Abstract
Event logs provide the capability to gain insight into system operation under the real workload. They have been widely used to detect anomalies, evaluate dependability including security, service time analysis, etc. The paper outlines log analyses schemes described in the literature and presents a new approach which takes into account specificity of applications embedded into system environment. It takes into account a wide scope of logs, defines and extracts their features helpful in assessing application operation in the considered lifetime span. The presented methodology is illustrated with results related to a complex commercial system used as a case study.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aue, J.: Log analysis from A to Z: a literature survey. MSc thesis, Delft University (2016)
Chen, C.H., Singh, N., Yajnik, D.: Log analytics for dependable enterprise telephony. In: IEEE 9th European Dependable Computing Conference, pp. 94–101 (2012)
Chen, B., Jiang, Z.: Characterizing logging practices in Java-based open source software projects. Empirical Softw. Eng. 22(1), 330–374 (2017)
Cinque, M., Cotroneo, D., Della Corte, R., Pecchia, A.: Assessing direct monitoring techniques to analyze failures of critical industrial systems. In: 25th IEEE International Symposium on Software Reliability Engineering, pp. 212–222 (2014)
Ding, R., Zhou, H., Lou, J-G., Zhang, H., Lin, Q., Fu, Q., Zhang, D.: Log2: a cost-aware logging mechanism for performance diagnosis. In: USENIX ATC Conference, pp. 139–150 (2015)
Fu, X., Ren, R., Zhan, J., Zhou, W., Jia, Z., Lu, G.: LogMaster: mining event correlations in logs of large-scale cluster systems. In: 31st IEEE Symposium on Reliable Distributed Systems, pp. 71–80 (2012)
Fu, Q., Zhu, J., Hu, W., Lou, J., Ding, R., Lin, Q., Zhang, D., Xie, T.: Where do developers log? An empirical study on logging practices in industry. In: Companion Proceedings of the 36th International Conference on Software Engineering, ICSE 2014, pp. 24–33 (2014)
He, S., Zhu, J., He, P., Lyu, M.R.: Experience report: system log analysis for anomaly detection. In: Proceedings of International Symposium on Software Reliability Engineering, pp. 207–218 (2016)
He, P., Zhu, J., He, S., Li, J., Lyu, M.R.: Towards automated log parsing for large-scale log data analysis. IEEE Trans. Dependable Secure Comput. 15(16), 931–944 (2017)
He, P., Chen Z., He, Z., Lyu, M.L.: Characterizing the natural language descriptions in software logging statements. In: 33rd IEEE/ACM ASE International Conference, pp. 178–189 (2018)
Jain, S., Singh, I., Chandra, A., Zhang, Z.L., Bronevetsky, G.: Extracting the textual and temporal structure of supercomputing logs. In: 16th IEEE International Conference on High Performance Computing, pp. 254–263 (2009)
Kubacki, M., Sosnowski, J.: Holistic processing and exploring event logs. In: 9th International Workshop, SERENE 2017, LNCS, vol. 10479, pp. 184–200. Springer (2017)
Nagaraj, K., Killian, C., Neville, J.: Structured comparative analysis of systems logs to diagnose performance problems. In: 9th USENIX Conference on Networked Systems Design and Implementation, pp. 26–31 (2012)
Pecchia, A., Russo, S.: Detection of software failures through event logs: an experimental study. In: 23rd International Symposium on Software Reliability Engineering, pp. 31–40 (2012)
Pecchia, A., Cinque, M., Carroza,G., Cotroneo, D.: Industry practices and event logging: assessment of a critical software development process. In: 37th IEEE International Conference on Software Engineering, pp. 169–178 (2015)
Salman, M., Welch, B., Tront, J., Raymon, D., Marchany, R.: Designing PhelkStat: big analytics for system event logs. In: HICSS Symposium on Cybersecurity Big Data, Analytics, pp. 1–7 (2017)
Stearley, J., Oliner, A.J.: Bad words: finding faults in Spirit’s Syslogs. In: 8th IEEE International Symposium on Cluster Computing and the Grid, pp. 765–770 (2008)
Xu, W., Huang, L., Fox, A., Patterson, D., Jordan, M.: Detecting large-scale system problems by mining console logs. In: 22nd ACM SOSP Conference, pp. 117–132 (2009)
Yuan, D., Park, S., Zhou, Y.: Characterizing logging practices in open-source software. In: 34th International Conference on Software Engineering, pp. 102–112 (2012)
Zhu, J., He, P., Fu, Q., Zhang, H., Lyu, R., Zhang, D.: Learning to log: Helping developers make informed logging decisions. In: 37th International Conference on Software Engineering, pp. 415–424 (2015)
Zou, D.Q., Qin, H., Jin, H.: UiLog: improving log-based fault diagnosis by log analysis. J. Comput. Sci. Technol. 31(5), 1038–1052 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Obrębski, D., Sosnowski, J. (2020). Log Based Analysis of Software Application Operation. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds) Engineering in Dependability of Computer Systems and Networks. DepCoS-RELCOMEX 2019. Advances in Intelligent Systems and Computing, vol 987. Springer, Cham. https://doi.org/10.1007/978-3-030-19501-4_37
Download citation
DOI: https://doi.org/10.1007/978-3-030-19501-4_37
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-19500-7
Online ISBN: 978-3-030-19501-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)