iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1145/3460345
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T19:51:01Z","timestamp":1726343461497},"reference-count":203,"publisher":"Association for Computing Machinery (ACM)","issue":"6","funder":[{"name":"Research Grants Council of the Hong Kong Special Administrative Region, China","award":["CUHK 14210717"]},{"name":"Key-Area Research and Development Program of Guangdong Province","award":["2020B010165002"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2022,7,31]]},"abstract":"Logs are semi-structured text generated by logging statements in software source code. In recent decades, software logs have become imperative in the reliability assurance mechanism of many software systems, because they are often the only data available that record software runtime information. As modern software is evolving into a large scale, the volume of logs has increased rapidly. To enable effective and efficient usage of modern software logs in reliability engineering, a number of studies have been conducted on automated log analysis. This survey presents a detailed overview of automated log analysis research, including how to automate and assist the writing of logging statements, how to compress logs, how to parse logs into structured event templates, and how to employ logs to detect anomalies, predict failures, and facilitate diagnosis. Additionally, we survey work that releases open-source toolkits and datasets. Based on the discussion of the recent advances, we present several promising future directions toward real-world and next-generation automated log analysis.<\/jats:p>","DOI":"10.1145\/3460345","type":"journal-article","created":{"date-parts":[[2021,7,13]],"date-time":"2021-07-13T16:48:08Z","timestamp":1626194888000},"page":"1-37","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":95,"title":["A Survey on Automated Log Analysis for Reliability Engineering"],"prefix":"10.1145","volume":"54","author":[{"given":"Shilin","family":"He","sequence":"first","affiliation":[{"name":"Microsoft Research, Beijing, China"}]},{"given":"Pinjia","family":"He","sequence":"additional","affiliation":[{"name":"Department of Computer Science, ETH Zurich, Z\u00fcrich, Switzerland"}]},{"given":"Zhuangbin","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, The Chinese University of Hong Kong, Shatin, N.T., Hong Kong"}]},{"given":"Tianyi","family":"Yang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, The Chinese University of Hong Kong, Shatin, N.T., Hong Kong"}]},{"given":"Yuxin","family":"Su","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, The Chinese University of Hong Kong, Shatin, N.T., Hong Kong"}]},{"given":"Michael R.","family":"Lyu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, The Chinese University of Hong Kong, Shatin, N.T., Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2021,7,13]]},"reference":[{"key":"e_1_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945454"},{"key":"e_1_2_2_2_1","volume-title":"Proceedings of the IEEE\/ACM 41st International Conference on Software Engineering (ICSE\u201919)","author":"Amar Anunay","unstructured":"Anunay Amar and Peter C. Rigby . 2019. Mining historical test logs to predict bugs and localize faults in the test logs . In Proceedings of the IEEE\/ACM 41st International Conference on Software Engineering (ICSE\u201919) . 140--151. Anunay Amar and Peter C. Rigby. 2019. Mining historical test logs to predict bugs and localize faults in the test logs. In Proceedings of the IEEE\/ACM 41st International Conference on Software Engineering (ICSE\u201919). 140--151."},{"key":"e_1_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236069"},{"key":"e_1_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.1998.732614"},{"key":"e_1_2_2_5_1","unstructured":"AspectJ. 2020. Eclipse AspectJ. Retrieved from https:\/\/www.eclipse.org\/aspectj\/. AspectJ. 2020. Eclipse AspectJ. Retrieved from https:\/\/www.eclipse.org\/aspectj\/."},{"key":"e_1_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572300"},{"key":"e_1_2_2_7_1","volume-title":"Proceedings 20th IEEE International Parallel & Distributed Processing Symposium (IPDPS\u201906)","author":"Balakrishnan Raju","unstructured":"Raju Balakrishnan and Ramendra K. Sahoo . 2006. Lossless compression for large scale cluster logs . In Proceedings 20th IEEE International Parallel & Distributed Processing Symposium (IPDPS\u201906) . 7. Raju Balakrishnan and Ramendra K. Sahoo. 2006. Lossless compression for large scale cluster logs. In Proceedings 20th IEEE International Parallel & Distributed Processing Symposium (IPDPS\u201906). 7."},{"key":"e_1_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00084"},{"key":"e_1_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889231"},{"key":"e_1_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTER.2014.6968757"},{"key":"e_1_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568246"},{"key":"e_1_2_2_12_1","volume-title":"Proceedings of the 19th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC\/FSE\u201911)","author":"Beschastnikh Ivan","unstructured":"Ivan Beschastnikh , Yuriy Brun , Sigurd Schneider , Michael Sloan , and Michael D. Ernst . 2011. Leveraging existing instrumentation to automatically infer invariant-constrained models . In Proceedings of the 19th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC\/FSE\u201911) . 267--277. Ivan Beschastnikh, Yuriy Brun, Sigurd Schneider, Michael Sloan, and Michael D. Ernst. 2011. Leveraging existing instrumentation to automatically infer invariant-constrained models. In Proceedings of the 19th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC\/FSE\u201911). 267--277."},{"key":"e_1_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1972.5009015"},{"key":"e_1_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884805"},{"key":"e_1_2_2_15_1","unstructured":"CFDR. 2020. Computer failure data repository. Retrieved from https:\/\/www.usenix.org\/cfdr. CFDR. 2020. Computer failure data repository. Retrieved from https:\/\/www.usenix.org\/cfdr."},{"key":"e_1_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion.2019.00055"},{"key":"e_1_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.15"},{"key":"e_1_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9429-5"},{"key":"e_1_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-019-09690-0"},{"key":"e_1_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380408"},{"key":"e_1_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238214"},{"key":"e_1_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00068"},{"key":"e_1_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:EMSE.0000027779.70556.d0"},{"key":"e_1_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00013"},{"key":"e_1_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313501"},{"key":"e_1_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9545-x"},{"key":"e_1_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463676.2465341"},{"key":"e_1_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2015.19"},{"key":"e_1_2_2_29_1","volume-title":"Proceedings of the International Conference on High Performance Computing (HPC\u201910)","author":"Chuah Edward","unstructured":"Edward Chuah , Shyh-hao Kuo, Paul Hiew , William-Chandra Tjhi , Gary Lee , John Hammond , Marek T. Michalewicz , Terence Hung , and James C. Browne . 2010. Diagnosing the root-causes of failures from cluster log files . In Proceedings of the International Conference on High Performance Computing (HPC\u201910) . 1--10. Edward Chuah, Shyh-hao Kuo, Paul Hiew, William-Chandra Tjhi, Gary Lee, John Hammond, Marek T. Michalewicz, Terence Hung, and James C. Browne. 2010. Diagnosing the root-causes of failures from cluster log files. In Proceedings of the International Conference on High Performance Computing (HPC\u201910). 1--10."},{"key":"e_1_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.69"},{"key":"e_1_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2010.5544279"},{"key":"e_1_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.67"},{"key":"e_1_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.62"},{"key":"e_1_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338916"},{"key":"e_1_2_2_35_1","volume-title":"Logram: Efficient log parsing using n-gram dictionaries","author":"Dai Hetong","year":"2020","unstructured":"Hetong Dai , Heng Li , Weiyi Shang , Tse-Hsun Chen , and Che-Shao Chen . 2020 . Logram: Efficient log parsing using n-gram dictionaries . IEEE Trans. Softw. Eng. (2020). Early access. Hetong Dai, Heng Li, Weiyi Shang, Tse-Hsun Chen, and Che-Shao Chen. 2020. Logram: Efficient log parsing using n-gram dictionaries. IEEE Trans. Softw. Eng. (2020). Early access."},{"key":"e_1_2_2_36_1","unstructured":"Daikon. 2020. A dynamic invariant detector. Retrieved from http:\/\/plse.cs.washington.edu\/daikon\/. Daikon. 2020. A dynamic invariant detector. Retrieved from http:\/\/plse.cs.washington.edu\/daikon\/."},{"key":"e_1_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011227529550"},{"key":"e_1_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS47924.2020.00115"},{"key":"e_1_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3208040.3208051"},{"key":"e_1_2_2_40_1","unstructured":"Failure dataset. 2020. Error logs produced by OpenStack. Retrieved from https:\/\/figshare.com\/articles\/Failure_dataset\/7732268\/2. Failure dataset. 2020. Error logs produced by OpenStack. Retrieved from https:\/\/figshare.com\/articles\/Failure_dataset\/7732268\/2."},{"key":"e_1_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"key":"e_1_2_2_42_1","volume-title":"Proceedings of the IEEE International Conference on \u201cModern Problems of Radio Engineering, Telecommunications and Computer Science\u201d (TCSET\u201908)","author":"Deorowicz Sebastian","year":"2008","unstructured":"Sebastian Deorowicz and Szymon Grabowski . 2008 . Sub-atomic field processing for improved web log compression . In Proceedings of the IEEE International Conference on \u201cModern Problems of Radio Engineering, Telecommunications and Computer Science\u201d (TCSET\u201908) . 551--556. Sebastian Deorowicz and Szymon Grabowski. 2008. Sub-atomic field processing for improved web log compression. In Proceedings of the IEEE International Conference on \u201cModern Problems of Radio Engineering, Telecommunications and Computer Science\u201d (TCSET\u201908). 551--556."},{"key":"e_1_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.39"},{"key":"e_1_2_2_44_1","volume-title":"Proceedings of the USENIX Annual Technical Conference (ATC). 139--150","author":"Ding Rui","year":"2015","unstructured":"Rui Ding , Hucheng Zhou , Jian-Guang Lou , Hongyu Zhang , Qingwei Lin , Qiang Fu , Dongmei Zhang , and Tao Xie . 2015 . Log2: A cost-aware logging mechanism for performance diagnosis . In Proceedings of the USENIX Annual Technical Conference (ATC). 139--150 . Rui Ding, Hucheng Zhou, Jian-Guang Lou, Hongyu Zhang, Qingwei Lin, Qiang Fu, Dongmei Zhang, and Tao Xie. 2015. Log2: A cost-aware logging mechanism for performance diagnosis. In Proceedings of the USENIX Annual Technical Conference (ATC). 139--150."},{"key":"e_1_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2875442"},{"key":"e_1_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"e_1_2_2_47_1","unstructured":"EDGAR. 2020. Apache log files. Retrieved from https:\/\/www.sec.gov\/dera\/data\/edgar-log-file-data-set.html. EDGAR. 2020. Apache log files. Retrieved from https:\/\/www.sec.gov\/dera\/data\/edgar-log-file-data-set.html."},{"key":"e_1_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2013.6575356"},{"key":"e_1_2_2_49_1","unstructured":"ELK. 2012. ElasticSearch. Retrieved from https:\/\/www.elastic.co\/elk-stack. ELK. 2012. ElasticSearch. Retrieved from https:\/\/www.elastic.co\/elk-stack."},{"key":"e_1_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.908957"},{"key":"e_1_2_2_51_1","unstructured":". The Daikon system for dynamic detection of likely invariants. Sci. Comput. Program.35--45. . The Daikon system for dynamic detection of likely invariants. Sci. Comput. Program.35--45."},{"key":"e_1_2_2_52_1","unstructured":"Facebook. 2019. Downtime outages and failures\u2014Understanding their true costs. Retrieved from http:\/\/www.evolven.com\/blog\/downtime-outages-and-failures-understanding-their-true-costs.html. Facebook. 2019. Downtime outages and failures\u2014Understanding their true costs. Retrieved from http:\/\/www.evolven.com\/blog\/downtime-outages-and-failures-understanding-their-true-costs.html."},{"key":"e_1_2_2_53_1","unstructured":"Facebook. 2019. Facebook loses $24 420 a minute during outages. Retrieved from https:\/\/www.theatlantic.com\/technology\/archive\/2014\/10\/facebook-is-losing-24420-per-minute\/382054\/. Facebook. 2019. Facebook loses $24 420 a minute during outages. Retrieved from https:\/\/www.theatlantic.com\/technology\/archive\/2014\/10\/facebook-is-losing-24420-per-minute\/382054\/."},{"key":"e_1_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2015.7381796"},{"key":"e_1_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0215"},{"key":"e_1_2_2_56_1","unstructured":"Fluentd. 2020. An open source data collector for unified logging layer. Retrieved from https:\/\/www.fluentd.org. Fluentd. 2020. An open source data collector for unified logging layer. Retrieved from https:\/\/www.fluentd.org."},{"key":"e_1_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.60"},{"key":"e_1_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591175"},{"key":"e_1_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTER.2014.6968768"},{"key":"e_1_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568234"},{"key":"e_1_2_2_61_1","unstructured":"GoAccess. 2020. A fast terminal-based log analyzer. Retrieved from https:\/\/goaccess.io. GoAccess. 2020. A fast terminal-based log analyzer. Retrieved from https:\/\/goaccess.io."},{"key":"e_1_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2017.14"},{"key":"e_1_2_2_63_1","unstructured":"GrayLog. 2020. A leading centralized log management solution. Retrieved from https:\/\/www.graylog.org. GrayLog. 2020. A leading centralized log management solution. Retrieved from https:\/\/www.graylog.org."},{"key":"e_1_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983358"},{"key":"e_1_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2006.45"},{"key":"e_1_2_2_66_1","volume-title":"Proceedings of the 7th USENIX Large Installation System Administration Conference (LISA\u201993)","volume":"93","author":"Hansen Stephen E.","unstructured":"Stephen E. Hansen and E. Todd Atkins . 1993. Automated system monitoring and notification with swatch . In Proceedings of the 7th USENIX Large Installation System Administration Conference (LISA\u201993) , Vol. 93 . 145--152. Stephen E. Hansen and E. Todd Atkins. 1993. Automated system monitoring and notification with swatch. In Proceedings of the 7th USENIX Large Installation System Administration Conference (LISA\u201993), Vol. 93. 145--152."},{"key":"e_1_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1379445"},{"key":"e_1_2_2_68_1","doi-asserted-by":"crossref","unstructured":"Mehran Hassani Weiyi Shang Emad Shihab and Nikolaos Tsantalis. 2018. Studying and detecting log-related issues. Empir. Softw. Eng. (2018) 3248--3280. Mehran Hassani Weiyi Shang Emad Shihab and Nikolaos Tsantalis. 2018. Studying and detecting log-related issues. Empir. Softw. Eng. (2018) 3248--3280.","DOI":"10.1007\/s10664-018-9603-z"},{"key":"e_1_2_2_69_1","doi-asserted-by":"crossref","unstructured":"Jameleddine Hassine Abdelwahab Hamou-Lhadj and Luay Alawneh. 2018. A framework for the recovery and visualization of system availability scenarios from execution traces. Info. Softw. Technol. (2018) 78--93. Jameleddine Hassine Abdelwahab Hamou-Lhadj and Luay Alawneh. 2018. A framework for the recovery and visualization of system availability scenarios from execution traces. Info. Softw. Technol. (2018) 78--93.","DOI":"10.1016\/j.infsof.2017.11.007"},{"key":"e_1_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45228-7_36"},{"key":"e_1_2_2_71_1","volume-title":"Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering (ASE\u201918)","author":"He Pinjia","unstructured":"Pinjia He , Zhuangbin Chen , Shilin He , and Michael R. Lyu . 2018. Characterizing the natural language descriptions in software logging statements . In Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering (ASE\u201918) . 178--189. Pinjia He, Zhuangbin Chen, Shilin He, and Michael R. Lyu. 2018. Characterizing the natural language descriptions in software logging statements. In Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering (ASE\u201918). 178--189."},{"key":"e_1_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2762673"},{"key":"e_1_2_2_73_1","volume-title":"Lyu","author":"He Pinjia","year":"2018","unstructured":"Pinjia He , Jieming Zhu , Pengcheng Xu , Zibin Zheng , and Michael R . Lyu . 2018 . A directed acyclic graph approach to online log parsing. Retrieved from https:\/\/arXiv:1806.04356. Pinjia He, Jieming Zhu, Pengcheng Xu, Zibin Zheng, and Michael R. Lyu. 2018. A directed acyclic graph approach to online log parsing. Retrieved from https:\/\/arXiv:1806.04356."},{"key":"e_1_2_2_74_1","volume-title":"Proceedings of the 24th International Conference on Web Services (ICWS\u201917)","author":"He Pinjia","unstructured":"Pinjia He , Jieming Zhu , Zibin Zheng , and Michael R. Lyu . 2017. Drain: An online log parsing approach with fixed depth tree . In Proceedings of the 24th International Conference on Web Services (ICWS\u201917) . 33--40. Pinjia He, Jieming Zhu, Zibin Zheng, and Michael R. Lyu. 2017. Drain: An online log parsing approach with fixed depth tree. In Proceedings of the 24th International Conference on Web Services (ICWS\u201917). 33--40."},{"key":"e_1_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236083"},{"key":"e_1_2_2_76_1","volume-title":"Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering (ISSRE\u201916)","author":"He Shilin","unstructured":"Shilin He , Jieming Zhu , Pinjia He , and Michael R. Lyu . 2016. Experience report: System log analysis for anomaly detection . In Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering (ISSRE\u201916) . 207--218. Shilin He, Jieming Zhu, Pinjia He, and Michael R. Lyu. 2016. Experience report: System log analysis for anomaly detection. In Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering (ISSRE\u201916). 207--218."},{"key":"e_1_2_2_77_1","volume-title":"Lyu","author":"He Shilin","year":"2020","unstructured":"Shilin He , Jieming Zhu , Pinjia He , and Michael R . Lyu . 2020 . Loghub : A Large Collection of System Log Datasets towards Automated Log Analytics. Retrieved from https:\/\/arXiv:2008.06448. Shilin He, Jieming Zhu, Pinjia He, and Michael R. Lyu. 2020. Loghub: A Large Collection of System Log Datasets towards Automated Log Analytics. Retrieved from https:\/\/arXiv:2008.06448."},{"key":"e_1_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9084-6"},{"key":"e_1_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647957"},{"key":"e_1_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.12"},{"key":"e_1_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2017.64"},{"key":"e_1_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.71"},{"key":"e_1_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.5555\/1525908.1525912"},{"key":"e_1_2_2_84_1","volume-title":"Proceedings of the 8th International Conference on Quality Software (QSIC).","author":"Jiang Zhen Ming","year":"2008","unstructured":"Zhen Ming Jiang , Ahmed E. Hassan , Parminder Flora , and Gilbert Hamann . 2008 . Abstracting execution logs to execution events for enterprise applications . In Proceedings of the 8th International Conference on Quality Software (QSIC). Zhen Ming Jiang, Ahmed E. Hassan, Parminder Flora, and Gilbert Hamann. 2008. Abstracting execution logs to execution events for enterprise applications. In Proceedings of the 8th International Conference on Quality Software (QSIC)."},{"key":"e_1_2_2_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2008.4658079"},{"key":"e_1_2_2_86_1","volume-title":"Proceedings of the 13th International Conference on Mining Software Repositories (MSR\u201916)","author":"Kabinna Suhas","unstructured":"Suhas Kabinna , Cor-Paul Bezemer , Weiyi Shang , and Ahmed E. Hassan . 2016. Logging library migrations: A case study for the apache software foundation projects . In Proceedings of the 13th International Conference on Mining Software Repositories (MSR\u201916) . 154--164. Suhas Kabinna, Cor-Paul Bezemer, Weiyi Shang, and Ahmed E. Hassan. 2016. Logging library migrations: A case study for the apache software foundation projects. In Proceedings of the 13th International Conference on Mining Software Repositories (MSR\u201916). 154--164."},{"key":"e_1_2_2_87_1","volume-title":"Hassan","author":"Kabinna Suhas","year":"2018","unstructured":"Suhas Kabinna , Cor-Paul Bezemer , Weiyi Shang , Mark D. Syer , and Ahmed E . Hassan . 2018 . Examining the stability of logging statements. Empir. Softw. Eng . (2018), 290--333. Suhas Kabinna, Cor-Paul Bezemer, Weiyi Shang, Mark D. Syer, and Ahmed E. Hassan. 2018. Examining the stability of logging statements. Empir. Softw. Eng. (2018), 290--333."},{"key":"e_1_2_2_88_1","volume-title":"Felicita Di Giandomenico, and Priya Narasimhan","author":"Kavulya Soila P.","year":"2012","unstructured":"Soila P. Kavulya , Kaustubh Joshi , Felicita Di Giandomenico, and Priya Narasimhan . 2012 . Failure diagnosis of complex systems. In Resilience Assessment and Evaluation of Computing Systems. Springer , 239--261. Soila P. Kavulya, Kaustubh Joshi, Felicita Di Giandomenico, and Priya Narasimhan. 2012. Failure diagnosis of complex systems. In Resilience Assessment and Evaluation of Computing Systems. Springer, 239--261."},{"key":"e_1_2_2_89_1","volume-title":"Mustapha Aminu Bagiwa, Muhammad Shiraz, Samee U. Khan, Rajkumar Buyya, and Albert Y. Zomaya.","author":"Khan Suleman","year":"2016","unstructured":"Suleman Khan , Abdullah Gani , Ainuddin Wahid Abdul Wahab , Mustapha Aminu Bagiwa, Muhammad Shiraz, Samee U. Khan, Rajkumar Buyya, and Albert Y. Zomaya. 2016 . Cloud log forensics: Foundations, state of the art, and future directions. ACM Comput. Surveys ( 2016), 178--184. Suleman Khan, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Mustapha Aminu Bagiwa, Muhammad Shiraz, Samee U. Khan, Rajkumar Buyya, and Albert Y. Zomaya. 2016. Cloud log forensics: Foundations, state of the art, and future directions. ACM Comput. Surveys (2016), 178--184."},{"key":"e_1_2_2_90_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053381"},{"key":"e_1_2_2_91_1","doi-asserted-by":"crossref","unstructured":"Tatsuaki Kimura Akio Watanabe Tsuyoshi Toyono and Keisuke Ishibashi. 2018. Proactive failure detection learning generation patterns of large-scale network logs. IEICE Trans. Commun. (2018). Tatsuaki Kimura Akio Watanabe Tsuyoshi Toyono and Keisuke Ishibashi. 2018. Proactive failure detection learning generation patterns of large-scale network logs. IEICE Trans. Commun. (2018).","DOI":"10.1587\/transcom.2018EBP3103"},{"key":"e_1_2_2_92_1","doi-asserted-by":"crossref","unstructured":"Jason King Jon Stallings Maria Riaz and Laurie Williams. 2017. To log or not to log: Using heuristics to identify mandatory log events--a controlled experiment. Empir. Softw. Eng. (2017) 2684--2717. Jason King Jon Stallings Maria Riaz and Laurie Williams. 2017. To log or not to log: Using heuristics to identify mandatory log events--a controlled experiment. Empir. Softw. Eng. (2017) 2684--2717.","DOI":"10.1007\/s10664-016-9449-1"},{"key":"e_1_2_2_93_1","volume-title":"Proceedings of the IEEE International Conference on Cluster Computing (CLUSTER\u201917)","author":"Klinkenberg Jannis","unstructured":"Jannis Klinkenberg , Christian Terboven , Stefan Lankes , and Matthias S. Muller . 2017. Data mining-based analysis of hpc center operations . In Proceedings of the IEEE International Conference on Cluster Computing (CLUSTER\u201917) . 766--773. Jannis Klinkenberg, Christian Terboven, Stefan Lankes, and Matthias S. Muller. 2017. Data mining-based analysis of hpc center operations. In Proceedings of the IEEE International Conference on Cluster Computing (CLUSTER\u201917). 766--773."},{"key":"e_1_2_2_94_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101739"},{"key":"e_1_2_2_95_1","volume-title":"Proceedings of the 25th International Symposium on Fault-tolerant Computing (FTCS\u201995)","author":"Laprie Jean-Claude","year":"1995","unstructured":"Jean-Claude Laprie . 1995 . Dependable computing: Concepts, limits, challenges . In Proceedings of the 25th International Symposium on Fault-tolerant Computing (FTCS\u201995) . 42--54. Jean-Claude Laprie. 1995. Dependable computing: Concepts, limits, challenges. In Proceedings of the 25th International Symposium on Fault-tolerant Computing (FTCS\u201995). 42--54."},{"key":"e_1_2_2_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.71"},{"key":"e_1_2_2_97_1","volume-title":"Hassan","author":"Li Heng","year":"2018","unstructured":"Heng Li , Tse-Hsun (Peter) Chen , Weiyi Shang , and Ahmed E . Hassan . 2018 . Studying software logging using topic models. Empir. Softw. Eng . (2018), 2655--2694. Heng Li, Tse-Hsun (Peter) Chen, Weiyi Shang, and Ahmed E. Hassan. 2018. Studying software logging using topic models. Empir. Softw. Eng. (2018), 2655--2694."},{"key":"e_1_2_2_98_1","volume-title":"Hassan","author":"Li Heng","year":"2017","unstructured":"Heng Li , Weiyi Shang , and Ahmed E . Hassan . 2017 . Which log level should developers choose for a new logging statement?Empir. Softw. Eng . (2017), 1684--1716. Heng Li, Weiyi Shang, and Ahmed E. Hassan. 2017. Which log level should developers choose for a new logging statement?Empir. Softw. Eng. (2017), 1684--1716."},{"key":"e_1_2_2_99_1","volume-title":"Hassan","author":"Li Heng","year":"2017","unstructured":"Heng Li , Weiyi Shang , Ying Zou , and Ahmed E . Hassan . 2017 . Towards just-in-time suggestions for log changes. Empir. Softw. Eng . (2017), 1831--1865. Heng Li, Weiyi Shang, Ying Zou, and Ahmed E. Hassan. 2017. Towards just-in-time suggestions for log changes. Empir. Softw. Eng. (2017), 1831--1865."},{"key":"e_1_2_2_100_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2008.4630067"},{"key":"e_1_2_2_101_1","doi-asserted-by":"crossref","unstructured":"Shanshan Li Xu Niu Zhouyang Jia Xiangke Liao Ji Wang and Tao Li. 2020. Guiding log revisions by learning from software evolution history. Empir. Softw. Eng. (2020) 2302--2340. Shanshan Li Xu Niu Zhouyang Jia Xiangke Liao Ji Wang and Tao Li. 2020. Guiding log revisions by learning from software evolution history. Empir. Softw. Eng. (2020) 2302--2340.","DOI":"10.1007\/s10664-019-09757-y"},{"key":"e_1_2_2_102_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416636"},{"key":"e_1_2_2_103_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00032"},{"key":"e_1_2_2_104_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2007.46"},{"key":"e_1_2_2_105_1","volume-title":"Proceedings of the 38th IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN\u201908)","author":"Lim Chinghway","year":"2008","unstructured":"Chinghway Lim , Navjot Singh , and Shalini Yajnik . 2008 . A log mining approach to failure analysis of enterprise telephony systems . In Proceedings of the 38th IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN\u201908) . Chinghway Lim, Navjot Singh, and Shalini Yajnik. 2008. A log mining approach to failure analysis of enterprise telephony systems. In Proceedings of the 38th IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN\u201908)."},{"key":"e_1_2_2_106_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2015.45"},{"key":"e_1_2_2_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236060"},{"key":"e_1_2_2_108_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889232"},{"key":"e_1_2_2_109_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363224"},{"key":"e_1_2_2_110_1","volume-title":"Proceedings of the 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE\u201919)","author":"Liu Jinyang","unstructured":"Jinyang Liu , Jieming Zhu , Shilin He , Pinjia He , Zibin Zheng , and Michael R. Lyu . 2019. Logzip: Extracting hidden structures via iterative clustering for log compression . In Proceedings of the 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE\u201919) . 863--873. Jinyang Liu, Jieming Zhu, Shilin He, Pinjia He, Zibin Zheng, and Michael R. Lyu. 2019. Logzip: Extracting hidden structures via iterative clustering for log compression. In Proceedings of the 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE\u201919). 863--873."},{"key":"e_1_2_2_111_1","unstructured":"Zhongxin Liu Xin Xia David Lo Zhenchang Xing Ahmed E. Hassan and Shanping Li. 2019. Which variables should I log?IEEE Trans. Softw. Eng. (2019). Zhongxin Liu Xin Xia David Lo Zhenchang Xing Ahmed E. Hassan and Shanping Li. 2019. Which variables should I log?IEEE Trans. Softw. Eng. (2019)."},{"key":"e_1_2_2_112_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.21"},{"key":"e_1_2_2_113_1","doi-asserted-by":"crossref","unstructured":"David Lo and Shahar Maoz. 2012. Scenario-based and value-based specification mining: Better together. Autom. Softw. Eng. (2012) 423--458. David Lo and Shahar Maoz. 2012. Scenario-based and value-based specification mining: Better together. Autom. Softw. Eng. (2012) 423--458.","DOI":"10.1007\/s10515-012-0103-x"},{"key":"e_1_2_2_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321710"},{"key":"e_1_2_2_115_1","volume-title":"Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201918)","author":"Lockerman Joshua","year":"2018","unstructured":"Joshua Lockerman , Jose M. Faleiro , Juno Kim , Soham Sankaran , Daniel J. Abadi , James Aspnes , Siddhartha Sen , and Mahesh Balakrishnan . 2018 . The fuzzylog: A partially ordered shared log . In Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201918) . 357--372. Joshua Lockerman, Jose M. Faleiro, Juno Kim, Soham Sankaran, Daniel J. Abadi, James Aspnes, Siddhartha Sen, and Mahesh Balakrishnan. 2018. The fuzzylog: A partially ordered shared log. In Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201918). 357--372."},{"key":"e_1_2_2_116_1","unstructured":"Log4j. 2020. Apache Log4j. Retrieved from http:\/\/logging.apache.org\/log4j\/. Log4j. 2020. Apache Log4j. Retrieved from http:\/\/logging.apache.org\/log4j\/."},{"key":"e_1_2_2_117_1","unstructured":"Logalyze. 2020. An open source log management and network monitoring software.Retrieved from http:\/\/www.logalyze.com. Logalyze. 2020. An open source log management and network monitoring software.Retrieved from http:\/\/www.logalyze.com."},{"key":"e_1_2_2_118_1","unstructured":"Loggly. 2009. Automated parsing log types. Retrieved from https:\/\/www.loggly.com\/docs\/automated-parsing. Loggly. 2009. Automated parsing log types. Retrieved from https:\/\/www.loggly.com\/docs\/automated-parsing."},{"key":"e_1_2_2_119_1","unstructured":"Loggly. 2009. Loggly\u2014Log management by loggly. Retrieved from https:\/\/www.loggly.com. Loggly. 2009. Loggly\u2014Log management by loggly. Retrieved from https:\/\/www.loggly.com."},{"key":"e_1_2_2_120_1","volume-title":"A large collection of log datasets from various systems. Retrieved","year":"2020","unstructured":"Loghub. 2020. A large collection of log datasets from various systems. Retrieved September 1, 2020 from https:\/\/github.com\/logpai\/loghub\/. Loghub. 2020. A large collection of log datasets from various systems. Retrieved September 1, 2020 from https:\/\/github.com\/logpai\/loghub\/."},{"key":"e_1_2_2_121_1","unstructured":"LogPAI. 2020. A platform for log analytics powered by AI. Retrieved from https:\/\/www.logpai.com. LogPAI. 2020. A platform for log analytics powered by AI. Retrieved from https:\/\/www.logpai.com."},{"key":"e_1_2_2_122_1","unstructured":"Logstash. 2020. A server-side processor for log data. Retrieved from https:\/\/www.elastic.co\/logstash. Logstash. 2020. A server-side processor for log data. Retrieved from https:\/\/www.elastic.co\/logstash."},{"key":"e_1_2_2_123_1","unstructured":"logz. 2014. Log parsing\u2014Automated easy to use and efficient. Retrieved from https:\/\/logz.io\/product\/log-parsing. logz. 2014. Log parsing\u2014Automated easy to use and efficient. Retrieved from https:\/\/logz.io\/product\/log-parsing."},{"key":"e_1_2_2_124_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835883"},{"key":"e_1_2_2_125_1","volume-title":"Proceedings of the USENIX Annual Technical Conference (ATC\u201910)","author":"Lou Jian-Guang","year":"2010","unstructured":"Jian-Guang Lou , Qiang Fu , Shengqi Yang , Ye Xu , and Jiang Li . 2010 . Mining invariants from console logs for system problem detection . In Proceedings of the USENIX Annual Technical Conference (ATC\u201910) . 1--14. Jian-Guang Lou, Qiang Fu, Shengqi Yang, Ye Xu, and Jiang Li. 2010. Mining invariants from console logs for system problem detection. In Proceedings of the USENIX Annual Technical Conference (ATC\u201910). 1--14."},{"key":"e_1_2_2_126_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236071"},{"key":"e_1_2_2_127_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.135"},{"key":"e_1_2_2_128_1","doi-asserted-by":"publisher","DOI":"10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.00037"},{"key":"e_1_2_2_129_1","volume-title":"Proceedings of the USENIX Annual Technical Conference (ATC\u201918)","author":"Luo Liang","year":"2018","unstructured":"Liang Luo , Suman Nath , Lenin Ravindranath Sivalingam , Madan Musuvathi , and Luis Ceze . 2018 . Troubleshooting transiently recurring errors in production systems with blame-proportional logging . In Proceedings of the USENIX Annual Technical Conference (ATC\u201918) . 321--334. Liang Luo, Suman Nath, Lenin Ravindranath Sivalingam, Madan Musuvathi, and Luis Ceze. 2018. Troubleshooting transiently recurring errors in production systems with blame-proportional logging. In Proceedings of the USENIX Annual Technical Conference (ATC\u201918). 321--334."},{"key":"e_1_2_2_130_1","unstructured":"Michael R. Lyu (ed.). 1996. Handbook of Software Reliability Engineering. IEEE Computer Society Press. Michael R. Lyu (ed.). 1996. Handbook of Software Reliability Engineering. IEEE Computer Society Press."},{"key":"e_1_2_2_131_1","volume-title":"Milios","author":"Makanju Adetokunbo","year":"2012","unstructured":"Adetokunbo Makanju , A. Nur Zincir-Heywood , and Evangelos E . Milios . 2012 . A lightweight algorithm for message type extraction in system application logs. IEEE Trans. Knowl. Data Eng . (2012). Adetokunbo Makanju, A. Nur Zincir-Heywood, and Evangelos E. Milios. 2012. A lightweight algorithm for message type extraction in system application logs. IEEE Trans. Knowl. Data Eng. (2012)."},{"key":"e_1_2_2_132_1","volume-title":"Proceedings of International Conference on Knowledge Discovery and Data Mining (KDD\u201909)","author":"Makanju Adetokunbo A. O.","unstructured":"Adetokunbo A. O. Makanju , A. Nur Zincir-Heywood , and Evangelos E. Milios . 2009. Clustering event logs using iterative partitioning . In Proceedings of International Conference on Knowledge Discovery and Data Mining (KDD\u201909) . 1255--1264. Adetokunbo A. O. Makanju, A. Nur Zincir-Heywood, and Evangelos E. Milios. 2009. Clustering event logs using iterative partitioning. In Proceedings of International Conference on Knowledge Discovery and Data Mining (KDD\u201909). 1255--1264."},{"key":"e_1_2_2_133_1","doi-asserted-by":"publisher","DOI":"10.5220\/0007735102950302"},{"key":"e_1_2_2_134_1","volume-title":"Proceedings of the IEEE Military Communications Conference (MILCOM\u201914)","author":"Mell Peter","unstructured":"Peter Mell and Richard E. Harang . 2014. Lightweight packing of log files for improved compression in mobile tactical networks . In Proceedings of the IEEE Military Communications Conference (MILCOM\u201914) . 192--197. Peter Mell and Richard E. Harang. 2014. Lightweight packing of log files for improved compression in mobile tactical networks. In Proceedings of the IEEE Military Communications Conference (MILCOM\u201914). 192--197."},{"key":"e_1_2_2_135_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN49398.2020.9209707"},{"key":"e_1_2_2_136_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/658"},{"key":"e_1_2_2_137_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196321.3196340"},{"key":"e_1_2_2_138_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.21"},{"key":"e_1_2_2_139_1","unstructured":"Microsoft. 2018. Event logging. Retrieved from https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/eventlog\/event-logging. Microsoft. 2018. Event logging. Retrieved from https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/eventlog\/event-logging."},{"key":"e_1_2_2_140_1","volume-title":"Proceedings of the 27th Conference on Neural Information Processing Systems (NIPS\u201913)","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov , Ilya Sutskever , Kai Chen , Greg S. Corrado , and Jeff Dean . 2013 . Distributed representations of words and phrases and their compositionality . In Proceedings of the 27th Conference on Neural Information Processing Systems (NIPS\u201913) . 3111--3119. Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S. Corrado, and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Proceedings of the 27th Conference on Neural Information Processing Systems (NIPS\u201913). 3111--3119."},{"key":"e_1_2_2_141_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2019.00029"},{"key":"e_1_2_2_142_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2013.73"},{"key":"e_1_2_2_143_1","volume-title":"Proceedings of the 7th IEEE Working Conference on Mining Software Repositories (MSR\u201910)","author":"Nagappan Meiyappan","unstructured":"Meiyappan Nagappan and Mladen A. Vouk . 2010. Abstracting log lines to log event types for mining software system logs . In Proceedings of the 7th IEEE Working Conference on Mining Software Repositories (MSR\u201910) . 114--117. Meiyappan Nagappan and Mladen A. Vouk. 2010. Abstracting log lines to log event types for mining software system logs. In Proceedings of the 7th IEEE Working Conference on Mining Software Repositories (MSR\u201910). 114--117."},{"key":"e_1_2_2_144_1","volume-title":"Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201912)","author":"Nagaraj Karthik","year":"2012","unstructured":"Karthik Nagaraj , Charles Killian , and Jennifer Neville . 2012 . Structured comparative analysis of systems logs to diagnose performance problems . In Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201912) . 353--366. Karthik Nagaraj, Charles Killian, and Jennifer Neville. 2012. Structured comparative analysis of systems logs to diagnose performance problems. In Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201912). 353--366."},{"key":"e_1_2_2_145_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939712"},{"key":"e_1_2_2_146_1","volume-title":"Advances and challenges in log analysis. ACM Communication","author":"Oliner Adam J.","year":"2012","unstructured":"Adam J. Oliner , Archana Ganapathi , and Wei Xu. 2012. Advances and challenges in log analysis. ACM Communication ( 2012 ), 55--61. Adam J. Oliner, Archana Ganapathi, and Wei Xu. 2012. Advances and challenges in log analysis. ACM Communication (2012), 55--61."},{"key":"e_1_2_2_148_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24065"},{"key":"e_1_2_2_149_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.145"},{"key":"e_1_2_2_150_1","first-page":"503","article-title":"Failure diagnosis for distributed systems using targeted fault injection","volume":"28","author":"Pham Cuong","year":"2016","unstructured":"Cuong Pham , Long Wang , Byung Chul Tak , Salman Baset , Chunqiang Tang , Zbigniew Kalbarczyk , and Ravishankar K. Iyer . 2016 . Failure diagnosis for distributed systems using targeted fault injection . Trans. Parallel Distrib. Syst. 28 , 2 (2016), 503 -- 516 . Cuong Pham, Long Wang, Byung Chul Tak, Salman Baset, Chunqiang Tang, Zbigniew Kalbarczyk, and Ravishankar K. Iyer. 2016. Failure diagnosis for distributed systems using targeted fault injection. Trans. Parallel Distrib. Syst. 28, 2 (2016), 503--516.","journal-title":"Trans. Parallel Distrib. Syst."},{"key":"e_1_2_2_151_1","volume-title":"Proceedings of the 4th Annual Conference on Linux Clusters. Citeseer.","author":"Prewett James E.","year":"2003","unstructured":"James E. Prewett . 2003 . Analyzing cluster log files using logsurfer . In Proceedings of the 4th Annual Conference on Linux Clusters. Citeseer. James E. Prewett. 2003. Analyzing cluster log files using logsurfer. In Proceedings of the 4th Annual Conference on Linux Clusters. Citeseer."},{"key":"e_1_2_2_152_1","unstructured":"Prometheus. 2020. A systems and service monitoring system. Retrieved from https:\/\/github.com\/prometheus. Prometheus. 2020. A systems and service monitoring system. Retrieved from https:\/\/github.com\/prometheus."},{"key":"e_1_2_2_153_1","doi-asserted-by":"publisher","DOI":"10.1109\/DCC.2004.1281533"},{"key":"e_1_2_2_154_1","unstructured":"Rapid7. 2000. New automated log parsing. Retrieved from https:\/\/blog.rapid7.com\/2016\/03\/03\/new-automated-log-parsing. Rapid7. 2000. New automated log parsing. Retrieved from https:\/\/blog.rapid7.com\/2016\/03\/03\/new-automated-log-parsing."},{"key":"e_1_2_2_155_1","volume-title":"Proceedings of the 18th USENIX Large Installation System Administration Conference (LISA\u201904)","volume":"4","author":"Rouillard John P.","year":"2004","unstructured":"John P. Rouillard . 2004 . Real-time log file analysis using the simple event correlator (sec) . In Proceedings of the 18th USENIX Large Installation System Administration Conference (LISA\u201904) , Vol. 4 . 133--150. John P. Rouillard. 2004. Real-time log file analysis using the simple event correlator (sec). In Proceedings of the 18th USENIX Large Installation System Administration Conference (LISA\u201904), Vol. 4. 133--150."},{"key":"e_1_2_2_156_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-014-9303-2"},{"key":"e_1_2_2_157_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956799"},{"key":"e_1_2_2_158_1","volume-title":"Proceedings of the International Conference on Dependable Systems and Networks (DSN\u201906)","author":"Schroeder Bianca","unstructured":"Bianca Schroeder and Garth A. Gibson . 2006. A large-scale study of failures in high-performance computing systems . In Proceedings of the International Conference on Dependable Systems and Networks (DSN\u201906) . 249--258. Bianca Schroeder and Garth A. Gibson. 2006. A large-scale study of failures in high-performance computing systems. In Proceedings of the International Conference on Dependable Systems and Networks (DSN\u201906). 249--258."},{"key":"e_1_2_2_159_1","unstructured":"SecRepo. 2020. A list of security log data. Retrieved from http:\/\/www.secrepo.com. SecRepo. 2020. A list of security log data. Retrieved from http:\/\/www.secrepo.com."},{"key":"e_1_2_2_160_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227031"},{"key":"e_1_2_2_161_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606586"},{"key":"e_1_2_2_162_1","volume-title":"Hassan","author":"Shang Weiyi","year":"2015","unstructured":"Weiyi Shang , Meiyappan Nagappan , and Ahmed E . Hassan . 2015 . Studying the relationship between logging characteristics and the code quality of platform software. Empir. Softw. Eng . (2015), 1--27. Weiyi Shang, Meiyappan Nagappan, and Ahmed E. Hassan. 2015. Studying the relationship between logging characteristics and the code quality of platform software. Empir. Softw. Eng. (2015), 1--27."},{"key":"e_1_2_2_163_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.24"},{"key":"e_1_2_2_164_1","unstructured":"Keiichi Shima. 2016. Length matters: Clustering system log messages using length of words. Retrieved from https:\/\/arXiv:1611.03213. Keiichi Shima. 2016. Length matters: Clustering system log messages using length of words. Retrieved from https:\/\/arXiv:1611.03213."},{"key":"e_1_2_2_165_1","volume-title":"Proceedings of 11th East-European Conference on Advances in Databases and Information Systems (ADBIS\u201907)","author":"Skibi\u0144ski Przemys\u0142aw","year":"2007","unstructured":"Przemys\u0142aw Skibi\u0144ski and Jakub Swacha . 2007 . Fast and efficient log file compression . In Proceedings of 11th East-European Conference on Advances in Databases and Information Systems (ADBIS\u201907) . 56--69. Przemys\u0142aw Skibi\u0144ski and Jakub Swacha. 2007. Fast and efficient log file compression. In Proceedings of 11th East-European Conference on Advances in Databases and Information Systems (ADBIS\u201907). 56--69."},{"key":"e_1_2_2_166_1","unstructured":"SLF4J. 2020. Simple Logging Facade for Java (SLF4J). Retrieved from http:\/\/www.slf4j.org\/. SLF4J. 2020. Simple Logging Facade for Java (SLF4J). Retrieved from http:\/\/www.slf4j.org\/."},{"key":"e_1_2_2_167_1","unstructured":"spdlog. 2020. Spdlog. Retrieved September 1 2020 from https:\/\/github.com\/gabime\/spdlog. spdlog. 2020. Spdlog. Retrieved September 1 2020 from https:\/\/github.com\/gabime\/spdlog."},{"key":"e_1_2_2_168_1","unstructured":"Splunk. 2005. Splunk platform. Retrieved from http:\/\/www.splunk.com. Splunk. 2005. Splunk platform. Retrieved from http:\/\/www.splunk.com."},{"key":"e_1_2_2_169_1","unstructured":"Syslog-ng. 2020. A log management solution. Retrieved from https:\/\/www.syslog-ng.com. Syslog-ng. 2020. A log management solution. Retrieved from https:\/\/www.syslog-ng.com."},{"key":"e_1_2_2_170_1","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2016.12"},{"key":"e_1_2_2_171_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063690"},{"key":"e_1_2_2_172_1","unstructured":"StatusCake Team. 2020. The Most Expensive Website Downtime Periods in History. Retrieved from https:\/\/www.statuscake.com\/the-most-expensive-website-downtime-periods-in-history\/. StatusCake Team. 2020. The Most Expensive Website Downtime Periods in History. Retrieved from https:\/\/www.statuscake.com\/the-most-expensive-website-downtime-periods-in-history\/."},{"key":"e_1_2_2_173_1","unstructured":"UpGuard. 2019. The cost of downtime at the world\u2019s biggest online retailer. Retrieved from https:\/\/www.upguard.com\/blog\/the-cost-of-downtime-at-the-worlds-biggest-online-retailer. UpGuard. 2019. The cost of downtime at the world\u2019s biggest online retailer. Retrieved from https:\/\/www.upguard.com\/blog\/the-cost-of-downtime-at-the-worlds-biggest-online-retailer."},{"key":"e_1_2_2_174_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPOM.2003.1251233"},{"key":"e_1_2_2_175_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2015.7367331"},{"key":"e_1_2_2_176_1","volume-title":"Process mining. Commun. ACM","author":"Der Aalst Wil Van","year":"2012","unstructured":"Wil Van Der Aalst . 2012. Process mining. Commun. ACM ( 2012 ), 76--83. Wil Van Der Aalst. 2012. Process mining. Commun. ACM (2012), 76--83."},{"key":"e_1_2_2_177_1","unstructured":"Bin Xia Yuxuan Bai Junjie Yin Yun Li and Jian Xu. 2020. LogGAN: A log-level generative adversarial network for anomaly detection using permutation event modeling. Info. Syst. Front. (2020) 1--14. Bin Xia Yuxuan Bai Junjie Yin Yun Li and Jian Xu. 2020. LogGAN: A log-level generative adversarial network for anomaly detection using permutation event modeling. Info. Syst. Front. (2020) 1--14."},{"key":"e_1_2_2_179_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.19"},{"key":"e_1_2_2_180_1","volume-title":"Proceedings of the 22nd ACM Symposium on Operating Systems Principles (SOSP\u201909)","author":"Xu Wei","unstructured":"Wei Xu , Ling Huang , Armando Fox , David Patterson , and Michael I. Jordan . 2009. Detecting large-scale system problems by mining console logs . In Proceedings of the 22nd ACM Symposium on Operating Systems Principles (SOSP\u201909) . Wei Xu, Ling Huang, Armando Fox, David Patterson, and Michael I. Jordan. 2009. Detecting large-scale system problems by mining console logs. In Proceedings of the 22nd ACM Symposium on Operating Systems Principles (SOSP\u201909)."},{"key":"e_1_2_2_181_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081927"},{"key":"e_1_2_2_182_1","volume-title":"Proceedings of the USENIX Annual Technical Conference (ATC). 335--350","author":"Yang Stephen","unstructured":"Stephen Yang , Seo Jin Park , and John K. Ousterhout . 2018. NanoLog: A nanosecond scale logging system . In Proceedings of the USENIX Annual Technical Conference (ATC). 335--350 . Stephen Yang, Seo Jin Park, and John K. Ousterhout. 2018. NanoLog: A nanosecond scale logging system. In Proceedings of the USENIX Annual Technical Conference (ATC). 335--350."},{"key":"e_1_2_2_183_1","volume-title":"Log4Perf: Suggesting and updating logging locations for web-based systems","author":"Yao Kundi","year":"2020","unstructured":"Kundi Yao , Guilherme B. de P\u00e1dua , Weiyi Shang , Catalin Sporea , Andrei Toma , and Sarah Sajedi . 2020. Log4Perf: Suggesting and updating logging locations for web-based systems \u2019 performance monitoring. Empir. Softw. Eng . ( 2020 ), 488--531. Kundi Yao, Guilherme B. de P\u00e1dua, Weiyi Shang, Catalin Sporea, Andrei Toma, and Sarah Sajedi. 2020. Log4Perf: Suggesting and updating logging locations for web-based systems\u2019 performance monitoring. Empir. Softw. Eng. (2020), 488--531."},{"key":"e_1_2_2_184_1","volume-title":"Hassan","author":"Yao Kundi","year":"2019","unstructured":"Kundi Yao , Heng Li , Weiyi Shang , and Ahmed E . Hassan . 2019 . A study of the performance of general compressors on log files. Empir. Softw. Eng . (2019), 3043--3085. Kundi Yao, Heng Li, Weiyi Shang, and Ahmed E. Hassan. 2019. A study of the performance of general compressors on log files. Empir. Softw. Eng. (2019), 3043--3085."},{"key":"e_1_2_2_185_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541968"},{"key":"e_1_2_2_186_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872407"},{"key":"e_1_2_2_187_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736038"},{"key":"e_1_2_2_188_1","volume-title":"Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201912)","author":"Yuan Ding","year":"2012","unstructured":"Ding Yuan , Soyeon Park , Peng Huang , Yang Liu , Michael Mihn-Jong Lee , Xiaoming Tang , Yuanyuan Zhou , and Stefan Savage . 2012 . Be conservative: Enhancing failure diagnosis with proactive logging . In Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201912) . 293--306. Ding Yuan, Soyeon Park, Peng Huang, Yang Liu, Michael Mihn-Jong Lee, Xiaoming Tang, Yuanyuan Zhou, and Stefan Savage. 2012. Be conservative: Enhancing failure diagnosis with proactive logging. In Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201912). 293--306."},{"key":"e_1_2_2_189_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337236"},{"key":"e_1_2_2_190_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950369"},{"key":"e_1_2_2_191_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2019.00031"},{"key":"e_1_2_2_192_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00055"},{"key":"e_1_2_2_193_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1677"},{"key":"e_1_2_2_194_1","doi-asserted-by":"crossref","unstructured":"Yi Zeng Jinfu Chen Weiyi Shang and Tse-Hsun (Peter) Chen. 2019. Studying the characteristics of logging practices in mobile apps: A case study on F-Droid. Empir. Softw. Eng. (2019) 3394--3434. Yi Zeng Jinfu Chen Weiyi Shang and Tse-Hsun (Peter) Chen. 2019. Studying the characteristics of logging practices in mobile apps: A case study on F-Droid. Empir. Softw. Eng. (2019) 3394--3434.","DOI":"10.1007\/s10664-019-09687-9"},{"key":"e_1_2_2_195_1","doi-asserted-by":"publisher","DOI":"10.1145\/3179405"},{"key":"e_1_2_2_196_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338931"},{"key":"e_1_2_2_197_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359650"},{"key":"e_1_2_2_198_1","doi-asserted-by":"publisher","DOI":"10.1145\/3102980.3103001"},{"key":"e_1_2_2_199_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132778"},{"key":"e_1_2_2_200_1","volume-title":"Proceedings of the 12th Symposium on Operating Systems Design and Implementation (OSDI\u201916)","author":"Zhao Xu","year":"2016","unstructured":"Xu Zhao , Kirk Rodrigues , Yu Luo , Ding Yuan , and Michael Stumm . 2016 . Non-intrusive performance profiling for entire software stacks based on the flow reconstruction principle . In Proceedings of the 12th Symposium on Operating Systems Design and Implementation (OSDI\u201916) . 603--618. Xu Zhao, Kirk Rodrigues, Yu Luo, Ding Yuan, and Michael Stumm. 2016. Non-intrusive performance profiling for entire software stacks based on the flow reconstruction principle. In Proceedings of the 12th Symposium on Operating Systems Design and Implementation (OSDI\u201916). 603--618."},{"key":"e_1_2_2_201_1","volume-title":"Fault analysis and debugging of microservice systems: Industrial survey, benchmark system, and empirical study","author":"Zhou Xiang","year":"2018","unstructured":"Xiang Zhou , Xin Peng , Tao Xie , Jun Sun , Chao Ji , Wenhai Li , and Dan Ding . 2018. Fault analysis and debugging of microservice systems: Industrial survey, benchmark system, and empirical study . IEEE Trans. Softw. Eng . ( 2018 ). Xiang Zhou, Xin Peng, Tao Xie, Jun Sun, Chao Ji, Wenhai Li, and Dan Ding. 2018. Fault analysis and debugging of microservice systems: Industrial survey, benchmark system, and empirical study. IEEE Trans. Softw. Eng. (2018)."},{"key":"e_1_2_2_202_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338961"},{"key":"e_1_2_2_203_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.60"},{"key":"e_1_2_2_204_1","volume-title":"Proceedings of the 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP\u201919)","author":"Zhu Jieming","unstructured":"Jieming Zhu , Shilin He , Jinyang Liu , Pinjia He , Qi Xie , Zibin Zheng , and Michael R. Lyu . 2019. Tools and benchmarks for automated log parsing . In Proceedings of the 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP\u201919) . 121--130. Jieming Zhu, Shilin He, Jinyang Liu, Pinjia He, Qi Xie, Zibin Zheng, and Michael R. Lyu. 2019. Tools and benchmarks for automated log parsing. In Proceedings of the 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP\u201919). 121--130."},{"key":"e_1_2_2_205_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2020.2966615"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460345","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T20:43:48Z","timestamp":1672605828000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460345"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,13]]},"references-count":203,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,7,31]]}},"alternative-id":["10.1145\/3460345"],"URL":"http:\/\/dx.doi.org\/10.1145\/3460345","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,13]]},"assertion":[{"value":"2020-10-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-04-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-07-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}