Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference: Industrial Track 2017
DOI: 10.1145/3154448.3154453
|View full text |Cite
|
Sign up to set email alerts
|

Usable declarative configuration specification and validation for applications, systems, and cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 22 publications
(13 citation statements)
references
References 11 publications
0
13
0
Order By: Relevance
“…Analysis of software configurations can be used both to detect misconfigurations and to gain insight on user configuration practices. Existing automated misconfiguration detection techniques that can be applied as part of ConfEx include outlier value detection [15], parameter type inference [14], [31], rule-based validation [32], [33], parameter correlation analysis [17], matching configuration parameters with the parameters in the source code for source-based analysis [34]. We provide examples of how two of these techniques could be used during this phase in Sec.…”
Section: Discussionmentioning
confidence: 99%
“…Analysis of software configurations can be used both to detect misconfigurations and to gain insight on user configuration practices. Existing automated misconfiguration detection techniques that can be applied as part of ConfEx include outlier value detection [15], parameter type inference [14], [31], rule-based validation [32], [33], parameter correlation analysis [17], matching configuration parameters with the parameters in the source code for source-based analysis [34]. We provide examples of how two of these techniques could be used during this phase in Sec.…”
Section: Discussionmentioning
confidence: 99%
“…To make progress, a comprehensive study of configuration dependencies is needed. Better understanding would significantly benefit existing configuration tooling (e.g., for misconfiguration detection and diagnosis), reliability engineering (e.g., configuration correctness rule engineering [11,18,19]), configuration-aware testing [20,21,22,23,24,25,26,27,28,29,30], and customer support and documentation [31,16].…”
Section: Table Of Contentsmentioning
confidence: 99%
“…cDep can provide dependency information to enhance misconfiguration injection testing [12,70] configuration checking/validation [2,11,75,76,77,18,19], configuration-aware software testing [20,21,22,23,24,25,26,27,28,29,30], and many others [81].…”
Section: Eliminating Configuration Dependenciesmentioning
confidence: 99%
See 1 more Smart Citation
“…It has been a pioneering platform that puts forward the declarative configuration management approach for management of container-based distributed applications. Declarative configuration management entails that a user-specified, desired system state is enforced upon an actual system by a control loop that detects differences between desired and actual state [18]. In Kubernetes, the desired state is specified and managed using a RESTful API and is composed of various types of resources such as containers, nodes and services.…”
Section: A Kubernetesmentioning
confidence: 99%