TY - GEN
T1 - BorderPatrol
T2 - 3rd ACM European Conference on Computer Systems - EuroSys'08
AU - Koskinen, Eric
AU - Jannotti, John
PY - 2008
Y1 - 2008
N2 - Causal request traces are valuable to developers of large concurrent and distributed applications, yet difficult to obtain. Traces show how a request is processed, and can be analyzed by tools to detect performance or correctness errors and anomalous behavior. We present BorderPatrol, which obtains precise request traces through suystems built from a litany of unmodified modules. Traced components include Apache, thttpd, PostgreSQL, TurboGears, BIND and notably Zeus, a closed-source event-driven web server. BorderPatrol obtains traces using active observation which carefully modifies the event stream observed by modules, simplifying precise observation. Protocol processors leverage knowledge about standard protocols, avoiding application-specific instrumentation. BorderPatrol obtains precise traces for black-box systems that cannot be traced by any other technique. We confirm the accuracy of BorderPatrol's traces by comparing to manual instrumentation, and compare the developer effort required for each kind of trace. BorderPatrol imposes limited overhead on real systems (approximately 10-15%) and it may be enabled or disabled in at run-time, making it a viable option for deployment in production environments.
AB - Causal request traces are valuable to developers of large concurrent and distributed applications, yet difficult to obtain. Traces show how a request is processed, and can be analyzed by tools to detect performance or correctness errors and anomalous behavior. We present BorderPatrol, which obtains precise request traces through suystems built from a litany of unmodified modules. Traced components include Apache, thttpd, PostgreSQL, TurboGears, BIND and notably Zeus, a closed-source event-driven web server. BorderPatrol obtains traces using active observation which carefully modifies the event stream observed by modules, simplifying precise observation. Protocol processors leverage knowledge about standard protocols, avoiding application-specific instrumentation. BorderPatrol obtains precise traces for black-box systems that cannot be traced by any other technique. We confirm the accuracy of BorderPatrol's traces by comparing to manual instrumentation, and compare the developer effort required for each kind of trace. BorderPatrol imposes limited overhead on real systems (approximately 10-15%) and it may be enabled or disabled in at run-time, making it a viable option for deployment in production environments.
KW - Black box systems
KW - Causal paths
KW - Distributed systems
KW - Performance analysis
KW - Performance debugging
UR - http://www.scopus.com/inward/record.url?scp=59249094686&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=59249094686&partnerID=8YFLogxK
U2 - 10.1145/1352592.1352613
DO - 10.1145/1352592.1352613
M3 - Conference contribution
AN - SCOPUS:59249094686
SN - 9781605580135
T3 - EuroSys'08 - Proceedings of the EuroSys 2008 Conference
SP - 191
EP - 203
BT - EuroSys'08 - Proceedings of the EuroSys 2008 Conference
Y2 - 31 March 2008 through 4 April 2008
ER -