bad transactions but was never executed in the good
transactions.
8 CONCLUSIONS
The method we have developed can be used for Cloud
PaaS debugging and performance analysis, fault anal-
ysis and root cause analysis. It can be used online
in streaming mode and is efficient in both memory
and speed. It is possible to adjust the method to re-
duce False Positives by requiring that an insight be
restricted to an attribute:value pair appearing in the
“bad” transactions and not appearing in the “good”
transactions. This is very desirable in practical appli-
cations where customers lose trust in alerting systems
due to many False Positives.
Perceptor can find Insights of various types in-
cluding structural attributes such as micro-services,
methods, instances not visited by good transactions
versus bad transactions or the opposite. Attributes can
be categorical taking a small set of discrete values in-
cluding strings, or numerical attributes taking a large
set of values such as UserId. Call-chain data on which
Perceptor relies as input is rich with useful informa-
tion and makes Perceptor a major help in performance
debugging and in isolating faults.
REFERENCES
Bifet, A., Zhang, J., Fan, W., He, C., Zhang, J., Qian, J.,
Holmes, G., and Pfahringer, B. (2017). Extremely
fast decision tree mining for evolving data streams. In
Proceedings of the 23rd ACM SIGKDD International
Conference on Knowledge Discovery and Data Min-
ing, pages 1733–1742. ACM.
Brunnert, A., van Hoorn, A., Willnecker, F., Danciu, A.,
Hasselbring, W., Heger, C., Herbst, N., Jamshidi,
P., Jung, R., von Kistowski, J., et al. (2015).
Performance-oriented devops: A research agenda.
arXiv preprint arXiv:1508.04752.
Chen, M. Y., Kiciman, E., Fratkin, E., Fox, A., and Brewer,
E. (2002). Pinpoint: Problem determination in large,
dynamic internet services. In Proceedings Interna-
tional Conference on Dependable Systems and Net-
works, pages 595–604. IEEE.
Cormode, G. (2008). Count-min sketch. Encyclopedia of
Algorithms, pages 1–6.
Diagnostics (2020). Appdynamics diagnostics.
https://www.appdynamics.com/how-it-works/
application-diagnostics/.
Durand, M. and Flajolet, P. (2003). Loglog counting of
large cardinalities. In European Symposium on Algo-
rithms, pages 605–617. Springer.
Flajolet, P., Fusy,
´
E., Gandouet, O., and Meunier, F. (2007).
Hyperloglog: the analysis of a near-optimal cardinal-
ity estimation algorithm. In Discrete Mathematics and
Theoretical Computer Science, pages 137–156. Dis-
crete Mathematics and Theoretical Computer Science.
HdrHistogram (2020). Hdr histogram. http://hdrhistogram.
org/.
Kaldor, J., Mace, J., Bejda, M., Gao, E., Kuropatwa, W.,
O’Neill, J., Ong, K. W., Schaller, B., Shan, P., Vis-
comi, B., et al. (2017). Canopy: An end-to-end per-
formance tracing and analysis system. In Proceedings
of the 26th Symposium on Operating Systems Princi-
ples, pages 34–50. ACM.
Kanuparthy, P., Dai, Y., Pathak, S., Samal, S., Benson, T.,
Ghasemi, M., and Narayan, P. (2016). Ytrace: End-to-
end performance diagnosis in large cloud and content
providers. arXiv preprint arXiv:1602.03273.
Leavitt, J. (2014). End-to-end tracing models: Analysis and
unification. B. Sc. esis, Brown University,. Page.
Mace, J., Roelke, R., and Fonseca, R. (2018). Pivot
tracing: Dynamic causal monitoring for distributed
systems. ACM Transactions on Computer Systems
(TOCS), 35(4):11.
NewRelic (2020). New relic. https://newrelic.com/
products/insights/.
OpenTracing (2020). Open tracing project. https://
opentracing.io/.
Salzberg, S. L. (1994). C4. 5: Programs for machine learn-
ing by j. ross quinlan. morgan kaufmann publishers,
inc., 1993.
Sigelman, B. H., Barroso, L. A., Burrows, M., Stephenson,
P., Plakal, M., Beaver, D., Jaspan, S., and Shanbhag,
C. (2010). Dapper, a large-scale distributed systems
tracing infrastructure.
Whang, K.-Y., Vander-Zanden, B. T., and Taylor, H. M.
(1990). A linear-time probabilistic counting algo-
rithm for database applications. ACM Transactions
on Database Systems (TODS), 15(2):208–229.
Wilks, S. S. (1938). The large-sample distribution of the
likelihood ratio for testing composite hypotheses. The
Annals of Mathematical Statistics, 9(1):60–62.
WilksTheorem (2020). Wikipedia: Wilks theorem. https:
//en.wikipedia.org/wiki/Wilks%27 theorem/.
Yongguo, J., Qiang, L., Changshuai, Q., Jian, S., and Qian-
qian, L. (2019). Message-oriented middleware: A re-
view. In 2019 5th International Conference on Big
Data Computing and Communications (BIGCOM),
pages 88–97. IEEE.
CLOSER 2020 - 10th International Conference on Cloud Computing and Services Science
252