Several activities in a distributed system generate files describing the details of activities, known as log files. For example, the process of logging in to a computer generates entries in a log file which monitor activities that could threaten a system’s security. The process of analysing a log file involves producing reports such as summary listings and any exception reports about unusual activities.