no code implementations • 22 Dec 2023 • Thorsten Wittkopp, Alexander Acker, Odej Kao
The realm of AIOps is transforming IT landscapes with the power of AI and ML.
no code implementations • 25 Jan 2023 • Thorsten Wittkopp, Dominik Scheinert, Philipp Wiesner, Alexander Acker, Odej Kao
Due to the complexity of modern IT services, failures can be manifold, occur at any stage, and are hard to detect.
1 code implementation • 6 Apr 2022 • Jasmin Bogatinovski, Sasho Nedelkoski, Alexander Acker, Jorge Cardoso, Odej Kao
We start with an in-depth analysis of quality log instruction properties in nine software systems and identify two quality properties: 1) correct log level assignment assessing the correctness of the log level, and 2) sufficient linguistic structure assessing the minimal richness of the static text necessary for verbose event description.
no code implementations • 2 Nov 2021 • Thorsten Wittkopp, Philipp Wiesner, Dominik Scheinert, Alexander Acker
With increasing scale and complexity of cloud operations, automated detection of anomalies in monitoring data such as logs will be an essential part of managing future IT infrastructures.
no code implementations • 20 Sep 2021 • Thorsten Wittkopp, Alexander Acker, Sasho Nedelkoski, Jasmin Bogatinovski, Dominik Scheinert, Wu Fan, Odej Kao
Furthermore, we utilize available anomaly examples to set optimal decision boundaries to acquire strong baselines.
1 code implementation • 27 Aug 2021 • Dominik Scheinert, Houkun Zhu, Lauritz Thamsen, Morgan K. Geldenhuys, Jonathan Will, Alexander Acker, Odej Kao
Distributed dataflow systems like Spark and Flink enable the use of clusters for scalable data analytics.
1 code implementation • 29 Jul 2021 • Dominik Scheinert, Lauritz Thamsen, Houkun Zhu, Jonathan Will, Alexander Acker, Thorsten Wittkopp, Odej Kao
First, a general model is trained on all the available data for a specific scalable analytics algorithm, hereby incorporating data from different contexts.
1 code implementation • 9 Mar 2021 • Dominik Scheinert, Alexander Acker, Lauritz Thamsen, Morgan K. Geldenhuys, Odej Kao
Operation and maintenance of large distributed cloud applications can quickly become unmanageably complex, putting human operators under immense stress when problems occur.
no code implementations • 25 Feb 2021 • Dominik Scheinert, Alexander Acker
Deployment, operation and maintenance of large IT systems becomes increasingly complex and puts human experts under extreme stress when problems occur.
no code implementations • 23 Feb 2021 • Harold Ott, Jasmin Bogatinovski, Alexander Acker, Sasho Nedelkoski, Odej Kao
To that end, we utilize pre-trained general-purpose language models to preserve the semantics of log messages and map them into log vector embeddings.
no code implementations • 12 Feb 2021 • Soeren Becker, Florian Schmidt, Anton Gulenko, Alexander Acker, Odej Kao
Edge computing was introduced as a technical enabler for the demanding requirements of new network technologies like 5G.
no code implementations • 1 Feb 2021 • Thorsten Wittkopp, Alexander Acker
Neither original training data nor model parameters need to be transmitted.
no code implementations • 15 Jan 2021 • Jasmin Bogatinovski, Sasho Nedelkoski, Alexander Acker, Florian Schmidt, Thorsten Wittkopp, Soeren Becker, Jorge Cardoso, Odej Kao
Finally, all this will result in faster adoption of AIOps, further increase the interest in this research field and contribute to bridging the gap towards fully-autonomous operating IT systems.
no code implementations • 21 Aug 2020 • Sasho Nedelkoski, Jasmin Bogatinovski, Alexander Acker, Jorge Cardoso, Odej Kao
We propose Logsy, a classification-based method to learn log representations in a way to distinguish between normal data from the system of interest and anomaly samples from auxiliary log datasets, easily accessible via the internet.
1 code implementation • 7 Jul 2020 • Alexander Acker, Thorsten Wittkopp, Sasho Nedelkoski, Jasmin Bogatinovski, Odej Kao
First, KPI types like CPU utilization or allocated memory are very different and hard to be expressed by the same model.
2 code implementations • 17 Mar 2020 • Sasho Nedelkoski, Jasmin Bogatinovski, Alexander Acker, Jorge Cardoso, Odej Kao
This allows the coupling of the MLM as pre-training with a downstream anomaly detection task.