WO2020244306A1 - Alarm reporting method and apparatus - Google Patents
Alarm reporting method and apparatus Download PDFInfo
- Publication number
- WO2020244306A1 WO2020244306A1 PCT/CN2020/084012 CN2020084012W WO2020244306A1 WO 2020244306 A1 WO2020244306 A1 WO 2020244306A1 CN 2020084012 W CN2020084012 W CN 2020084012W WO 2020244306 A1 WO2020244306 A1 WO 2020244306A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- alarm
- alarms
- database
- module
- overdue
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/06—Generation of reports
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0631—Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0631—Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
- H04L41/064—Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis involving time analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/069—Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
Definitions
- the present invention relates to the field of communication, and in particular to an alarm reporting method and device.
- the North Bounding Interface (NBI) of the network management is the interface software provided by the EMS network management to the integrated network management (OSS) to connect to the EMS network management. It can provide the integrated network management with public management functions, security management functions, configuration management functions, and performance management Functions and fault management functions, among which fault management is one of the main monitoring methods for integrated network management to monitor various devices through the northbound interface.
- the embodiment of the present invention provides an alarm reporting method and device.
- an alarm reporting method includes: subscribing to an alarm from a network element management system EMS; adding an alarm stream identifier to the subscribed alarm, and saving the alarm to an alarm database; The alarm is reported to the northbound interface.
- an alarm reporting device which includes: a subscription module for subscribing to alarms from a network element management system EMS; a storage module for adding an alarm stream identifier to the subscribed alarms, and The alarm is saved to the alarm database; the reporting module is used to report the alarm to the northbound interface.
- a storage medium in which a computer program is stored, wherein the computer program is configured to execute the steps in the foregoing method embodiment when running.
- an electronic device including a memory and a processor, the memory is stored with a computer program, and the processor is configured to run the computer program to execute the foregoing method embodiments Steps in.
- Figure 1 is a flowchart of an alarm reporting method according to an embodiment of the present invention
- Figure 2 is a structural block diagram of an alarm reporting device according to an embodiment of the present invention.
- FIG. 3 is a structural block diagram of an alarm reporting device according to an embodiment of the present invention.
- FIG. 4 is a schematic structural diagram of an alarm supplement collection device according to another embodiment of the present invention.
- FIG. 5 is a processing flowchart of an alarm standardization processing module according to an embodiment of the present invention.
- Fig. 6 is a processing flowchart of an alarm database storage module according to an embodiment of the present invention.
- Fig. 7 is a processing flowchart of an alarm continuity monitoring module according to an embodiment of the present invention.
- Fig. 8 is a processing flowchart of an automatic alarm supplement collection module according to an embodiment of the present invention.
- FIG. 1 is a flowchart according to an embodiment of the present invention. As shown in FIG. 1, the process includes the following steps:
- Step S102 subscribe to the alarm from the network element management system EMS;
- Step S104 adding an alarm stream flag to the subscribed alarm, and saving the alarm in the alarm database
- Step S106 Report the alarm to the northbound interface.
- step S102 various generated alarms and message alarms can be obtained from the EMS network manager through subscription.
- step S104 the main purpose of adding the alarm stream ID is to facilitate monitoring whether the alarms are continuous.
- Using a separate database table can store the generated and disappeared alarms in the same table in the database, which is convenient for judging the continuity of the alarms, and can also be solved
- alarms were reported directly after being subscribed through EMS. If the alarm is lost, it will not be able to synchronize to the problem of the lost alarm.
- the database can be cleared regularly and the expiration time can be configured in advance according to different network scales. If the alarm in the database table exceeds the configured time, the overdue alarm will be automatically cleared to reduce the pressure on the database. Because the overdue time is a configurable content, the project site can be flexibly configured according to the on-site network scale and alarm volume.
- step S106 after the standardization processing of the alarm is completed, the alarm is also reported to the northbound interface in real time while it is stored in the database.
- the northbound interface after the northbound interface receives the reported alarm, it can judge whether the reported alarm is continuous through the alarm continuity monitoring system. If it is not continuous, the automatic alarm supplement collection module will be automatically activated, and the alarm automatic supplement collection module will pass the alarm The ID accurately locates the missing alarms, and then supplements the missing alarms from the database.
- the targeted alarm supplementary collection of this embodiment can ensure that there is no repetition of the alarms collected from the supplementary collection, and the automatic monitoring and supplementary collection of connectivity can increase the speed of detecting missing alarms.
- the user has not yet sensed the loss of alarms.
- the alarm supplementary mining has been completed.
- the method according to the above embodiment can be implemented by means of software plus the necessary general hardware platform, of course, it can also be implemented by hardware, but in many cases the former is Better implementation.
- the technical solution of the present invention essentially or the part that contributes to the existing technology can be embodied in the form of a software product, and the computer software product is stored in a storage medium (such as ROM/RAM, magnetic disk, The optical disc) includes several instructions to enable a terminal device (which may be a computer, a server, or a network device, etc.) to execute the method described in each embodiment of the present invention.
- module can implement a combination of software and/or hardware with predetermined functions.
- devices described in the following embodiments are preferably implemented by software, hardware or a combination of software and hardware is also possible and conceived.
- FIG. 2 is a structural block diagram of an alarm reporting device according to an embodiment of the present invention. As shown in FIG. 2, the device includes a subscription module 10, a storage module 20, and a reporting module 30.
- the subscription module 10 is used to subscribe to alarms from the network element management system EMS.
- the storage module 20 is configured to add an alarm flow identifier to the subscribed alarms, and save the alarms to the alarm database.
- the reporting module 30 is configured to report the alarm to the northbound interface.
- the alarm reporting device may also include a standardized processing module 40, a monitoring module 50, an alarm supplement collection module 60, and an overdue alarm clearing module 70.
- the standardized processing module 40 is configured to perform standardized processing on the subscribed alarms before adding the alarm stream identifier.
- the monitoring module 50 is configured to, after receiving the alarm at the northbound interface, determine whether there is an alarm loss according to the continuity of the alarm running flag.
- the alarm supplemental collection module 60 is configured to supplementally collect the lost alarm from the database in the case of a lost alarm.
- the overdue alarm cleaning module 70 is used to determine whether there are overdue alarms in the database, and if there are overdue alarms, delete the overdue alarms.
- a technical solution for automatic alarm collection based on the northbound interface is provided.
- subscribe to the alarms from the EMS and perform standardized conversion of the subscribed alarms according to the TMF international standard, and then add an alarm serial ID to each alarm for subsequent alarm continuity monitoring.
- the converted alarms are reported to the northbound interface and stored in the alarm database at the same time.
- the northbound interface After the northbound interface receives the alarm, it will use the alarm continuity monitoring module to determine whether the alarm is lost according to the alarm flow ID. If the alarm is lost, it will automatically start the automatic recovery of the alarm and re-collect the missing alarm from the database and report it to the upper network management.
- the introduction of the database table to store the alarms can solve the problem that the northbound interface directly subscribes to the report alarms. If the alarms are lost, the missing alarms cannot be re-obtained. Adding the alarm serial ID to the standardized alarms can accurately monitor the missing alarms. , And quickly make up for missing alarms.
- this embodiment is different from the previous embodiment in the division of functional modules. Specifically, as shown in FIG. 4, this embodiment includes an alarm standardization processing module 100, an alarm database storage module 200, an alarm continuity monitoring module 300, The alarm automatic supplement collection module 400. In this embodiment, the above-mentioned four modules are used to complete the precise identification of the northbound interface loss alarm and automatic supplementation, thereby solving the problem of the northbound interface alarm loss.
- the alarm standardization processing module 100 is mainly responsible for initiating an alarm subscription to the EMS network manager, standardizing the subscribed alarms, and then adding an alarmSeqID value that will be used to determine the continuity of the alarm. As shown in Figure 5, it includes the following steps:
- Step S501 Initialize the alarm standardization processing module.
- Step S502 subscribe to an alert to the EMS, if the subscription fails, then subscribe to the underlying EMS for a notification at regular intervals, if the subscription is successful, then go to step S503
- Step S503 Monitor and receive the alarm reported on the EMS.
- Step S504 Standardize the alarm based on the TMF international standard, and move forward the standardized processing of the alarm to ensure that the reported alarm is consistent with the inbound alarm.
- Step S505 Add an alarm sequence ID (alarmSeqID) for each alarm.
- Each additional alarmSeqID will add 1 to the alarm.
- the introduction of alarmSeqID can ensure that each alarm has a unique alarm ID for subsequent alarm continuity monitoring modules
- the alarmSeqID can be used to determine whether the alarm is missing, and determine the specific missing alarms, and then automatically fill in the missing alarms from the database according to the alarmSeqID, and report to the upper-layer network management.
- Step S506 Store the standardized alarms in a database table, and the database table will store all alarms, which may include generating an alarm, acknowledging an alarm, or clearing an alarm.
- Step S507 Report the standardized alarm to the upper network management.
- the alarm data storage module 200 is mainly used to store all the alarms reported by the EMS that have undergone standardized processing, in order to ensure that the alarms generated on the network management are stored without loss.
- all alarms, including generated alarms, confirmed alarms, disappeared alarms, etc. are not limited to these types of alarms after all alarmSeqIDs are added and stored in the same table in the database.
- the present invention adds a configuration function for the alarm table. Users can adjust the amount of alarms stored in the alarm table according to different network management scales and alarms.
- the alarm data storage module 200 mainly includes the following processing flow steps:
- Step S601 The network management database is started, and the northbound alarm storage database table is then initialized.
- Step S602 Set the storage duration of the northbound interface database table data through the configuration file according to the size of the network and the alarm volume of the network management. If not set, the default configuration duration will be used. Database alarm table alarms that exceed the configured time will be deleted, and the deletion mechanism will be performed at a fixed time every day. In this embodiment, the alarm volume of the database table can be flexibly controlled through the configuration file.
- Step S603 After the network management is started, the database connection is automatically performed
- Step S604 Database connection control, if the connection fails, the connection will be tried again. The connection is successful and enter step S605;
- Step S605 store all the alarms completed by the standardized processing in the database
- Step S606 Start the database clearing mechanism at a fixed time every day
- Step S607 Access the database alarm generation time, determine whether the alarm exceeds the time configured for the configuration file, if it exceeds, proceed to step S608, if it does not exceed, continue to receive the alarm without clearing any alarm;
- Step S608 Clear all overdue alarms to reduce database pressure.
- the alarm continuity monitoring module 300 is mainly responsible for monitoring whether the reported alarm is missing. If the alarm is missing, it will automatically start the alarm automatic supplement collection module to accurately collect the missing alarm. If the alarm is continuous, the alarm will be reported to the upper network management. As shown in FIG. 7, the alarm continuity monitoring module 300 in this embodiment mainly includes the following processing procedures:
- Step S701 monitor and receive new alarms
- Step S702 extract each alarm alarmSeqID and store it in the buffer to provide judgment conditions for the next alarm continuity judgment
- Step S703 The alarmSeqID of the newly received alarm is continuously compared with the alarmSeqID of the previous alarm, and the next step is determined according to the judgment result;
- Step S704 If it is determined in step 303 that the alarmSeqID is not continuous, it is considered that the alarm is missing, and the alarm automatic supplementary acquisition system is activated to automatically supplement and collect the lost alarm;
- Step S705 If it is determined in step 303 that the alarmSeqID is continuous, it is considered that the alarm is not lost, and the alarm is directly reported to the upper network management.
- the alarm continuity monitoring module 300 can use the alarmSeqID to perform a continuity ratio to automatically determine whether the alarm is lost.
- the alarm automatic replenishment module 400 is mainly responsible.
- the alarm continuity monitoring module monitors that the reported alarm is missing
- the alarm automatic replenishment collection module is automatically activated, and the alarm automatic replenishment module can accurately determine the specific loss.
- Alarm and then accurately supplement the specific missing alarms and then report to the upper-layer network management in a notification manner.
- the present invention only supplements the missing alarms to ensure that all reported alarms are not lost and repeated.
- the alarm automatic supplementary mining module 400 mainly includes the following processing procedures:
- Step S801 After the alarm continuity monitoring module determines that the alarm is lost, it will automatically start the alarm automatic supplementary mining module;
- Step S802 Obtain the latest received alarm alarmSeqID_1 from the cache
- Step S803 Obtain the previous alarm alarmSeqID_2 from the cache
- Step S804 Connect to the database and prepare to retrieve the loss alarm from the database
- Step S805 the database judges, if the connection is successful, it starts to obtain a loss alarm, and if the database connection fails, the connection is tried again;
- Step S806 Issue a SQL command to the database to obtain the missing alarms from alarmSeqID_2 to alarmSeqID_1;
- Step S807 Step 408 is executed if the acquisition of the loss alarm is successful, and step S806 is executed again if the acquisition of the loss alarm fails to acquire the loss alarm.
- Step S808 After the loss alarm is successfully obtained, it will be reported to the upper-layer network management through notification.
- the alarm continuity monitoring module can use alarmSeqID to accurately judge and automatically supplement the missing alarms to ensure that all reported alarms are not lost or repeated.
- the alarm identification alarmSeqID is added to each reported alarm, and continuous monitoring is performed on the reported alarms through the alarmSeqID.
- the alarmSeqID can automatically determine which alarms are missing, and use the automatic supplementary acquisition module to accurately supplement the lost alarms to ensure that the reported alarms are not lost or repeated.
- each of the above modules can be implemented by software or hardware.
- it can be implemented in the following manner, but not limited to this: the above modules are all located in the same processor; or, the above modules are combined in any combination The forms are located in different processors.
- the embodiment of the present application also provides a storage medium in which a computer program is stored, wherein the computer program is configured to execute the steps in the foregoing method embodiment when running.
- the foregoing storage medium may be configured to store a computer program for executing the following steps:
- the foregoing storage medium may include, but is not limited to: U disk, Read-Only Memory (Read-Only Memory, ROM for short), Random Access Memory (Random Access Memory, RAM for short), Various media that can store computer programs, such as mobile hard disks, magnetic disks, or optical disks.
- the embodiment of the present application also provides an electronic device, including a memory and a processor, the memory is stored with a computer program, and the processor is configured to run the computer program to execute the steps in the foregoing method embodiment.
- modules or steps of this application can be implemented by a general computing device, and they can be concentrated on a single computing device or distributed in a network composed of multiple computing devices.
- they can be implemented with program codes executable by the computing device, so that they can be stored in the storage device for execution by the computing device, and in some cases, can be executed in a different order than here.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (12)
- 一种告警上报方法,包括:An alarm reporting method includes:从网元管理系统EMS订阅告警;Subscribe to alarms from the network element management system EMS;为订阅到的告警添加告警流水标识,并将所述告警保存至告警数据库;Add an alarm stream identifier to the subscribed alarm, and save the alarm in the alarm database;将所述告警上报至北向接口。Report the alarm to the northbound interface.
- 根据权利要求1所述的方法,其中,为获取的每一条告警添加告警流水标识之前,还包括:The method according to claim 1, wherein, before adding an alarm stream flag for each obtained alarm, the method further comprises:将订阅到的告警进行标准化处理。Standardize the subscribed alarms.
- 根据权利要求1所述的方法,其中,还包括:The method according to claim 1, further comprising:所述北向接口在接收到所述告警后,根据告警流水标识的连续性判断是否有告警丢失;After receiving the alarm, the northbound interface judges whether there is an alarm loss according to the continuity of the alarm running flag;如果有告警丢失,则从所述数据库中补采集所述丢失的告警。If any alarm is missing, then supplementally collect the missing alarm from the database.
- 根据权利要求3所述的方法,其中,根据告警流水标识的连续性判断是否有告警丢失,包括:The method according to claim 3, wherein the judging whether there is an alarm loss according to the continuity of the alarm flow flag comprises:将接收到的每一条告警的告警流水标识进行缓存,并将当前接收的告警的告警流水标识与上一条接收的告警的告警流水标识进行比对,如果告警流水标识不连续,则确定有告警丢失。Cache the alarm stream identifier of each received alarm, and compare the alarm stream identifier of the currently received alarm with the alarm stream identifier of the previous received alarm. If the alarm stream identifier is not continuous, it is determined that the alarm is missing .
- 根据权利要求1所述的方法,其中,还包括:The method according to claim 1, further comprising:判断所述数据库中是否有超期的告警;Determine whether there is an overdue alarm in the database;如果有超期的告警,则删除所述超期的告警。If there is an overdue alarm, delete the overdue alarm.
- 根据权利要求5所述的方法,其中,判断所述数据库中是否有超期的告警之前,还包括:The method according to claim 5, wherein before determining whether there is an overdue alarm in the database, the method further comprises:设置所述数据库中所存储的告警的超期时间。Set the expiration time of the alarm stored in the database.
- 一种告警上报装置,包括:An alarm reporting device includes:订阅模块,用于从网元管理系统EMS订阅告警;Subscription module, used to subscribe to alarms from the network element management system EMS;存储模块,用于为订阅到的告警添加告警流水标识,并将所述告警保存至告警数据库;The storage module is used to add an alarm flow identifier to the subscribed alarms, and save the alarms to the alarm database;上报模块,用于将所述告警上报至北向接口。The reporting module is used to report the alarm to the northbound interface.
- 根据权利要求7所述的装置,其中,还包括:The device according to claim 7, further comprising:标准化处理模块,用于在添加告警流水标识之前,将订阅到的告警进行标准化处理。The standardized processing module is used to perform standardized processing on the subscribed alarms before adding the alarm stream identifier.
- 根据权利要求7所述的装置,其中,还包括:The device according to claim 7, further comprising:监控模块,用于在所述北向接口接收到所述告警后,根据告警流水标识的连续性判断是否有告警丢失;The monitoring module is configured to determine whether there is an alarm loss according to the continuity of the alarm running flag after receiving the alarm at the northbound interface;告警补采集模块,用于在有告警丢失的情况下,从所述数据库中补采集所述丢失的告警。The alarm supplement collection module is used to supplement the collection of the missing alarm from the database in the case of an alarm loss.
- 根据权利要求7所述的装置,其中,还包括:The device according to claim 7, further comprising:超期告警清理模块,用于判断所述数据库中是否有超期的告警,如果有超期的告警,则删除所述超期的告警。The overdue alarm clearing module is used to determine whether there are overdue alarms in the database, and if there are overdue alarms, delete the overdue alarms.
- 一种存储介质,所述存储介质中存储有计算机程序,其中,所述计算机程序被设置为运行时执行权利要求1-6中任一项所述方法中的步骤。A storage medium in which a computer program is stored, wherein the computer program is configured to execute the steps in the method of any one of claims 1 to 6 when running.
- 一种电子装置,包括存储器和处理器,其中,所述存储器中存储有计算机程序,该处理器被设置为运行计算机程序以执行权利要求1-6中任一项所述方法中的步骤。An electronic device comprising a memory and a processor, wherein a computer program is stored in the memory, and the processor is configured to run the computer program to execute the steps in the method of any one of claims 1-6.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910477364.1A CN112039681A (en) | 2019-06-03 | 2019-06-03 | Alarm reporting method and device |
CN201910477364.1 | 2019-06-03 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020244306A1 true WO2020244306A1 (en) | 2020-12-10 |
Family
ID=73575993
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/084012 WO2020244306A1 (en) | 2019-06-03 | 2020-04-09 | Alarm reporting method and apparatus |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN112039681A (en) |
WO (1) | WO2020244306A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114244682B (en) * | 2021-11-22 | 2024-01-05 | 中盈优创资讯科技有限公司 | Equipment alarm loss and leakage repairing method and device |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1102433A2 (en) * | 1999-11-19 | 2001-05-23 | Nortel Networks Limited | Method and device for fault monitoring |
CN101854262A (en) * | 2010-06-24 | 2010-10-06 | 华为技术有限公司 | Alarm synchronization method, device and system |
CN103490916A (en) * | 2012-06-11 | 2014-01-01 | 中兴通讯股份有限公司 | Data acquisition method and data acquisition device |
CN105071970A (en) * | 2015-08-27 | 2015-11-18 | 中国电信股份有限公司 | Failure analysis method, failure analysis system and network management equipment |
CN106559248A (en) * | 2015-09-30 | 2017-04-05 | 中兴通讯股份有限公司 | A kind of alarm method, alarm device and warning system |
CN108322322A (en) * | 2017-01-18 | 2018-07-24 | 普天信息技术有限公司 | Alarm reporting method |
CN110012490A (en) * | 2018-01-04 | 2019-07-12 | 中兴通讯股份有限公司 | Alarm method, device, operation and maintenance center and computer readable storage medium |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102664751A (en) * | 2012-04-09 | 2012-09-12 | 大唐移动通信设备有限公司 | Method and device for processing warning message |
CN104283704B (en) * | 2013-07-05 | 2019-03-12 | 中兴通讯股份有限公司 | A kind of northbound interface sends the method and device of notification event |
-
2019
- 2019-06-03 CN CN201910477364.1A patent/CN112039681A/en active Pending
-
2020
- 2020-04-09 WO PCT/CN2020/084012 patent/WO2020244306A1/en active Application Filing
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1102433A2 (en) * | 1999-11-19 | 2001-05-23 | Nortel Networks Limited | Method and device for fault monitoring |
CN101854262A (en) * | 2010-06-24 | 2010-10-06 | 华为技术有限公司 | Alarm synchronization method, device and system |
CN103490916A (en) * | 2012-06-11 | 2014-01-01 | 中兴通讯股份有限公司 | Data acquisition method and data acquisition device |
CN105071970A (en) * | 2015-08-27 | 2015-11-18 | 中国电信股份有限公司 | Failure analysis method, failure analysis system and network management equipment |
CN106559248A (en) * | 2015-09-30 | 2017-04-05 | 中兴通讯股份有限公司 | A kind of alarm method, alarm device and warning system |
CN108322322A (en) * | 2017-01-18 | 2018-07-24 | 普天信息技术有限公司 | Alarm reporting method |
CN110012490A (en) * | 2018-01-04 | 2019-07-12 | 中兴通讯股份有限公司 | Alarm method, device, operation and maintenance center and computer readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN112039681A (en) | 2020-12-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10956362B1 (en) | Searching archived data | |
CN110489391B (en) | Data processing method and related equipment | |
CN107528766B (en) | Information pushing method, device and system | |
CA2896865C (en) | Method and system for using a recursive event listener on a node in hierarchical data structure | |
EP3258653A1 (en) | Message pushing method and device | |
CN103401934A (en) | Method and system for acquiring log data | |
WO2023029519A1 (en) | Data synchronization method and apparatus, computer device, and storage medium | |
CN111881011A (en) | Log management method, platform, server and storage medium | |
CN107040576A (en) | Information-pushing method and device, communication system | |
CN105022815A (en) | Information interception method and device | |
CN109189658B (en) | Log storage method, control node and computer readable storage medium | |
CN108063832B (en) | Cloud storage system and storage method thereof | |
WO2020244306A1 (en) | Alarm reporting method and apparatus | |
CN113420032A (en) | Classification storage method and device for logs | |
CN112069264A (en) | Heterogeneous data source acquisition method and device, electronic equipment and storage medium | |
US11349957B2 (en) | Automatic knowledge management for data lineage tracking | |
CN112835978A (en) | Data storage method and device and computer equipment | |
CN116048846A (en) | Data transmission method, device, equipment and storage medium | |
CN103457771B (en) | The management method of the cluster virtual machine of a kind of HA and equipment | |
CN116132625A (en) | Supervision method and device for transaction flow | |
CN112764988B (en) | Data segment acquisition method and device | |
US10963331B2 (en) | Collecting repeated diagnostics data from across users participating in a document collaboration session | |
CN106375354B (en) | Data processing method and device | |
CN109905391A (en) | A kind of business network secure data acquisition management system | |
US9904724B1 (en) | Method and apparatus for message based security audit logging |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20818290 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20818290 Country of ref document: EP Kind code of ref document: A1 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20818290 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS (EPO FORM 1205A DATED 17.05.2022) |