Tcl and the Tk toolkit
Programming Perl (2nd ed.)
Distributed resource administration using Cfengine
Software—Practice & Experience
Windows NT SNMP
Maximum RPM
Programming in PROLOG
Introduction to Database Systems
Introduction to Database Systems
Managing Projects with Make
LISA '97 Proceedings of the 11th Conference on Systems Administration
An Analysis of UNIX System Configuration
LISA '97 Proceedings of the 11th Conference on Systems Administration
LISA '98 Proceedings of the 12th Conference on Systems Administration
Synctree for Single Point Installation, Upgrades, and OS Patches
LISA '98 Proceedings of the 12th Conference on Systems Administration
Local Disk Depot - Customizing the Software Environment: Customizing the Software Environment
LISA '93 Proceedings of the 7th USENIX conference on System administration
Towards a High-Level Machine Configuration System
LISA '94 Proceedings of the 8th USENIX conference on System administration
SLINK: Simple, Effective Filesystem Maintenance Abstractions for Community-Based Administration
LISA '96 Proceedings of the 10th USENIX conference on System administration
On the theory of system administration
Science of Computer Programming
Configurable immunity for evolving human-computer systems
Science of Computer Programming - Methods of software design: Techniques and applications
Making collaborative system administration easier: constraints and declarative aspect precedence
SAICSIT '04 Proceedings of the 2004 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
An Expectant Chat About Script Maturity
LISA '00 Proceedings of the 14th USENIX conference on System administration
The Maelstrom: Network Service Debugging via "Ineffective Procedures"
LISA '01 Proceedings of the 15th USENIX conference on System administration
The Arusha Project: A Framework for Collaborative UNIX System Administration
LISA '01 Proceedings of the 15th USENIX conference on System administration
Environmental Acquisition in Network Management
LISA '02 Proceedings of the 16th USENIX conference on System administration
ISconf: Theory, Practice, and Beyond
LISA '03 Proceedings of the 17th USENIX conference on System administration
Seeking Closure in an Open World: A Behavioral Agent Approach to Configuration Management
LISA '03 Proceedings of the 17th USENIX conference on System administration
STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support
LISA '03 Proceedings of the 17th USENIX conference on System administration
Experience in Implementing an HTTP Service Closure
LISA '04 Proceedings of the 18th USENIX conference on System administration
Network configuration management via model finding
LISA '05 Proceedings of the 19th conference on Large Installation System Administration Conference - Volume 19
Automatic misconfiguration troubleshooting with peerpressure
OSDI'04 Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6
Xcellog: A deductive spreadsheet system
The Knowledge Engineering Review
Modeling Change Without Breaking Promises
AIMS '07 Proceedings of the 1st international conference on Autonomous Infrastructure, Management and Security: Inter-Domain Management
Planning-based configuration and management of distributed systems
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
Testable system administration
Communications of the ACM
Troubleshooting with human-readable automated reasoning
LISA'10 Proceedings of the 24th international conference on Large installation system administration
Testable System Administration
Queue - System Administration
Self-configuration of network devices with configuration logic
AN'06 Proceedings of the First IFIP TC6 international conference on Autonomic Networking
Deductive spreadsheets using tabled logic programming
ICLP'06 Proceedings of the 22nd international conference on Logic Programming
A declarative approach to automated configuration
lisa'12 Proceedings of the 26th international conference on Large Installation System Administration: strategies, tools, and techniques
Hi-index | 0.02 |
In an ideal world, the system administrator would simply specify a complete model of system requirements and the system would automatically fulfill them. If requirements changed, or if the system deviated from requirements, the system would change itself to converge with requirements. Current specialized tools for convergent system administration already provide some ability to do this, but are limited by specification languages that cannot adequately represent all possible sets of requirements. We take the opposite approach of starting with a general-purpose logic programming language intended for specifying requirements and analyzing system state, and adapting that language for system administration. Using Prolog with appropriate extensions, one can specify complex system requirements and convergent processes involving multiple information domains, including information about files, filesystems, users, and processes, as well as information from databases. By hiding unimportant details, Prolog allows a simple relationship between requirements and the scripts that implement them. We illustrate these observations by use of a simple proof-of-concept prototype.