CN107769954B - Method and device for shielding equipment alarm - Google Patents

Method and device for shielding equipment alarm Download PDF

Info

Publication number
CN107769954B
CN107769954B CN201610709623.5A CN201610709623A CN107769954B CN 107769954 B CN107769954 B CN 107769954B CN 201610709623 A CN201610709623 A CN 201610709623A CN 107769954 B CN107769954 B CN 107769954B
Authority
CN
China
Prior art keywords
alarm
shielding
command
network element
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610709623.5A
Other languages
Chinese (zh)
Other versions
CN107769954A (en
Inventor
郭文婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201610709623.5A priority Critical patent/CN107769954B/en
Publication of CN107769954A publication Critical patent/CN107769954A/en
Application granted granted Critical
Publication of CN107769954B publication Critical patent/CN107769954B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0604Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a method and a device for shielding equipment alarms. Wherein, the method comprises the following steps: acquiring specified alarm data in the alarm data reported by the network element; generating an alarm shielding command based on the designated alarm data, wherein the alarm shielding command is used for shielding the report of the alarm data with the same attribute as the designated alarm data; and sending an alarm shielding command to the network element. The invention solves the technical problem of low efficiency in the operation and maintenance management of the network in the related technology.

Description

Method and device for shielding equipment alarm
Technical Field
The invention relates to the field of communication, in particular to a method and a device for shielding equipment alarms.
Background
The number of devices in a network is usually thousands to tens of thousands, and the device alarms are not only of various types, but also of huge number. The alarm management can not only provide a monitoring function of real-time alarm data reflecting the running state of the equipment, but also provide an alarm shielding function, and ensure that the network can run effectively, stably and safely. Alarm shielding is an important function in alarm management, and can shield alarms meeting certain conditions on equipment, so that the equipment does not generate the alarms. Therefore, important alarm events can be focused on during network operation and maintenance, so that a user can more effectively manage the network, and the processing flow of fault discovery, fault location and whole fault solution is accelerated.
In the related art, the method for implementing device alarm shielding by a network management system includes the following two methods:
(1) the first is to provide an alarm shielding function window for each network element on the network management, in which the alarm shielding rule can be set individually for the network element, and then the rule application is issued to the device. The alarm shielding function window usually displays alarm items in a hierarchical structure, needs to select one layer by one layer, selects an alarm source, then selects a layer rate, and finally selects an alarm reason, and the operation steps are complex. The method needs to set each network element needing to shield the alarm, has low operation and maintenance efficiency, and is more difficult to maintain when the network scale is larger.
(2) The second is that the rule of alarm shielding is preset on the network management system, and then the rule application is issued to a plurality of devices. The rules of alarm masking are cumbersome and complex, and for different types of devices, the alarm masking rules are also very different. In the mode, different alarm shielding rules need to be set for different types of equipment, the maintenance cost is high, and the flexibility is low when the rules are set.
Aiming at the technical problem of low efficiency in operation and maintenance management of a network in the related technology, no effective solution is provided at present.
Disclosure of Invention
The embodiment of the invention provides a method and a device for shielding an equipment alarm, which at least solve the technical problem of low efficiency in the operation and maintenance management of a network in the related technology.
According to an aspect of an embodiment of the present invention, there is provided a method for shielding an equipment alarm, the method including: acquiring specified alarm data in the alarm data reported by the network element; generating an alarm shielding command based on the designated alarm data, wherein the alarm shielding command is used for shielding the report of the alarm data with the same attribute as the designated alarm data; and sending an alarm shielding command to the network element.
Further, generating the alarm mask command based on the specified alarm data includes: and generating an alarm shielding command based on the attribute information carried by the specified alarm data.
Further, generating the alarm mask command based on the attribute information carried by the specified alarm data includes: acquiring attribute information carried by one or more fields of specified alarm data, wherein each field carries one attribute information; an alarm masking command is generated for masking information having one or more attributes.
Further, in a case that the designated alarm data is multiple, generating the alarm mask command based on the attribute information carried by the designated alarm data includes: an alarm mask command is generated based on attribute information of each of a plurality of designated alarm data.
Further, the one or more fields include one or more of a network element identification, an alert source, a layer rate, and an alert cause.
Further, sending the alarm mask command to the network element includes: and issuing an alarm shielding command to the network element through a network management server to which the network element belongs.
Further, issuing an alarm shielding command to the network element through the network management server to which the network element belongs includes: under the condition that the network element is interacted with the network management server through a full-quantity setting command interface, an alarm shielding command is sent to the network management server, and a first alarm shielding message is sent to the network element by the network management server, wherein the first alarm shielding message carries alarm shielding data in the alarm shielding command and alarm shielding data existing in the network element; and under the condition that the network element is interacted with the network management server through the increment setting command interface, sending an alarm shielding command to the network management server, and sending a second alarm shielding message to the network element by the network management server, wherein the second alarm shielding message carries the alarm shielding data in the alarm shielding command.
Further, in the case that there are a plurality of alarm masking commands, sending the alarm masking commands to the network management server includes: and issuing alarm shielding commands corresponding to the preset number of network elements to the network management server each time.
Further, when there are a plurality of alarm shielding commands, issuing the alarm shielding command to the network element through the network management server to which the network element belongs includes: and issuing an alarm shielding command to a target network element through a target network management server, wherein the target network management server is a network management server to which the target network element belongs, and the target network element is a source network element of specified alarm data corresponding to the alarm shielding command.
Further, the method further comprises: after sending an alarm shielding command to a network element, receiving an alarm disappearing command reported by the network element; and shielding the alarm data identified by the identification information in the alarm disappearing command in the current display interface.
Further, the acquiring of the designated alarm data in the alarm data reported by the network element includes: and when the alarm data reported by the network element is displayed, acquiring the designated alarm data selected by the user in the displayed alarm data.
According to another aspect of the embodiments of the present invention, there is provided an apparatus for shielding an alarm of a device, the apparatus including: the acquiring unit is used for acquiring specified alarm data in the alarm data reported by the network element; the generating unit is used for generating an alarm shielding command based on the designated alarm data, wherein the alarm shielding command is used for shielding the report of the alarm data with the same attribute as the designated alarm data; and the sending unit is used for sending the alarm shielding command to the network element.
Further, the generating unit is further configured to generate an alarm masking command based on the attribute information carried by the specified alarm data.
Further, the generation unit includes: the first acquisition module is used for acquiring attribute information carried by one or more fields of the designated alarm data, wherein each field carries one attribute information; the generation module is used for generating an alarm shielding command for shielding the alarm with one or more attribute information.
According to another embodiment of the present invention, there is provided a storage medium that may be configured to store program code for performing the steps of: acquiring specified alarm data in the alarm data reported by the network element; generating an alarm shielding command based on the designated alarm data, wherein the alarm shielding command is used for shielding the report of the alarm data with the same attribute as the designated alarm data; and sending an alarm shielding command to the network element.
In the embodiment of the invention, specified alarm data in the alarm data reported by a network element is obtained; generating an alarm shielding command based on the designated alarm data, wherein the alarm shielding command is used for shielding the report of the alarm data with the same attribute as the designated alarm data; the alarm shielding command is sent to the network element, when the alarm shielding command is generated, a user does not need to select one by one according to conditions, and the alarm shielding command can be generated directly according to the specified alarm data, so that the shielding of one type of alarm data is realized, the technical problem of low efficiency in operation and maintenance management of the network in the related technology is solved, and the technical effect of improving the efficiency of the operation and maintenance management is realized.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
FIG. 1 is a schematic diagram of a computer terminal according to an embodiment of the present invention;
FIG. 2 is a flow chart of a method for shielding device alarms according to an embodiment of the present invention;
FIG. 3 is a flow diagram of an alternative device alarm masking method according to an embodiment of the present invention;
FIG. 4 is a flow diagram of an alternative device alarm masking method according to an embodiment of the present invention;
FIG. 5 is a flow diagram of an alternative device alarm masking method according to an embodiment of the present invention;
fig. 6 is a schematic diagram of a shielding apparatus for a device alarm according to an embodiment of the present invention.
Detailed Description
The invention will be described in detail hereinafter with reference to the drawings and embodiments. It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order.
Example 1
The method provided by the first embodiment of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Taking the example of being run on a computer terminal, as shown in fig. 1, the computer terminal may include one or more (only one shown in the figure) processors 101 (the processors 101 may include, but are not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA), a memory 103 for storing data, and a transmission device 105 for communication function. It will be understood by those skilled in the art that the structure shown in fig. 1 is only an illustration and is not intended to limit the structure of the electronic device.
The memory 103 may be used to store software programs and modules of application software, such as program instructions/modules corresponding to the control method of the device in the embodiment of the present invention, and the processor 101 executes various functional applications and data processing by running the software programs and modules stored in the memory 103, so as to implement the method described above. The memory may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory may further include memory located remotely from the processor, and these remote memories may be connected to the computer terminal through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device is used for receiving or sending data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of the computer terminal. In one example, the transmission device includes a Network adapter (NIC) that can be connected to other Network devices through a base station to communicate with the internet. In one example, the transmission device may be a Radio Frequency (RF) module, which is used for communicating with the internet in a wireless manner.
In accordance with an embodiment of the present invention, there is provided a method embodiment of a device alarm masking method, it should be noted that the steps illustrated in the flowchart of the accompanying drawings may be performed in a computer system such as a set of computer executable instructions, and that while a logical order is illustrated in the flowchart, in some cases the steps illustrated or described may be performed in an order different than that presented herein.
Fig. 2 is a flowchart of a device alarm shielding method according to an embodiment of the present invention, and as shown in fig. 2, the method includes the following steps:
step S201, obtain the designated alarm data in the alarm data reported by the network element.
Step S202, an alarm shielding command is generated based on the designated alarm data, and the alarm shielding command is used for shielding the report of the alarm data with the same attribute as the designated alarm data.
Step S203, sending an alarm shielding command to the network element.
By the embodiment, the appointed alarm data in the alarm data reported by the network element is obtained; generating an alarm shielding command based on the designated alarm data, wherein the alarm shielding command is used for shielding the report of the alarm data with the same attribute as the designated alarm data; the alarm shielding command is sent to the network element, when the alarm shielding command is generated, a user does not need to select one by one according to conditions, and the alarm shielding command can be directly generated according to the designated alarm data, so that the shielding of the alarm data of one type is realized, the technical problem of low efficiency in operation and maintenance management of the network in the related technology is solved, and the technical effect of improving the efficiency of the operation and maintenance management is realized.
Alternatively, the execution subject of the above steps may be a client, etc., but is not limited thereto.
In the above embodiment, the reporting of the current alarm to the client by the network management system server, where the client displays the alarm data in a table form on the current alarm interface, and in step S201, the obtaining of the specified alarm data in the alarm data reported by the network element includes: when the alarm data reported by the network element is displayed, the appointed alarm data selected by the user in the displayed alarm data is obtained, and the displayed alarm data is the data displayed in a table form. And selecting the alarm data (namely the designated alarm data) needing to be subjected to the shielding operation in the table of the current alarm interface.
It should be noted that one or more alarms may be selected, and these alarms may belong to the same network element or different network elements; and after the alarm data is selected, clicking a right key, and selecting an alarm shielding menu for operation.
In step S202, generating an alarm mask command based on the specified alarm data includes: and generating an alarm shielding command based on the attribute information carried by the specified alarm data.
Specifically, the step of generating the alarm mask command based on the attribute information carried by the designated alarm data includes: acquiring attribute information carried by one or more fields of specified alarm data, wherein each field carries one attribute information; an alarm masking command is generated for masking an alarm having one or more attribute information.
The one or more fields include one or more of a network element identification, a source of the alarm, a layer rate, and a cause of the alarm.
It should be noted that, when the designated alarm data is multiple and the alarm masking command is generated based on the attribute information carried in the designated alarm data, a single alarm masking command may be generated based on the attribute information of each of the multiple designated alarm data, which may specifically refer to the above contents.
In step S203, sending the alarm shielding command to the network element includes: and issuing an alarm shielding command to the network element through a network management server to which the network element belongs.
Specifically, issuing an alarm shielding command to the network element through the network management server to which the network element belongs includes: under the condition that the network element is interacted with the network management server through a full-quantity setting command interface, an alarm shielding command is sent to the network management server, and a first alarm shielding message is sent to the network element by the network management server, wherein the first alarm shielding message carries alarm shielding data in the alarm shielding command and alarm shielding data existing in the network element; and under the condition that the network element is interacted with the network management server through the increment setting command interface, sending an alarm shielding command to the network management server, and sending a second alarm shielding message to the network element by the network management server, wherein the second alarm shielding message carries the alarm shielding data in the alarm shielding command.
It should be noted that, in the case that there are multiple alarm masking commands, sending the alarm masking command to the network management server includes: and issuing alarm shielding commands corresponding to the preset number of network elements to the network management server each time.
Optionally, when there are multiple alarm shielding commands, issuing the alarm shielding command to the network element through the network management server to which the network element belongs includes: and issuing an alarm shielding command to a target network element through a target network management server, wherein the target network management server is a network management server to which the target network element belongs, and the target network element is a source network element of specified alarm data corresponding to the alarm shielding command.
For example, when operating the alarm mask menu, acquiring the required field information from the selected alarm data includes: the information of the network element ID (namely the network element identification), the alarm source, the layer rate, the alarm reason and the like is utilized to construct an alarm shielding message, and the alarm shielding message is sent to a server side for processing in batches and concurrently according to the mode of fixing the number of the network elements in each batch.
After receiving the alarm shielding command, the server processes the command, converts the alarm shielding data into a message interacted with the equipment and sends the message to the equipment for shielding operation, after receiving the alarm shielding command sent by the network manager, the equipment carries out alarm shielding according to the information of the alarm source, the layer rate, the alarm reason and the like filled in the message, reports an alarm disappearance command to the network manager, and the subsequent equipment can not generate the alarm.
Specifically, after receiving the alarm shielding command, the server needs to query the existing alarm shielding data of the network element from the network management database for the network element interacting with the network management in the form of the interface of the full setting command, and then merge the alarm shielding data with the shielding data issued by the client.
The server also needs to store the merged message data in a network management database, convert the merged message data into a message interacting with the device, and send the message to the device for alarm shielding.
For the network element interacting with the network management in the form of the interface of the increment setting command, the processing of the stored data in the network management database is the same as the full amount, and only the alarm shielding data sent by the client needs to be converted into the message interacting with the equipment and sent to the equipment for alarm shielding when the equipment is sent.
After the alarm shielding command is sent to the network element in step S203, an alarm disappearing command reported by the network element may be received; and shielding the alarm data identified by the identification information in the alarm disappearing command in the current display interface.
After receiving the alarm disappearing command reported by the equipment, the network management server clears the current alarm, changes the current alarm into a history alarm and reports the history alarm to the client; after receiving the notification, the client will not display the alarms in the table of the current alarm interface. Thereby acting as a shield.
By adopting the method, the alarm is selected in the current alarm window of the network management system, the shielding operation is directly carried out, the alarm information which does not need to be concerned and has low importance in the current network can be shielded very intuitively, the equipment does not report the alarm, the resource occupation of the network management for processing the report of the mass alarms is reduced, and the method has the characteristics of rapidness and convenience in operation. Compared with the prior art, the operation of rapidly shielding the alarm of the equipment can be finished without selecting alarm items one by one in an alarm shielding function window for setting or manually maintaining a large number of alarm shielding rules; the method is suitable for operation and maintenance management of large-scale networks, can effectively reduce operation and maintenance cost, improves the manageability of equipment, and increases the maintainability of the network.
Embodiments of the present application are described in detail below with reference to fig. 3 to 5.
As shown in fig. 3, when performing the masking, the following steps can be performed:
step S301, in a transmission network management system, a server firstly reports current alarm data to a client;
step S302, the client displays the current alarm data in a form of a table on the current alarm interface; the current alarm data comprises information such as network elements, network element positioning, layer rate, alarm reasons, generation time and the like;
step S303, checking alarm data in a table of a current alarm interface, and selecting one or more alarms which do not need to be concerned by clicking selection, wherein the alarms can belong to the same network element or different network elements;
and step S304, clicking a right-click menu after selecting the alarm data to be shielded, and selecting the alarm shielding.
The steps for processing the alarm mask command are shown in FIG. 4:
step S401, the client acquires the required field information from the selected current alarm data, including: constructing an alarm shielding message (including an alarm shielding command) by using the network element ID, the network element positioning, the layer rate and the alarm reason;
step S402, the client divides the message (alarm shielding command) into a plurality of batches according to the mode of each batch of fixed network element number, and issues the alarm shielding command to the server end in batches;
step S403, after receiving the command, the server analyzes the alarm shielding message in the command to obtain alarm shielding data issued by the client; then inquiring alarm shielding data of a corresponding network element from a network management database, and merging the inquired existing data with the alarm shielding data issued by the client;
step S404, the alarm shielding message data after the merging processing is warehoused again and stored in a network management database;
step S405, judging the command interface form used when the network manager interacts with the corresponding network element;
step S406, for the network element which interactively communicates with the network management in the form of the interface of the full setting command, converting the alarm shielding data after the merging processing into a message interacted with the equipment, and sending the message to the equipment for alarm shielding;
step S407, for the network element interactively communicating with the network manager in the form of the interface of the increment setting command, converting the alarm shielding data issued by the client into a message interacting with the equipment, and issuing the message to the equipment for alarm shielding;
step S408, after receiving the alarm shielding command issued by the network management side, the equipment side analyzes the message in the command, and shields the corresponding alarm according to the information of the network element positioning (namely the alarm source), the layer rate, the alarm reason and the like filled in the message;
step S409, the network management client judges whether all network elements are processed, if not, the step S402 is executed, and the alarm shielding command of the network elements of the next batch is continuously sent to the server for processing; otherwise, ending.
Fig. 5 shows the report of the alarm disappearance command:
step S501, after receiving an alarm shielding command request issued by a network manager, the device clears the relevant alarms meeting the conditions on the device, and reports the alarm disappearing commands of the alarm to the network manager, and the subsequent devices can not generate the alarm;
step S502, after receiving the alarm disappearing command reported by the equipment, the network management server analyzes the message in the command, removes the alarm contained in the command and changes the corresponding alarm from the current alarm into the historical alarm;
step S503, the server constructs an alarm disappearance notification (alarm disappearance command) and reports the alarm disappearance notification to the client;
in step S504, after receiving the warning disappearance notification, the client no longer displays the corresponding warning data in the form of the current warning interface.
Through the embodiment, the transmission network management system directly selects the alarm which does not need attention or has low importance to shield in the current alarm window, and the equipment does not generate the alarm reported any more; the operation mode capable of rapidly shielding the equipment alarm is very intuitive and convenient for network operation and maintenance personnel, can effectively reduce the operation and maintenance cost, and improves the manageability and maintainability of the network.
Through the above description of the embodiments, those skilled in the art can clearly understand that the method according to the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but the former is a better implementation mode in many cases. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
Example 2
The embodiment of the invention also provides a device for shielding the equipment alarm. The device is used for implementing the above embodiments and preferred embodiments, and the description of the device is omitted. As used below, the term "module" may be a combination of software and/or hardware that implements a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware or a combination of software and hardware is also possible and contemplated.
FIG. 6 is a schematic diagram of a device alarm shielding apparatus according to an embodiment of the present invention. As shown in fig. 6, the apparatus may include: an acquisition unit 61, a generation unit 62, and a transmission unit 63.
The acquiring unit 61 is configured to acquire specified alarm data in the alarm data reported by the network element;
the generating unit 62 is configured to generate an alarm masking command based on the specified alarm data, where the alarm masking command is used to mask reporting of alarm data having the same attribute as the specified alarm data;
the sending unit 63 is configured to send an alarm shielding command to the network element.
Through the embodiment, the acquisition unit acquires the specified alarm data in the alarm data reported by the network element; the generation unit generates an alarm shielding command based on the designated alarm data, wherein the alarm shielding command is used for shielding the report of the alarm data with the same attribute as the designated alarm data; the sending unit sends the alarm shielding command to the network element, when the alarm shielding command is generated, a user does not need to select one by one according to conditions, and the alarm shielding command can be directly generated according to the specified alarm data, so that the shielding of one type of alarm data is realized, the technical problem of low efficiency in operation and maintenance management of the network in the related technology is solved, and the technical effect of improving the efficiency of the operation and maintenance management is realized.
In the above embodiment, the generating unit is further configured to generate the alarm masking command based on the attribute information carried by the specified alarm data.
Optionally, the generating unit includes: the first acquisition module is used for acquiring attribute information carried by one or more fields of the designated alarm data, wherein each field carries one attribute information; the generating module is used for generating an alarm shielding command for shielding the alarm with one or more attribute information.
In an optional embodiment, the generating unit is further configured to generate an alarm mask command based on attribute information of each of the plurality of designated alarm data in a case that the designated alarm data is multiple.
In another optional embodiment, the sending unit is further configured to issue the alarm shielding command to the network element through a network management server to which the network element belongs.
Optionally, the sending unit includes: the first sending module is used for sending an alarm shielding command to the network management server under the condition that the network element is interacted with the network management server through a full-quantity setting command interface, and sending a first alarm shielding message to the network element by the network management server, wherein the first alarm shielding message carries alarm shielding data in the alarm shielding command and alarm shielding data existing in the network element; and the second sending module is used for sending an alarm shielding command to the network management server under the condition that the network element is interacted with the network management server through the increment setting command interface, and sending a second alarm shielding message to the network element by the network management server, wherein the second alarm shielding message carries the alarm shielding data in the alarm shielding command.
Optionally, the first sending module is further configured to issue the alarm shielding commands corresponding to the preset number of network elements to the network management server each time when the number of the alarm shielding commands is multiple.
Optionally, the sending unit is further configured to issue the alarm shielding command to the target network element through the target network management server when the alarm shielding command is multiple, where the target network management server is a network management server to which the target network element belongs, and the target network element is a source network element of the specified alarm data corresponding to the alarm shielding command.
Optionally, the apparatus further comprises: the receiving unit is used for receiving the alarm disappearance command reported by the network element; and the shielding unit is used for shielding the alarm data identified by the identification information in the alarm disappearing command in the current display interface.
Optionally, the obtaining unit includes: and the second acquisition module is used for acquiring the designated alarm data selected by the user from the displayed alarm data when the alarm data reported by the network element is displayed.
It should be noted that the above modules may be implemented by software or hardware, and for the latter, the following may be implemented, but not limited to: the modules are all positioned in the same processor; alternatively, the modules are respectively located in different processors in any combination.
Example 3
The embodiment of the invention also provides a storage medium. Alternatively, in the present embodiment, the storage medium may be configured to store program codes for performing the following steps:
s1, acquiring appointed alarm data in the alarm data reported by the network element;
s2, generating an alarm shielding command based on the designated alarm data, wherein the alarm shielding command is used for shielding the report of the alarm data with the same attribute as the designated alarm data;
and S3, sending an alarm shielding command to the network element.
Optionally, the storage medium is further arranged to store program code for performing the steps of:
s4, acquiring attribute information carried by one or more fields of the designated alarm data, wherein each field carries one attribute information;
s5, generating an alarm masking command for masking the alarm with one or more attribute information.
Optionally, in this embodiment, the storage medium may include, but is not limited to: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Optionally, in this embodiment, the processor executes, according to a program code stored in the storage medium, acquiring specified alarm data in the alarm data reported by the network element; generating an alarm shielding command based on the designated alarm data, wherein the alarm shielding command is used for shielding the report of the alarm data with the same attribute as the designated alarm data; and sending an alarm shielding command to the network element.
Optionally, in this embodiment, the processor executes, according to the program code stored in the storage medium: acquiring attribute information carried by one or more fields of specified alarm data, wherein each field carries one attribute information; an alarm masking command is generated for masking an alarm having one or more attribute information.
Optionally, the specific examples in this embodiment may refer to the examples described in the above embodiments and optional implementation manners, and this embodiment is not described herein again.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and alternatively, they may be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, and in some cases, the steps shown or described may be performed in an order different than that described herein, or they may be separately fabricated into individual integrated circuit modules, or multiple ones of them may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (14)

1. A method for shielding equipment alarm is characterized by comprising the following steps:
acquiring specified alarm data in the alarm data reported by the network element;
generating an alarm shielding command based on the designated alarm data, wherein the alarm shielding command is used for shielding the report of the alarm data with the same attribute as the designated alarm data;
and sending the alarm shielding command to the network element.
2. The method of claim 1, wherein generating an alarm mask command based on the specified alarm data comprises:
and generating the alarm shielding command based on the attribute information carried by the specified alarm data.
3. The method of claim 2, wherein generating the alarm mask command based on the attribute information carried by the specific alarm data comprises:
acquiring attribute information carried by one or more fields of the specified alarm data, wherein each field carries one piece of attribute information;
generating the alarm masking command for masking the alarm having one or more of the attribute information.
4. The method of claim 3, wherein the one or more fields comprise one or more of a network element identification, an alert source, a layer rate, and an alert cause.
5. The method according to claim 2, wherein, in a case that the designated alarm data is multiple, generating the alarm mask command based on the attribute information carried by the designated alarm data comprises:
and generating one alarm shielding command based on the attribute information of each of the plurality of designated alarm data.
6. The method according to any of claims 1 to 5, wherein sending the alarm mask command to the network element comprises:
and issuing the alarm shielding command to the network element through a network management server to which the network element belongs.
7. The method of claim 6, wherein issuing the alarm masking command to the network element through a network management server to which the network element belongs comprises:
sending the alarm shielding command to the network management server under the condition that the network element is interacted with the network management server through a full setting command interface, and sending a first alarm shielding message to the network element by the network management server, wherein the first alarm shielding message carries alarm shielding data in the alarm shielding command and existing alarm shielding data of the network element;
and under the condition that the network element is interacted with the network management server through an increment setting command interface, sending the alarm shielding command to the network management server, and sending a second alarm shielding message to the network element by the network management server, wherein the second alarm shielding message carries the alarm shielding data in the alarm shielding command.
8. The method according to claim 7, wherein, in case that there are a plurality of alarm mask commands, sending the alarm mask commands to the network management server comprises:
and issuing the alarm shielding command corresponding to the preset number of the network elements to the network management server each time.
9. The method of claim 6, wherein, when there are a plurality of alarm masking commands, issuing the alarm masking command to the network element through a network management server to which the network element belongs comprises:
and issuing the alarm shielding command to a target network element through a target network management server, wherein the target network management server is a network management server to which the target network element belongs, and the target network element is a source network element of specified alarm data corresponding to the alarm shielding command.
10. The method of claim 1, further comprising:
after the alarm shielding command is sent to the network element, receiving an alarm disappearing command reported by the network element;
and shielding the alarm data identified by the identification information in the alarm disappearance command in the current display interface.
11. The method of claim 1, wherein obtaining the specified alarm data in the alarm data reported by the network element comprises:
and when the alarm data reported by the network element is displayed, acquiring the designated alarm data selected by the user from the displayed alarm data.
12. A device alarm shielding apparatus, comprising:
the acquisition unit is used for acquiring specified alarm data in the alarm data reported by the network element;
a generating unit, configured to generate an alarm masking command based on the specified alarm data, where the alarm masking command is used to mask reporting of alarm data having the same attribute as the specified alarm data;
and the sending unit is used for sending the alarm shielding command to the network element.
13. The apparatus according to claim 12, wherein the generating unit is further configured to generate the alarm masking command based on attribute information carried by the specified alarm data.
14. The apparatus of claim 13, wherein the generating unit comprises:
the first acquisition module is used for acquiring attribute information carried by one or more fields of the specified alarm data, wherein each field carries one piece of attribute information;
a generating module, configured to generate the alarm masking command for masking the alarm having the one or more attribute information.
CN201610709623.5A 2016-08-23 2016-08-23 Method and device for shielding equipment alarm Active CN107769954B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610709623.5A CN107769954B (en) 2016-08-23 2016-08-23 Method and device for shielding equipment alarm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610709623.5A CN107769954B (en) 2016-08-23 2016-08-23 Method and device for shielding equipment alarm

Publications (2)

Publication Number Publication Date
CN107769954A CN107769954A (en) 2018-03-06
CN107769954B true CN107769954B (en) 2022-09-30

Family

ID=61263487

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610709623.5A Active CN107769954B (en) 2016-08-23 2016-08-23 Method and device for shielding equipment alarm

Country Status (1)

Country Link
CN (1) CN107769954B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109039740B (en) * 2018-08-01 2022-07-19 平安科技(深圳)有限公司 Method and equipment for processing operation and maintenance monitoring alarm
CN110071837B (en) * 2019-04-28 2022-02-01 烽火通信科技股份有限公司 Alarm processing method and system for access network
CN114443206A (en) * 2020-10-31 2022-05-06 华为技术有限公司 Communication method and device
CN114944980B (en) * 2022-07-26 2022-10-21 上海有孚智数云创数字科技有限公司 System method, apparatus, and medium for monitoring alarms

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1992632A (en) * 2005-12-28 2007-07-04 大唐软件技术有限责任公司 Communication network warning method and warning system
CN101170441A (en) * 2007-11-26 2008-04-30 中兴通讯股份有限公司 A method and device for shielding device alarm in network management system
CN103560917A (en) * 2013-11-15 2014-02-05 烽火通信科技股份有限公司 Network equipment warning device and warning method based on command line
CN104683333A (en) * 2015-02-10 2015-06-03 国都兴业信息审计系统技术(北京)有限公司 Method for implementing abnormal traffic interception based on SDN

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101656621B (en) * 2008-08-19 2011-09-14 华为技术有限公司 Alarm performance configuration method, system and network element equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1992632A (en) * 2005-12-28 2007-07-04 大唐软件技术有限责任公司 Communication network warning method and warning system
CN101170441A (en) * 2007-11-26 2008-04-30 中兴通讯股份有限公司 A method and device for shielding device alarm in network management system
CN103560917A (en) * 2013-11-15 2014-02-05 烽火通信科技股份有限公司 Network equipment warning device and warning method based on command line
CN104683333A (en) * 2015-02-10 2015-06-03 国都兴业信息审计系统技术(北京)有限公司 Method for implementing abnormal traffic interception based on SDN

Also Published As

Publication number Publication date
CN107769954A (en) 2018-03-06

Similar Documents

Publication Publication Date Title
CN110310034B (en) Service arrangement and business flow processing method and device applied to SaaS
CN107769954B (en) Method and device for shielding equipment alarm
CN111294217B (en) Alarm analysis method, device, system and storage medium
US10200893B2 (en) Systems and methods for providing visualization of a telecommunications network topology
US11818623B2 (en) System and method for monitoring devices relative to a user defined geographic area
US20170279688A1 (en) Method, device and system for providing device application software management service in internet of things
US20140250201A1 (en) Network Support Node Traffic Reduction for Self-Organizing Networks
KR20180104424A (en) Dynamic condition management apparatus and method to respond to real time in a factory
CN113795039A (en) Operator network switching method, device, equipment and computer readable storage medium
CN101149680A (en) Dynamically changing, graphic configuration resource management method
CN107800556B (en) Interface generation system, drilling service layer device and data transmission method
CN113076186B (en) Task processing method, device, electronic equipment and storage medium
WO2016177054A1 (en) Charging equipment management method and device
CN109725884A (en) Air control ' In System Reconfiguration Method, device, equipment and readable storage medium storing program for executing
US10750356B2 (en) Configuration management method, apparatus, and system for terminal in internet of things
CN109150647A (en) A kind of network flow monitoring method and device
US20130238781A1 (en) Snmp-based management of service oriented architecture environments
CN116823570A (en) Government work data processing method and device, electronic equipment and storage medium
CN111435238A (en) Method for automatically discovering and classifying plant power and energy intelligent devices for analysis
CN105607983A (en) Data exception monitoring method and apparatus
CN105930295B (en) A kind of method and device of secondary equipment of intelligent converting station plug and play
US20220405115A1 (en) Server and application monitoring
CN107124293B (en) Protocol management method and system of distributed network system
CN113946394A (en) Method and device for displaying task flow running result in real time and electronic equipment
CN112491583A (en) Data acquisition and analysis method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
TA01 Transfer of patent application right

Effective date of registration: 20180417

Address after: 518057 Nanshan District science and technology, Guangdong Province, South Road, No. 55, No.

Applicant after: ZTE Corp.

Address before: 210012 Nanjing, Yuhuatai District, South Street, Bauhinia Road, No. 68

Applicant before: Nanjing Zhongxing Software Co.,Ltd.

TA01 Transfer of patent application right
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant