next up previous
Next: Exploiting software repositories Up: Generation and Management Previous: Evaluation of files at

Evaluation of files at antecedents' side

Similar to the previous one this modeling method analyses files. However, it looks for indications of service utilization (by clients) at service side, e.g., in a server's log files. In the example of figure [*] the web server's log file would contain entries showing that both clients had connections. In other words, both have a dependency on WS.

However, a major drawback of all approaches that analyse log or configuration files is that these typically have a proprietary format or sometimes change with software updates. Even worse, not all applications provide log files or similar mechanisms containing this information; also access to files may be restricted for several other reasons, like security policies.



Copyright Munich Network Management Team