CN116582461A - Method and device for evaluating network operation influence - Google Patents

Method and device for evaluating network operation influence Download PDF

Info

Publication number
CN116582461A
CN116582461A CN202310672161.4A CN202310672161A CN116582461A CN 116582461 A CN116582461 A CN 116582461A CN 202310672161 A CN202310672161 A CN 202310672161A CN 116582461 A CN116582461 A CN 116582461A
Authority
CN
China
Prior art keywords
information
network
alarm
determining
log
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310672161.4A
Other languages
Chinese (zh)
Inventor
陈璇
钱玉东
杨勇
周婧
赵静
何恒超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202310672161.4A priority Critical patent/CN116582461A/en
Publication of CN116582461A publication Critical patent/CN116582461A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/069Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application provides a method and a device for evaluating network operation influence, relates to the technical field of Internet, and can timely and accurately evaluate the influence of target network operation on a target network. The method comprises the following steps: acquiring equipment information at a first acquisition time to obtain first equipment information; acquiring equipment information at a second acquisition time to obtain second equipment information; and then determining the network health of the target network according to the first equipment information and the second equipment information. The embodiment of the application is used in the process of evaluating the influence of the operation of the target network on the target network.

Description

Method and device for evaluating network operation influence
Technical Field
The present application relates to the field of internet technologies, and in particular, to a method and apparatus for evaluating network operation influence.
Background
When a network device is accessed to a target network or any network operation such as cutting, upgrading, moving or network returning is performed on the network device contained in the target network, a certain influence is usually caused on the target network. Therefore, how to timely and accurately evaluate the influence of the target network operation on the target network is a urgent problem to be solved.
Disclosure of Invention
The application provides a method and a device for evaluating the influence of network operation, which can timely and accurately evaluate the influence of target network operation on a target network.
In order to achieve the above purpose, the application adopts the following technical scheme:
in a first aspect, the present application provides a method of assessing the impact of network operation, the method comprising:
acquiring equipment information at a first acquisition time to obtain first equipment information; the first acquisition time is the time before the execution time of the target network operation; the target network operation is any network operation;
acquiring equipment information at a second acquisition time to obtain second equipment information; the second acquisition time is the time after the execution time of the target network operation;
determining the network health of the target network according to the first equipment information and the second equipment information; network health is used to characterize the impact of target network operation on the target network.
Based on the above technical solution, the method for evaluating the network operation influence provided by the embodiment of the present application may acquire device information at a first acquisition time to obtain first device information; acquiring equipment information at a second acquisition time to obtain second equipment information; and then determining the network health of the target network according to the first equipment information and the second equipment information, wherein the network health is used for representing the influence of the target network operation on the target network, the target network operation is any network operation, the first acquisition time is the time before the execution time of the target network operation, and the second acquisition time is the time after the execution time of the target network operation. By the method, the influence of the target network operation on the target network can be timely and accurately evaluated.
Optionally, the device information includes device alarm information and device log information; the first device information includes first device alert information and first log information; the second device information includes second device alert information and second device log information.
Optionally, determining the network health of the target network according to the first device information and the second device information includes:
determining a first network health degree according to the first equipment alarm information and the first equipment log information;
determining a second network health degree according to the second equipment alarm information and the second equipment log information;
and determining the network health degree of the target network according to the difference value of the first network health degree and the second network health degree and the network health degree threshold value.
Optionally, determining the first network health degree according to the first device alarm information and the first device log information includes:
determining a first alarm health degree according to the first equipment alarm information;
determining a first log health degree according to the first equipment log information;
and determining the first network health degree according to the first alarm health degree and the first log health degree.
Optionally, determining the first alarm health degree according to the first device alarm information includes:
extracting target alarm information from the first equipment alarm information;
determining the alarm category of the target alarm information according to a preset alarm classification rule;
and determining the first alarm health degree according to the alarm category of the target alarm information and the alarm score corresponding to the alarm category.
Optionally, determining the first log health degree according to the first device log information includes:
extracting target log information from the first equipment log information;
and determining the first log health degree according to the log label and the log score corresponding to the log label contained in the target log information.
Optionally, before the device information is acquired at the first acquisition time to obtain the first device information, the method further includes:
acquiring preset execution time of target network operation;
determining the time corresponding to N hours before the execution time as a first acquisition time; n is a positive number greater than 0;
and determining the time corresponding to N hours after the execution time as a second acquisition time.
Optionally, after determining the network health, the method further includes:
if the network health represents that the influence of the target network operation on the target network is in an abnormal range, determining a corresponding maintenance scheme according to the first equipment information and the second equipment information;
