2020
DOI: 10.1109/access.2020.2972691
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and Robust Syslog Parsing for Network Devices in Datacenter Networks

Abstract: Syslog parsing is of vital importance for the detection, diagnosis and prediction of network device failures in a datacenter. A common approach to syslog parsing is to extract templates from historical syslogs, after which syslogs are matched to these templates. To address the problems in the existing syslog parsing techniques, we propose a novel framework, Craftsman, which identifies frequent combinations of (syslog) words and then applies them as templates. Craftsman empirically extracts templates accurately… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(4 citation statements)
references
References 44 publications
0
4
0
Order By: Relevance
“…Heuristic techniques are frequently coupled with fixed-depth parsing trees, as seen with Drain, FT-tree, Hue, OLMPT, and TCN-Log2Vec [14] [29] [199] [40] [125]. Many modern parsers (such as Craftsman) use parsing trees with variable depth [33].…”
Section: ) Parsingmentioning
confidence: 99%
“…Heuristic techniques are frequently coupled with fixed-depth parsing trees, as seen with Drain, FT-tree, Hue, OLMPT, and TCN-Log2Vec [14] [29] [199] [40] [125]. Many modern parsers (such as Craftsman) use parsing trees with variable depth [33].…”
Section: ) Parsingmentioning
confidence: 99%
“…Therefore, R must be reviewed after its initial acquisition to eliminate redundancy. The situation may be complicated, such as assuming R [3] contains s u s v s w and R [4] contains s u s v s w s x and s u s v s w s y . The correct result has two possible orientations: 1) eliminating s u s v s w in R [3] and keeping only the two templates in R [4]; 2) s u s v s w in R [3] has the reasons to be kept independently, so it is necessary to keep all three templates.…”
Section: Algorithmmentioning
confidence: 99%
“…Thus, log analysis techniques have attracted considerable attention from researchers in the past decade. Many distinguished works have emerged, including detecting program running exceptions [1,2], monitoring network failures and traffic [3,4], diagnosing performance bottlenecks [5], and analyzing business [6] and user behavior [7].…”
Section: Introductionmentioning
confidence: 99%
“…For instance, [82] developed a log parser based on BERT, [59] built NuLog self-supervised parser based on a transformerdecoder, and [69] built a GPT-2 based parser to preprocess Cowrie Secure Shell (SSH) honeypot logs. Several other log parsers are developed with different methods but none of them are transformer based, such as LogAider [22] deployed for IBM BlueGene HPC series [21], Craftsman [80], etc.…”
Section: Related Workmentioning
confidence: 99%