Anomaly detection in microservice environments using distributed tracing data analysis and NLP

被引:6
作者
Kohyarnejadfard, Iman [1 ]
Aloise, Daniel [1 ]
Azhari, Seyed Vahid [1 ,2 ]
Dagenais, Michel R. [1 ]
机构
[1] Polytech Montreal, Dept Comp & Software Engn, Montreal, PQ, Canada
[2] Ciena Inc, Ottawa, ON, Canada
来源
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS | 2022年 / 11卷 / 01期
基金
加拿大自然科学与工程研究理事会;
关键词
Performance monitoring; Anomaly detection; Tracing; Microservices; Machine learning; NLP; LSTM;
D O I
10.1186/s13677-022-00296-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years DevOps and agile approaches like microservice architectures and Continuous Integration have become extremely popular given the increasing need for flexible and scalable solutions. However, several factors such as their distribution in the network, the use of different technologies, their short life, etc. make microservices prone to the occurrence of anomalous system behaviours. In addition, due to the high degree of complexity of small services, it is difficult to adequately monitor the security and behavior of microservice environments. In this work, we propose an NLP (natural language processing) based approach to detect performance anomalies in spans during a given trace, besides locating release-over-release regressions. Notably, the whole system needs no prior knowledge, which facilitates the collection of training data. Our proposed approach benefits from distributed tracing data to collect sequences of events that happened during spans. Extensive experiments on real datasets demonstrate that the proposed method achieved an F_score of 0.9759. The results also reveal that in addition to the ability to detect anomalies and release-over-release regressions, our proposed approach speeds up root cause analysis by means of implemented visualization tools in Trace Compass.
引用
收藏
页数:16
相关论文
共 37 条
[1]   An SVM-based framework for detecting DoS attacks in virtualized clouds under changing environment [J].
Abusitta, Adel ;
Bellaiche, Martine ;
Dagenais, Michel .
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2018, 7
[2]   Survey on Anomaly Detection using Data Mining Techniques [J].
Agrawal, Shikha ;
Agrawal, Jitendra .
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015, 2015, 60 :708-713
[3]   Performance Evaluation of Microservices Architectures using Containers [J].
Amaral, Marcelo ;
Polo, Jorda ;
Carrera, David ;
Mohomed, Iqbal ;
Unuvar, Merve ;
Steinder, Malgorzata .
2015 IEEE 14TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2015, :27-34
[4]  
[Anonymous], JAEGEROPEN SOURC END
[5]  
archive.eclipse, TRACECOMPASS EASE SC
[6]  
Desnoyers M., 2006, OLS OTT LIN S CIT, V2006, P209
[7]   DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning [J].
Du, Min ;
Li, Feifei ;
Zheng, Guineng ;
Srikumar, Vivek .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1285-1298
[8]   Fay: Extensible Distributed Tracing from Kernels to Clusters [J].
Erlingsson, Ulfar ;
Peinado, Marcus ;
Peter, Simon ;
Budiu, Mihai ;
Mainar-Ruiz, Gloria .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2012, 30 (04)
[9]   On Improving Deep Learning Trace Analysis with System Call Arguments [J].
Fournier, Quentin ;
Aloise, Daniel ;
Azhari, Seyed Vahid ;
Tetreault, Francois .
2021 IEEE/ACM 18TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2021), 2021, :120-130
[10]   Service Dependency Graph Analysis in Microservice Architecture [J].
Gaidels, Edgars ;
Kirikova, Marite .
PERSPECTIVES IN BUSINESS INFORMATICS RESEARCH, BIR 2020, 2020, 398 :128-139