step 156 equals “yes”, the method advances to step158. Otherwise, the method advances to step 160.

At step 158, the computer 20 analyzes the plurality of log file recordsin the log file 30 to determine any repeating patterns of log filerecords automatically generated by the first software program. Afterstep 158, the method advances to step 160.

At step 160, the user selects the start user action command button 48utilizing the graphical user interface 40 that induces the computer 20to execute a first software command to store a first timestamp value ina memory device 22. The first timestamp value indicates a first timeafter which user-initiated software commands will be invoked by theuser. After step 160, the method advances to step 162.

At step 162, the user selects a first user-initiated software commandbutton utilizing the graphical user interface 100 that induces thecomputer 20 to store at least a first log file record having a secondtime stamp value in the log file 30. The second timestamp valueindicates a second time after the first time. After step 162, the methodadvances to step 164.

At step 164, the user selects a stop user action command button 50utilizing the graphical user interface 40 that induces the computer 20to execute a second software command to store a third timestamp value inthe memory device 22. The third timestamp value indicates a third time.The third time is after the second time and after execution of the firstuser-initiated software command is completed. After step 164, the methodadvances to step 166.

At step 166, computer 20 determines a portion of the plurality of logfile records in the log file 30 that were generated between the firstand third times based on the time stamp values of the plurality of logfile records. Each log file record has a distinct time stamp valueassociated therewith. After step 166, the method advances to step 168.

At step 168, the computer 20 induces the display device 24 to displaythe portion of the plurality of log file records in the log file 30 thatwere generated between the first and third times in the text box 52 ofthe graphical user interface 40. After step 168, the method advances tostep 170.

At step 170, the computer 20 makes a determination as to whetherpre-analysis of the log file was already performed. In particular, thecomputer 20 makes the determination as to whether pre-analysis of thelog file 30 was already performed, when the user selects either thefilter command button 54 or the analyze-and-filter command button 56. Ifthe value of step 170 equals “yes”, the method advances to step 172.Otherwise, the method advances to step 178.

At step 172, computer 20 extracts the repeating patterns of log filerecords from the portion of the plurality of log file records in the logfile 30 that were generated between the first and third times, such thatat least the first log file record associated with the firstuser-initiated software command that was generated between the first andthird times is identified. After step 172, the method advances to step174.

At step 174, the computer 20 induces the display device 24 to displaythe first log file record associated with the first user-initiatedsoftware command in the graphical user interface 130. After step 174,the method advances to step 176.

At step 176, the computer 20 stores the first log file record associatedwith the first user-initiated software command in the memory device 22.After step 176, the method is exited.

Referring again to step 170, when the value of step 170 equals “no”, themethod advances to step 178. At step 178, the computer 20 analyzes theplurality of log file records in the log file 30 to determine anyrepeating patterns of log file records automatically generated by thefirst software program. After step 178, the method advances to step 180.

At step 180, the computer 20 extracts the repeating patterns of log filerecords from the portion of the plurality of log file records in the logfile 30 that were generated between the first and third times, such thatat least the first log file record associated with the firstuser-initiated software command that was generated between the first andthird times is identified. After step 180, the method advances to step182.

At step 182, the computer 20 induces the display device 24 to displaythe first log file record associated with the first user-initiatedsoftware command in the graphical user interface 130. After step 182,the method advances to step 184.

At step 184, the computer 20 stores the first log file record associatedwith the first user-initiated software command in the memory device 22.After step 184, the method is exited.

An exemplary method for determining sets of repeating patterns of logfile records in a log file will now be explained. An underlyingpresumption in the method is that the log file contains only therepeating patterns of log file records and no other records.

At a first step, the computer 20 analyzes the entire log file, startingfrom a first line.

At a second step, the computer 20 determines a repeating pattern havinga shortest time interval. Because the log file records are repeated on afixed time interval, the shortest repeating pattern will encompass afirst log file record in the log file. The first command is denoted asA1 for example.

