Verification of template integrity of monitoring templates used for customized monitoring of system activities
First Claim
1. A method comprising:
- calculating a first hash code for a monitoring template, the monitoring template to customize a performance monitor to serve as a universal monitor to perform monitoring of activities of a plurality of system components of the computer system, the universal monitor to replace a plurality of monitoring tools;
embedding the first hash code into the monitoring template;
receiving a request to load the monitoring template;
extracting the first hash code from the monitoring template;
saving the monitoring template to a temporary directory without the first hash code;
calculating a second hash code for the monitoring template with the first hash code removed;
verifying, by a processing device, an integrity of the monitoring template by comparing the first hash code with the second hash code, wherein the integrity of the monitoring template is determined to be satisfactory in response to the first hash code matching the second hash code; and
loading the monitoring template from the temporary directory.
1 Assignment
0 Petitions
Accused Products
Abstract
A mechanism for performing verification of template integrity of monitoring templates used for customized monitoring of system activities. A method of embodiments of the invention includes calculating a first hash code for a monitoring template, the monitoring template to customize a performance monitor to serve as a universal monitor to facilitate a plurality of monitoring tools to perform monitoring of activities of a plurality of system components of the computer system, extracting the first hash code from the monitoring template, and calculating a second hash code for the monitoring template. The method further includes verifying integrity of the monitoring template by comparing the first hash code with the second hash code, and the integrity of the monitoring template is determined to be satisfactory if the first hash code matches the second hash code.
-
Citations
18 Claims
-
1. A method comprising:
-
calculating a first hash code for a monitoring template, the monitoring template to customize a performance monitor to serve as a universal monitor to perform monitoring of activities of a plurality of system components of the computer system, the universal monitor to replace a plurality of monitoring tools; embedding the first hash code into the monitoring template; receiving a request to load the monitoring template; extracting the first hash code from the monitoring template; saving the monitoring template to a temporary directory without the first hash code; calculating a second hash code for the monitoring template with the first hash code removed; verifying, by a processing device, an integrity of the monitoring template by comparing the first hash code with the second hash code, wherein the integrity of the monitoring template is determined to be satisfactory in response to the first hash code matching the second hash code; and loading the monitoring template from the temporary directory. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system comprising:
-
a memory to store an operating system and a performance monitor comprising a template integrity component; and a processing device coupled to the memory to execute the performance monitor, the processing device to; calculate a first hash code for a monitoring template, the monitoring template to customize a performance monitor to serve as a universal monitor to perform monitoring of activities of a plurality of system components of the computer system, the universal monitor to replace a plurality of monitoring tools; embed the first hash code into the monitoring template; receive a request to load the monitoring template; extract the first hash code from the monitoring template, save the monitoring template to a temporary directory without the first hash code, calculate a second hash code for the monitoring template with the first hash code removed, verify an integrity of the monitoring template by comparing the first hash code with the second hash code, wherein the integrity of the monitoring template is determined to be satisfactory in response to the first hash code matching the second hash code; and load the monitoring template from the temporary directory. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory machine-readable storage medium storing instructions which, when executed, cause a processing device to:
-
calculate a first hash code for a monitoring template, the monitoring template to customize a performance monitor to serve as a universal monitor to perform monitoring of activities of a plurality of system components of the computer system, the universal monitor to replace a plurality of monitoring tools; embed the first hash code into the monitoring template; receive a request to load the monitoring template; extract the first hash code from the monitoring template; save the monitoring template to a temporary directory without the first hash code; calculate a second hash code for the monitoring template with the first hash code removed; verify, by the processing device, an integrity of the monitoring template by comparing the first hash code with the second hash code, wherein the integrity of the monitoring template is determined to be satisfactory in response to the first hash code matching the second hash code; and load the monitoring template from the temporary directory. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification