CN112152829B - Alarm shielding method and system - Google Patents

Alarm shielding method and system Download PDF

Info

Publication number
CN112152829B
CN112152829B CN201910569443.5A CN201910569443A CN112152829B CN 112152829 B CN112152829 B CN 112152829B CN 201910569443 A CN201910569443 A CN 201910569443A CN 112152829 B CN112152829 B CN 112152829B
Authority
CN
China
Prior art keywords
shielding
alarm
port
network equipment
idle
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910569443.5A
Other languages
Chinese (zh)
Other versions
CN112152829A (en
Inventor
李貌
夏莹辉
张子鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fiberhome Telecommunication Technologies Co Ltd
Original Assignee
Fiberhome Telecommunication Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fiberhome Telecommunication Technologies Co Ltd filed Critical Fiberhome Telecommunication Technologies Co Ltd
Priority to CN201910569443.5A priority Critical patent/CN112152829B/en
Publication of CN112152829A publication Critical patent/CN112152829A/en
Application granted granted Critical
Publication of CN112152829B publication Critical patent/CN112152829B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0604Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/085Retrieval of network configuration; Tracking network configuration history

Abstract

The invention discloses an alarm shielding method, which relates to the field of transmission network equipment management and comprises the steps of loading an alarm shielding protocol supported by network equipment; acquiring an idle port of the network equipment according to the use conditions of a physical port and a service port of the network equipment, and corresponding the idle port to an alarm shielding protocol supported by the idle port to form shielding data; transmitting the shielding data to the network equipment through a management channel for network equipment communication; and based on the shielding data, shielding the alarm generated by the idle port of the network equipment. The method comprises the following steps that the shielding data is issued to the network equipment through a management channel of the network equipment communication, and the specific steps are as follows: and transmitting the shielding data to the network equipment through a management channel for network equipment communication based on a single-board binary stream protocol, a command line protocol or a YANG protocol. The invention shields the alarm generated by the idle port of the network equipment, and avoids the influence of the useless alarm generated by the idle port on the alarm generated by other working ports.

Description

Alarm shielding method and system
Technical Field
The invention relates to the field of transmission network equipment management, in particular to an alarm shielding method and an alarm shielding system.
Background
With the rapid development of internet applications, the demands of operators on network equipment and service quality are increasing day by day, and how to effectively monitor and maintain the quality of a large number of equipment and services in a network is of great significance.
Under the condition, the alarm becomes an important information source for troubleshooting and maintenance of network service problems, and related network problems are processed based on the alarm, so that a large number of devices in the network and the quality of the service are effectively monitored and maintained. However, the number of alarms is usually huge and is distributed on each device in the network, and some alarms are generated by unused physical ports or ports that do not open a service, such alarms do not affect the network quality, and actually do not need to be concerned by a user, but such alarms are doped in other alarms that affect the network quality and are generated together, which affects the judgment of the network quality.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide an alarm shielding method and an alarm shielding system, which are used for shielding the alarm generated by the idle port of the network equipment and avoiding the influence of the useless alarm generated by the idle port on the alarms generated by other working ports.
The invention provides an alarm shielding method, which comprises the following steps:
loading an alarm shielding protocol supported by the network equipment;
acquiring an idle port of the network equipment according to the use conditions of a physical port and a service port of the network equipment, and corresponding the idle port to an alarm shielding protocol supported by the idle port to form shielding data;
transmitting the shielding data to the network equipment through a management channel for network equipment communication;
and based on the shielding data, shielding the alarm generated by the idle port of the network equipment.
On the basis of the technical scheme, the specific steps of loading the alarm shielding protocol supported by the network equipment include:
acquiring specified network equipment or all network equipment in the current network based on alarm management needs;
loading an alarm shielding protocol supported by the network equipment;
sequentially listing the acquired network equipment, judging whether the alarm shielding protocol supported by the currently listed network equipment is loaded or not, if not, discarding the loading of the alarm shielding protocol of the currently listed network equipment, and if so, loading the alarm shielding protocol supported by the currently listed network equipment into a memory;
sequentially judging whether shielding configuration parameter items of an alarm shielding protocol in a memory meet equipment port rules, if not, discarding current alarm shielding protocol items, and if so, keeping the alarm shielding protocol items;
and acquiring the alarm shielding protocol reserved in the memory, and establishing a mapping relation between the acquired alarm shielding protocol and the corresponding network equipment.
On the basis of the technical scheme, the method comprises the following steps of obtaining an idle port of the network equipment according to the service conditions of a physical port and a service port of the network equipment, and corresponding the idle port to an alarm shielding protocol supported by the idle port to form shielding data, wherein the method specifically comprises the following steps:
acquiring the use conditions of a physical port and a service port of network equipment;
sequentially judging whether the physical port is configured with services, if so, determining that the current physical port is a used physical port, and if not, determining that the current physical port is an idle physical port;
sequentially judging whether the service port is configured with service, if so, determining that the current service port is a used service port, and if not, determining that the current service port is an idle service port;
according to the mapping relation, obtaining the alarm that the used physical port and the idle physical port support shielding, and the alarm that the used service port and the idle service port support shielding;
based on the alarm that the obtained idle physical port supports shielding and the alarm that the idle service port supports shielding, corresponding relations are established between the idle physical port and the alarm that the idle physical port supports shielding and between the idle service port and the alarm that the idle service port supports shielding, and shielding data is formed.
On the basis of the technical scheme, the shielding data is issued to the network equipment through a management channel for network equipment communication, and the specific steps are as follows: and transmitting the shielding data to the network equipment through a management channel for network equipment communication based on a single-board binary stream protocol, a command line protocol or a YANG protocol.
On the basis of the above technical solution, after shielding the alarm generated by the idle port of the network device based on the shielding data, the method further includes: and storing the shielded alarm information into a database, wherein the alarm information stored into the database supports the query requirement.
The invention provides an alarm shielding system, comprising:
the loading module is used for loading the alarm shielding protocol supported by the network equipment;
the system comprises an acquisition module, a data processing module and a data processing module, wherein the acquisition module is used for acquiring an idle port of the network equipment according to the use conditions of a physical port and a service port of the network equipment, and corresponding the idle port to an alarm shielding protocol supported by the idle port to form shielding data;
the issuing module is used for issuing the shielding data to the network equipment through a management channel for network equipment communication;
and the shielding module is used for shielding the alarm generated by the idle port of the network equipment based on the shielding data.
On the basis of the technical scheme, the loading module loads the alarm shielding protocol supported by the network equipment, and the specific process comprises the following steps:
acquiring specified network equipment or all network equipment in the current network based on alarm management needs;
loading an alarm shielding protocol supported by the network equipment;
sequentially listing the acquired network equipment, judging whether the alarm shielding protocol supported by the currently listed network equipment is loaded or not, if not, discarding the loading of the alarm shielding protocol of the currently listed network equipment, and if so, loading the alarm shielding protocol supported by the currently listed network equipment into a memory;
sequentially judging whether shielding configuration parameter items of an alarm shielding protocol in a memory meet equipment port rules, if not, discarding current alarm shielding protocol items, and if so, keeping the alarm shielding protocol items;
and acquiring the alarm shielding protocol reserved in the memory, and establishing a mapping relation between the acquired alarm shielding protocol and the corresponding network equipment.
On the basis of the technical scheme, the acquiring module acquires an idle port of the network device according to the service conditions of a physical port and a service port of the network device, and corresponds the idle port to an alarm shielding protocol supported by the idle port to form shielding data, and the specific process comprises the following steps:
acquiring the use conditions of a physical port and a service port of network equipment;
sequentially judging whether the physical port is configured with services, if so, determining that the current physical port is a used physical port, and if not, determining that the current physical port is an idle physical port;
sequentially judging whether the service port is configured with service, if so, determining that the current service port is a used service port, and if not, determining that the current service port is an idle service port;
according to the mapping relation, obtaining the alarm that the used physical port and the idle physical port support shielding, and the alarm that the used service port and the idle service port support shielding;
based on the alarm that the obtained idle physical port supports shielding and the alarm that the idle service port supports shielding, corresponding relations are established between the idle physical port and the alarm that the idle physical port supports shielding and between the idle service port and the alarm that the idle service port supports shielding, and shielding data is formed.
On the basis of the technical scheme, the issuing of the management channel communicated through the network equipment and the issuing of the shielding data to the network equipment specifically include: and transmitting the shielding data to the network equipment through a management channel for network equipment communication based on a single-board binary stream protocol, a command line protocol or a YANG protocol.
On the basis of the above technical solution, after the shielding module shields the alarm generated by the idle port of the network device based on the shielding data, the method further includes: and storing the shielded alarm information into a database, wherein the alarm information stored into the database supports the query requirement.
Compared with the prior art, the invention has the advantages that: by acquiring the idle port of the network equipment, corresponding the idle port with the alarm shielding protocol supported by the idle port to form shielding data and sending the shielding data to the network equipment, the idle port of the network equipment generates an alarm and can be shielded when the network equipment works, thereby avoiding that the useless alarm generated by the idle port influences the alarms generated by other working ports and facilitating the accurate positioning of the network quality problem.
Drawings
Fig. 1 is a flowchart of an alarm masking method according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The embodiment of the invention provides an alarm shielding method, which shields the alarm of the idle port of the network equipment in the network, avoids the alarm from influencing the alarm generated by other working ports and is convenient for accurately positioning the network quality problem. The embodiment of the invention also correspondingly provides an alarm shielding system.
Referring to fig. 1, an alarm shielding method provided in an embodiment of the present invention includes:
s1: and loading an alarm shielding protocol supported by the network equipment. For network equipment, each network equipment corresponds to an alarm shielding protocol, and the alarm shielding protocol is used for shielding alarms of a network equipment port corresponding to the alarm shielding protocol, namely the alarm shielding protocol is used for indicating a port which can be shielded by the network equipment and realizing shielding of the port alarms. The alarm masking protocol supported by the network device is, that is, all the alarm masking protocols supported by all the ports of the network device, because the alarm masking protocol is specifically used for masking the alarms of the ports of the network device.
S2: according to the use condition of the physical port and the service port of the network equipment, the idle port of the network equipment is obtained, and the idle port corresponds to an alarm shielding protocol supported by the idle port to form shielding data.
S3: the shielding data is sent to the network equipment through a management channel for the communication of the network equipment;
s4: and based on the shielding data, shielding the alarm generated by the idle port of the network equipment. In the working process of the network equipment, if the alarm is generated, whether the port generating the alarm is an idle port in the shielding data is judged, if yes, an alarm shielding protocol corresponding to the idle port in the shielding data is used for shielding the generated alarm, and if not, the shielding is not needed. And issuing the shielding data to the network equipment through a management channel for network equipment communication, and the specific steps are as follows: and transmitting the shielding data to the network equipment through a management channel for network equipment communication based on a single-board binary stream protocol, a command line protocol or a YANG protocol. The YANG protocol is a network configuration protocol.
After shielding the alarm generated by the idle port of the network device based on the shielding data, the method further comprises the following steps: the shielded alarm information is stored in the database, the alarm information stored in the database supports the query requirement, the user can conveniently and subsequently query which alarms are shielded, and meanwhile, in order to further facilitate the management of the user on the network equipment, the user can be independently notified after the alarms are shielded.
The alarm shielding method of the embodiment of the invention forms shielding data by acquiring the idle port of the network equipment and corresponding the idle port with the alarm shielding protocol supported by the idle port, and sends the shielding data to the network equipment, and the idle port of the network equipment generates the alarm to be shielded when the network equipment works, thereby avoiding that the useless alarm generated by the idle port influences the alarms generated by other working ports, and being convenient for accurately positioning the network quality problem.
Optionally, on the basis of the embodiment corresponding to fig. 1, in a first optional embodiment of the alarm masking method provided in the embodiment of the present invention, the alarm masking protocol supported by the network device is loaded, and the specific steps include:
s101: acquiring specified network equipment or all network equipment in the current network based on alarm management needs;
s102: loading an alarm shielding protocol supported by the network equipment;
s103: sequentially listing the acquired network equipment, judging whether the alarm shielding protocol supported by the currently listed network equipment is loaded or not, if not, discarding the loading of the alarm shielding protocol of the currently listed network equipment, and if so, loading the alarm shielding protocol supported by the currently listed network equipment into a memory;
s104: and sequentially judging whether shielding configuration parameter entries of the alarm shielding protocol in the memory meet the device port rule, if not, discarding the current alarm shielding protocol entries, and if so, keeping the alarm shielding protocol entries. The alarm type generated by each port of the equipment is fixed, and the port rule refers to the corresponding relation between the port and the alarm type.
S105: and acquiring the alarm shielding protocol reserved in the memory, and establishing a mapping relation between the acquired alarm shielding protocol and the corresponding network equipment.
Optionally, on the basis of the first optional embodiment corresponding to the alarm shielding method, in a second optional embodiment of the alarm shielding method provided in the embodiment of the present invention, an idle port of the network device is obtained according to a usage situation of a physical port and a service port of the network device, and the idle port corresponds to an alarm shielding protocol supported by the idle port to form shielding data, where the specific steps include:
s201: acquiring the use conditions of a physical port and a service port of network equipment;
s202: sequentially judging whether the physical port is configured with services, if so, determining that the current physical port is a used physical port, and if not, determining that the current physical port is an idle physical port;
s203: sequentially judging whether the service port is configured with service, if so, determining that the current service port is a used service port, and if not, determining that the current service port is an idle service port;
s204: according to the mapping relation, obtaining the alarm that the used physical port and the idle physical port support shielding, and the alarm that the used service port and the idle service port support shielding;
s205: based on the alarm that the obtained idle physical port supports shielding and the alarm that the idle service port supports shielding, corresponding relations are established between the idle physical port and the alarm that the idle physical port supports shielding and between the idle service port and the alarm that the idle service port supports shielding, and shielding data is formed.
The alarm shielding system provided by the embodiment of the invention comprises:
the loading module is used for loading the alarm shielding protocol supported by the network equipment;
the system comprises an acquisition module, a data processing module and a data processing module, wherein the acquisition module is used for acquiring an idle port of the network equipment according to the use conditions of a physical port and a service port of the network equipment, and corresponding the idle port to an alarm shielding protocol supported by the idle port to form shielding data;
the issuing module is used for issuing the shielding data to the network equipment through a management channel for network equipment communication;
and the shielding module is used for shielding the alarm generated by the idle port of the network equipment based on the shielding data.
Issuing a management channel communicated through network equipment, and issuing the shielding data to the network equipment, specifically: and transmitting the shielding data to the network equipment through a management channel for network equipment communication based on a single-board binary stream protocol, a command line protocol or a YANG protocol.
After the shielding module shields the alarm generated by the idle port of the network device based on the shielding data, the method further comprises the following steps: and storing the shielded alarm information into a database, wherein the alarm information stored into the database supports the query requirement.
The loading module loads an alarm shielding protocol supported by the network equipment, and the specific process comprises the following steps:
acquiring designated network equipment or all network equipment in the current network based on alarm requirements;
loading an alarm shielding protocol supported by the network equipment;
sequentially listing the acquired network equipment, judging whether the alarm shielding protocol supported by the currently listed network equipment is loaded or not, if not, discarding the loading of the alarm shielding protocol of the currently listed network equipment, and if so, loading the alarm shielding protocol supported by the currently listed network equipment into a memory;
sequentially judging whether shielding configuration parameter items of an alarm shielding protocol in a memory meet equipment port rules, if not, discarding current alarm shielding protocol items, and if so, keeping the alarm shielding protocol items;
and acquiring the alarm shielding protocol reserved in the memory, and establishing a mapping relation between the acquired alarm shielding protocol and the corresponding network equipment.
The acquisition module acquires an idle port of the network equipment according to the service conditions of a physical port and a service port of the network equipment, and corresponds the idle port to an alarm shielding protocol supported by the idle port to form shielding data, and the specific process comprises the following steps:
acquiring the use conditions of a physical port and a service port of network equipment;
sequentially judging whether the physical port is configured with services, if so, determining that the current physical port is a used physical port, and if not, determining that the current physical port is an idle physical port;
sequentially judging whether the service port is configured with service, if so, determining that the current service port is a used service port, and if not, determining that the current service port is an idle service port;
according to the mapping relation, obtaining the alarm that the used physical port and the idle physical port support shielding, and the alarm that the used service port and the idle service port support shielding;
based on the alarm that the obtained idle physical port supports shielding and the alarm that the idle service port supports shielding, corresponding relations are established between the idle physical port and the alarm that the idle physical port supports shielding and between the idle service port and the alarm that the idle service port supports shielding, and shielding data is formed.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The present invention is not limited to the above-described embodiments, and it will be apparent to those skilled in the art that various modifications and improvements can be made without departing from the principle of the present invention, and such modifications and improvements are also considered to be within the scope of the present invention. Those not described in detail in this specification are within the skill of the art.

Claims (10)

1. An alarm shielding method is characterized by comprising the following steps:
loading an alarm shielding protocol supported by the network equipment, wherein the alarm shielding protocol is used for indicating a port which can be shielded by the network equipment and shielding the alarm of the port;
acquiring an idle port of the network equipment according to the use conditions of a physical port and a service port of the network equipment, and corresponding the idle port to an alarm shielding protocol supported by the idle port to form shielding data;
transmitting the shielding data to the network equipment through a management channel for network equipment communication;
and based on the shielding data, shielding the alarm generated by the idle port of the network equipment.
2. The alarm masking method according to claim 1, wherein said loading the alarm masking protocol supported by the network device comprises the following specific steps:
acquiring specified network equipment or all network equipment in the current network based on alarm management needs;
loading an alarm shielding protocol supported by the network equipment;
sequentially listing the acquired network equipment, judging whether the alarm shielding protocol supported by the currently listed network equipment is loaded or not, if not, discarding the loading of the alarm shielding protocol of the currently listed network equipment, and if so, loading the alarm shielding protocol supported by the currently listed network equipment into a memory;
sequentially judging whether shielding configuration parameter items of an alarm shielding protocol in a memory meet equipment port rules, if not, discarding current alarm shielding protocol items, and if so, keeping the alarm shielding protocol items;
and acquiring the alarm shielding protocol reserved in the memory, and establishing a mapping relation between the acquired alarm shielding protocol and the corresponding network equipment.
3. The method for shielding an alarm according to claim 2, wherein the method for shielding an alarm according to the usage of the physical port and the service port of the network device comprises the steps of obtaining an idle port of the network device, and corresponding the idle port to an alarm shielding protocol supported by the idle port to form shielding data, and the method comprises the following specific steps:
acquiring the use conditions of a physical port and a service port of network equipment;
sequentially judging whether the physical port is configured with services, if so, determining that the current physical port is a used physical port, and if not, determining that the current physical port is an idle physical port;
sequentially judging whether the service port is configured with service, if so, determining that the current service port is a used service port, and if not, determining that the current service port is an idle service port;
according to the mapping relation, obtaining the alarm that the used physical port and the idle physical port support shielding, and the alarm that the used service port and the idle service port support shielding;
based on the alarm that the obtained idle physical port supports shielding and the alarm that the idle service port supports shielding, corresponding relations are established between the idle physical port and the alarm that the idle physical port supports shielding and between the idle service port and the alarm that the idle service port supports shielding, and shielding data is formed.
4. The alarm shielding method of claim 1, wherein the shielding data is issued to the network device through a management channel of the network device communication, and the specific steps are as follows: and transmitting the shielding data to the network equipment through a management channel for network equipment communication based on a single-board binary stream protocol, a command line protocol or a YANG protocol.
5. The alarm masking method of claim 1, wherein after masking the alarm generated by the idle port of the network device based on the masking data, further comprising: and storing the shielded alarm information into a database, wherein the alarm information stored into the database supports the query requirement.
6. An alarm masking system, comprising:
the device comprises a loading module, a processing module and a display module, wherein the loading module is used for loading an alarm shielding protocol supported by network equipment, and the alarm shielding protocol is used for indicating a port which can be shielded by the network equipment and realizing shielding of alarm of the port;
the system comprises an acquisition module, a data processing module and a data processing module, wherein the acquisition module is used for acquiring an idle port of the network equipment according to the use conditions of a physical port and a service port of the network equipment, and corresponding the idle port to an alarm shielding protocol supported by the idle port to form shielding data;
the issuing module is used for issuing the shielding data to the network equipment through a management channel for network equipment communication;
and the shielding module is used for shielding the alarm generated by the idle port of the network equipment based on the shielding data.
7. The alarm masking system according to claim 6, wherein said loading module loads an alarm masking protocol supported by the network device, and the specific process includes:
acquiring specified network equipment or all network equipment in the current network based on alarm management needs;
loading an alarm shielding protocol supported by the network equipment;
sequentially listing the acquired network equipment, judging whether the alarm shielding protocol supported by the currently listed network equipment is loaded or not, if not, discarding the loading of the alarm shielding protocol of the currently listed network equipment, and if so, loading the alarm shielding protocol supported by the currently listed network equipment into a memory;
sequentially judging whether shielding configuration parameter items of an alarm shielding protocol in a memory meet equipment port rules, if not, discarding current alarm shielding protocol items, and if so, keeping the alarm shielding protocol items;
and acquiring the alarm shielding protocol reserved in the memory, and establishing a mapping relation between the acquired alarm shielding protocol and the corresponding network equipment.
8. The alarm shielding system according to claim 7, wherein the obtaining module obtains an idle port of the network device according to the usage of the physical port and the service port of the network device, and corresponds the idle port to the alarm shielding protocol supported by the idle port to form the shielding data, and the specific process includes:
acquiring the use conditions of a physical port and a service port of network equipment;
sequentially judging whether the physical port is configured with services, if so, determining that the current physical port is a used physical port, and if not, determining that the current physical port is an idle physical port;
whether the service port is configured with a service is sequentially judged, if yes, the current service port is a used service port, and if not, the current service port is an idle service port;
according to the mapping relation, obtaining the alarm that the used physical port and the idle physical port support shielding, and the alarm that the used service port and the idle service port support shielding;
based on the alarm of the idle physical port supporting shielding and the alarm of the idle service port supporting shielding, corresponding relations are established between the idle physical port and the alarm of the idle physical port supporting shielding and between the idle service port and the alarm of the idle service port supporting shielding, and shielding data is formed.
9. The alarm shielding system of claim 6, wherein the issuing issues the shielding data to the network device through a management channel of the network device communication, specifically: and transmitting the shielding data to the network equipment through a management channel for network equipment communication based on a single-board binary stream protocol, a command line protocol or a YANG protocol.
10. The alarm masking system of claim 6, wherein after the masking module masks the alarm generated by the idle port of the network device based on the masking data, the system further comprises: and storing the shielded alarm information into a database, wherein the alarm information stored into the database supports the query requirement.
CN201910569443.5A 2019-06-27 2019-06-27 Alarm shielding method and system Active CN112152829B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910569443.5A CN112152829B (en) 2019-06-27 2019-06-27 Alarm shielding method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910569443.5A CN112152829B (en) 2019-06-27 2019-06-27 Alarm shielding method and system

Publications (2)

Publication Number Publication Date
CN112152829A CN112152829A (en) 2020-12-29
CN112152829B true CN112152829B (en) 2022-08-02

Family

ID=73868845

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910569443.5A Active CN112152829B (en) 2019-06-27 2019-06-27 Alarm shielding method and system

Country Status (1)

Country Link
CN (1) CN112152829B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007143943A1 (en) * 2006-06-01 2007-12-21 Huawei Technologies Co., Ltd. Method, system and network device of centralized maintenance of multiple devices
CN101170441A (en) * 2007-11-26 2008-04-30 中兴通讯股份有限公司 A method and device for shielding device alarm in network management system
CN101217315A (en) * 2008-01-04 2008-07-09 中兴通讯股份有限公司 A collocation method and system of alarming shielding
CN101340692A (en) * 2008-08-21 2009-01-07 中国移动通信集团河北有限公司 Cutover alarm filtering method for mobile communication engineering
CN102638373A (en) * 2012-04-18 2012-08-15 烽火通信科技股份有限公司 Method for realizing alarm standby of access equipment
CN105323104A (en) * 2014-08-04 2016-02-10 中兴通讯股份有限公司 Alarm management method and apparatus and packet transmission equipment
CN107483235A (en) * 2017-08-01 2017-12-15 北京市天元网络技术股份有限公司 A kind of equipment cutover alarm screen method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007143943A1 (en) * 2006-06-01 2007-12-21 Huawei Technologies Co., Ltd. Method, system and network device of centralized maintenance of multiple devices
CN101170441A (en) * 2007-11-26 2008-04-30 中兴通讯股份有限公司 A method and device for shielding device alarm in network management system
CN101217315A (en) * 2008-01-04 2008-07-09 中兴通讯股份有限公司 A collocation method and system of alarming shielding
CN101340692A (en) * 2008-08-21 2009-01-07 中国移动通信集团河北有限公司 Cutover alarm filtering method for mobile communication engineering
CN102638373A (en) * 2012-04-18 2012-08-15 烽火通信科技股份有限公司 Method for realizing alarm standby of access equipment
CN105323104A (en) * 2014-08-04 2016-02-10 中兴通讯股份有限公司 Alarm management method and apparatus and packet transmission equipment
CN107483235A (en) * 2017-08-01 2017-12-15 北京市天元网络技术股份有限公司 A kind of equipment cutover alarm screen method and device

Also Published As

Publication number Publication date
CN112152829A (en) 2020-12-29

Similar Documents

Publication Publication Date Title
US11374826B2 (en) Systems and methods for enhanced monitoring of a distributed computing system
US20150215228A1 (en) Methods, systems, and computer readable media for a cloud-based virtualization orchestrator
EP3211827B1 (en) Alarm processing method and apparatus
CN110262941A (en) Application Container cluster alarm implementation method, system, equipment and storage medium
CN106100928B (en) The transmission method and device of monitoring data applied to data center
US20230385287A1 (en) Real-time dashboards, alerts and analytics for a log intelligence system
CN107729213B (en) Background task monitoring method and device
WO2016074412A1 (en) Compatibility administration method based on network configuration protocol, storage medium and device
CN112152829B (en) Alarm shielding method and system
CN109510729B (en) Implementation method for discovering application topological relation based on CMDB and Netstat
CN105471626A (en) Method and system for distributing storage data of internal memory
WO2017023266A1 (en) Application centric network experience monitoring
CN102769495B (en) A kind of optical fiber access network equipment communication means, Apparatus and system
CN111897643A (en) Thread pool configuration system, method, device and storage medium
US20200203026A1 (en) System of industrial internet of things and information processing device thereof
CN112542002A (en) Car renting system control method and device
CN110083595A (en) A kind of offline reconciliation system, method and apparatus
CN111831503A (en) Monitoring method based on monitoring agent and monitoring agent device
CN108021407B (en) Service processing method and device based on network equipment
CN104348662B (en) A kind of update method and device of equipment state
CN112860292A (en) Configuration management method and device based on application
CN106850546B (en) Map module software organization method of radar terminal
CN109840264B (en) Method and device for auditing access of application program database
CN112486656A (en) Method for realizing wireless ionization wire task scheduling and data downloading
CN110633182A (en) System, method and apparatus for monitoring server stability

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant