Path-based faliure and evolution management

作者: Eric Brewer , Emre Kiciman , Mike Y. Chen , Armando Fox , Anthony Accardi

DOI:

关键词:

摘要: We present a new approach to managing failures and evolution in large, complex distributed systems using runtime paths. use the paths that requests follow as they move through system our core abstraction, "macro" focuses on component interactions rather than details of components themselves. Paths record performance interactions, are user- request-centric, occur sufficient volume enable statistical analysis, all way is easily reusable across applications. Automated analysis multiple allows for detection diagnosis assessment issues. In particular, enables significantly stronger capabilities failure detection, diagnosis, impact understanding evolution. explore these with three real implementations, two which service millions per day. Our contributions include approach; maintainable, extensible, architecture; various engines; discussion experience high-volume production over several years.

参考文章(46)
Richard Mortier, Rebecca Isaacs, Dushyanth Narayanan, Paul Barham, Magpie: online modelling and performance-aware systems hot topics in operating systems. pp. 15- 15 ,(2003)
P. Tamayo, C. Berger, M. Campos, J. Yarmus, B. Milenova, A. Mozes, M. Taft, M. Hornick, R. Krishnan, S. Thomas, M. Kelly, D. Mukhin, B. Haberstroh, S. Stephens, J. Myczkowski, Oracle Data Mining Springer, Boston, MA. pp. 1315- 1329 ,(2005) , 10.1007/0-387-25465-X_63
Vern Paxson, Bro: a system for detecting network intruders in real-time Computer Networks. ,vol. 31, pp. 2435- 2463 ,(1999) , 10.1016/S1389-1286(99)00112-7
John Reumann, Kang G. Shin, Dilip Kandlur, Ashish Mehra, Virtual services: a new abstraction for server consolidation usenix annual technical conference. pp. 10- 10 ,(2000)
John L. Hennessy, David A. Patterson, Computer Architecture: A Quantitative Approach ,(1989)
Christopher D. Manning, Hinrich Schütze, Foundations of Statistical Natural Language Processing ,(1999)
Mike Chen, Emre Kiciman, None, Using runtime paths for macroanalysis hot topics in operating systems. pp. 14- 14 ,(2003)
Wenke Lee, Salvatore J. Stolfo, Data mining approaches for intrusion detection usenix security symposium. pp. 6- 6 ,(1998) , 10.21236/ADA401496
Richard A Olshen, Charles J Stone, Leo Breiman, Jerome H Friedman, Classification and regression trees ,(1983)