Skip to content

Commit 69177a7

Browse files
committed
Updated table to HTML
1 parent e419336 commit 69177a7

File tree

1 file changed

+12
-11
lines changed

1 file changed

+12
-11
lines changed

_gsocblogs/2025/blog_Intelligent_Logging_Pipeline_OsamaTahir.md

Lines changed: 12 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -73,27 +73,28 @@ DeepLog is an LSTM-based model that learns log patterns from normal execution [3
7373
Suppose a log system has several events, each represented by a unique ID. The model takes a sequence of past events and predicts what the next event is likely to be. For example, <i>Table 1: Set of Events</i> shows unique IDs for the set of events of a user trying to upload a file. From the past event, the DeepLog learns the upcoming event and gives a probability to each unique event. It is to be noted that these sets of events are consumed by DeepLog in a random sequence.
7474
</p>
7575

76-
<div align="center">
77-
<table>
76+
<div style="text-align: center;">
77+
<table style="border-collapse: collapse; margin: auto; text-align: center; width: 60%;">
7878
<thead>
7979
<tr>
80-
<th>Unique ID</th>
81-
<th>Event</th>
82-
<th>Probability</th>
80+
<th style="border-bottom: 2px solid #444; padding: 8px 20px;">Unique ID</th>
81+
<th style="border-bottom: 2px solid #444; padding: 8px 20px;">Event</th>
82+
<th style="border-bottom: 2px solid #444; padding: 8px 20px;">Probability</th>
8383
</tr>
8484
</thead>
8585
<tbody>
86-
<tr><td>0</td><td>Login</td><td>0.7</td></tr>
87-
<tr><td>1</td><td>Upload File</td><td>0.4</td></tr>
88-
<tr><td>2</td><td>Select File</td><td>0.6</td></tr>
89-
<tr><td>3</td><td>Logout</td><td>0.25</td></tr>
90-
<tr><td>4</td><td>Submit File</td><td>0.3</td></tr>
86+
<tr><td style="padding: 6px 20px;">0</td><td style="padding: 6px 20px;">Login</td><td style="padding: 6px 20px;">0.7</td></tr>
87+
<tr><td style="padding: 6px 20px;">1</td><td style="padding: 6px 20px;">Upload File</td><td style="padding: 6px 20px;">0.4</td></tr>
88+
<tr><td style="padding: 6px 20px;">2</td><td style="padding: 6px 20px;">Select File</td><td style="padding: 6px 20px;">0.6</td></tr>
89+
<tr><td style="padding: 6px 20px;">3</td><td style="padding: 6px 20px;">Logout</td><td style="padding: 6px 20px;">0.25</td></tr>
90+
<tr><td style="padding: 6px 20px;">4</td><td style="padding: 6px 20px;">Submit File</td><td style="padding: 6px 20px;">0.3</td></tr>
9191
</tbody>
9292
</table>
93-
<i>Table 1: Set of Events</i>
93+
<p style="font-style: italic; margin-top: 6px;">Table 1: Set of Events</p>
9494
</div>
9595

9696

97+
9798
<p align="justify">
9899
Here the model thinks "Login" is most likely next event, then "Select File" and then "Upload File" etc. Hence, the sequence will be [Login, Select File, Upload File, Submit File, Logout] and with their respective unique IDs, it will be [0, 2, 1, 4, 3]. With k=2, the model predicts the top 2 event IDs as [Login, Select File], while the true event is Upload File. Since the true event does not appear in the top 2 predictions, this case is flagged as an anomaly. When k=3, the top 3 event IDs are [Login, Select File, Upload File], and the true event Upload File is included, so it is considered normal. In practice, the model checks whether the true event ID appears within the top-k predicted IDs: if the true event is not present, the sequence is labelled as an anomaly; otherwise, it is treated as normal.
99100
</p>

0 commit comments

Comments
 (0)