In this paper we present an unsupervised learning approach to detect meaningful job traffic patterns in Grid log data. Manual anomaly detection on modern Grid environments is troublesome given their increasing complexity, the distributed, dynamic topology of the network and heterogeneity of the jobs being executed. The ability to automatically detect meaningful events with little or no human intervention is therefore desirable. We evaluate our method on a set of log data collected on the Grid. Since we lack a priori knowledge of patterns that can be detected and no labelled data is available, an unsupervised learning method is followed. We cluster jobs executed on the Grid using Affinity Propagation. We try to explain discovered clusters us...
Many applications within the Flexyz network generate a lot of log data. This data used to be difficu...
Modern enterprise IT systems generate large amounts of log data to record system state, potential er...
Context: Log files are produced in most larger computer systems today which contain highly valuable ...
A Grid computing site consists of various services including Grid middlewares, such as Computing Ele...
International audienceThe Affinity Propagation (AP) clustering algorithm proposed by Frey and Dueck ...
International audienceGrid systems are complex heterogeneous systems, and their modeling constitutes...
Grid monitoring requires analysis of large amounts of log files across multiple domains. An approach...
With the increase of network virtualization and the disparity of vendors, the continuous monitoring ...
Error handling is a crucial task in an infrastructure as complex as a grid. There are several monito...
The ever increasing scale and complexity of large computational systems ask for sophisticated manage...
Recent experience in deploying Grid middleware demonstrated the challenges one faces in delivering r...
Log data, produced from every computer system and program, are widely used as source of valuable inf...
While the network anomaly detection is essential in network operations and management, it becomes fu...
The Job Execution Monitor (JEM) is a job-centric grid job monitoring software developed at the Unive...
Due to the complexity of the network structure, log analysis is usually necessary for the maintenanc...
Many applications within the Flexyz network generate a lot of log data. This data used to be difficu...
Modern enterprise IT systems generate large amounts of log data to record system state, potential er...
Context: Log files are produced in most larger computer systems today which contain highly valuable ...
A Grid computing site consists of various services including Grid middlewares, such as Computing Ele...
International audienceThe Affinity Propagation (AP) clustering algorithm proposed by Frey and Dueck ...
International audienceGrid systems are complex heterogeneous systems, and their modeling constitutes...
Grid monitoring requires analysis of large amounts of log files across multiple domains. An approach...
With the increase of network virtualization and the disparity of vendors, the continuous monitoring ...
Error handling is a crucial task in an infrastructure as complex as a grid. There are several monito...
The ever increasing scale and complexity of large computational systems ask for sophisticated manage...
Recent experience in deploying Grid middleware demonstrated the challenges one faces in delivering r...
Log data, produced from every computer system and program, are widely used as source of valuable inf...
While the network anomaly detection is essential in network operations and management, it becomes fu...
The Job Execution Monitor (JEM) is a job-centric grid job monitoring software developed at the Unive...
Due to the complexity of the network structure, log analysis is usually necessary for the maintenanc...
Many applications within the Flexyz network generate a lot of log data. This data used to be difficu...
Modern enterprise IT systems generate large amounts of log data to record system state, potential er...
Context: Log files are produced in most larger computer systems today which contain highly valuable ...