{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:25:27Z","timestamp":1772555127757,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3540250.3558963","type":"proceedings-article","created":{"date-parts":[[2022,11,9]],"date-time":"2022-11-09T20:46:22Z","timestamp":1668026782000},"page":"1465-1476","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":35,"title":["An empirical study of log analysis at Microsoft"],"prefix":"10.1145","author":[{"given":"Shilin","family":"He","sequence":"first","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Xu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Pinjia","family":"He","sequence":"additional","affiliation":[{"name":"Chinese University of Hong Kong at Shenzhen, China"}]},{"given":"Yong","family":"Xu","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Liqun","family":"Li","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Yu","family":"Kang","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Minghua","family":"Ma","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Yining","family":"Wei","sequence":"additional","affiliation":[{"name":"Microsoft Azure, China"}]},{"given":"Yingnong","family":"Dang","sequence":"additional","affiliation":[{"name":"Microsoft Azure, USA"}]},{"given":"Saravanakumar","family":"Rajmohan","sequence":"additional","affiliation":[{"name":"Microsoft 365, USA"}]},{"given":"Qingwei","family":"Lin","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]}],"member":"320","published-online":{"date-parts":[[2022,11,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00061"},{"key":"e_1_3_2_1_2_1","unstructured":"Apache. 2022. Apache Log4j 2. https:\/\/logging.apache.org\/log4j\/2.x\/ \t\t\t\t  Apache. 2022. Apache Log4j 2. https:\/\/logging.apache.org\/log4j\/2.x\/"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889231"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448976"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417055"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2011.36"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3007554"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00057"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS47924.2020.00115"},{"key":"e_1_3_2_1_10_1","unstructured":"Datadog. 2022. Datadog. https:\/\/www.datadoghq.com \t\t\t\t  Datadog. 2022. Datadog. https:\/\/www.datadoghq.com"},{"key":"e_1_3_2_1_11_1","unstructured":"Datadog. 2022. Datadog Log Parsing. https:\/\/docs.datadoghq.com\/logs\/guide\/log-parsing-best-practice\/ \t\t\t\t  Datadog. 2022. Datadog Log Parsing. https:\/\/docs.datadoghq.com\/logs\/guide\/log-parsing-best-practice\/"},{"key":"e_1_3_2_1_12_1","unstructured":"Rui Ding Hucheng Zhou Jian-Guang Lou Hongyu Zhang Qingwei Lin Qiang Fu Dongmei Zhang and Tao Xie. 2015. Log2: A cost-aware logging mechanism for performance diagnosis. In 2015 $USENIX$ Annual Technical Conference ($USENIX$$ATC$ 15). 139\u2013150. \t\t\t\t  Rui Ding Hucheng Zhou Jian-Guang Lou Hongyu Zhang Qingwei Lin Qiang Fu Dongmei Zhang and Tao Xie. 2015. Log2: A cost-aware logging mechanism for performance diagnosis. In 2015 $USENIX$ Annual Technical Conference ($USENIX$$ATC$ 15). 139\u2013150."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTER.2014.6968768"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.13"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460345"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236083"},{"key":"e_1_3_2_1_18_1","volume-title":"Loghub: A large collection of system log datasets towards automated log analytics. arXiv preprint arXiv:2008.06448.","author":"He Shilin","year":"2020","unstructured":"Shilin He , Jieming Zhu , Pinjia He , and Michael R Lyu . 2020 . Loghub: A large collection of system log datasets towards automated log analytics. arXiv preprint arXiv:2008.06448. Shilin He, Jieming Zhu, Pinjia He, and Michael R Lyu. 2020. Loghub: A large collection of system log datasets towards automated log analytics. arXiv preprint arXiv:2008.06448."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510101"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387904.3389294"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.2970422"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2007.46"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884795"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889232"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00085"},{"key":"e_1_3_2_1_26_1","unstructured":"Loggly. 2022. 30 best practices for logging at scale. https:\/\/www.loggly.com\/blog\/30-best-practices-logging-scale\/ \t\t\t\t  Loggly. 2022. 30 best practices for logging at scale. https:\/\/www.loggly.com\/blog\/30-best-practices-logging-scale\/"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835883"},{"key":"e_1_3_2_1_28_1","unstructured":"Medium. 2022. 13 best practices to improve your logging. https:\/\/medium.com\/cogito-engineering\/13-best-practices-to-improve-your-logging-75665183f05b \t\t\t\t  Medium. 2022. 13 best practices to improve your logging. https:\/\/medium.com\/cogito-engineering\/13-best-practices-to-improve-your-logging-75665183f05b"},{"key":"e_1_3_2_1_29_1","unstructured":"Microsoft. 2021. Microsoft Forms. https:\/\/www.microsoft.com\/en-us\/microsoft-365\/online-surveys-polls-quizzes \t\t\t\t  Microsoft. 2021. Microsoft Forms. https:\/\/www.microsoft.com\/en-us\/microsoft-365\/online-surveys-polls-quizzes"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.145"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISESE.2003.1237967"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330680"},{"key":"e_1_3_2_1_33_1","volume-title":"15th $USENIX$ Symposium on Operating Systems Design and Implementation ($OSDI$ 21). 183\u2013198.","author":"Rodrigues Kirk","unstructured":"Kirk Rodrigues , Yu Luo , and Ding Yuan . 2021. $CLP$ : Efficient and Scalable Search on Compressed Text Logs . In 15th $USENIX$ Symposium on Operating Systems Design and Implementation ($OSDI$ 21). 183\u2013198. Kirk Rodrigues, Yu Luo, and Ding Yuan. 2021. $CLP$: Efficient and Scalable Search on Compressed Text Logs. In 15th $USENIX$ Symposium on Operating Systems Design and Implementation ($OSDI$ 21). 183\u2013198."},{"key":"e_1_3_2_1_34_1","unstructured":"Keiichi Shima. 2016. Length matters: Clustering system log messages using length of words. arXiv preprint arXiv:1611.03213. \t\t\t\t  Keiichi Shima. 2016. Length matters: Clustering system log messages using length of words. arXiv preprint arXiv:1611.03213."},{"key":"e_1_3_2_1_35_1","unstructured":"Splunk. 2022. Splunk. https:\/\/www.splunk.com \t\t\t\t  Splunk. 2022. Splunk. https:\/\/www.splunk.com"},{"key":"e_1_3_2_1_36_1","unstructured":"Cindy Sridharan. 2018. Distributed Systems Observability: A Guide to Building Robust Systems. O\u2019Reilly Media. \t\t\t\t  Cindy Sridharan. 2018. Distributed Systems Observability: A Guide to Building Robust Systems. O\u2019Reilly Media."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2015.7367331"},{"key":"e_1_3_2_1_38_1","unstructured":"Wikipedia. 2021. Observability. https:\/\/en.wikipedia.org\/wiki\/Observability \t\t\t\t  Wikipedia. 2021. Observability. https:\/\/en.wikipedia.org\/wiki\/Observability"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629587"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP52600.2021.00015"},{"key":"e_1_3_2_1_41_1","volume-title":"10th $USENIX$ Symposium on Operating Systems Design and Implementation ($OSDI$ 12). 293\u2013306.","author":"Yuan Ding","unstructured":"Ding Yuan , Soyeon Park , Peng Huang , Yang Liu , Michael M Lee , Xiaoming Tang , Yuanyuan Zhou , and Stefan Savage . 2012. Be conservative: Enhancing failure diagnosis with proactive logging . In 10th $USENIX$ Symposium on Operating Systems Design and Implementation ($OSDI$ 12). 293\u2013306. Ding Yuan, Soyeon Park, Peng Huang, Yang Liu, Michael M Lee, Xiaoming Tang, Yuanyuan Zhou, and Stefan Savage. 2012. Be conservative: Enhancing failure diagnosis with proactive logging. In 10th $USENIX$ Symposium on Operating Systems Design and Implementation ($OSDI$ 12). 293\u2013306."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227202"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2110356.2110360"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338931"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473919"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359650"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473933"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2887384"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00021"}],"event":{"name":"ESEC\/FSE '22: 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Singapore Singapore","acronym":"ESEC\/FSE '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","NUS NUS"]},"container-title":["Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3540250.3558963","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3540250.3558963","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:04Z","timestamp":1750182544000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3540250.3558963"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":49,"alternative-id":["10.1145\/3540250.3558963","10.1145\/3540250"],"URL":"https:\/\/doi.org\/10.1145\/3540250.3558963","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}