Research Article
A Real-Time Detection Method of Software Configuration Errors Based on Fine-Grained Configuration Item Types
Algorithm 1
anomaly error detection of the configuration update operation
Input: the modified configuration file path | Output: the backup data | (1) | execute such the command as “diff config_file snapshot_file > patch_file” and get all the modified configuration items since the last snapshot | (2) | Filter the modified operation based on the record in the configuration item update table | (3) | get the currently modifying configuration item | (4) | judge whether the current item parameter values meet all the related constraint rules in the rule base | (5) | If OK then | (6) | compare the current modification times and the threshold of modification times | (7) | If the current times are less than the threshold then | (8) | write the current modifying configuration item into the configuration item | update table and change it into the modified item | (9) | else | (10) | create a new snapshot of the configuration file | (11) | end | (12) | else | (13) | call the fast error recovery module to perform the recovery operation | (14) | end |
|