Skip to main content

Improved Topology Extraction Using Discriminative Parameter Mining of Logs

  • Conference paper
  • First Online:
Advances in Knowledge Discovery and Data Mining (PAKDD 2021)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 12712))

Included in the following conference series:

Abstract

Analytics on log data from various sources like application, middleware and infrastructure plays a very important role in troubleshooting of distributed applications. The existing tools for log analytics work by mining log templates and template sequences. The template sequences are then used to derive the application control flow or topology. In this work, we show how the use of parameters in logs enables discovery of a more accurate application topology, thereby aiding troubleshooting. An accurate application topology information helps in better correlation of logs at runtime, enabling troubleshooting tasks like anomaly detection, fault localization and root cause analysis to be more accurate.

To this end, we propose a novel log template mining approach which uses parameter mining combined with fuzzy clustering on historical runtime logs to mine better quality templates. We also leverage parameter flows between log templates using a novel discriminative parameter mining approach for better topology extraction. In our method we do not assume any source code instrumentation or application specific assumptions like presence of transaction identifiers. We demonstrate the effectiveness of our approach in mining templates and application topology using real world as well as simulated data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gupta, M., Mandal, A., Dasgupta, G., Serebrenik, A.: Runtime monitoring in continuous deployment by differencing execution behavior model. In: Pahl, C., Vukovic, M., Yin, J., Yu, Q. (eds.) ICSOC 2018. LNCS, vol. 11236, pp. 812–827. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-03596-9_58

    Chapter  Google Scholar 

  2. Nandi, A., Mandal, A., Atreja, S., Dasgupta, G.B., Bhattacharya, S.: Anomaly detection using program control flow graph mining from execution logs. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 215–224 (2016)

    Google Scholar 

  3. Vaarandi, R.: A data clustering algorithm for mining patterns from event logs. In: Proceedings of the 3rd IEEE Workshop on IP Operations Management (IPOM 2003) (IEEE Cat. No.03EX764), pp. 119–126 (2003)

    Google Scholar 

  4. Vaarandi, R., Pihelgas, M.: Logcluster - a data clustering and pattern mining algorithm for event logs. In: 2015 11th International Conference on Network and Service Management (CNSM), pp. 1–7 (2015)

    Google Scholar 

  5. Vaarandi, R.: Mining event logs with SLCT and loghound. In: NOMS 2008–2008 IEEE Network Operations and Management Symposium, pp. 1071–1074 (2008)

    Google Scholar 

  6. He, P., Zhu, J., Zheng, Z., Lyu, M.R.: Drain: An online log parsing approach with fixed depth tree. In 2017 IEEE International Conference on Web Services (ICWS), pp. 33–40 (2017)

    Google Scholar 

  7. Kiali. https://github.com/kiali/kiali

  8. Istio service mesh. https://istio.io/

  9. Opentelemetry - an observability framework for cloud-native software. https://opentelemetry.io/

  10. Appdynamics. https://www.appdynamics.com/

  11. Dynatrace. https://www.dynatrace.com/

  12. Sigelman, B.H., et al.: Dapper, a large-scale distributed systems tracing infrastructure. Technical report, Google Inc, (2010)

    Google Scholar 

  13. Barham, P., Isaacs, R., Mortier, R., Narayanan, D.: Magpie: online modelling and performance-aware systems, pp. 85–90 (2003)

    Google Scholar 

  14. Fonseca, R., Porter, G., Katz, R.H., Shenker, S., Stoica, I.: X-trace: A pervasive network tracing framework. In: NSDI 2007, USA, p. 20. USENIX Association (2007)

    Google Scholar 

  15. Bojanowski, P., Grave, E., Joulin, A., Mikolov, T.: Enriching word vectors with subword information. arXiv preprint arXiv:1607.04606 (2016)

  16. Winkler, W.E.: Overview of record linkage and current research directions. Technical report, BUREAU OF THE CENSUS (2006)

    Google Scholar 

  17. Mandal, A., et al.: Automated dispatch of helpdesk email tickets: Pushing the limits with AI. In: The Thirty-Third AAAI Conference on Artificial Intelligence, AAAI 2019, Honolulu, Hawaii, USA, 27 January–1 February 2019, pp. 9381–9388. AAAI Press (2019)

    Google Scholar 

  18. Openstack: Open-source software for creating public and private clouds

    Google Scholar 

  19. Zhou, X., et al.: Latent error prediction and fault localization for microservice applications by learning from system trace logs. In: Dumas, M., Pfahl, S., Apel, S., Russo, A. (eds.) Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC/SIGSOFT FSE 2019, Tallinn, Estonia, 26–30 August 2019, pp. 683–694. ACM (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Atri Mandal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mandal, A., Gupta, S., Agarwal, S., Mohapatra, P. (2021). Improved Topology Extraction Using Discriminative Parameter Mining of Logs. In: Karlapalem, K., et al. Advances in Knowledge Discovery and Data Mining. PAKDD 2021. Lecture Notes in Computer Science(), vol 12712. Springer, Cham. https://doi.org/10.1007/978-3-030-75762-5_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-75762-5_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-75761-8

  • Online ISBN: 978-3-030-75762-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics