An Empirical Study On Leveraging Logs For Debugging Production Failures

被引:17
作者
Chen, An Ran [1 ]
机构
[1] Concordia Univ, Dept Comp Sci & Software Engn, Montreal, PQ, Canada
来源
2019 IEEE/ACM 41ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: COMPANION PROCEEDINGS (ICSE-COMPANION 2019) | 2019年
关键词
D O I
10.1109/ICSE-Companion.2019.00055
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In modern software development, maintenance is one of the most expensive processes. When end-users encounter software defects, they report the bug to developers by specifying the expected behavior and error messages (e.g., log message). Then, they wait for a bug fix from the developers. However, on the developers' side, it can be very challenging and expensive to debug the problem. To fix the bugs, developers often have to play the role of detectives: seeking clues in the user-reported logs files or stack trace in a snapshot of specific system execution. This debugging process may take several hours or even days. In this paper, we first look at the usefulness of the user-reported logs. Then, we propose an automated approach to assist the debugging process by reconstructing the execution path. Through the analysis, our investigation shows that 31% of the time, developer further requests logs from the reporter. Moreover, our preliminary results show that the reconducted path illustrates the user's execution. We believe that our approach proposes a novel solution in debugging production failures.
引用
收藏
页码:126 / 128
页数:3
相关论文
共 10 条
[1]  
Apache Software Foundation, 2018, AP JIRA ISS TRACK
[2]   Characterizing logging practices in Java']Java-based open source software projects - a replication study in Apache Software Foundation [J].
Chen, Boyuan ;
Jiang, Zhen Ming .
EMPIRICAL SOFTWARE ENGINEERING, 2017, 22 (01) :330-374
[3]   A survey on the use of topic models when mining software repositories [J].
Chen, Tse-Hsun ;
Thomas, Stephen W. ;
Hassan, Ahmed E. .
EMPIRICAL SOFTWARE ENGINEERING, 2016, 21 (05) :1843-1919
[4]  
Chen Tse-Hsun, ICSE SEIP 17, P243
[5]   DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning [J].
Du, Min ;
Li, Feifei ;
Zheng, Guineng ;
Srikumar, Vivek .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1285-1298
[6]  
Mills Chris, ICSE 18 P 40 INT C S, P248
[7]   Effect size, confidence interval and statistical significance: a practical guide for biologists [J].
Nakagawa, Shinichi ;
Cuthill, Innes C. .
BIOLOGICAL REVIEWS, 2007, 82 (04) :591-605
[8]  
Saha RK, 2013, IEEE INT CONF AUTOM, P345, DOI 10.1109/ASE.2013.6693093
[9]  
Saha Ripon K., ICCIT 18 INT C COMP
[10]  
Yuan Ding, OSDI 14 P 11 USENIX, P249