WO2023040259A1 - Resource alarm analysis method and apparatus, electronic device, and storage medium - Google Patents

Resource alarm analysis method and apparatus, electronic device, and storage medium Download PDF

Info

Publication number
WO2023040259A1
WO2023040259A1 PCT/CN2022/087437 CN2022087437W WO2023040259A1 WO 2023040259 A1 WO2023040259 A1 WO 2023040259A1 CN 2022087437 W CN2022087437 W CN 2022087437W WO 2023040259 A1 WO2023040259 A1 WO 2023040259A1
Authority
WO
WIPO (PCT)
Prior art keywords
alarm
resource
slices
alarm information
information
Prior art date
Application number
PCT/CN2022/087437
Other languages
French (fr)
Chinese (zh)
Inventor
唐英
李小进
文秀林
杨洋
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2023040259A1 publication Critical patent/WO2023040259A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/28Databases characterised by their database models, e.g. relational or object models

Definitions

  • the embodiments of the present application relate to the technical field of mobile communications, and in particular to a resource alarm analysis method, device, electronic equipment, and storage medium.
  • the 5G network realizes customization, openness and service of the network through a service-based network architecture combined with virtualization and cloud technologies.
  • the virtualized network is divided into hardware layer, virtual layer, and network element layer from bottom to top.
  • the lower layer resources are the basis for the operation of the upper layer resources.
  • the failure of the physical layer resources often causes the failure of the virtual layer resources, and the failure of the virtual layer resources, It will also cause network elements to fail, and eventually affect the normal processing of services. Therefore, when an alarm occurs on a resource in a virtualized network, it is often necessary to comprehensively analyze the alarm status of other resources related to this resource in order to find the root cause of the problem and understand the impact of the fault on the entire network resource.
  • association rules In order to solve the time-consuming problem of manual distributed query, a query method based on association rules is adopted, and the correlation analysis between alarms is carried out when active alarms are reported to identify primary-auxiliary alarms.
  • association rules limited by the generation conditions, The generation efficiency and practical application of association rules are still in a relatively difficult state, and the correlation analysis of resource alarms in virtualized networks and the efficient detection of root causes are still problems that need to be solved urgently.
  • the embodiment of the present application provides a resource alarm analysis method, the method includes: obtaining the associated resource instance relationship tree of the alarm resource; according to the associated resource instance relationship tree, obtaining multiple alarm slices of the alarm resource; wherein, the alarm slice includes Associate the alarm information of at least one resource node in the resource instance relationship tree; obtain associated alarm information with an associated relationship according to the alarm information in multiple alarm slices.
  • the embodiment of the present application also proposes a resource alarm analysis device, including: an acquisition module, used to acquire the associated resource instance relationship tree of the alarm resource; a slicing module, used to acquire multiple alarm resources of the alarm resource according to the associated resource instance relationship tree A slice; wherein, the alarm slice includes alarm information of at least one resource node in the relationship tree of associated resource instances per unit time; the analysis module is used to obtain associated alarm information with an associated relationship according to the alarm information in multiple alarm slices.
  • the embodiment of the present application also provides an electronic device, the device includes: at least one processor; and a memory connected to the at least one processor in communication; wherein, the memory stores information that can be processed by the at least one processor; Instructions executed by a processor, the instructions are executed by the at least one processor, so that the at least one processor can execute the resource alarm analysis method as described above.
  • the embodiment of the present application also provides a computer-readable storage medium storing a computer program, and implementing the resource alarm analysis method as described above when the computer program is executed by a processor.
  • Fig. 1 is a schematic diagram of a 5G virtual network resource model in an embodiment of the present application
  • FIG. 2 is a flow chart of a resource alarm analysis method in an embodiment of the present application
  • FIG. 3 is a schematic diagram of a resource relationship structure in a virtualized network in an embodiment of the present application
  • FIG. 4 is a schematic structural diagram of the total tree of associated resource instance relationships in an embodiment of the present application.
  • FIG. 5 is a schematic structural diagram of a resource alarm analysis device in another embodiment of the present application.
  • Fig. 6 is a schematic structural diagram of an electronic device in another embodiment of the present application.
  • the main purpose of the embodiment of the present application is to propose a resource alarm analysis method, device, electronic equipment, and storage medium, aiming at efficiently identifying the alarm association relationship between different alarms on the alarm resource when receiving a resource alarm, thereby improving Speed of root cause analysis of resource alerts.
  • an embodiment of the present application provides a resource alarm analysis method, the method includes: obtaining the associated resource instance relationship tree of the alarm resource; according to the associated resource instance relationship tree, obtaining multiple alarm slices of the alarm resource; wherein, The alarm slice contains the alarm information of at least one resource node in the associated resource instance relationship tree per unit time; according to the alarm information in multiple alarm slices, the associated alarm information with the associated relationship is obtained.
  • the resource alarm analysis method obtains the associated resource instance relationship tree of the alarm resource, and obtains multiple alarm slices of the alarm resource according to the associated resource instance relationship tree, and obtains the The associated alarm information of the resource association relationship, by obtaining the associated resource instance relationship tree of the alarm resource, and only detecting the alarm information of each resource contained in the associated resource instance relationship tree, reduces the amount of data that needs to be analyzed and detected, and improves the analysis. detection efficiency, and through the slice-based processing and detection of alarm information, according to the alarm information in each slice, accurately identify the correlation between alarms, which is convenient for analyzing the root cause of resource alarms based on the alarm correlation, and realize resource management. Efficient identification of the correlation between alarms and the root cause of alarms.
  • the first aspect of the embodiment of the present application provides a resource alarm analysis method.
  • the schematic diagram of the 5G virtualized network resource model targeted by the resource alarm analysis method is shown in Figure 1.
  • the uppermost network element layer includes service network elements and virtualization network elements.
  • Network functions the virtual layer in the middle layer includes virtualized network resources such as hosts, virtual interactive machines, virtual databases, virtual networks, virtual hosts, virtual network cards, and virtual disks
  • the lowest hardware layer includes servers and system servers , interactive server, interactive system server, switch port, router port, hardware facilities or ports such as switches and routers, each resource communicates and connects according to business interaction or association relationship.
  • the resource alarm analysis method is applied to analysis and control terminals with communication and analysis capabilities, such as electronic devices such as computers, tablets, and mobile phones.
  • the application in computers is used as an example for illustration. Refer to Figure 2 for the process, which specifically includes the following steps:
  • Step 201 obtain the associated resource instance relationship tree of the alarm resource.
  • a computer detects a resource alarm on a resource in the 5G virtualized network or receives an analysis of a resource alarm, it obtains the associated resource of the alarm resource based on the specific type and number of the resource where the alarm occurred. instance relationship tree.
  • the computer before the computer obtains the associated resource instance relationship tree of the alarm resource, it also includes: generating the associated resource instance relationship tree including each resource, and storing the generated associated resource instance relationship tree in the graph database; obtaining The associated resource instance relationship tree of the alarm resource includes: reading the associated resource instance relationship tree of the alarm resource in the overall tree of the associated resource instance relationship according to the preset association type.
  • the alarm resource analysis system in the computer collects various resource data from each network element through resource probes, and stores them in the system resource library; After virtualized processing, it is stored in the current alarm library and historical alarm library.
  • the computer When the computer detects the alarm of the virtualized network, it extracts the resource data that will report the alarm from the resources of the entire network, and combines the structure of the currently managed network with the According to the characteristics of the network, model the resources that need to be analyzed, determine the resources that have direct or indirect relationship between each resource, and then generate a total tree of related resource instances including each resource, and summarize the generated related resource instance relationships
  • the tree is stored in a graph database other than the resource database of the entire network.
  • the associated resource of the alarm resource is read in the overall tree of the associated resource instance relationship Relationship instance relationship tree.
  • the resource relationship structure diagram of the seven-layer resources in the virtualized network is shown in Figure 3.
  • the router is at the bottom layer, and the bottom switch (End of Row, EOR) is at the top.
  • Top of Rack Top of Rack, TOR
  • server host
  • virtual host virtual host
  • service network element the structural diagram of the general tree of the associated resource instance relationship established is shown in Figure 4.
  • the overall structure is that different routers pass through different switches and At least one server is connected, and the corresponding host is connected through the server, and then each host is connected through its own connected virtual host and virtual network function.
  • After reading the overall tree of the associated resource instance relationship read the associated resource instance relationship tree of the alarm resource according to the associated type.
  • For a resource in the total relationship tree of an associated resource instance there are multiple resources directly or indirectly associated with itself in the entire relationship tree, and a specific associated resource instance relationship tree contains resources calculated according to the preset association type All associated resources including itself.
  • the selected preset association type can be adjusted according to the actual situation, so as to analyze the association relationship of alarm information from different angles.
  • the total tree of associated resource instance relationship can be stored in the graph database It can also be stored in other databases. This embodiment does not limit the specific storage method of the selected preset association type and the total tree of association resource instance relationships.
  • Step 202 according to the associated resource instance relationship tree, multiple alarm slices of the alarm resource are obtained.
  • the computer obtains the associated resource instance relationship tree of the alarm resource, it obtains multiple alarm slices of the alarm resource according to the associated resource instance relationship tree, wherein the alarm slice contains at least Alarm information of a resource node.
  • the computer obtains multiple alarm slices of the alarm resource according to the relationship tree of the associated resource instance, including: obtaining the query snapshot of the alarm data of each resource in the relationship tree of the associated resource instance within a preset time period; according to the unit time, according to The alarm sequence divides the query snapshot into multiple query slices; multiple alarm slices containing alarm information are filtered out from multiple query slices.
  • the computer determines the resource instance to be queried, the time range of the alarm query, and the range of alarm data (historical alarms, active alarms or all alarms) according to the associated resource instance relationship tree. Among them, the resource instance only selects the resources included in the resource association type for instantiation.
  • the computer can traverse the associated resource instance relationship tree according to the query conditions in advance to query out the associated resources of the alarm resource, and query out the alarm information of these resources within the preset time period.
  • the query result display interface will display the network element itself, all virtual machines associated with this network element, the host where each virtual machine is located, and each host
  • the corresponding server, the TOR connected to each server, the EOR connected to TOR, and the router connected to EOR are identified respectively, and all alarm information of each resource within a preset time period is displayed in a list display on multiple tab pages.
  • each tab page stores the alarm information in each tab page as a query snapshot and put it into the database.
  • the computer performs a query, directly read the query snapshot as the sample to be analyzed, and divide the query snapshot corresponding to the alarm information of each resource node in the relationship tree of the associated resource instance into Continuous time slices form multiple query slices for querying alarm information, and then the computer screens out multiple alarm slices containing alarm information from multiple query slices, and each alarm slice stores associated resource instances per unit time Alarm information of each resource node in the relationship tree.
  • the query snapshot corresponding to the relationship tree of the associated resource instance of the alarm resource can be generated in real time based on the data in the database, or can be directly obtained by reading the data in the database in advance, for each association
  • the query snapshot generated by the resource instance relationship tree is not limited in this embodiment.
  • Step 203 according to the alarm information in the multiple alarm slices, the associated alarm information with the associated relationship is obtained.
  • the computer acquires multiple alarm slices of the alarm resource, according to the alarm information in the multiple alarm slices, the computer acquires associated alarm information with an associated relationship, and uses the associated alarm as an associated alarm.
  • obtaining associated alarm information with an association relationship includes: determining at least one target alarm slice in multiple alarm slices; wherein, the target alarm slice contains multiple resource nodes Alarm information; if multiple alarm information is included in multiple target alarm slices, the multiple alarm information is used as associated alarm information.
  • the computer obtains the query snapshot of the alarm information of each resource node in the relationship tree of the associated resource instance within 3 minutes, and divides the query snapshot into 18 alarm slices according to the unit duration of 10 seconds.
  • the computer detects the alarm information in each alarm slice, and uses alarm slices 1 to 6 that simultaneously contain alarm information of multiple resource nodes as target alarm slices. Then detect the alarm information in the target alarm slice, and judge the alarms whose alarm states have changed in each target alarm slice.
  • Alarm 1 to Alarm 4 are associated alarm sets. If the alarm resources are at different levels, set the alarm at the lowest level as the root alarm; if the alarm resources are at the same level, set the alarm that occurs first as the root alarm; or if a user confirms an alarm as the root alarm according to other criteria, the After the root alarm is confirmed, other alarms in this alarm set are automatically sub-alarms.
  • the number of target alarm slices in which multiple alarms recorded as associated alarm information need to appear can be adjusted according to actual conditions, which is not limited in this embodiment. By determining multiple target alarm slices and using multiple target alarm slices to detect alarms that may have correlations multiple times, it is ensured that the associated alarm information with correlations can be accurately identified, and the identification efficiency of alarm correlations is improved. Improve the detection efficiency of the root cause of the alarm.
  • the associated alarm information with associated relationship is obtained, including: generating an associated topology map according to the associated resource instance relationship tree; playing each alarm slice in the associated topology map, according to The alarm information in the alarm slice updates the alarm levels and alarm times of each resource node in the associated topology; according to the instruction and the associated topology map, the associated alarm information with the associated relationship is obtained. For example, establish an associated resource instance relationship tree based on the service network element association, and when performing resource alarm association analysis on one of the Unified Data Management (UDM) instances, query out the relationship between the UDM instance and the UDM instance based on the associated resource instance relationship tree.
  • UDM Unified Data Management
  • NEs Session Management function (SMF), Access and Mobility Management Function (AMF) and Authentication Server Function (AUSF) are associated, and the computer
  • SMF Session Management function
  • AMF Access and Mobility Management Function
  • AUSF Authentication Server Function
  • the computer After obtaining the alarm information of each resource at the preset duration, the selected UDM network element instance, all SMF network element instances, AMF network element instances and AUSF network element instances associated with this UDM network element instance are displayed on the top of the page through 4 tab pages.
  • the network element instance and then according to the relationship tree of the associated resource instance, generate an associated topology diagram for the alarm resource that includes the resource nodes corresponding to the four types of network element instances, and display it according to the associated type.
  • the computer displays the slice analysis switch on the top of the alarm list.
  • the computer After receiving the user's instruction to click slice analysis, the computer will render the current playback on each resource node of the associated topology map according to the alarm information in each alarm slice obtained.
  • the color of the highest-level alarm active on each resource and the total number of alarms of each level are displayed on the associated topology map.
  • the slice time window After receiving the slice switching instruction from the user, the slice time window automatically changes from the current position Swipe backwards to automatically render the alarm status of each resource instance in each alarm slice to the associated topology map at a certain speed, which is equivalent to computer tomography (Computed Tomography, CT) and imaging, for users to observe the alarm status of each resource.
  • CT Computer tomography
  • the time is generated and restored, for example, during the playback of multiple alarm slices generated by a query snapshot, it is found that the resource nodes corresponding to the UDM instance and the resource nodes corresponding to the SMF instance are in different alarm slices, and the alarm colors on the nodes are rendered simultaneously.
  • Change or the alarm count on the node changes at the same time, the user can observe the alarm changes, check the UDM instance and the SMF instance in the alarm list, and then click the association button to confirm that the UDM instance and the SMF instance in the alarm list are in the same slice
  • the alarms that are reported at the same time and recovered in another time slice are set for alarm association.
  • the computer will set the alarms that are reported in the same time slice and recovered in another time slice as A set of associated alarms, the alarm reported first is set as the root alarm, or a root alarm is determined by the user according to other principles, and the rest of the alarms are automatically sub-alarms.
  • the alarm information in the alarm slice on the association topology diagram generated according to the association resource instance relationship tree the alarm rendering is performed on each resource node on the association topology diagram, and the alarm changes are intuitively displayed for the user by means of slice scanning, for the user Determine the alarms with correlations, and store the alarms with correlations as associated alarm information according to user input instructions, so as to realize the accurate and efficient identification of the correlations of alarm information, and improve the detection efficiency of the root cause of alarms.
  • the computer after obtaining associated alarm information with an associated relationship according to the alarm information in multiple alarms, it further includes: obtaining alarm key features of the associated alarm information; wherein, the alarm key features include: resource type and/or Alarm code; according to the key features of the alarm, an alarm association mark associated with the alarm information is generated.
  • the computer obtains associated alarm information based on slice analysis results and user instructions, it extracts the key features of the associated alarm set generated based on the root alarm and sub-alarms, and uses the preset analysis algorithm to obtain associated alarm information.
  • the resource type, network element type, alarm code and other characteristics corresponding to the information, and according to the obtained key characteristics of the alarm generate the alarm association mark corresponding to the associated alarm information, and distinguish and identify the obtained associated alarms.
  • the computer after generating the alarm associated flag associated with the alarm information, it also includes: detecting whether the cumulative number of alarm associated flags is zero, and if the accumulated number of alarm associated flags is zero, creating a new cumulative time for the alarm associated flag times, and update the newly-created cumulative times to 1; if the cumulative times of the alarm-related flags is not zero, update the cumulative times of the alarm-related flags.
  • the computer extracts the alarm key features of the associated alarm information according to the analysis algorithm, and generates the corresponding alarm associated tags according to the alarm key features, it queries whether the cumulative number of alarm associated tags generated in the associated tag database is zero.
  • FIG. 5 Another embodiment of the present application relates to a resource alarm analysis device, referring to FIG. 5 , including:
  • the acquiring module 501 is configured to acquire the associated resource instance relationship tree of the alarm resource.
  • the slicing module 502 is configured to obtain multiple alarm slices of alarm resources according to the associated resource instance relationship tree; wherein, the alarm slice includes alarm information of at least one resource node in the associated resource instance relationship tree within a unit time.
  • the analysis module 503 is configured to acquire associated alarm information with an association relationship according to the alarm information in multiple alarm slices.
  • this embodiment is an apparatus embodiment corresponding to the method embodiment, and this embodiment can be implemented in cooperation with the method embodiment.
  • the relevant technical details mentioned in the method embodiments are still valid in this embodiment, and will not be repeated here in order to reduce repetition.
  • the related technical details mentioned in this embodiment can also be applied in the method embodiment.
  • modules involved in this embodiment are logical modules.
  • a logical unit can be a physical unit, or a part of a physical unit, or multiple physical units. Combination of units.
  • units that are not closely related to solving the technical problem proposed by the present invention are not introduced in this embodiment, but this does not mean that there are no other units in this embodiment.
  • FIG. 6 Another embodiment of the present application also provides an electronic device, referring to FIG. 6 , including: including at least one processor 601; and a memory 602 communicatively connected to at least one processor 601; An instruction executed by one processor 601, the instruction is executed by at least one processor 601, so that at least one processor 601 can execute the resource alarm analysis method described in any method embodiment above.
  • the memory 602 and the processor 601 are connected by a bus, and the bus may include any number of interconnected buses and bridges, and the bus connects one or more processors 601 and various circuits of the memory 602 together.
  • the bus may also connect together various other circuits such as peripherals, voltage regulators, and power management circuits, all of which are well known in the art and therefore will not be further described herein.
  • the bus interface provides an interface between the bus and the transceivers.
  • a transceiver may be a single element or multiple elements, such as multiple receivers and transmitters, providing means for communicating with various other devices over a transmission medium.
  • the data processed by the processor 601 is transmitted on the wireless medium through the antenna, and further, the antenna also receives the data and transmits the data to the processor 601 .
  • Processor 601 is responsible for managing the bus and general processing, and may also provide various functions including timing, peripheral interface, voltage regulation, power management, and other control functions. And the memory 602 may be used to store data used by the processor 601 when performing operations.
  • Another embodiment of the present application also provides a computer-readable storage medium storing a computer program.
  • the above method embodiments are implemented when the computer program is executed by the processor.
  • a storage medium includes several instructions to make a device ( It may be a single-chip microcomputer, a chip, etc.) or a processor (processor) to execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disk or optical disc, etc., which can store program codes. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Software Systems (AREA)
  • Quality & Reliability (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present application relates to the technical field of wireless communications, and discloses a resource alarm analysis method and apparatus, an electronic device, and a storage medium. The method comprises: acquiring an association resource instance relationship tree of an alarm resource; acquiring a plurality of alarm slices of the alarm resource according to the association resource instance relationship tree, wherein the alarm slices comprise alarm information of at least one resource node in the association resource instance relationship tree in a unit time; and acquiring associated alarm information having an association relationship according to the alarm information in the plurality of alarm slices.

Description

资源告警分析方法、装置、电子设备和存储介质Resource alarm analysis method, device, electronic device and storage medium
相关申请的交叉引用Cross References to Related Applications
本申请基于申请号为“202111101821.0”、申请日为2021年9月18日的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此以引入方式并入本申请。This application is based on the Chinese patent application with the application number "202111101821.0" and the filing date is September 18, 2021, and claims the priority of the Chinese patent application. The entire content of the Chinese patent application is hereby incorporated by reference Apply.
技术领域technical field
本申请实施例涉及移动通信技术领域,特别涉及一种资源告警分析方法、装置、电子设备和存储介质。The embodiments of the present application relate to the technical field of mobile communications, and in particular to a resource alarm analysis method, device, electronic equipment, and storage medium.
背景技术Background technique
5G网络依托于Cloud Native(云原生)核心思想,通过基于服务的网络架构,结合虚拟化、云化技术,实现了网络的定制化、开放性以及服务化。虚拟化网络自下而上分为硬件层、虚拟层、网元层,下层资源是上层资源运行的基础,物理层资源的故障,往往会引起虚拟层资源的故障,而虚拟层资源发生故障,又会导致网元发生故障,最终影响业务的正常处理。所以,当虚拟化网络中一个资源发生告警时,往往需要综合分析与这个资源相关的其他资源的告警情况,才能发现问题根因,并了解此次故障对整个网络资源的影响范围。Relying on the core idea of Cloud Native, the 5G network realizes customization, openness and service of the network through a service-based network architecture combined with virtualization and cloud technologies. The virtualized network is divided into hardware layer, virtual layer, and network element layer from bottom to top. The lower layer resources are the basis for the operation of the upper layer resources. The failure of the physical layer resources often causes the failure of the virtual layer resources, and the failure of the virtual layer resources, It will also cause network elements to fail, and eventually affect the normal processing of services. Therefore, when an alarm occurs on a resource in a virtualized network, it is often necessary to comprehensively analyze the alarm status of other resources related to this resource in order to find the root cause of the problem and understand the impact of the fault on the entire network resource.
而大多数网络运维系统使用不同页面分别提供网络资源和资源告警的查询,在资源告警查询时,查询结果只包含所选资源的告警信息,因此,查询过程中需要反复进行页面切换对比,经过多次查询才能获得关联资源在一段时间内的全部告警信息,最终经过人工归纳统计,识别出资源故障的根本原因,但是由于5G网络组网复杂,且被管对象数量巨大,日常告警量也非常大,单靠人工的分布查询,非常耗时。However, most network operation and maintenance systems use different pages to provide the query of network resources and resource alarms respectively. When querying resource alarms, the query results only include the alarm information of the selected resource. Therefore, it is necessary to switch between pages repeatedly during the query process. Only multiple queries can obtain all the alarm information of associated resources within a period of time. Finally, the root cause of resource failures can be identified through manual inductive statistics. Large, it is very time-consuming to rely solely on manual distribution queries.
为了解决人工分布式查询的耗时问题,采用一种基于关联规则的查询方式,在活动告警上报时就进行告警之间的相关性分析,识别主-辅告警,但是,受到生成条件的限制,关联规则的生成效率和实际应用依旧处于较为困难的状态,虚拟化网络中资源告警的关联关系分析和根本原因的高效检测依旧是一个急需解决的问题。In order to solve the time-consuming problem of manual distributed query, a query method based on association rules is adopted, and the correlation analysis between alarms is carried out when active alarms are reported to identify primary-auxiliary alarms. However, limited by the generation conditions, The generation efficiency and practical application of association rules are still in a relatively difficult state, and the correlation analysis of resource alarms in virtualized networks and the efficient detection of root causes are still problems that need to be solved urgently.
发明内容Contents of the invention
本申请实施例提供了一种资源告警分析方法,方法包括:获取告警资源的关联资源实例关系树;根据关联资源实例关系树,获取告警资源的多个告警切片;其中,告警切片包含单位时间内关联资源实例关系树中至少一个资源节点的告警信息;根据多个告警切片中的告警信息,获取具有关联关系的关联告警信息。The embodiment of the present application provides a resource alarm analysis method, the method includes: obtaining the associated resource instance relationship tree of the alarm resource; according to the associated resource instance relationship tree, obtaining multiple alarm slices of the alarm resource; wherein, the alarm slice includes Associate the alarm information of at least one resource node in the resource instance relationship tree; obtain associated alarm information with an associated relationship according to the alarm information in multiple alarm slices.
本申请实施例还提出了一种资源告警分析装置,包括:获取模块,用于获取告警资源的关联资源实例关系树;切片模块,用于根据关联资源实例关系树,获取告警资源的多个告警切片;其中,告警切片包含单位时间内关联资源实例关系树中至少一个资源节点的告警信息;分析模块,用于根据多个告警切片中的告警信息,获取具有关联关系的关联告警信息。The embodiment of the present application also proposes a resource alarm analysis device, including: an acquisition module, used to acquire the associated resource instance relationship tree of the alarm resource; a slicing module, used to acquire multiple alarm resources of the alarm resource according to the associated resource instance relationship tree A slice; wherein, the alarm slice includes alarm information of at least one resource node in the relationship tree of associated resource instances per unit time; the analysis module is used to obtain associated alarm information with an associated relationship according to the alarm information in multiple alarm slices.
本申请实施例还提出了一种电子设备,所述设备包括:至少一个处理器;以及,与所述至少一个处理器通信连接的存储器;其中,所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够执行如上所述 的资源告警分析方法。The embodiment of the present application also provides an electronic device, the device includes: at least one processor; and a memory connected to the at least one processor in communication; wherein, the memory stores information that can be processed by the at least one processor; Instructions executed by a processor, the instructions are executed by the at least one processor, so that the at least one processor can execute the resource alarm analysis method as described above.
本申请实施例还提出了计算机可读存储介质,存储有计算机程序,所述计算机程序被处理器执行时实现如上所述的资源告警分析方法。The embodiment of the present application also provides a computer-readable storage medium storing a computer program, and implementing the resource alarm analysis method as described above when the computer program is executed by a processor.
附图说明Description of drawings
一个或多个实施例通过与之对应的附图中的图片进行示例性说明,这些示例性说明并不构成对实施例的限定。One or more embodiments are exemplified by pictures in the accompanying drawings, and these exemplifications are not intended to limit the embodiments.
图1是本申请一个实施例中的5G虚拟网络资源模型示意图;Fig. 1 is a schematic diagram of a 5G virtual network resource model in an embodiment of the present application;
图2是本申请一个实施例中的一种资源告警分析方法的流程图;FIG. 2 is a flow chart of a resource alarm analysis method in an embodiment of the present application;
图3是本申请一个实施例中的虚拟化网络中的资源关系结构示意图;FIG. 3 is a schematic diagram of a resource relationship structure in a virtualized network in an embodiment of the present application;
图4是本申请一个实施例中的关联资源实例关系总树的结构示意图;FIG. 4 is a schematic structural diagram of the total tree of associated resource instance relationships in an embodiment of the present application;
图5是本申请另一个实施例中的资源告警分析装置结构示意图;FIG. 5 is a schematic structural diagram of a resource alarm analysis device in another embodiment of the present application;
图6是本申请另一个实施例中的电子设备的结构示意图。Fig. 6 is a schematic structural diagram of an electronic device in another embodiment of the present application.
具体实施方式Detailed ways
由背景技术可知,为了解决人工分布式查询的耗时问题,采用一种基于关联规则的查询方式,在活动告警上报时就进行告警之间的相关性分析,识别主-辅告警,但是,受到生成条件的限制,关联规则的生成效率和实际应用依旧处于较为困难的状态,虚拟化网络中资源告警的关联关系分析和根本原因的高效检测依旧是一个急需解决的问题。It can be seen from the background technology that in order to solve the time-consuming problem of manual distributed query, a query method based on association rules is adopted, and the correlation analysis between alarms is carried out when active alarms are reported to identify primary-auxiliary alarms. Due to the limitation of generation conditions, the generation efficiency and practical application of association rules are still in a relatively difficult state. The correlation analysis of resource alarms in virtualized networks and the efficient detection of root causes are still problems that need to be solved urgently.
本申请实施例的主要目的在于提出一种资源告警分析方法、装置、电子设备和存储介质,旨在接收到资源告警时,高效的识别出告警资源上不同告警之间的告警关联关系,进而提高对引起资源告警的根本原因的分析速度。The main purpose of the embodiment of the present application is to propose a resource alarm analysis method, device, electronic equipment, and storage medium, aiming at efficiently identifying the alarm association relationship between different alarms on the alarm resource when receiving a resource alarm, thereby improving Speed of root cause analysis of resource alerts.
为了解决上述问题,本申请的实施例提供了一种资源告警分析方法,方法包括:获取告警资源的关联资源实例关系树;根据关联资源实例关系树,获取告警资源的多个告警切片;其中,告警切片包含单位时间内关联资源实例关系树中至少一个资源节点的告警信息;根据多个告警切片中的告警信息,获取具有关联关系的关联告警信息。In order to solve the above problems, an embodiment of the present application provides a resource alarm analysis method, the method includes: obtaining the associated resource instance relationship tree of the alarm resource; according to the associated resource instance relationship tree, obtaining multiple alarm slices of the alarm resource; wherein, The alarm slice contains the alarm information of at least one resource node in the associated resource instance relationship tree per unit time; according to the alarm information in multiple alarm slices, the associated alarm information with the associated relationship is obtained.
本申请实施例提供的资源告警分析方法,通过获取告警资源的关联资源实例关系树,并根据关联资源实例关系树获取告警资源的多个告警切片,根据告警切片中的告警信息,获取具有时间和资源关联关系的关联告警信息,通过获取告警资源的关联资源实例关系树,并只对关联资源实例关系树包含的各资源的告警信息进行检测,减少了需要进行分析检测的数据量,提高了分析检测效率,并通过对告警信息的切片式处理和检测,根据各个切片中的告警信息,准确的识别出告警之间的关联关系,便于根据告警关联关系分析出引起资源告警的根本原因,实现资源告警之间关联关系和告警根本原因的高效识别。The resource alarm analysis method provided by the embodiment of the present application obtains the associated resource instance relationship tree of the alarm resource, and obtains multiple alarm slices of the alarm resource according to the associated resource instance relationship tree, and obtains the The associated alarm information of the resource association relationship, by obtaining the associated resource instance relationship tree of the alarm resource, and only detecting the alarm information of each resource contained in the associated resource instance relationship tree, reduces the amount of data that needs to be analyzed and detected, and improves the analysis. detection efficiency, and through the slice-based processing and detection of alarm information, according to the alarm information in each slice, accurately identify the correlation between alarms, which is convenient for analyzing the root cause of resource alarms based on the alarm correlation, and realize resource management. Efficient identification of the correlation between alarms and the root cause of alarms.
为使本申请实施例的目的、技术方案和优点更加清楚,下面将结合附图对本申请的各实施例进行详细的阐述。然而,本领域的普通技术人员可以理解,在本申请各实施例中,为了使读者更好地理解本申请而提出了许多技术细节。但是,即使没有这些技术细节和基于以下各实施例的种种变化和修改,也可以实现本申请所要求保护的技术方案。以下各个实施例的划分是为了描述方便,不应对本申请的具体实现方式构成任何限定,各个实施例在不矛盾的前提下可以相互结合相互引用。In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the embodiments of the present application will be described in detail below with reference to the accompanying drawings. However, those of ordinary skill in the art can understand that in each embodiment of the application, many technical details are provided for readers to better understand the application. However, even without these technical details and various changes and modifications based on the following embodiments, the technical solutions claimed in this application can also be realized. The division of the following embodiments is for the convenience of description, and should not constitute any limitation to the specific implementation of the present application, and the embodiments can be combined and referred to each other on the premise of no contradiction.
下面将结合具体的实施例的对本申请记载的资源告警分析方法的实现细节进行具体的说明,以下内容仅为方便理解提供的实现细节,并非实施本方案的必须。The implementation details of the resource alarm analysis method described in this application will be described in detail below in conjunction with specific embodiments. The following content is only implementation details provided for easy understanding, and is not necessary for implementing this solution.
本申请实施例的第一方面提供了一种资源告警分析方法,资源告警分析方法针对的5G虚拟化网络资源模型示意图如图1所示,最上层的网元层包含了业务网元和虚拟化网络功能,处于中间层的虚拟层包括了主机、虚拟交互机、虚拟数据库、虚拟网络、虚拟主机、虚拟网卡、虚拟磁盘这些虚拟化后的网络资源,最下层的硬件层包括了服务器、系统服务器、交互服务器、交互系统服务器、交换机端口、路由器端口、交换机和路由器这些硬件设施或端口,各个资源根据业务交互或者关联关系进行通信连接。在一些实施例中,资源告警分析方法应用于具有通信和分析能力的分析控制终端,如电脑、平板、手机等电子设备,本实施例以应用在电脑中为例进行说明,资源告警分析方法的流程参考图2,具体包括以下步骤:The first aspect of the embodiment of the present application provides a resource alarm analysis method. The schematic diagram of the 5G virtualized network resource model targeted by the resource alarm analysis method is shown in Figure 1. The uppermost network element layer includes service network elements and virtualization network elements. Network functions, the virtual layer in the middle layer includes virtualized network resources such as hosts, virtual interactive machines, virtual databases, virtual networks, virtual hosts, virtual network cards, and virtual disks, and the lowest hardware layer includes servers and system servers , interactive server, interactive system server, switch port, router port, hardware facilities or ports such as switches and routers, each resource communicates and connects according to business interaction or association relationship. In some embodiments, the resource alarm analysis method is applied to analysis and control terminals with communication and analysis capabilities, such as electronic devices such as computers, tablets, and mobile phones. In this embodiment, the application in computers is used as an example for illustration. Refer to Figure 2 for the process, which specifically includes the following steps:
步骤201,获取告警资源的关联资源实例关系树。 Step 201, obtain the associated resource instance relationship tree of the alarm resource.
具体地说,电脑检测到5G虚拟化网络中某一资源上出现资源告警或者接收到对某一资源告警进行分析时,根据发生告警的资源的具体类型和编号等信息,获取告警资源的关联资源实例关系树。Specifically, when a computer detects a resource alarm on a resource in the 5G virtualized network or receives an analysis of a resource alarm, it obtains the associated resource of the alarm resource based on the specific type and number of the resource where the alarm occurred. instance relationship tree.
在一个例子中,电脑在获取告警资源的关联资源实例关系树前,还包括:生成包含各资源的关联资源实例关系总树,并将生成的关联资源实例关系总树存储在图数据库中;获取告警资源的关联资源实例关系树,包括:根据预设关联类型,在关联资源实例关系总树中读取告警资源的关联资源实例关系树。例如,电脑中的告警资源分析系统通过资源探针从各个网元中采集各种资源数据,并存入系统资源库中;通过告警探针从各个网元中采集各资源的告警信息,经过格式化处理后,存入当前告警库和历史告警库,电脑在对虚拟化网络的告警进行检测的时候,在全网资源中抽取会上报告警的资源数据,结合当前被管理的网络的结构与组网特点,对需要进行分析的各资源进行建模,确定出各资源存在直接或间接关联关系的资源,进而生成包含各资源的关联资源实例关系总树,并将生成的关联资源实例关系总树存储到全网资源数据库之外的图数据库中,在需要进行告警资源的关联资源实例关系树获取的时候,根据预设关联类型,在关联资源实例关系总树中读取告警资源的关联资源关系实例关系树。例如,预设关联类型为资源层级关联时,虚拟化网络中七层资源的资源关系结构示意图如图3所示,处于最底层的是路由器,依次向上的是底部交换机(End of Row,EOR)、顶部交换机(Top of Rack,TOR)、服务器、主机、虚拟主机和业务网元,建立的关联资源实例关系总树的结构示意图如图4所示,整体结构为不同的路由器通过不同的交换机和至少一个服务器连接,并通过服务器连接相对应的主机,然后各个主机再通过自身连接的虚拟主机和虚拟网络功能相连接。读取关联资源实例关系总树后,再根据关联类型读取告警资源的关联资源实例关系树。对于关联资源实例关系总树中的一个资源来说,整个关系总树中存在多个和自身直接或间接关联的资源,一个具体的关联资源实例关系树中包含根据预设关联类型计算出的资源自身在内所有相关联的资源。In an example, before the computer obtains the associated resource instance relationship tree of the alarm resource, it also includes: generating the associated resource instance relationship tree including each resource, and storing the generated associated resource instance relationship tree in the graph database; obtaining The associated resource instance relationship tree of the alarm resource includes: reading the associated resource instance relationship tree of the alarm resource in the overall tree of the associated resource instance relationship according to the preset association type. For example, the alarm resource analysis system in the computer collects various resource data from each network element through resource probes, and stores them in the system resource library; After virtualized processing, it is stored in the current alarm library and historical alarm library. When the computer detects the alarm of the virtualized network, it extracts the resource data that will report the alarm from the resources of the entire network, and combines the structure of the currently managed network with the According to the characteristics of the network, model the resources that need to be analyzed, determine the resources that have direct or indirect relationship between each resource, and then generate a total tree of related resource instances including each resource, and summarize the generated related resource instance relationships The tree is stored in a graph database other than the resource database of the entire network. When it is necessary to obtain the associated resource instance relationship tree of the alarm resource, according to the preset association type, the associated resource of the alarm resource is read in the overall tree of the associated resource instance relationship Relationship instance relationship tree. For example, when the default association type is resource-level association, the resource relationship structure diagram of the seven-layer resources in the virtualized network is shown in Figure 3. The router is at the bottom layer, and the bottom switch (End of Row, EOR) is at the top. , Top of Rack (Top of Rack, TOR), server, host, virtual host and service network element, the structural diagram of the general tree of the associated resource instance relationship established is shown in Figure 4. The overall structure is that different routers pass through different switches and At least one server is connected, and the corresponding host is connected through the server, and then each host is connected through its own connected virtual host and virtual network function. After reading the overall tree of the associated resource instance relationship, read the associated resource instance relationship tree of the alarm resource according to the associated type. For a resource in the total relationship tree of an associated resource instance, there are multiple resources directly or indirectly associated with itself in the entire relationship tree, and a specific associated resource instance relationship tree contains resources calculated according to the preset association type All associated resources including itself.
在读取告警资源的关联资源实例关系树时,选取的预设关联类型可以根据实际情况进行调整,从而从不同角度对告警信息的关联关系进行分析,关联资源实例关系总树可以存储在图数据库中,也可以存储在其他数据库中,本实施例对选择的预设关联类型和关联资源实例关系总树的具体存储方式不做限制。通过预先建立包含各资源的关联资源实例关系总树并存入图数据库中,便于进行告警关联分析时直接在图数据库中获取关联资源实例关系总树并根 据预设关联类型获取告警资源的关联资源实例关系树;便于后续根据获取到的关联资源实例关系树进行告警信息的查询和分析,使得电脑能够在海量的资源和告警下进行有指向性的查询分析,提高告警之间关联关系的分析速度,进而更加高效的分析出引起告警的根本原因。When reading the associated resource instance relationship tree of alarm resources, the selected preset association type can be adjusted according to the actual situation, so as to analyze the association relationship of alarm information from different angles. The total tree of associated resource instance relationship can be stored in the graph database It can also be stored in other databases. This embodiment does not limit the specific storage method of the selected preset association type and the total tree of association resource instance relationships. By pre-establishing the total tree of associated resource instance relationships containing each resource and storing it in the graph database, it is convenient to directly obtain the total tree of associated resource instance relationships in the graph database when performing alarm correlation analysis and obtain the associated resources of alarm resources according to the preset association type Instance relationship tree; it is convenient for subsequent query and analysis of alarm information based on the obtained associated resource instance relationship tree, so that the computer can perform directional query and analysis under massive resources and alarms, and improve the analysis speed of the relationship between alarms , and then more efficiently analyze the root cause of the alarm.
步骤202,根据关联资源实例关系树,获取告警资源的多个告警切片。 Step 202, according to the associated resource instance relationship tree, multiple alarm slices of the alarm resource are obtained.
具体地说,电脑在获取到对告警资源的关联资源实例关系树后,根据关联资源实例关系树,获取告警资源的多个告警切片,其中,告警切片包含单位时间内关联资源实例关系树中至少一个资源节点的告警信息。Specifically, after the computer obtains the associated resource instance relationship tree of the alarm resource, it obtains multiple alarm slices of the alarm resource according to the associated resource instance relationship tree, wherein the alarm slice contains at least Alarm information of a resource node.
在一个例子中,电脑根据关联资源实例关系树,获取告警资源的多个告警切片,包括:获取关联资源实例关系树中各资源在预设时长内的告警数据的查询快照;根据单位时间,按照告警顺序将查询快照划分成多个查询切片;在多个查询切片中筛选出包含告警信息的多个告警切片。电脑在获取告警资源的关联资源实例关系树后,根据关联资源实例关系树,确定出要进行查询的资源实例、告警查询的时间范围、告警数据的范围(历史告警、活动告警或全部告警),其中,资源实例只选取资源关联类型中包含的资源进行实例化。例如,根据资源层级关系生成的关联资源实例关系树中,只选取网元、虚拟主机、主机、服务器、交换机和路由器这些类型的资源进行实例化和关联查询,将查询出的所有报警信息和资源都显示在同一查询结果页面,且一类资源用一个标签页中的列表进行显示。在进行查询前,电脑可以预先根据查询条件,遍历关联资源实例关系树,将告警资源的关联资源都查询出来,并查询出这些资源在预设时长内的告警信息。将关联资源实例关系树包含的资源集合、预设时长内的告警数据信息集合存入临时表,并以资源类型和告警发生时间建立索引,生成查询快照作为待分析样本。例如,用户输入的查询指令为查询某一网元的告警,则查询结果显示界面分别显示出此网元本身、与这个网元关联的所有虚机、每个虚机所在的主机、每个主机对应的服务器、每个服务器连接的TOR、TOR连接的EOR和EOR连接的路由器各自对应的标识,并在多个标签页中通过列表显示的方式分别显示预设时长内各资源的所有告警信息。然后将各标签页中的告警信息存储为一个查询快照放进数据库中。在电脑进行查询时,直接读取作为待分析样本的查询快照,按照设置好的时间粒度(单位时间)和告警顺序,将关联资源实例关系树中各资源节点的告警信息对应的查询快照分割成连续的时间切片,形成用于查询告警信息的多个查询切片,然后电脑在多个查询切片中筛选出包含了告警信息的多个告警切片,每个告警切片中存储有单位时间内关联资源实例关系树内各资源节点的告警信息。在实际应用中,告警资源的关联资源实例关系树对应的查询快照可以是根据数据库中的数据实时生成的,也可以是通过读取数据库中的数据,直接获取预先按照预设时长,为各关联资源实例关系树生成的查询快照,本实施例对此不做限制。通过将根据各资源点在预设时长内的告警信息生成的查询快照分割成多个查询切片,并筛选出包含告警信息的告警切片,实现按照时间顺序对各告警的区分,便于后续进行告警之间的关联关系分析。In one example, the computer obtains multiple alarm slices of the alarm resource according to the relationship tree of the associated resource instance, including: obtaining the query snapshot of the alarm data of each resource in the relationship tree of the associated resource instance within a preset time period; according to the unit time, according to The alarm sequence divides the query snapshot into multiple query slices; multiple alarm slices containing alarm information are filtered out from multiple query slices. After obtaining the associated resource instance relationship tree of the alarm resource, the computer determines the resource instance to be queried, the time range of the alarm query, and the range of alarm data (historical alarms, active alarms or all alarms) according to the associated resource instance relationship tree. Among them, the resource instance only selects the resources included in the resource association type for instantiation. For example, in the associated resource instance relationship tree generated according to the resource hierarchical relationship, only network elements, virtual hosts, hosts, servers, switches, and routers are selected for instantiation and associated query, and all the alarm information and resources that are queried All are displayed on the same query result page, and one category of resources is displayed in a list in one tab. Before querying, the computer can traverse the associated resource instance relationship tree according to the query conditions in advance to query out the associated resources of the alarm resource, and query out the alarm information of these resources within the preset time period. Store the resource collection contained in the relationship tree of the associated resource instance and the alarm data information collection within the preset time period into a temporary table, and build an index based on the resource type and alarm occurrence time, and generate a query snapshot as a sample to be analyzed. For example, if the query command entered by the user is to query the alarms of a certain network element, the query result display interface will display the network element itself, all virtual machines associated with this network element, the host where each virtual machine is located, and each host The corresponding server, the TOR connected to each server, the EOR connected to TOR, and the router connected to EOR are identified respectively, and all alarm information of each resource within a preset time period is displayed in a list display on multiple tab pages. Then store the alarm information in each tab page as a query snapshot and put it into the database. When the computer performs a query, directly read the query snapshot as the sample to be analyzed, and divide the query snapshot corresponding to the alarm information of each resource node in the relationship tree of the associated resource instance into Continuous time slices form multiple query slices for querying alarm information, and then the computer screens out multiple alarm slices containing alarm information from multiple query slices, and each alarm slice stores associated resource instances per unit time Alarm information of each resource node in the relationship tree. In practical applications, the query snapshot corresponding to the relationship tree of the associated resource instance of the alarm resource can be generated in real time based on the data in the database, or can be directly obtained by reading the data in the database in advance, for each association The query snapshot generated by the resource instance relationship tree is not limited in this embodiment. By dividing the query snapshot generated according to the alarm information of each resource point within the preset time length into multiple query slices, and filtering out the alarm slices containing the alarm information, the alarms can be distinguished in chronological order, which is convenient for subsequent alarms. analysis of the relationship between them.
步骤203,根据多个告警切片中的告警信息,获取具有关联关系的关联告警信息。 Step 203, according to the alarm information in the multiple alarm slices, the associated alarm information with the associated relationship is obtained.
具体地说,电脑在获取到告警资源的多个告警切片后,根据多个告警切片中的告警信息,获取具有关联关系的关联告警信息,将具有关联的告警作为关联告警。Specifically, after the computer acquires multiple alarm slices of the alarm resource, according to the alarm information in the multiple alarm slices, the computer acquires associated alarm information with an associated relationship, and uses the associated alarm as an associated alarm.
在一个例子中,根据多个告警切片中的告警信息,获取具有关联关系的关联告警信息,包括:在多个告警切片中确定至少一个目标告警切片;其中,目标告警切片包含多个资源节点的告警信息;若多个告警信息均包含在多个目标告警切片中,则将多个告警信息作为关联 告警信息。电脑获取到3分钟内关联资源实例关系树内各资源节点告警信息的查询快照,并按照10秒的单位时长将查询快照分割成了18个告警切片。电脑对各告警切片中的告警信息进行检测,将同时包含有多个资源节点的告警信息的告警切片1至6作为目标告警切片。然后检测目标告警切片中的告警信息,判断各目标告警切片中告警状态发生变动的告警,检测到告警1至4在告警切片2至告警切片5这4个目标切片中均同时发生变动,则将告警1至告警4作为关联告警集合。如果告警资源在不同的层次,则将最底层告警设置为根告警;如果告警资源在同层,则将先发生的告警设置为根告警;或有用户按其他准则确认一条告警为根告警,在确认根告警后,此告警集合中的其他告警自动为子告警。在实际应用中,记为关联告警信息的多个告警需要均在多少个目标告警切片中出现可以根据实际情况自行调整,本实施例对此不做限制。通过确定多个目标告警切片,并利用多个目标告警切片对可能存在关联关系的告警进行多次检测,保证能够准确的识别出存在关联关系的关联告警信息,提高告警关联关系的识别效率,进而提高告警根本原因的检测效率。In an example, according to the alarm information in multiple alarm slices, obtaining associated alarm information with an association relationship includes: determining at least one target alarm slice in multiple alarm slices; wherein, the target alarm slice contains multiple resource nodes Alarm information; if multiple alarm information is included in multiple target alarm slices, the multiple alarm information is used as associated alarm information. The computer obtains the query snapshot of the alarm information of each resource node in the relationship tree of the associated resource instance within 3 minutes, and divides the query snapshot into 18 alarm slices according to the unit duration of 10 seconds. The computer detects the alarm information in each alarm slice, and uses alarm slices 1 to 6 that simultaneously contain alarm information of multiple resource nodes as target alarm slices. Then detect the alarm information in the target alarm slice, and judge the alarms whose alarm states have changed in each target alarm slice. Alarm 1 to Alarm 4 are associated alarm sets. If the alarm resources are at different levels, set the alarm at the lowest level as the root alarm; if the alarm resources are at the same level, set the alarm that occurs first as the root alarm; or if a user confirms an alarm as the root alarm according to other criteria, the After the root alarm is confirmed, other alarms in this alarm set are automatically sub-alarms. In practical applications, the number of target alarm slices in which multiple alarms recorded as associated alarm information need to appear can be adjusted according to actual conditions, which is not limited in this embodiment. By determining multiple target alarm slices and using multiple target alarm slices to detect alarms that may have correlations multiple times, it is ensured that the associated alarm information with correlations can be accurately identified, and the identification efficiency of alarm correlations is improved. Improve the detection efficiency of the root cause of the alarm.
在另一个例子中,根据多个告警切片中的告警信息,获取具有关联关系的关联告警信息,包括:根据关联资源实例关系树,生成关联拓扑图;在关联拓扑图中播放各告警切片,根据告警切片中的告警信息,对关联拓扑中的各资源节点的告警等级和告警次数进行更新;根据指令及关联拓扑图,获取具有关联关系的关联告警信息。例如,根据业务网元关联建立关联资源实例关系树,对其中一个统一数据管理网元(Unified Data Management,UDM)实例进行资源告警关联分析时,根据关联资源实例关系树查询出与此UDM实例与会话管理网元(Session Management function,SMF)、接入管理网元(Access and Mobility Management Function,AMF)和认证服务器网元(Authentication Server Function,AUSF)等多个类型的网元存在关联,则电脑在获取各资源在预设时长的报警信息后,在页面上方通过4个标签页面分别显示被选UDM网元实例、与此UDM网元实例关联的所有SMF网元实例、AMF网元实例和AUSF网元实例,然后根据关联资源实例关系树,为告警资源生成包含了4类网元实例对应资源节点的关联拓扑图,并按照关联类型进行显示。同时,电脑在告警列表上方显示切片分析开关,在接收到用户点击切片分析的指令后,电脑会根据获取的各告警切片中的告警信息,在关联拓扑图的各资源节点上渲染在当前播放的告警切片中,各资源上处于活动状态的最高级别告警的颜色和各级别告警的总数,在关联拓扑图上显示切片切换开关,在接收到用户的切片切换指示后,切片时间窗自动从当前位置向后滑动,按一定速度自动将各资源实例在各个告警切片中的告警情况渲染到关联拓扑图上,相当于电子计算机断层扫描(Computed Tomography,CT)和成像,供用户观察各资源的告警随时间产生又恢复的情况,例如,在一个查询快照生成的多个告警切片的播放过程中,发现UDM实例对应的资源节点和SMF实例对应的资源节点在不同告警切片内,节点上告警颜色渲染同时变化或者节点上的告警计数同时变化,则用户可以观察到的告警变化进行,在告警列表中勾选UDM实例和SMF实例,再点击关联关系按钮对告警列表中UDM实例和SMF实例在同一切片内同时上报又在另一切片内同时恢复的告警进行告警关联的设置,电脑会根据接收到的输入指令,将同在一时间切片内同时上报,又在另一个时间切片内同时恢复的告警设置为一组关联告警集合,将先上报的告警设置为根告警,或由用户按其他原则确定一条根告警,此将其余告警自动为子告警。通过在根据关联资源实例关系树生成的关联拓扑图上按照告警切片中的告警信息,对关联拓扑图上各资源节点进行告警渲染,利用切片扫描的方式直观的为用户展示告警变化情况,供用户判断 存在关联关系的告警,并根据用户输入指令,将存在关联关系的告警作为关联告警信息进行存储,实现对告警信息关联关系的准确高效识别,进而提高告警根本原因的检测效率。In another example, according to the alarm information in multiple alarm slices, the associated alarm information with associated relationship is obtained, including: generating an associated topology map according to the associated resource instance relationship tree; playing each alarm slice in the associated topology map, according to The alarm information in the alarm slice updates the alarm levels and alarm times of each resource node in the associated topology; according to the instruction and the associated topology map, the associated alarm information with the associated relationship is obtained. For example, establish an associated resource instance relationship tree based on the service network element association, and when performing resource alarm association analysis on one of the Unified Data Management (UDM) instances, query out the relationship between the UDM instance and the UDM instance based on the associated resource instance relationship tree. Multiple types of NEs such as Session Management function (SMF), Access and Mobility Management Function (AMF) and Authentication Server Function (AUSF) are associated, and the computer After obtaining the alarm information of each resource at the preset duration, the selected UDM network element instance, all SMF network element instances, AMF network element instances and AUSF network element instances associated with this UDM network element instance are displayed on the top of the page through 4 tab pages. The network element instance, and then according to the relationship tree of the associated resource instance, generate an associated topology diagram for the alarm resource that includes the resource nodes corresponding to the four types of network element instances, and display it according to the associated type. At the same time, the computer displays the slice analysis switch on the top of the alarm list. After receiving the user's instruction to click slice analysis, the computer will render the current playback on each resource node of the associated topology map according to the alarm information in each alarm slice obtained. In the alarm slice, the color of the highest-level alarm active on each resource and the total number of alarms of each level are displayed on the associated topology map. After receiving the slice switching instruction from the user, the slice time window automatically changes from the current position Swipe backwards to automatically render the alarm status of each resource instance in each alarm slice to the associated topology map at a certain speed, which is equivalent to computer tomography (Computed Tomography, CT) and imaging, for users to observe the alarm status of each resource. When the time is generated and restored, for example, during the playback of multiple alarm slices generated by a query snapshot, it is found that the resource nodes corresponding to the UDM instance and the resource nodes corresponding to the SMF instance are in different alarm slices, and the alarm colors on the nodes are rendered simultaneously. Change or the alarm count on the node changes at the same time, the user can observe the alarm changes, check the UDM instance and the SMF instance in the alarm list, and then click the association button to confirm that the UDM instance and the SMF instance in the alarm list are in the same slice The alarms that are reported at the same time and recovered in another time slice are set for alarm association. The computer will set the alarms that are reported in the same time slice and recovered in another time slice as A set of associated alarms, the alarm reported first is set as the root alarm, or a root alarm is determined by the user according to other principles, and the rest of the alarms are automatically sub-alarms. According to the alarm information in the alarm slice on the association topology diagram generated according to the association resource instance relationship tree, the alarm rendering is performed on each resource node on the association topology diagram, and the alarm changes are intuitively displayed for the user by means of slice scanning, for the user Determine the alarms with correlations, and store the alarms with correlations as associated alarm information according to user input instructions, so as to realize the accurate and efficient identification of the correlations of alarm information, and improve the detection efficiency of the root cause of alarms.
在另一个例子中,在根据多个告警中的告警信息,获取具有关联关系的关联告警信息后,还包括:获取关联告警信息的告警关键特征;其中,告警关键特征包括:资源类型和/或告警码;根据告警关键特征,生成关联告警信息的告警关联标记。例如,电脑在根据切片分析的结果和用户指令获取到存在关联关系的关联告警信息后,对根据根告警和子告警生成的关联告警集合进行告警关键特征提取,利用预设的分析算法,获取关联告警信息对应的资源类型、网元类型、告警码等特征,并根据获取到的告警关键特征,生成关联告警信息对应的告警关联标记,对获取到的关联告警进行区分和标识。In another example, after obtaining associated alarm information with an associated relationship according to the alarm information in multiple alarms, it further includes: obtaining alarm key features of the associated alarm information; wherein, the alarm key features include: resource type and/or Alarm code; according to the key features of the alarm, an alarm association mark associated with the alarm information is generated. For example, after the computer obtains associated alarm information based on slice analysis results and user instructions, it extracts the key features of the associated alarm set generated based on the root alarm and sub-alarms, and uses the preset analysis algorithm to obtain associated alarm information. The resource type, network element type, alarm code and other characteristics corresponding to the information, and according to the obtained key characteristics of the alarm, generate the alarm association mark corresponding to the associated alarm information, and distinguish and identify the obtained associated alarms.
在另一个例子中,在生成关联告警信息的告警关联标记后,还包括:检测告警关联标记的累计次数是否为零,在告警关联标记的累计次数为零的情况下,为告警关联标记新建累计次数,并将新建累计次数更新为1;在告警关联标记的累计次数不为零的情况下,更新告警关联标记的累计次数。例如,电脑在根据分析算法提取出关联告警信息的告警关键特征,并根据告警关键特征生成对应的告警关联标记后,查询关联标记数据库中生成的告警关联标记的累计次数是否为零,在关联标记数据库中不存在新生成的告警关联标记的情况下,在关联标记数据库中为生成的告警关联标记新建累计计数,并将累计计数更新为1;在新生成的告警关联标记的累计次数为零的情况下,直接将累计计数更新为1。在新生成的告警关联标记的累计次数不为零的情况下,更新告警关联标记的累计次数,将累计计数加一。通过根据关联告警信息的告警关键特征生成告警关联标记,并对告警关联标记的累计次数进行统计和更新,便于后续进行告警原因的分析,并且实现了关联告警关联关系的专家经验积累,使得后续可以根据关联告警关联关系的专家经验、历史告警分析结构等信息生成用于检测告警根本原因的关联规则,进一步提高告警根本原因的检测效率。In another example, after generating the alarm associated flag associated with the alarm information, it also includes: detecting whether the cumulative number of alarm associated flags is zero, and if the accumulated number of alarm associated flags is zero, creating a new cumulative time for the alarm associated flag times, and update the newly-created cumulative times to 1; if the cumulative times of the alarm-related flags is not zero, update the cumulative times of the alarm-related flags. For example, after the computer extracts the alarm key features of the associated alarm information according to the analysis algorithm, and generates the corresponding alarm associated tags according to the alarm key features, it queries whether the cumulative number of alarm associated tags generated in the associated tag database is zero. If there is no newly generated alarm correlation tag in the database, create a new cumulative count for the generated alarm correlation tag in the correlation tag database, and update the cumulative count to 1; when the cumulative number of newly generated alarm correlation tags is zero case, directly update the accumulated count to 1. If the accumulative count of the newly generated alarm-related flag is not zero, update the accumulative count of the alarm-related flag, and add one to the accumulative count. By generating alarm correlation tags according to the key features of the associated alarm information, and counting and updating the cumulative number of alarm correlation tags, it is convenient for subsequent analysis of the cause of the alarm, and the accumulation of expert experience in the associated alarm relationship is realized, so that the follow-up can Generate association rules for detecting the root cause of the alarm based on the expert experience of the associated alarm relationship, the historical alarm analysis structure, and other information to further improve the detection efficiency of the root cause of the alarm.
此外,应当理解的是,上面各种方法的步骤划分,只是为了描述清楚,实现时可以合并为一个步骤或者对某些步骤进行拆分,分解为多个步骤,只要包括相同的逻辑关系,都在本专利的保护范围内;对算法中或者流程中添加无关紧要的修改或者引入无关紧要的设计,但不改变其算法和流程的核心设计都在该专利的保护范围内。In addition, it should be understood that the division of steps in the above methods is only for clarity of description, and may be combined into one step or split into multiple steps during implementation. As long as the same logical relationship is included, all Within the scope of protection of this patent; adding insignificant modifications or introducing insignificant designs to the algorithm or process, but not changing the core design of the algorithm and process are all within the scope of protection of the patent.
本申请另一实施例涉及一种资源告警分析装置,参考图5,包括:Another embodiment of the present application relates to a resource alarm analysis device, referring to FIG. 5 , including:
获取模块501,用于获取告警资源的关联资源实例关系树。The acquiring module 501 is configured to acquire the associated resource instance relationship tree of the alarm resource.
切片模块502,用于根据关联资源实例关系树,获取告警资源的多个告警切片;其中,告警切片包含单位时间内关联资源实例关系树中至少一个资源节点的告警信息。The slicing module 502 is configured to obtain multiple alarm slices of alarm resources according to the associated resource instance relationship tree; wherein, the alarm slice includes alarm information of at least one resource node in the associated resource instance relationship tree within a unit time.
分析模块503,用于根据多个告警切片中的告警信息,获取具有关联关系的关联告警信息。The analysis module 503 is configured to acquire associated alarm information with an association relationship according to the alarm information in multiple alarm slices.
不难发现,本实施例为与方法实施例相对应的装置实施例,本实施例可与方法实施例互相配合实施。方法实施例中提到的相关技术细节在本实施例中依然有效,为了减少重复,这里不再赘述。相应地,本实施例中提到的相关技术细节也可应用在方法实施例中。It is not difficult to find that this embodiment is an apparatus embodiment corresponding to the method embodiment, and this embodiment can be implemented in cooperation with the method embodiment. The relevant technical details mentioned in the method embodiments are still valid in this embodiment, and will not be repeated here in order to reduce repetition. Correspondingly, the related technical details mentioned in this embodiment can also be applied in the method embodiment.
值得一提的是,本实施例中所涉及到的各模块均为逻辑模块,在实际应用中,一个逻辑单元可以是一个物理单元,也可以是一个物理单元的一部分,还可以以多个物理单元的组合实现。此外,为了突出本发明的创新部分,本实施例中并没有将与解决本发明所提出的技术问题关系不太密切的单元引入,但这并不表明本实施例中不存在其它的单元。It is worth mentioning that all the modules involved in this embodiment are logical modules. In practical applications, a logical unit can be a physical unit, or a part of a physical unit, or multiple physical units. Combination of units. In addition, in order to highlight the innovative part of the present invention, units that are not closely related to solving the technical problem proposed by the present invention are not introduced in this embodiment, but this does not mean that there are no other units in this embodiment.
本申请另一实施例还提供了一种电子设备,参考图6,包括:包括至少一个处理器601;以及,与至少一个处理器601通信连接的存储器602;其中,存储器602存储有可被至少一个处理器601执行的指令,指令被至少一个处理器601执行,以使至少一个处理器601能够执行上述任一方法实施例所描述的资源告警分析方法。Another embodiment of the present application also provides an electronic device, referring to FIG. 6 , including: including at least one processor 601; and a memory 602 communicatively connected to at least one processor 601; An instruction executed by one processor 601, the instruction is executed by at least one processor 601, so that at least one processor 601 can execute the resource alarm analysis method described in any method embodiment above.
其中,存储器602和处理器601采用总线方式连接,总线可以包括任意数量的互联的总线和桥,总线将一个或多个处理器601和存储器602的各种电路连接在一起。总线还可以将诸如外围设备、稳压器和功率管理电路等之类的各种其他电路连接在一起,这些都是本领域所公知的,因此,本文不再对其进行进一步描述。总线接口在总线和收发机之间提供接口。收发机可以是一个元件,也可以是多个元件,比如多个接收器和发送器,提供用于在传输介质上与各种其他装置通信的单元。经处理器601处理的数据通过天线在无线介质上进行传输,进一步,天线还接收数据并将数据传输给处理器601。Wherein, the memory 602 and the processor 601 are connected by a bus, and the bus may include any number of interconnected buses and bridges, and the bus connects one or more processors 601 and various circuits of the memory 602 together. The bus may also connect together various other circuits such as peripherals, voltage regulators, and power management circuits, all of which are well known in the art and therefore will not be further described herein. The bus interface provides an interface between the bus and the transceivers. A transceiver may be a single element or multiple elements, such as multiple receivers and transmitters, providing means for communicating with various other devices over a transmission medium. The data processed by the processor 601 is transmitted on the wireless medium through the antenna, and further, the antenna also receives the data and transmits the data to the processor 601 .
处理器601负责管理总线和通常的处理,还可以提供各种功能,包括定时,外围接口,电压调节、电源管理以及其他控制功能。而存储器602可以被用于存储处理器601在执行操作时所使用的数据。 Processor 601 is responsible for managing the bus and general processing, and may also provide various functions including timing, peripheral interface, voltage regulation, power management, and other control functions. And the memory 602 may be used to store data used by the processor 601 when performing operations.
本申请另一实施例还提供了一种计算机可读存储介质,存储有计算机程序。计算机程序被处理器执行时实现上述方法实施例。Another embodiment of the present application also provides a computer-readable storage medium storing a computer program. The above method embodiments are implemented when the computer program is executed by the processor.
即,本领域技术人员可以理解,实现上述实施例方法中的全部或部分步骤是可以通过程序来指令相关的硬件来完成,该程序存储在一个存储介质中,包括若干指令用以使得一个设备(可以是单片机,芯片等)或处理器(processor)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。That is, those skilled in the art can understand that all or part of the steps in the method of the above-mentioned embodiments can be completed by instructing related hardware through a program, the program is stored in a storage medium, and includes several instructions to make a device ( It may be a single-chip microcomputer, a chip, etc.) or a processor (processor) to execute all or part of the steps of the methods described in the various embodiments of the present application. The aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disk or optical disc, etc., which can store program codes. .
本领域的普通技术人员可以理解,上述各实施例是实现本申请的具体实施例,而在实际应用中,可以在形式上和细节上对其作各种改变,而不偏离本申请的精神和范围。Those of ordinary skill in the art can understand that the above-mentioned embodiments are specific embodiments for realizing the present application, and in practical applications, various changes can be made to it in form and details without departing from the spirit and spirit of the present application. scope.

Claims (10)

  1. 一种资源告警分析方法,包括:A resource alarm analysis method, comprising:
    获取告警资源的关联资源实例关系树;Get the associated resource instance relationship tree of the alarm resource;
    根据所述关联资源实例关系树,获取所述告警资源的多个告警切片;其中,所述告警切片包含单位时间内所述关联资源实例关系树中至少一个资源节点的告警信息;Obtain multiple alarm slices of the alarm resource according to the associated resource instance relationship tree; wherein, the alarm slice includes alarm information of at least one resource node in the associated resource instance relationship tree within a unit time;
    根据所述多个告警切片中的告警信息,获取具有关联关系的关联告警信息。According to the alarm information in the plurality of alarm slices, associated alarm information having an association relationship is acquired.
  2. 根据权利要求1所述的资源告警分析方法,其中,所述根据所述多个告警切片中的告警信息,获取具有关联关系的关联告警信息,包括:The resource alarm analysis method according to claim 1, wherein said obtaining associated alarm information having an association relationship according to the alarm information in the plurality of alarm slices comprises:
    在所述多个告警切片中确定至少一个目标告警切片;其中,所述目标告警切片包含多个所述资源节点的所述告警信息;Determine at least one target alarm slice among the plurality of alarm slices; wherein, the target alarm slice contains the alarm information of multiple resource nodes;
    若多个告警信息均包含在多个所述目标告警切片中,则将所述多个告警信息作为所述关联告警信息。If multiple alarm information is included in multiple target alarm slices, the multiple alarm information is used as the associated alarm information.
  3. 根据权利要求1或2所述的资源告警分析方法,其中,所述根据所述多个告警切片中的告警信息,获取具有关联关系的关联告警信息,包括:The resource alarm analysis method according to claim 1 or 2, wherein said obtaining associated alarm information with an associated relationship according to the alarm information in the plurality of alarm slices comprises:
    根据所述关联资源实例关系树,生成关联拓扑图;Generate an association topology diagram according to the association resource instance relationship tree;
    在所述关联拓扑图中播放各所述告警切片,根据所述告警切片中的告警信息,对所述关联拓扑图中的各资源节点的告警等级和告警次数进行更新;Play each of the alarm slices in the associated topology graph, and update the alarm level and alarm times of each resource node in the associated topology graph according to the alarm information in the alarm slice;
    根据指令及所述关联拓扑图,获取具有关联关系的所述关联告警信息。According to the instruction and the associated topology map, the associated alarm information having an associated relationship is obtained.
  4. 根据权利要求1至3中任一项所述的资源告警分析方法,其中,所述根据所述关联资源实例关系树,获取所述告警资源的多个告警切片,包括:The resource alarm analysis method according to any one of claims 1 to 3, wherein said obtaining multiple alarm slices of the alarm resource according to the associated resource instance relationship tree includes:
    获取所述关联资源实例关系树中各资源在预设时长内的告警数据的查询快照;Obtain a query snapshot of the alarm data of each resource in the relationship tree of the associated resource instance within a preset period of time;
    根据所述单位时间,按照告警顺序将所述查询快照划分成多个查询切片;According to the unit time, divide the query snapshot into multiple query slices according to the order of alarms;
    在所述多个查询切片中筛选出包含告警信息的多个所述告警切片。Filtering out multiple alarm slices containing alarm information from the multiple query slices.
  5. 根据权利要求1至4中任一项所述的资源告警分析方法,其中,在所述获取告警资源的关联资源实例关系树前,还包括:The resource alarm analysis method according to any one of claims 1 to 4, wherein, before acquiring the associated resource instance relationship tree of the alarm resource, further comprising:
    生成包含各资源的关联资源实例关系总树,并将生成的所述关联资源实例关系总树存储在图数据库中;Generate a total tree of associated resource instance relationships including each resource, and store the generated total tree of associated resource instance relationships in a graph database;
    所述获取告警资源的关联资源实例关系树,包括:The associated resource instance relationship tree for obtaining the alarm resource includes:
    根据预设关联类型,在所述关联资源实例关系总树中读取所述告警资源的所述关联资源实例关系树。According to a preset association type, the associated resource instance relationship tree of the alarm resource is read in the associated resource instance relationship tree.
  6. 根据权利要求1至5中任一项所述的资源告警分析方法,其中,在所述根据所述多个告警切片中的告警信息,获取具有关联关系的关联告警信息后,还包括:The resource alarm analysis method according to any one of claims 1 to 5, wherein, after obtaining associated alarm information with an associated relationship according to the alarm information in the plurality of alarm slices, further comprising:
    获取所述关联告警信息的告警关键特征;其中,所述告警关键特征包括:资源类型和/或告警码;Acquiring key alarm features of the associated alarm information; wherein, the key features of the alarm include: resource type and/or alarm code;
    根据所述告警关键特征,生成所述关联告警信息的告警关联标记。An alarm association mark associated with the alarm information is generated according to the key feature of the alarm.
  7. 根据权利要求6所述的资源告警分析方法,其中,在所述生成所述关联告警信息的告警关联标记后,还包括:The resource alarm analysis method according to claim 6, wherein, after generating the alarm association mark of the associated alarm information, further comprising:
    检测所述告警关联标记的累计次数是否为零;Detecting whether the accumulative count of the alarm associated flag is zero;
    在所述告警关联标记的所述累计次数为零的情况下,为所述告警关联标记新建累计次数,并将所述新建累计次数更新为1;If the cumulative count of the alarm-related flag is zero, create a new cumulative count for the alarm-related flag, and update the newly-created cumulative count to 1;
    在所述告警关联标记的累计次数不为零的情况下,更新所述告警关联标记的所述累计次数。In the case that the accumulated number of times of the alarm related flag is not zero, the accumulated number of times of the alarm related flag is updated.
  8. 一种资源告警分析装置,包括:A resource alarm analysis device, comprising:
    获取模块,用于获取告警资源的关联资源实例关系树;The obtaining module is used to obtain the associated resource instance relationship tree of the alarm resource;
    切片模块,用于根据所述关联资源实例关系树,获取所述告警资源的多个告警切片;其中,所述告警切片包含单位时间内所述关联资源实例关系树中至少一个资源节点的告警信息;A slicing module, configured to acquire multiple alarm slices of the alarm resource according to the associated resource instance relationship tree; wherein, the alarm slice includes alarm information of at least one resource node in the associated resource instance relationship tree within a unit time ;
    分析模块,用于根据所述多个告警切片中的告警信息,获取具有关联关系的关联告警信息。An analysis module, configured to acquire associated alarm information with an association relationship according to the alarm information in the plurality of alarm slices.
  9. 一种电子设备,包括:An electronic device comprising:
    至少一个处理器;以及,at least one processor; and,
    与所述至少一个处理器通信连接的存储器;其中,a memory communicatively coupled to the at least one processor; wherein,
    所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够执行如权利要求1至7中任意一项所述的资源告警分析方法。The memory stores instructions executable by the at least one processor, the instructions are executed by the at least one processor, so that the at least one processor can perform the operation described in any one of claims 1 to 7 The resource alarm analysis method described above.
  10. 一种计算机可读存储介质,存储有计算机程序,所述计算机程序被处理器执行时实现权利要求1至7中任一项所述的资源告警分析方法。A computer-readable storage medium storing a computer program, and implementing the resource alarm analysis method according to any one of claims 1 to 7 when the computer program is executed by a processor.
PCT/CN2022/087437 2021-09-18 2022-04-18 Resource alarm analysis method and apparatus, electronic device, and storage medium WO2023040259A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111101821.0 2021-09-18
CN202111101821.0A CN115827363A (en) 2021-09-18 2021-09-18 Resource alarm analysis method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
WO2023040259A1 true WO2023040259A1 (en) 2023-03-23

Family

ID=85515382

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/087437 WO2023040259A1 (en) 2021-09-18 2022-04-18 Resource alarm analysis method and apparatus, electronic device, and storage medium

Country Status (2)

Country Link
CN (1) CN115827363A (en)
WO (1) WO2023040259A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117135034A (en) * 2023-10-23 2023-11-28 卓望数码技术(深圳)有限公司 Rule analysis screening method and device for intelligent alarm convergence

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7701843B1 (en) * 2004-10-26 2010-04-20 Sprint Communications Company L.P. Intelligent-topology-driven alarm placement
CN106452927A (en) * 2016-12-13 2017-02-22 浪潮电子信息产业股份有限公司 Business topology information display method and system of cloud monitoring system
CN111092752A (en) * 2019-11-27 2020-05-01 中盈优创资讯科技有限公司 Fault positioning method and device spanning multiple network slices
CN112580678A (en) * 2019-09-29 2021-03-30 中兴通讯股份有限公司 Method and device for constructing cloud network alarm root relation tree model
CN112787860A (en) * 2020-12-30 2021-05-11 广东电网有限责任公司电力调度控制中心 Root alarm analysis and identification method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7701843B1 (en) * 2004-10-26 2010-04-20 Sprint Communications Company L.P. Intelligent-topology-driven alarm placement
CN106452927A (en) * 2016-12-13 2017-02-22 浪潮电子信息产业股份有限公司 Business topology information display method and system of cloud monitoring system
CN112580678A (en) * 2019-09-29 2021-03-30 中兴通讯股份有限公司 Method and device for constructing cloud network alarm root relation tree model
CN111092752A (en) * 2019-11-27 2020-05-01 中盈优创资讯科技有限公司 Fault positioning method and device spanning multiple network slices
CN112787860A (en) * 2020-12-30 2021-05-11 广东电网有限责任公司电力调度控制中心 Root alarm analysis and identification method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117135034A (en) * 2023-10-23 2023-11-28 卓望数码技术(深圳)有限公司 Rule analysis screening method and device for intelligent alarm convergence
CN117135034B (en) * 2023-10-23 2024-01-30 卓望数码技术(深圳)有限公司 Rule analysis screening method and device for intelligent alarm convergence

Also Published As

Publication number Publication date
CN115827363A (en) 2023-03-21

Similar Documents

Publication Publication Date Title
US11768811B1 (en) Managing user data in a multitenant deployment
US10761687B2 (en) User interface that facilitates node pinning for monitoring and analysis of performance in a computing environment
US10205643B2 (en) Systems and methods for monitoring and analyzing performance in a computer system with severity-state sorting
US10515469B2 (en) Proactive monitoring tree providing pinned performance information associated with a selected node
US9405757B2 (en) File storage system, apparatus, and file access method
CN104731690B (en) Adaptive metrology collection, storage and warning threshold
AU2019201687B2 (en) Network device vulnerability prediction
US20040155899A1 (en) Method and system for presenting an arrangement of management devices operable in a managed network
US7949882B2 (en) Storage session management system in storage area network
CN109120461B (en) A kind of service feature end-to-end monitoring method, system and device
US8443078B2 (en) Method of determining equivalent subsets of agents to gather information for a fabric
EP2486698B1 (en) Method and system for reconstructing transactions in a communication network
US10439957B1 (en) Tenant-based management system and method for distributed computing environments
US11887015B2 (en) Automatically-generated labels for time series data and numerical lists to use in analytic and machine learning systems
CN101390340A (en) Apparatus, system, and method for dynamically determining a set of storage area network components for performance monitoring
WO2023040259A1 (en) Resource alarm analysis method and apparatus, electronic device, and storage medium
CN114791846A (en) Method for realizing observability aiming at cloud native chaos engineering experiment
US8386410B2 (en) System and method for semantic information extraction framework for integrated systems management
US10965544B2 (en) Augmented reality for slice management in a telco network
US11558242B2 (en) Generation of synthetic alerts and unified dashboard for viewing multiple layers of data center simultaneously
US20090282141A1 (en) Server managing apparatus and server managing method
CN111782672A (en) Multi-field data management method and related device
US20170235785A1 (en) Systems and Methods for Robust, Incremental Data Ingest of Communications Networks Topology
US8812635B2 (en) Apparatus and method providing unified network management
US20190026295A1 (en) System and method for obtaining application insights through search

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22868637

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE