2018
DOI: 10.1016/j.jss.2017.03.012
|View full text |Cite
|
Sign up to set email alerts
|

Metric selection and anomaly detection for cloud operations using log and metric correlation analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
31
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 65 publications
(32 citation statements)
references
References 6 publications
0
31
0
1
Order By: Relevance
“…In order to prevent severe failures, software developers invest efforts in mitigating the consequences of residual bugs. Examples are defensive programming practices, such as assertion checking and logging, to timely detect an incorrect state of the system [18,38] and for providing to system operators useful information for quick troubleshooting [17,76,77]. Another important approach to mitigate failures is to implement fault containment strategies.…”
Section: Introductionmentioning
confidence: 99%
“…In order to prevent severe failures, software developers invest efforts in mitigating the consequences of residual bugs. Examples are defensive programming practices, such as assertion checking and logging, to timely detect an incorrect state of the system [18,38] and for providing to system operators useful information for quick troubleshooting [17,76,77]. Another important approach to mitigate failures is to implement fault containment strategies.…”
Section: Introductionmentioning
confidence: 99%
“…Figure 4 gives an example of the position distribution of a word in messages. As we can see, the word shows high density in the intervals [0, 10) and [40, 50], but low density in the intervals [10,20), [20,30) and [30,40). Intuitively, a highdensity window (interval) is more likely to contain a keyword, while the low-density window may contain noise (false keywords) from payloads.…”
Section: Merging Positional Abstract Through Variation Analysis (Smentioning
confidence: 97%
“…Farshchi et al proposed a regression‐based approach for anomaly detection during DevOps application operations. It uses information from log files and infrastructure monitoring tools and can detect problems during operations such as backup, application upgrade, migration, reconfiguration, auto‐scaling, and deployment.…”
Section: Related Workmentioning
confidence: 99%
“…Our approach, on the other hand, targets nonsporadic events, specifically anomalies in resource utilization observed during application runtime.Huang et al33 proposed an approach that combines local outlier factors (a semisupervised anomaly detection algorithm) and symbolic aggregate approximation (a methodology to represent time-series) to identify anomalies in the process of live migration of virtual machines.It analyzes resource-level metrics and can identify machines that experienced issues during live migration. Rather than live migration of VMs, our approach focuses on unsupervised anomaly detection in the performance of running virtual machines.Farshchi et al34 proposed a regression-based approach for anomaly detection during DevOps application operations. It uses information from log files and infrastructure monitoring tools and can detect problems during operations such as backup, application upgrade, migration, reconfiguration, auto-scaling, and deployment.…”
mentioning
confidence: 99%