A survey on automated log analysis for reliability engineering

S He, P He, Z Chen, T Yang, Y Su, MR Lyu - ACM computing surveys …, 2021 - dl.acm.org
Logs are semi-structured text generated by logging statements in software source code. In
recent decades, software logs have become imperative in the reliability assurance …

Process mining techniques and applications–A systematic mapping study

C dos Santos Garcia, A Meincheim, ERF Junior… - Expert Systems with …, 2019 - Elsevier
Process mining is a growing and promising study area focused on understanding processes
and to help capture the more significant findings during real execution rather than, those …

Deeplog: Anomaly detection and diagnosis from system logs through deep learning

M Du, F Li, G Zheng, V Srikumar - … of the 2017 ACM SIGSAC conference …, 2017 - dl.acm.org
Anomaly detection is a critical step towards building a secure and trustworthy system. The
primary purpose of a system log is to record system states and significant events at various …

Spell: Streaming parsing of system event logs

M Du, F Li - 2016 IEEE 16th International Conference on Data …, 2016 - ieeexplore.ieee.org
System event logs have been frequently used as a valuable resource in data-driven
approaches to enhance system health and stability. A typical procedure in system log …

Swisslog: Robust and unified deep learning based log anomaly detection for diverse faults

X Li, P Chen, L Jing, Z He, G Yu - 2020 IEEE 31st International …, 2020 - ieeexplore.ieee.org
Log-based anomaly detection has been widely studied and achieves a satisfying
performance on stable log data. But, the existing approaches still fall short meeting these …

Cloudseer: Workflow monitoring of cloud infrastructures via interleaved logs

X Yu, P Joshi, J Xu, G Jin, H Zhang… - ACM SIGARCH Computer …, 2016 - dl.acm.org
Cloud infrastructures provide a rich set of management tasks that operate computing,
storage, and networking resources in the cloud. Monitoring the executions of these tasks is …

Anomaly detection using program control flow graph mining from execution logs

A Nandi, A Mandal, S Atreja, GB Dasgupta… - Proceedings of the …, 2016 - dl.acm.org
We focus on the problem of detecting anomalous run-time behavior of distributed
applications from their execution logs. Specifically we mine templates and template …

Root-cause metric location for microservice systems via log anomaly detection

L Wang, N Zhao, J Chen, P Li… - … conference on web …, 2020 - ieeexplore.ieee.org
Microservice systems are typically fragile and failures are inevitable in them due to their
complexity and large scale. However, it is challenging to localize the root-cause metric due …

Correlating events with time series for incident diagnosis

C Luo, JG Lou, Q Lin, Q Fu, R Ding, D Zhang… - Proceedings of the 20th …, 2014 - dl.acm.org
As online services have more and more popular, incident diagnosis has emerged as a
critical task in minimizing the service downtime and ensuring high quality of the services …

Swisslog: Robust anomaly detection and localization for interleaved unstructured logs

X Li, P Chen, L Jing, Z He, G Yu - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Modern distributed systems generate interleaved logs when running in parallel. Identifiers
(ID) are always attached to them to trace running instances or entities in logs. Therefore, log …