{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T09:04:32Z","timestamp":1770541472445,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,18]],"date-time":"2021-08-18T00:00:00Z","timestamp":1629244800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,20]]},"DOI":"10.1145\/3468264.3473919","type":"proceedings-article","created":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T01:44:18Z","timestamp":1629337458000},"page":"1253-1263","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":45,"title":["Onion: identifying incident-indicating logs for cloud systems"],"prefix":"10.1145","author":[{"given":"Xu","family":"Zhang","sequence":"first","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Yong","family":"Xu","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Si","family":"Qin","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Shilin","family":"He","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8997-8317","authenticated-orcid":false,"given":"Bo","family":"Qiao","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Ze","family":"Li","sequence":"additional","affiliation":[{"name":"Microsoft Azure, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3063-9425","authenticated-orcid":false,"given":"Hongyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Newcastle, Australia"}]},{"given":"Xukun","family":"Li","sequence":"additional","affiliation":[{"name":"Microsoft Azure, USA"}]},{"given":"Yingnong","family":"Dang","sequence":"additional","affiliation":[{"name":"Microsoft Azure, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2559-2383","authenticated-orcid":false,"given":"Qingwei","family":"Lin","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Murali","family":"Chintalapati","sequence":"additional","affiliation":[{"name":"Microsoft Azure, USA"}]},{"given":"Saravanakumar","family":"Rajmohan","sequence":"additional","affiliation":[{"name":"Microsoft 365, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9230-2799","authenticated-orcid":false,"given":"Dongmei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]}],"member":"320","published-online":{"date-parts":[[2021,8,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. Apache Spark Examples. https:\/\/spark.apache.org\/examples.html  [n.d.]. Apache Spark Examples. https:\/\/spark.apache.org\/examples.html"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1308173.1308264"},{"key":"e_1_3_2_1_3_1","first-page":"487","article-title":"Fast algorithms for mining association rules. In Proc. 20th int. conf. very large data bases","volume":"1215","author":"Agrawal Rakesh","year":"1994","unstructured":"Rakesh Agrawal and Ramakrishnan Srikant . 1994 . Fast algorithms for mining association rules. In Proc. 20th int. conf. very large data bases , VLDB. 1215 , 487 \u2013 499 . Rakesh Agrawal and Ramakrishnan Srikant. 1994. Fast algorithms for mining association rules. In Proc. 20th int. conf. very large data bases, VLDB. 1215, 487\u2013499.","journal-title":"VLDB."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00031"},{"key":"e_1_3_2_1_5_1","volume-title":"Noise reduction in speech processing","author":"Benesty Jacob","unstructured":"Jacob Benesty , Jingdong Chen , Yiteng Huang , and Israel Cohen . 2009. Pearson correlation coefficient . In Noise reduction in speech processing . Springer , 1\u20134. Jacob Benesty, Jingdong Chen, Yiteng Huang, and Israel Cohen. 2009. Pearson correlation coefficient. In Noise reduction in speech processing. Springer, 1\u20134."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00020"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2004.1301345"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/HIPC.2010.5713159"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion.2019.00023"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"e_1_3_2_1_11_1","volume-title":"15th $USENIX$ Symposium on Networked Systems Design and Implementation ($NSDI$ 18). 51\u201366.","author":"Firestone Daniel","unstructured":"Daniel Firestone , Andrew Putnam , Sambhrama Mundkur , Derek Chiou , Alireza Dabagh , Mike Andrewartha , Hari Angepat , Vivek Bhanu , Adrian Caulfield , and Eric Chung . 2018. Azure accelerated networking: Smartnics in the public cloud . In 15th $USENIX$ Symposium on Networked Systems Design and Implementation ($NSDI$ 18). 51\u201366. Daniel Firestone, Andrew Putnam, Sambhrama Mundkur, Derek Chiou, Alireza Dabagh, Mike Andrewartha, Hari Angepat, Vivek Bhanu, Adrian Caulfield, and Eric Chung. 2018. Azure accelerated networking: Smartnics in the public cloud. In 15th $USENIX$ Symposium on Networked Systems Design and Implementation ($NSDI$ 18). 51\u201366."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTER.2014.6968768"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.13"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236083"},{"key":"e_1_3_2_1_15_1","volume-title":"Clustering intrusion detection alarms to support root cause analysis. ACM transactions on information and system security (TISSEC), 6, 4","author":"Julisch Klaus","year":"2003","unstructured":"Klaus Julisch . 2003. Clustering intrusion detection alarms to support root cause analysis. ACM transactions on information and system security (TISSEC), 6, 4 ( 2003 ), 443\u2013471. Klaus Julisch. 2003. Clustering intrusion detection alarms to support root cause analysis. ACM transactions on information and system security (TISSEC), 6, 4 (2003), 443\u2013471."},{"key":"e_1_3_2_1_16_1","volume-title":"End-To-End Analytics Service for Safe Deployment in Large-Scale Cloud Infrastructure. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Li Ze","year":"2020","unstructured":"Ze Li , Qian Cheng , Ken Hsieh , Yingnong Dang , Peng Huang , Pankaj Singh , Xinsheng Yang , Qingwei Lin , Youjiang Wu , Sebastien Levy , and Murali Chintalapati . 2020 . Gandalf: An Intelligent , End-To-End Analytics Service for Safe Deployment in Large-Scale Cloud Infrastructure. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20) . USENIX Association, Santa Clara, CA. 389\u2013402. isbn:978-1-939133-13-7 https:\/\/www.usenix.org\/conference\/nsdi20\/presentation\/li Ze Li, Qian Cheng, Ken Hsieh, Yingnong Dang, Peng Huang, Pankaj Singh, Xinsheng Yang, Qingwei Lin, Youjiang Wu, Sebastien Levy, and Murali Chintalapati. 2020. Gandalf: An Intelligent, End-To-End Analytics Service for Safe Deployment in Large-Scale Cloud Infrastructure. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20). USENIX Association, Santa Clara, CA. 389\u2013402. isbn:978-1-939133-13-7 https:\/\/www.usenix.org\/conference\/nsdi20\/presentation\/li"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2007.46"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236060"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889232"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693105"},{"key":"e_1_3_2_1_21_1","volume-title":"Madan Musuvathi, and Luis Ceze.","author":"Luo Liang","year":"2018","unstructured":"Liang Luo , Suman Nath , Lenin Ravindranath Sivalingam , Madan Musuvathi, and Luis Ceze. 2018 . Troubleshooting transiently-recurring errors in production systems with blame-proportional logging. In 2018 $USENIX$ Annual Technical Conference ( $USENIX$$ATC$ 18). 321\u2013334. Liang Luo, Suman Nath, Lenin Ravindranath Sivalingam, Madan Musuvathi, and Luis Ceze. 2018. Troubleshooting transiently-recurring errors in production systems with blame-proportional logging. In 2018 $USENIX$ Annual Technical Conference ($USENIX$$ATC$ 18). 321\u2013334."},{"key":"e_1_3_2_1_22_1","volume-title":"Xiangyu Zhang, Gabriela Ciocarlie, Ashish Gehani, Vinod Yegneswaran, Dongyan Xu, and Somesh Jha.","author":"Ma Shiqing","year":"2018","unstructured":"Shiqing Ma , Juan Zhai , Yonghwi Kwon , Kyu Hyung Lee , Xiangyu Zhang, Gabriela Ciocarlie, Ashish Gehani, Vinod Yegneswaran, Dongyan Xu, and Somesh Jha. 2018 . Kernel-supported cost-effective audit logging for causality tracking. In 2018 $USENIX$ Annual Technical Conference ( $USENIX$$ATC$ 18). 241\u2013254. Shiqing Ma, Juan Zhai, Yonghwi Kwon, Kyu Hyung Lee, Xiangyu Zhang, Gabriela Ciocarlie, Ashish Gehani, Vinod Yegneswaran, Dongyan Xu, and Somesh Jha. 2018. Kernel-supported cost-effective audit logging for causality tracking. In 2018 $USENIX$ Annual Technical Conference ($USENIX$$ATC$ 18). 241\u2013254."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Oded Maimon and Lior Rokach. 2005. Data mining and knowledge discovery handbook.  Oded Maimon and Lior Rokach. 2005. Data mining and knowledge discovery handbook.","DOI":"10.1007\/b107408"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3102980.3102983"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.20982\/tqmp.09.1.p015"},{"key":"e_1_3_2_1_26_1","volume-title":"Microservice architecture: aligning principles, practices, and culture. \" O\u2019Reilly Media","author":"Nadareishvili Irakli","unstructured":"Irakli Nadareishvili , Ronnie Mitra , Matt McLarty , and Mike Amundsen . 2016. Microservice architecture: aligning principles, practices, and culture. \" O\u2019Reilly Media , Inc .\". Irakli Nadareishvili, Ronnie Mitra, Matt McLarty, and Mike Amundsen. 2016. Microservice architecture: aligning principles, practices, and culture. \" O\u2019Reilly Media, Inc.\"."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/2228298.2228334"},{"key":"e_1_3_2_1_28_1","volume-title":"Gil Lapid Shafriri, and Murali Chintalapati","author":"Pandey Rohit","year":"2019","unstructured":"Rohit Pandey , Yingnong Dang , Ali Vira , Aerin Kim , Gil Lapid Shafriri, and Murali Chintalapati . 2019 . Annual Interruption Rate as a KPI , its measurement and comparison. arXiv preprint arXiv:1910.12200. Rohit Pandey, Yingnong Dang, Ali Vira, Aerin Kim, Gil Lapid Shafriri, and Murali Chintalapati. 2019. Annual Interruption Rate as a KPI, its measurement and comparison. arXiv preprint arXiv:1910.12200."},{"key":"e_1_3_2_1_29_1","unstructured":"David Martin Powers. 2011. Evaluation: from precision recall and F-measure to ROC informedness markedness and correlation.  David Martin Powers. 2011. Evaluation: from precision recall and F-measure to ROC informedness markedness and correlation."},{"key":"e_1_3_2_1_30_1","unstructured":"Charles Romesburg. 2004. Cluster analysis for researchers. Lulu. com.  Charles Romesburg. 2004. Cluster analysis for researchers. Lulu. com."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2016.12"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2015.7363985"},{"key":"e_1_3_2_1_33_1","volume-title":"Seo Jin Park, and John Ousterhout","author":"Yang Stephen","year":"2018","unstructured":"Stephen Yang , Seo Jin Park, and John Ousterhout . 2018 . NanoLog: a nanosecond scale logging system. In 2018 $USENIX$ Annual Technical Conference ( $USENIX$$ATC$ 18). 335\u2013350. Stephen Yang, Seo Jin Park, and John Ousterhout. 2018. NanoLog: a nanosecond scale logging system. In 2018 $USENIX$ Annual Technical Conference ($USENIX$$ATC$ 18). 335\u2013350."},{"key":"e_1_3_2_1_34_1","first-page":"10","article-title":"Spark: Cluster computing with working sets","volume":"10","author":"Zaharia Matei","year":"2010","unstructured":"Matei Zaharia , Mosharaf Chowdhury , Michael J Franklin , Scott Shenker , and Ion Stoica . 2010 . Spark: Cluster computing with working sets .. HotCloud , 10 , 10 - 10 (2010), 95. Matei Zaharia, Mosharaf Chowdhury, Michael J Franklin, Scott Shenker, and Ion Stoica. 2010. Spark: Cluster computing with working sets.. HotCloud, 10, 10-10 (2010), 95.","journal-title":"HotCloud"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-010-0001-0"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00021"}],"event":{"name":"ESEC\/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Athens Greece","acronym":"ESEC\/FSE '21","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468264.3473919","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3468264.3473919","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:23Z","timestamp":1750191443000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468264.3473919"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,18]]},"references-count":36,"alternative-id":["10.1145\/3468264.3473919","10.1145\/3468264"],"URL":"https:\/\/doi.org\/10.1145\/3468264.3473919","relation":{},"subject":[],"published":{"date-parts":[[2021,8,18]]},"assertion":[{"value":"2021-08-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}