Mining Configuration Items From System Logs through Distant Supervision

被引:0
作者
Zhang, Qixun [1 ]
Jia, Tong [1 ]
Xia, Wensheng [1 ]
Li, Ying [1 ]
Wu, Zhonghai [1 ]
Han, Jing [2 ]
机构
[1] Peking Univ, Beijing, Peoples R China
[2] ZTE Corp, Shanghai, Peoples R China
来源
19TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2021) | 2021年
关键词
configuration item; system logs; CMDB; CI mining; SUPPORT; FILES;
D O I
10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00156
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
IT operators face the big challenge of collecting and recording tens of thousands of configuration items (CIs) from large-scale IT infrastructure and managing their changes in the Configuration Management Database (CMDB). Existing automatic CI discovery tools such as IBM Tivoli rely on intrusive monitoring agents in each server, thus their setup and maintenance costs are significant. To solve these problems, we propose a non-intrusive CI mining approach through distant supervision, which can automatically discover CIs from system logs for managing configuration changes efficiently. It first labels CIs in logs through distant supervision of CMDB. Then, it discovers more CIs based on log clustering and alignment algorithms. The approach has been implemented with a distributed configuration management assistant tool named FineCI. Experiments on real-world system logs from a large bank show that our approach performs about 70% precision and 75% recall. Besides, through distributed implementation, the efficiency of our approach can be greatly improved.
引用
收藏
页码:1135 / 1142
页数:8
相关论文
共 25 条
  • [1] Experience Report: Log Mining using Natural Language Processing and Application to Anomaly Detection
    Bertero, Christophe
    Roy, Matthieu
    Sauvanaud, Carla
    Tredan, Gilles
    [J]. 2017 IEEE 28TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2017, : 351 - 360
  • [2] Cormen T. H., 2009, INTRO ALGORITHMS
  • [3] Desh: Deep Learning for System Health Prediction of Lead Times to Failure in HPC
    Das, Anwesha
    Mueller, Frank
    Siegel, Charles
    Vishnu, Abhinav
    [J]. HPDC '18: PROCEEDINGS OF THE 27TH INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE PARALLEL AND DISTRIBUTED COMPUTING, 2018, : 40 - 51
  • [4] DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning
    Du, Min
    Li, Feifei
    Zheng, Guineng
    Srikumar, Vivek
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1285 - 1298
  • [5] Du M, 2016, IEEE DATA MINING, P859, DOI [10.1109/ICDM.2016.0103, 10.1109/ICDM.2016.160]
  • [6] Failure prediction based on log files using Random Indexing and Support Vector Machines
    Fronza, Ilenia
    Sillitti, Alberto
    Succi, Giancarlo
    Terho, Mikko
    Vlasenko, Jelena
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (01) : 2 - 11
  • [7] Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
    Fu, Qiang
    Lou, Jian-Guang
    Wang, Yi
    Li, Jiang
    [J]. 2009 9TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, 2009, : 149 - +
  • [8] Krishnan G, 2017, 2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE IN DATA SCIENCE (ICCIDS)
  • [9] Li Yu, 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), P259, DOI 10.1109/DSNW.2011.5958823
  • [10] A normalized Levenshtein distance metric
    Li Yujian
    Liu Bo
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2007, 29 (06) : 1091 - 1095