A survey on automated log analysis for reliability engineering

S He, P He, Z Chen, T Yang, Y Su, MR Lyu - ACM computing surveys …, 2021 - dl.acm.org
Logs are semi-structured text generated by logging statements in software source code. In
recent decades, software logs have become imperative in the reliability assurance …

Ai for it operations (aiops) on cloud platforms: Reviews, opportunities and challenges

Q Cheng, D Sahoo, A Saha, W Yang, C Liu… - arXiv preprint arXiv …, 2023 - arxiv.org
Artificial Intelligence for IT operations (AIOps) aims to combine the power of AI with the big
data generated by IT Operations processes, particularly in cloud infrastructures, to provide …

[HTML][HTML] System log clustering approaches for cyber security applications: A survey

M Landauer, F Skopik, M Wurzenberger, A Rauber - Computers & Security, 2020 - Elsevier
Log files give insight into the state of a computer system and enable the detection of
anomalous events relevant to cyber security. However, automatically analyzing log data is …

System log parsing: A survey

T Zhang, H Qiu, G Castellano, M Rifai… - … on Knowledge and …, 2023 - ieeexplore.ieee.org
Modern information and communication systems have become increasingly challenging to
manage. The ubiquitous system logs contain plentiful information and are thus widely …

Onion: identifying incident-indicating logs for cloud systems

X Zhang, Y Xu, S Qin, S He, B Qiao, Z Li… - Proceedings of the 29th …, 2021 - dl.acm.org
In cloud systems, incidents affect the availability of services and require quick mitigation
actions. Once an incident occurs, operators and developers often examine logs to perform …

Mining causality of network events in log data

S Kobayashi, K Otomo, K Fukuda… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Network log messages (eg, syslog) are expected to be valuable and useful information to
detect unexpected or anomalous behavior in large scale networks. However, because of the …

Execution anomaly detection in large-scale systems through console log analysis

L Bao, Q Li, P Lu, J Lu, T Ruan, K Zhang - Journal of Systems and Software, 2018 - Elsevier
Execution anomaly detection is important for development, maintenance and performance
tuning in large-scale systems. System console logs are the significant source of …

A comprehensive survey of logging in software: From logging statements automation to log mining and analysis

S Gholamian, PAS Ward - arXiv preprint arXiv:2110.12489, 2021 - arxiv.org
Logs are widely used to record runtime information of software systems, such as the
timestamp and the importance of an event, the unique ID of the source of the log, and a part …

Digging deeper into cluster system logs for failure prediction and root cause diagnosis

X Fu, R Ren, SA McKee, J Zhan… - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
As the sizes of supercomputers and data centers grow towards exascale, failures become
normal. System logs play a critical role in the increasingly complex tasks of automatic failure …

LogM: Log Analysis for Multiple Components of Hadoop Platform

Y Xie, K Yang, P Luo - IEEE Access, 2021 - ieeexplore.ieee.org
The Hadoop platform provides a powerful software framework for distributed storage and
processing of massive amounts of data. It is at the heart of big data processing and has …