At a third step, the computer 20 commences from the first log filerecord and finds a subsequent log file record in the log file that is“similar” to the first log file record to determine a first timeinterval, and temporarily presumes that all of the log file recordsbetween these two records belong to a set of repeating log file records.It should be noted that the third step can utilize currently availabletechniques to determine similarity, such as the techniques most wordprocessors use to suggest a different spelling for a misspelled word.The similarity determination method can have a predefined threshold,such as two log file records having at least 95% of the samecharacteristics in order to be considered similar. The similarsubsequent command is denoted as A2 for example.

At a fourth step, the computer 20 commences from the similar log filerecord A2, to find a subsequent log file record in the log file that isalso similar to A1 to determine a second time interval. The similarsubsequent record is denoted as A3 for example.

At a fifth step, the computer 20 compares a set of log file recordsbetween A1 and A2, and between A2 and A3, and removes any new log filerecords that are between A2 and A3, but are not between A1 and A2, sincethe removed log file records correspond to records belonging to a set ofrepeating log file records (e.g., a pattern) with a longer timeinterval. Further, the computer 20 removes any log file records that arebetween A1 and A2, but are not between A2 and A3 since these removed logfile records correspond to records belonging to another set of repeatinglog file records or a pattern with a longer time interval. Thereafter,the set of log file records between A1 and A2, and between A2 and A3should now be the same, thus comprising a set of repeating log filerecords having a shortest time interval. This set of repeating log filerecords having the short time interval is stored in temporary storageand are denoted as pattern A for example.

At a sixth step, from a top of the log file, the computer 20 determinesa first log file record that does not appear in the pattern A anddenotes this as a start of pattern B1.

At a seventh step, the computer 20 repeats the third through fifth stepsusing the log file record B1 as a starting point.

At an eighth step, with the pattern B from the fifth step, the computer20 removes any log file records in that pattern that belong to patternA. The computer stores a second set of repeating log file records in thetemporary storage and denotes them as pattern B for example.

At a ninth step, the computer 20 repeats the sixth through eighth stepsfor each successively longer time interval, by finding the log filerecords that are not in the temporary storage yet. Thus, all of the setsof repeating log file records or patterns are stored with uniqueidentifiers in the temporary storage.

Referring to FIG. 1, in an alternative embodiment, the log file recordsgenerated by the computer 20 have user IDs associated with users and atransaction IDs associated with transactions. Further, the graphicaluser interface 40 is configured to allow a user to specify a user ID ora transaction ID such that the log file 30 would only include log filerecords associated with the specified user ID or transaction ID.Further, the graphical user interface 40 is further configured to allowa user to view log file records in chronological order or another orderbased on a predetermined log file record attribute.

The above-described method can be at least partially embodied in theform of one or more computer readable media having computer-executableinstructions for practicing the method. The computer-readable media cancomprise one or more of the following: floppy diskettes, CD-ROMs, harddrives, flash memory, and other computer-readable media known to thoseskilled in the art; wherein, when the computer-executable instructionsare loaded into and executed by one or more computers or computerservers, the one or more computers or computer servers become anapparatus for practicing the invention. The term “computer-readablestorage device” does not encompass a signal propagation media such as acopper cable, optical fiber or wireless transmission media.

The system, the method, and the computer readable media for identifyinga user-initiated log file record in a log file represent a substantialadvantage over other systems and methods. In particular, the system, themethod, and the computer readable media provide a technical effect ofidentifying at least one user-initiated log file record in a log filewherein the log file also has a repeating pattern of log file recordsautomatically generated by a software program.

While the invention is described with reference to an exemplaryembodiment, it will be understood by those skilled in the art thatvarious changes may be made and equivalence may be substituted forelements thereof without departing from the scope of the invention. Inaddition, many modifications may be made to the teachings of theinvention to adapt to a particular situation without departing from thescope thereof. Therefore, it is intended that the invention not belimited the embodiments disclosed for carrying out this invention, butthat the invention includes all embodiments falling with the scope ofthe appended claims. Moreover, the use of the terms first, second, etc.does not denote any order of importance, but rather the terms first,second, etc. are used to distinguish one element from another.

