Research Article
A Real-Time Detection Method of Software Configuration Errors Based on Fine-Grained Configuration Item Types
Algorithm 1
anomaly error detection of the configuration update operation
| Input: the modified configuration file path | | Output: the backup data | | (1) | execute such the command as “diff config_file snapshot_file > patch_file” and get all the modified configuration items since the last snapshot | | (2) | Filter the modified operation based on the record in the configuration item update table | | (3) | get the currently modifying configuration item | | (4) | judge whether the current item parameter values meet all the related constraint rules in the rule base | | (5) | If OK then | | (6) | compare the current modification times and the threshold of modification times | | (7) | If the current times are less than the threshold then | | (8) | write the current modifying configuration item into the configuration item | | update table and change it into the modified item | | (9) | else | | (10) | create a new snapshot of the configuration file | | (11) | end | | (12) | else | | (13) | call the fast error recovery module to perform the recovery operation | | (14) | end |
|