CN113055213A - Alarm information management method, alarm information management system and server - Google Patents
Alarm information management method, alarm information management system and server Download PDFInfo
- Publication number
- CN113055213A CN113055213A CN201911381049.5A CN201911381049A CN113055213A CN 113055213 A CN113055213 A CN 113055213A CN 201911381049 A CN201911381049 A CN 201911381049A CN 113055213 A CN113055213 A CN 113055213A
- Authority
- CN
- China
- Prior art keywords
- information
- path
- alarm information
- identifier
- network device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000007726 management method Methods 0.000 title claims abstract description 68
- 238000000034 method Methods 0.000 claims abstract description 46
- 230000008859 change Effects 0.000 claims description 23
- 230000007717 exclusion Effects 0.000 claims description 21
- 230000004044 response Effects 0.000 claims description 8
- 238000004590 computer program Methods 0.000 claims description 3
- 238000012423 maintenance Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 6
- 238000012545 processing Methods 0.000 description 6
- 238000012544 monitoring process Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 238000012216 screening Methods 0.000 description 2
- 230000006872 improvement Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
- 230000007723 transport mechanism Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0604—Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/069—Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The utility model provides an alarm information management method, which is used for managing the alarm information of a plurality of network devices, wherein, the plurality of network devices are grouped in a tree structure in a multilayer way, each leaf node in the tree structure corresponds to one network device, each non-leaf node in the tree structure corresponds to one group, the group corresponding to the non-leaf node comprises the network devices corresponding to all the leaf nodes under the non-leaf node, the method comprises the following steps: responding to the query request, and acquiring corresponding first resource authority information according to a first user identifier in the query request, wherein the first resource authority information comprises: target group information that can access the grouping; and determining the alarm information accessible to the network equipment from a preset alarm information database according to the target group information, wherein the alarm information database stores the belonged groups of different network equipment and the corresponding alarm information. The present disclosure also provides an alarm information management system, a server, and a computer-readable medium.
Description
Technical Field
The disclosed embodiments relate to the field of computer technologies, and relate to an alarm information management method, an alarm information management system, a server, and a computer-readable medium.
Background
With the coming of the 5G network era, the access capability of network equipment is greatly improved, and with the mass increase of alarm information generated by the network equipment, the scale of the alarm information breaks through from ten thousand to hundred million in the transition process from 4G to 5G. The existing alarm information management method is difficult to deal with the alarm information with mass increase, so that the processing speed of the alarm information is low, and the operation and maintenance cost of an operator is high.
Disclosure of Invention
The disclosed embodiment provides an alarm information management method, an alarm information management system, a server and a computer readable medium.
In a first aspect, an embodiment of the present disclosure provides an alarm information management method for managing alarm information of a plurality of network devices, where the plurality of network devices perform multi-layer grouping in a tree structure, each leaf node in the tree structure corresponds to one network device, each non-leaf node in the tree structure corresponds to one group, and the group corresponding to the non-leaf node includes network devices corresponding to all leaf nodes below the non-leaf node, where the method includes:
responding to a query request, and acquiring corresponding first resource authority information according to a first user identifier in the query request, wherein the first resource authority information comprises: target group information that can access the grouping;
and determining alarm information accessible to the network equipment from a preset alarm information database according to the target group information, wherein the alarm information database stores grouping path information of different network equipment and corresponding alarm information.
In some embodiments, the step of determining the alarm information accessible to the network device from a preset alarm information database according to the target group information specifically includes:
matching the grouping path information of the network equipment corresponding to each piece of alarm information in the alarm information base with the target group information respectively;
and taking the alarm information of the network equipment corresponding to the grouping path information successfully matched with the target group information as the alarm information of the accessible network equipment.
In some embodiments, the first resource permission information further comprises: adding exclusion information;
the step of determining the alarm information accessible to the network device from a preset alarm information database according to the target group information specifically includes:
matching the grouping path information of the network equipment corresponding to each piece of alarm information in the alarm information base with the target group information respectively, and taking the network equipment corresponding to the grouping path information successfully matched with the target group information as alternative network equipment;
matching the grouping path information of each alternative network device with the additional exclusion information respectively;
and taking the alarm information of the alternative network equipment corresponding to the packet path information which fails to be matched with the additional exclusion information as the alarm information of the accessible network equipment.
In some embodiments, each node in the tree structure is configured with a corresponding node identifier and a path identifier, and the path identifier of a node is an identifier obtained by sequentially arranging node identifiers of all nodes on a path from a root node to the node;
the target group information includes: at least one path identifier of a node corresponding to an accessible packet, wherein the packet path information of the network device includes: path identification of a node corresponding to the network device;
the step of matching the grouping path information of the network device corresponding to each piece of alarm information in the alarm information base with the target group information specifically includes:
aiming at the path identifier of each network device in the alarm information base, comparing the path identifier of the network device with the path identifiers of the accessible groups respectively;
if the first bits of the path identifier of the network equipment are the same as the path identifier of an accessible group, determining that the group path information of the network equipment is successfully matched with the target group information;
and if the first bits of the path identifier of the network equipment are different from the path identifiers of all the accessible groups, determining that the matching between the grouping path information of the network equipment and the target group information fails.
In some embodiments, each node in the tree structure is configured with a corresponding node identifier and a path identifier, and the path identifier of a node is an identifier obtained by sequentially arranging node identifiers of all nodes on a path from a root node to the node;
the target group information includes: at least one path identifier of a node corresponding to an accessible packet, wherein the packet path information of the network device includes: the path identifier of the node corresponding to the network device, where the additional exclusion information includes: a path identification of the inaccessible node;
the step of matching the packet path information of each of the candidate network devices with the additional exclusion information specifically includes;
aiming at the path identifier of each alternative network device, comparing the path identifier of the network device with the path identifiers of the inaccessible nodes respectively;
if the first bits of the path identifier of the alternative network device are the same as the path identifier of one inaccessible node, determining that the packet path information of the alternative network device is successfully matched with the additional exclusion information;
and if the first bits of the path identifier of the alternative network equipment are different from the path identifiers of all the inaccessible nodes, determining that the packet path information of the network equipment fails to be matched with the additional excluding information.
In some embodiments, before the step of responding to the query request and obtaining the corresponding first resource right information according to the first user identifier in the query request, the method further includes:
collecting first alarm information of first network equipment;
determining first packet path information of the first network device;
and storing the first alarm information and the first packet path information in the alarm information database, and associating the first alarm information and the first packet path information.
