473,574 Members | 3,176 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Searching in Logs

I have recently developed an application in c witch acts like a
system logger for windows 2003 server domain controllers and my problem
is that of the size.
In a normal day my program produces more than 3-4 Mb of data in plain
text, and you can imagine that interpreting or getting information from
such a big file is time consuming, that's why I tryed to implement some
archiving functionality.
My question is if someone knows a fast string searching method in C (
Boyer-Moore ? ) and how do I implement pattern searching ( witch would
be 40% faster than Boyer-Moore )!

Nov 15 '05 #1
1 1245
Pacher R. Dragos wrote:

<snip>
My question is if someone knows a fast string searching method in C (
Boyer-Moore ? ) and how do I implement pattern searching ( witch would
be 40% faster than Boyer-Moore )!


This is not an algorithms group, so selecting the right algorithm and
discussing algorithms is not on topic. Nor are non-standard libraries.
If you attempt to implement an algorithm and have problems with your
coding we can then help you with the coding. comp.programmin g might be a
better place to start, although you should read their FAQ and a few days
posts before asking there.

<OT>
For pattern matching you could try the pcre library which is available
on both Windows and *nix, but don't ask here about how to use it.
</OT>
--
Flash Gordon
Living in interesting times.
Although my email address says spam, it is real and I read it.
Nov 15 '05 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

10
5471
by: sffan | last post by:
I am new to database programming and was curious how others solve the problem of storing encrypted in data in db table columns and then subsequently searching for these records. The particular problem that I am facing is in dealing with (privacy) critical information like credit-card #s and SSNs or business critical information like sales...
14
5363
by: Ludwig77 | last post by:
I read that there are some tags that can be entered in a web page's meta tags in order to prevent web bot searching and indexing of the web page for search engines. What is the tagging that I would need to use?
2
10043
by: Peter Sands | last post by:
Hi, I am testing out some restores to a stand-by server, by roll-forwading the logs. I have this setup. There is no user-exit, but logretain is on, for archive logging. I have 2 DB's on different servers ( a & b), but named the same. I have done a 'restore into' to create the db on server b, then taken a on-line dump of that DB, then...
6
11540
by: paul | last post by:
Hi, i made an attempt to restore a online backup made with include logs option. But when i rollforward the db, i can't pout it online because it always ned log file. I tried the option to rollforward to end of logs and to point in time. In the doc, it is said taht with 'include logs', i can restore without any log file. Someone know how can...
2
2658
by: dayjah | last post by:
Hi, We are in the process of setting my mysql replication on mysql ver 4.1.18. However we have noticed an odd bug that occurs every so often. Every hour we issue flush logs to mysql so that we can move the bin logs to our backup server. In our mysql logs we notice the following; 060526 12:00:02 Failed to open log (file...
3
1614
by: TG | last post by:
Coming from a (mostly) Oracle shop, I am unclear how SS transaction logs work as far as up to point of failure recovery goes. I have the few MSSQL databases I look after in full recovery mode, and I set up maintenance plans to back these up online on a daily basis. In the research I did it was recommended backing up the transaction logs as...
4
20452
by: aj | last post by:
DB2 LUW v8.2 FP 14 RHAS 2.1 I have a DB2 online DB backup that was done w/ the INCLUDE LOGS option. I am interested in restoring that backup, and rolling forward ONLY the logs contained in the backup and no more, then bringing the DB online. I do not want to use a userexit to try and retrieve additional logs - I only want to roll...
4
5490
by: madzambonis | last post by:
Here is the situation.... We have Primary Server A linked to Standby Server B via HADR. Primary Server A has recently installed LOGARCHMETH1 to archive logs and a 2nd homegrown script that compresses the archived logs once in the archive log directory. Standby Server B has our old script that moves logs from active to archive directories...
0
65302
by: shorti | last post by:
We are running DB2 UDB 8.1 fp 14 on AIX using archival logging and online backups. I was running some disaster tests and found my database restore was not restoring to the latest active log. Online backup include logs. For this test I created a disaster where we lost the database about 30 minutes after the last backup. Current archive and...
0
8110
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. ...
0
8273
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that...
0
6514
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then...
0
5336
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert...
0
3775
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in...
0
3794
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
2277
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
1
1375
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
0
1102
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.