Software configuration engineering in practice interviews, survey, and systematic literature review

M Sayagh, N Kerzazi, B Adams… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Modern software applications are adapted to different situations (eg, memory limits,
enabling/disabling features, database credentials) by changing the values of configuration …

Hey, you have given me too many knobs!: Understanding and dealing with over-designed configuration in system software

T Xu, L Jin, X Fan, Y Zhou, S Pasupathy… - Proceedings of the 2015 …, 2015 - dl.acm.org
Configuration problems are not only prevalent, but also severely impair the reliability of
today's system software. One fundamental reason is the ever-increasing complexity of …

Early detection of configuration errors to reduce failure damage

T Xu, X Jin, P Huang, Y Zhou, S Lu, L Jin… - … USENIX Symposium on …, 2016 - usenix.org
Early detection is the key to minimizing failure damage induced by configuration errors,
especially those errors in configurations that control failure handling and fault tolerance …

Investigating system operators' perspective on security misconfigurations

C Dietrich, K Krombholz, K Borgolte… - Proceedings of the 2018 …, 2018 - dl.acm.org
Nowadays, security incidents have become a familiar" nuisance," and they regularly lead to
the exposure of private and sensitive data. The root causes for such incidents are rarely …

Holistic configuration management at facebook

C Tang, T Kooburat, P Venkatachalam… - Proceedings of the 25th …, 2015 - dl.acm.org
Facebook's web site and mobile apps are very dynamic. Every day, they undergo thousands
of online configuration changes, and execute trillions of configuration checks to personalize …

Testing configuration changes in context to prevent production failures

X Sun, R Cheng, J Chen, E Ang, O Legunsen… - … USENIX Symposium on …, 2020 - usenix.org
Large-scale cloud services deploy hundreds of configuration changes to production systems
daily. At such velocity, configuration changes have inevitably become prevalent causes of …

Datasize-aware high dimensional configurations auto-tuning of in-memory cluster computing

Z Yu, Z Bei, X Qian - Proceedings of the Twenty-Third International …, 2018 - dl.acm.org
In-Memory cluster Computing (IMC) frameworks (eg, Spark) have become increasingly
important because they typically achieve more than 10× speedups over the traditional On …

Understanding and discovering software configuration dependencies in cloud and datacenter systems

Q Chen, T Wang, O Legunsen, S Li, T Xu - … of the 28th ACM Joint Meeting …, 2020 - dl.acm.org
A large percentage of real-world software configuration issues, such as misconfigurations,
involve multiple interdependent configuration parameters. However, existing techniques and …

Detecting anomalies in microservices with execution trace comparison

L Meng, F Ji, Y Sun, T Wang - Future Generation Computer Systems, 2021 - Elsevier
More and more developers and companies have adopted the concept of microservice.
Detecting anomalies and locating root causes are important for improving the reliability of …

Configuration validation with large language models

X Lian, Y Chen, R Cheng, J Huang, P Thakkar… - arXiv preprint arXiv …, 2023 - arxiv.org
Misconfigurations are the major causes of software failures. Existing configuration validation
techniques rely on manually written rules or test cases, which are expensive to implement …