TY - GEN
T1 - Narrowing down possible causes of performance anomaly in web applications
AU - Iwata, Satoshi
AU - Kono, Kenji
N1 - Copyright:
Copyright 2010 Elsevier B.V., All rights reserved.
PY - 2010
Y1 - 2010
N2 - Performance anomalies are a critical problem for commercial web applications. To help administrators discover their cause, many monitoring/analyzing systems have been developed, but their practical use is hindered by their limited scope and/or significant overheads; we cannot attach them all the time to the entire application. In this paper, we propose a front-end narrower that enables us to narrow down possible causes of performance anomalies. Our narrower is much less obtrusive but provides only hints about the cause of performance anomalies. Using control charts on response times of each request type, our "front-end" narrower indicates suspicious components or processes that may contain the root causes of the anomaly. After that, the administrator chooses an appropriate tool as a "back-end" and attaches it to the suspicious components or processes to trace down the original cause. The results of our case studies are encouraging: we succeeded in correcting some performance anomalies (including an unknown one) in default RUBiS.
AB - Performance anomalies are a critical problem for commercial web applications. To help administrators discover their cause, many monitoring/analyzing systems have been developed, but their practical use is hindered by their limited scope and/or significant overheads; we cannot attach them all the time to the entire application. In this paper, we propose a front-end narrower that enables us to narrow down possible causes of performance anomalies. Our narrower is much less obtrusive but provides only hints about the cause of performance anomalies. Using control charts on response times of each request type, our "front-end" narrower indicates suspicious components or processes that may contain the root causes of the anomaly. After that, the administrator chooses an appropriate tool as a "back-end" and attaches it to the suspicious components or processes to trace down the original cause. The results of our case studies are encouraging: we succeeded in correcting some performance anomalies (including an unknown one) in default RUBiS.
KW - Commercial web application
KW - Control chart
KW - Performance debugging
KW - Request type
KW - Response time
UR - http://www.scopus.com/inward/record.url?scp=77954340116&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77954340116&partnerID=8YFLogxK
U2 - 10.1109/EDCC.2010.30
DO - 10.1109/EDCC.2010.30
M3 - Conference contribution
AN - SCOPUS:77954340116
SN - 9780769540078
T3 - EDCC-8 - Proceedings of the 8th European Dependable Computing Conference
SP - 185
EP - 190
BT - EDCC-8 - Proceedings of the 8th European Dependable Computing Conference
T2 - 8th European Dependable Computing Conference, EDCC-8
Y2 - 28 April 2010 through 30 April 2010
ER -