Method, system, and program for checking and repairing a network configuration
First Claim
1. An article of manufacture including program logic for performing configuration checking of a network, wherein the program logic causes operations to be performed, the operations comprising:
- scanning a network data store for at least one transaction;
generating at least one event for said transaction;
associating at least one configuration policy with said event;
comparing said configuration policy with configuration data associated with said event; and
determining whether said configuration policy has been violated based on the comparison.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed is a technique for performing configuration checking of a network. A network data store is scanned for at least one transaction. At least one event is generated for said transaction. At least one configuration policy is associated with said event. Said configuration policy is compared with configuration data associated with said event. It is determined whether said configuration policy has been violated based on the comparison. Also disclosed is a technique for performing proactive configuration checking of a network. A hypothetical network scenario is received. At least one transaction is generated based on the hypothetical network scenario. A network data store is populated with configuration data for said transaction. At least one event is generated for said transaction using a mapping of events to transactions. Configuration data associated with said event is used to determine whether a configuration policy has been violated. Moreover, disclosed is a technique for performing reactive configuration checking of a network. A request to perform configuration checking on an existing network configuration is received. A network data store is scanned for at least one transaction. At least one event is generated for said transaction using a mapping of events to transactions. Configuration data associated with said event is used to determine whether a configuration policy has been violated. Furthermore, disclosed is a technique for correcting a configuration problem. The configuration problem is detected. It is determined whether there is at least one solution for the configuration problem in a knowledge data store. When it is determined that there is at least one solution in the knowledge data store, automatically selecting a solution to solve the configuration problem. When said solution can be automatically applied, automatically applying said solution. When said solution cannot be automatically applied, notifying a user.
-
Citations
44 Claims
-
1. An article of manufacture including program logic for performing configuration checking of a network, wherein the program logic causes operations to be performed, the operations comprising:
-
scanning a network data store for at least one transaction;
generating at least one event for said transaction;
associating at least one configuration policy with said event;
comparing said configuration policy with configuration data associated with said event; and
determining whether said configuration policy has been violated based on the comparison. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An article of manufacture including program logic for performing proactive configuration checking of a network, wherein the program logic causes operations to be performed, the operations comprising:
-
receiving a hypothetical network scenario;
generating at least one transaction based on said hypothetical network scenario;
populating a network data store with configuration data for said transaction;
generating at least one event for said transaction using a mapping of events to transactions; and
using configuration data associated with said event to determine whether a configuration policy has been violated. - View Dependent Claims (13)
-
-
14. An article of manufacture including program logic for performing reactive configuration checking of a network, wherein the program logic causes operations to be performed, the operations comprising:
-
receiving a request to perform configuration checking on an existing network configuration;
scanning a network data store for at least one transaction;
generating at least one event for said transaction using a mapping of events to transactions; and
using configuration data associated with said event to determine whether a configuration policy has been violated. - View Dependent Claims (15)
-
-
16. An article of manufacture including program logic for correcting a configuration problem, wherein the program logic causes operations to be performed, the operations comprising:
-
discovering the configuration problem;
determining whether there is at least one solution for the configuration problem in a knowledge data store;
when it is determined that there is at least one solution in the knowledge data store, automatically selecting a solution to solve the configuration problem;
when said solution can be automatically applied, automatically applying said solution; and
when said solution cannot be automatically applied, notifying a user. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A system for performing configuration checking of a network, comprising:
-
a processor;
a computer readable medium accessible to the processor; and
program logic including code capable of causing the processor to perform;
scanning a network data store for at least one transaction;
generating at least one event for said transaction;
associating at least one configuration policy with said event;
comparing the said configuration policy with configuration data associated with said event; and
determining whether said configuration policy has been violated based on the comparison. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. A system for performing proactive configuration checking of a network, comprising:
-
a processor;
a computer readable medium accessible to the processor; and
program logic including code capable of causing the processor to perform;
receiving a hypothetical network scenario;
generating at least one transaction based on said hypothetical network scenario;
populating a network data store with configuration data for said transaction;
generating at least one event for said transaction using a mapping of events to transactions; and
using configuration data associated with said event to determine whether a configuration policy has been violated. - View Dependent Claims (33)
-
-
34. A system for performing reactive configuration checking of a network, comprising:
-
a processor;
a computer readable medium accessible to the processor; and
program logic including code capable of causing the processor to perform;
receiving a request to perform configuration checking on an existing network configuration;
scanning a network data store for at least one transaction;
generating at least one event for said transaction using a mapping of events to transactions; and
using configuration data associated with said event to determine whether a configuration policy has been violated. - View Dependent Claims (35)
-
-
36. A system for correcting a configuration problem, comprising:
-
a processor;
a computer readable medium accessible to the processor; and
program logic including code capable of causing the processor to perform;
discovering the configuration problem;
determining whether there is at least one solution for the configuration problem in a knowledge data store;
when it is determined that there is at least one solution in the knowledge data store, automatically selecting a solution to solve the configuration problem;
when said solution can be automatically applied, automatically applying said solution; and
when said solution cannot be automatically applied, notifying a user. - View Dependent Claims (37, 38, 39, 40)
-
-
41. A method for performing configuration checking of a network, comprising:
-
scanning a network data store for at least one transaction;
generating at least one event for said transaction;
associating at least one configuration policy with said event;
comparing the said configuration policy with configuration data associated with said event; and
determining whether said configuration policy has been violated based on the comparison.
-
-
42. A method for performing proactive configuration checking of a network, comprising:
-
receiving a hypothetical network scenario;
generating at least one transaction based on said hypothetical network scenario;
populating a network data store with configuration data for said transaction;
generating at least one event for said transaction using a mapping of events to transactions; and
using configuration data associated with said event to determine whether a configuration policy has been violated.
-
-
43. A method for performing reactive configuration checking of a network, comprising:
-
receiving a request to perform configuration checking on an existing network configuration;
scanning a network data store for at least one transaction;
generating at least one event for said transaction using a mapping of events to transactions; and
using configuration data associated with said event to determine whether a configuration policy has been violated.
-
-
44. A method for correcting a configuration problem, comprising:
-
discovering the configuration problem;
determining whether there is at least one solution for the configuration problem in a knowledge data store;
when it is determined that there is at least one solution in the knowledge data store, automatically selecting a solution to solve the configuration problem;
when said solution can be automatically applied, automatically applying said solution; and
when said solution cannot be automatically applied, notifying a user.
-
Specification