In some embodiments, the step of determining first packet path information of the packet of the first network device specifically includes:
inquiring whether grouping path information matched with the first equipment identification of the first network equipment is stored in a cache database;
and when the cache database is inquired to store the grouping path information matched with the first equipment identifier of the first network equipment, taking the inquired grouping path information as the first grouping path information.
In some embodiments, when it is found that the cache database does not store the grouping path information matching with the first device identifier of the first network device, the grouping path information matching with the first device identifier of the first network device is obtained from a preset resource library to serve as the first grouping path information;
and establishing a corresponding relation between the first alarm information and the first packet path information, and storing the corresponding relation in the cache database.
In some embodiments, the method further comprises:
receiving a device group change message, the device group change message comprising: a second device identifier of the second network device and the changed second packet route information;
and correspondingly modifying second packet route information corresponding to the second device identifier in the cache database according to the device packet change message.
In some embodiments, the step of, in response to the query request, obtaining the corresponding first resource right information according to the first user identifier in the query request specifically includes:
acquiring first resource authority information corresponding to the first user identification from a memory database; different user identifications and corresponding resource authority information are stored in the memory database.
In some embodiments, before the step of obtaining the first resource right information corresponding to the first user identifier from the in-memory database, the method further includes:
judging whether first resource authority information corresponding to the first user identification is stored in the memory database;
when judging that the first resource authority information corresponding to the first user identification is stored in the memory database, executing the step of acquiring the first resource authority information corresponding to the first user identification from the memory database;
when it is judged that the first resource permission information corresponding to the first user identification is not stored in the memory database, first resource permission information corresponding to the first user identification is obtained from a preset resource library, and the first user identification and the corresponding first resource permission information are stored in the memory database.
In some embodiments, the method further comprises:
receiving a permission change message, the permission change message comprising: the second user identification and the changed second resource authority information;
and correspondingly modifying second resource authority information corresponding to the second user identification in the memory database according to the authority change message.
In a second aspect, an embodiment of the present disclosure further provides an alarm information management system, including:
an obtaining module, configured to respond to a query request, and obtain corresponding resource permission information according to a first user identifier in the query request, where the resource permission information includes: target group information that can access the grouping;
and the query module is used for querying the alarm information of each network device under the accessible group from a preset alarm information database according to the target group information, wherein the alarm information database stores the group path information of different network devices and the corresponding alarm information.
In a third aspect, an embodiment of the present disclosure further provides a server, including:
one or more processors;
a storage device, on which one or more programs are stored, which, when executed by the one or more processors, cause the one or more processors to implement the alarm information management method provided by the embodiments of the present disclosure.
In a fourth aspect, the present disclosure also provides a computer readable medium, on which a computer program is stored, where the program, when executed by a processor, implements the alarm information management method provided by the embodiments of the present disclosure.
According to the alarm information management method, the alarm information management system, the server and the computer readable medium, when the alarm information is inquired, the alarm information is screened based on the grouped group information to which the network equipment with the authority of the user belongs, compared with the prior art, the alarm information database does not need to be subjected to multiple traversing screening aiming at each target network equipment, so that the inquiry frequency of the alarm information database is reduced, the inquiry rate is improved, the response requirement of an operator is met, and the method and the system can be better suitable for processing mass alarm information in the 5G network era.
Drawings
The accompanying drawings are included to provide a further understanding of the embodiments of the disclosure and are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description serve to explain the principles of the disclosure and not to limit the disclosure. The above and other features and advantages will become more apparent to those skilled in the art by describing in detail exemplary embodiments thereof with reference to the attached drawings, in which:
fig. 1 is a flowchart of an alarm information management method according to an embodiment of the present disclosure;
FIG. 2 is an interface diagram of a tree grouping relationship of network devices shown in the present disclosure;
fig. 3 is a schematic diagram illustrating an information storage manner of an alarm information database according to an embodiment of the present disclosure;
fig. 4a is a flowchart of a specific alternative for implementing step S102 in the embodiment of the present disclosure;
fig. 4b is a schematic diagram illustrating matching of a path identifier of a network device with target group information in an embodiment of the present disclosure;
fig. 4c is a flow chart of another specific alternative for implementing step S102 in the embodiment of the present disclosure;
fig. 5 is a flowchart of another alarm information management method provided in the embodiment of the present disclosure;
FIG. 6 is a flowchart illustrating an embodiment of step S100 according to the present disclosure;
fig. 7 is a flowchart of another alarm information management method provided in the embodiment of the present disclosure;
fig. 8 is a flowchart of another alarm information management method according to an embodiment of the present disclosure;
fig. 9 is a flowchart of a further method for managing alarm information according to the embodiment of the present disclosure;
fig. 10 is a schematic structural diagram of an alarm information management system according to an embodiment of the present disclosure.
Detailed Description
In order to make those skilled in the art better understand the technical solution of the present invention, the following describes the alarm information management method, the alarm information management system, the server and the computer readable medium provided by the present invention in detail with reference to the accompanying drawings.
Example embodiments will be described more fully hereinafter with reference to the accompanying drawings, but which may be embodied in different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It will be understood that, although the terms first, second, etc. may be used herein to describe various elements/instructions/requests, these elements/instructions/requests should not be limited by these terms. These terms are only used to distinguish one element/instruction/request from another element/instruction/request.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and the present disclosure, and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
The alarm information management method is realized based on an alarm information management system, is used for managing alarm information sent by a plurality of network devices accessed to the system, and is particularly suitable for managing the mass alarm information in the 5G network era.
With the coming of the 5G network era, the access quantity of mobile network equipment is greatly improved, the quantity of network management equipment is greatly improved, the intensification of 5G is realized, the network management system of each mainstream operator is upgraded from a city network management to a provincial network management, the number of the network management users is from hundreds to thousands, after the 5G era enters, the era is an era without things and without connection, a large number of equipment is accessed into the network at the moment, the equipment belongs to different industrial fields, and the equipment has different characteristics and requirements, so the network slicing technology is developed.
The 5G slice is to cut a physical network into a plurality of virtual end-to-end networks, each virtual network comprises equipment, access, transmission and core networks in the network, the equipment, the access, the transmission and the core networks are logically independent, any virtual network fails to influence other virtual networks, and each virtual network is like pliers and saws on a Swiss army knife, has different functional characteristics and is oriented to different requirements and services.
The 5G slice has the characteristic of large quantity of hierarchical multi-network devices. The number of the network equipment is improved by orders of magnitude compared with 4G, under the 4G scene, the scale of the network equipment is ten thousand, the alarm number is 10 ten thousand, and when the 5G slice era comes, the scale of the network equipment is hundred million, and the alarm scale also reaches billion. With such a scale of data, how to perform authority control processing on alarm data by a system is a difficult problem.
In practical application, one operation and maintenance user is usually granted with the authority of tens of thousands of network devices, the allocation of the authority can be set by a super administrator, each network device can generate alarm information irregularly, and the operation and maintenance user can monitor the alarm information of the network device with the authority by logging in an alarm information management system for inquiry.
In the prior art, when an alarm information management system provides alarm information for a user in response to a query request of the user, the query is performed based on a cartesian product query method, that is, identifiers of all target network devices to which the user has authority are first acquired, and then, based on each of the identifiers of all the target network devices, alarm information corresponding to the identifiers of all the target network devices is queried from an alarm information database by the cartesian product query method. According to the method, each target network device needs to do one-time traversal query on the alarm information database, and when massive alarm information is processed, the query speed is low, so that the response requirement of an operator cannot be met (the query result cannot be returned within a few seconds). In order to solve the problem, the present disclosure provides a new alarm information management method.
Fig. 1 is a flowchart of a method for managing alarm information according to an embodiment of the present disclosure, and fig. 2 is an interface diagram of a tree grouping relationship of network devices shown in the present disclosure, where, as shown in fig. 1 and fig. 2, in the embodiment of the present disclosure, a plurality of network devices perform multi-layer grouping in a tree structure, each leaf node in the tree structure corresponds to one network device, each non-leaf node in the tree structure corresponds to one group, and the group corresponding to the non-leaf node includes network devices corresponding to all leaf nodes below the non-leaf node.
With continued reference to fig. 1, the alarm information management method provided by the embodiment of the present disclosure includes:
step S101, responding to the query request, and acquiring corresponding first resource authority information according to the first user identification in the query request.
When an operation and maintenance user needs to query alarm information of a network device having an authority, sending a query request to an alarm information management system, where the query request includes a first user identifier, and the alarm information management system, in response to the query request, obtains, according to the first user identifier, first resource authority information corresponding to the first user identifier, where the first resource authority information is used to describe an authority that a user corresponding to the first user identifier has to access the network device, and in particular, in this disclosure, the first resource authority information includes: target group information of the packet for describing a packet state of the network device to which the user has authority in the tree structure can be accessed. Next, a description is given to a method for representing target group information by way of example, with continued reference to fig. 2, as shown in fig. 2, fig. 2 shows that the network devices to which the user has authority are all network devices under the B group (B11-B13, B21 and B22), at this time, the target group information may be "/B", and if the network devices to which the user has authority are only all network devices included in the B11 subgroup under the B group, the target group information is "/B11".
According to the method and the system, the permission of the user for the network equipment can be set by a super manager logging system, after the setting is completed, the system generates resource permission information according to the setting operation of the super manager, and the resource permission information and the user identification are correspondingly stored.
And step S102, determining the alarm information which can access the network equipment from a preset alarm information database according to the target group information.
The accessible network device refers to a network device which a user has authority and can access alarm information of the user.
Fig. 3 is a schematic diagram illustrating an information storage manner of an alarm information database according to an embodiment of the present disclosure, as shown in fig. 3, in the embodiment of the present disclosure, grouping path information of different network devices and alarm information corresponding to the grouping path information are stored in the alarm information database, that is, a plurality of pieces of alarm information are stored in the alarm information database, each piece of alarm information belongs to one network device, and the alarm information may specifically include: information such as equipment number (MEID), alarm ID, alarm code and alarm level; meanwhile, the alarm information database also stores the path identifier of each network device.
Of course, in some embodiments, the alarm information of the network device may also be stored not in one table but separately from the packet path information, but with a mapping relationship.
In some embodiments, each node in the tree structure is configured with a corresponding node identifier (e.g., A, B, C, B1, B2, B11, B12, B13, etc. in fig. 2 and 3) and a path identifier, and the path identifier of the node is an identifier obtained by sequentially arranging node identifiers of all nodes on a path from the root node to the node (e.g.,/a 1/a11,/a 1/a12 …/B2/B23, etc. in fig. 3). In some embodiments, the Root node in the tree structure may be represented by a node identification "Root". All the non-root nodes correspond to the same root node, and based on the root node, when the path identifier of the non-root node is designed, the node identifier of the root node does not need to be carried.
After acquiring the target group information, the alarm information management system screens out the alarm information of the network equipment (i.e. accessible network equipment) of the accessible group to which the target group information belongs from the alarm information database based on the target group information to provide the alarm information for the user.
According to the alarm information management method provided by the embodiment of the disclosure, when the alarm information is queried, the alarm information is screened based on the grouped group information to which the network device to which the user has authority belongs, and compared with the prior art, the alarm information database does not need to be subjected to multiple traversal screening aiming at each target network device, so that the query times of the alarm information database is reduced, the query speed is further improved, the response requirement of an operator is met, and the method can be better suitable for processing mass alarm information in the 5G network era.
In some embodiments, the specific process of step S102 is: and matching the grouping path information of the network equipment corresponding to each piece of alarm information in the alarm information base with the target group information, and confirming the alarm information which is successfully matched as the alarm information which can access each network equipment under grouping. Here, "matching" refers to determining whether a corresponding network device belongs to an accessible packet according to packet path information.
Fig. 4a is a flowchart of a specific alternative for implementing step S102 in the embodiment of the present disclosure, and as shown in fig. 4a, step S102 includes:
step S1021a, matching the grouping path information of the network device corresponding to each piece of alarm information in the alarm information base with the target group information, respectively.
In some embodiments, step S1021a specifically includes: and aiming at the path identifier of each network device in the alarm information base, comparing the path identifier of the network device with the path identifiers of the accessible groups respectively. If the first bits of the path identifier of the network equipment are the same as the path identifier of an accessible group, determining that the group path information of the network equipment is successfully matched with the target group information; and if the first bits of the path identifier of the network equipment are detected to be different from the path identifiers of all the accessible groups, determining that the matching between the grouping path information of the network equipment and the target group information fails. That is, a "prefix match" manner may be adopted to detect whether the packet path information of the network device matches the target group information.
Fig. 4B is a schematic diagram illustrating matching of the path identifier of the network device with the target group information in the embodiment of the disclosure, as shown in fig. 4B, if the target group information is "/B", the path identifiers may be determined from the alarm information base through step S1021a to match with "/B" in accordance with the path identifiers/B1/B11,/B1/B12,/B1/B13,/B2/B22,/B2/B23.
Step S1022a, the alarm information of the network device corresponding to the grouping path information successfully matched with the target group information is used as the alarm information accessible to the network device.
It should be noted that, because the technical solution of the embodiment of the present disclosure determines the accessible network device based on a "prefix matching" manner, even if network devices in the accessible group used for the rights item are newly added, deleted, and modified, the user accessible network device can be automatically changed without changing the user rights. For example, the user's accessible grouping authority is "/B", and when a new network device is added under the grouping "/B/B11/B13/", the user can automatically have the alarm authority of the added network device.
Fig. 4c is a flowchart of another specific alternative for implementing step S102 in this embodiment of the disclosure, as shown in fig. 4c, in some embodiments, network devices to which users have authority have decentralization, at this time, the first resource authority information of the users includes not only target group information of accessible groups, but also: additional exclusion information is added. For example, with continued reference to fig. 2, if the network devices to which the user has the right are B11 and B12 under the B1 subgroup, instead of B13, at this time, the target group information may be "/B11", and the additional exclusion information may be "B13".
In some embodiments, the additional exclusion information includes: path identification of inaccessible nodes (including nodes corresponding to packets and nodes corresponding to network devices in the tree structure).
Step S102 specifically includes:
step S1021b, matching the grouping path information of the network device corresponding to each piece of alarm information in the alarm information base with the target group information, and using the network device corresponding to the grouping path information successfully matched with the target group information as the alternative network device.
In some embodiments, step S1021b specifically includes: aiming at the path identifier of each network device in the alarm information base, comparing the path identifier of the network device with the path identifiers of the accessible groups respectively; if the first bits of the path identifier of the network equipment are the same as the path identifier of an accessible group, determining that the group path information of the network equipment is successfully matched with the target group information; and if the first bits of the path identifier of the network equipment are detected to be different from the path identifiers of all the accessible groups, determining that the matching between the grouping path information of the network equipment and the target group information fails.
Step S1022b is to match the packet path information of each candidate network device with the additional exclusion information.
In some embodiments, step S1022b specifically includes: aiming at the path identifier of each alternative network device, comparing the path identifier of the network device with the path identifiers of the inaccessible nodes respectively; if the first bits of the path identifier of the alternative network device are the same as the path identifier of one inaccessible node, determining that the packet path information of the alternative network device is successfully matched with the additional exclusion information; and if the first bits of the path identifier of the alternative network equipment are different from the path identifiers of all the inaccessible nodes, determining that the packet path information of the network equipment fails to be matched with the additional excluding information. That is, the "prefix match" may be used to detect whether the packet path information of the alternative network device matches the additional exclusion information.
Step S1023b, the alarm information of the candidate network device corresponding to the packet path information for which the matching with the additional excluding information failed is taken as the alarm information of the accessible network device.
In the embodiment shown in fig. 4c, not only the network device matching the target group information is selected, but also the network device matching the additional exclusion information is removed (i.e., the network device determining that the packet path information is successfully matched with the target group information and fails to match with the additional exclusion information). By adding the additional exclusion information in the resource authority information, the network equipment which the user has the authority can be further ensured to be accurately limited, so that the user can conveniently inquire.
Fig. 5 is another alarm information management method provided in the embodiment of the present disclosure, as shown in fig. 5, in some embodiments, before step S101, the method further includes:
and step S100a, collecting first alarm information of the first network equipment.
Step S100b, determining first packet path information of the first network device.
Step S100c, storing the first alarm information and the first packet path information in an alarm information database, and associating the first alarm information and the first packet path information.
In the embodiment of the disclosure, the alarm information management system further refines the alarm information in the alarm information database periodically or aperiodically, and specifically, the alarm information management system periodically or aperiodically acquires first alarm information of the first network device reported by the southbound gateway, determines first packet path information of the first network device, and further associates and stores the first alarm information and the first packet path information in the alarm information database, so that when the alarm information is queried based on a query request of a user, the alarm information matched with the target group information can be queried from the alarm information database based on the target group information.
It should be noted that, the reference to "first" in the embodiments of the present disclosure is not specific, but exists only as a distinguishing identifier, and the number of the first network devices may be one or more.
In some embodiments, as shown in fig. 6, step S100b may specifically include:
step S100b1, querying whether the cache database stores the packet path information matching with the first device identifier of the first network device.
When the packet path information matching the first device identifier of the first network device is stored in the cache database, step S100b2 is executed.
Step S100b2, the packet path information queried from the buffer database is used as the first packet path information.
In the embodiment of the present disclosure, when obtaining the packet path information matched with the first device identifier of the first network device, the first query may be performed from a cache database, where the cache database is preset and is used for caching the device identifiers of the network devices and the packet path information corresponding to the device identifiers of the network devices, and in practical applications, the cache database may cache part of the device identifiers of the network devices and the packet path information corresponding to the device identifiers, and certainly may also cache all the device identifiers of the network devices and the packet path information corresponding to the device identifiers, and the cache database may be set in a memory of the system. By querying from the cache database, unnecessary interface calls (for example, calling a resource library interface to obtain related data from the resource library, which will be introduced later) can be avoided, so that the query efficiency can be further improved.
With continued reference to fig. 6, in some embodiments, in step S100b1, when it is found that no packet path information matching the first device identification of the first network device is stored in the cache database, then steps S100b3 and S100b4 are performed.
Step S100b3, obtaining the packet path information matching with the first device identifier of the first network device from a preset resource library, as the first packet path information.
And step S100b4, establishing a corresponding relation between the first alarm information and the first packet path information, and storing the corresponding relation in a cache database.
In this disclosure, the repository is a database preset by the system for storing the relevant information of all network devices accessing the alarm information management system, and specifically, the device identification of the network device and the corresponding grouping path information are stored in the buffer database, when the device identification of all the network devices and the corresponding grouping path information are not stored in the buffer database, it may be queried in step S100b1 that no packet path information matching the first device identification of the first network device is stored in the cache database, and, at this time, an interface of the repository is invoked to query packet path information of the first network device from the repository, and, after the query is finished, the device identification of the network device queried from the resource library and the corresponding grouping path information thereof are stored in a cache database, the improvement of the cache database is realized, so that the cache database is convenient to use in the subsequent inquiry process.
Fig. 7 is a flowchart of another alarm information management method provided in an embodiment of the present disclosure, and as shown in fig. 7, in some embodiments, the method further includes:
step S100d, receiving a device grouping change message, where the device grouping change message includes: a second device identification of the second network device and the altered second packet route information.
Step S100e, according to the device grouping change message, correspondingly modifying the second grouping route information corresponding to the second device identifier in the cache database.
In the embodiment of the present disclosure, when the device identifier of the network device and the corresponding packet path information are cached in the cache database, the system further monitors whether the packet path information of the network device stored in the cache database changes, and when it is monitored that the network device in the cache database changes, the system correspondingly modifies the packet path information of the corresponding network device stored in the cache database, so that the data in the cache database is consistent with the data in the resource library, thereby facilitating subsequent query and use.
It should be noted that, in the embodiment of the present disclosure, the "second" is not specific, but exists only as a distinguishing identifier, and the "second network device" and the aforementioned "first network device" may be the same network device or different network devices.
Fig. 8 is a flowchart of another alarm information management method provided in an embodiment of the present disclosure, and as shown in fig. 8, in some embodiments, step S101 may specifically include:
step S1011, obtain the first resource authority information corresponding to the first user identifier from the memory database.
According to the method and the device, different user identifications and corresponding resource authority information are stored in the memory database, and the first resource authority information corresponding to the first user identification is obtained from the memory database, so that unnecessary interface calling can be further avoided, and the query efficiency is improved.
With continued reference to fig. 8, in some embodiments, when the first resource right information is available from the in-memory database, before step S1011, the method may further include:
step S1010, determining whether the memory database stores the first resource permission information corresponding to the first user identifier.
When it is determined that the first resource permission information corresponding to the first user identifier is stored in the memory database, step S1011 is executed; when it is determined that the first resource permission information corresponding to the first user identifier is not stored in the memory database, step S1012 is executed.
Step S1012, obtaining first resource right information corresponding to the first user identifier from a preset resource library, and storing the first user identifier and the corresponding first resource right information in an in-memory database.
In the disclosed embodiment, when the user identifiers of all users and the resource authority information corresponding to the user identifiers are not stored in the memory database, the system judges in advance whether a first user identifier to be acquired and first resource authority information corresponding to the first user identifier exist in the memory database, when the first user identifier to be acquired and the first resource authority information corresponding to the first user identifier are judged to be stored in the memory database, the first resource authority information corresponding to the first user identifier is directly acquired from the memory database, and when the first user identifier to be acquired and the first resource authority information corresponding to the first user identifier are judged not to be stored in the memory database, an interface of the resource database is called to acquire the first resource authority information corresponding to the first user identifier from the resource database, and further the first user identifier and the first resource authority information corresponding to the first user identifier are stored in the memory database, therefore, the memory database is perfected so as to provide service for subsequent query by the memory database.
It should be noted that, in the present disclosure, in addition to the related information of the network device accessing the system, the resource library also stores the user identifier and the resource authority information corresponding to the user identifier, and after the super administrator completes the user authority configuration, the user identifier and the resource authority information corresponding to the user identifier are automatically or manually stored in the resource library by the system.
In some embodiments, as shown in fig. 9, when the first resource right information is available from the in-memory database, the method further includes:
step S103, receiving an authority change message, wherein the authority change message comprises: and the second user identification and the changed second resource authority information.
And step S104, according to the permission change message, correspondingly modifying second resource permission information corresponding to the second user identification in the memory database.
In the embodiment of the present disclosure, when the user identifier and the resource permission information corresponding to the user identifier are stored in the memory database, the alarm information management system further monitors the resource permission information corresponding to the user identifier stored in the memory database. In practical application, when resource authority information of a user changes, an authority change message is generated, and the authority change message includes: it should be noted that, the second user identifier and the changed second resource right information are not specific, but exist only as a distinguishing identifier, and the second user identifier may be the same user identifier as the first user identifier or different user identifiers; when the alarm information management system receives the permission change message, whether the second user identification and the resource permission information corresponding to the second user identification are stored in the memory database or not is inquired according to the second user identification contained in the permission change message, and when the second user identification is inquired to be stored in the memory database, the second resource permission information contained in the permission change message is updated to the resource permission information corresponding to the second user identification in the memory database so as to complete the updating of the data of the memory database, so that the memory database can be conveniently used in the subsequent inquiry process.
The following describes the alarm information management method provided by the present disclosure in a specific application scenario.
In the scenario 1, a certain telecom operator needs an alarm monitoring function, and a certain operation and maintenance person is assigned with a network device alarm data monitoring right below a certain network device group. The specific process is as follows:
a network equipment data preparation stage:
step 101, the engineering personnel prepare the resource data of the existing network equipment of the operator in advance.
And 102, logging in a network management system by engineering personnel, and entering a network equipment data maintenance page.
And 103, recording the prepared data into a network management system.
And (3) permission allocation stage:
step 201, an administrator logs in a network management system and enters an authority management page.
Step 202, selecting a user, clicking 'authority management', and entering an authority distribution page.
And step 203, checking the group with the authority according to the service requirement of the monitoring personnel.
And a permission viewing stage:
step 301, the user logs in the network management system and enters an alarm monitoring page.
Step 302, the user can only inquire the alarm with the authority in the alarm monitoring page.
In addition, the alarm information management method provided by the present disclosure may be implemented based on a new alarm information management system, but may also be completed by upgrading on an original old alarm information management system, as follows.
Scene 2, an operator has a set of alarm information management system, but as the 5G era comes, the network devices, the alarm data volume and the number of users all increase in geometric level, and a set of complete scheme flow is needed to solve the processing capacity of the alarm system under the large data volume, and based on the alarm information management method provided by the present disclosure, the following upgrading process can be performed:
the first step is as follows: and upgrading the data in the old alarm system, namely enriching the grouping information into alarm data.
The second step is that: a new alarm system is deployed.
The third step: and upgrading the operation and maintenance user authority data, and updating the grouping information into the user authority data.
The fourth step: and logging in an alarm system by the operation and maintenance user to monitor the current alarm.
It should be noted that the alarm information management method provided by the present disclosure is not specifically limited to the application field, and is applicable to the alarm information management method provided by the present disclosure in any application scenario in which a large amount of alarm information needs to be processed, for example, the alarm information management method provided by the present disclosure may be applicable to the fields of telecommunications industry, power industry, and the like.
An embodiment of the present disclosure further provides an alarm information management system, as shown in fig. 10, where the system includes: an acquisition module 11 and a query module 12.
The obtaining module 11 is configured to respond to the query request, and obtain corresponding resource permission information according to a first user identifier in the query request, where the resource permission information includes: target group information that can access the grouping; the query module 12 is configured to query the alarm information of each network device under the accessible group from a preset alarm information database according to the target group information, where the alarm information database stores the group path information of different network devices and the alarm information corresponding to the different network devices.
An embodiment of the present disclosure further provides a server, including:
one or more processors;
the alarm information management system comprises a storage device, one or more programs stored on the storage device, and a control unit, wherein the one or more programs, when executed by the one or more processors, enable the one or more processors to realize the alarm information management method provided by the embodiment of the disclosure.
The present disclosure also provides a computer readable medium on which a computer program is stored, wherein the program, when executed by a processor, implements the alarm information management method provided by the embodiments of the present disclosure.
It will be understood by those of ordinary skill in the art that all or some of the steps of the methods, systems, functional modules/units in the devices disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware implementation, the division between functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be performed by several physical components in cooperation. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as is well known to those of ordinary skill in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, Digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by a computer. In addition, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media as known to those skilled in the art.
Example embodiments have been disclosed herein, and although specific terms are employed, they are used and should be interpreted in a generic and descriptive sense only and not for purposes of limitation. In some instances, features, characteristics and/or elements described in connection with a particular embodiment may be used alone or in combination with features, characteristics and/or elements described in connection with other embodiments, unless expressly stated otherwise, as would be apparent to one skilled in the art. Accordingly, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the scope of the disclosure as set forth in the appended claims.
Claims (15)
1. A management method of alarm information is used for managing the alarm information of a plurality of network devices, wherein the network devices are grouped in a tree structure in a multi-layer way, each leaf node in the tree structure corresponds to one network device, each non-leaf node in the tree structure corresponds to one group, and the group corresponding to the non-leaf node comprises the network devices corresponding to all the leaf nodes under the non-leaf node, and the method comprises the following steps:
responding to a query request, and acquiring corresponding first resource authority information according to a first user identifier in the query request, wherein the first resource authority information comprises: target group information that can access the grouping;
and determining alarm information accessible to the network equipment from a preset alarm information database according to the target group information, wherein the alarm information database stores grouping path information of different network equipment and corresponding alarm information.
2. The method according to claim 1, wherein the step of determining the alarm information accessible to the network device from a preset alarm information database according to the target group information specifically includes:
matching the grouping path information of the network equipment corresponding to each piece of alarm information in the alarm information base with the target group information respectively;
and taking the alarm information of the network equipment corresponding to the grouping path information successfully matched with the target group information as the alarm information of the accessible network equipment.
3. The method of claim 1, wherein the first resource permission information further comprises: adding exclusion information;
the step of determining the alarm information accessible to the network device from a preset alarm information database according to the target group information specifically includes:
matching the grouping path information of the network equipment corresponding to each piece of alarm information in the alarm information base with the target group information respectively, and taking the network equipment corresponding to the grouping path information successfully matched with the target group information as alternative network equipment;
matching the grouping path information of each alternative network device with the additional exclusion information respectively;
and taking the alarm information of the alternative network equipment corresponding to the packet path information which fails to be matched with the additional exclusion information as the alarm information of the accessible network equipment.
4. The method according to claim 2 or 3, wherein each node in the tree structure is configured with a corresponding node identifier and a path identifier, and the path identifier of a node is an identifier obtained by sequentially arranging node identifiers of all nodes on a path from a root node to the node;
the target group information includes: at least one path identifier of a node corresponding to an accessible packet, wherein the packet path information of the network device includes: path identification of a node corresponding to the network device;
the step of matching the grouping path information of the network device corresponding to each piece of alarm information in the alarm information base with the target group information specifically includes:
aiming at the path identifier of each network device in the alarm information base, comparing the path identifier of the network device with the path identifiers of the accessible groups respectively;
if the first bits of the path identifier of the network equipment are the same as the path identifier of an accessible group, determining that the group path information of the network equipment is successfully matched with the target group information;
and if the first bits of the path identifier of the network equipment are different from the path identifiers of all the accessible groups, determining that the matching between the grouping path information of the network equipment and the target group information fails.
5. The method according to claim 3, wherein each node in the tree structure is configured with a corresponding node identifier and a path identifier, and the path identifier of a node is an identifier obtained by sequentially arranging node identifiers of all nodes on a path from a root node to the node;
the target group information includes: at least one path identifier of a node corresponding to an accessible packet, wherein the packet path information of the network device includes: the path identifier of the node corresponding to the network device, where the additional exclusion information includes: a path identification of the inaccessible node;
the step of matching the packet path information of each of the candidate network devices with the additional exclusion information specifically includes;
aiming at the path identifier of each alternative network device, comparing the path identifier of the network device with the path identifiers of the inaccessible nodes respectively;
if the first bits of the path identifier of the alternative network device are the same as the path identifier of one inaccessible node, determining that the packet path information of the alternative network device is successfully matched with the additional exclusion information;
and if the first bits of the path identifier of the alternative network equipment are different from the path identifiers of all the inaccessible nodes, determining that the packet path information of the network equipment fails to be matched with the additional excluding information.
6. The method of claim 1, wherein, before the step of obtaining corresponding first resource right information according to the first user identifier in the query request in response to the query request, the method further comprises:
collecting first alarm information of first network equipment;
determining first packet path information for the first network device;
and storing the first alarm information and the first packet path information in the alarm information database, and associating the first alarm information and the first packet path information.
7. The method according to claim 6, wherein the step of determining the first packet path information of the first network device specifically comprises:
inquiring whether grouping path information matched with the first equipment identification of the first network equipment is stored in a cache database;
and when the cache database is inquired to store the grouping path information matched with the first equipment identifier of the first network equipment, taking the inquired grouping path information as the first grouping path information.
8. The method according to claim 7, wherein when it is found that the cache database does not store the packet path information matching the first device identifier of the first network device, the packet path information matching the first device identifier of the first network device is obtained from a preset resource library as the first packet path information;
and establishing a corresponding relation between the first alarm information and the first packet path information, and storing the corresponding relation in the cache database.
9. The method of claim 7, wherein the method further comprises:
receiving a device group change message, the device group change message comprising: a second device identifier of the second network device and the changed second packet route information;
and correspondingly modifying second packet route information corresponding to the second device identifier in the cache database according to the device packet change message.
10. The method according to claim 1, wherein the step of, in response to the query request, obtaining the corresponding first resource right information according to the first user identifier in the query request specifically includes:
acquiring first resource authority information corresponding to the first user identification from a memory database; different user identifications and corresponding resource authority information are stored in the memory database.
11. The method of claim 10, wherein before the step of obtaining the first resource right information corresponding to the first user identifier from the in-memory database, the method further comprises:
judging whether first resource authority information corresponding to the first user identification is stored in the memory database;
when judging that the first resource authority information corresponding to the first user identification is stored in the memory database, executing the step of acquiring the first resource authority information corresponding to the first user identification from the memory database;
when it is judged that the first resource permission information corresponding to the first user identification is not stored in the memory database, first resource permission information corresponding to the first user identification is obtained from a preset resource library, and the first user identification and the corresponding first resource permission information are stored in the memory database.
12. The method of claim 10, wherein the method further comprises:
receiving a permission change message, the permission change message comprising: the second user identification and the changed second resource authority information;
and correspondingly modifying second resource authority information corresponding to the second user identification in the memory database according to the authority change message.
13. An alarm information management system for managing alarm information of a plurality of network devices, wherein the plurality of network devices are grouped in a tree structure in multiple layers, each leaf node in the tree structure corresponds to one network device, each non-leaf node in the tree structure corresponds to one group, and the group corresponding to the non-leaf node comprises the network devices corresponding to all the leaf nodes under the non-leaf node, the system comprising:
an obtaining module, configured to respond to a query request, and obtain corresponding resource permission information according to a first user identifier in the query request, where the resource permission information includes: target group information that can access the grouping;
and the query module is used for querying the alarm information of each network device under the accessible group from a preset alarm information database according to the target group information, wherein the alarm information database stores the group path information of different network devices and the corresponding alarm information.
14. A server, comprising:
one or more processors;
storage means having one or more programs stored thereon which, when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1-12.
15. A computer-readable medium, on which a computer program is stored, wherein the program, when executed by a processor, implements the method of any one of claims 1-12.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911381049.5A CN113055213B (en) | 2019-12-27 | 2019-12-27 | Alarm information management method, alarm information management system and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911381049.5A CN113055213B (en) | 2019-12-27 | 2019-12-27 | Alarm information management method, alarm information management system and server |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113055213A true CN113055213A (en) | 2021-06-29 |
CN113055213B CN113055213B (en) | 2024-05-28 |
Family
ID=76506912
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911381049.5A Active CN113055213B (en) | 2019-12-27 | 2019-12-27 | Alarm information management method, alarm information management system and server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113055213B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114826877A (en) * | 2022-02-24 | 2022-07-29 | 苏州浪潮智能科技有限公司 | Asset alarm processing method and device, computer equipment and storage medium |
CN116225859A (en) * | 2023-05-04 | 2023-06-06 | 北京全路通信信号研究设计院集团有限公司 | Operation and maintenance platform server data maintenance method and device |
Citations (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1983962A (en) * | 2006-06-08 | 2007-06-20 | 华为技术有限公司 | Extended network managing system and method |
CN101163032A (en) * | 2006-10-11 | 2008-04-16 | 中兴通讯股份有限公司 | Method of managing alarm inquiry |
US20100080129A1 (en) * | 2008-09-26 | 2010-04-01 | Robert Strahan | Network troubleshooting using path topology |
US20100146057A1 (en) * | 2007-12-06 | 2010-06-10 | Suhayya Abu-Hakima | Alert Broadcasting to a Plurality of Diverse Communications Devices |
CN101917282A (en) * | 2010-07-20 | 2010-12-15 | 中兴通讯股份有限公司 | Method, device and system for processing alarm shielding rules |
CN102308522A (en) * | 2011-07-21 | 2012-01-04 | 华为技术有限公司 | Method, device and system for locating network fault |
CN102546274A (en) * | 2010-12-20 | 2012-07-04 | 中国移动通信集团广西有限公司 | Alarm monitoring method and alarm monitoring equipment in communication service |
CN102664760A (en) * | 2012-04-28 | 2012-09-12 | 华为技术有限公司 | Alarming method for communication system, equipment and communication system |
CN103001803A (en) * | 2012-12-10 | 2013-03-27 | 上海斐讯数据通信技术有限公司 | Method and system for achieving right management in network management |
WO2013067831A1 (en) * | 2011-11-09 | 2013-05-16 | 华为技术有限公司 | Network alarm processing method, device and system thereof |
CN104219088A (en) * | 2014-08-21 | 2014-12-17 | 南京邮电大学 | Hive-based network alarm information OLAP method |
CN105763522A (en) * | 2014-12-18 | 2016-07-13 | 中兴通讯股份有限公司 | Authorization processing method and device |
WO2016119436A1 (en) * | 2015-01-27 | 2016-08-04 | 中兴通讯股份有限公司 | Alarm processing method and device, and controller |
US20170141949A1 (en) * | 2015-11-13 | 2017-05-18 | Le Holdings (Beijing) Co., Ltd. | Method and apparatus for processing alarm information in cloud computing |
CN107800559A (en) * | 2016-09-07 | 2018-03-13 | 中兴通讯股份有限公司 | A kind of software defined network SDN alert processing method and device |
CN108199860A (en) * | 2016-12-08 | 2018-06-22 | 中国移动通信有限公司研究院 | A kind of alert processing method and the network equipment |
CN108769051A (en) * | 2018-06-11 | 2018-11-06 | 中国人民解放军战略支援部队信息工程大学 | A kind of network intrusions situation intention appraisal procedure based on alert correlation |
CN110149227A (en) * | 2019-05-16 | 2019-08-20 | 平安科技(深圳)有限公司 | The method and device of network alarm |
-
2019
- 2019-12-27 CN CN201911381049.5A patent/CN113055213B/en active Active
Patent Citations (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1983962A (en) * | 2006-06-08 | 2007-06-20 | 华为技术有限公司 | Extended network managing system and method |
CN101163032A (en) * | 2006-10-11 | 2008-04-16 | 中兴通讯股份有限公司 | Method of managing alarm inquiry |
US20100146057A1 (en) * | 2007-12-06 | 2010-06-10 | Suhayya Abu-Hakima | Alert Broadcasting to a Plurality of Diverse Communications Devices |
US20100080129A1 (en) * | 2008-09-26 | 2010-04-01 | Robert Strahan | Network troubleshooting using path topology |
CN101917282A (en) * | 2010-07-20 | 2010-12-15 | 中兴通讯股份有限公司 | Method, device and system for processing alarm shielding rules |
CN102546274A (en) * | 2010-12-20 | 2012-07-04 | 中国移动通信集团广西有限公司 | Alarm monitoring method and alarm monitoring equipment in communication service |
CN102308522A (en) * | 2011-07-21 | 2012-01-04 | 华为技术有限公司 | Method, device and system for locating network fault |
WO2013067831A1 (en) * | 2011-11-09 | 2013-05-16 | 华为技术有限公司 | Network alarm processing method, device and system thereof |
CN102664760A (en) * | 2012-04-28 | 2012-09-12 | 华为技术有限公司 | Alarming method for communication system, equipment and communication system |
CN103001803A (en) * | 2012-12-10 | 2013-03-27 | 上海斐讯数据通信技术有限公司 | Method and system for achieving right management in network management |
CN104219088A (en) * | 2014-08-21 | 2014-12-17 | 南京邮电大学 | Hive-based network alarm information OLAP method |
CN105763522A (en) * | 2014-12-18 | 2016-07-13 | 中兴通讯股份有限公司 | Authorization processing method and device |
WO2016119436A1 (en) * | 2015-01-27 | 2016-08-04 | 中兴通讯股份有限公司 | Alarm processing method and device, and controller |
US20170141949A1 (en) * | 2015-11-13 | 2017-05-18 | Le Holdings (Beijing) Co., Ltd. | Method and apparatus for processing alarm information in cloud computing |
CN107800559A (en) * | 2016-09-07 | 2018-03-13 | 中兴通讯股份有限公司 | A kind of software defined network SDN alert processing method and device |
CN108199860A (en) * | 2016-12-08 | 2018-06-22 | 中国移动通信有限公司研究院 | A kind of alert processing method and the network equipment |
CN108769051A (en) * | 2018-06-11 | 2018-11-06 | 中国人民解放军战略支援部队信息工程大学 | A kind of network intrusions situation intention appraisal procedure based on alert correlation |
CN110149227A (en) * | 2019-05-16 | 2019-08-20 | 平安科技(深圳)有限公司 | The method and device of network alarm |
Non-Patent Citations (6)
Title |
---|
N. PROPHESS RAJ KUMAR等: "Energy alert BS selection in tree based IoT with cooperative green computing sensor network", 《2017 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION (ICSPC)》 * |
吕兆辉;: "城市轨道交通通信集中告警系统研究", 铁路计算机应用, no. 02 * |
张海阔;陆忠华;刘芳;李井泉;孙辰军;王珏;: "面向海量告警数据的并行处理系统设计与实现", 计算机工程与设计, no. 02 * |
杨会龙;: "数字电视网络前端设备实时告警系统的设计", 信息化建设, no. 03, 15 March 2016 (2016-03-15) * |
王东蕊;刘晓丽;: "电力通信告警综合管理系统", 电力系统通信, no. 12 * |
龚树峰;: "电信综合集中告警系统", 电信快报, no. 11, 25 December 2005 (2005-12-25) * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114826877A (en) * | 2022-02-24 | 2022-07-29 | 苏州浪潮智能科技有限公司 | Asset alarm processing method and device, computer equipment and storage medium |
CN114826877B (en) * | 2022-02-24 | 2023-07-14 | 苏州浪潮智能科技有限公司 | Asset alarm processing method, device, computer equipment and storage medium |
CN116225859A (en) * | 2023-05-04 | 2023-06-06 | 北京全路通信信号研究设计院集团有限公司 | Operation and maintenance platform server data maintenance method and device |
Also Published As
Publication number | Publication date |
---|---|
CN113055213B (en) | 2024-05-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109165136B (en) | Terminal operation data monitoring method, terminal device and medium | |
EP1589691B1 (en) | Method, system and apparatus for managing computer identity | |
CN112506870B (en) | Data warehouse increment updating method and device and computer equipment | |
CN105512283A (en) | Data quality management and control method and device | |
CN108063685B (en) | Log analysis method and device | |
CN113055213B (en) | Alarm information management method, alarm information management system and server | |
US11082494B2 (en) | Cross storage protocol access response for object data stores | |
CN111740868A (en) | Alarm data processing method and device and storage medium | |
CN104468207A (en) | Terminal management method, device and system | |
CN103812688A (en) | Alarm determining method and device | |
CN110198227B (en) | Log file processing method and device, storage medium and electronic device | |
JP5353682B2 (en) | Configuration information management apparatus, distributed information management system, distributed information management method, and distributed information management program | |
CN110493326B (en) | Zookeeper-based cluster configuration file management system and method | |
CN114584454A (en) | Server information processing method and device, electronic equipment and storage medium | |
CN109960695B (en) | Management method and device for database in cloud computing system | |
CN113535730A (en) | Index updating method and system for search engine, electronic equipment and storage medium | |
CN110935168A (en) | Distributed ID generation method, device and equipment for global uniform architecture | |
US8433699B1 (en) | Object identity and addressability | |
CN105550300B (en) | Method and device for issuing message | |
CN112118140B (en) | CDN configuration method, CDN configuration device, computer equipment and storage medium | |
CN118245811B (en) | Model parameter management method and device, storage medium and electronic equipment | |
US12047451B2 (en) | IoT system and data collection control method | |
CN115242641B (en) | Method and device for previewing strategy issuing result and computer equipment | |
WO2017094194A1 (en) | Computer system and device management method | |
CN116305288B (en) | Method, device, equipment and storage medium for isolating database resources |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |