CN112152829B - Alarm shielding method and system - Google Patents
Alarm shielding method and system Download PDFInfo
- Publication number
- CN112152829B CN112152829B CN201910569443.5A CN201910569443A CN112152829B CN 112152829 B CN112152829 B CN 112152829B CN 201910569443 A CN201910569443 A CN 201910569443A CN 112152829 B CN112152829 B CN 112152829B
- Authority
- CN
- China
- Prior art keywords
- shielding
- alarm
- port
- network equipment
- idle
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0604—Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/085—Retrieval of network configuration; Tracking network configuration history
Abstract
The invention discloses an alarm shielding method, which relates to the field of transmission network equipment management and comprises the steps of loading an alarm shielding protocol supported by network equipment; acquiring an idle port of the network equipment according to the use conditions of a physical port and a service port of the network equipment, and corresponding the idle port to an alarm shielding protocol supported by the idle port to form shielding data; transmitting the shielding data to the network equipment through a management channel for network equipment communication; and based on the shielding data, shielding the alarm generated by the idle port of the network equipment. The method comprises the following steps that the shielding data is issued to the network equipment through a management channel of the network equipment communication, and the specific steps are as follows: and transmitting the shielding data to the network equipment through a management channel for network equipment communication based on a single-board binary stream protocol, a command line protocol or a YANG protocol. The invention shields the alarm generated by the idle port of the network equipment, and avoids the influence of the useless alarm generated by the idle port on the alarm generated by other working ports.
Description
Technical Field
The invention relates to the field of transmission network equipment management, in particular to an alarm shielding method and an alarm shielding system.
Background
With the rapid development of internet applications, the demands of operators on network equipment and service quality are increasing day by day, and how to effectively monitor and maintain the quality of a large number of equipment and services in a network is of great significance.
Under the condition, the alarm becomes an important information source for troubleshooting and maintenance of network service problems, and related network problems are processed based on the alarm, so that a large number of devices in the network and the quality of the service are effectively monitored and maintained. However, the number of alarms is usually huge and is distributed on each device in the network, and some alarms are generated by unused physical ports or ports that do not open a service, such alarms do not affect the network quality, and actually do not need to be concerned by a user, but such alarms are doped in other alarms that affect the network quality and are generated together, which affects the judgment of the network quality.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide an alarm shielding method and an alarm shielding system, which are used for shielding the alarm generated by the idle port of the network equipment and avoiding the influence of the useless alarm generated by the idle port on the alarms generated by other working ports.
The invention provides an alarm shielding method, which comprises the following steps:
loading an alarm shielding protocol supported by the network equipment;
acquiring an idle port of the network equipment according to the use conditions of a physical port and a service port of the network equipment, and corresponding the idle port to an alarm shielding protocol supported by the idle port to form shielding data;
transmitting the shielding data to the network equipment through a management channel for network equipment communication;
and based on the shielding data, shielding the alarm generated by the idle port of the network equipment.
On the basis of the technical scheme, the specific steps of loading the alarm shielding protocol supported by the network equipment include:
acquiring specified network equipment or all network equipment in the current network based on alarm management needs;
loading an alarm shielding protocol supported by the network equipment;
sequentially listing the acquired network equipment, judging whether the alarm shielding protocol supported by the currently listed network equipment is loaded or not, if not, discarding the loading of the alarm shielding protocol of the currently listed network equipment, and if so, loading the alarm shielding protocol supported by the currently listed network equipment into a memory;
sequentially judging whether shielding configuration parameter items of an alarm shielding protocol in a memory meet equipment port rules, if not, discarding current alarm shielding protocol items, and if so, keeping the alarm shielding protocol items;
and acquiring the alarm shielding protocol reserved in the memory, and establishing a mapping relation between the acquired alarm shielding protocol and the corresponding network equipment.
On the basis of the technical scheme, the method comprises the following steps of obtaining an idle port of the network equipment according to the service conditions of a physical port and a service port of the network equipment, and corresponding the idle port to an alarm shielding protocol supported by the idle port to form shielding data, wherein the method specifically comprises the following steps:
acquiring the use conditions of a physical port and a service port of network equipment;
sequentially judging whether the physical port is configured with services, if so, determining that the current physical port is a used physical port, and if not, determining that the current physical port is an idle physical port;
sequentially judging whether the service port is configured with service, if so, determining that the current service port is a used service port, and if not, determining that the current service port is an idle service port;
according to the mapping relation, obtaining the alarm that the used physical port and the idle physical port support shielding, and the alarm that the used service port and the idle service port support shielding;
based on the alarm that the obtained idle physical port supports shielding and the alarm that the idle service port supports shielding, corresponding relations are established between the idle physical port and the alarm that the idle physical port supports shielding and between the idle service port and the alarm that the idle service port supports shielding, and shielding data is formed.
On the basis of the technical scheme, the shielding data is issued to the network equipment through a management channel for network equipment communication, and the specific steps are as follows: and transmitting the shielding data to the network equipment through a management channel for network equipment communication based on a single-board binary stream protocol, a command line protocol or a YANG protocol.
On the basis of the above technical solution, after shielding the alarm generated by the idle port of the network device based on the shielding data, the method further includes: and storing the shielded alarm information into a database, wherein the alarm information stored into the database supports the query requirement.
The invention provides an alarm shielding system, comprising:
the loading module is used for loading the alarm shielding protocol supported by the network equipment;
the system comprises an acquisition module, a data processing module and a data processing module, wherein the acquisition module is used for acquiring an idle port of the network equipment according to the use conditions of a physical port and a service port of the network equipment, and corresponding the idle port to an alarm shielding protocol supported by the idle port to form shielding data;
the issuing module is used for issuing the shielding data to the network equipment through a management channel for network equipment communication;
and the shielding module is used for shielding the alarm generated by the idle port of the network equipment based on the shielding data.
On the basis of the technical scheme, the loading module loads the alarm shielding protocol supported by the network equipment, and the specific process comprises the following steps:
acquiring specified network equipment or all network equipment in the current network based on alarm management needs;
loading an alarm shielding protocol supported by the network equipment;
sequentially listing the acquired network equipment, judging whether the alarm shielding protocol supported by the currently listed network equipment is loaded or not, if not, discarding the loading of the alarm shielding protocol of the currently listed network equipment, and if so, loading the alarm shielding protocol supported by the currently listed network equipment into a memory;
sequentially judging whether shielding configuration parameter items of an alarm shielding protocol in a memory meet equipment port rules, if not, discarding current alarm shielding protocol items, and if so, keeping the alarm shielding protocol items;
and acquiring the alarm shielding protocol reserved in the memory, and establishing a mapping relation between the acquired alarm shielding protocol and the corresponding network equipment.
On the basis of the technical scheme, the acquiring module acquires an idle port of the network device according to the service conditions of a physical port and a service port of the network device, and corresponds the idle port to an alarm shielding protocol supported by the idle port to form shielding data, and the specific process comprises the following steps:
acquiring the use conditions of a physical port and a service port of network equipment;
sequentially judging whether the physical port is configured with services, if so, determining that the current physical port is a used physical port, and if not, determining that the current physical port is an idle physical port;
sequentially judging whether the service port is configured with service, if so, determining that the current service port is a used service port, and if not, determining that the current service port is an idle service port;
according to the mapping relation, obtaining the alarm that the used physical port and the idle physical port support shielding, and the alarm that the used service port and the idle service port support shielding;
based on the alarm that the obtained idle physical port supports shielding and the alarm that the idle service port supports shielding, corresponding relations are established between the idle physical port and the alarm that the idle physical port supports shielding and between the idle service port and the alarm that the idle service port supports shielding, and shielding data is formed.
On the basis of the technical scheme, the issuing of the management channel communicated through the network equipment and the issuing of the shielding data to the network equipment specifically include: and transmitting the shielding data to the network equipment through a management channel for network equipment communication based on a single-board binary stream protocol, a command line protocol or a YANG protocol.
On the basis of the above technical solution, after the shielding module shields the alarm generated by the idle port of the network device based on the shielding data, the method further includes: and storing the shielded alarm information into a database, wherein the alarm information stored into the database supports the query requirement.
Compared with the prior art, the invention has the advantages that: by acquiring the idle port of the network equipment, corresponding the idle port with the alarm shielding protocol supported by the idle port to form shielding data and sending the shielding data to the network equipment, the idle port of the network equipment generates an alarm and can be shielded when the network equipment works, thereby avoiding that the useless alarm generated by the idle port influences the alarms generated by other working ports and facilitating the accurate positioning of the network quality problem.
Drawings
Fig. 1 is a flowchart of an alarm masking method according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The embodiment of the invention provides an alarm shielding method, which shields the alarm of the idle port of the network equipment in the network, avoids the alarm from influencing the alarm generated by other working ports and is convenient for accurately positioning the network quality problem. The embodiment of the invention also correspondingly provides an alarm shielding system.
Referring to fig. 1, an alarm shielding method provided in an embodiment of the present invention includes:
s1: and loading an alarm shielding protocol supported by the network equipment. For network equipment, each network equipment corresponds to an alarm shielding protocol, and the alarm shielding protocol is used for shielding alarms of a network equipment port corresponding to the alarm shielding protocol, namely the alarm shielding protocol is used for indicating a port which can be shielded by the network equipment and realizing shielding of the port alarms. The alarm masking protocol supported by the network device is, that is, all the alarm masking protocols supported by all the ports of the network device, because the alarm masking protocol is specifically used for masking the alarms of the ports of the network device.
S2: according to the use condition of the physical port and the service port of the network equipment, the idle port of the network equipment is obtained, and the idle port corresponds to an alarm shielding protocol supported by the idle port to form shielding data.
S3: the shielding data is sent to the network equipment through a management channel for the communication of the network equipment;
s4: and based on the shielding data, shielding the alarm generated by the idle port of the network equipment. In the working process of the network equipment, if the alarm is generated, whether the port generating the alarm is an idle port in the shielding data is judged, if yes, an alarm shielding protocol corresponding to the idle port in the shielding data is used for shielding the generated alarm, and if not, the shielding is not needed. And issuing the shielding data to the network equipment through a management channel for network equipment communication, and the specific steps are as follows: and transmitting the shielding data to the network equipment through a management channel for network equipment communication based on a single-board binary stream protocol, a command line protocol or a YANG protocol. The YANG protocol is a network configuration protocol.
After shielding the alarm generated by the idle port of the network device based on the shielding data, the method further comprises the following steps: the shielded alarm information is stored in the database, the alarm information stored in the database supports the query requirement, the user can conveniently and subsequently query which alarms are shielded, and meanwhile, in order to further facilitate the management of the user on the network equipment, the user can be independently notified after the alarms are shielded.
The alarm shielding method of the embodiment of the invention forms shielding data by acquiring the idle port of the network equipment and corresponding the idle port with the alarm shielding protocol supported by the idle port, and sends the shielding data to the network equipment, and the idle port of the network equipment generates the alarm to be shielded when the network equipment works, thereby avoiding that the useless alarm generated by the idle port influences the alarms generated by other working ports, and being convenient for accurately positioning the network quality problem.
Optionally, on the basis of the embodiment corresponding to fig. 1, in a first optional embodiment of the alarm masking method provided in the embodiment of the present invention, the alarm masking protocol supported by the network device is loaded, and the specific steps include:
s101: acquiring specified network equipment or all network equipment in the current network based on alarm management needs;
s102: loading an alarm shielding protocol supported by the network equipment;
s103: sequentially listing the acquired network equipment, judging whether the alarm shielding protocol supported by the currently listed network equipment is loaded or not, if not, discarding the loading of the alarm shielding protocol of the currently listed network equipment, and if so, loading the alarm shielding protocol supported by the currently listed network equipment into a memory;
s104: and sequentially judging whether shielding configuration parameter entries of the alarm shielding protocol in the memory meet the device port rule, if not, discarding the current alarm shielding protocol entries, and if so, keeping the alarm shielding protocol entries. The alarm type generated by each port of the equipment is fixed, and the port rule refers to the corresponding relation between the port and the alarm type.
S105: and acquiring the alarm shielding protocol reserved in the memory, and establishing a mapping relation between the acquired alarm shielding protocol and the corresponding network equipment.
Optionally, on the basis of the first optional embodiment corresponding to the alarm shielding method, in a second optional embodiment of the alarm shielding method provided in the embodiment of the present invention, an idle port of the network device is obtained according to a usage situation of a physical port and a service port of the network device, and the idle port corresponds to an alarm shielding protocol supported by the idle port to form shielding data, where the specific steps include:
s201: acquiring the use conditions of a physical port and a service port of network equipment;
s202: sequentially judging whether the physical port is configured with services, if so, determining that the current physical port is a used physical port, and if not, determining that the current physical port is an idle physical port;
s203: sequentially judging whether the service port is configured with service, if so, determining that the current service port is a used service port, and if not, determining that the current service port is an idle service port;
s204: according to the mapping relation, obtaining the alarm that the used physical port and the idle physical port support shielding, and the alarm that the used service port and the idle service port support shielding;
s205: based on the alarm that the obtained idle physical port supports shielding and the alarm that the idle service port supports shielding, corresponding relations are established between the idle physical port and the alarm that the idle physical port supports shielding and between the idle service port and the alarm that the idle service port supports shielding, and shielding data is formed.
The alarm shielding system provided by the embodiment of the invention comprises:
the loading module is used for loading the alarm shielding protocol supported by the network equipment;
the system comprises an acquisition module, a data processing module and a data processing module, wherein the acquisition module is used for acquiring an idle port of the network equipment according to the use conditions of a physical port and a service port of the network equipment, and corresponding the idle port to an alarm shielding protocol supported by the idle port to form shielding data;
the issuing module is used for issuing the shielding data to the network equipment through a management channel for network equipment communication;
and the shielding module is used for shielding the alarm generated by the idle port of the network equipment based on the shielding data.
Issuing a management channel communicated through network equipment, and issuing the shielding data to the network equipment, specifically: and transmitting the shielding data to the network equipment through a management channel for network equipment communication based on a single-board binary stream protocol, a command line protocol or a YANG protocol.
After the shielding module shields the alarm generated by the idle port of the network device based on the shielding data, the method further comprises the following steps: and storing the shielded alarm information into a database, wherein the alarm information stored into the database supports the query requirement.
The loading module loads an alarm shielding protocol supported by the network equipment, and the specific process comprises the following steps:
acquiring designated network equipment or all network equipment in the current network based on alarm requirements;
loading an alarm shielding protocol supported by the network equipment;
sequentially listing the acquired network equipment, judging whether the alarm shielding protocol supported by the currently listed network equipment is loaded or not, if not, discarding the loading of the alarm shielding protocol of the currently listed network equipment, and if so, loading the alarm shielding protocol supported by the currently listed network equipment into a memory;
sequentially judging whether shielding configuration parameter items of an alarm shielding protocol in a memory meet equipment port rules, if not, discarding current alarm shielding protocol items, and if so, keeping the alarm shielding protocol items;
and acquiring the alarm shielding protocol reserved in the memory, and establishing a mapping relation between the acquired alarm shielding protocol and the corresponding network equipment.
The acquisition module acquires an idle port of the network equipment according to the service conditions of a physical port and a service port of the network equipment, and corresponds the idle port to an alarm shielding protocol supported by the idle port to form shielding data, and the specific process comprises the following steps:
acquiring the use conditions of a physical port and a service port of network equipment;
sequentially judging whether the physical port is configured with services, if so, determining that the current physical port is a used physical port, and if not, determining that the current physical port is an idle physical port;
sequentially judging whether the service port is configured with service, if so, determining that the current service port is a used service port, and if not, determining that the current service port is an idle service port;
according to the mapping relation, obtaining the alarm that the used physical port and the idle physical port support shielding, and the alarm that the used service port and the idle service port support shielding;
based on the alarm that the obtained idle physical port supports shielding and the alarm that the idle service port supports shielding, corresponding relations are established between the idle physical port and the alarm that the idle physical port supports shielding and between the idle service port and the alarm that the idle service port supports shielding, and shielding data is formed.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The present invention is not limited to the above-described embodiments, and it will be apparent to those skilled in the art that various modifications and improvements can be made without departing from the principle of the present invention, and such modifications and improvements are also considered to be within the scope of the present invention. Those not described in detail in this specification are within the skill of the art.
Claims (10)
1. An alarm shielding method is characterized by comprising the following steps:
loading an alarm shielding protocol supported by the network equipment, wherein the alarm shielding protocol is used for indicating a port which can be shielded by the network equipment and shielding the alarm of the port;
acquiring an idle port of the network equipment according to the use conditions of a physical port and a service port of the network equipment, and corresponding the idle port to an alarm shielding protocol supported by the idle port to form shielding data;
transmitting the shielding data to the network equipment through a management channel for network equipment communication;
and based on the shielding data, shielding the alarm generated by the idle port of the network equipment.
2. The alarm masking method according to claim 1, wherein said loading the alarm masking protocol supported by the network device comprises the following specific steps:
acquiring specified network equipment or all network equipment in the current network based on alarm management needs;
loading an alarm shielding protocol supported by the network equipment;
sequentially listing the acquired network equipment, judging whether the alarm shielding protocol supported by the currently listed network equipment is loaded or not, if not, discarding the loading of the alarm shielding protocol of the currently listed network equipment, and if so, loading the alarm shielding protocol supported by the currently listed network equipment into a memory;
sequentially judging whether shielding configuration parameter items of an alarm shielding protocol in a memory meet equipment port rules, if not, discarding current alarm shielding protocol items, and if so, keeping the alarm shielding protocol items;
and acquiring the alarm shielding protocol reserved in the memory, and establishing a mapping relation between the acquired alarm shielding protocol and the corresponding network equipment.
3. The method for shielding an alarm according to claim 2, wherein the method for shielding an alarm according to the usage of the physical port and the service port of the network device comprises the steps of obtaining an idle port of the network device, and corresponding the idle port to an alarm shielding protocol supported by the idle port to form shielding data, and the method comprises the following specific steps:
acquiring the use conditions of a physical port and a service port of network equipment;
sequentially judging whether the physical port is configured with services, if so, determining that the current physical port is a used physical port, and if not, determining that the current physical port is an idle physical port;
sequentially judging whether the service port is configured with service, if so, determining that the current service port is a used service port, and if not, determining that the current service port is an idle service port;
according to the mapping relation, obtaining the alarm that the used physical port and the idle physical port support shielding, and the alarm that the used service port and the idle service port support shielding;
based on the alarm that the obtained idle physical port supports shielding and the alarm that the idle service port supports shielding, corresponding relations are established between the idle physical port and the alarm that the idle physical port supports shielding and between the idle service port and the alarm that the idle service port supports shielding, and shielding data is formed.
4. The alarm shielding method of claim 1, wherein the shielding data is issued to the network device through a management channel of the network device communication, and the specific steps are as follows: and transmitting the shielding data to the network equipment through a management channel for network equipment communication based on a single-board binary stream protocol, a command line protocol or a YANG protocol.
5. The alarm masking method of claim 1, wherein after masking the alarm generated by the idle port of the network device based on the masking data, further comprising: and storing the shielded alarm information into a database, wherein the alarm information stored into the database supports the query requirement.
6. An alarm masking system, comprising:
the device comprises a loading module, a processing module and a display module, wherein the loading module is used for loading an alarm shielding protocol supported by network equipment, and the alarm shielding protocol is used for indicating a port which can be shielded by the network equipment and realizing shielding of alarm of the port;
the system comprises an acquisition module, a data processing module and a data processing module, wherein the acquisition module is used for acquiring an idle port of the network equipment according to the use conditions of a physical port and a service port of the network equipment, and corresponding the idle port to an alarm shielding protocol supported by the idle port to form shielding data;
the issuing module is used for issuing the shielding data to the network equipment through a management channel for network equipment communication;
and the shielding module is used for shielding the alarm generated by the idle port of the network equipment based on the shielding data.
7. The alarm masking system according to claim 6, wherein said loading module loads an alarm masking protocol supported by the network device, and the specific process includes:
acquiring specified network equipment or all network equipment in the current network based on alarm management needs;
loading an alarm shielding protocol supported by the network equipment;
sequentially listing the acquired network equipment, judging whether the alarm shielding protocol supported by the currently listed network equipment is loaded or not, if not, discarding the loading of the alarm shielding protocol of the currently listed network equipment, and if so, loading the alarm shielding protocol supported by the currently listed network equipment into a memory;
sequentially judging whether shielding configuration parameter items of an alarm shielding protocol in a memory meet equipment port rules, if not, discarding current alarm shielding protocol items, and if so, keeping the alarm shielding protocol items;
and acquiring the alarm shielding protocol reserved in the memory, and establishing a mapping relation between the acquired alarm shielding protocol and the corresponding network equipment.
8. The alarm shielding system according to claim 7, wherein the obtaining module obtains an idle port of the network device according to the usage of the physical port and the service port of the network device, and corresponds the idle port to the alarm shielding protocol supported by the idle port to form the shielding data, and the specific process includes:
acquiring the use conditions of a physical port and a service port of network equipment;
sequentially judging whether the physical port is configured with services, if so, determining that the current physical port is a used physical port, and if not, determining that the current physical port is an idle physical port;
whether the service port is configured with a service is sequentially judged, if yes, the current service port is a used service port, and if not, the current service port is an idle service port;
according to the mapping relation, obtaining the alarm that the used physical port and the idle physical port support shielding, and the alarm that the used service port and the idle service port support shielding;
based on the alarm of the idle physical port supporting shielding and the alarm of the idle service port supporting shielding, corresponding relations are established between the idle physical port and the alarm of the idle physical port supporting shielding and between the idle service port and the alarm of the idle service port supporting shielding, and shielding data is formed.
9. The alarm shielding system of claim 6, wherein the issuing issues the shielding data to the network device through a management channel of the network device communication, specifically: and transmitting the shielding data to the network equipment through a management channel for network equipment communication based on a single-board binary stream protocol, a command line protocol or a YANG protocol.
10. The alarm masking system of claim 6, wherein after the masking module masks the alarm generated by the idle port of the network device based on the masking data, the system further comprises: and storing the shielded alarm information into a database, wherein the alarm information stored into the database supports the query requirement.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910569443.5A CN112152829B (en) | 2019-06-27 | 2019-06-27 | Alarm shielding method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910569443.5A CN112152829B (en) | 2019-06-27 | 2019-06-27 | Alarm shielding method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112152829A CN112152829A (en) | 2020-12-29 |
CN112152829B true CN112152829B (en) | 2022-08-02 |
Family
ID=73868845
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910569443.5A Active CN112152829B (en) | 2019-06-27 | 2019-06-27 | Alarm shielding method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112152829B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007143943A1 (en) * | 2006-06-01 | 2007-12-21 | Huawei Technologies Co., Ltd. | Method, system and network device of centralized maintenance of multiple devices |
CN101170441A (en) * | 2007-11-26 | 2008-04-30 | 中兴通讯股份有限公司 | A method and device for shielding device alarm in network management system |
CN101217315A (en) * | 2008-01-04 | 2008-07-09 | 中兴通讯股份有限公司 | A collocation method and system of alarming shielding |
CN101340692A (en) * | 2008-08-21 | 2009-01-07 | 中国移动通信集团河北有限公司 | Cutover alarm filtering method for mobile communication engineering |
CN102638373A (en) * | 2012-04-18 | 2012-08-15 | 烽火通信科技股份有限公司 | Method for realizing alarm standby of access equipment |
CN105323104A (en) * | 2014-08-04 | 2016-02-10 | 中兴通讯股份有限公司 | Alarm management method and apparatus and packet transmission equipment |
CN107483235A (en) * | 2017-08-01 | 2017-12-15 | 北京市天元网络技术股份有限公司 | A kind of equipment cutover alarm screen method and device |
-
2019
- 2019-06-27 CN CN201910569443.5A patent/CN112152829B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007143943A1 (en) * | 2006-06-01 | 2007-12-21 | Huawei Technologies Co., Ltd. | Method, system and network device of centralized maintenance of multiple devices |
CN101170441A (en) * | 2007-11-26 | 2008-04-30 | 中兴通讯股份有限公司 | A method and device for shielding device alarm in network management system |
CN101217315A (en) * | 2008-01-04 | 2008-07-09 | 中兴通讯股份有限公司 | A collocation method and system of alarming shielding |
CN101340692A (en) * | 2008-08-21 | 2009-01-07 | 中国移动通信集团河北有限公司 | Cutover alarm filtering method for mobile communication engineering |
CN102638373A (en) * | 2012-04-18 | 2012-08-15 | 烽火通信科技股份有限公司 | Method for realizing alarm standby of access equipment |
CN105323104A (en) * | 2014-08-04 | 2016-02-10 | 中兴通讯股份有限公司 | Alarm management method and apparatus and packet transmission equipment |
CN107483235A (en) * | 2017-08-01 | 2017-12-15 | 北京市天元网络技术股份有限公司 | A kind of equipment cutover alarm screen method and device |
Also Published As
Publication number | Publication date |
---|---|
CN112152829A (en) | 2020-12-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11374826B2 (en) | Systems and methods for enhanced monitoring of a distributed computing system | |
US20150215228A1 (en) | Methods, systems, and computer readable media for a cloud-based virtualization orchestrator | |
EP3211827B1 (en) | Alarm processing method and apparatus | |
CN110262941A (en) | Application Container cluster alarm implementation method, system, equipment and storage medium | |
CN106100928B (en) | The transmission method and device of monitoring data applied to data center | |
US20230385287A1 (en) | Real-time dashboards, alerts and analytics for a log intelligence system | |
CN107729213B (en) | Background task monitoring method and device | |
WO2016074412A1 (en) | Compatibility administration method based on network configuration protocol, storage medium and device | |
CN112152829B (en) | Alarm shielding method and system | |
CN109510729B (en) | Implementation method for discovering application topological relation based on CMDB and Netstat | |
CN105471626A (en) | Method and system for distributing storage data of internal memory | |
WO2017023266A1 (en) | Application centric network experience monitoring | |
CN102769495B (en) | A kind of optical fiber access network equipment communication means, Apparatus and system | |
CN111897643A (en) | Thread pool configuration system, method, device and storage medium | |
US20200203026A1 (en) | System of industrial internet of things and information processing device thereof | |
CN112542002A (en) | Car renting system control method and device | |
CN110083595A (en) | A kind of offline reconciliation system, method and apparatus | |
CN111831503A (en) | Monitoring method based on monitoring agent and monitoring agent device | |
CN108021407B (en) | Service processing method and device based on network equipment | |
CN104348662B (en) | A kind of update method and device of equipment state | |
CN112860292A (en) | Configuration management method and device based on application | |
CN106850546B (en) | Map module software organization method of radar terminal | |
CN109840264B (en) | Method and device for auditing access of application program database | |
CN112486656A (en) | Method for realizing wireless ionization wire task scheduling and data downloading | |
CN110633182A (en) | System, method and apparatus for monitoring server stability |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |