Abstract
During system exploitation and maintenance an important issue is to evaluate its operational profile and detect occurring anomalies or situations which may lead to such anomalies (anomaly prediction issue). To resolve these problems we have studied the capabilities of standard event and performance logs which are available in computer systems. In particular we have concentrated on checking the morphology and information contents of various event logs (system, application levels) as well as the correlation of performance logs with operational profiles. This analysis has been supported with some tools and special scripts.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Agrawal, R., Srikant, R.: Fast algorithm for mining association rules. In: Bocca, J.B., Jarke, M., Zaniolo, C. (eds.) Proceedings 20th International Conference on Very Large Databases, pp. 487–499. Morgan Kaufmann Publishers Inc., San Francisco (1994)
Brandt, J., et al.: Using probabilistic characterization to reduce runtime faults in HPC systems. In: 8th IEEE Int. Symp. on Cluster Computing and the Grid, pp. 759–764 (2008)
Case, J., Fedor, M., Schoffstall, M., Davin, J.: A Simple Network Management Protocol, SNMP (1990)
Chandola, V., Baerjee, A., Kumar, V.: Anomaly detection, a survey. ACM Computing Surveys 41(3) (2009)
Chen, C., Singh, N., Yajnik, M.: Log analytics for dependable enterprise telephony. In: Proc. of 9th European Dependable Computing Conference, pp. 94–101. IEEE Comp. Soc. (2012)
Cinque, M., et al.: A logging approach for effective dependability evaluation of computer systems. In: Proc. of 2nd IEEE Int. Conf. on Dependability, pp. 105–110 (2009)
Dong, G., Li, J.: Efficient mining of Emerging Patterns: Discovering Trends and Differences. In: Proceedings of the 5th International Conference on Knowledge Discovery and Data Mining (SIGKDD 1999), San Diego, USA, pp. 43–52 (1999)
Gmach, D., et al.: Workload analysis and demand prediction of enterprise data canter applications. In: 10th IEEE Int. Symposium on ISSWC, pp. 171–180 (2007)
John, L.K., Eeckhout, L.: Performance evaluation and benchmarking. CRC Press (2006)
Król, M., Sosnowski, J.: Multidimensional monitoring of computer systems. In: Proc. of IEEE Symp. and Workshops on Ubiquitous, Autonomic and Trusted Computing, pp. 68–74 (2009)
Kubacki, M., Sosnowski, J.: Analysing Linux log profiles in Linux systems. In: Borzemski, L., et al. (eds.) Information Systems Engineering, pp. 135–143 (2011) ISBN 978-83-7493-630-9
Magalhaes, J.P., Silva, L.M.: Adaptive profiling for root-cause analysis of performance anomalies in Web based applications. In: Proc. of IEEE Int. Symp. on Network Computing and Applications, pp. 171–178 (2011)
Naggapan, M., Vouk, M.A.: Abstracting Log Lines to Log Event Types for Mining Software System Logs. In: Proceedings of Mining Software Repositories (Co-Located with ICSE 2010), pp. 114–117 (2010)
Oliner, A., Stearley, J.: What Supercomputers Say: A Study of Five System Logs. In: Proc. of the IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 575–584 (2007)
Salfiner, F., Lenk, M., Malek, M.: A survey of failure prediction methods. ACM Computing Surveys 42(3), 10.1–10.42 (2010)
Simache, C., Kaaniche, M.: Availability assessment of SunOS/Solaris Unix systems based on syslog and wtmpx log files; a case study. In: Proc. of the 11th Pacific Rim International Symposium on Dependable Computing (2005)
Sosnowski, J., Poleszak, M.: On-line monitoring of computer systems. In: Proc. of IEEE DELTA Workshop, pp. 327–331 (2006)
Sosnowski, J., Gawkowski, P., Cabaj, K.: Event and performance logs in system management and evaluation. In: Information Systems in Management XIV, Security and Effectiveness of ICT Systems, pp. 83–93. WULS Press, Warsaw (2011)
Ye, N.: Secure Computer and Network Systems. John Wiley& Sons, Ltd., Chichester (2008) ISBN 978-0-470-02324-2
Li, Y., Zheng, Z., Lan, Z.: Practical Online Failure Prediction for Blue Gene/P: Period-based vs. Event-driven. In: Proc. of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, pp. 259–264 (2011)
Information technology - AT Attachment 8 - ATA/ATAPI Command Set (ATA8-ACS), T13/1699-D (2006)
CrystalDiskInfo homepage, http://crystalmark.info/
Pinheiro, E., Weber, W.D., Barroso, L.A.: Failure Trends in a Large Disk Drive Population. In: Proc. of the 5th USENIX Conference on File and Storage Technologies (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Sosnowski, J., Gawkowski, P., Cabaj, K. (2013). Exploring the Space of System Monitoring. In: Bembenik, R., Skonieczny, L., Rybinski, H., Kryszkiewicz, M., Niezgodka, M. (eds) Intelligent Tools for Building a Scientific Information Platform. Studies in Computational Intelligence, vol 467. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35647-6_30
Download citation
DOI: https://doi.org/10.1007/978-3-642-35647-6_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35646-9
Online ISBN: 978-3-642-35647-6
eBook Packages: EngineeringEngineering (R0)