and sending the maintenance scheme to the user terminal.
In a second aspect, the present application provides an apparatus for assessing the impact of network operations, the apparatus comprising:
the first acquisition unit is used for acquiring equipment information at a first acquisition time to obtain first equipment information; the first acquisition time is the time before the execution time of the target network operation; the target network operation is any network operation;
the second acquisition unit is used for acquiring equipment information at a second acquisition time to obtain second equipment information; the second acquisition time is the time after the execution time of the target network operation;
the determining unit is used for determining the network health degree of the target network according to the first equipment information and the second equipment information; network health is used to characterize the impact of target network operation on the target network.
Optionally, the device information includes device alarm information and device log information; the first device information includes first device alert information and first log information; the second device information includes second device alert information and second device log information.
In a third aspect, the present application provides an apparatus for assessing the impact of network operations, the apparatus comprising: a processor and a communication interface; the communication interface is coupled to a processor for running a computer program or instructions to implement a method of assessing the impact of network operation as described in any one of the possible implementations of the first aspect and the first aspect.
In a fourth aspect, the application provides a computer readable storage medium having instructions stored therein which, when run on a terminal, cause the terminal to perform a method of assessing the impact of network operation as described in any one of the possible implementations of the first aspect and the first aspect.
In a fifth aspect, embodiments of the present application provide a computer program product comprising instructions which, when run on an apparatus for assessing the effects of network operation, cause the apparatus for assessing the effects of network operation to perform a method of assessing the effects of network operation as described in any one of the possible implementations of the first aspect and the first aspect.
In a sixth aspect, embodiments of the present application provide a chip comprising a processor and a communication interface, the communication interface and the processor being coupled, the processor being for running a computer program or instructions to implement a method of assessing the impact of network operation as described in any one of the possible implementations of the first aspect and the first aspect.
Specifically, the chip provided in the embodiment of the application further includes a memory, which is used for storing a computer program or instructions.
Drawings
FIG. 1 is a block diagram of a method for evaluating network operation impact according to an embodiment of the present application;
fig. 2 is a flowchart of a method for evaluating network operation effects according to an embodiment of the present application;
FIG. 3 is a schematic flow chart of determining a first acquisition time and a second acquisition time according to an embodiment of the present application;
FIG. 4 is a block diagram of a structure for storing information of a target network operation in a database according to an embodiment of the present application;
FIG. 5 is a flowchart illustrating another method for evaluating network operation impact according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an apparatus for evaluating network operation influence according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of another apparatus for evaluating network operation influence according to an embodiment of the present application.
Detailed Description
The following describes in detail a method and apparatus for evaluating network operation impact according to an embodiment of the present application with reference to the accompanying drawings.
The term "and/or" is herein merely an association relationship describing an associated object, meaning that there may be three relationships, e.g., a and/or B, may represent: a exists alone, A and B exist together, and B exists alone.
The terms "first" and "second" and the like in the description and in the drawings are used for distinguishing between different objects or between different processes of the same object and not for describing a particular order of objects.
Furthermore, references to the terms "comprising" and "having" and any variations thereof in the description of the present application are intended to cover a non-exclusive inclusion. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those listed but may optionally include other steps or elements not listed or inherent to such process, method, article, or apparatus.
It should be noted that, in the embodiments of the present application, words such as "exemplary" or "such as" are used to mean serving as an example, instance, or illustration. Any embodiment or design described herein as "exemplary" or "e.g." in an embodiment should not be taken as preferred or advantageous over other embodiments or designs. Rather, the use of words such as "exemplary" or "such as" is intended to present related concepts in a concrete fashion.
When the network device is accessed to the target network or any network operation such as cutting, upgrading, moving or network returning is performed on the network device contained in the target network, a certain influence is usually caused on the target network, so that the target network needs to be maintained to ensure that the target network can stably run.
However, at present, when maintaining a target network, generally, alarm information generated by each network device included in the target network is sent to a maintainer, the maintainer screens the target alarm information from the alarm information of each network device according to working experience, and determines a root cause of a problem affecting the target network according to the target alarm information. Not only is a great deal of time and human resources wasted, but also the influence of the operation of the target network on the target network cannot be evaluated timely and accurately.
In order to solve the above technical problems, in the method for evaluating the network operation influence provided by the embodiment of the present application, device information may be acquired at a first acquisition time to obtain first device information; acquiring equipment information at a second acquisition time to obtain second equipment information; and then determining the network health of the target network according to the first equipment information and the second equipment information, wherein the network health is used for representing the influence of the target network operation on the target network, the target network operation is any network operation, the first acquisition time is the time before the execution time of the target network operation, and the second acquisition time is the time after the execution time of the target network operation. By the method, a large amount of time and manpower resources can be saved, and the influence of the target network operation on the target network can be timely and accurately evaluated.
Fig. 1 is a block diagram of a method for evaluating an influence of network operation according to an embodiment of the present application, where, as shown in fig. 1, the block diagram may include: the content determination module 101, the content acquisition module 102, the acquisition module 103, the evaluation module 104, the judgment module 105, the information push module 106, the database 107, and the threshold determination module 108.
The content determination module 101 may be configured to determine a collection time corresponding to each network operation, and store the collection time corresponding to each network operation in the database 107. The content acquisition module 102 may acquire an acquisition time corresponding to the target network operation from the database 107, and determine a first acquisition time and a second acquisition time corresponding to the target network operation according to the acquired acquisition time corresponding to the target network operation, where the first acquisition time is a time before an execution time of the target network operation, and the second acquisition time is a time after the execution time of the target network operation, and after determining the first acquisition time and the second acquisition time, the acquisition module 103 may acquire device information at the first acquisition time to obtain first device information, and acquire device information at the second acquisition time to obtain second device information.
After obtaining the first device information and the second device information in the above manner, the acquisition module 103 may store the first device information and the second device information in the database 107. The evaluation module 104 may acquire the first device information and the second device information from the database 107, and evaluate the first device information to obtain a first network health degree; evaluating according to the second equipment information to obtain a second network health degree; after obtaining the first network health and the second network health, the evaluation module 104 may store the first network health and the second network health in the database 107.
The determining module 105 may obtain the first network health degree and the second network health degree from the database 107, and determine the network health degree of the target network according to the difference value between the first network health degree and the second network health degree and a predetermined network health degree threshold value. After determining the network health of the target network, the information pushing module 106 may also send an information notification to the maintenance personnel. Wherein, the network health is used for representing the influence of the operation of the target network on the target network. The network health threshold is determined by a threshold determination module 108.
In the embodiment of the present application, the database 107 may include a main database and a standby database, and when the main database fails, the standby database may be used to store data, so as to ensure smooth operation of a method for evaluating the network operation influence provided in the embodiment of the present application.
In the embodiment of the present application, when the information push module 106 sends the information notification to the maintenance personnel, the notification may be sent to the maintenance personnel through notification software (such as a sms, etc.), which is not limited in this application.
In the embodiment of the application, the notification software can comprise main notification software (such as a short message and the like) and standby notification software (such as social software and the like), and when the main notification software fails, the standby notification software can be adopted to send a notification like a maintainer, so that the stable operation of the method for evaluating the network operation influence provided by the embodiment of the application is ensured.
Fig. 2 is a flowchart of a method for evaluating network operation influence according to an embodiment of the present application, as shown in fig. 2, where the method includes:
step S201, collecting equipment information at a first collecting time to obtain first equipment information.
The first acquisition time is a time before the execution time of the target network operation.
In an embodiment of the present application, the device information may include, but is not limited to, device alarm information and device log information; the first device information may include, but is not limited to, first device alert information and first device log information, which is not limited by the present application. The following description will be given by taking the example that the first device information includes the first device alarm information and the first device log information.
Step S202, collecting equipment information at a second collecting time to obtain second equipment information.
The second acquisition time is a time after the execution time of the target network operation.
In the embodiment of the present application, the second device information includes second device alarm information and second device log information, which is not limited by the present application. The second device information including the second device alarm information and the second device log information is described below as an example.
Step S203, determining the network health of the target network according to the first device information and the second device information.
Wherein, the network health is used for representing the influence of the operation of the target network on the target network.
In an alternative embodiment, before performing step S201 and step S202 (i.e. before collecting the device information), the first acquisition time and the second acquisition time need to be determined, specifically, the first acquisition time and the second acquisition time may be determined with reference to the method shown in fig. 3, and the method includes:
step S301, acquiring a preset execution time of the target network operation.
Before the preset execution time of the target network operation is acquired, information such as the execution time of the target network operation may be stored in the database with reference to the structural block diagram shown in fig. 4. As shown in fig. 4, the structural block diagram may include a database, a web crawler module, and a parsing module. Specifically, the login mode of the work order website corresponding to each network operation contained in the database can be obtained through the web crawler technology contained in the web crawler module, after the login mode of each work order website is obtained, each work order website can be logged in through the web crawler technology, each work order website is monitored, and the work order content contained in each work order website is obtained. After the work order content contained in any work order website is obtained, the work order content can be analyzed through a preset work order analysis rule, the execution time of the corresponding network operation is obtained, and the information such as the execution time corresponding to the execution of the network operation is stored in a database.
The work order websites corresponding to the network operations contained in the database are prestored in the database by the user.
After the execution time corresponding to each network operation is stored in the database in the mode, the execution time of the target network operation can be obtained from the database.
In the embodiment of the present application, the execution time of the target network operation may be a time (e.g. 24:00) or a time period (e.g. 24:00 to 6:00), which is not limited in the present application.
In step S302, a time corresponding to N hours before the execution time is determined as the first acquisition time.
In step S303, a time corresponding to N hours after the execution time is determined as the second acquisition time.
Wherein N is a positive number greater than 0.
Illustratively, in one embodiment, assuming that the acquired target network operation is performed at 24:00 to 6:00 and N is 2, 22:00 may be determined as the first acquisition time and 8:00 may be determined as the second acquisition time.
In the embodiment of the present application, the execution sequence of step S302 and step S303 may be that step S302 is executed first and then step S303 is executed; step S303 may be executed first, and then step S302 may be executed; the step S302 and the step S303 may be performed simultaneously, which is not limited in the present application.
Fig. 5 is a flowchart of another method for evaluating the influence of network operations according to an embodiment of the present application, as shown in fig. 5, where the method includes:
in step S501, a first acquisition time and a second acquisition time are determined.
Specifically, the first acquisition time and the second acquisition time may be determined by referring to the method shown in fig. 3, which is not described herein.
Step S502, equipment alarm information and equipment log information are acquired at a first acquisition time, and first equipment alarm information and first equipment log information are obtained.
In the embodiment of the present application, the device log information may include field information such as device basic information (for example, an operating version of a device, license information, patch information, system time, etc.), an operating state of the device (for example, a board operating state, a CPU (central processing unit, central processing unit) state, a memory occupancy rate), an interface state, a service state (for example, IP (Internet Protocol, international interconnection protocol) address pool information, BFD (Bidirectional Forwarding Detection ) Session state, OSPF (Open Shortest Path First, open shortest path first protocol)/BGP (Border Gateway Protocol ) neighbor state, etc.).
Step S503, determining a first network health degree according to the first device alarm information and the first device log information.
In an alternative embodiment, in the process of determining the first network health degree according to the first device alarm information and the first device log information, the first alarm health degree may be determined according to the first device alarm information; determining a first log health degree according to the first equipment log information; and then determining the first network health degree according to the first alarm health degree and the first log health degree.
Specifically, when determining the first alarm health degree according to the first equipment alarm information, the target alarm information can be extracted from the first equipment alarm information; determining the alarm category of the target alarm information according to a preset alarm classification rule; and then determining the first alarm health degree according to the alarm category of the target alarm information and the alarm score corresponding to the alarm category.
In an embodiment, the device alert information may be monitored and obtained in real time through a northbound interface (the northbound interface is an interface for a manufacturer or an operator to access and manage a network), so as to obtain the first device alert information, and the first device alert information is extracted according to a preset alert information extraction rule, so as to obtain the target alert information. After the target alarm information is obtained, the alarm category of the target alarm information can be determined according to a preset alarm classification rule, for example, the alarm category of the target alarm information can be determined according to the equipment type, the alarm title, the alarm frequency and the alarm category. The alarm categories may include four categories of severe alarms, primary alarms, secondary alarms and warning alarms.
After the alarm category of the target alarm information is determined in the above manner, the first alarm health degree can be determined according to the alarm category of the target alarm information and the alarm score corresponding to the alarm category. Illustratively, assume an initial alarm health of 100. The alarm score corresponding to the serious alarm is 4a, the alarm score corresponding to the main alarm is 3a, the alarm score corresponding to the secondary alarm is 2a, and the alarm score corresponding to the warning alarm is a, namely the serious alarm is that the main alarm is that the secondary alarm is that the warning alarm=4:3:2:1; assuming that the target alarm information includes one serious alarm information and two main alarm information, the first alarm health degree=100-4 a-2×3a.
In the embodiment of the present application, a may be 5 or 10, which is not limited in the present application.
When determining the first log health degree according to the first equipment log information, extracting target log information from the first equipment log information; and determining the first log health degree according to the log label and the log score corresponding to the log label contained in the target log information.
In an embodiment, device log information may be monitored and obtained in real time through a northbound interface to obtain first device log information, and the first device log information is extracted according to a preset log information extraction rule to obtain target log information, where the target log information is log information containing abnormal information.
After the target log information is obtained, the first log health degree can be determined according to the log label and the log score corresponding to the log label contained in the target log information. The log label may include three labels of "abnormal", "failed" and "locked". Assume that the journal score corresponding to the "abormal" tag is 5b, the journal score corresponding to the "failed" tag is 3b, and the journal score corresponding to the "locked" tag is b. I.e. "abormal" tag: "failed" tag: "locked" tag = 5:3:1. Assuming that the target log information includes one log information with a log label of "failed" and two log information with log labels of "locked" labels, the first log health=100-3 b-2*b.
In the embodiment of the present application, b may be 5 or 10, which is not limited in the present application.
After the first alarm health degree and the first log health degree are obtained in the above manner, the first network health degree can be determined according to the first alarm health degree and the first log health degree. For example, the first network health may be determined according to the formula first network health = first alert health =50% + first log health ×50%.
Step S504, collecting the equipment alarm information and the equipment log information at the second collecting time to obtain the second equipment alarm information and the second equipment log information.
Step S505, determining a second network health degree according to the second device alarm information and the second device log information.
Specifically, the method for determining the second network health degree according to the second device alarm information and the second device log information is similar to the method for determining the first network health degree described above, and will not be described herein.
Step S506, whether the difference value between the first network health degree and the second network health degree is larger than a network health degree threshold value; if yes, go to step S507; if not, step S509 is performed.
After determining the first network health degree and the second network health degree through steps S501 to S505, a difference between the first network health degree and the second network health degree may be determined, and the network health degree of the target network may be determined according to the difference between the first network health degree and the second network health degree and a predetermined network health degree threshold.
For example, in one embodiment, if the difference between the first network health and the second network health is less than or equal to the network health threshold, the network health of the target network may be set to 1, indicating that the impact of the target network operation on the target network is within a normal range; if the difference between the first network health and the second network health is greater than the network health threshold, the network health of the target network may be set to 0, indicating that the influence of the target network operation on the target network is within an abnormal range.
Step S507, corresponding maintenance schemes are determined according to the first equipment information and the second equipment information.
Step S508, the maintenance scheme is sent to the user terminal.
In an optional implementation manner, in the process of determining the corresponding maintenance scheme according to the first device information and the second device information, a fault cause of the target network device may be determined according to the first device alarm information and the first device log information included in the first device information and the second device alarm information and the second device log information included in the second device information from a pre-established network operation anomaly information base, and a maintenance scheme corresponding to the fault cause may be determined from a database, and if the corresponding maintenance scheme may be found, the maintenance scheme may be sent to the user terminal, so that a serviceman may repair the target network according to the maintenance scheme. If no corresponding maintenance scheme is found, after the maintenance personnel receives the alarm information, the maintenance personnel can maintain the target network according to the alarm information and the historical maintenance experience, and store the corresponding maintenance scheme into a network operation abnormality information base.
In an optional implementation manner, before the maintenance scheme or the alarm information is sent to the user terminal, the target network device to be maintained is determined according to the first device alarm information and the first device log information contained in the first device information and the second device alarm information and the second device log information contained in the second device information, and after the target network device is determined, the maintenance scheme or the alarm information can be sent to the user terminal corresponding to the target network device.
Step S509, a prompt message is sent to the user terminal.
Specifically, if the difference between the first network health degree and the second network health degree is smaller than or equal to the network health degree threshold, the influence of the network operation on the target network is indicated to be in a normal range, and maintenance is not needed, so that prompt information that the influence of the network operation on the target network is in the normal range can be sent to the user terminal.
In an alternative embodiment, the network health threshold may be obtained through a pre-trained threshold regression model, specifically, the network health of N hours before the network operation and the network health of N hours after the network operation may be input into the pre-trained threshold regression model, the threshold is determined through the control function of the threshold variable, so that there is a significant difference between the threshold variable higher than the threshold and the threshold variable lower than the threshold, and the threshold is determined as the network health threshold.
This is when training the threshold regression model. The difference value between the network health degree of the network N hours before the network operation and the network health degree of the network N hours after the network operation which are successful in history can be used as a sample to be input into an initial threshold regression model for training until the model converges, and a trained threshold regression model is obtained.
Fig. 6 is a schematic structural diagram of an apparatus for evaluating network operation influence according to an embodiment of the present application, as shown in fig. 6, the apparatus includes:
the first collection unit 601 is configured to collect device information at a first collection time, to obtain first device information; the first acquisition time is the time before the execution time of the target network operation; the target network operation is any network operation;
a second acquisition unit 602, configured to acquire device information at a second acquisition time, to obtain second device information; the second acquisition time is the time after the execution time of the target network operation;
a determining unit 603, configured to determine a network health degree of the target network according to the first device information and the second device information; network health is used to characterize the impact of target network operation on the target network.
Optionally, the device information includes device alarm information and device log information; the first device information comprises first device alarm information and first device log information; the second device information includes second device alert information and second device log information.
Optionally, the determining unit 603 is specifically configured to:
determining a first network health degree according to the first equipment alarm information and the first equipment log information;
determining a second network health degree according to the second equipment alarm information and the second equipment log information;
and determining the network health degree of the target network according to the difference value of the first network health degree and the second network health degree and the network health degree threshold value.
Optionally, the determining unit 603 is specifically configured to:
determining a first alarm health degree according to the first equipment alarm information;
determining a first log health degree according to the first equipment log information;
and determining the first network health degree according to the first alarm health degree and the first log health degree.
Optionally, the determining unit 603 is specifically configured to:
extracting target alarm information from the first equipment alarm information;
determining the alarm category of the target alarm information according to a preset alarm classification rule;
and determining the first alarm health degree according to the alarm category of the target alarm information and the alarm score corresponding to the alarm category.
Optionally, the determining unit 603 is specifically configured to:
extracting target log information from the first equipment log information;
and determining the first log health degree according to the log label and the log score corresponding to the log label contained in the target log information.
Optionally, before the first acquisition unit 601, the apparatus further comprises a processing unit, specifically configured to:
acquiring preset execution time of target network operation;
determining the time corresponding to N hours before the execution time as a first acquisition time; n is a positive number greater than 0;
and determining the time corresponding to N hours after the execution time as a second acquisition time.
Optionally, before the determining unit 603, the apparatus further comprises a sending unit, specifically configured to:
if the influence of network health characterization network operation on the target network is in an abnormal range, determining a corresponding maintenance scheme according to the first equipment information and the second equipment information;
and sending the maintenance scheme to the user terminal.
Fig. 7 shows a further possible structural schematic of the device for evaluating the influence of network operation involved in the above-described embodiment. The apparatus for evaluating network operation effects includes: a processor 701 and a communication interface 702. The processor 701 is configured to control and manage actions of the device for evaluating network operation effects, and the communication interface 702 is configured to support communication between the device for evaluating network operation effects and other network entities. The means for assessing the influence of network operation may further comprise a memory 703 and a bus 704, the memory 703 being arranged to store program code and data for the means for assessing the influence of network operation.
Wherein the memory 703 may be a memory or the like in a device for evaluating the impact of network operation, which may include volatile memory, such as random access memory; the memory may also include non-volatile memory, such as read-only memory, flash memory, hard disk or solid state disk; the memory may also comprise a combination of the above types of memories.
The processor 701 may be implemented or executed with the various exemplary logic blocks, modules, and circuits described in connection with this disclosure. The processor may be a central processing unit, a general purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic device, a transistor logic device, a hardware component, or any combination thereof. Which may implement or perform the various exemplary logic blocks, modules and circuits described in connection with this disclosure. The processor may also be a combination that performs the function of a computation, e.g., a combination comprising one or more microprocessors, a combination of a DSP and a microprocessor, etc.
Bus 704 may be an extended industry standard architecture (Extended Industry Standard Architecture, EISA) bus or the like. The bus 704 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in fig. 7, but not only one bus or one type of bus.
From the foregoing description of the embodiments, it will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of functional modules is illustrated, and in practical application, the above-described functional allocation may be implemented by different functional modules according to needs, i.e. the internal structure of the apparatus is divided into different functional modules to implement all or part of the functions described above. The specific working processes of the above-described systems, devices and units may refer to the corresponding processes in the foregoing method embodiments, which are not described herein.
Embodiments of the present application provide a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of assessing the impact of network operations in the method embodiments described above.
The embodiment of the application also provides a computer readable storage medium, wherein instructions are stored in the computer readable storage medium, and when the instructions run on a computer, the computer is caused to execute the method for evaluating the network operation influence in the method flow shown in the method embodiment.
The computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the computer-readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access Memory (Random Access Memory, RAM), a Read-Only Memory (ROM), an erasable programmable Read-Only Memory (Erasable Programmable Read Only Memory, EPROM), a register, a hard disk, an optical fiber, a portable compact disc Read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing, or any other form of computer readable storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an application specific integrated circuit (Application Specific Integrated Circuit, ASIC). In embodiments of the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
Embodiments of the present application provide a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of assessing the impact of network operations described in embodiments of the present application.
Since the apparatus for evaluating the influence of network operations, the computer readable storage medium, and the computer program product in the embodiments of the present application can be applied to the above-mentioned method, the technical effects that can be obtained by the method can also refer to the above-mentioned method embodiments, and the embodiments of the present application are not described herein again.
In the several embodiments provided by the present application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some interface, indirect coupling or communication connection of devices or units, electrical, mechanical, or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The present application is not limited to the above embodiments, and any changes or substitutions within the technical scope of the present application should be covered by the scope of the present application. Therefore, the protection scope of the present application should be subject to the protection scope of the claims.

Claims (12)

1. A method of assessing the impact of network operation, the method comprising:
acquiring equipment information at a first acquisition time to obtain first equipment information; the first acquisition time is the time before the execution time of the target network operation; the target network operation is any network operation;
acquiring equipment information at a second acquisition time to obtain second equipment information; the second acquisition time is a time after the execution time of the target network operation;
determining the network health of a target network according to the first equipment information and the second equipment information; the network health is used to characterize the impact of the target network operation on the target network.
2. The method of claim 1, wherein the device information includes device alert information and device log information; the first device information comprises first device alarm information and first device log information; the second device information includes second device alert information and second device log information.
3. The method of claim 2, wherein determining the network health of the target network based on the first device information and the second device information comprises:
determining a first network health degree according to the first equipment alarm information and the first equipment log information;
determining a second network health degree according to the second equipment alarm information and the second equipment log information;
and determining the network health degree of the target network according to the difference value of the first network health degree and the second network health degree and a network health degree threshold value.
4. The method of claim 3, wherein determining a first network health from the first device alert information and the first device log information comprises:
determining a first alarm health degree according to the first equipment alarm information;
determining a first log health degree according to the first equipment log information;
and determining the first network health degree according to the first alarm health degree and the first log health degree.
5. The method of claim 4, wherein determining a first alert health based on the first device alert information comprises:
extracting target alarm information from the first equipment alarm information;
determining the alarm category of the target alarm information according to a preset alarm classification rule;
and determining the first alarm health degree according to the alarm category of the target alarm information and the alarm score corresponding to the alarm category.
6. The method of claim 4, wherein determining a first log health from the first device log information comprises:
extracting target log information from the first equipment log information;
and determining the first log health degree according to the log label contained in the target log information and the log score corresponding to the log label.
7. The method of claim 1, wherein the acquiring the device information at the first acquisition time, before the obtaining the first device information, further comprises:
acquiring preset execution time of the target network operation;
determining the time corresponding to the N hours before the execution time as the first acquisition time; the N is a positive number greater than 0;
and determining the time corresponding to N hours after the execution time as the second acquisition time.
8. The method of claim 1, wherein after the determining the network health, the method further comprises:
if the network health represents that the influence of the target network operation on the target network is in an abnormal range, determining a corresponding maintenance scheme according to the first equipment information and the second equipment information;
and sending the maintenance scheme to the user terminal.
9. An apparatus for evaluating the impact of network operation, the apparatus comprising:
the first acquisition unit is used for acquiring equipment information at a first acquisition time to obtain first equipment information; the first acquisition time is the time before the execution time of the target network operation; the target network operation is any network operation;
the second acquisition unit is used for acquiring equipment information at a second acquisition time to obtain second equipment information; the second acquisition time is a time after the execution time of the target network operation;
a determining unit, configured to determine a network health degree of a target network according to the first device information and the second device information; the network health is used to characterize the impact of the target network operation on the target network.
10. The apparatus of claim 9, wherein the device information comprises device alert information and device log information; the first device information comprises first device alarm information and first device log information; the second device information includes second device alert information and second device log information.
11. An apparatus for evaluating the impact of network operation, comprising: a processor and a communication interface; the communication interface being coupled to the processor for running a computer program or instructions to implement the method of assessing the impact of network operation according to any one of claims 1-8.
12. A computer readable storage medium having instructions stored therein, which when executed by a computer performs the method of assessing the impact of network operation of any one of the preceding claims 1-8.
CN202310672161.4A 2023-06-07 2023-06-07 Method and device for evaluating network operation influence Pending CN116582461A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310672161.4A CN116582461A (en) 2023-06-07 2023-06-07 Method and device for evaluating network operation influence

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310672161.4A CN116582461A (en) 2023-06-07 2023-06-07 Method and device for evaluating network operation influence

Publications (1)

Publication Number Publication Date
CN116582461A true CN116582461A (en) 2023-08-11

Family

ID=87539666

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310672161.4A Pending CN116582461A (en) 2023-06-07 2023-06-07 Method and device for evaluating network operation influence

Country Status (1)

Country Link
CN (1) CN116582461A (en)

Similar Documents

Publication Publication Date Title
CN110213068B (en) Message middleware monitoring method and related equipment
US20110276836A1 (en) Performance analysis of applications
CN110601898A (en) Abnormity early warning method, abnormity early warning device, server and storage medium
CN105159964A (en) Log monitoring method and system
US9710122B1 (en) Customer support interface
CN109491819A (en) A kind of method and system of diagnosis server failure
JP6413537B2 (en) Predictive failure notification device, predictive notification method, predictive notification program
CN111176202A (en) Safety management method, device, terminal equipment and medium for industrial control network
CN110837852A (en) Fault diagnosis method and device for rolling mill gearbox and terminal equipment
CN114363151A (en) Fault detection method and device, electronic equipment and storage medium
JPWO2019116418A1 (en) Fault analyzer, fault analysis method and fault analysis program
CN111738463A (en) Operation and maintenance method, device, system, electronic equipment and storage medium
CN109818808B (en) Fault diagnosis method and device and electronic equipment
CN116582415A (en) Evaluation method and device for health degree of network equipment
CN109309575A (en) A kind of method and apparatus of determining monitoring system health degree
CN116582461A (en) Method and device for evaluating network operation influence
CN110955587A (en) Method and device for determining equipment to be replaced
CN116415851A (en) Intelligent identification and evaluation method for facility operation and maintenance performance indexes based on deep learning
JP2017211806A (en) Communication monitoring method, security management system, and program
CN114327988B (en) Visual network fault relation determination method and device
CN112583825B (en) Method and device for detecting abnormality of industrial system
JP2022037107A (en) Failure analysis device, failure analysis method, and failure analysis program
CN108616423A (en) A kind of talk-around device monitoring method and device
CN113807697A (en) Alarm association-based order dispatching method and device
CN112799957A (en) User behavior based fault handling method, system, device and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination