自治分布式环境中基于规则的静态配置验证技术

R. Kalyanaraman
{"title":"自治分布式环境中基于规则的静态配置验证技术","authors":"R. Kalyanaraman","doi":"10.1109/ICONS.2007.6","DOIUrl":null,"url":null,"abstract":"In a heterogeneous and complex distributed systems environment, (e.g. business integration), many software systems interchange information, each system stores environment information configuration files. At any given point of time, the interactions are based on these configurations only. Every time a system boots up it validates its own configuration. Whenever there is a failure of a component or its offline without updating, it may lose out on the current context of the environment (changes in the configuration of other systems). E.g. : DHCP induced IP/port change or a queue name change. Restarting the system without these updates may lead to several problems like erroneous/inconsistent output or failure of the component it selves. To prevent such errors we look in to building autonomy in to such systems by configuration validation. A rule based technique was devised (for individual components in a typical business integration subsystem). To Adapt to such a continuously changing environment (e.g. and to build autonomy (self-configure /self-protect/ self-correct). The rules are run either before restart of a component and whenever the administrator feels such a need arises (E.g: when a dependent enterprise system is restarted). These rules are either discovered from failure scenarios induced by configuration/dependent third- party errors or directly from rules used for monitoring various components at runtime. The rules primary check the third- party/dependency configurations, data interchange formats, enterprise data store connection parameters and software usage links. The recommended storage format is XML. An optional action tag can be utilized to perform corrective actions once a configuration error is discovered. There are options to specify the path of a operating system script or a Java class implementing a pre-defined interface. In a test environment these rules were executed by a static analyzer tool. It discovered 30% of potential fatal errors (leading to business down situations) and 82% of config based errors. Also these rule formats are reusable across systems and domain specific /standard based rules are interchangeable for similar software products e.g. FTP/email related rules. Also rules can be discovered from log/trace files for specific configuration errors.","PeriodicalId":355435,"journal":{"name":"Second International Conference on Systems (ICONS'07)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"A Rule based static configuration validation technique in an Autonomous Distributed Environment\",\"authors\":\"R. Kalyanaraman\",\"doi\":\"10.1109/ICONS.2007.6\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In a heterogeneous and complex distributed systems environment, (e.g. business integration), many software systems interchange information, each system stores environment information configuration files. At any given point of time, the interactions are based on these configurations only. Every time a system boots up it validates its own configuration. Whenever there is a failure of a component or its offline without updating, it may lose out on the current context of the environment (changes in the configuration of other systems). E.g. : DHCP induced IP/port change or a queue name change. Restarting the system without these updates may lead to several problems like erroneous/inconsistent output or failure of the component it selves. To prevent such errors we look in to building autonomy in to such systems by configuration validation. A rule based technique was devised (for individual components in a typical business integration subsystem). To Adapt to such a continuously changing environment (e.g. and to build autonomy (self-configure /self-protect/ self-correct). The rules are run either before restart of a component and whenever the administrator feels such a need arises (E.g: when a dependent enterprise system is restarted). These rules are either discovered from failure scenarios induced by configuration/dependent third- party errors or directly from rules used for monitoring various components at runtime. The rules primary check the third- party/dependency configurations, data interchange formats, enterprise data store connection parameters and software usage links. The recommended storage format is XML. An optional action tag can be utilized to perform corrective actions once a configuration error is discovered. There are options to specify the path of a operating system script or a Java class implementing a pre-defined interface. In a test environment these rules were executed by a static analyzer tool. It discovered 30% of potential fatal errors (leading to business down situations) and 82% of config based errors. Also these rule formats are reusable across systems and domain specific /standard based rules are interchangeable for similar software products e.g. FTP/email related rules. Also rules can be discovered from log/trace files for specific configuration errors.\",\"PeriodicalId\":355435,\"journal\":{\"name\":\"Second International Conference on Systems (ICONS'07)\",\"volume\":\"27 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-04-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Second International Conference on Systems (ICONS'07)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICONS.2007.6\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Second International Conference on Systems (ICONS'07)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICONS.2007.6","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

在异构和复杂的分布式系统环境中(如业务集成),许多软件系统交换信息,每个系统存储环境信息配置文件。在任何给定的时间点,交互仅基于这些配置。每次系统启动时,它都会验证自己的配置。每当组件出现故障或其脱机而没有更新时,它可能会失去环境的当前上下文(其他系统配置中的更改)。例如:DHCP引起的IP/端口改变或队列名称改变。在没有这些更新的情况下重新启动系统可能会导致一些问题,例如错误/不一致的输出或其自身组件的失败。为了防止这样的错误,我们着眼于通过配置验证在这样的系统中建立自主性。设计了一种基于规则的技术(用于典型业务集成子系统中的单个组件)。适应这种不断变化的环境(例如,建立自主性(自我配置/自我保护/自我纠正)。这些规则可以在组件重启之前运行,也可以在管理员觉得有这种需要时运行(例如,当一个依赖的企业系统重启时)。这些规则要么是从由配置/依赖的第三方错误引起的故障场景中发现的,要么直接从用于在运行时监视各种组件的规则中发现的。这些规则主要检查第三方/依赖配置、数据交换格式、企业数据存储连接参数和软件使用链接。推荐的存储格式为XML。一旦发现配置错误,可以使用可选的操作标记执行纠正操作。有一些选项可以指定实现预定义接口的操作系统脚本或Java类的路径。在测试环境中,这些规则由静态分析工具执行。它发现了30%的潜在致命错误(导致业务中断)和82%的基于配置的错误。此外,这些规则格式可以跨系统重用,并且基于特定领域/标准的规则可以在类似的软件产品中互换,例如FTP/电子邮件相关规则。此外,还可以从日志/跟踪文件中发现针对特定配置错误的规则。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Rule based static configuration validation technique in an Autonomous Distributed Environment
In a heterogeneous and complex distributed systems environment, (e.g. business integration), many software systems interchange information, each system stores environment information configuration files. At any given point of time, the interactions are based on these configurations only. Every time a system boots up it validates its own configuration. Whenever there is a failure of a component or its offline without updating, it may lose out on the current context of the environment (changes in the configuration of other systems). E.g. : DHCP induced IP/port change or a queue name change. Restarting the system without these updates may lead to several problems like erroneous/inconsistent output or failure of the component it selves. To prevent such errors we look in to building autonomy in to such systems by configuration validation. A rule based technique was devised (for individual components in a typical business integration subsystem). To Adapt to such a continuously changing environment (e.g. and to build autonomy (self-configure /self-protect/ self-correct). The rules are run either before restart of a component and whenever the administrator feels such a need arises (E.g: when a dependent enterprise system is restarted). These rules are either discovered from failure scenarios induced by configuration/dependent third- party errors or directly from rules used for monitoring various components at runtime. The rules primary check the third- party/dependency configurations, data interchange formats, enterprise data store connection parameters and software usage links. The recommended storage format is XML. An optional action tag can be utilized to perform corrective actions once a configuration error is discovered. There are options to specify the path of a operating system script or a Java class implementing a pre-defined interface. In a test environment these rules were executed by a static analyzer tool. It discovered 30% of potential fatal errors (leading to business down situations) and 82% of config based errors. Also these rule formats are reusable across systems and domain specific /standard based rules are interchangeable for similar software products e.g. FTP/email related rules. Also rules can be discovered from log/trace files for specific configuration errors.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信