What is claimed is:
 1. A method for identifying log file records, themethod comprising: a computer identifying a first plurality of log filerecords of commands in a log file, each log file record in the firstplurality of log file records of commands having been automaticallygenerated and entered into the log file by a software program inresponse to an expiration of one or more predetermined time interval,the first plurality of log file records of commands having at least athreshold level of similarity, the first plurality of log file recordsof commands being a subset of a second plurality of log file records ofcommands in the log file, the second plurality of log file records ofcommands having been entered into the log file between a first time anda second time; the computer extracting the first plurality of log filerecords of commands from the second plurality of log file records ofcommands; the computer identifying at least one log file record ofcommands remaining from the second plurality of log file records ofcommands after the extracting, the at least one log file record ofcommands remaining from the second plurality of log file records ofcommands after the extracting being a log file record of commands thatcaptures a command to perform at least one task selected from the groupconsisting of a user initiated migrate task, a user initiated assigntask, and a user initiated submit task so that the at least one log filerecord of commands remaining from the second plurality of log filerecords of commands after the extracting comprises a record of a commandto perform at least one task selected from the group consisting of auser initiated migrate task, a user initiated assign task, and a userinitiated submit task.
 2. The method of claim 1, further comprising thecomputer displaying the identified at least one log file record in agraphical user interface that is devoid of the first plurality of logfile records.
 3. A computer readable storage device havingcomputer-executable instructions stored therein, saidcomputer-executable instructions configured to be executed by a computerto implement a method for identifying log file records, the methodcomprising: the computer identifying a first plurality of log filerecords of commands in a log file, each log file record in the firstplurality of log file records of commands having been entered into thelog file by a software program in response to an expiration of apredetermined time interval, the first plurality of log file records ofcommands having at least a threshold level of similarity, the firstplurality of log file records of commands being a subset of a secondplurality of log file records of commands in the log file, the secondplurality of log file records of commands having been entered into thelog file between a first time and a second time; the computer extractingthe first plurality of log file records of commands from the secondplurality of log file records of commands; the computer identifying atleast one log file record of commands remaining from the secondplurality of log file records of commands after the extracting, the atleast one log file record of commands remaining from the secondplurality of log file records of commands after the extracting being alog file record of commands that captures a command to perform a userinitiated task so that the at least one log file record of commandsremaining from the second plurality of log file records of commandsafter the extracting comprises a record of a command to perform a userinitiated task, wherein the computer extracting includes the computerexamining log file records of commands to determine a first repeatingpattern of log file records and the computer removing log file recordsof commands that are part of the first repeating pattern of log filerecords from the second plurality of log file records, and wherein thecomputer examining log file records of commands to determine a firstrepeating pattern of log file records occurs prior to the first time. 4.A system comprising a memory device and a computer operably coupled tothe memory device, the memory device having a log file stored therein,the computer comprising a computer readable storage device havingcomputer-executable instructions stored therein, saidcomputer-executable instructions configured to be executed by thecomputer to implement a method for identifying log file records, themethod comprising: the computer identifying a first plurality of logfile records of commands in the log file, each log file record in thefirst plurality of log file records of commands having been entered intothe log file by a software program in response to an expiration of apredetermined time interval, the first plurality of log file records ofcommands having at least a threshold level of similarity, the firstplurality of log file records being a subset of a second plurality oflog file records of commands in the log file, the second plurality oflog file records of commands having been entered into the log filebetween a first time and a second time; the computer extracting thefirst plurality of log file records from the second plurality of logfile records; the computer identifying at least one log file record ofcommands remaining from the second plurality of log file records ofcommands after the extracting, the at least one log file record ofcommands remaining from the second plurality of log file records ofcommands after the extracting being a log file record of commands thatcaptures a command to perform a user initiated task so that the at leastone log file record of commands remaining from the second plurality oflog file records of commands after the extracting comprises a record ofa command to perform a user initiated task, wherein the at least one logfile record of commands remaining from the second plurality of log filerecords of the commands after the extracting is a log file record thatcomprises a record of a first command to perform a first type of userinitiated task and a record of the second command to perform a secondtype of user initiated task, the second type of user initiated taskbeing different from the first type of user initiated task.
 5. Themethod of claim 1, wherein the at least one log file record of commandsremaining from the second plurality of log file records of the commandsafter the extracting is a log file record that comprises a record of afirst command to perform a first type of user initiated task and arecord of a second command to perform a second type of user initiatedtask, the first type of user initiated task being selected from thegroup consisting of a user initiated migrate task, a user initiatedassign task, and a user initiated submit task, the second type of userinitiated task being different from the first type of user initiatedtask and being selected from the group consisting of a user initiatedmigrate task, a user initiated assign task, and a user initiated submittask.
 6. The method of claim 1, wherein the computer extracting includesthe computer examining log file records of commands to determine a firstrepeating pattern of log file records by identifying similar commandsexecuted at a first predetermined time interval and the computerremoving log file records of commands that are part of the firstrepeating pattern of log file records from the second plurality of logfile records.
 7. The method of claim 1, wherein the computer extractingincludes performing the extracting in response to a user action andwherein the computer extracting includes the computer examining log filerecords of commands to determine a first repeating pattern of log filerecords and the computer removing log file records of commands that arepart of the first repeating pattern of log file records from the secondplurality of log file records, wherein the computer examining log filerecords of commands to determine a first repeating pattern of log filerecords occurs prior to the first time so that at a time of the useraction prior to the extracting the computer has determined the firstrepeating pattern of log file records.
 8. The method of claim 1, whereinthe computer extracting includes performing the extracting in responseto a user action and wherein the computer extracting includes thecomputer examining log file records of commands to determine a firstrepeating pattern of log file records and to determine a secondrepeating pattern of log file records and the computer removing log filerecords of commands that are part of the first repeating pattern of logfile records and the second repeating pattern of log file records fromthe second plurality of log file records, wherein the computer examininglog file records of commands to determine a first repeating pattern oflog file records and a second repeating pattern of log file recordsoccurs prior to the first time so that at a time of the user actionprior to the extracting the computer has determined the first repeatingpattern of log file records and the second repeating pattern of log filerecords.
 9. The method of claim 1, wherein the computer extractingincludes performing the extracting in response to a user action andwherein the computer extracting includes the computer examining log filerecords of commands to determine a first repeating pattern of log filerecords and to determine a second repeating pattern of log file recordsand the computer removing log file records of commands that are part ofthe first repeating pattern of log file records and the second repeatingpattern of log file records from the second plurality of log filerecords, wherein the computer examining log file records of commands todetermine a first repeating pattern of log file records and a secondrepeating pattern of log file records occurs prior to the first time sothat at a time of the user action prior to the extracting the computerhas determined the first repeating pattern of log file records and thesecond repeating pattern of log file records, wherein the at least onelog file record of commands remaining from the second plurality of logfile records of the commands after the extracting is a log file recordthat comprises a record of a first command to perform a first type ofuser initiated task and a record of the second command to perform asecond type of user initiated task, the first type of user initiatedtask being selected from the group consisting of a user initiatedmigrate task, a user initiated assign task, and a user initiated submittask, the second type of user initiated task being different from thefirst type of user initiated task and being selected from the groupconsisting of a user initiated migrate task, a user initiated assigntask, and a user initiated submit task.
 10. The method of claim 1,wherein the at least one log file record of commands remaining from thesecond plurality of log file records of commands after the extractingcomprises a record of a select command, a record of an insert command,and a record of a where command.
 11. The method of claim 1, furthercomprising the computer storing in response to a user action a filecomprising the at least one log file record of commands remaining fromthe second plurality of log file records of commands after theextracting, the file being absent of log file records that are notrecords of a command to perform a user initiated task.
 12. The computerreadable storage device of claim 3, wherein the computer extractingincludes the computer examining log file records of commands todetermine a first repeating pattern of log file records by identifyingsimilar commands executed at a first predetermined time interval and thecomputer removing log file records of commands that are part of thefirst repeating pattern of log file records from the second plurality oflog file records.
 13. The computer readable storage device of claim 3,wherein the computer extracting includes the computer examining log filerecords of commands to determine a first repeating pattern of log filerecords and to determine a second repeating pattern of log file recordsand the computer removing log file records of commands that are part ofthe first repeating pattern of log file records and the second repeatingpattern of log file records from the second plurality of log filerecords, the computer determining the first repeating pattern of logfile records by identifying similar commands executed at a firstpredetermined time interval, the computer determining the secondrepeating pattern of log file records by identifying similar commandsexecuted at a second predetermined time interval.
 14. The computerreadable storage device of claim 3, wherein the computer extractingincludes performing the extracting in response to a user action andwherein the computer extracting includes the computer examining log filerecords of commands to determine a first repeating pattern of log filerecords and the computer removing log file records of commands that arepart of the first repeating pattern of log file records from the secondplurality of log file records, wherein the computer examining log filerecords of commands to determine a first repeating pattern of log filerecords occurs prior to the first time so that at a time of the useraction prior to the extracting the computer has determined the firstrepeating pattern of log file records.
 15. The computer readable storagedevice of claim 3, wherein the computer extracting includes performingthe extracting in response to a user action and wherein the computerextracting includes the computer examining log file records of commandsto determine a first repeating pattern of log file records and todetermine a second repeating pattern of log file records and thecomputer removing log file records of commands that are part of thefirst repeating pattern of log file records and the second repeatingpattern of log file records from the second plurality of log filerecords, wherein the computer examining log file records of commands todetermine a first repeating pattern of log file records and a secondrepeating pattern of log file records occurs prior to the first time sothat at a time of the user action prior to the extracting the computerhas determined the first repeating pattern of log file records and thesecond repeating pattern of log file records.
 16. The computer readablestorage device of claim 3, wherein the computer extracting includesperforming the extracting in response to a user action and wherein thecomputer extracting includes the computer examining log file records ofcommands to determine a first repeating pattern of log file records andto determine a second repeating pattern of log file records and thecomputer removing log file records of commands that are part of thefirst repeating pattern of log file records and the second repeatingpattern of log file records from the second plurality of log filerecords, wherein the computer examining log file records of commands todetermine a first repeating pattern of log file records and a secondrepeating pattern of log file records occurs prior to the first time sothat at a time of the user action prior to the extracting the computerhas determined the first repeating pattern of log file records and thesecond repeating pattern of log file records, wherein the at least onelog file record of commands remaining from the second plurality of logfile records of the commands after the extracting is a log file recordthat comprises a record of a first command to perform a first type ofuser initiated task and a record of a second command to perform a secondtype of user initiated task, the second type of user initiated taskbeing different from the first type of user initiated task.
 17. Thecomputer readable storage device of claim 3, wherein the at least onelog file record of commands remaining from the second plurality of logfile records of commands after the extracting comprises a record of aselect command, a record of an insert command, and a record of a wherecommand.
 18. The computer readable storage device of claim 3, whereinthe at least one log file record of commands remaining from the secondplurality of log file records of commands after the extracting comprisesa user ID associated with a user and a transaction ID associated with atransaction.
 19. The computer readable storage device of claim 10,further comprising: the computer executing at least one task selectedfrom the group of consisting of a user initiated migrate task, a userinitiated assign task, and a user initiated submit task between thefirst time and the second time in response to first graphical userinterface action by a user; and the computer storing a first timestampvalue corresponding to the first time and a second timestamp valuecorresponding to the second time, wherein the computer storing thesecond timestamp value initiates the computer extracting the firstplurality of log file records of commands from the second plurality oflog file records of commands, and wherein the computer storing thesecond timestamp value is performed in response to a second graphicaluser interface action by a user.
 20. The system of claim 4, wherein thecomputer extracting includes performing the extracting in response to auser action and wherein the computer extracting includes the computerexamining log file records of commands to determine a first repeatingpattern of log file records and to determine a second repeating patternof log file records and the computer removing log file records ofcommands that are part of the first repeating pattern of log filerecords and the second repeating pattern of log file records from thesecond plurality of log file records, wherein the computer examining logfile records of commands to determine a first repeating pattern of logfile records and a second repeating pattern of log file records occursprior to the first time so that at a time of the user action prior tothe extracting the computer has determined the first repeating patternof log file records and the second repeating pattern of log filerecords, the first type of user initiated task being selected from thegroup consisting of a user initiated migrate task, a user initiatedassign task, and a user initiated submit task, the second type of userinitiated task being different from the first type of user initiatedtask and being one selected from the group consisting of a userinitiated migrate task, a user initiated assign task, and a userinitiated submit task.