A Language for Describing Disruptive Application Event Patterns Based on Combined Log Sequence and Concurrency

Authors

  • Denzel D. Gabriel School of Information Technology, Mapúa University ,Makati 333 Sen. Gil Puyat Ave., Makati City 1200, Philippines.
  • Ralph Laurence M. Matienzo School of Information Technology, Mapúa University ,Makati 333 Sen. Gil Puyat Ave., Makati City 1200, Philippines.
  • Aresh T. Saharkhiz School of Information Technology, Mapúa University ,Makati 333 Sen. Gil Puyat Ave., Makati City 1200, Philippines.
  • Zaliman Sauli School of Microelectronic Engineering, Universiti Malaysia Perlis, Pauh Putra Campus, 02600 Arau, Perlis, Malaysia.

Keywords:

Application Logs, Language, Log Monitoring, Mathematical Induction, Pattern Recognition, Programming Language,

Abstract

Disruptive events are usually preceded by some signs or states that can usually detect by a running application and recorded in the application log; these signs are typically recorded as warning level log entry. Warning logs do not by themselves lead to disruptive incidents, but it is indicative of something that can go wrong. Combined with the other log entries it can be conclusive of an impending incident or disruptions. This study determines the language that will best describe these scenarios together with their resolution accurately; The language can be understood by humans and interpreted by a computer program can raise the alarm and sent notifications; allow either manual or automated resolution to be applied. The goal is to pre-empt the actual occurrence of a costly incident and the speedy application of corrective measures. Results showed that the language is able to successfully describe all the possible log scenarios of interest occurring in sequence, parallel or combined.

Downloads

Published

2018-05-29

How to Cite

Gabriel, D. D., Matienzo, R. L. M., Saharkhiz, A. T., & Sauli, Z. (2018). A Language for Describing Disruptive Application Event Patterns Based on Combined Log Sequence and Concurrency. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 10(1-13), 25–29. Retrieved from https://jtec.utem.edu.my/jtec/article/view/4117

Most read articles by the same author(s)

1 2 > >>