Method and system for verifying resource configuration
First Claim
1. A method for verifying resource configuration comprising:
- a) reading a map outlining a plurality of valid configuration attributes for a plurality of computing resources that are interrelated in a network;
b) contacting said plurality of computing resources;
c) requesting a plurality of actual configuration attributes from said plurality of computing resources;
d) comparing said plurality of actual configuration attributes to a plurality of corresponding valid configuration attributes from said map;
e) generating a plurality of messages detailing results from said comparing in d);
f) a plurality of rules pertaining to said plurality of valid configuration attributes; and
g) determining if said plurality of actual configuration attributes comply with said plurality of rules; and
h) generating a separate exception message for each of plurality of actual configuration attributes that is in violation of said plurality of rules, wherein h) further comprises;
h1) for each said separate exception message that is generated, listing one of said plurality of actual configuration attributes that is in violation of said plurality of rules; and
h2) relationally listing a reference to a corresponding rule that is violated.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for verifying resource configuration. Specifically, in one embodiment, the method begins by reading a map outlining a plurality of valid configuration attributes. The configuration attributes are associated with a plurality of computing resources that are interrelated in a network. The plurality of computing resources is then contacted and a plurality of actual configuration attributes from the plurality of computing resources is requested. Thereafter, the plurality of actual configuration attributes is compared to a plurality of corresponding valid configuration attributes provided from the map. A plurality of messages detailing results from the comparison of actual to valid configuration attributes is then generated.
13 Citations
24 Claims
-
1. A method for verifying resource configuration comprising:
-
a) reading a map outlining a plurality of valid configuration attributes for a plurality of computing resources that are interrelated in a network; b) contacting said plurality of computing resources; c) requesting a plurality of actual configuration attributes from said plurality of computing resources; d) comparing said plurality of actual configuration attributes to a plurality of corresponding valid configuration attributes from said map; e) generating a plurality of messages detailing results from said comparing in d); f) a plurality of rules pertaining to said plurality of valid configuration attributes; and g) determining if said plurality of actual configuration attributes comply with said plurality of rules; and h) generating a separate exception message for each of plurality of actual configuration attributes that is in violation of said plurality of rules, wherein h) further comprises; h1) for each said separate exception message that is generated, listing one of said plurality of actual configuration attributes that is in violation of said plurality of rules; and h2) relationally listing a reference to a corresponding rule that is violated. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for verifying resource configuration comprising:
-
a) reading a map outlining valid configuration attributes for a plurality of computing resources that are interrelated in a network; b) contacting a first computing resource in said plurality of computing resources; c) requesting an actual configuration attribute from said first computing resource; d) comparing said actual configuration attribute to a corresponding valid configuration attribute from said map; and e) generating a message detailing a result from said comparing in d); f) a plurality of rules pertaining to said valid configuration attributes for said plurality of computing resources; and g) determining if said actual configuration attribute complies with said plurality of rules; and h) generating an exception message detailing a second result from said determining in g) when said actual configuration attribute is in violation of a rule of said plurality of rules, wherein h) further comprises; h1) listing said actual configuration attribute in said exception message; and h2) listing a reference to said rule that said actual configuration attribute is in violation in said exception message. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A data center comprising:
-
a bus for communicating information associated with a method for verifying resource configuration; a processor coupled to said bus for processing said information associated with said method for verifying resource configuration; and a computer readable memory coupled to said processor containing program instructions, that when executed by said processor, implement a method for verifying resource configuration comprising; a) reading a map outlining a plurality of valid configuration attributes for a plurality of computing resources that are interrelated in a network; b) contacting said plurality of computing resources; c) requesting a plurality of actual configuration attributes from said plurality of computing resources; d) comparing said plurality of actual configuration attributes to a plurality of corresponding valid configuration attributes from said map; and e) generating a plurality of messages detailing results from said comparing in d); f) a plurality of rules pertaining to said plurality of valid configuration attributes; and g) determining if said plurality of actual configuration attributes comply with said plurality of rules; and h) generating a separate exception message for each of plurality of actual configuration attributes that is in violation of said plurality of rules, wherein h) further comprises; h1) for each said separate exception message that is generated, listing one of said plurality of actual configuration attributes that is in violation of said plurality of rules; and h2) relationally listing a reference to a corresponding rule that is violated. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24)
-
Specification