Add dataset documentation
Browse files
README.md
CHANGED
@@ -1,151 +1,65 @@
|
|
1 |
---
|
2 |
language: en
|
3 |
-
license: mit
|
4 |
-
size_categories:
|
5 |
-
- 100k<n<1M
|
6 |
-
task_categories:
|
7 |
-
- anomaly-detection
|
8 |
-
pretty_name: HDFS Blocks Encoded and Tokenized with Train/Val/Test Splits
|
9 |
tags:
|
10 |
- log-analysis
|
11 |
- hdfs
|
12 |
- anomaly-detection
|
|
|
13 |
---
|
14 |
|
15 |
-
#
|
16 |
-
|
17 |
-
<!-- Provide a quick summary of the dataset. -->
|
18 |
-
|
19 |
-
|
20 |
-
|
21 |
-
## Dataset Details
|
22 |
-
|
23 |
-
### Dataset Description
|
24 |
-
|
25 |
-
<!-- Provide a longer summary of what this dataset is. -->
|
26 |
-
|
27 |
-
|
28 |
-
|
29 |
-
- **Curated by:** [More Information Needed]
|
30 |
-
- **Funded by [optional]:** [More Information Needed]
|
31 |
-
- **Shared by [optional]:** [More Information Needed]
|
32 |
-
- **Language(s) (NLP):** en
|
33 |
-
- **License:** mit
|
34 |
-
|
35 |
-
### Dataset Sources [optional]
|
36 |
-
|
37 |
-
<!-- Provide the basic links for the dataset. -->
|
38 |
-
|
39 |
-
- **Repository:** [More Information Needed]
|
40 |
-
- **Paper [optional]:** [More Information Needed]
|
41 |
-
- **Demo [optional]:** [More Information Needed]
|
42 |
-
|
43 |
-
## Uses
|
44 |
-
|
45 |
-
<!-- Address questions around how the dataset is intended to be used. -->
|
46 |
-
|
47 |
-
### Direct Use
|
48 |
-
|
49 |
-
<!-- This section describes suitable use cases for the dataset. -->
|
50 |
-
|
51 |
-
[More Information Needed]
|
52 |
-
|
53 |
-
### Out-of-Scope Use
|
54 |
-
|
55 |
-
<!-- This section addresses misuse, malicious use, and uses that the dataset will not work well for. -->
|
56 |
-
|
57 |
-
[More Information Needed]
|
58 |
-
|
59 |
-
## Dataset Structure
|
60 |
-
|
61 |
-
<!-- This section provides a description of the dataset fields, and additional information about the dataset structure such as criteria used to create the splits, relationships between data points, etc. -->
|
62 |
-
|
63 |
-
[More Information Needed]
|
64 |
-
|
65 |
-
## Dataset Creation
|
66 |
-
|
67 |
-
### Curation Rationale
|
68 |
-
|
69 |
-
<!-- Motivation for the creation of this dataset. -->
|
70 |
-
|
71 |
-
[More Information Needed]
|
72 |
-
|
73 |
-
### Source Data
|
74 |
-
|
75 |
-
<!-- This section describes the source data (e.g. news text and headlines, social media posts, translated sentences, ...). -->
|
76 |
-
|
77 |
-
#### Data Collection and Processing
|
78 |
-
|
79 |
-
<!-- This section describes the data collection and processing process such as data selection criteria, filtering and normalization methods, tools and libraries used, etc. -->
|
80 |
-
|
81 |
-
[More Information Needed]
|
82 |
-
|
83 |
-
#### Who are the source data producers?
|
84 |
-
|
85 |
-
<!-- This section describes the people or systems who originally created the data. It should also include self-reported demographic or identity information for the source data creators if this information is available. -->
|
86 |
-
|
87 |
-
[More Information Needed]
|
88 |
-
|
89 |
-
### Annotations [optional]
|
90 |
-
|
91 |
-
<!-- If the dataset contains annotations which are not part of the initial data collection, use this section to describe them. -->
|
92 |
-
|
93 |
-
#### Annotation process
|
94 |
-
|
95 |
-
<!-- This section describes the annotation process such as annotation tools used in the process, the amount of data annotated, annotation guidelines provided to the annotators, interannotator statistics, annotation validation, etc. -->
|
96 |
-
|
97 |
-
[More Information Needed]
|
98 |
-
|
99 |
-
#### Who are the annotators?
|
100 |
-
|
101 |
-
<!-- This section describes the people or systems who created the annotations. -->
|
102 |
-
|
103 |
-
[More Information Needed]
|
104 |
-
|
105 |
-
#### Personal and Sensitive Information
|
106 |
-
|
107 |
-
<!-- State whether the dataset contains data that might be considered personal, sensitive, or private (e.g., data that reveals addresses, uniquely identifiable names or aliases, racial or ethnic origins, sexual orientations, religious beliefs, political opinions, financial or health data, etc.). If efforts were made to anonymize the data, describe the anonymization process. -->
|
108 |
-
|
109 |
-
[More Information Needed]
|
110 |
-
|
111 |
-
## Bias, Risks, and Limitations
|
112 |
-
|
113 |
-
<!-- This section is meant to convey both technical and sociotechnical limitations. -->
|
114 |
-
|
115 |
-
[More Information Needed]
|
116 |
-
|
117 |
-
### Recommendations
|
118 |
-
|
119 |
-
<!-- This section is meant to convey recommendations with respect to the bias, risk, and technical limitations. -->
|
120 |
|
121 |
-
|
122 |
|
123 |
-
##
|
124 |
|
125 |
-
|
|
|
|
|
126 |
|
127 |
-
|
128 |
|
129 |
-
|
|
|
|
|
|
|
130 |
|
131 |
-
|
132 |
|
133 |
-
|
|
|
|
|
134 |
|
135 |
-
|
136 |
|
137 |
-
|
138 |
|
139 |
-
|
140 |
|
141 |
-
##
|
142 |
|
143 |
-
|
|
|
|
|
|
|
|
|
144 |
|
145 |
-
##
|
146 |
|
147 |
-
|
|
|
|
|
|
|
148 |
|
149 |
-
##
|
150 |
|
151 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
---
|
2 |
language: en
|
|
|
|
|
|
|
|
|
|
|
|
|
3 |
tags:
|
4 |
- log-analysis
|
5 |
- hdfs
|
6 |
- anomaly-detection
|
7 |
+
license: mit
|
8 |
---
|
9 |
|
10 |
+
# HDFS Logs Train/Val/Test Splits
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11 |
|
12 |
+
This dataset contains preprocessed HDFS log sequences split into train, validation, and test sets for anomaly detection tasks.
|
13 |
|
14 |
+
## Dataset Description
|
15 |
|
16 |
+
The dataset is derived from the HDFS log dataset, which contains system logs from a Hadoop Distributed File System (HDFS).
|
17 |
+
Each sequence represents a block of log messages, labeled as either normal or anomalous. The dataset has been preprocessed
|
18 |
+
using the Drain algorithm to extract structured fields and identify event types.
|
19 |
|
20 |
+
### Data Fields
|
21 |
|
22 |
+
- `block_id`: Unique identifier for each HDFS block, used to group log messages into blocks
|
23 |
+
- `event_encoded`: The preprocessed log sequence with event IDs and parameters
|
24 |
+
- `tokenized_block`: The tokenized log sequence, used for training
|
25 |
+
- `label`: Classification label ('Normal' or 'Anomaly')
|
26 |
|
27 |
+
### Data Splits
|
28 |
|
29 |
+
- Training set: 460,049 sequences (80%)
|
30 |
+
- Validation set: 57,506 sequences (10%)
|
31 |
+
- Test set: 57,506 sequences (10%)
|
32 |
|
33 |
+
The splits are stratified by the Label field to maintain class distribution across splits.
|
34 |
|
35 |
+
## Source Data
|
36 |
|
37 |
+
Original data source: https://zenodo.org/records/8196385/files/HDFS_v1.zip?download=1
|
38 |
|
39 |
+
## Preprocessing
|
40 |
|
41 |
+
The logs have been preprocessed to:
|
42 |
+
1. Extract structured fields (timestamp, component, etc.)
|
43 |
+
2. Identify and standardize event types
|
44 |
+
3. Remove block IDs from parameter lists to prevent data leakage
|
45 |
+
4. Add special tokens for event type separation
|
46 |
|
47 |
+
## Intended Uses
|
48 |
|
49 |
+
This dataset is designed for:
|
50 |
+
- Training log anomaly detection models
|
51 |
+
- Evaluating log sequence prediction models
|
52 |
+
- Benchmarking different approaches to log-based anomaly detection
|
53 |
|
54 |
+
## Citation
|
55 |
|
56 |
+
If you use this dataset, please cite the original HDFS paper:
|
57 |
+
```bibtex
|
58 |
+
@inproceedings{xu2009detecting,
|
59 |
+
title={Detecting large-scale system problems by mining console logs},
|
60 |
+
author={Xu, Wei and Huang, Ling and Fox, Armando and Patterson, David and Jordan, Michael I},
|
61 |
+
booktitle={Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles},
|
62 |
+
pages={117--132},
|
63 |
+
year={2009}
|
64 |
+
}
|
65 |
+
```
|