US20200241992A1 - System and method for dynamic domain-specific sequence diagram visualization - Google Patents
System and method for dynamic domain-specific sequence diagram visualization Download PDFInfo
- Publication number
- US20200241992A1 US20200241992A1 US16/846,207 US202016846207A US2020241992A1 US 20200241992 A1 US20200241992 A1 US 20200241992A1 US 202016846207 A US202016846207 A US 202016846207A US 2020241992 A1 US2020241992 A1 US 2020241992A1
- Authority
- US
- United States
- Prior art keywords
- events
- event
- processor
- icon set
- sequence diagram
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000010586 diagram Methods 0.000 title claims abstract description 32
- 238000000034 method Methods 0.000 title claims abstract description 26
- 238000012800 visualization Methods 0.000 title description 3
- 230000000007 visual effect Effects 0.000 claims abstract description 21
- 230000015654 memory Effects 0.000 claims description 18
- 230000007704 transition Effects 0.000 claims description 7
- 238000009877 rendering Methods 0.000 claims description 2
- 230000008685 targeting Effects 0.000 claims 1
- 230000002708 enhancing effect Effects 0.000 abstract description 4
- 230000008569 process Effects 0.000 abstract description 2
- 230000009471 action Effects 0.000 description 10
- 230000003993 interaction Effects 0.000 description 10
- 230000006870 function Effects 0.000 description 9
- 238000004891 communication Methods 0.000 description 5
- 238000013461 design Methods 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 3
- 230000000694 effects Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000011179 visual inspection Methods 0.000 description 2
- 241000282412 Homo Species 0.000 description 1
- 101150110972 ME1 gene Proteins 0.000 description 1
- 230000002730 additional effect Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000004397 blinking Effects 0.000 description 1
- 230000001934 delay Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000003909 pattern recognition Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/32—Monitoring with visual or acoustical indication of the functioning of the machine
- G06F11/324—Display of status information
- G06F11/328—Computer systems status display
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
- G06F11/3476—Data logging
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3003—Monitoring arrangements specially adapted to the computing system or computing system component being monitored
- G06F11/301—Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is a virtual computing platform, e.g. logically partitioned systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3065—Monitoring arrangements determined by the means or processing involved in reporting the monitored data
- G06F11/3086—Monitoring arrangements determined by the means or processing involved in reporting the monitored data where the reporting involves the use of self describing data formats, i.e. metadata, markup languages, human readable formats
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/32—Monitoring with visual or acoustical indication of the functioning of the machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3409—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/40—Data acquisition and logging
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/86—Event-based monitoring
Definitions
- the present disclosure relates to visualizing log files and more specifically to domain-specific visualizations of log files to be more understandable to a human viewer.
- Distributed and concurrent systems can implement complex control flows spawning multiple concurrent components. For example, in the context of Openstack a northbound API request to create a virtual machine (VM) is implemented by various components handling different concerns, such as authentication, networking, VM spawning. Potentially each component in the system can produce log files or traces. Analyzing a particular flow execution requires inspection and correlation of multiple such files, which is not particularly suitable to a human being.
- VM virtual machine
- Sequence diagram are an UML technique originally intended to capture flows and interactions at design time. Some tools can generate sequence diagrams out of traces or logs collected from a running system. However the amount of information visualized is typically much greater, and can include multiple flows interlaced with each other. This representation of sequence diagrams is mostly concerned with depicting interactions and activity blocks, and does not provide any type of visual clues to allow rapid identification of desired flows. Thus, the amount of information is simply overwhelming and, though all the information is displayed, the significance or meaning of the information is difficult for humans to decipher.
- FIG. 1 illustrates an example enhanced log file
- FIG. 2 illustrates a block diagram of an example system for enhancing log files
- FIG. 3 illustrates an example traditional log file
- FIG. 4 illustrates an example enhanced version of a state machine based on the log file of FIG. 3 ;
- FIG. 5 illustrates an example method embodiment
- FIG. 6 illustrates an example system embodiment.
- a system, method and computer-readable storage devices are disclosed which visually enhance sequence diagrams to facilitate visual inspection when diagrams include a large amount of information, such as sequence diagrams automatically constructed from log or trace files.
- FIG. 1 illustrates an example enhanced log file 102 in an example software tool 100 for graphical visualization of sequence diagrams from structured log files. While most of the examples presented herein are discussed in terms of a single log file, in practically every instance the tools 100 can apply equally to multiple related log files, such as the separate log file outputs from multiple hardware and/or software components acting in concert. Traditional sequence diagrams visualize interactions as arrows and local activities as “activate” blocks (rectangles on the life line of an entity).
- the tool 100 represents events from the structured log files with graphical icons 106 , 108 or arrows 104 specific to the event type, and supplemented by additional metadata when needed.
- the additional metadata can include text in a popup, tooltip, or rollover, sounds, video clips, more detailed or larger graphical icons, an additional graphical emphasis on related events or relationships such as a blinking icon, a wobbly icon, a highlighted icon, and so forth.
- the tool 100 can render, instead of a straight wall of text entries from the log file, a graphically enhanced presentation of the data in the log file.
- the graphical enhancements can demonstrate relationships between collections of entries in the log file.
- the enhanced log file 102 of FIG. 1 visualizes interactions of two entities.
- the first entity is a state machine.
- the first visible event is a triangle, identifying the birth of the state machine.
- Below the birth of the state machine is an incoming interaction with a thunderbolt-shaped icon, representing a state machine event received by the state machine, which will cause a transition to be taken.
- the next, larger circle represents the event of leaving or entering a state of the state machine. Arrows represent taken transitions. So in this example, the state machine leaves the “start” state and enters the “wait_active” state due to event “pm_go_active_ev”. In taking the transition, the state machine performs some additional actions, one of which is sending a particular type of message (CAPI) to the second entity.
- CAPI particular type of message
- the second entity is not a state machine, but a thread.
- the thread sends and receives various CAPI messages, but also it initiates and completes an asynchronous connection, as indicated by the icons with labels “connecting to . . . ” and “connected to . . . ”.
- a user aware of the particular domain specific notation used can quickly identify different type of events such as state machines interactions, reception of state machine events, sending/receiving CAPI messages, initiation/completion of interactions.
- FIG. 2 illustrates a block diagram of an example system 200 for enhancing log files with graphical elements.
- the system 200 can include tool 100 as in FIG. 1 in the form of a log file viewer 204 or similar software application.
- the viewer 204 receives a structured log file 202 , whether loaded directly from a locally or remotely stored file, or streamed over a network, for example.
- the viewer can consult a templates database 206 for supported log file types.
- the templates database 206 can define different relationships and types of events to highlight, as well as rules for recognizing the relationships and rules for enhancing the presentation of the log file according to the various templates.
- the viewer 204 can also retrieve icons or graphical elements from an icon database 208 .
- the icon database 208 and the templates database 206 can be related, such as the templates database 206 indicating a preferred or default set of corresponding icons in the icon database 208 .
- the viewer 204 can receive user input to select a specific template and/or set of icons.
- the viewer 204 then overlays one or more icon or graphical element from the icon database 208 over at least part of the log file 202 on a display 210 or as graphical output to a video or image file.
- the viewer 204 can have no knowledge a priori regarding the particular event types and their graphical representation.
- the viewer 204 can discover event types in the log file 202 and look for an icon corresponding to that event type in the icon database 208 or icon directory.
- the icon database can be a list of image files, such as PNG files corresponding to event files based on the file name. For example, a PNG file for an event file entry “pm_go_active_ev” can be named “pm_go_active_ev.PNG,” and a PNG file for an event file entry “wait_active” can be named “wait_active.PNG.”
- the viewer 204 can provide a domain-specific graphical representation of events while remaining a generic tool able to display different types of events.
- a user can specify a specific type perspective of the log file 202 that is of interest.
- a single type of log file can be presented differently to emphasize different aspects of the events contained therein that may be meaningful to different users.
- a domain-specific graphical representation of network logs may highlight different events and relationships for a network security engineer than for a quality of service performance analyst, even though the underlying event logs contain the same information.
- This domain-specific graphical representation can highly enhance the visual separation of information and further facilitate interpretation of diagrams derived from structured log files.
- the viewer 204 can provide an increased ability to visually navigate an extended sequence diagram, and can graphically identify regions of interest based on visual clues.
- the viewer 204 can allow a user to load different domain-specific sets of visual clues to be used with domain specific logs/traces, without modifying the tool.
- the viewer 204 can improve visual inspection of graphical representation of logs, resulting increased ease of debugging a system.
- the viewer allows the user to assign specific icons or visual cues to different types of state transitions in a state diagram generated from one or more structured log files.
- FIG. 3 illustrates an example traditional log file 300 .
- the entries are simply a listing of text events. While this log file 300 contains a very simplistic set of log entries for device 1 , device 2 , and device 3 , the log file 300 can include many other details, such as a timestamp, a thread ID, a username, a message or descriptor, a status, a permission level, a network address, a unique identifier, a file name, a computer name, and so forth.
- FIG. 4 illustrates an example enhanced version of a state machine 400 based on the log file of FIG. 3 .
- the state machine 400 identifies the three entities, device 1 , device 2 , and device 3 , in the structured log and organizes events for the three entities into three corresponding columns 402 , 404 , 406 .
- the state machine 400 shows an arrow 408 from device 1 event 1 to device 2 event 1 , signifying a request for device 2 to perform an action.
- Lightning bolt 410 represents device 2 attempting to perform the requested action.
- the cross 412 and arrow from device 2 event 2 represent reporting a failure to perform the requested action.
- device 1 event 3 sends a request, represented by a bold arrow, to device 3 to perform a different action. After receiving the request, device 3 performs the requested action, indicated by database icon 414 . Then device 3 can report success to device 1 with a circle icon 420 . However, in the intervening time device 3 took to perform the action, device 1 sends another request to device 2 to re-perform the previously failed action, represented as the second lightning bolt 416 . This time, device 2 succeeds and reports accordingly, as indicated by the circle 418 .
- the actions and behaviors of this portion of a state machine 400 are far more understandable than the straight, unannotated text of FIG. 3 .
- the enhanced display 400 can allow for interactions, as well. For example, a user can click on an icon, such as icon 414 to view more details from the underlying event logs.
- the system rendering the graphical representations can be separated from the graphical elements themselves, so alternate graphical representations are pluggable for different domains.
- the system can display different logs with different icon sets specific to that tool, event, or communication type. Users can customize and share different libraries of icons and patterns for interpreting log files. In this way, a first user can create or modify one set of icons and share that set of icons with other users, who can, in turn, also modify the set of icons.
- the system can incorporate an icon library hosting feature to share icon libraries with other users, or to search a server hosting different icon libraries. Alternatively, users can create or download other icon libraries and install them in the system, or simply save them on a local machine for later use.
- FIG. 5 For the sake of clarity, the method is described in terms of an exemplary system 600 as shown in FIG. 6 configured to practice the method.
- the steps outlined herein are exemplary and can be implemented in any combination thereof, including combinations that exclude, add, or modify certain steps.
- a system configured according to this disclosure can track events of a computing entity ( 502 ).
- the computing entity can be a state machine, a virtual machine, a thread, a process, a software component, a logical entity, or a hardware component.
- the computing entity can be any device that generates or contributes to an event log.
- the events can be tracked from at least one of a structured log file and a stream of event data, for example.
- the system can identify event types for the events ( 504 ).
- the system can identify relationships between the events ( 506 ).
- the system can generate a sequence diagram of the events, wherein the sequence diagram includes visual indications of the relationships based on the event types ( 508 ).
- the system can further select an icon for each event from an event directory based on event type.
- the icons can be selected from an event-specific icon directory.
- the system can optionally receive user input to switch from a first icon set to a second icon set, wherein each of the first icon set and the second icon set targets a different domain with different, domain-specific visual cues, and transition the visual indications based on the second icon set.
- the system can identify a region of interest within the sequence diagram, and highlight the region of interest with a visual indicator.
- the region of interest can be identified based on at least one of user input, a user profile, and data contained in a file associated with the events.
- the system can render at least a portion of the sequence diagram on a display, and present controls on the display for a user to visually navigate within the sequence diagram, such as scrolling, zooming in and out, selecting one or more element of the sequence diagram, drill down to the associated underlying log file data for a particular graphical element, search for other instances of a particular pattern of interaction, and so forth.
