Mechanism for Performing Verification of Template Integrity of Monitoring Templates Used for Customized Monitoring of System Activities
First Claim
1. A computer-implemented method to test integrity of a monitoring mechanism for monitoring system resources of a computer system, the method comprising:
- calculating a first hash code for a monitoring template, the monitoring template to customize a performance monitor to serve as a universal monitor to facilitate a plurality of monitoring tools to perform monitoring of activities of a plurality of system components of the computer system;
extracting the first hash code from the monitoring template;
calculating a second hash code for the monitoring template; and
verifying integrity of the monitoring template by comparing the first hash code with the second hash code, wherein the integrity of the monitoring template is determined to be satisfactory if the first hash code matches the second hash code.
1 Assignment
0 Petitions
Accused Products
Abstract
A mechanism for performing verification of template integrity of monitoring templates used for customized monitoring of system activities. A method of embodiments of the invention includes calculating a first hash code for a monitoring template, the monitoring template to customize a performance monitor to serve as a universal monitor to facilitate a plurality of monitoring tools to perform monitoring of activities of a plurality of system components of the computer system, extracting the first hash code from the monitoring template, and calculating a second hash code for the monitoring template. The method further includes verifying integrity of the monitoring template by comparing the first hash code with the second hash code, and the integrity of the monitoring template is determined to be satisfactory if the first hash code matches the second hash code.
-
Citations
18 Claims
-
1. A computer-implemented method to test integrity of a monitoring mechanism for monitoring system resources of a computer system, the method comprising:
-
calculating a first hash code for a monitoring template, the monitoring template to customize a performance monitor to serve as a universal monitor to facilitate a plurality of monitoring tools to perform monitoring of activities of a plurality of system components of the computer system; extracting the first hash code from the monitoring template; calculating a second hash code for the monitoring template; and verifying integrity of the monitoring template by comparing the first hash code with the second hash code, wherein the integrity of the monitoring template is determined to be satisfactory if the first hash code matches the second hash code. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system comprising:
-
a processor communicably coupled to a memory of a computer system having an operating system and a performance monitor; and the performance monitor having a template integrity component, the template integrity component is operable to; calculate a first hash code for a monitoring template, the monitoring template to customize the performance monitor to serve as a universal monitor to facilitate a plurality of monitoring tools to perform monitoring of activities of a plurality of system components of the computer system; extract the first hash code from the monitoring template, calculate a second hash code for the monitoring template, and verify integrity of the monitoring template by comparing the first hash code with the second hash code, wherein the integrity of the monitoring template is determined to be satisfactory if the first hash code matches the second hash code. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. An article of manufacture comprising a machine-readable storage medium including data that, when accessed by a machine, cause the machine to perform operations comprising:
-
calculating a first hash code for a monitoring template, the monitoring template to customize a performance monitor to serve as a universal monitor to facilitate a plurality of monitoring tools to perform monitoring of activities of a plurality of system components of the computer system; extracting the first hash code from the monitoring template; calculating a second hash code for the monitoring template; and verifying integrity of the monitoring template by comparing the first hash code with the second hash code, wherein the integrity of the monitoring template is determined to be satisfactory if the first hash code matches the second hash code. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification