2022
DOI: 10.1109/tsc.2019.2940009
|View full text |Cite
|
Sign up to set email alerts
|

Microservices Monitoring with Event Logs and Black Box Execution Tracing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
19
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 36 publications
(19 citation statements)
references
References 18 publications
0
19
0
Order By: Relevance
“…Cinque et al 18 present a non-intrusive novel monitoring approach to accompany micro-services logs with black box tracing to help practitioners in making informed decisions for troubleshooting. It is thus a passive tracing solution and it aims to cope with the flexibility requirements of micro-services systems, but only on log level.…”
Section: Related Workmentioning
confidence: 99%
“…Cinque et al 18 present a non-intrusive novel monitoring approach to accompany micro-services logs with black box tracing to help practitioners in making informed decisions for troubleshooting. It is thus a passive tracing solution and it aims to cope with the flexibility requirements of micro-services systems, but only on log level.…”
Section: Related Workmentioning
confidence: 99%
“…Log-based methods. The system log is an important clue for analysis [2]. By parsing patterns and extracting features from event logs, Xu et al [15,16] built anomaly detection and identification models from historical data and used these models to analyze root causes.…”
Section: Related Workmentioning
confidence: 99%
“…where AS(Vi), Degree(Vi), and N denote the anomaly score of Vi, the degree of Vi, and the number of AAN(Vi), respectively. As for NHAN(Vi) we define: , 𝑉 𝑗 ∈ 𝑁𝐻𝐴𝑁( 𝑉 𝑖 ), (2) where x denotes the average anomaly score of HNAN(V i ). Here iScore indicates the anomalous degree of AAN(Vi), and xScore reflects the normality of NHAN(Vi).…”
Section: E Automated Anomaly Weight Updatingmentioning
confidence: 99%
See 1 more Smart Citation
“…Unfortunately, given that the scope of Reference [15] is on network security, no information about accuracy and overhead is provided. The work of Cinque et al[10] provides a tool for network traffic analysis that accompanies a system for log collection that involves application instrumentation. Its MetroFunnel component is based on pcap and can pinpoint abnormal service operation with small overhead on the performance of the applications.…”
mentioning
confidence: 99%