System Problem Detection by Mining Console Logs by Wei Xu A

Total Page:16

File Type:pdf, Size:1020Kb

System Problem Detection by Mining Console Logs by Wei Xu A System Problem Detection by Mining Console Logs by Wei Xu A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate Division of the University of California, Berkeley Committee in charge: Professor David A. Patterson, Chair Professor Armando Fox Professor Pieter Abbeel Professor Ray R. Larson Fall 2010 System Problem Detection by Mining Console Logs Copyright 2010 by Wei Xu 1 Abstract System Problem Detection by Mining Console Logs by Wei Xu Doctor of Philosophy in Computer Science University of California, Berkeley Professor David A. Patterson, Chair The console logs generated by an application contain information that the developers believed would be useful in debugging or monitoring the application. Despite the ubiq- uity and large size of these logs, they are rarely exploited because they are not readily machine-parsable. We propose a fully automatic methodology for mining console logs using a combination of program analysis, information retrieval, data mining, and machine learn- ing techniques. We use source code analysis to understand the structures from the console logs. We then extract features, such as execution traces, from logs and use data mining and machine learning methods to detect problems. We also use a decision tree to distill the detection results to a format readily understandable by operators who need not be familiar with the anomaly detection algorithms. The whole process requires no human intervention and can scale to large scale log data. We extend the methods to perform online analysis on console log streams. We evaluate the technique on several real-world systems and detected problems that are insightful to systems operators. i To my family ii Contents List of Figures v List of Tables vi 1 Introduction 1 1.1 BackgroundandMotivation . .. 1 1.2 Contributions ................................... 3 1.3 Summary ..................................... 5 2 Key Insights and Overview 6 2.1 KeyInsights.................................... 6 2.2 MethodologyOverview . .. .. 9 2.3 Case Studies and Overview of Results . ..... 11 2.4 Summary ..................................... 13 3 Console Logs Preprocessing 16 3.1 ConsoleLogParserDesign . .. 17 3.1.1 Challengesinlogparsing. 17 3.1.2 Parserdesignoverview . 19 3.2 Object Oriented Languages: A Running Example . ...... 21 3.3 ParsersforOtherLanguages . ... 24 3.3.1 CandC++................................ 24 3.3.2 Scriptinglanguages(Python) . .. 25 3.4 Extracting Message Templates from Program Binaries . .......... 27 3.4.1 Javabytecode .............................. 27 3.4.2 BinariesfromCprograms . 28 3.5 Evaluation: Accuracy and Scalability . ....... 29 3.5.1 Accuracy ................................. 30 3.5.2 Scalability................................. 31 3.6 Summary ..................................... 32 4 Offline Problem Detection and Visualization 33 4.1 FeatureCreation ................................. 34 4.1.1 State variables and state ratiovectors. ...... 34 iii 4.1.2 Identifiers and message count vectors . .... 35 4.1.3 Implementing feature creation algorithms . ....... 36 4.2 AnomalyDetection ................................ 37 4.2.1 PCA-basedanomalydetection . 37 4.2.2 Improving PCA detection results . .. 40 4.3 EvaluationandVisualization. ..... 42 4.3.1 Darkstarexperimentresults . .. 42 4.3.2 Hadoopexperimentresults. 45 4.4 Visualizing Detection Results with Decision Trees . ........... 47 4.5 Summary ..................................... 48 5 Problem Detection in Online Log Streams 51 5.1 Two-StageOnlineAnomalyDetection. ..... 52 5.1.1 Challenges in online detection . ... 52 5.1.2 Oursolution: two-stagedetection . .... 53 5.2 Stage1: FrequentPatternMining . .... 54 5.2.1 Mining frequent event patterns . .. 56 5.2.2 Estimating distributions of session durations . ......... 57 5.2.3 ImplementationofStage1 . 59 5.3 Stage2:PCADetection ............................. 60 5.4 Evaluation..................................... 60 5.4.1 Stage1patternminingresults . .. 61 5.4.2 Detectionprecisionandrecall . ... 62 5.4.3 Detectionlatency ............................. 64 5.4.4 Comparisontoofflineresults. 65 5.5 Discussion..................................... 67 5.5.1 Limitationsofonlinedetection. .... 67 5.5.2 Usecases ................................. 67 5.6 Summary ..................................... 67 6 Real world application 69 6.1 Theartoflogsanitization . ... 70 6.2 State-baseddetection. ... 71 6.3 Sequence-based detection . .... 73 6.4 Summary ..................................... 74 7 Related Work 75 7.1 System Monitoring and Problem Detection . ...... 75 7.1.1 Systemmonitoringtools . 76 7.1.2 System problem detection with structured data . ...... 77 7.2 ConsoleLogAnalysis.............................. 79 7.2.1 Console generation and collection . .... 79 7.2.2 Consolelogparsing............................ 79 7.2.3 Using console logs for problem detection . ..... 80 iv 7.3 Techniques Used in This Project . .... 81 7.4 Summary ..................................... 83 8 Future Directions 84 8.1 AnomalyDetectionandBeyond . .. 84 8.2 ToolstoImproveConsoleLog . .. 85 8.3 BeyondConsoleLogs............................... 86 9 Conclusion 88 Bibliography 90 v List of Figures 2.1 Sample log and corresponding source code . ...... 7 2.2 Overview of four-step console log analysis methodology ............ 9 3.1 A sample log and corresponding source code . ...... 17 3.2 Number of new log printing statements added each month in four real Google systems ...................................... 18 3.3 Using source code information to parse console logs. ........... 19 3.4 Example source code segments with type inheritance . ......... 21 3.5 Constructing message templates from source code analysis .......... 22 3.6 Scalability of log parsing with number of nodes used. .......... 31 4.1 The intuition behind PCA detection . .... 38 4.2 .9513.6Fractional of total variance captured by each principal component. ................. 39 4.3 Darkstar state ratio vector detection results . .......... 42 4.4 Hadoop message count vector detection results . ......... 44 4.5 The decision tree visualization of Hadoop message count vectors . 49 4.6 The decision tree visualization for Darkstar message countvectors . 50 5.1 Overview of the two stage online detection systems. .......... 52 5.2 Frequent patterns, anomalous cases and “middle ground” ........... 54 5.3 Samplesessions.................................. 55 5.4 Tail of durations follow power-law distribution. ............ 58 5.5 Detection latency and number of events kept in detector’sbuffer ....... 64 6.1 Logsanitizationoverview. .... 71 6.2 DetectionresultsonGoogledata . .... 72 vi List of Tables 2.1 Statevariablesandidentifiers . ..... 8 2.2 Summary of data sets used in evaluation . ..... 12 2.3 Survey of console logging in popular software systems . ........... 15 3.1 ParsingaccuracyofC/C++parser . ... 25 3.2 Pythonparseraccuracy. .. 26 3.3 Comparison between C source parser and C binary parser . ......... 29 3.4 Parsing accuracy using Java Parser . ..... 30 3.5 Parsing Accuracy using the C/C++ parser on production data from Google 30 4.1 Semantics of rows and columns of features . ...... 37 4.2 Low effective dimensionality of feature data . ........ 39 4.3 Detected anomalies and false positives using PCA on Hadoop message count vectorfeature ................................... 46 5.1 Frequent patterns discovered from Hadoop logs . ........ 61 5.2 Hadoop online detection precision and recall. .......... 63 5.3 Detection accuracy comparison with offline detection results ......... 65 5.4 Addcaption.................................... 66 5.5 Detection accuracy comparison with offline detection results ......... 66 vii Acknowledgments I am grateful for the collaboration, guidance and help during my entire PhD career. First and foremost, I am extremely fortunate to have two great co-advisors, Professor David Patterson and Professor Armando Fox. Throughout my career as a Ph.d. student at Berkeley, they provided incredible help on every aspect of the research. From choosing a research topic to further shaping the project, from technical directions to fixing English problems, their help penetrates everywhere in this dissertation. I am especially grateful for their encouragement and advice during the time when I had trouble finding a research topic. I feel very fortunate to have the opportunity to learn from them. My special thanks go to Ling Huang at Intel. We collaborated on every detail in the project, and he captures even the slightest flaws existed and his insights of both machine learning and systems shaped the entire project. I also appreciate Professor Michael Jordan, who taught me about machine learning and helped me solving many problems I had during the project. My thanks go to my qualifying exam committee, Professor Eric Brewer, Professor Pieter Abbeel and Professor Ray Larson for their great suggestions that helped improving the dissertation, and especially for their encouragement. Professor Pieter Abbeel and Profes- sor Ray Larson are also on my dissertation committee, helping me further improve the dissertation. I enjoyed the supportive and intellectually stimulating research environment of the RAD Lab. All RAD Lab faculty, students and retreat guests provided important input throughout this research. Getting real data from industry is an essential part for this research. I appreciate Urs Hoelzle’s help for allowing me to use Google’s log data. At Google,
Recommended publications
  • Big Project: Project Darkstar
    BIG PROJECT: PROJECT DARKSTAR Karl Haberl, Seth Proctor, Tim Blackman, Jon Kaplan, Jennifer Kotzen Sun Microsystems Laboratories Project Darkstar - Outline • Some Background > The online games market, industry challenges, Darkstar goals, why Sun Labs? • The Technology > Architecture, recent work, technical challenges • Project Wonderland > A view of Darkstar from the developer's point of view • Community > Current activities and plans for the future 2 Project Darkstar: Background 3 Online Games Market • Divided into 3 groups: > Casual/Social – cards, chess, dice, community sites > Mass Market – driving, classic, arcade, simple > Hardcore – MMOG, FPS, RTS • Online mobile still very small • Online games are currently the fastest growing segment of the games industry • Online game subscriptions estimated to hit $11B by 2011* *(Source: DFC intelligence) > not including microtransactions, shared advertising, ... 4 The Canonical MMOG: World of Warcraft • Approximately 9 million subscribers > Average subscription : $15/month > Average retention : two years + > $135 million per month/$1.62 Billion per year run rate > For one game (they have others) • Unknown number of servers • ~2,700 employees world wide • Company is changing > Was a game company > Now a service company World of Warcraft™ is a trademark and Blizzard Entertainment is a trademark or registered trademark of Blizzard Entertainment in the U.S. and/or other countries. 5 Ganz - Webkinz • Approximately 5+ million subscribers > Subscription comes with toy purchase > Subscription lasts one year > Average 100k users at any time > Currently only US and Canada; soon to be world wide > Aimed at the 8-12 demographic • And their mothers... • The company is changing > Was a toy company > Becoming a game/social site company Webkinz® is a registered Trademark of Ganz®.
    [Show full text]
  • Collaborative Virtual 3D Environment for Internet-Accessible Physics Experiments
    COLLABORATIVE VIRTUAL 3D ENVIRONMENT FOR INTERNET-ACCESSIBLE PHYSICS EXPERIMENTS Collaborative Virtual 3D Environment for Internet-Accessible Physics Experiments doi:10.3991/ijoe.v5s1.1014 Tina Scheucher1,2, Philip H. Bailey2, Christian Gütl1,3, V. Judson Harward2 1 Graz University of Technology, Graz, Austria 2 Massachusetts Institute of Technology, Cambridge, USA 3 Curtin University of Technology, Perth, WA Abstract—Immersive 3D worlds have increasingly raised the were the two main technological advances that have en- interest of researchers and practitioners for various learn- abled the development of 3D VEs and have generally in- ing and training settings over the last decade. These virtual creased the potential of the World Wide Web. Such envi- worlds can provide multiple communication channels be- ronments provide the illusion of being immersed within a tween users and improve presence and awareness in the 3D space, and enable the user to perform actions and be- learning process. Consequently virtual 3D environments haviors which are analogous to those she can initiate in facilitate collaborative learning and training scenarios. the real world [16]. The fact that users can gain experience in the same way that they can in the real world opens new In this paper we focus on the integration of internet- and interesting opportunities for physics education. By accessible physics experiments (iLabs) combined with the expanding reality beyond the limits of the classroom in TEALsim 3D simulation toolkit in Project Wonderland, both time and space, the educator can enrich the student’s Sun's toolkit for creating collaborative 3D virtual worlds. learning experience to ease understanding of abstract Within such a collaborative environment these tools provide physics concepts [8].
    [Show full text]
  • Support for Mobile Augmented and Synthesized Worlds
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Illinois Digital Environment for Access to Learning and Scholarship Repository Support for Mobile Augmented and Synthesized Worlds December 17, 2007 Won J. Jeon and Roy H. Campbell {wonjeon, rhc}@uiuc.edu Department of Computer Science University of Illinois at Urbana-Champaign Abstract Virtual worlds provide 3D-immersive experiences to users and some of them already have already launched commercial service to users. As computing environment becomes more heterogeneous, more mobile users are anticipated to access the virtual world with their mobile devices. However, still there are challenges and problems to be addressed for mobile users. In this report, state-of-art virtual world platforms are presented and their key features are compared. We compare possible approaches to tackle these problems to support virtual worlds for mobile devices. Transcoding scheme at the proxy is presented and evaluated for a given computing and networking environment. 1. Introduction A virtual world is a computer-simulated or synthesized environment where multiple users inhabit and interact to each other via avatars. The world mimics the real world via simulated real world physics and the persistence of the world comes from maintaining and updating the state of the world around the clock. Historically this concept is rooted from distributed interactive simulation (DIS) and massively multiplayer online role- playing game (MMORPG). DIS is used mainly by military organizations whereas MMORPG has gained huge popularity among general users or gamers. The world is typically represented as 2D or 3D graphics to multiple users.
    [Show full text]
  • ICL Template
    Collaborative Virtual 3D Environment for Internet-accessible Physics Experiments 1,2 2 1,3 2 Tina Scheucher , Philip H. Bailey , Christian Gütl , V. Judson Harward 1 Graz University of Technology, Graz, Austria 2 Massachusetts Institute of Technology, Cambridge, USA 3 Curtin University of Technology, Perth, WA Abstract—Immersive 3D worlds have increasingly raised the user is able to interact within the environment. For interest of researchers and practitioners for various example, the user can enter and exit rooms, walk around learning and training settings over the last decade. These buildings, and open drawers to see what is inside. virtual worlds can provide multiple communication Increases in desktop 3D computer graphics and network channels between users and improve presence and infrastructure were the two main technological advances awareness in the learning process. Consequently virtual 3D that have enabled the development of 3D VEs and have environments facilitate collaborative learning and training generally increased the potential of the World Wide Web. scenarios. Such environments provide the illusion of being immersed within a 3D space, and enable the user to perform actions In this paper we focus on the integration of internet- and behaviors which are analogous to those she can accessible physics experiments (iLabs) combined with the initiate in the real world [16]. The fact that users can gain TEALsim 3D simulation toolkit in Project Wonderland, experience in the same way that they can in the real world Sun's toolkit for creating collaborative 3D virtual worlds. opens new and interesting opportunities for physics Within such a collaborative environment these tools provide education.
    [Show full text]
  • Research Article High-Level Development of Multiserver Online Games
    Hindawi Publishing Corporation International Journal of Computer Games Technology Volume 2008, Article ID 327387, 16 pages doi:10.1155/2008/327387 Research Article High-Level Development of Multiserver Online Games Frank Glinka, Alexander Ploss, Sergei Gorlatch, and Jens Muller-Iden¨ Department of Mathematics and Computer Science, University of Munster,¨ 48149 Munster,¨ Germany Correspondence should be addressed to Frank Glinka, [email protected] Received 2 February 2008; Accepted 17 April 2008 Recommended by Jouni Smed Multiplayer online games with support for high user numbers must provide mechanisms to support an increasing amount of players by using additional resources. This paper provides a comprehensive analysis of the practically proven multiserver distribution mechanisms, zoning, instancing, and replication, and the tasks for the game developer implied by them. We propose a novel, high-level development approach which integrates the three distribution mechanisms seamlessly in today’s online games. As a possible base for this high-level approach, we describe the real-time framework (RTF) middleware system which liberates the developer from low-level tasks and allows him to stay at high level of design abstraction. We explain how RTF supports the implementation of single-server online games and how RTF allows to incorporate the three multiserver distribution mechanisms during the development process. Finally, we describe briefly how RTF provides manageability and maintenance functionality for online games in a grid context with dynamic resource allocation scenarios. Copyright © 2008 Frank Glinka et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
    [Show full text]
  • A Survey of Technologies for Building Collaborative Virtual Environments
    The International Journal of Virtual Reality, 2009, 8(1):53-66 53 A Survey of Technologies for Building Collaborative Virtual Environments Timothy E. Wright and Greg Madey Department of Computer Science & Engineering, University of Notre Dame, United States Whereas desktop virtual reality (desktop-VR) typically uses Abstract—What viable technologies exist to enable the nothing more than a keyboard, mouse, and monitor, a Cave development of so-called desktop virtual reality (desktop-VR) Automated Virtual Environment (CAVE) might include several applications? Specifically, which of these are active and capable display walls, video projectors, a haptic input device (e.g., a of helping us to engineer a collaborative, virtual environment “wand” to provide touch capabilities), and multidimensional (CVE)? A review of the literature and numerous project websites indicates an array of both overlapping and disparate approaches sound. The computing platforms to drive these systems also to this problem. In this paper, we review and perform a risk differ: desktop-VR requires a workstation-class computer, assessment of 16 prominent desktop-VR technologies (some mainstream OS, and VR libraries, while a CAVE often runs on building-blocks, some entire platforms) in an effort to determine a multi-node cluster of servers with specialized VR libraries the most efficacious tool or tools for constructing a CVE. and drivers. At first, this may seem reasonable: different levels of immersion require different hardware and software. Index Terms—Collaborative Virtual Environment, Desktop However, the same problems are being solved by both the Virtual Reality, VRML, X3D. desktop-VR and CAVE systems, with specific issues including the management and display of a three dimensional I.
    [Show full text]
  • Jim Waldo Is Gordon Mckay Professor of the Practice of Computer Science in the School of Engineering and Applied Sciences At
    Jim Waldo is Gordon McKay Professor of the Practice of Computer Science in the School of Engineering and Applied Sciences at Harvard, where he teaches courses in distributed systems and privacy; the Chief Technology Officer for the School of Engineering and Applied Sciences; and a Professor of Policy teaching on topics of technology and policy at the Harvard Kennedy School. Jim designed clouds at VMware; was a Distinguished Engineer with Sun Microsystems Laboratories, where he investigated next-generation large-scale distributed systems; and got his start in distributed systems at Apollo Computer. While at Sun, he was the technical lead of Project Darkstar, a multi- threaded, distributed infrastructure for massive multi-player on-line games and virtual worlds; the lead architect for Jini, a distributed programming system based on Java; and an early member of the Java software organization. Before joining Sun, Jim spent eight years at Apollo Computer and Hewlett Packard working in the areas of distributed object systems, user interfaces, class libraries, text and internationalization. While at HP, he led the design and development of the first Object Request Broker, and was instrumental in getting that technology incorporated into the first OMG CORBA specification. Jim is the author of "Java: the Good Parts" (O'Reilly) and co-authored "The Jini Specifications" (Addison- Wesley). He edited "The Evolution of C++: Language Design in the Marketplace of Ideas" (MIT Press). He co-chaired a National Academies study on privacy, and co-edited the report "Engaging Privacy and Information Technology in a Digital Age." He is the author of numerous journal and conference proceedings articles, and holds over 50 patents.
    [Show full text]
  • Software Requirements Specification
    SOFTWARE REQUIREMENTS SPECIFICATION by car'eless İrfan DURMAZ Gürkan SOLMAZ Erkan ACUN 2009 Table of Contents 1. Purpose of the Document....................................................................................................................3 2. Project Introduction............................................................................................................................ 3 2.1 Project Background.............................................................................................................................................3 2.2 Project Definition................................................................................................................................................4 2.3 Project Goals and Scope......................................................................................................................................4 3. The Process.......................................................................................................................................... 4 3.1 Process Model................................................................................................................................................... 4 3.2 Team Organization............................................................................................................................................ 6 3.3 Project Constraints............................................................................................................................................ 6 3.3.1 Project
    [Show full text]
  • 2007 Javaonesm Conference Word “BENEFIT” Is in Green Instead of Orange
    there are 3 cover versions: Prospect 1 (Java) It should say “... Save $200!” on the front and back cover. The first early bird pricing on the IFC and IBC should be “$2,495”, and the word “BENEFIT” is in orange. ADVANCE CONFERENCE GUIDE Prospect 2 (Non-Java) The front cover photo and text is different from Prospect 1. The text of the introduction Last Chance to Save $200! Register by April 4, 2007, at java.sun.com/javaone paragraphs on the IFC is also different, the 2007 JavaOneSM Conference word “BENEFIT” is in green instead of orange. Features Java Technology, Open Source, Web 2.0, Emerging Technologies, and More Don’t miss this year’s newly expanded content. Advance your development skills with hundreds of expert-led, in-depth technical sessions in nine tracks over four days: The back cover and the IBC are the same as Consumer Technologies | Java™ SE | Desktop | Java EE | Java ME Prospect 1. The Next-Generation Web | Open Source | Services and Integration | Tools and Languages How to navigate this brochure and easily find what you need... Alumni For other information for Home Conference Overview JavaOnePavilion this year’s Conference, visit java.sun.com/javaone. It should say “... Save $300!” on the front Registration Conference-at-a-Glance Special Programs and back cover. The first early bird pricing on Hyperlinks Bookmark Buttons Search Click on any of the underlined Use the bookmark tab to Click on the buttons at the top Pull down from the Edit menu and the IFC and IBC should be “$2,395”, and the links to visit specific web sites.
    [Show full text]
  • Optimizing an MMOG Network Layer Reducing Bandwidth Usage for Player Position Updates in Milmo Master of Science Thesis
    Optimizing an MMOG Network Layer Reducing Bandwidth Usage for Player Position Updates in MilMo Master of Science Thesis JONAS ABRAHAMSSON ANDERS MOBERG Chalmers University of Technology University of Gothenburg Department of Computer Science and Engineering Göteborg, Sweden, January 2011 The Author grants to Chalmers University of Technology and University of Gothenburg the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Author shall, when transferring the rights of the Work to a third party (for example a publisher or a company), acknowledge the third party about this agreement. If the Author has signed a copyright agreement with a third party regarding the Work, the Author warrants hereby that he/she has obtained any necessary permission from this third party to let Chalmers University of Technology and University of Gothenburg store the Work electronically and make it accessible on the Internet. Optimizing an MMOG Network Layer Reducing Bandwidth Usage for Player Position Updates in MilMo Jonas Abrahamsson Anders Moberg © Jonas Abrahamsson, January 2011. © Anders Moberg, January 2011. Examiner: Staffan Björk Chalmers University of Technology University of Gothenburg Department of Computer Science and Engineering SE-412 96 Göteborg Sweden Telephone + 46 (0)31-772 1000 Department of Computer Science and Engineering Göteborg, Sweden January 2011 Abstract Massively Multiplayer Online Games give their players the opportunity to play together with thousands of other players logged into the same game server.
    [Show full text]
  • Project Darkstar Architecture
    Project Darkstar Architecture Jim Waldo Distinguished Engineer Sun Microsystems Labs Austin Game Conference - 2007 Project Darkstar Goals ● Support Server Scale ● Games are embarrassingly parallel ● Multiple threads ● Multiple machines ● Simple Programming Model ● Multi-threaded, distributed programming is hard ● Single thread ● Single machine ● In the general case, this is impossible Austin Game Conference - 2007 The Special Case ● Event-driven Programs ● Client communication generates a task ● Tasks are independent ● Tasks must ● Be short-lived ● Access data through Darkstar ● Communication is through ● Client sessions (client to server) ● Channels (publish/subscribe client/server-to-client) Austin Game Conference - 2007 Project Darkstar Architecture Everyone and Everything Participating on the Network Austin Game Conference - 2007 Dealing with Concurrency ● All tasks are transactional ● Either everything is done, or nothing is ● Commit or abort determined by data access and contention ● Data access ● Data store detects conflicts, changes ● If two tasks conflict ● One will abort and be re-scheduled ● One will complete ● Transactional communication ● Actual communication only happens on commit Austin Game Conference - 2007 Project Darkstar Data Store ● Not a full (relational) database ● No SQL ● Optimized for 50% read/50% write ● Keeps all game state ● Stores everything persisting longer than a single task ● Shared by all copies of the stack ● No explicit locking protocols ● Detects changes automatically ● Programmer can provide hints
    [Show full text]
  • Project Darkstar (2007)
    YOUR LOGO HERE www.projectdarkstar.com Writing Darkstar Apps Mark Rizzo VP Platform Engineering Perpetual Entertainment, Inc. Chris Melissinos Chief Gaming Officer Sun Microsystems Jeffrey Kesselman Chief Darkstar Architect TS-1786 Sun Microsystems 2007 JavaOneSM Conference | Session TS-1786 | 1 Perpetual Entertainment, Inc. ● Building games: ● MMORPG Gods and Heroes – Late summer 2007 ● Star Trek Online – Late 2008 ● Building platform technology ● Billing, CS tools, community, thick game to thin client interface ● Enables and enhances connected gaming ● Enterprise Java framework, SOA architecture 2007 JavaOneSM Conference | Session TS-1786 | 2 Perpetual and Darkstar ● Huge demand in online game development community to lower cost of game development ● Many new markets opening that Perpetual wants to tap: ● Light MMORPGs, casual multi-player, free to pay (digital object commerce), youth online ● Current heavy MMO development process too expensive and difficult to iterate ● Make 15 $1M games vs. 1 $15M game 2007 JavaOneSM Conference | Session TS-1786 | 3 Perpetual and Darkstar ● Ease of integration between Perpetual platform and Darkstar ● Java all around ● Rapid prototype on production scalable framework ● Support for thick C++ and Java thin clients ● Gaming anywhere ● Open source model 2007 JavaOneSM Conference | Session TS-1786 | 4 Darkstar Applications Business and technology The hows and whys of writing applications for the Sun Game Server (SGS) 2007 JavaOneSM Conference | Session TS-1786 | 5 What will be covered • The Business of
    [Show full text]