skip to main content
10.1145/3377813.3381371acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

Automatic abnormal log detection by analyzing log history for providing debugging insight

Published:18 September 2020Publication History

ABSTRACT

As the size of software becomes larger and more complex, finding the cause of defects becomes increasingly difficult. Moreover, it is hard to reproduce defects when many components such as processes in platform environment or devices in IoT environment are involved. In this case, analyzing logs are the only way to get debugging insights, but manual log analysis is highly labor intensive work. In this paper, we propose a new log analysis system called historian which runs based on history of test logs. Our system first computes importance and noise scores of each log line by using statistical text mining techniques, and then highlights abnormal log lines based on computed scores for providing debugging insights. We applied historian to Tizen Native API test logs, and our system highlighted only about 4% log lines in average. We also provided highlighted failed logs to Tizen developers and the developers said that failure related log lines were highlighted well. These experimental results show that our system effectively highlights abnormal log lines and provides debugging insights to developers.

References

  1. 2019. Elastic Search. https://www.elastic.co.Google ScholarGoogle Scholar
  2. 2019. Splunk. https://www.splunk.com.Google ScholarGoogle Scholar
  3. 2019. Sumo-Logic. https://www.sumologic.com.Google ScholarGoogle Scholar
  4. 2019. Tizen. https://www.tizen.org/.Google ScholarGoogle Scholar
  5. 2019. Tizen Compliance Tests. https://source.tizen.org/compliance/compliance-tests.Google ScholarGoogle Scholar
  6. Anunay Amar and Peter C. Rigby. 2019. Mining Historical Test Logs to Predict Bugs and Localize Faults in the Test Logs. In Proceedings of the 41st International Conference on Software Engineering (Montreal, Quebec, Canada) (ICSE '19). IEEE Press, Piscataway, NJ, USA, 140--151. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. H. Andrews and Yingjun Zhang. 2003. General test result checking with log file analysis. IEEE Transactions on Software Engineering 29, 7 (July 2003), 634--648. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Howard Barringer, Alex Groce, Klaus Havelund, and Margaret Smith. 2010. Formal Analysis of Log Files. Journal of Aerospace Computing, Information, and Communication 7, 11 (2010), 365--390. arXiv:https://doi.org/10.2514/1.49356 Google ScholarGoogle ScholarCross RefCross Ref
  9. Diego Castro and Marcelo Schots. 2018. Analysis of Test Log Information Through Interactive Visualizations. In Proceedings of the 26th Conference on Program Comprehension (Gothenburg, Sweden) (ICPC '18). ACM, New York, NY, USA, 156--166. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Chinghway Lim, N. Singh, and S. Yajnik. 2008. A log mining approach to failure analysis of enterprise telephony systems. In 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN). 398--403. Google ScholarGoogle ScholarCross RefCross Ref
  11. Song Fu and Cheng-Zhong Xu. 2007. Quantifying Temporal and Spatial Correlation of Failure Events for Proactive Management. In Proceedings of the 26th IEEE International Symposium on Reliable Distributed Systems (SRDS '07). IEEE Computer Society, Washington, DC, USA, 175--184. http://dl.acm.org/citation.cfm?id=1308172.1308233Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. A. Groce, K. Havelund, and M. Smith. 2010. From scripts to specifications: the evolution of a flight software testing effort. In 2010 ACM/IEEE 32nd International Conference on Software Engineering, Vol. 2. 129--138. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Hossein Hamooni, Biplob Debnath, Jianwu Xu, Hui Zhang, Guofei Jiang, and Abdullah Mueen. 2016. LogMine: Fast Pattern Recognition for Log Analytics. In Proceedings of the 25th ACM International on Conference on Information and Knowledge Management (CIKM '16). ACM, New York, NY, USA, 1573--1582. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Stefan Heule, Marc Nunkesser, and Alexander Hall. 2013. HyperLogLog in Practice: Algorithmic Engineering of a State of the Art Cardinality Estimation Algorithm. In Proceedings of the 16th International Conference on Extending Database Technology (Genoa, Italy) (EDBT '13). ACM, New York, NY, USA, 683--692. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. D. M. Himmelblau. 1968. Process analysis by statistical methods. John Wiley & Sons, New York, NY, USA. 71--72 pages. Google ScholarGoogle ScholarCross RefCross Ref
  16. He Jiang, Xiaochen Li, Zijiang Yang, and Jifeng Xuan. 2017. What Causes My Test Alarm?: Automatic Cause Analysis for Test Alarms in System and Integration Testing. In Proceedings of the 39th International Conference on Software Engineering (ICSE '17). IEEE Press, Piscataway, NJ, USA, 712--723. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Jure Leskovec, Anand Rajaraman, and Jeffrey David Ullman. 2014. Mining of Massive Datasets (2nd ed.). Cambridge University Press, New York, NY, USA.Google ScholarGoogle Scholar
  18. Joseph Berkson M.D. 1944. Application of the Logistic Function to Bio-Assay. J. Amer. Statist. Assoc. 39, 227 (1944), 357--365. arXiv:https://doi.org/10.1080/01621459.1944.10500699 Google ScholarGoogle ScholarCross RefCross Ref
  19. G. Ramachandran and J. Ranganathan. 1953. J. Madras Univ. Sect. (1953), 76.Google ScholarGoogle Scholar
  20. John P. Rouillard. 2004. Refereed Papers: Real-time Log File Analysis Using the Simple Event Correlator (SEC). In Proceedings of the 18th USENIX Conference on System Administration (Atlanta, GA) (LISA '04). USENIX Association, Berkeley, CA, USA, 133--150. http://dl.acm.org/citation.cfm?id=1052676.1052694Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Felix Salfner and Steffen Tschirpke. 2008. Error Log Processing for Accurate Failure Prediction. In Proceedings of the First USENIX Conference on Analysis of System Logs (WASL '08). USENIX Association, Berkeley, CA, USA, 4--4. http://dl.acm.org/citation.cfm?id=1855886.1855890Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. D. Tu, R. Chen, Z. Du, and Y. Liu. 2009. A Method of Log File Analysis for Test Oracle. In 2009 International Conference on Scalable Computing and Communications; Eighth International Conference on Embedded Computing. 351--354. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Z. Zheng, Z. Lan, B. H. Park, and A. Geist. 2009. System log pre-processing to improve failure prediction. In 2009 IEEE/IFIP International Conference on Dependable Systems Networks. 572--577.Google ScholarGoogle Scholar

Index Terms

  1. Automatic abnormal log detection by analyzing log history for providing debugging insight

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        ICSE-SEIP '20: Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering: Software Engineering in Practice
        June 2020
        258 pages
        ISBN:9781450371230
        DOI:10.1145/3377813

        Copyright © 2020 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 18 September 2020

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Upcoming Conference

        ICSE 2025

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader