Next: Exploiting software repositories
Up: Generation and Management
Previous: Evaluation of files at
Similar to the previous one this modeling method analyses
files. However, it looks for indications of service utilization (by
clients) at service side, e.g., in a server's log files.
In the example of figure
the web server's log
file would contain entries showing that both clients had connections.
In other words, both have a dependency on WS.
However, a major drawback of all approaches that analyse log or
configuration files is that these typically have a proprietary format
or sometimes change with software updates.
Even worse, not all applications provide log files or similar
mechanisms containing this information; also access to files may be
restricted for several other reasons, like security policies.
Copyright Munich Network Management Team