A survey on automated log analysis for reliability engineering
Logs are semi-structured text generated by logging statements in software source code. In
recent decades, software logs have become imperative in the reliability assurance …
recent decades, software logs have become imperative in the reliability assurance …
Process mining techniques and applications–A systematic mapping study
C dos Santos Garcia, A Meincheim, ERF Junior… - Expert Systems with …, 2019 - Elsevier
Process mining is a growing and promising study area focused on understanding processes
and to help capture the more significant findings during real execution rather than, those …
and to help capture the more significant findings during real execution rather than, those …
Deeplog: Anomaly detection and diagnosis from system logs through deep learning
Anomaly detection is a critical step towards building a secure and trustworthy system. The
primary purpose of a system log is to record system states and significant events at various …
primary purpose of a system log is to record system states and significant events at various …
Spell: Streaming parsing of system event logs
System event logs have been frequently used as a valuable resource in data-driven
approaches to enhance system health and stability. A typical procedure in system log …
approaches to enhance system health and stability. A typical procedure in system log …
Swisslog: Robust and unified deep learning based log anomaly detection for diverse faults
Log-based anomaly detection has been widely studied and achieves a satisfying
performance on stable log data. But, the existing approaches still fall short meeting these …
performance on stable log data. But, the existing approaches still fall short meeting these …
Cloudseer: Workflow monitoring of cloud infrastructures via interleaved logs
Cloud infrastructures provide a rich set of management tasks that operate computing,
storage, and networking resources in the cloud. Monitoring the executions of these tasks is …
storage, and networking resources in the cloud. Monitoring the executions of these tasks is …
Anomaly detection using program control flow graph mining from execution logs
We focus on the problem of detecting anomalous run-time behavior of distributed
applications from their execution logs. Specifically we mine templates and template …
applications from their execution logs. Specifically we mine templates and template …
Root-cause metric location for microservice systems via log anomaly detection
Microservice systems are typically fragile and failures are inevitable in them due to their
complexity and large scale. However, it is challenging to localize the root-cause metric due …
complexity and large scale. However, it is challenging to localize the root-cause metric due …
Correlating events with time series for incident diagnosis
As online services have more and more popular, incident diagnosis has emerged as a
critical task in minimizing the service downtime and ensuring high quality of the services …
critical task in minimizing the service downtime and ensuring high quality of the services …
Swisslog: Robust anomaly detection and localization for interleaved unstructured logs
Modern distributed systems generate interleaved logs when running in parallel. Identifiers
(ID) are always attached to them to trace running instances or entities in logs. Therefore, log …
(ID) are always attached to them to trace running instances or entities in logs. Therefore, log …