- the user can toggle display of all or part of the graphical elements, in order to view the underlying data in an unmodified or non-enhanced form.
- the system can look in the log file for clues or directives for where to find appropriate sets of icons for enhanced display of that log file.
- the log file can include a URL to an icon set repository for use with that type of log file.
- the system can use pattern recognition or some other recognition mechanism to determine a type of log file, and automatically find an appropriate library of icons for use with that log file.
- the system can generate and display a legend describing the meanings of the various icons in the enhanced graphical display of the log file.
- FIG. 6 A brief description of a basic general purpose system or computing device in FIG. 6 which can be employed to practice the concepts, methods, and techniques disclosed is illustrated. These variations shall be described herein as the various embodiments are set forth. The disclosure now turns to FIG. 6 .
- an exemplary system and/or computing device 600 includes a processing unit (CPU or processor) 620 and a system bus 610 that couples various system components including the system memory 630 such as read only memory (ROM) 640 and random access memory (RAM) 650 to the processor 620 .
- the system 600 can include a cache 622 of high-speed memory connected directly with, in close proximity to, or integrated as part of the processor 620 .
- the system 600 copies data from the memory 630 and/or the storage device 660 to the cache 622 for quick access by the processor 620 . In this way, the cache provides a performance boost that avoids processor 620 delays while waiting for data.
- These and other modules can control or be configured to control the processor 620 to perform various operations or actions.
- the memory 630 may be available for use as well.
- the memory 630 can include multiple different types of memory with different performance characteristics. It can be appreciated that the disclosure may operate on a computing device 600 with more than one processor 620 or on a group or cluster of computing devices networked together to provide greater processing capability.
- the processor 620 can include any general purpose processor and a hardware module or software module, such as module 1 662 , module 2 664 , and module 3 666 stored in storage device 660 , configured to control the processor 620 as well as a special-purpose processor where software instructions are incorporated into the processor.
- the processor 620 may be a self-contained computing system, containing multiple cores or processors, a bus, memory controller, cache, etc.
- a multi-core processor may be symmetric or asymmetric.
- the processor 620 can include multiple processors, such as a system having multiple, physically separate processors in different sockets, or a system having multiple processor cores on a single physical chip. Similarly, the processor 620 can include multiple distributed processors located in multiple separate computing devices, but working together such as via a communications network. Multiple processors or processor cores can share resources such as memory 630 or the cache 622 , or can operate using independent resources.
- the processor 620 can include one or more of a state machine, an application specific integrated circuit (ASIC), or a programmable gate array (PGA) including a field PGA.
- ASIC application specific integrated circuit
- PGA programmable gate array
- the system bus 610 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures.
- a basic input/output (BIOS) stored in ROM 640 or the like may provide the basic routine that helps to transfer information between elements within the computing device 600 , such as during start-up.
- the computing device 600 further includes storage devices 660 or computer-readable storage media such as a hard disk drive, a magnetic disk drive, an optical disk drive, tape drive, solid-state drive, RAM drive, removable storage devices, a redundant array of inexpensive disks (RAID), hybrid storage device, or the like.
- the storage device 660 can include software modules 662 , 664 , 666 for controlling the processor 620 .
- the system 600 can include other hardware or software modules.
- the storage device 660 is connected to the system bus 610 by a drive interface.
- the drives and the associated computer-readable storage devices provide nonvolatile storage of computer-readable instructions, data structures, program modules and other data for the computing device 600 .
- a hardware module that performs a particular function includes the software component stored in a tangible computer-readable storage device in connection with the necessary hardware components, such as the processor 620 , bus 610 , display 670 , and so forth, to carry out a particular function.
- the system can use a processor and computer-readable storage device to store instructions which, when executed by the processor, cause the processor to perform operations, a method or other specific actions.
- the basic components and appropriate variations can be modified depending on the type of device, such as whether the device 600 is a small, handheld computing device, a desktop computer, or a computer server.
- the processor 620 executes instructions to perform “operations”, the processor 620 can perform the operations directly and/or facilitate, direct, or cooperate with another device or component to perform the operations.
- exemplary embodiment(s) described herein employs the hard disk 660
- other types of computer-readable storage devices which can store data that are accessible by a computer, such as magnetic cassettes, flash memory cards, digital versatile disks (DVDs), cartridges, random access memories (RAMs) 650 , read only memory (ROM) 640 , a cable containing a bit stream and the like, may also be used in the exemplary operating environment.
- Tangible computer-readable storage media, computer-readable storage devices, or computer-readable memory devices expressly exclude media such as transitory waves, energy, carrier signals, electromagnetic waves, and signals per se.
- an input device 690 represents any number of input mechanisms, such as a microphone for speech, a touch-sensitive screen for gesture or graphical input, keyboard, mouse, motion input, speech and so forth.
- An output device 670 can also be one or more of a number of output mechanisms known to those of skill in the art.
- multimodal systems enable a user to provide multiple types of input to communicate with the computing device 600 .
- the communications interface 680 generally governs and manages the user input and system output. There is no restriction on operating on any particular hardware arrangement and therefore the basic hardware depicted may easily be substituted for improved hardware or firmware arrangements as they are developed.
- the illustrative system embodiment is presented as including individual functional blocks including functional blocks labeled as a “processor” or processor 620 .
- the functions these blocks represent may be provided through the use of either shared or dedicated hardware, including, but not limited to, hardware capable of executing software and hardware, such as a processor 620 , that is purpose-built to operate as an equivalent to software executing on a general purpose processor.
- a processor 620
- the functions of one or more processors presented in FIG. 6 may be provided by a single shared processor or multiple processors.
- Illustrative embodiments may include microprocessor and/or digital signal processor (DSP) hardware, read-only memory (ROM) 640 for storing software performing the operations described below, and random access memory (RAM) 650 for storing results.
- DSP digital signal processor
- ROM read-only memory
- RAM random access memory
- VLSI Very large scale integration
- the logical operations of the various embodiments are implemented as: (1) a sequence of computer implemented steps, operations, or procedures running on a programmable circuit within a general use computer, (2) a sequence of computer implemented steps, operations, or procedures running on a specific-use programmable circuit; and/or (3) interconnected machine modules or program engines within the programmable circuits.
