software misconfigurations are a big deal
play

Software Misconfigurations are a big deal! There is a much sprawl: - PowerPoint PPT Presentation

Dexter : Faster Troubleshooting of Misconfiguration Problems Using System Logs Rukma Talwadker NetApp Inc. 22 nd May 2017 Presented at SYSTOR 2017 1 SYSTOR'17: 10th ACM International Systems & Storage Conference Software


  1. Dexter : Faster Troubleshooting of Misconfiguration Problems Using System Logs Rukma Talwadker NetApp Inc. 22 nd May 2017 Presented at SYSTOR 2017 1 SYSTOR'17: 10th ACM International Systems & Storage Conference

  2. Software Misconfigurations are a big deal! • There is a much sprawl: nearly 2K options in Firefox and over 36K options in LibreOffice • Complex interaction between configuration settings and execution environment renders the configuration effort difficult and error-prone • Significant portion of the operational cost (over 70%) is made up by people costs  Change of hands via escalations  Communication logistics 2 SYSTOR'17: 10th ACM International Systems & Storage Conference

  3. Misconfiguration troubleshooting workflow System Logs Problem “ Error: Invalid Shelf ID” Disk shelf ID’s indicator “ Warning: Delay in I/O response” • 12.234.56.7 Suspicious “ Error: Exceeded the connection limit” • 12.345.6.7 entry “ Warning: Node clockskew detected” • AS45698_WD Misconfiguration • 12.36.78.6 Root Cause Resolution “ Shelf ID should be a 32-bit numeric address written as four numbers separated by periods. ” Dexter is a misconfiguration troubleshooting tool! 3 SYSTOR'17: 10th ACM International Systems & Storage Conference

  4. Dexter Spotlights Dexter’s role is two -fold Problem Spotlights Ranked list of system log messages, one or more of which correlate with the ongoing misconfiguration problem. Resolution Spotlights Heuristically derived possible solutions to the given misconfiguration problem by mining the command history logs of the system. Note: AutoSupport is a digital exhaust of system operations from various customer installations, sent back to NetApp periodically. 4 SYSTOR'17: 10th ACM International Systems & Storage Conference

  5. Problem Spotlights 5 SYSTOR'17: 10th ACM International Systems & Storage Conference

  6. Extracting System Log features (metrics) Dexter considers the following features: 1. Reported timestamp 2. software module and/or sub system which logged the message 3. The actual error message 4. Message severity. A sample Apache HTTP server log [Fri Sep 09 10:42:29.902022 2011] [core:error] [pid 35708:tid 4328636416] [client 72.15.99.187] File does not exist: /usr/local/apache2/htdocs/favicon.ico 6 SYSTOR'17: 10th ACM International Systems & Storage Conference

  7. Finding Problem Spotlights Metrics that matter Log Metrics defined by Dexter: • Message Recency: messages temporally correlated with the problem are potential clues • Message Severity: messages with higher severity are more concerning than a warning message • Message Frequency: more frequently appearing error message which is also recent is possibly correlated Ranked list of log messages is presented to the support engineer 7 SYSTOR'17: 10th ACM International Systems & Storage Conference

  8. Resolution Spotlights 8 SYSTOR'17: 10th ACM International Systems & Storage Conference

  9. Resolution Spotlights A heuristics approach for offline resolution prediction component 1) Dexter checks for disappearance of problem spotlights post case closure in the system logs. 2) Correlates disappearance of problem spotlights with:  Execution of a new command  Re-execution of the new argument or an option with a new value.  And time correlation of the command execution with the message disappearance. 9 SYSTOR'17: 10th ACM International Systems & Storage Conference

  10. Dexter Workflow online and offline components Online workflow Top 10 publish Extract Process logs Case Misconfiguration Problem Problem & extract Support case opened spotlights spotlights features Case Offline workflow closed {problem spotlight, Correlate Estimate the command list} Signature Commands with Problem indicating database Logs temporally spotlights 10 SYSTOR'17: 10th ACM International Systems & Storage Conference

  11. Results Validation on a sample set of 600 cases. ranks 11 SYSTOR'17: 10th ACM International Systems & Storage Conference

  12. Q&A 12 SYSTOR'17: 10th ACM International Systems & Storage Conference

  13. An example of resolution prediction. root Other Commands first 14th July, 4:38 PM accessed cifs − server − modify last 16th July, 5.16 AM accessed first 14th July, 4:38 PM Foo value accessed Volume name last count 16th July, 5.16 AM 20 accessed first 14th July, 4:38 PM XYZ value accessed Vserver last count 20 16th July, 5.16 AM accessed first 14th July, 4:38 PM value PC accessed user count last 20 16th July, 5.16 AM accessed signing − allowed − timeout enabled hosts value (*) value ON value 3600 count 1 count 1 1 count first first first 14th July 16th July 14th July accessed accessed accessed 4:38 PM 5:16 AM 4:38 PM last last last 14th July 16th July accessed 14th July accessed accessed 4:38 PM 5:16 AM 4:38 PM 13 SYSTOR'17: 10th ACM International Systems & Storage Conference

  14. Evaluation Criteria Effectiveness of Dexter Problem Spotlights Dexter posts the top 10 problem spotlights to the misconfiguration support case  AutoSupports were enabled and available  The problem indicating log message:  was contained (Recorded) in the logs  was ranked within the top 10 log messages for the system at the time Dexter was invoked. Resolution Spotlights All (- pre-filtered) correlated commands are presented as a possible solution  AutoSupports were enabled and available  The solution indicating command log:  was contained (Recorded) in the command history logs. 14 SYSTOR'17: 10th ACM International Systems & Storage Conference

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend