CN108322318A - Alert analysis method and apparatus - Google Patents

Alert analysis method and apparatus Download PDF

Info

Publication number
CN108322318A
CN108322318A CN201710033521.0A CN201710033521A CN108322318A CN 108322318 A CN108322318 A CN 108322318A CN 201710033521 A CN201710033521 A CN 201710033521A CN 108322318 A CN108322318 A CN 108322318A
Authority
CN
China
Prior art keywords
node
alarming
server
accessed
alarm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710033521.0A
Other languages
Chinese (zh)
Other versions
CN108322318B (en
Inventor
石苏龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201710033521.0A priority Critical patent/CN108322318B/en
Publication of CN108322318A publication Critical patent/CN108322318A/en
Application granted granted Critical
Publication of CN108322318B publication Critical patent/CN108322318B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The embodiment of the present invention provides a kind of alert analysis method and apparatus, is applied to Network Management System, and the Network Management System includes server and multiple nodes, the method includes:Server obtains the alarm that at least one alarming node reports, and the alarming node is that the node of alarm is generated in the multiple node;The server determines root because alerting corresponding destination node according to the accessed node list of the topological decomposition result and each alarming node of the multiple node at least one alarming node;Wherein, the topological decomposition result includes the priority ranking alerted as root because of alarm that the multiple node generates, and the priority ranking is determined according to the out-degree of each node in the multiple node.The embodiment of the present invention reduces the enforcement difficulty of alarm root cause analysis while promoting alarm root because of analysis efficiency.

Description

Alert analysis method and apparatus
Technical field
The present embodiments relate to technical field of network management more particularly to a kind of alert analysis method and apparatus.
Background technology
It usually will appear failure in information system, for the ease of the management of information system, often through fault warning side Formula carrys out fault point, but with the increase of equipment in information system, the scale and complexity of information system show finger The growth of several levels.
In practical applications, Network Management System receives the largely warning information from information system, and a large amount of It is root because of warning information often there was only a small amount of warning information in warning information, but technical staff is difficult in a large amount of warning information In find root because of warning information.In order to find root because of warning information, alarm root of the prior art based on system status monitoring It is realized because analyzing.Specifically, in network element to after Network Management System report and alarm information, Network Management System passes through failure Front and back system mode it was found that system exception point, such as link is abnormal, warping apparatus, then by abnormal point with reporting Alarm between correspondence come determine root because alarm.For example, network element A has reported alarm 1, network element B to report alarm 2, net Network manages system by the system mode before and after failure it was found that system exception point is network element A and network element C, it is determined that network element The corresponding alarms 1 of A are root because of alarm.
However, the alarm root cause analysis based on system status monitoring, needs the state for fully monitoring whole system, causes The expense of system is larger, and enforcement difficulty is high;Also needed to after alarm spend longer time to the system mode before and after failure into Row leads to the inefficiency for alerting root cause analysis it was found that system exception point.
Invention content
The embodiment of the present invention provides a kind of alert analysis method and apparatus, to reduce the overhead of alert analysis process, While promoting alarm root because of analysis efficiency, the enforcement difficulty of alarm root cause analysis is reduced.
In a first aspect, the embodiment of the present invention provides a kind of alert analysis method, it is applied to Network Management System, the network Management system includes server and multiple nodes, the method includes:
Server obtains the alarm that at least one alarming node reports, and server is according to the topological decomposition results of multiple nodes With the accessed node list of each alarming node, determine root because alerting corresponding destination node at least one alarming node;
Wherein, alarming node is that the node of alarm is generated in multiple nodes, and topological decomposition result includes that multiple nodes generate Alarm as root because of the priority ranking of alarm, priority ranking be according to the out-degree of each node in multiple nodes determination , optionally, accessed node list includes the mark of each node and the mark of the corresponding accessed node of each node.It should The mark of accessed node includes the mark of the mark and dereference node of direct accessed node.
Server by the accessed node list of the topological decomposition result and each alarming node of the multiple nodes pre-established, Determine that root because alerting corresponding destination node, need not monitor the state of whole system, reduce at least one alarming node The expense of system, and system mode need not be compared, while promoting alarm root because of analysis efficiency, also reduce Alert the enforcement difficulty of root cause analysis.
In a kind of possible design, topological decomposition result and each announcement of the server according to the multiple node The accessed node list of alert node determines root because of the corresponding destination node of alarm at least one alarming node, including:
The server is according to the accessed node list of the priority ranking and each alarming node, in alarming node Target alarms node and target access alarming node are excluded successively, and the target alarms node is the alarming node of current residual The middle highest alarming node of alert priority;For primary condition, the alarming node of current residual is all alarming nodes, It executes after excluding operation, the alarming node of current residual is then surplus after excluding target alarms node and target access alarming node Remaining alarming node;
The target access alarming node is the accessed node of the target alarms node, and target access alarm saves The alarming node that point alerts for generation;
The server determines root because alerting corresponding destination node according to the target alarms node being excluded.
By excluding target alarms node and target access alarming node, by communication topology by the target alarms node Alarm caused by propagating is excluded, and so as to quickly position root because alerting corresponding destination node, improves root because of alarm Acquisition efficiency.
In a kind of possible design, the server is according to the access section of the priority ranking and each alarming node Point list excludes target alarms node and target access alarming node successively in alarming node, including:
The server establishes alarming node set, and the alarming node set includes at least one alarm section Point, the target alarms node and the alarming node that the target access alarming node is in the alarming node set;
The server determines highest first alarming node of alert priority in the alarming node set, to described Processing is marked in first alarming node;According to the accessed node list of first alarming node, to the alarming node collection It closes and executes delete operation, wherein first alarming node and the first access alarming node be the node being deleted, described the One alarming node is the target alarms node in the alarming node set, and described first accesses alarming node saves for the alarm Target access alarming node in point set, described first accesses the accessed node that alarming node is first alarming node;
Determine that alert priority highest second is accused in remaining node of the server in the alarming node set Alert node, processing is marked to second alarming node;According to the accessed node list of second alarming node, to institute It states alarming node set and executes delete operation;Wherein, second alarming node and the second access alarming node are deleted Node, second alarming node be the alarming node set in target alarms node, it is described second access alarm section Point is the target access alarming node in the alarming node set, and described second accesses alarming node as the second alarm section The accessed node of point;
The remaining node in the alarming node set is marked the process of processing and delete operation in repetition, until institute It states alarming node collection and is combined into sky;
The server determines root because of the corresponding destination node of alarm according to the target alarms node being excluded, including:
The server obtains root because alerting corresponding destination node according to the alarming node of labeled processing.
In a kind of possible design, server determines highest first alarm of alert priority in alarming node set Processing is marked to the first alarming node in alarming node set in node;It is arranged according to the accessed node of the first alarming node Table executes delete operation to alarming node set, wherein and the first access alarming node be the node being deleted, described the One alarming node is the target alarms node in the alarming node set, and described first accesses alarming node saves for the alarm Target access alarming node in point set, first accesses the accessed node that alarming node is the first alarming node;
Determine that alarm is preferential in remaining node of the server in alarming node set in addition to first alarming node Highest second alarming node of grade, processing is marked to the second alarming node in alarming node set;According to the second alarm The accessed node list of node executes delete operation to alarming node set, wherein the second access alarming node is to be deleted The node removed, second alarming node are the target alarms node in the alarming node set, and described second accesses alarm Node is the target access alarming node in the alarming node set, and second accesses the visit that alarming node is the second alarming node Ask node;
It repeats that the remaining node in addition to labeled node in alarming node set is marked processing and deleted to grasp The process of work, until only existing labeled alarming node in alarming node set;Server according to labeled alarming node, Root is obtained because alerting corresponding destination node.The label processing of the present embodiment can be in alarming node set to alarming node It is hidden and/or locks, to prevent labeled alarming node to be identified priority again, and/or, prevent labeled announcement Alert node is accidentally deleted.
So that the implementation process for excluding to access alarming node can by excluding access alarming node in alarming node set Orderly to carry out, processing is marked to target alarms node so that final root is recognizable because alerting corresponding destination node, It ensure that the correctness of destination node.
In a kind of possible design, the server obtains the alarm that at least one alarming node reports, including:
The server obtains the alarm that at least one alarming node reports in preset time range.
In a kind of possible design, topological decomposition result and each announcement of the server according to the multiple node The accessed node list of alert node, before determining root because of the corresponding destination node of alarm at least one alarming node, Further include:
The server obtains the access relational data that each node reports, and the access relational data includes accessing The mark of node and the mark of access node;Wherein, the accessed node in the access relational data is the accessed section The direct accessed node of point;
The server obtains the first communication topology according to the access relational data;
The server obtains the topological decomposition result according to the out-degree of each node in first communication topology With the accessed node list.
Each node only needs to report access relational data, server need not be by other equipments such as gateways just to server The first communication topology can be obtained so that the process for obtaining the first communication topology is easily achieved.
In a kind of possible design, the server obtains the first communication topology according to the access relational data, packet It includes:
The server establishes initial communication topology according to the access relational data;
Multiple Node compressions on same loop in the initial communication topology are a virtual section by the server Point obtains first communication topology.
By being a dummy node by multiple Node compressions on the same loop in initial communication topology so that deposited In the communication topology of communications loop, alert analysis method provided in this embodiment can also be applied, expands the suitable of the present embodiment With range so that the present embodiment can cope with various communication topologies.
In a kind of possible design, the server according to the out-degree of each node in first communication topology, The topological decomposition result and the accessed node list are obtained, including:
The node that out-degree in first communication topology is 0 is carried out removal processing by the server, and it is logical to obtain second Letter topology and first removes node;
The node that out-degree in second communication topology is 0 is carried out removal processing by the server, and it is logical to obtain third Letter topology and second removes node;
It repeats remove the process of processing by out-degree for 0 node, until all nodes are removed;
The server obtains the topological decomposition result and the accessed node list according to the node removed every time.
In a kind of possible design, the server obtains the topological decomposition result according to the node removed every time, Including:
The server obtains the topology and decomposes knot according to the corresponding sequencing for removing processing of each removal node Fruit;
Wherein, the same priority for removing the node being moved out of in processing procedure is identical, and the priority that N removes node is big The priority of node is removed in N+1, the N is the integer more than 0.
Server is according to the corresponding sequencing for removing processing of each removal node, so that it may excellent with the alarm for obtaining each node First grade sequence, server implementation process is fairly simple, need not carry out cumbersome operation, reduce the burden of server.
In a kind of possible design, the server obtains the accessed node list according to the node removed every time, Including:
The first node that an out-degree is zero is often removed, the server determines corresponding second section of the first node Point, the second node are the direct accessed node of the first node;
The server stores the second node into the corresponding accessed node list of the first node;
The server judges that the first node whether there is in the accessed node list of third node, if so, The second node is stored into the accessed node list of the third node;
The server traverses all removed nodes, obtains institute successively in order according to the removal sequence of each node State accessed node list;
Wherein, include the void in the accessed node list if including dummy node in the accessed node list The corresponding all ancestor nodes of quasi- node.
The removal sequence for the node that server is zero according to each out-degree, can obtain accessed node list, the accessed node List includes not only direct accessed node, further includes dereference node so that server, can be with according to the accessed node list The alarm for excluding the topological broadcast caused by the node, improves the accuracy of alert analysis, and server implementation process compares Simply, cumbersome operation need not be carried out, the burden of server is reduced.
Second aspect, the embodiment of the present invention provide a kind of server, are applied to Network Management System, the Network Management Department System includes the server and multiple nodes, the method includes:
Acquisition module, the alarm reported for obtaining at least one alarming node are alerted, the alarming node is described more The node of alarm is generated in a node;
Determining module is alerted, the access of the topological decomposition result and each alarming node according to the multiple node is used for Node listing determines root because alerting corresponding destination node at least one alarming node;
Wherein, the topological decomposition result includes the priority row alerted as root because of alarm that the multiple node generates Sequence, the priority ranking are determined according to the out-degree of each node in the multiple node.
In a kind of possible design, the alarm determining module is specifically used for:
According to the accessed node list of the priority ranking and each alarming node, mesh is excluded successively in alarming node Alarming node and target access alarming node are marked, the target alarms node is preferential to be alerted in the alarming node of current residual The highest alarming node of grade, the target access alarming node are the accessed node of the target alarms node, and the target It is to generate the alarming node of alarm to access alarming node;
According to the target alarms node being excluded, determine root because alerting corresponding destination node.
In a kind of possible design, the alarm determining module is specifically used for:
Alarming node set is established, the alarming node set includes at least one alarming node, the target Alarming node and the alarming node that the target access alarming node is in the alarming node set;
Highest first alarming node of alert priority is determined in the alarming node set, and first alarm is saved Processing is marked in point;According to the accessed node list of first alarming node, deletion is executed to the alarming node set Operation, wherein first alarming node and first access alarming node be deleted node, first alarming node Alarming node is accessed as in the alarming node set for the target alarms node in the alarming node set, described first Target access alarming node;
Highest second alarming node of alert priority is determined in remaining node in the alarming node set, to institute It states the second alarming node and processing is marked;According to the accessed node list of second alarming node, to the alarming node Set executes delete operation;Wherein, second alarming node and the second access alarming node are deleted node, described Second alarming node is the target alarms node in the alarming node set, and described second accesses alarming node as the alarm Target access alarming node in node set;
The remaining node in the alarming node set is marked the process of processing and delete operation in repetition, until institute It states alarming node collection and is combined into sky;
According to the alarming node of labeled processing, root is obtained because alerting corresponding destination node.
In a kind of possible design, the alarm acquisition module is specifically used for:
The alarm that at least one alarming node reports is obtained in preset time range.
In a kind of possible design, further include:Relation acquisition module, relationship processing module and generation module;Wherein
The Relation acquisition module, the access relational data reported for obtaining each node, the access relation number According to the mark of the mark and access node that include accessed node;
The relationship processing module, for according to the access relational data, obtaining the first communication topology;
The generation module obtains the topology for the out-degree according to each node in first communication topology Decomposition result and the accessed node list.
In a kind of possible design, the relationship processing module is specifically used for:
According to the access relational data, initial communication topology is established;
It is a dummy node by multiple Node compressions on the same loop in the initial communication topology, described in foundation First communication topology.
In a kind of possible design, the generation module is specifically used for:
The node that out-degree in first communication topology is 0 is subjected to removal processing, obtains the second communication topology and the One removes node;
The node that out-degree in second communication topology is 0 is subjected to removal processing, obtains third communication topology and the Two remove node;
It repeats remove the process of processing by out-degree for 0 node, until all nodes are removed;
According to the node removed every time, the topological decomposition result and the accessed node list are obtained.
In a kind of possible design, the generation module is specifically used for:
According to the corresponding sequencing for removing processing of each removal node, the topological decomposition result is obtained;
Wherein, the same priority for removing the node being moved out of in processing procedure is identical, and the priority that N removes node is big The priority of node is removed in N+1, the N is the integer more than 0.
In a kind of possible design, the generation module is specifically used for:
The first node that an out-degree is zero is often removed, determines the corresponding second node of the first node, described second Node is the direct accessed node of the first node;
The second node is stored into the corresponding accessed node list of the first node;
Judge that the first node whether there is in the accessed node list of third node, if so, by described second Node is stored into the accessed node list of the third node;
According to the removal of each node sequence, traverses all removed nodes successively in order, obtain the accessed node List;
Wherein, include the void in the accessed node list if including dummy node in the accessed node list The corresponding all ancestor nodes of quasi- node.
The third aspect, the embodiment of the present invention provide a kind of server, including:At least one processor and memory;
The memory stores computer executed instructions;
At least one processor executes the computer executed instructions of the memory storage so that the server is held The above-mentioned various alert analysis methods that offer may be provided of row.
A kind of computer readable storage medium is also provided in the embodiment of the present invention, is stored in computer readable storage medium Computer executed instructions, when at least one processor of server executes the computer executed instructions, server executes above-mentioned It is various that the alert analysis method provided may be provided.
A kind of computer program product is also provided in the embodiment of the present invention, which includes that computer executes Instruction, the computer executed instructions store in a computer-readable storage medium.At least one processor of server can be from Computer readable storage medium reads the computer executed instructions, and at least one processor executes the computer executed instructions and makes The above-mentioned various alert analysis methods that offer may be provided of server implementation.
Description of the drawings
Fig. 1 is the configuration diagram of Network Management System provided in an embodiment of the present invention;
Fig. 2 is the flow diagram one of alert analysis method provided in an embodiment of the present invention;
Fig. 3 is alarm schematic diagram provided in an embodiment of the present invention;
Fig. 4 is the network topology schematic diagram of telecommunication system provided in an embodiment of the present invention;
Fig. 5 is the flow diagram two of alert analysis method provided in an embodiment of the present invention;
Fig. 6 is the structural schematic diagram of the first communication topology provided in an embodiment of the present invention;
Fig. 7 is the structural schematic diagram of the second communication topology provided in an embodiment of the present invention;
Fig. 8 is the structural schematic diagram of the third communication provided in an embodiment of the present invention topology;
Fig. 9 is the structural schematic diagram of fourth communication provided in an embodiment of the present invention topology;
Figure 10 is the flow diagram three of alert analysis method provided in an embodiment of the present invention;
Figure 11 is the alarm schematic diagram one of telecommunication system provided in an embodiment of the present invention;
Figure 12 is the alarm schematic diagram two of telecommunication system provided in an embodiment of the present invention;
Figure 13 is the structural schematic diagram of server provided in an embodiment of the present invention;
Figure 14 is the hardware architecture diagram of server provided in an embodiment of the present invention.
Specific implementation mode
Fig. 1 is the configuration diagram of Network Management System provided in an embodiment of the present invention.Network pipe provided in this embodiment Reason system includes server and multiple nodes.There is the relationship for accessing and being accessed between multiple nodes.Access between node Relationship forms network topology.Node provided in this embodiment can be various network elements.In Fig. 1, between two nodes Arrow " → " represents access relation, such as node E → node B, represents node E accessed nodes B.For example, node E can be to Node B sends service request, and either node E calls interface of node B etc. or node E to read data etc. from node B.Wherein, Node B is access node, and node E is the direct accessed node of node B.For node C → node D → node E, then it represents that section Point D accessed node E, node C accessed nodes D.In the present embodiment, node D is the accessed node of node E, and node D is to node E With access process, node C is the dereference node of node E, and node C does not have access process to node E.In following implementation In example, if not otherwise specified, involved accessed node includes direct accessed node and dereference node.
In the present embodiment, each node periodically can report access relational data to server, which is Include the mark of accessed node and the mark of access node.Wherein, the accessed node in the access relational data is institute State the direct accessed node of access node;Server can establish the accessed node of each node according to the access relational data List and topological decomposition result.Wherein, to include the alarm that generates of multiple nodes excellent because of alarm as root for topological decomposition result First grade sequence.Accessed node list includes the mark of each node and the mark of corresponding accessed node.For specifically establishing Process will be described in detail in following embodiments.
When node occurs abnormal, node can be to server report and alarm.It will be understood by those skilled in the art that alarm is It is propagated along communication topology.For example, in the embodiment shown in fig. 1, when node B and node G are alerted, node B is root Because of alarm, i.e. the alarm of node B is the triggering alarm of node G.If a certain node only exists accessed situation, may be not present To the situation that other nodes access, then when generating alarm on the node, root is because of alarm " oneself caused by can only being Body ".Based on this, server can be according to the accessed node list pre-established and topological decomposition result, in the section of report and alarm In point, determine root because alerting corresponding node, to while promoting alarm root because of analysis efficiency, also reduce alarm root because The enforcement difficulty of analysis.With reference to Fig. 2 and Fig. 3, the embodiment of the present invention is described in detail.
Fig. 2 is the flow diagram one of alert analysis method provided in an embodiment of the present invention, and Fig. 3 carries for the embodiment of the present invention The alarm schematic diagram of confession.As shown in Fig. 2, this method includes:
S201, server obtain the alarm that at least one alarming node reports, and the alarming node is the multiple node The middle node for generating alarm;
In conjunction with shown in Fig. 1, when node B, node G, the node H in multiple nodes in Fig. 1 generate alarm, for the ease of Illustrate, the node for generating alarm is marked in Fig. 3, and the node for generating alarm is known as alarming node.Such as Fig. 3 institutes Show, node B generates alarm 1, node G generates alarm 2, node H generates alarm 3, node F generates alarm 4.Alarming node, that is, node B, respectively to server report and alarm, server obtains the alarm that alarming node reports by node G, node H, node F.
It will be understood by those skilled in the art that server can within a preset period of time obtain at least one alarming node The alarm of report.Specifically, which can be that server is pre-set.For example, the server pre-set time Section can with half an hour for a stage, i.e., every half an hour, what server statistics were once reported in the period alarming node Alarm.The signal of preset time period can be 8:31-8:32、8:32-8:33、8:33-8:34 etc..For example, reaching 8:32 it Afterwards, server statistics 8:31-8:32 alarms reported, i.e., 8:31 alarms reported in corresponding 60 seconds, to obtain at least one The alarm that a alarming node reports.
S202, the server are according to the access section of the topological decomposition result and each alarming node of the multiple node Point list determines root because alerting corresponding destination node at least one alarming node;
Wherein, the accessed node list includes the mark and the corresponding accessed node of each node of each node Mark, the topology decomposition result includes priority ranking of the alarm that generates of the multiple node as root because of alarm, institute Stating priority ranking is determined according to the out-degree of each node in the multiple node.
In the present embodiment, accessed node list includes the mark and the corresponding access section of each node of each node The mark of point.The mark of the accessed node includes the mark of the mark and dereference node of direct accessed node.For example, scheming In 3, the accessed node of node B includes not only node E, further includes node H, node G, node D, node C, node A.The access section Point list can be the list that server is pre-established according to communication topology.For network topology shown in FIG. 1, table one is shown A kind of possible sequence of accessed node list.
Table one
Node Accessed node list
Node A Node D, node C, node H
Node B Node E, node H, node G, node D, node C, node A
Node C
Node D Node C
Node E Node H, node G, node D, node C, node A
Node F
Node G Node H, node D
Node H
Node I Node H
It will be understood by those skilled in the art that table one gives a kind of possible realization method of accessed node list. During specific implementation, there can also be other realization methods.For example, it is also possible to which each node respectively corresponds to the access section of oneself Point list.Such as table two provides a possible way of realization by taking node A as an example.For the specific implementation of accessed node list Mode, the present embodiment are not particularly limited herein.
Table two
In the present embodiment, topological decomposition result includes the priority row alerted as root because of alarm that multiple nodes generate Sequence is that server is determined according to the out-degree of each node.Wherein, it is starting that out-degree, which refers to a certain node, is directed toward other sections The number on the side of point.Communication topology can regard a digraph as, and in communication topology, out-degree refers to being with a node Begin, the quantity for other nodes which directly accesses.Such as in figure 3, the out-degree of node D is 3.Server can be according to logical The out-degree of each node carries out topological decomposition in letter topology, pre-establishes topological decomposition result.In specific decomposable process, first will Out-degree be 0 node removed, wherein the highest priority for the node being moved out of, i.e., first by out-degree be 0 node B, node F, node I is removed, the node priority highest being moved out of, and then in remaining communication topology, continues to move out the section that out-degree is 0 The preferential level of point, the node being moved out of is high, repeats the above process, until the number of nodes in communication topology is 0.For Fig. 1 Shown in network topology, table three shows a kind of possible realization method of priority ranking.
Table three
Node Priority Node Priority
Node B 1 Node G 3
Node F 1 Node D 4
Node I 1 Node H 4
Node E 2 Node C 5
Node A 3
It is to embody priority in digital form in the priority ranking shown in table three, the smaller priority of number It is higher.During specific implementation, priority concrete implementation mode, the present embodiment is not particularly limited herein, as long as can Express the priority ranking of each node.
Server can be according to the accessed node of the topological decomposition result and each alarming node of the multiple nodes pre-established List determines root because alerting corresponding destination node at least one alarming node.Specifically, server is arranged according to priority The accessed node list of sequence and each alarming node, excluded successively in alarming node the high target alarms node of priority and Target access alarming node, the target alarms node are the highest alarm section of alert priority in the alarming node of current residual Point, target access alarming node is the accessed node of target alarms node, and the target access alarming node is to generate alarm Alarming node, server determines root because alerting corresponding destination node according to the target alarms node being excluded.
For example, node B generates alarm 1, node G generates alarm 2, node H generates alarm 3, node F generates alarm 4.By table Three it is found that node B as root because of the highest priority of alarm, then node B and node are excluded in alarming node according to table one The corresponding access alarming nodes of B exclude node B, node H and node G.At this point, remaining node F, then save in remaining alarm In point, the alarming node of highest priority is node F, and without other alarming nodes, then final root because alarm be node B and The alarm that node F is generated.If it will be understood by those skilled in the art that the alarming node of highest priority is node F at this time, and going back There are other alarming nodes, then the corresponding access alarming nodes of node F is excluded according to table one, and so on, until surplus without node It is remaining.
Alert analysis method provided in this embodiment, server is in the alarm for getting at least one alarming node and reporting Afterwards, server is according to the accessed node list of the topological decomposition result and each alarming node of the multiple nodes pre-established, extremely It determines that root because alerting corresponding destination node, need not monitor the state of whole system in a few alarming node, reduces and be The expense of system, and can quickly determine root because accusing according only to the topological decomposition result and accessed node list pre-established It is alert, system mode need not be compared, while promoting alarm root because of analysis efficiency, also reduce alarm root cause analysis Enforcement difficulty.
Below by taking Network Management System is specially telecommunication system as an example, in conjunction with network topology shown in Fig. 4, to of the invention real The alert analysis method for applying example offer is described in detail.Fig. 4 is the network topology of telecommunication system provided in an embodiment of the present invention Schematic diagram.As shown in figure 4, schematically illustrating the communication topology between several nodes, shown node includes in Fig. 4 Set-top box (Set Top Box, STB), media entertainment management middleware (Media Entertainment Middleware, MEM), system for unified management (Unified Management System, UMS), Integration Bus (Integration Bus, IB), Media Delivery Network (Media Delivery Network, MDN), quasi-video request program, carousel television server (Near Video on Demand, NVOD Server), condition access (Conditional Access, CA), File Transfer Protocol (File Transfer Protocol, FTP) server, fast channel switching (Fast Channel Change, FCC), number User line access multiplexing device (Digital Subscriber Line Access Multiplexer, DSLAM), network time association Discuss (Network Time Protocol, NTP) server.
The above-mentioned realization method for only schematically illustrating several nodes in telecommunication system, other realizations for node Mode, the present embodiment are not particularly limited herein.
Illustrate that topological decomposition result and the specific of accessed node list establish process first below.
Fig. 5 is the flow diagram two of alert analysis method provided in an embodiment of the present invention.As shown in figure 5, this method packet It includes:
S501, the server obtain the access relational data that each node reports, and are wrapped in the access relational data Include the mark of accessed node and the mark of access node.
Node is responsible for extraction and the relevant call relation data of the node, and each node can periodically report access relation number According to the access relational data includes the mark of accessed node and the mark of access node.
In one possible implementation, basic call relation data can be indicated with two tuples, i.e., (visit The side of asking is accessed side), reality can include other additional informations in the middle, and such as (access side, accessed square, additional information 1 is attached Add information 2 ..., additional information n).
Node is more diversified to the means for calling the extraction of relation data, is referred to existing method, can also tie It closes system features and designs more efficient way, the limitation of the use of specific method not as the embodiment of the present invention.
Below a simple example is provided to be based on network state information extraction access relational data:In consideration system Two node A, node B, it is assumed that node B accesses the service in node A, then believing from the network state of node A It can be found that there is connection between the service listening port of the IP and node A of node B in breath.In above-mentioned hypothesis scene, node A Two tuples of an expression access relation, wherein access side can be extracted from its network state information with the IP of node B Location indicates, is accessed the IP address that side is node A and indicates, i.e., (IP address of node B, the IP address of node A).Further basis IP can obtain two tuple of access relation between node with the correspondence between node, i.e. (node B, node A).IP is with section Correspondence between point is present in usually as the essential information of node in management system, or can be according in management system The essential information of node is established.
Optionally, server is after getting the access relational data that each node reports, and server is to access relational data Statistics is carried out to summarize, filter.Wherein statistics remittance general purpose is to carry out the data with identical access side and accessed side It integrates, removes duplicate keys;Filtering purpose be the call relation data unrelated with Operational Visit of the generations such as standby to heartbeat, calamity into Row is rejected.
For network topology shown in Fig. 4, after statistics summarizes and filters, remaining access relational data, which constitutes, is The Operational Visit relationship of system.It is assumed that the Operational Visit relationship of system is as shown in Table 4.
Table four
Access side Accessed side Access side Accessed side
STB CA IB UMS
STB MDN IB MDN
STB MEM UMS IB
STB NTP UMS MEM
STB DSLAM MDN CA
MEM CA MDN FCC
MEM IB MDN NVODServer
IB CA NVOD Server MDN
IB MEM CA FTP
S502, the server obtain the first communication topology according to the access relational data.
Server can obtain initial communication topology as shown in Figure 4 according to access relational data shown in table four.Scheming In 4, in initial communication topology, there are loop, therefore need will be more on the same loop in initial communication topology for server A Node compression is a dummy node, establishes the first communication topology.
It will be understood by those skilled in the art that if obtain initial communication topology as shown in Figure 1, be not present loop, The initial communication topology is the first communication topology, need not carry out compression processing again.
Please continue to refer to Fig. 4, in communication topology shown in Fig. 4, compression processing, MDN → NVOD are needed there are two loop Server → MDN and UMS → MEM → IB → UMS.Specifically, MDN and NVOD Server are interconnected to form loop, by two Node compression is a dummy node MDN_NVOD Server.Since NVOD Server only exist the connection of MDN, so only It needs the connection for being connected to MDN_NVOD Server and other nodes of MDN and other nodes.
Although UMS and IB, MEM and IB form respectively loop in Fig. 4, they are generally a big ring Road, so being a dummy node MEM_UMS_IB by three Node compressions.There is the connection to CA in MEM and IB, for void For quasi- node M EM_UMS_IB, retain one.Meanwhile converting the connection of STB to MEN to STB to MEM_UMS_IB Connection, convert the connection of IB to MDN to the connection of MEM_UMS_IB to MDN, obtained compressed communication topology, i.e., One communication topology.Fig. 6 is the structural schematic diagram of the first communication topology provided in an embodiment of the present invention.
S503, the server obtain the topology point according to the out-degree of each node in first communication topology Solve result and the accessed node list.
Specifically, the node that the out-degree in the first communication topology is 0 is carried out removal processing by server, obtains the second communication Topology and first removes node;The node that out-degree in second communication topology is 0 is carried out removal processing by server, obtains third Communication topology and second removes node;The node that out-degree is 0 remove the process of processing by repetition, until by all nodes It removes;Server obtains topological decomposition result and accessed node list according to the node removed every time.Detailed reality is used below Example is applied, the realization process for obtaining topological decomposition result and accessed node list is described in detail respectively.
Shown in Fig. 6, the out-degree of each node is as shown in Table 5.
Table five
Node Out-degree
STB 5
MEM_UMS_IB 2
MDN_NVODServer 2
CA 1
FTP 0
FCC 0
DSLAM 0
NTP 0
The node that out-degree is 0 is removed from first communication topology, the second communication topology and first is obtained and removes node. In the process, it after a certain node is removed, can be also removed with the relevant connection of the node.The out-degree of remaining node also can It changes, needs the out-degree for recalculating remaining node.According to table five, tetra- nodes of FTP, FCC, DSLAM, NTP Out-degree is 0, and four nodes are removed from the first communication topology shown in fig. 6, obtains the second communication topology and first and removes Node FTP, FCC, DSLAM, NTP.Fig. 7 is the structural schematic diagram of the second communication topology provided in an embodiment of the present invention.
It will be understood by those skilled in the art that as shown in fig. 7, after NTP is removed, the connection of STB to NTP can also be moved It removes, according to the computational methods of out-degree, the out-degree of STB should subtract one.The out-degree of each node is such as in second communication topology shown in Fig. 7 Shown in table six.
Table six
Node Out-degree
STB 3
MEM_UMS_IB 2
MDN_NVODServer 1
CA 0
According to table six, the out-degree of CA is 0, therefore CA nodes are removed in the second communication topology, obtains the third communication Topology and second removes node CA.Fig. 8 is the structural schematic diagram of the third communication provided in an embodiment of the present invention topology.Shown in Fig. 8 Third communication topology in each node out-degree it is as shown in Table 7.
Table seven
Node Out-degree
STB 2
MEM_UMS_IB 1
MDN_NVOD Server 0
According to table seven, the out-degree of MDN_NVOD Server is 0, therefore removes MDN_ in third communication topology NVOD Server nodes, obtain fourth communication topology and third removes node M DN_NVOD Server.Fig. 9 is that the present invention is implemented The structural schematic diagram for the fourth communication topology that example provides.The out-degree of each node in fourth communication topology shown in Fig. 9 such as table eight It is shown.
Table eight
Node Out-degree
STB 1
MEM_UMS_IB 0
According to table eight, the out-degree of MEM_UMS_IB is 0, therefore removes MEM_UMS_IB in fourth communication topology, It obtains fifth communication topology and the 4th and removes node M EM_UMS_IB.Finally the STB nodes in fifth communication topology are removed, are obtained Node STB is removed to the 5th, that is, completes the process for removing all nodes.
It can be obtained removing the node removed in processing procedure every time from above, specifically may refer to shown in table nine.
Table nine
First removes node FTP、FCC、DSLAM、NTP
Second removes node CA
Third removes node MDN_NVOD Server
4th removes node MEM_UMS_IB
5th removes node STB
Server is ranked up topological node according to the sequence that topology is decomposed.Specifically, according to each removal node pair The sequencing for the removal processing answered, obtains topological decomposition result.Wherein, the node being moved out of in same removal processing procedure Priority is identical.Specifically, the highest priority of node is removed for the first time, second of node priority for removing processing time is high, And so on.For the node on loop, the priority of all nodes on loop is equal to respective virtual node Priority.Finally obtained priority ranking is as shown in Table 10.
Table ten
Node Serial number Node Serial number
FCC 1 MDN 3
DSLAM 1 NVOD_Server 3
NTP 1 MEM 4
FTP 1 UMS 4
CA 2 IB 4
STB 5
Wherein, serial number is smaller, and corresponding priority is higher, results in topological decomposition result.
Optionally, during above-mentioned removal node, while accessed node list is generated.Figure 10 is that the present invention is implemented The flow diagram three for the alert analysis method that example provides.As shown in Figure 10, this method includes:
S1001, the first node that an out-degree is zero often being removed, server determines the corresponding second node of first node, Second node is the direct accessed node of first node;
S1002, server store second node into the corresponding accessed node list of first node;
S1003, server judge that first node whether there is in the accessed node list of third node, if so, executing S1004, if it is not, executing S1005;
S1004, server store second node into the accessed node list of third node;
S1005, server traverse all removed nodes, obtain successively in order according to the removal sequence of each node Accessed node list.
Wherein, corresponding comprising dummy node in accessed node list if including dummy node in accessed node list All ancestor nodes.
By taking a specific example as an example, when removing the first removal node FTP, server is true according to present communications topology It is CA to determine the corresponding direct accessed nodes of FTP, and CA is stored into the corresponding accessed node lists of FTP, then serviced by server Device judges that FTP whether there is in the accessed node list of other nodes, if not existing, server continues to determine the access of FCC Node, server determine that the corresponding direct accessed nodes of FCC are MDN_NVOD Server, by MDN_ according to present communications topology NVOD Server are stored into the corresponding accessed node lists of FCC, and then server judges that FCC whether there is in other nodes Accessed node list in, and so on;In the process, for example, when MDN-NVOD Server are moved out of, server root Determine that the corresponding direct accessed nodes of MDN_NVOD Server are STB, MEM_UMS_IB according to present communications topology, server will STB, MEM_UMS_IB are stored into the accessed node list of MDN_NVOD Server, judge MDN_NVOD Server in FCC Accessed node list in, then STB, MEM_UMS_IB are also stored into the accessed node list of FCC, and so on.By The above process, finally obtained accessed node list is as shown in table 11.
Table 11
Node Accessed node list
STB
MEM_UMS_IB STB
MDN_NVOD Server MEM_UMS_IB, STB
CA MDN_NVODServer, MEM_UMS_IB, STB
FTP CA, MDN_NVOD Server, MEM_UMS_IB, STB
FCC MDN_NVODServer, MEM_UMS_IB, STB
DSLAM STB
NTP STB
For the node on loop, the visit of the accessed node list and corresponding dummy node of the node on loop Ask that node listing is identical.If the accessed node list of MEM_UMS_IB is STB, then the accessed node list of MEM, UMS, IB is STB。
If including dummy node in the accessed node list of some node, then it is equivalent in the access list of the node Including the corresponding all ancestor nodes of dummy node.As CA accessed node list in comprising MDN_NVOD Server, then it is equivalent Include MDN, NVOD Server in the accessed node list of CA.
It will be understood by those skilled in the art that due to being compressed to the node in loop, in the present embodiment Access relation in accessed node list is unidirectional access relation, that is, only exists the way of realization of node A accessed nodes B, do not deposit In the way of realization of node B accessed nodes A.
After obtaining topological decomposition result and accessed node list, so that it may to determine root because of alarm.Herein with above-mentioned Telecommunication system for, to determining that root is illustrated again because of the specific implementation of alarm.The present embodiment provides following possibility Embodiment, for other similar modes, all in the protection domain of the embodiment of the present invention.
In one possible implementation, server determines alert priority highest first in alarming node set Processing is marked to the first alarming node in alarming node;According to the accessed node list of the first alarming node, to alarming node Set execute delete operation, wherein the first alarming node and first access alarming node be deleted node.First accesses Alarming node is the node in alarming node set, and first accesses the accessed node that alarming node is the first alarming node, alarm Node set includes at least two alarming nodes, determines that alarm is preferential in remaining node of the server in alarming node set Highest second alarming node of grade, processing is marked to the second alarming node;It is arranged according to the accessed node of the second alarming node Table executes delete operation to alarming node set, wherein the second alarming node and the second access alarming node be deleted Node, second accesses alarming node as the node in alarming node set, and second accesses alarming node as the second alarming node Accessed node;The remaining node in alarming node set is marked the process of processing and delete operation in repetition, until alarm Node set is sky;Server obtains root because alerting corresponding destination node according to the alarming node of labeled processing.This implementation The mark mode of example can be to store the alarming node to root because in alarm list, or to this in initial communication topology Alarming node is marked, and for the specific implementation of label, the present embodiment is not particularly limited herein.
In alternatively possible realization method, server determines alert priority highest the in alarming node set Processing is marked to the first alarming node in alarming node set in one alarming node;According to the access of the first alarming node Node listing executes delete operation to alarming node set, wherein the first access alarming node is the node being deleted, alarm Node set includes multiple alarming nodes, and first accesses alarming node as the node in alarming node set, and first accesses announcement Alert node is the accessed node of the first alarming node;Server is in alarming node set in addition to first alarming node Highest second alarming node of alert priority is determined in remaining node, and the second alarming node in alarming node set is carried out Label processing;According to the accessed node list of the second alarming node, delete operation is executed to alarming node set, wherein second The node that alarming node is deleted is accessed, second accesses alarming node as the node in alarming node set, and the second access is accused Alert node is the accessed node of the second alarming node;It repeats to the remaining section in addition to labeled node in alarming node set The process of processing and delete operation is marked in point, until only existing labeled alarming node in alarming node set;Service Device obtains root because alerting corresponding destination node according to labeled alarming node.The present embodiment label processing can be Alarming node is hidden and/or is locked in alarming node set, it is excellent to prevent labeled alarming node to be identified again First grade, and/or, prevent labeled alarming node from accidentally being deleted.
Below for above-mentioned telecommunication system, two specific embodiments are provided to be described in detail.
Figure 11 is the alarm schematic diagram one of telecommunication system provided in an embodiment of the present invention.As shown in chart 11, share at three Alarm, alarm collection are combined into { alarm 1, alarm 2, alarm 3 }, and the alarming node collection for generating alarm is combined into { FTP, MDN, STB }.According to Shown in table nine, the serial number of FTP is minimum, so will 1 label of alarm.According to table 11, the accessed node list of FTP be CA, MDN_NVODServer, MEM_UMS_IB, STB } namely { CA, MDN, NVOD Server, MEM, UMS, IB, STB }, so needing FTP, MDN, STB are deleted from alarming node set, while 1 (label alarm) will be alerted, 2 (being generated by MDN) of alarm, accused Alert 3 (being generated by STB) are deleted in gathering from alarm.At this point, remaining alarming node set and remaining alarm set are sky, alarm Root cause analysis terminates, the final alarm for determining root and being generated for alarm 1, i.e. FTP by alarm.
Figure 12 is the alarm schematic diagram two of telecommunication system provided in an embodiment of the present invention.As shown in chart 12, share everywhere Alarm, alarm collection are combined into { alarm 1, alarm 2, alarm 3, alarm 4 }, the alarming node collection for generating alarm be combined into FCC, MDN, STB、CA}.According to table nine, the serial number of FCC is minimum, so will 1 label of alarm.According to table 11, the access section of FCC Point list be { MDN_NVOD Server, MEM_UMS_IB, STB }, namely MDN, NVOD Server, MEM, UMS, IB, STB }, so need to delete FCC, MDN, STB from alarming node set, while will alarm 1 (label alarm), alarm 2 (by MDN generate), alarm 3 (being generated by STB) from alarm gather in delete.At this point, remaining alarming node collection is combined into { CA }, residue is accused Alert collection is combined into { alarm 4 }.It will be apparent that needing to remove in by 4 label of alarm and by it gathering from alarm, while CA being saved from alarm It is removed in point set.So far, alarm root cause analysis terminates.Because alarm is alerts 1, alarm 4, i.e. FCC and CA are produced final determining root Raw alarm.
It will be understood by those skilled in the art that be directed to dummy node, if the dummy node is root because alerting corresponding target Node, then all nodes in dummy node are all root because of alarm.Alarm is generated accordingly, at least two nodes in loop When or at least two node be all root because alerting corresponding node or alarm all non-root that the two generates are because of alarm.Example Such as, MDN shown in Fig. 4 generates alarm 1, NVOD Server generate alarm 2, otherwise the alarm that then the two generates all is confirmed as It is non-because the node of alarm is that the alarm that MDN and NVOD Server or the two generate all is confirmed as to generate root because of alarm for root Root is because of alarm.Other loops are similar, and details are not described herein again for the present embodiment.
To sum up, the embodiment of the present invention is directly based upon topological decomposition result and carries out judgement of the root because of alarm, independent of artificial Intervention analysis directly uses, institute wherein topological decomposition result can be obtained ahead of time according to communication topology when alerting root cause analysis It is very high with the efficiency of analysis;And the embodiment of the present invention can complete system communication in time according to the variation of the call relation reported The update of topology, so having the ability of reply system dynamic change.Meanwhile the acquisition accessed node list of the embodiment of the present invention All fairly simple with the realization process of the process of topological decomposition result, and alarm root cause analysis etc., only call relation extracts There are certain complexities, so whole technology enforcement difficulty is relatively low.Further, the resource overhead of the embodiment of the present invention Relatively small, only call relation reports the resource consumption of link more apparent.
The above-mentioned function of being realized for server, is described scheme provided in an embodiment of the present invention.It can manage Solution, for server in order to realize above-mentioned function, it comprises execute the corresponding hardware configuration of each function and/or software mould Block.In conjunction with each exemplary unit and algorithm steps that the disclosed embodiments of the embodiment of the present invention describe, energy of the embodiment of the present invention The combining form with hardware or hardware and computer software is reached to realize.Some function is driven with hardware or computer software actually The mode of hardware is moved to execute, depends on the specific application and design constraint of technical solution.Those skilled in the art can be with Described function is realized using different methods to each specific application, but this realization is it is not considered that beyond this The range of the technical solution of inventive embodiments.
The embodiment of the present invention can carry out server according to the above method example division of function module, for example, can be with Corresponding each function divides each function module, and two or more functions can also be integrated in a processing unit In.The form that hardware had both may be used in above-mentioned integrated unit is realized, can also be realized in the form of software function module.It needs It is noted that be schematical, only a kind of division of logic function to the division of module in the embodiment of the present invention, it is practical real It is current that there may be another division manner.
Figure 13 is the structural schematic diagram of server provided in an embodiment of the present invention.As shown in figure 13, which wraps It includes:Alert acquisition module 1301 and alarm determining module 1302.Optionally, further include Relation acquisition module 1303, Automated generalization Module 1304 and generation module 1305.
Acquisition module 1301 is alerted, the alarm reported for obtaining at least one alarming node, the alarming node is institute State the node that alarm is generated in multiple nodes;
Determining module 1302 is alerted, for according to the topological decomposition result of the multiple node and each alarming node Accessed node list determines root because alerting corresponding destination node at least one alarming node;
Wherein, the topological decomposition result includes the priority row alerted as root because of alarm that the multiple node generates Sequence, the priority ranking are determined according to the out-degree of each node in the multiple node.
Optionally, the alarm determining module 1302 is specifically used for:
According to the accessed node list of the priority ranking and each alarming node, mesh is excluded successively in alarming node Alarming node and target access alarming node are marked, the target alarms node is preferential to be alerted in the alarming node of current residual The highest alarming node of grade, the target access alarming node are the accessed node of the target alarms node, and the target It is to generate the alarming node of alarm to access alarming node;
According to the target alarms node being excluded, determine root because alerting corresponding destination node.
Optionally, the alarm determining module 1302, is specifically used for:
Alarming node set is established, the alarming node set includes at least one alarming node, the target Alarming node and the alarming node that the target access alarming node is in the alarming node set;
Highest first alarming node of alert priority is determined in the alarming node set, and first alarm is saved Processing is marked in point;According to the accessed node list of first alarming node, deletion is executed to the alarming node set Operation, wherein first alarming node and first access alarming node be deleted node, first alarming node Alarming node is accessed as in the alarming node set for the target alarms node in the alarming node set, described first Target access alarming node;
Highest second alarming node of alert priority is determined in remaining node in the alarming node set, to institute It states the second alarming node and processing is marked;According to the accessed node list of second alarming node, to the alarming node Set executes delete operation;Wherein, second alarming node and the second access alarming node are deleted node, described Second alarming node is the target alarms node in the alarming node set, and described second accesses alarming node as the alarm Target access alarming node in node set;
The remaining node in the alarming node set is marked the process of processing and delete operation in repetition, until institute It states alarming node collection and is combined into sky;
According to the alarming node of labeled processing, root is obtained because alerting corresponding destination node.
Optionally, the alarm acquisition module 1301, is specifically used for:
The alarm that at least one alarming node reports is obtained in preset time range.
Optionally, the Relation acquisition module 1303, the access relational data reported for obtaining each node are described Access relational data includes the mark of accessed node and the mark of access node;
The relationship processing module 1304, for according to the access relational data, obtaining the first communication topology;
The generation module 1305 obtains described for the out-degree according to each node in first communication topology Topological decomposition result and the accessed node list.
Optionally, the relationship processing module 1304, is specifically used for:
According to the access relational data, initial communication topology is established;
It is a dummy node by multiple Node compressions on the same loop in the initial communication topology, described in foundation First communication topology.
Optionally, the generation module 1305, is specifically used for:
The node that out-degree in first communication topology is 0 is subjected to removal processing, obtains the second communication topology and the One removes node;
The node that out-degree in second communication topology is 0 is subjected to removal processing, obtains third communication topology and the Two remove node;
It repeats remove the process of processing by out-degree for 0 node, until all nodes are removed;
According to the node removed every time, the topological decomposition result and the accessed node list are obtained.
Optionally, the generation module 1305, is specifically used for
According to the corresponding sequencing for removing processing of each removal node, the topological decomposition result is obtained;
Wherein, the same priority for removing the node being moved out of in processing procedure is identical, and the priority that N removes node is big The priority of node is removed in N+1, the N is the integer more than 0.
Optionally, the generation module 1305, is specifically used for:
The first node that an out-degree is zero is often removed, determines the corresponding second node of the first node, described second Node is the direct accessed node of the first node;
The second node is stored into the corresponding accessed node list of the first node;
Judge that the first node whether there is in the accessed node list of third node, if so, by described second Node is stored into the accessed node list of the third node;
According to the removal of each node sequence, traverses all removed nodes successively in order, obtain the accessed node List;
Wherein, include the void in the accessed node list if including dummy node in the accessed node list The corresponding all ancestor nodes of quasi- node.
Server provided in this embodiment can execute above method embodiment, and implementing principle and technical effect are similar, Details are not described herein again for the present embodiment.
Server above-mentioned in the specific implementation, alarm acquisition module and Relation acquisition module may be implemented as communication connect Mouthful, alarm determining module, relationship processing module and generation module may be implemented as processor.Data and program code can be deposited Storage in memory, is controlled according to corresponding program instruction by processor and is executed.
Figure 14 is the hardware architecture diagram of server provided in an embodiment of the present invention.As shown in figure 14, the present embodiment carries The server 1400 of confession includes:At least one processor 1401, memory 1402 and bus 1403.Optionally, further include communication Interface 1404.Memory 1402 stores computer executed instructions;At least one processor 1401 executes what memory 1402 stored Computer executed instructions so that server executes the alert analysis method as described in figure 1 above to Figure 12.
In addition, a kind of computer readable storage medium is also provided in the embodiment of the present invention, in computer readable storage medium Computer executed instructions are stored with, when at least one processor of server executes the computer executed instructions, server is held The above-mentioned various alert analysis methods that offer may be provided of row.
A kind of computer program product is also provided in the embodiment of the present invention, which includes that computer executes Instruction, the computer executed instructions store in a computer-readable storage medium.At least one processor of server can be from Computer readable storage medium reads the computer executed instructions, and at least one processor executes the computer executed instructions and makes The various alert analysis methods that offer may be provided in server implementation preceding method embodiment.
One of ordinary skill in the art will appreciate that:Realize that all or part of step of above-mentioned each method embodiment can lead to The relevant hardware of program instruction is crossed to complete.Program above-mentioned can be stored in a computer read/write memory medium.The journey When being executed, execution includes the steps that above-mentioned each method embodiment to sequence;And storage medium above-mentioned includes:ROM, RAM, magnetic disc or The various media that can store program code such as person's CD.
Finally it should be noted that:The above various embodiments is only to illustrate the technical solution of the embodiment of the present invention, rather than to it Limitation;Although the embodiment of the present invention is described in detail with reference to foregoing embodiments, those skilled in the art It should be understood that:Its still can with technical scheme described in the above embodiments is modified, either to which part or All technical features carries out equivalent replacement;And these modifications or replacements, it does not separate the essence of the corresponding technical solution this hair The range of bright embodiment technical solution.

Claims (19)

1. a kind of alert analysis method, which is characterized in that be applied to Network Management System, the Network Management System includes service Device and multiple nodes, the method includes:
Server obtains the alarm that at least one alarming node reports, and the alarming node is that alarm is generated in the multiple node Node;
The server according to the accessed node list of the topological decomposition result and each alarming node of the multiple node, Determine root because alerting corresponding destination node at least one alarming node;
Wherein, the topological decomposition result includes the priority ranking alerted as root because of alarm that the multiple node generates, The priority ranking is determined according to the out-degree of each node in the multiple node.
2. according to the method described in claim 1, it is characterized in that, the server is decomposed according to the topology of the multiple node As a result with the accessed node list of each alarming node, determine that root is corresponding because alerting at least one alarming node Destination node, including:
The server is according to the accessed node list of the priority ranking and each alarming node, in alarming node successively Exclude target alarms node and target access alarming node, the target alarms node be current residual alarming node in accuse The alarming node of alert highest priority, the target access alarming node are the accessed node of the target alarms node, and institute It is to generate the alarming node of alarm to state target access alarming node;
The server determines root because alerting corresponding destination node according to the target alarms node being excluded.
3. according to the method described in claim 2, it is characterized in that, the server is according to the priority ranking and each announcement The accessed node list of alert node, excludes target alarms node and target access alarming node successively in alarming node, wraps It includes:
The server establishes alarming node set, and the alarming node set includes at least one alarming node, institute It is the alarming node in the alarming node set that target alarms node, which is stated, with the target access alarming node;
The server determines highest first alarming node of alert priority in the alarming node set, to described first Processing is marked in alarming node;According to the accessed node list of first alarming node, the alarming node set is held Row delete operation, wherein first alarming node and the first access alarming node be deleted node, first announcement Alert node is the target alarms node in the alarming node set, and described first accesses alarming node as the alarming node collection Target access alarming node in conjunction;
The highest second alarm section of alert priority is determined in remaining node of the server in the alarming node set Processing is marked to second alarming node in point;According to the accessed node list of second alarming node, to the announcement Alert node set executes delete operation;Wherein, second alarming node and the second access alarming node are deleted section Point, second alarming node are the target alarms node in the alarming node set, and the second access alarming node is Target access alarming node in the alarming node set;
The remaining node in the alarming node set is marked the process of processing and delete operation in repetition, until the announcement Alert node set is sky;
The server determines root because of the corresponding destination node of alarm according to the target alarms node being excluded, including:
The server obtains root because alerting corresponding destination node according to the alarming node of labeled processing.
4. according to the method described in claim 1, it is characterized in that, the server obtains what at least one alarming node reported Alarm, including:
The server obtains the alarm that at least one alarming node reports in preset time range.
5. method according to any one of claims 1 to 4, which is characterized in that the server is according to the multiple node Topological decomposition result and each alarming node accessed node list, at least one alarming node determine root because Before alerting corresponding destination node, further include:
The server obtains the access relational data that each node reports, and the access relational data includes accessed node Mark and access node mark, the accessed node is the direct accessed node of the access node;
The server obtains the first communication topology according to the access relational data;
The server obtains the topological decomposition result and institute according to the out-degree of each node in first communication topology State accessed node list.
6. according to the method described in claim 5, it is characterized in that, the server is obtained according to the access relational data First communication topology, including:
The server establishes initial communication topology according to the access relational data;
Multiple Node compressions on same loop in the initial communication topology are a dummy node by the server, are obtained To first communication topology.
7. according to the method described in claim 6, it is characterized in that, the server is according to every in first communication topology The out-degree of a node obtains the topological decomposition result and the accessed node list, including:
The node that out-degree in first communication topology is 0 is carried out removal processing by the server, is obtained the second communication and is opened up It flutters and removes node with first;
The node that out-degree in second communication topology is 0 is carried out removal processing by the server, is obtained the third communication and is opened up It flutters and removes node with second;
It repeats remove the process of processing by out-degree for 0 node, until all nodes are removed;
The server obtains the topological decomposition result and the accessed node list according to the node removed every time.
8. the method according to the description of claim 7 is characterized in that the server obtains institute according to the node removed every time Topological decomposition result is stated, including:
The server obtains the topological decomposition result according to the corresponding sequencing for removing processing of each removal node;
Wherein, same to remove that the priority of node being moved out of in processing procedure is identical, the priority that N removes node is more than the N+1 removes the priority of node, and the N is the integer more than 0.
9. the method according to the description of claim 7 is characterized in that the server obtains institute according to the node removed every time Accessed node list is stated, including:
The first node that an out-degree is zero is often removed, the server determines the corresponding second node of the first node, institute State the direct accessed node that second node is the first node;
The server stores the second node into the corresponding accessed node list of the first node;
The server judges that the first node whether there is in the accessed node list of third node, if so, by institute Second node is stated to store into the accessed node list of the third node;
The server traverses all removed nodes, obtains the visit successively in order according to the removal sequence of each node Ask node listing;
Wherein, include the virtual section in the accessed node list if including dummy node in the accessed node list The corresponding all ancestor nodes of point.
10. a kind of server, which is characterized in that be applied to Network Management System, the Network Management System includes the service Device and multiple nodes, the method includes:
Acquisition module, the alarm reported for obtaining at least one alarming node are alerted, the alarming node is the multiple section The node of alarm is generated in point;
Determining module is alerted, the accessed node of the topological decomposition result and each alarming node according to the multiple node is used for List determines root because alerting corresponding destination node at least one alarming node;
Wherein, the topological decomposition result includes the priority ranking alerted as root because of alarm that the multiple node generates, The priority ranking is determined according to the out-degree of each node in the multiple node.
11. server according to claim 10, which is characterized in that the alarm determining module is specifically used for:
According to the accessed node list of the priority ranking and each alarming node, target announcement is excluded successively in alarming node Alert node and target access alarming node, the target alarms node be current residual alarming node in alert priority most High alarming node, the target access alarming node are the accessed node of the target alarms node, and the target access Alarming node is to generate the alarming node of alarm;
According to the target alarms node being excluded, determine root because alerting corresponding destination node.
12. server according to claim 11, which is characterized in that the alarm determining module is specifically used for:
Alarming node set is established, the alarming node set includes at least one alarming node, the target alarms Node and the alarming node that the target access alarming node is in the alarming node set;
Alert priority highest first alarming node is determined in the alarming node set, to first alarming node into Line flag processing;According to the accessed node list of first alarming node, delete operation is executed to the alarming node set, Wherein, first alarming node and the first access alarming node are deleted node, and first alarming node is institute The target alarms node in alarming node set is stated, described first accesses alarming node as the target in the alarming node set Access alarming node;
Alert priority highest second alarming node is determined in remaining node in the alarming node set, to described the Processing is marked in two alarming nodes;According to the accessed node list of second alarming node, to the alarming node set Execute delete operation;Wherein, second alarming node and second access alarming node be deleted node, described second Alarming node is the target alarms node in the alarming node set, and described second accesses alarming node as the alarming node Target access alarming node in set;
The remaining node in the alarming node set is marked the process of processing and delete operation in repetition, until the announcement Alert node set is sky;
According to the alarming node of labeled processing, root is obtained because alerting corresponding destination node.
13. server according to claim 10, which is characterized in that the alarm acquisition module is specifically used for:
The alarm that at least one alarming node reports is obtained in preset time range.
14. according to claim 10 to 13 any one of them server, which is characterized in that further include:Relation acquisition module is closed It is processing module and generation module;Wherein
The Relation acquisition module, the access relational data reported for obtaining each node, in the access relational data The mark of mark and access node including accessed node;
The relationship processing module, for according to the access relational data, obtaining the first communication topology;
The generation module obtains the topology and decomposes for the out-degree according to each node in first communication topology As a result with the accessed node list.
15. server according to claim 14, which is characterized in that the relationship processing module is specifically used for:
According to the access relational data, initial communication topology is established;
It is a dummy node by multiple Node compressions on the same loop in the initial communication topology, establishes described first Communication topology.
16. server according to claim 15, which is characterized in that the generation module is specifically used for:
The node that out-degree in first communication topology is 0 is subjected to removal processing, the second communication topology and first is obtained and moves Egress;
The node that out-degree in second communication topology is 0 is subjected to removal processing, third communication topology and second is obtained and moves Egress;
It repeats remove the process of processing by out-degree for 0 node, until all nodes are removed;
According to the node removed every time, the topological decomposition result and the accessed node list are obtained.
17. server according to claim 16, which is characterized in that the generation module is specifically used for
According to the corresponding sequencing for removing processing of each removal node, the topological decomposition result is obtained;
Wherein, same to remove that the priority of node being moved out of in processing procedure is identical, the priority that N removes node is more than the N+1 removes the priority of node, and the N is the integer more than 0.
18. server according to claim 16, which is characterized in that the generation module is specifically used for:
The first node that an out-degree is zero is often removed, determines the corresponding second node of the first node, the second node For the direct accessed node of the first node;
The second node is stored into the corresponding accessed node list of the first node;
Judge that the first node whether there is in the accessed node list of third node, if so, by the second node It stores into the accessed node list of the third node;
According to the removal of each node sequence, traverses all removed nodes successively in order, obtain the accessed node list;
Wherein, include the virtual section in the accessed node list if including dummy node in the accessed node list The corresponding all ancestor nodes of point.
19. a kind of server, which is characterized in that including:At least one processor and memory;
The memory stores computer executed instructions;
At least one processor executes the computer executed instructions of the memory storage so that the server executes such as Claim 1 to 9 any one of them alert analysis method.
CN201710033521.0A 2017-01-16 2017-01-16 Alarm analysis method and equipment Active CN108322318B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710033521.0A CN108322318B (en) 2017-01-16 2017-01-16 Alarm analysis method and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710033521.0A CN108322318B (en) 2017-01-16 2017-01-16 Alarm analysis method and equipment

Publications (2)

Publication Number Publication Date
CN108322318A true CN108322318A (en) 2018-07-24
CN108322318B CN108322318B (en) 2021-04-09

Family

ID=62892023

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710033521.0A Active CN108322318B (en) 2017-01-16 2017-01-16 Alarm analysis method and equipment

Country Status (1)

Country Link
CN (1) CN108322318B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109634819A (en) * 2018-10-26 2019-04-16 阿里巴巴集团控股有限公司 Alarm root is because of localization method and device, electronic equipment
CN110351118A (en) * 2019-05-28 2019-10-18 华为技术有限公司 Root is because of alarm decision networks construction method, device and storage medium
CN110535686A (en) * 2019-07-25 2019-12-03 深圳壹师城科技有限公司 Anomalous event treating method and apparatus
CN110995482A (en) * 2019-11-27 2020-04-10 深圳市商汤科技有限公司 Alarm analysis method and device, computer equipment and computer readable storage medium
CN111669282A (en) * 2019-03-08 2020-09-15 华为技术有限公司 Method, device and computer storage medium for identifying suspected root cause alarm

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120066376A1 (en) * 2010-09-09 2012-03-15 Hitachi, Ltd. Management method of computer system and management system
US20150008938A1 (en) * 2008-10-31 2015-01-08 Howard University System And Method Of Detecting And Locating Intermittent And Other Faults
CN104796273A (en) * 2014-01-20 2015-07-22 中国移动通信集团山西有限公司 Method and device for diagnosing root of network faults
CN105471659A (en) * 2015-12-25 2016-04-06 华为技术有限公司 Root fault cause analysis method and analysis device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150008938A1 (en) * 2008-10-31 2015-01-08 Howard University System And Method Of Detecting And Locating Intermittent And Other Faults
US20120066376A1 (en) * 2010-09-09 2012-03-15 Hitachi, Ltd. Management method of computer system and management system
CN104796273A (en) * 2014-01-20 2015-07-22 中国移动通信集团山西有限公司 Method and device for diagnosing root of network faults
CN105471659A (en) * 2015-12-25 2016-04-06 华为技术有限公司 Root fault cause analysis method and analysis device

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109634819A (en) * 2018-10-26 2019-04-16 阿里巴巴集团控股有限公司 Alarm root is because of localization method and device, electronic equipment
CN109634819B (en) * 2018-10-26 2022-02-01 创新先进技术有限公司 Alarm root cause positioning method and device and electronic equipment
CN111669282A (en) * 2019-03-08 2020-09-15 华为技术有限公司 Method, device and computer storage medium for identifying suspected root cause alarm
CN111669282B (en) * 2019-03-08 2023-10-24 华为技术有限公司 Method, device and computer storage medium for identifying suspected root cause alarm
CN110351118A (en) * 2019-05-28 2019-10-18 华为技术有限公司 Root is because of alarm decision networks construction method, device and storage medium
CN110351118B (en) * 2019-05-28 2020-12-01 华为技术有限公司 Root cause alarm decision network construction method, device and storage medium
CN110535686A (en) * 2019-07-25 2019-12-03 深圳壹师城科技有限公司 Anomalous event treating method and apparatus
CN110535686B (en) * 2019-07-25 2021-12-31 深圳壹师城科技有限公司 Abnormal event processing method and device
CN110995482A (en) * 2019-11-27 2020-04-10 深圳市商汤科技有限公司 Alarm analysis method and device, computer equipment and computer readable storage medium

Also Published As

Publication number Publication date
CN108322318B (en) 2021-04-09

Similar Documents

Publication Publication Date Title
CN108322318A (en) Alert analysis method and apparatus
US6061735A (en) Network restoration plan regeneration responsive to network topology changes
CN100556038C (en) A kind of content distribution method based on outer condition trigger node action
CN108712491A (en) Block chain node, exchange information processing method, terminal device and medium
CN106844220A (en) A kind of method of testing and system of simulation computer web application real running environment
CN107104824A (en) A kind of network topology determines method and apparatus
CN110417870A (en) configuration file management method, device, equipment and storage medium
CN108965918A (en) streaming media processing method, device, system and computer readable storage medium
CN108696392A (en) A kind of communications status monitoring method, network node and computer readable storage medium
CN104079430A (en) Safety management platform, system and method based on information
CN108023759A (en) Adaptive resource regulating method and device
CN110413498A (en) A kind of method and system of server O&M large-size screen monitors monitoring
CN114189423A (en) Intelligent inquiry alarm system, method and medium with comprehensive compatibility and expansion
CN106878038A (en) Fault Locating Method and device in a kind of communication network
CN110196780A (en) Determine method, apparatus, storage medium and the electronic device of server state
CN104639450B (en) The architecture system of packet transmission control method, device and software defined network
WO2012083740A1 (en) Method and device for detecting warnings
CN105207793B (en) A kind of acquisition methods and system of tree topology interior joint information
WO2012009911A1 (en) Method, apparatus and system for processing alarm screening rule
CN106131134A (en) A kind of message content merges De-weight method and system
CN109120434A (en) A kind of storage cluster alarm method, device and computer readable storage medium
CN104852849B (en) A kind of OSPF configuration methods and relevant apparatus
CN101192962B (en) Generation and recovery method for adhesion value alarm in telecom network management system
CN109446291A (en) Road network state statistical method and device and computer readable storage medium
CN112714008B (en) Network topology analysis method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant