EP2483776A2 - Procédé et dispositif pour vérifier la configuration d'un système informatique - Google Patents
Procédé et dispositif pour vérifier la configuration d'un système informatiqueInfo
- Publication number
- EP2483776A2 EP2483776A2 EP10772960A EP10772960A EP2483776A2 EP 2483776 A2 EP2483776 A2 EP 2483776A2 EP 10772960 A EP10772960 A EP 10772960A EP 10772960 A EP10772960 A EP 10772960A EP 2483776 A2 EP2483776 A2 EP 2483776A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- function
- configuration
- computer system
- rules
- services
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
Definitions
- the invention relates to a method and a device for checking the configuration of a computer system.
- Constraints or restrictive rules of functions among each other Sometimes functions are mutually exclusive on the same computer or on the entire computer system. Some restrictions may be related to the number of times a particular function must be present in a computer system.
- the invention is therefore based on the object of specifying a method and a device with which a computer system can be easily and reliably checked for its configuration.
- the above object is achieved by a method having the features of claim 1. Thereafter, the method for verifying the configuration includes a
- the method according to this invention comprises two steps.
- the first step involves querying functions associated with the computer system, particularly a distributed computer system.
- the second step involves that Check if the found functions have a given rule of
- Services and operations are compared to services and operations that necessarily have to run on one or more computers to perform a function.
- the recorded services and processes can be compared with already known services and processes. It can be determined beyond doubt whether a particular function is currently being executed by the computer system, in particular a distributed computer system.
- Functional Description lists all the services and operations that must run on one or more of the computers of the distributed or networked computer system to perform the function.
- the functional description can be accessed at any time.
- the functional description is advantageously stored in a permanent memory of a device for carrying out the method described here.
- the current configuration is determined after detecting the function, after which it is checked whether the detected function is in accordance with the rules of the configuration.
- the method described herein describes a process for searching a computer network to identify the functions of a distributed or networked computer system and to compare the identified configuration with rules of configuration. Therefore, an actual state is always compared with a desired state.
- the rules of the configuration relating to the function are advantageously listed in a functional description assigned to this function.
- the functional description therefore contains all the rules of the configuration or coherence (coherence rules) which relate to the respective function.
- the functional description is advantageously written in XML format.
- Each function executable by the distributed or networked computer system is described in an XML function description associated with it.
- the XML format is a common standard format and easily accessible to professionals.
- a functional description is created for each function. For each function that can be executed by the computer system, this results in a function description that is typical for the function and that can be accessed.
- all data relating to the function such as associated services and processes as well as rules of the configuration, are stored.
- rules of exclusion are advantageously used as rules of the configuration. These rules state that some
- rules of dependency are advantageously used as rules of the configuration. These rules determine that the assignment of a function to a node or computer is the assignment of certain others Functions implies, either on the same node or computer or anywhere else within the network or within the computer system.
- rules of cardinality are advantageously used as rules of the configuration. These rules limit the number of times a function occurs within the network or computer system.
- violations of the rules of the configuration are displayed. This immediately alerts monitoring personnel to possible errors in the computer system.
- violations of the rules of the configuration are automatically remedied. As a result, errors can be prevented as quickly as possible.
- a device for checking the configuration of a computer system which comprises a hardware which detects a function executed by the computers of the computer system or the computer system and which checks whether the detected
- the device carries out all method steps of the method described here individually or in combination.
- the method described in this invention first identifies the functions associated with each network node by comparing its operations and services with the processes and services included in the network
- the first type of input data includes the current configuration resulting from performing the first step of the method.
- the second type of input data includes the list of constraints formulated as rules for the different functions.
- a special rule component uses the two types of input data to apply these rules to the
- FIG. 1 A schematic representation of a diagram for carrying out the
- the first step is performed by first acquiring, in block 2, the services and processes running on the computers 1.
- the services and procedures that necessarily have to run on one or more computers 1 to perform a function are in one
- the detected services and operations are compared with the services and operations that necessarily have to run on one or more computers 1 to perform a function. This is also done in block 2.
- Sequences a specific function is uniquely identified.
- the identified function or functions determine the current state of the configuration of the computer system.
- the method now includes the further step of verifying that the detected function violates a rule of configuring the computer system. This is shown schematically in block 6.
- the current configuration of the computer system will after detecting the
- An arrangement not shown, comprises the computer 1 and a device for checking the configuration of a computer system, which has hardware which detects a function which is performed by the computers of the
- Computer system or computer system is executed, and checks whether the detected function violates a rule of the configuration of the computer system.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Debugging And Monitoring (AREA)
- Test And Diagnosis Of Digital Computers (AREA)
- Stored Programmes (AREA)
Abstract
L'invention concerne un procédé pour vérifier la configuration d'un système informatique, comprenant les opérations suivantes : détection d'une fonction qui est exécutée par les ordinateurs (1) du système informatique ou par le système informatique, et vérification de si la fonction détectée déroge à une règle de la configuration du système informatique, ledit procédé permettant de vérifier sans problème et de manière fiable un système informatique quant à sa configuration. L'invention a également pour objet un dispositif pour vérifier la configuration d'un système informatique, comprenant un matériel informatique qui détecte une fonction qui est exécutée par les ordinateurs (1) du système informatique ou par le système informatique, et vérifie si la fonction détectée déroge à une règle de la configuration du système informatique.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102009043286A DE102009043286A1 (de) | 2009-09-29 | 2009-09-29 | Verfahren und Vorrichtung zur Überprüfung der Konfigurierung eines Computersystems |
PCT/EP2010/005843 WO2011038864A2 (fr) | 2009-09-29 | 2010-09-24 | Procédé et dispositif pour vérifier la configuration d'un système informatique |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2483776A2 true EP2483776A2 (fr) | 2012-08-08 |
Family
ID=43662472
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP10772960A Withdrawn EP2483776A2 (fr) | 2009-09-29 | 2010-09-24 | Procédé et dispositif pour vérifier la configuration d'un système informatique |
Country Status (5)
Country | Link |
---|---|
US (1) | US20120246516A1 (fr) |
EP (1) | EP2483776A2 (fr) |
CN (1) | CN102648452A (fr) |
DE (1) | DE102009043286A1 (fr) |
WO (1) | WO2011038864A2 (fr) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150026077A1 (en) * | 2013-07-18 | 2015-01-22 | Netapp, Inc. | Centralized Method for Customer Assistance and System Verification |
US20150026076A1 (en) * | 2013-07-18 | 2015-01-22 | Netapp, Inc. | System and Method for Providing Customer Guidance in Deploying a Computing System |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6836766B1 (en) * | 2001-01-31 | 2004-12-28 | Trilogy Development Group, Inc. | Rule based configuration engine for a database |
US7200662B2 (en) * | 2001-07-06 | 2007-04-03 | Juniper Networks, Inc. | Integrated rule network management system |
US7526457B2 (en) * | 2003-11-07 | 2009-04-28 | Sap Ag | Systems and methods for configuring software |
US7584382B2 (en) * | 2004-02-19 | 2009-09-01 | Microsoft Corporation | Method and system for troubleshooting a misconfiguration of a computer system based on configurations of other computer systems |
CN101015185B (zh) * | 2004-09-03 | 2010-04-14 | 汤姆森许可贸易公司 | 用于自动设备错误配置检测并发送警告的机制 |
CN100477665C (zh) * | 2005-07-28 | 2009-04-08 | 上海交通大学 | 基于Jini技术的工作流服务自动配置系统 |
US7640260B2 (en) * | 2005-12-12 | 2009-12-29 | Microsoft Corporation | Valid transformation expressions for structured data |
US7698408B1 (en) * | 2006-07-24 | 2010-04-13 | Oracle America, Inc. | Method and apparatus for testing a network |
US8051028B2 (en) * | 2007-05-31 | 2011-11-01 | Symantec Corporation | Method and apparatus for generating configuration rules for computing entities within a computing environment using association rule mining |
EP2045992A1 (fr) * | 2007-10-04 | 2009-04-08 | Gemplus | Procédé pour l'accès à un dispositif portable, dispositif portable correspondant, dispositif hôte et système |
KR101439381B1 (ko) * | 2008-04-24 | 2014-11-04 | (주)휴맥스 홀딩스 | 부호화/복호화 방법 및 장치 |
KR100970145B1 (ko) * | 2008-07-18 | 2010-07-14 | (주)휴맥스 | 부호화/복호화 방법 및 장치 |
KR20100094709A (ko) * | 2009-02-19 | 2010-08-27 | (주)휴맥스 | 부호화/복호화 방법 및 장치 |
-
2009
- 2009-09-29 DE DE102009043286A patent/DE102009043286A1/de not_active Withdrawn
-
2010
- 2010-09-24 EP EP10772960A patent/EP2483776A2/fr not_active Withdrawn
- 2010-09-24 CN CN2010800512033A patent/CN102648452A/zh active Pending
- 2010-09-24 WO PCT/EP2010/005843 patent/WO2011038864A2/fr active Application Filing
-
2012
- 2012-03-29 US US13/434,352 patent/US20120246516A1/en not_active Abandoned
Non-Patent Citations (1)
Title |
---|
See references of WO2011038864A2 * |
Also Published As
Publication number | Publication date |
---|---|
WO2011038864A3 (fr) | 2011-06-03 |
CN102648452A (zh) | 2012-08-22 |
WO2011038864A2 (fr) | 2011-04-07 |
US20120246516A1 (en) | 2012-09-27 |
DE102009043286A1 (de) | 2011-03-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2095238B1 (fr) | Procede de test d'un programme d'ordinateur | |
DE10309246B4 (de) | Verfahren für das Event Management | |
DE10127170A1 (de) | Fehlersuchverfahren und Fehlersuchvorrichtung | |
DE112012003670T5 (de) | Fehlererkennung auf der Grundlage von Diagnoseprotokollen | |
DE102014102551A1 (de) | Maschine und Verfahren zum Evaluieren von fehlschlagenden Softwareprogrammen | |
EP1657670A1 (fr) | Système et procédé pour le contrôle de l'état et du progrès de processus techniques ou d'un projet technique | |
EP3709166A1 (fr) | Procédé et système de manipulation sécurisée de signal pour l'essai des fonctionnalités de sécurité intégrées | |
DE102021130630A1 (de) | Testen von software-anwendungskomponenten | |
DE112021003677T5 (de) | Automatisierte unterstützte schaltkreisvalidierung | |
DE102009027267A1 (de) | Verfahren und Vorrichtung zur vereinfachten Fehlerverarbeitung an einer Werkzeugmaschine | |
EP2483776A2 (fr) | Procédé et dispositif pour vérifier la configuration d'un système informatique | |
DE102020213890A1 (de) | Computerimplementiertes Verfahren und Vorrichtung zur Auswahl einer Fuzzing-Methode zum Testen eines Programmcodes | |
EP3340250B1 (fr) | L'identification des composants dans le traitement des erreurs des dispositifs médicaux | |
DE102012110623B4 (de) | Messgerät zum Durchführen von Mess- und Prüfaufgaben in vorgebbaren Prozessen | |
DE112015004557T5 (de) | Anforderungsüberwachen | |
WO2010088976A1 (fr) | Procédé et dispositif d'identification d'un algorithme incorrect | |
EP2189908B1 (fr) | Procédé et dispositif destinés à la détermination d'une grandeur de référence d'un système informatique | |
EP2990941B1 (fr) | Procédé assisté par ordinateur de production d'un code de programme de dispositif de commande et environnement correspondant de gestion de messages | |
DE102007015369A1 (de) | Verfahren zur Überwachung des logischen Programmablaufs von kritischen Funktionen in Programmen eines Feldgeräts der Prozess- und Automatisierungstechnik | |
WO2014009091A1 (fr) | Visualisation multidimensionnelle de fichiers journaux de protocoles de signalisation | |
DE102010044039A1 (de) | Verfahren und Vorrichtung zur Qualitätsanalyse von Systemmodellen | |
EP3929554A1 (fr) | Détection améliorée d'erreurs dans les machines au moyen de l'ia | |
DE102013111228A1 (de) | Verfahren für eine elektronische Auditierung | |
EP1958101A1 (fr) | Systeme et procede de verification automatique de resultats de conception | |
EP4036739A1 (fr) | Risque de défaillance d'un tuyau de construction |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20120328 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK SM TR |
|
DAX | Request for extension of the european patent (deleted) | ||
17Q | First examination report despatched |
Effective date: 20141124 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20150401 |