A complete example of a perverted use: parsing auth.log ******************************************************* Imagine you are a sysadmin and your boss want a graph of all the request you do, and you don't like using excel .. literalinclude:: ../../plot_attack .. image:: ../../attack.png