{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:20:23Z","timestamp":1775913623328,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T00:00:00Z","timestamp":1713744000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,22]]},"DOI":"10.1145\/3627703.3629553","type":"proceedings-article","created":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T06:28:28Z","timestamp":1713421708000},"page":"674-688","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":111,"title":["Automatic Root Cause Analysis via Large Language Models for Cloud Incidents"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-5408-2347","authenticated-orcid":false,"given":"Yinfang","family":"Chen","sequence":"first","affiliation":[{"name":"Huazhong University of Science and Technology"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-7027-0885","authenticated-orcid":false,"given":"Huaibing","family":"Xie","sequence":"additional","affiliation":[{"name":"Peking University and Microsoft Research Asia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6303-1731","authenticated-orcid":false,"given":"Minghua","family":"Ma","sequence":"additional","affiliation":[{"name":"National University of Singapore and Microsoft"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-1735-5876","authenticated-orcid":false,"given":"Yu","family":"Kang","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-2078-7755","authenticated-orcid":false,"given":"Xin","family":"Gao","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-4369-0526","authenticated-orcid":false,"given":"Liu","family":"Shi","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-0211-8488","authenticated-orcid":false,"given":"Yunjie","family":"Cao","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-5460-9122","authenticated-orcid":false,"given":"Xuedong","family":"Gao","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7845-1991","authenticated-orcid":false,"given":"Hao","family":"Fan","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5588-9618","authenticated-orcid":false,"given":"Ming","family":"Wen","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-4031-1297","authenticated-orcid":false,"given":"Jun","family":"Zeng","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7275-3296","authenticated-orcid":false,"given":"Supriyo","family":"Ghosh","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-1492-0476","authenticated-orcid":false,"given":"Xuchao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1304-6839","authenticated-orcid":false,"given":"Chaoyun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2559-2383","authenticated-orcid":false,"given":"Qingwei","family":"Lin","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-0204-7187","authenticated-orcid":false,"given":"Saravan","family":"Rajmohan","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9230-2799","authenticated-orcid":false,"given":"Dongmei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4443-8170","authenticated-orcid":false,"given":"Tianyin","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]}],"member":"320","published-online":{"date-parts":[[2024,4,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00149"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/3291168.3291173"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934884"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377813.3381353"},{"key":"e_1_3_2_1_5_1","volume-title":"Language models are few-shot learners. Advances in neural information processing systems","author":"Brown T.","year":"2020","unstructured":"Brown, T., Mann, B., Ryder, N., Subbiah, M., Kaplan, J. D., Dhariwal, P., Neelakantan, A., Shyam, P., Sastry, G., Askell, A., et al. Language models are few-shot learners. Advances in neural information processing systems (2020)."},{"key":"e_1_3_2_1_6_1","volume-title":"Chatgpt may pass the bar exam soon, but has a long way to go for the lexglue benchmark. arXiv preprint arXiv:2304.12202","author":"Chalkidis I.","year":"2023","unstructured":"Chalkidis, I. Chatgpt may pass the bar exam soon, but has a long way to go for the lexglue benchmark. arXiv preprint arXiv:2304.12202 (2023)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00040"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00020"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00042"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416624"},{"key":"e_1_3_2_1_11_1","volume-title":"Evaluating large language models trained on code. arXiv preprint arXiv:2107.03374","author":"Chen M.","year":"2021","unstructured":"Chen, M., Tworek, J., Jun, H., Yuan, Q., Pinto, H. P. D. O., Kaplan, J., Edwards, H., Burda, Y., Joseph, N., Brockman, G., et al. Evaluating large language models trained on code. arXiv preprint arXiv:2107.03374 (2021)."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI'23)","author":"Chen Y.","year":"2023","unstructured":"Chen, Y., Sun, X., Nath, S., Yang, Z., and Xu, T. Push-Button Reliability Testing for Cloud-Backed Applications with Rainmaker. In Proceedings of the 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI'23) (2023)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3549098"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3613898"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236030"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3542929.3563482"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3600006.3613161"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3558963"},{"key":"e_1_3_2_1_19_1","volume-title":"2023 IEEE Symposium on Security and Privacy (S&P'22)","author":"Inam M. A.","year":"2022","unstructured":"Inam, M. A., Chen, Y., Goyal, A., Liu, J., Mink, J., Michael, N., Gaur, S., Bates, A., and Hassan, W. U. Sok: History is a vast early warning system: Auditing the provenance of system intrusions. In 2023 IEEE Symposium on Security and Privacy (S&P'22) (2022)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417054"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3613891"},{"key":"e_1_3_2_1_22_1","volume-title":"Evaluating gpt-4 and chatgpt on japanese medical licensing examinations. arXiv preprint arXiv:2303.18027","author":"Kasai J.","year":"2023","unstructured":"Kasai, J., Kasai, Y., Sakaguchi, K., Yamada, Y., and Radev, D. Evaluating gpt-4 and chatgpt on japanese medical licensing examinations. arXiv preprint arXiv:2303.18027 (2023)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3102980.3102985"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE59848.2023.00069"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-12423-5_17"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWQOS52092.2021.9521340"},{"key":"e_1_3_2_1_27_1","volume-title":"Did we miss something important? studying and exploring variable-aware log abstraction. arXiv preprint arXiv:2304.11391","author":"Li Z.","year":"2023","unstructured":"Li, Z., Luo, C., Chen, T.-H., Shang, W., He, S., Lin, Q., and Zhang, D. Did we miss something important? studying and exploring variable-aware log abstraction. arXiv preprint arXiv:2304.11391 (2023)."},{"key":"e_1_3_2_1_28_1","volume-title":"Configuration validation with large language models. arXiv preprint arXiv:2310.09690","author":"Lian X.","year":"2023","unstructured":"Lian, X., Chen, Y., Cheng, R., Huang, J., Thakkar, P., and Xu, T. Configuration validation with large language models. arXiv preprint arXiv:2310.09690 (2023)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP52600.2021.00043"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3317550.3321438"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3511993"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI'22)","author":"Lou C.","year":"2022","unstructured":"Lou, C., Chen, C., Huang, P., Dang, Y., Qin, S., Yang, X., Li, X., Lin, Q., and Chintalapati, M. RESIN: A holistic service for dealing with memory leaks in production cloud infrastructure. In Proceedings of the 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI'22) (2022)."},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI'20)","author":"Lou C.","year":"2020","unstructured":"Lou, C., Huang, P., and Smith, S. Understanding, detecting and localizing partial failures in large system software. In Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI'20) (2020)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623374"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380111"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.14778\/3389133.3389136"},{"key":"e_1_3_2_1_37_1","volume-title":"2021 USENIX Annual Technical Conference (ATC'21)","author":"Ma M.","year":"2021","unstructured":"Ma, M., Zhang, S., Chen, J., Xu, J., Li, H., Lin, Y., Nie, X., Zhou, B., Wang, Y., and Pei, D. Jump-starting multivariate time series anomaly detection for online service systems. In 2021 USENIX Annual Technical Conference (ATC'21) (2021)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2018.00013"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3511561"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00041"},{"key":"e_1_3_2_1_41_1","volume-title":"Tiktoken: A python library for tokenizing text. https:\/\/github.com\/openai\/tiktoken","author":"Open AI.","year":"2023","unstructured":"OpenAI. Tiktoken: A python library for tokenizing text. https:\/\/github.com\/openai\/tiktoken, 2023."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3558958"},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI'20)","author":"Sun X.","year":"2020","unstructured":"Sun, X., Cheng, R., Chen, J., Ang, E., Legunsen, O., and Xu, T. Testing Configuration Changes in Context to Prevent Production Failures. In Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI'20) (2020)."},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of the 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI'22)","author":"Sun X.","year":"2022","unstructured":"Sun, X., Luo, W., Gu, J. T., Ganesan, A., Alagappan, R., Gasch, M., Suresh, L., and Xu, T. Automatic Reliability Testing for Cluster Management Controllers. In Proceedings of the 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI'22) (2022)."},{"key":"e_1_3_2_1_45_1","volume-title":"Evaluation of chatgpt as a question answering system for answering complex questions. arXiv preprint arXiv:2303.07992","author":"Tan Y.","year":"2023","unstructured":"Tan, Y., Min, D., Li, Y., Li, W., Hu, N., Chen, Y., and Qi, G. Evaluation of chatgpt as a question answering system for answering complex questions. arXiv preprint arXiv:2303.07992 (2023)."},{"key":"e_1_3_2_1_46_1","volume-title":"Chain of thought prompting elicits reasoning in large language models. arXiv preprint arXiv:2201.11903","author":"Wei J.","year":"2022","unstructured":"Wei, J., Wang, X., Schuurmans, D., Bosma, M., Chi, E., Le, Q., and Zhou, D. Chain of thought prompting elicits reasoning in large language models. arXiv preprint arXiv:2201.11903 (2022)."},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI'17)","author":"Wu Y.","year":"2017","unstructured":"Wu, Y., Chen, A., Haeberlen, A., Zhou, W., and Loo, B. T. Automated bug removal for software-defined networks. In Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI'17) (2017)."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583215"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP58684.2023.00026"},{"key":"e_1_3_2_1_50_1","volume-title":"Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI'14)","author":"Yuan D.","year":"2014","unstructured":"Yuan, D., Luo, Y., Zhuang, X., Rodrigues, G. R., Zhao, X., Zhang, Y., Jain, P., and Stumm, M. Simple testing can prevent most critical failures: An analysis of production failures in distributed data-intensive systems. In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI'14) (2014)."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24549"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833669"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP58684.2023.00029"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP58684.2023.00029"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534396"},{"key":"e_1_3_2_1_56_1","volume-title":"System log parsing: A survey","author":"Zhang T.","year":"2023","unstructured":"Zhang, T., Qiu, H., Castellano, G., Rirai, M., Chen, C. S., and Pianese, F. System log parsing: A survey. IEEE Transactions on Knowledge and Data Engineering (2023)."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473919"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3481903"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483577"},{"key":"e_1_3_2_1_60_1","volume-title":"The Eleventh International Conference on Learning Representations (ICLR'23)","author":"Zhang Z.","year":"2023","unstructured":"Zhang, Z., Zhang, A., Li, M., and Smola, A. Automatic chain of thought prompting in large language models. In The Eleventh International Conference on Learning Representations (ICLR'23) (2023)."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599902"}],"event":{"name":"EuroSys '24: Nineteenth European Conference on Computer Systems","location":"Athens Greece","acronym":"EuroSys '24","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the Nineteenth European Conference on Computer Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627703.3629553","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3627703.3629553","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T01:12:42Z","timestamp":1755825162000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627703.3629553"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,22]]},"references-count":61,"alternative-id":["10.1145\/3627703.3629553","10.1145\/3627703"],"URL":"https:\/\/doi.org\/10.1145\/3627703.3629553","relation":{},"subject":[],"published":{"date-parts":[[2024,4,22]]},"assertion":[{"value":"2024-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}