- the system 600 shown in FIG. 6 can practice all or part of the recited methods, can be a part of the recited systems, and/or can operate according to instructions in the recited tangible computer-readable storage devices.
- Such logical operations can be implemented as modules configured to control the processor 620 to perform particular functions according to the programming of the module. For example, FIG.
- Mod 1 662 illustrates three modules Mod 1 662 , Mod 2 664 and Mod 3 666 which are modules configured to control the processor 620 . These modules may be stored on the storage device 660 and loaded into RAM 650 or memory 630 at runtime or may be stored in other computer-readable memory locations.
- a virtual processor can be a software object that executes according to a particular instruction set, even when a physical processor of the same type as the virtual processor is unavailable.
- a virtualization layer or a virtual “host” can enable virtualized components of one or more different computing devices or device types by translating virtualized operations to actual operations.
- virtualized hardware of every type is implemented or executed by some underlying physical hardware.
- a virtualization compute layer can operate on top of a physical compute layer.
- the virtualization compute layer can include one or more of a virtual machine, an overlay network, a hypervisor, virtual switching, and any other virtualization application.
- the processor 620 can include all types of processors disclosed herein, including a virtual processor. However, when referring to a virtual processor, the processor 620 includes the software components associated with executing the virtual processor in a virtualization layer and underlying hardware necessary to execute the virtualization layer.
- the system 600 can include a physical or virtual processor 620 that receive instructions stored in a computer-readable storage device, which cause the processor 620 to perform certain operations. When referring to a virtual processor 620 , the system also includes the underlying physical hardware executing the virtual processor 620 .
- Embodiments within the scope of the present disclosure may also include tangible and/or non-transitory computer-readable storage devices for carrying or having computer-executable instructions or data structures stored thereon.
- Such tangible computer-readable storage devices can be any available device that can be accessed by a general purpose or special purpose computer, including the functional design of any special purpose processor as described above.
- such tangible computer-readable devices can include RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other device which can be used to carry or store desired program code in the form of computer-executable instructions, data structures, or processor chip design.
- Computer-executable instructions include, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions.
- Computer-executable instructions also include program modules that are executed by computers in stand-alone or network environments.
- program modules include routines, programs, components, data structures, objects, and the functions inherent in the design of special-purpose processors, etc. that perform particular tasks or implement particular abstract data types.
- Computer-executable instructions, associated data structures, and program modules represent examples of the program code means for executing steps of the methods disclosed herein. The particular sequence of such executable instructions or associated data structures represents examples of corresponding acts for implementing the functions described in such steps.
- Embodiments of the disclosure may be practiced in network computing environments with many types of computer system configurations, including personal computers, hand-held devices, multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, network routers, wearable devices, and the like.
- Embodiments may also be practiced in distributed computing environments where tasks are performed by local and remote processing devices that are linked (either by hardwired links, wireless links, or by a combination thereof) through a communications network.
- program modules may be located in both local and remote memory storage devices.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Quality & Reliability (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- Library & Information Science (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Software Systems (AREA)
- Debugging And Monitoring (AREA)
Abstract
Description
- This application is a continuation of U.S. patent application Ser. No. 14/796,289 filed on Jul. 10, 2015, the contents of which is incorporated by reference in its entirety.
- The present disclosure relates to visualizing log files and more specifically to domain-specific visualizations of log files to be more understandable to a human viewer.
- Distributed and concurrent systems can implement complex control flows spawning multiple concurrent components. For example, in the context of Openstack a northbound API request to create a virtual machine (VM) is implemented by various components handling different concerns, such as authentication, networking, VM spawning. Potentially each component in the system can produce log files or traces. Analyzing a particular flow execution requires inspection and correlation of multiple such files, which is not particularly suitable to a human being.
- One common way to represent flow information for concurrent systems is sequence diagrams. Sequence diagram are an UML technique originally intended to capture flows and interactions at design time. Some tools can generate sequence diagrams out of traces or logs collected from a running system. However the amount of information visualized is typically much greater, and can include multiple flows interlaced with each other. This representation of sequence diagrams is mostly concerned with depicting interactions and activity blocks, and does not provide any type of visual clues to allow rapid identification of desired flows. Thus, the amount of information is simply overwhelming and, though all the information is displayed, the significance or meaning of the information is difficult for humans to decipher.
-
FIG. 1 illustrates an example enhanced log file; -
FIG. 2 illustrates a block diagram of an example system for enhancing log files; -
FIG. 3 illustrates an example traditional log file; -
FIG. 4 illustrates an example enhanced version of a state machine based on the log file ofFIG. 3 ; -
FIG. 5 illustrates an example method embodiment; and -
FIG. 6 illustrates an example system embodiment. - A system, method and computer-readable storage devices are disclosed which visually enhance sequence diagrams to facilitate visual inspection when diagrams include a large amount of information, such as sequence diagrams automatically constructed from log or trace files.
-
FIG. 1 illustrates an example enhancedlog file 102 in anexample software tool 100 for graphical visualization of sequence diagrams from structured log files. While most of the examples presented herein are discussed in terms of a single log file, in practically every instance thetools 100 can apply equally to multiple related log files, such as the separate log file outputs from multiple hardware and/or software components acting in concert. Traditional sequence diagrams visualize interactions as arrows and local activities as “activate” blocks (rectangles on the life line of an entity). Thetool 100 represents events from the structured log files withgraphical icons arrows 104 specific to the event type, and supplemented by additional metadata when needed. The additional metadata can include text in a popup, tooltip, or rollover, sounds, video clips, more detailed or larger graphical icons, an additional graphical emphasis on related events or relationships such as a blinking icon, a wobbly icon, a highlighted icon, and so forth. Thus, thetool 100 can render, instead of a straight wall of text entries from the log file, a graphically enhanced presentation of the data in the log file. The graphical enhancements can demonstrate relationships between collections of entries in the log file. - For example, the enhanced
log file 102 ofFIG. 1 visualizes interactions of two entities. The first entity is a state machine. The first visible event is a triangle, identifying the birth of the state machine. Below the birth of the state machine is an incoming interaction with a thunderbolt-shaped icon, representing a state machine event received by the state machine, which will cause a transition to be taken. The next, larger circle represents the event of leaving or entering a state of the state machine. Arrows represent taken transitions. So in this example, the state machine leaves the “start” state and enters the “wait_active” state due to event “pm_go_active_ev”. In taking the transition, the state machine performs some additional actions, one of which is sending a particular type of message (CAPI) to the second entity. - The second entity is not a state machine, but a thread. The thread sends and receives various CAPI messages, but also it initiates and completes an asynchronous connection, as indicated by the icons with labels “connecting to . . . ” and “connected to . . . ”. As shown, a user aware of the particular domain specific notation used can quickly identify different type of events such as state machines interactions, reception of state machine events, sending/receiving CAPI messages, initiation/completion of interactions.
-
FIG. 2 illustrates a block diagram of anexample system 200 for enhancing log files with graphical elements. Thesystem 200 can includetool 100 as inFIG. 1 in the form of alog file viewer 204 or similar software application. Theviewer 204 receives astructured log file 202, whether loaded directly from a locally or remotely stored file, or streamed over a network, for example. The viewer can consult atemplates database 206 for supported log file types. Thetemplates database 206 can define different relationships and types of events to highlight, as well as rules for recognizing the relationships and rules for enhancing the presentation of the log file according to the various templates. Theviewer 204 can also retrieve icons or graphical elements from anicon database 208. Theicon database 208 and thetemplates database 206 can be related, such as thetemplates database 206 indicating a preferred or default set of corresponding icons in theicon database 208. However, theviewer 204 can receive user input to select a specific template and/or set of icons. Theviewer 204 then overlays one or more icon or graphical element from theicon database 208 over at least part of thelog file 202 on adisplay 210 or as graphical output to a video or image file. - In order to keep the
viewer 204 more generically applicable to different types of event logs and structured log files, theviewer 204 can have no knowledge a priori regarding the particular event types and their graphical representation. When loading alog file 202, theviewer 204 can discover event types in thelog file 202 and look for an icon corresponding to that event type in theicon database 208 or icon directory. The icon database can be a list of image files, such as PNG files corresponding to event files based on the file name. For example, a PNG file for an event file entry “pm_go_active_ev” can be named “pm_go_active_ev.PNG,” and a PNG file for an event file entry “wait_active” can be named “wait_active.PNG.” - Thus, the
viewer 204 can provide a domain-specific graphical representation of events while remaining a generic tool able to display different types of events. Further, a user can specify a specific type perspective of thelog file 202 that is of interest. A single type of log file can be presented differently to emphasize different aspects of the events contained therein that may be meaningful to different users. For example, a domain-specific graphical representation of network logs may highlight different events and relationships for a network security engineer than for a quality of service performance analyst, even though the underlying event logs contain the same information. This domain-specific graphical representation can highly enhance the visual separation of information and further facilitate interpretation of diagrams derived from structured log files. - The
viewer 204 can provide an increased ability to visually navigate an extended sequence diagram, and can graphically identify regions of interest based on visual clues. Theviewer 204 can allow a user to load different domain-specific sets of visual clues to be used with domain specific logs/traces, without modifying the tool. Theviewer 204 can improve visual inspection of graphical representation of logs, resulting increased ease of debugging a system. The viewer allows the user to assign specific icons or visual cues to different types of state transitions in a state diagram generated from one or more structured log files. -
FIG. 3 illustrates an exampletraditional log file 300. In thistraditional log file 300, the entries are simply a listing of text events. While this log file 300 contains a very simplistic set of log entries for device1, device2, and device3, thelog file 300 can include many other details, such as a timestamp, a thread ID, a username, a message or descriptor, a status, a permission level, a network address, a unique identifier, a file name, a computer name, and so forth. -
FIG. 4 illustrates an example enhanced version of astate machine 400 based on the log file ofFIG. 3 . In this example, thestate machine 400 identifies the three entities, device1, device2, and device3, in the structured log and organizes events for the three entities into three correspondingcolumns state machine 400 shows anarrow 408 from device1 event1 to device2 event1, signifying a request for device2 to perform an action.Lightning bolt 410 represents device2 attempting to perform the requested action. Thecross 412 and arrow from device2 event2 represent reporting a failure to perform the requested action. However, before receiving the report of a failure, device1 event3 sends a request, represented by a bold arrow, to device3 to perform a different action. After receiving the request, device3 performs the requested action, indicated bydatabase icon 414. Then device3 can report success to device1 with acircle icon 420. However, in the intervening time device3 took to perform the action, device1 sends another request to device2 to re-perform the previously failed action, represented as thesecond lightning bolt 416. This time, device2 succeeds and reports accordingly, as indicated by thecircle 418. The actions and behaviors of this portion of astate machine 400 are far more understandable than the straight, unannotated text ofFIG. 3 . Theenhanced display 400 can allow for interactions, as well. For example, a user can click on an icon, such asicon 414 to view more details from the underlying event logs. - This approach enables the user to apply a wider set of graphical representations which are more easily recognizable at a glance, so the user can quickly navigate the format and isolate the desired parts. The system rendering the graphical representations can be separated from the graphical elements themselves, so alternate graphical representations are pluggable for different domains. The system can display different logs with different icon sets specific to that tool, event, or communication type. Users can customize and share different libraries of icons and patterns for interpreting log files. In this way, a first user can create or modify one set of icons and share that set of icons with other users, who can, in turn, also modify the set of icons. The system can incorporate an icon library hosting feature to share icon libraries with other users, or to search a server hosting different icon libraries. Alternatively, users can create or download other icon libraries and install them in the system, or simply save them on a local machine for later use.
- Having disclosed some basic system components and concepts, the disclosure now turns to the exemplary method embodiment shown in
FIG. 5 . For the sake of clarity, the method is described in terms of anexemplary system 600 as shown inFIG. 6 configured to practice the method. The steps outlined herein are exemplary and can be implemented in any combination thereof, including combinations that exclude, add, or modify certain steps. - A system configured according to this disclosure can track events of a computing entity (502). The computing entity can be a state machine, a virtual machine, a thread, a process, a software component, a logical entity, or a hardware component. The computing entity can be any device that generates or contributes to an event log. The events can be tracked from at least one of a structured log file and a stream of event data, for example. The system can identify event types for the events (504). The system can identify relationships between the events (506). Then the system can generate a sequence diagram of the events, wherein the sequence diagram includes visual indications of the relationships based on the event types (508). The system can further select an icon for each event from an event directory based on event type. The icons can be selected from an event-specific icon directory. The system can optionally receive user input to switch from a first icon set to a second icon set, wherein each of the first icon set and the second icon set targets a different domain with different, domain-specific visual cues, and transition the visual indications based on the second icon set. The system can identify a region of interest within the sequence diagram, and highlight the region of interest with a visual indicator. The region of interest can be identified based on at least one of user input, a user profile, and data contained in a file associated with the events.
- The system can render at least a portion of the sequence diagram on a display, and present controls on the display for a user to visually navigate within the sequence diagram, such as scrolling, zooming in and out, selecting one or more element of the sequence diagram, drill down to the associated underlying log file data for a particular graphical element, search for other instances of a particular pattern of interaction, and so forth. The user can toggle display of all or part of the graphical elements, in order to view the underlying data in an unmodified or non-enhanced form.
- In one variation, the system can look in the log file for clues or directives for where to find appropriate sets of icons for enhanced display of that log file. For example, the log file can include a URL to an icon set repository for use with that type of log file. Alternatively, the system can use pattern recognition or some other recognition mechanism to determine a type of log file, and automatically find an appropriate library of icons for use with that log file. The system can generate and display a legend describing the meanings of the various icons in the enhanced graphical display of the log file.
- Various embodiments of the disclosure are described in detail below. While specific implementations are described, it should be understood that this is done for illustration purposes only. Other components and configurations may be used without parting from the spirit and scope of the disclosure.
- A brief description of a basic general purpose system or computing device in
FIG. 6 which can be employed to practice the concepts, methods, and techniques disclosed is illustrated. These variations shall be described herein as the various embodiments are set forth. The disclosure now turns toFIG. 6 . - With reference to
FIG. 6 , an exemplary system and/orcomputing device 600 includes a processing unit (CPU or processor) 620 and asystem bus 610 that couples various system components including thesystem memory 630 such as read only memory (ROM) 640 and random access memory (RAM) 650 to theprocessor 620. Thesystem 600 can include acache 622 of high-speed memory connected directly with, in close proximity to, or integrated as part of theprocessor 620. Thesystem 600 copies data from thememory 630 and/or thestorage device 660 to thecache 622 for quick access by theprocessor 620. In this way, the cache provides a performance boost that avoidsprocessor 620 delays while waiting for data. These and other modules can control or be configured to control theprocessor 620 to perform various operations or actions.Other system memory 630 may be available for use as well. Thememory 630 can include multiple different types of memory with different performance characteristics. It can be appreciated that the disclosure may operate on acomputing device 600 with more than oneprocessor 620 or on a group or cluster of computing devices networked together to provide greater processing capability. Theprocessor 620 can include any general purpose processor and a hardware module or software module, such asmodule 1 662,module 2 664, andmodule 3 666 stored instorage device 660, configured to control theprocessor 620 as well as a special-purpose processor where software instructions are incorporated into the processor. Theprocessor 620 may be a self-contained computing system, containing multiple cores or processors, a bus, memory controller, cache, etc. A multi-core processor may be symmetric or asymmetric. Theprocessor 620 can include multiple processors, such as a system having multiple, physically separate processors in different sockets, or a system having multiple processor cores on a single physical chip. Similarly, theprocessor 620 can include multiple distributed processors located in multiple separate computing devices, but working together such as via a communications network. Multiple processors or processor cores can share resources such asmemory 630 or thecache 622, or can operate using independent resources. Theprocessor 620 can include one or more of a state machine, an application specific integrated circuit (ASIC), or a programmable gate array (PGA) including a field PGA. - The
system bus 610 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. A basic input/output (BIOS) stored inROM 640 or the like, may provide the basic routine that helps to transfer information between elements within thecomputing device 600, such as during start-up. Thecomputing device 600 further includesstorage devices 660 or computer-readable storage media such as a hard disk drive, a magnetic disk drive, an optical disk drive, tape drive, solid-state drive, RAM drive, removable storage devices, a redundant array of inexpensive disks (RAID), hybrid storage device, or the like. Thestorage device 660 can includesoftware modules processor 620. Thesystem 600 can include other hardware or software modules. Thestorage device 660 is connected to thesystem bus 610 by a drive interface. The drives and the associated computer-readable storage devices provide nonvolatile storage of computer-readable instructions, data structures, program modules and other data for thecomputing device 600. In one aspect, a hardware module that performs a particular function includes the software component stored in a tangible computer-readable storage device in connection with the necessary hardware components, such as theprocessor 620,bus 610,display 670, and so forth, to carry out a particular function. In another aspect, the system can use a processor and computer-readable storage device to store instructions which, when executed by the processor, cause the processor to perform operations, a method or other specific actions. The basic components and appropriate variations can be modified depending on the type of device, such as whether thedevice 600 is a small, handheld computing device, a desktop computer, or a computer server. When theprocessor 620 executes instructions to perform “operations”, theprocessor 620 can perform the operations directly and/or facilitate, direct, or cooperate with another device or component to perform the operations. - Although the exemplary embodiment(s) described herein employs the
hard disk 660, other types of computer-readable storage devices which can store data that are accessible by a computer, such as magnetic cassettes, flash memory cards, digital versatile disks (DVDs), cartridges, random access memories (RAMs) 650, read only memory (ROM) 640, a cable containing a bit stream and the like, may also be used in the exemplary operating environment. Tangible computer-readable storage media, computer-readable storage devices, or computer-readable memory devices, expressly exclude media such as transitory waves, energy, carrier signals, electromagnetic waves, and signals per se. - To enable user interaction with the
computing device 600, aninput device 690 represents any number of input mechanisms, such as a microphone for speech, a touch-sensitive screen for gesture or graphical input, keyboard, mouse, motion input, speech and so forth. Anoutput device 670 can also be one or more of a number of output mechanisms known to those of skill in the art. In some instances, multimodal systems enable a user to provide multiple types of input to communicate with thecomputing device 600. Thecommunications interface 680 generally governs and manages the user input and system output. There is no restriction on operating on any particular hardware arrangement and therefore the basic hardware depicted may easily be substituted for improved hardware or firmware arrangements as they are developed. - For clarity of explanation, the illustrative system embodiment is presented as including individual functional blocks including functional blocks labeled as a “processor” or
processor 620. The functions these blocks represent may be provided through the use of either shared or dedicated hardware, including, but not limited to, hardware capable of executing software and hardware, such as aprocessor 620, that is purpose-built to operate as an equivalent to software executing on a general purpose processor. For example the functions of one or more processors presented inFIG. 6 may be provided by a single shared processor or multiple processors. (Use of the term “processor” should not be construed to refer exclusively to hardware capable of executing software.) Illustrative embodiments may include microprocessor and/or digital signal processor (DSP) hardware, read-only memory (ROM) 640 for storing software performing the operations described below, and random access memory (RAM) 650 for storing results. Very large scale integration (VLSI) hardware embodiments, as well as custom VLSI circuitry in combination with a general purpose DSP circuit, may also be provided. - The logical operations of the various embodiments are implemented as: (1) a sequence of computer implemented steps, operations, or procedures running on a programmable circuit within a general use computer, (2) a sequence of computer implemented steps, operations, or procedures running on a specific-use programmable circuit; and/or (3) interconnected machine modules or program engines within the programmable circuits. The
system 600 shown inFIG. 6 can practice all or part of the recited methods, can be a part of the recited systems, and/or can operate according to instructions in the recited tangible computer-readable storage devices. Such logical operations can be implemented as modules configured to control theprocessor 620 to perform particular functions according to the programming of the module. For example,FIG. 6 illustrates threemodules Mod1 662,Mod2 664 andMod3 666 which are modules configured to control theprocessor 620. These modules may be stored on thestorage device 660 and loaded intoRAM 650 ormemory 630 at runtime or may be stored in other computer-readable memory locations. - One or more parts of the
example computing device 600, up to and including theentire computing device 600, can be virtualized. For example, a virtual processor can be a software object that executes according to a particular instruction set, even when a physical processor of the same type as the virtual processor is unavailable. A virtualization layer or a virtual “host” can enable virtualized components of one or more different computing devices or device types by translating virtualized operations to actual operations. Ultimately however, virtualized hardware of every type is implemented or executed by some underlying physical hardware. Thus, a virtualization compute layer can operate on top of a physical compute layer. The virtualization compute layer can include one or more of a virtual machine, an overlay network, a hypervisor, virtual switching, and any other virtualization application. - The
processor 620 can include all types of processors disclosed herein, including a virtual processor. However, when referring to a virtual processor, theprocessor 620 includes the software components associated with executing the virtual processor in a virtualization layer and underlying hardware necessary to execute the virtualization layer. Thesystem 600 can include a physical orvirtual processor 620 that receive instructions stored in a computer-readable storage device, which cause theprocessor 620 to perform certain operations. When referring to avirtual processor 620, the system also includes the underlying physical hardware executing thevirtual processor 620. - Embodiments within the scope of the present disclosure may also include tangible and/or non-transitory computer-readable storage devices for carrying or having computer-executable instructions or data structures stored thereon. Such tangible computer-readable storage devices can be any available device that can be accessed by a general purpose or special purpose computer, including the functional design of any special purpose processor as described above. By way of example, and not limitation, such tangible computer-readable devices can include RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other device which can be used to carry or store desired program code in the form of computer-executable instructions, data structures, or processor chip design. When information or instructions are provided via a network or another communications connection (either hardwired, wireless, or combination thereof) to a computer, the computer properly views the connection as a computer-readable medium. Thus, any such connection is properly termed a computer-readable medium. Combinations of the above should also be included within the scope of the computer-readable storage devices.
- Computer-executable instructions include, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions. Computer-executable instructions also include program modules that are executed by computers in stand-alone or network environments. Generally, program modules include routines, programs, components, data structures, objects, and the functions inherent in the design of special-purpose processors, etc. that perform particular tasks or implement particular abstract data types. Computer-executable instructions, associated data structures, and program modules represent examples of the program code means for executing steps of the methods disclosed herein. The particular sequence of such executable instructions or associated data structures represents examples of corresponding acts for implementing the functions described in such steps.
- Other embodiments of the disclosure may be practiced in network computing environments with many types of computer system configurations, including personal computers, hand-held devices, multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, network routers, wearable devices, and the like. Embodiments may also be practiced in distributed computing environments where tasks are performed by local and remote processing devices that are linked (either by hardwired links, wireless links, or by a combination thereof) through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.
- The various embodiments described above are provided by way of illustration only and should not be construed to limit the scope of the disclosure. Various modifications and changes may be made to the principles described herein without following the example embodiments and applications illustrated and described herein, and without departing from the spirit and scope of the disclosure. Claim language reciting “at least one of” a set indicates that one member of the set or multiple members of the set satisfy the claim.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/846,207 US20200241992A1 (en) | 2015-07-10 | 2020-04-10 | System and method for dynamic domain-specific sequence diagram visualization |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/796,289 US10621063B2 (en) | 2015-07-10 | 2015-07-10 | System and method for dynamic domain-specific sequence diagram visualization |
US16/846,207 US20200241992A1 (en) | 2015-07-10 | 2020-04-10 | System and method for dynamic domain-specific sequence diagram visualization |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/796,289 Continuation US10621063B2 (en) | 2015-07-10 | 2015-07-10 | System and method for dynamic domain-specific sequence diagram visualization |
Publications (1)
Publication Number | Publication Date |
---|---|
US20200241992A1 true US20200241992A1 (en) | 2020-07-30 |
Family
ID=57730128
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/796,289 Active 2036-08-07 US10621063B2 (en) | 2015-07-10 | 2015-07-10 | System and method for dynamic domain-specific sequence diagram visualization |
US16/846,207 Abandoned US20200241992A1 (en) | 2015-07-10 | 2020-04-10 | System and method for dynamic domain-specific sequence diagram visualization |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/796,289 Active 2036-08-07 US10621063B2 (en) | 2015-07-10 | 2015-07-10 | System and method for dynamic domain-specific sequence diagram visualization |
Country Status (1)
Country | Link |
---|---|
US (2) | US10621063B2 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110574012B (en) * | 2017-02-08 | 2021-05-18 | 华为技术有限公司 | Fault management system and method using distributed execution tracing |
CN109213822A (en) * | 2018-08-31 | 2019-01-15 | 深圳壹账通智能科技有限公司 | The rendering method and device of monitoring data |
CN110764669B (en) * | 2019-10-18 | 2023-06-27 | 上海仪电(集团)有限公司中央研究院 | OpenStack Horizon-class accordion-style-based sidebar implementation method |
CN110851324B (en) * | 2019-10-25 | 2023-03-21 | 泰康保险集团股份有限公司 | Log-based routing inspection processing method and device, electronic equipment and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120124504A1 (en) * | 2010-11-12 | 2012-05-17 | Microsoft Corporation | Debugging in a multi-processing environment |
US20140013317A1 (en) * | 2012-07-03 | 2014-01-09 | Fujitsu Limited | Computer-readable recording medium, patch determination method, and information processing apparatus |
US20150106324A1 (en) * | 2013-10-11 | 2015-04-16 | Accenture Global Services Limited | Contextual graph matching based anomaly detection |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6807583B2 (en) | 1997-09-24 | 2004-10-19 | Carleton University | Method of determining causal connections between events recorded during process execution |
KR100311231B1 (en) | 1998-08-11 | 2001-11-30 | 오길록 | Apparatus and method for framework modeling with object-oriented analytic information |
US7516209B2 (en) | 2003-06-27 | 2009-04-07 | Microsoft Corporation | Method and framework for tracking/logging completion of requests in a computer system |
WO2005008433A2 (en) * | 2003-07-11 | 2005-01-27 | Computer Associates Think, Inc. | System and method for creating and using self describing events in automation |
CA2453728A1 (en) * | 2003-12-17 | 2005-06-17 | Ibm Canada Limited-Ibm Canada Limitee | A method and system for presenting event flows using sequence diagrams |
US8146100B2 (en) | 2006-03-21 | 2012-03-27 | Sap Ag | System and method for event-based information flow in software development processes |
US20080244565A1 (en) * | 2007-03-29 | 2008-10-02 | Microsoft Corporation | Dynamic software installation and configuration |
KR101480194B1 (en) * | 2008-11-05 | 2015-01-26 | 엘지전자 주식회사 | Mobile termianl and displaying method thereof |
JP5129725B2 (en) * | 2008-11-19 | 2013-01-30 | 株式会社日立製作所 | Device abnormality diagnosis method and system |
US8180830B2 (en) * | 2008-11-21 | 2012-05-15 | The Invention Science Fund I, Llc | Action execution based on user modified hypothesis |
KR20130025301A (en) * | 2011-09-01 | 2013-03-11 | 삼성전자주식회사 | Display apparatus and user interface providing method thereof |
US9336502B2 (en) * | 2013-04-30 | 2016-05-10 | Oracle International Corporation | Showing relationships between tasks in a Gantt chart |
KR102206387B1 (en) * | 2014-12-08 | 2021-01-22 | 엘지전자 주식회사 | Mobile terminal and control method for the mobile terminal |
-
2015
- 2015-07-10 US US14/796,289 patent/US10621063B2/en active Active
-
2020
- 2020-04-10 US US16/846,207 patent/US20200241992A1/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120124504A1 (en) * | 2010-11-12 | 2012-05-17 | Microsoft Corporation | Debugging in a multi-processing environment |
US20140013317A1 (en) * | 2012-07-03 | 2014-01-09 | Fujitsu Limited | Computer-readable recording medium, patch determination method, and information processing apparatus |
US20150106324A1 (en) * | 2013-10-11 | 2015-04-16 | Accenture Global Services Limited | Contextual graph matching based anomaly detection |
Also Published As
Publication number | Publication date |
---|---|
US10621063B2 (en) | 2020-04-14 |
US20170010945A1 (en) | 2017-01-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20200241992A1 (en) | System and method for dynamic domain-specific sequence diagram visualization | |
US10353796B2 (en) | System and method for using development objectives to guide implementation of source code | |
US9274934B2 (en) | System and method for creating change-resilient scripts | |
US9298588B2 (en) | Tracing system for application and module tracing | |
US9292415B2 (en) | Module specific tracing in a shared module environment | |
Sambasivan et al. | Principled workflow-centric tracing of distributed systems | |
US9021428B2 (en) | Troubleshooting visuals and transient expressions in executing applications | |
US9311213B2 (en) | Module database with tracing options | |
CN110741354B (en) | Presenting differences between code entity calls | |
US20200050540A1 (en) | Interactive automation test | |
US10417114B2 (en) | Testing tool for testing applications while executing without human interaction | |
CN111708528A (en) | Method, device and equipment for generating small program and storage medium | |
US8990784B2 (en) | Determining control flow divergence due to variable value difference | |
US9465587B2 (en) | Preserving restful web service structure in a client consuming the restful web service | |
US8769498B2 (en) | Warning of register and storage area assignment errors | |
US11360801B2 (en) | Single nested multi-item workflow display | |
CN114764296A (en) | Machine learning model training method and device, electronic equipment and storage medium | |
US20160252974A1 (en) | Communicating with an unsupported input device | |
Biancheri et al. | Multilayer virtualized systems analysis with kernel tracing | |
US9142047B2 (en) | Visualizing data transfers in distributed file system | |
US10248534B2 (en) | Template-based methodology for validating hardware features | |
US10176015B2 (en) | Progress visualization of computational job | |
US20170371732A1 (en) | Method for debugging static memory corruption | |
CN115390720A (en) | Robotic Process Automation (RPA) including automatic document scrolling | |
US8775936B2 (en) | Displaying dynamic and shareable help data for images a distance from a pointed-to location |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: CISCO TECHNOLOGY, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ATTIAS, ROBERTO;REEL/FRAME:052369/0780 Effective date: 20150709 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |