CN117650977A - Alarm routing method, device, equipment and storage medium - Google Patents

Alarm routing method, device, equipment and storage medium Download PDF

Info

Publication number
CN117650977A
CN117650977A CN202311734373.7A CN202311734373A CN117650977A CN 117650977 A CN117650977 A CN 117650977A CN 202311734373 A CN202311734373 A CN 202311734373A CN 117650977 A CN117650977 A CN 117650977A
Authority
CN
China
Prior art keywords
alarm
routing
internet protocol
alert
protocol address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311734373.7A
Other languages
Chinese (zh)
Inventor
李恒强
李�瑞
吴天昊
张凯
曹家豪
庄孺义
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202311734373.7A priority Critical patent/CN117650977A/en
Publication of CN117650977A publication Critical patent/CN117650977A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0686Additional information in the notification, e.g. enhancement of specific meta-data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/302Route determination based on requested QoS
    • H04L45/306Route determination based on the nature of the carried application
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/74Address processing for routing

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application provides an alarm routing method, an alarm routing device, alarm routing equipment and a storage medium. The method comprises the following steps: generating an alarm and an alarm identification of the alarm according to a pre-stored alarm template; analyzing the alarm identification to obtain the IP address, the alarm level and the alarm period of the alarm; customizing an alarm routing strategy according to the Internet protocol address, the alarm level and the alarm period; the alarms are transmitted according to the routing policy so as to be transmitted to the processing end related to the internet protocol address. The method solves the technical problems that the manual classification is long in time consumption and easy to cause errors, and the indiscriminate processing of all alarms wastes a lot of resources, so that the alarm forwarding efficiency is relatively low.

Description

Alarm routing method, device, equipment and storage medium
Technical Field
The present disclosure relates to communication technologies, and in particular, to an alarm routing method, an alarm routing device, and a storage medium.
Background
In the existing alarm system, the generated alarm data is sent to the processing end through an application programming interface (Application Programming Interface, API) in an indiscriminate, non-routing strategy and non-shunt mode.
However, in the face of massive user terminals and devices, the alarms generated therewith are massive, the alarms are directly sent to the processing terminal, and the technicians at the processing terminal need to consume a great deal of time to judge manually and then make a processing scheme. While some alarms do not actually fail, the special handling of these alarms wastes a lot of resources.
Meanwhile, the equipment for generating the alarm has wide technical fields, and alarms in different technical fields are different in alarm formats and also need to be solved by technicians in corresponding fields. Therefore, the processing end needs to manually classify the alarms first, and then sends the classified alarms to the technicians in the corresponding field for processing. The manual classification is long in time consumption and easy to cause errors, and the indiscriminate processing of all alarms wastes a lot of resources, which leads to the technical problem of relatively low alarm forwarding efficiency.
Disclosure of Invention
The application provides an alarm routing method, an alarm routing device, alarm routing equipment and an alarm routing storage medium, which are used for solving the problems that in the prior art, a processing end needs to manually classify alarms first and then sends the classified alarms to a person in the corresponding field for processing. The manual classification is long in time consumption and easy to cause errors, and the indiscriminate processing of all alarms wastes a lot of resources, which leads to the technical problem of relatively low alarm forwarding efficiency.
In a first aspect, the present application provides an alert routing method, including:
generating an alarm and an alarm identification of the alarm according to a pre-stored alarm template;
analyzing the alarm identification to obtain the IP address, the alarm level and the alarm period of the alarm;
customizing an alarm routing strategy according to the Internet protocol address, the alarm level and the alarm period;
the alarms are transmitted according to the routing policy so as to be transmitted to the processing end related to the internet protocol address.
In the above preferred technical solution of the alert routing method, customizing an alert routing policy according to an internet protocol address, an alert level and an alert period, including:
according to a pre-stored route receiving group, positioning a target network hook corresponding to an Internet protocol address, an alarm level and an alarm period from a plurality of network hooks;
positioning a target controller corresponding to the target network hook through an identifier of the target network hook based on the frame bootstrap program;
and taking the preset routing strategy of the target controller as the alarm routing strategy.
In the above preferred technical solution of the alert routing method, the routing policy includes: the processing end related to the Internet protocol address, the transmission mode related to the alarm level and the repeated alarm interval related to the alarm period.
In the above preferred technical solution of the alert routing method, transmitting the alert according to the routing policy includes:
according to the transmission mode, the alarm is transmitted once every interval of repeated alarm interval in the alarm period.
In the above preferred technical solution of the alert routing method, resolving the alert identifier to obtain the internet protocol address, the alert level and the alert period of the alert, including:
analyzing the alarm identification to obtain a user end and a processing end;
and according to the user terminal and the processing terminal, obtaining the Internet protocol address, the alarm level and the alarm period corresponding to the user terminal and the processing terminal from the pre-stored configuration file.
In the above preferred technical solution of the alert routing method, after generating the alert according to the pre-stored alert template and the alert identifier of the alert, the method further includes:
judging whether the alarm can affect the service level target;
and when the alarm can influence the service level target, marking the alarm, wherein the marking label is used for indicating that the alarm generates substantial faults.
In the preferred technical scheme of the alarm routing method, a plurality of monitoring objects are monitored simultaneously;
the configuration file further includes: a configuration value threshold for each monitored object;
generating an alarm and an alarm identification of the alarm according to a pre-stored alarm template, wherein the alarm identification comprises the following steps:
obtaining a configuration value of a target monitoring object from a plurality of monitoring objects through wheel group judgment, wherein the target monitoring object is any one of the plurality of monitoring objects;
when the configuration value of the target monitoring object is larger than the configuration value threshold value of the target monitoring object, generating an alarm of the target monitoring object according to a pre-stored alarm template;
and matching the alarm identification templates corresponding to the alarms of the target monitoring object from the prestored alarm identification templates to generate alarm identifications of the alarms of the target monitoring object.
In a second aspect, the present application provides an alert routing apparatus, including: generating an alarm device, analyzing the alarm device and transmitting the alarm device;
the alarm generation device is used for generating an alarm and an alarm identification of the alarm according to a pre-stored alarm template;
the alarm analysis device is used for analyzing the alarm identification to obtain the IP address, the alarm level and the alarm period of the alarm;
the analysis alarm device is also used for customizing an alarm routing strategy according to the Internet protocol address, the alarm level and the alarm period;
and the transmission alarm device is used for transmitting the alarm according to the routing strategy so as to facilitate the alarm to be transmitted to the processing end related to the Internet protocol address.
In a third aspect, the present application provides an electronic device, comprising: a processor, a memory communicatively coupled to the processor;
the memory stores computer-executable instructions;
when the processor executes computer-executable instructions stored in the memory, the processor is used for realizing the alarm routing method of the first aspect.
In a fourth aspect, the present application provides a computer-readable storage medium, where computer-executable instructions are stored, where the computer-executable instructions, when executed by a processor, are configured to implement an alert routing method according to the first aspect of the present invention.
In a fifth aspect, the present application provides a computer program product comprising a computer program for implementing an alert routing method according to the first aspect of the present invention when the computer program is executed by a processor.
The application provides an alarm routing method, an alarm routing device, an alarm routing equipment and a storage medium, wherein the alarm routing method comprises the following steps: generating an alarm and an alarm identification of the alarm according to a pre-stored alarm template; analyzing the alarm identification to obtain the IP address, the alarm level and the alarm period of the alarm; customizing an alarm routing strategy according to the Internet protocol address, the alarm level and the alarm period; the alarms are transmitted according to the routing policy so as to be transmitted to the processing end related to the internet protocol address. Compared with the prior art, the generated alarms are sent to the processing end through the interface, and technicians at the processing end perform manual classification processing on the alarms in different fields and send the alarms to technicians in corresponding fields for processing. The manual classification is long in time consumption and easy to cause errors, and a lot of resources are wasted for indiscriminate processing of all alarms, so that the alarm forwarding efficiency is relatively low.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application.
Fig. 1 is a schematic flow chart of an embodiment of an alarm routing method provided in the embodiment of the present application;
fig. 2 is a schematic flow chart of a second embodiment of an alarm routing method provided in the embodiment of the present application;
fig. 3 is a schematic flow chart of a third embodiment of an alarm routing method provided in the embodiment of the present application;
fig. 4 is a schematic flow chart of a fourth embodiment of an alert routing method provided in the embodiments of the present application;
fig. 5 is a schematic structural diagram of an embodiment of an alert routing apparatus provided in the embodiments of the present application;
fig. 6 is a schematic structural diagram of an embodiment of an electronic device provided in the present application.
Specific embodiments thereof have been shown by way of example in the drawings and will herein be described in more detail. These drawings and the written description are not intended to limit the scope of the inventive concepts in any way, but to illustrate the concepts of the present application to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present application as detailed in the accompanying claims.
It should be noted that, the user information related to the present application includes, but is not limited to, user equipment information, user personal information, and the like, and the data includes, but is not limited to, data for analysis, stored data, presented data, and the like, which are information and data authorized by the user or sufficiently authorized by each party, and the collection, use, and processing of related data are required to comply with related laws and regulations and standards, and are provided with corresponding operation entries for the user to select authorization or rejection.
In the prior art, the generated alarms are sent to a processing end through an interface, and technicians at the processing end perform manual classification processing on the alarms in different fields and then send the alarms to technicians in corresponding fields for processing. The manual classification is long in time consumption and easy to cause errors, and meanwhile, the indiscriminate processing of all alarms wastes a lot of resources, so that the technical problem of relatively low alarm forwarding efficiency is caused.
In order to solve the technical problems, the application provides an alarm routing method, which aims to solve the technical problems in the prior art. The inventive concept of the present application is: how to effectively improve the alarm forwarding efficiency.
The following describes the technical solutions of the present application and how the technical solutions of the present application solve the above technical problems in detail with specific embodiments. The following embodiments may be combined with each other, and the same or similar concepts or processes may not be described in detail in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
Fig. 1 is a schematic flow chart of an embodiment one of an alert routing method provided in an embodiment of the present application, as shown in fig. 1, where the method includes:
step S101, generating an alarm and an alarm identification of the alarm according to a pre-stored alarm template.
In this embodiment, the alarm device generates an alarm according to an alarm template pre-stored in the device itself, and information input by the alarm template and configuration performed on alarm rules by a user. And matching the corresponding alarm mark according to the pre-stored alarm mark template and the information input by the user, and marking the alarm mark on the alarm.
Optionally, the alarm templates include alarm levels, alarm periods, repeated alarm intervals, configuration value thresholds, and the like, and alarm related contents, and alarm templates corresponding to alarms from different user terminals are different. Wherein the alert level may be an alert matching to a customized processing policy; the alarm period can be set to be the period of the device for transmitting the alarm, so that the device can observe the period, overdue or not over time, and the alarm can not be transmitted to the processing end, thereby ensuring that the alarm transmission is well and orderly, and avoiding the phenomenon of indifferently transmitting the alarm; the repeated alarm interval can be set to repeatedly send out an alarm when the alarm is not solved within a certain time; the configuration value threshold is a threshold set by the user side and giving an alarm.
Optionally, the alarm identifier is an identifier, which can uniquely determine an alarm, is a unique identifier of the alarm, and each alarm has an alarm identifier belonging to the alarm. The alarm mark is generated according to the pre-stored alarm mark template and the information configured by the user side. Wherein, the warning sign template includes: user side information, processing side information, corresponding relation between the user side and the processing side, alarm type and all relevant contents of alarm. For example, when the user terminal is a memory alarm, the alarm identification template includes: the system to which the memory belongs, the host to which the memory belongs, the processing end to which the memory belongs, the alarm level corresponding to the memory fault, the alarm period, the configuration value threshold value of the memory alarm and the like.
Specifically, the device automatically converts the input user side information and processing side information into codes in a script mode, corresponds the user side to the processing side, and generates an alarm mark according to a pre-stored alarm mark template.
Step S102, analyzing the alarm identification to obtain the IP address, the alarm level and the alarm period of the alarm.
In this embodiment, the device analyzes the generated alarm, first analyzes the alarm identifier, analyzes the user side information and the corresponding processing side information, and specifically, can also obtain the internet protocol address, the alarm level and the alarm period of the alarm.
Step S103, customizing the routing strategy of the alarm according to the Internet protocol address, the alarm level and the alarm period.
In this embodiment, the device customizes the routing policy of the alarm according to the internet protocol address, the alarm level and the alarm period obtained by analyzing the alarm identifier.
Step S104, the alarm is transmitted according to the routing strategy so as to be convenient for transmitting the alarm to the processing end related to the Internet protocol address.
In this embodiment, the device transmits the alarm according to the routing policy, and transmits the alarm to the processing end corresponding to the alarm according to the internet protocol address.
Specifically, according to different transmission modes corresponding to different alarm levels, if the alarm is not processed or the actual problem is not solved in the pre-stored alarm period, the device transmits an alarm to the processing end every time the alarm is repeated according to the pre-stored repeated alarm interval, and the alarm is not sent out any more until the actual problem is solved by the alarm processing end.
The application provides an alarm routing method, which generates an alarm and an alarm identifier of the alarm according to a pre-stored alarm template; analyzing the alarm identification to obtain the IP address, the alarm level and the alarm period of the alarm; customizing an alarm routing strategy according to the Internet protocol address, the alarm level and the alarm period; the alarms are transmitted according to the routing policy so as to be transmitted to the processing end related to the internet protocol address. Compared with the prior art, the generated alarms are sent to the processing end through the interface, and technicians at the processing end perform manual classification processing on the alarms in different fields and send the alarms to technicians in corresponding fields for processing. The manual classification is long in time consumption and easy to cause errors, and a lot of resources are wasted for indiscriminate processing of all alarms, so that the alarm forwarding efficiency is relatively low.
Fig. 2 is a schematic flow chart of a second embodiment of an alarm routing method provided in the embodiment of the present application. On the basis of the embodiment of fig. 1, as shown in fig. 2, if the device monitors multiple monitoring objects at the same time, the specific implementation steps of S101 include:
step S201, obtaining a configuration value of a target monitoring object from a plurality of monitoring objects through a round group judgment, wherein the target monitoring object is any one of the plurality of monitoring objects.
In this embodiment, through the wheel group judgment, a plurality of monitoring objects are periodically screened in turn, so as to obtain the configuration value of the target monitoring object. Wherein the configuration value is a current actual configuration value of the target monitoring object.
Step S202, when the configuration value of the target monitoring object is larger than the configuration value threshold value of the target monitoring object, generating an alarm of the target monitoring object according to a pre-stored alarm template.
In this embodiment, when the configuration value of the target monitor object is greater than the configuration value threshold of the target monitor object, the device may determine that the current actual configuration value of the target monitor object exceeds the configuration value threshold, and needs to generate an alarm. And generating an alarm of the target monitoring object according to the judgment and the pre-stored alarm template.
For example, when my monitor object is the memory duty ratio, the ue configures the configuration value threshold to be 80%. In the wheel group judgment, the device firstly screens the current actual memory ratio of each monitoring object, if the current actual memory ratio of the screened target monitoring object is 81 percent and is larger than the configuration value threshold memory ratio by 80 percent, the device judges that the target monitoring object needs to generate an alarm, and generates an alarm according to the judgment and a pre-stored alarm template.
Step S203, matching the alarm identification templates corresponding to the alarms of the target monitoring object from the prestored alarm identification templates to generate the alarm identifications of the alarms of the target monitoring object.
In this embodiment, the device matches, from a plurality of pre-stored alarm identifier templates, an alarm identifier template corresponding to an alarm of a target monitoring object, and generates an alarm identifier of the alarm of the target monitoring object. The corresponding alarm identification templates are different from each other, for example, when the monitored object is a memory ratio, the corresponding alarm identification template is the alarm identification template with the corresponding memory ratio.
Further, after generating an alarm according to the pre-stored alarm template and an alarm identifier of the alarm, the device can judge whether the alarm affects the service level target.
Specifically, the device screens out a target monitoring object needing to carry out alarming according to the judgment of the wheel group, generates alarming according to the judgment and a pre-stored alarming template, and generates a corresponding alarming identifier after a pre-stored alarming identifier template. The device also performs fault determination based on pre-stored service level targets (Service Level Objective, SLO). Namely, judging whether the failure of the target monitoring object for generating the alarm can influence the service level target. In actual operation, a failure affecting a service level objective requires the processing side to perform an emphasis process.
The service level objective (Service Level Objective, SLO), among other things, describes the quality of service and performance criteria that the service provider should reach to ensure that the user's needs and expectations are met, is an index for measuring and defining the quality of service. In the present embodiment, whether the failure causing the alarm is a substantial failure can be determined according to whether the service level target is affected.
Furthermore, when the alarm can influence the service level target, the alarm is marked, wherein the marked label is used for indicating that the alarm generates substantial faults.
More specifically, when the device performs fault judgment on the alarm, and judges that the alarm can affect the service level target, that is, judges that the fault causing the alarm is a substantial fault, the device performs marking processing on the judgment result in the form of a label as the alarm. Then when the alarm is transmitted to the processing end, the processing end can know that the fault causing the alarm is a substantial fault according to the label, and make corresponding resource allocation and processing.
In the embodiment, based on the pre-stored alarm template and alarm identification template, the standardization of the alarm format and the alarm identification format is realized, and the user side only needs to configure information according to the template when configuring the information, so that inaccuracy caused by manual free configuration is avoided; meanwhile, the time and resource waste caused by manual classification of the processing end in the prior art and the low accuracy caused by manual classification are avoided, so that the alarm forwarding efficiency is improved.
Fig. 3 is a schematic flow chart of a third embodiment of an alert routing method provided in the embodiment of the present application, and on the basis of the embodiments of fig. 1 and fig. 2, as shown in fig. 3, the specific implementation steps of S102 include:
step S301, analyzing the alarm identification to obtain a user end and a processing end.
In this embodiment, after generating an alarm with an alarm identifier, the device analyzes the alarm at the server, and first analyzes the alarm identifier by means of a script to obtain a user end and a processing end corresponding to the user end.
Step S302, according to the user terminal and the processing terminal, the Internet protocol addresses, the alarm levels and the alarm periods corresponding to the user terminal and the processing terminal are obtained from the pre-stored configuration files.
In this embodiment, the device further analyzes the alarm details of the target detection object according to the user end and the processing end corresponding to the user end, and matches the alarm details of the target detection object from the pre-stored configuration file, so as to obtain the internet protocol address, the alarm level and the alarm period corresponding to the user end and the processing end.
Wherein, the configuration file further includes: a configuration value threshold for each monitored object.
Specifically, the configuration file mainly includes each monitoring object: user side information, processing side information, corresponding relation between the user side and the corresponding processing side, a configuration value threshold value, alarm details, corresponding matched alarm levels, alarm periods, repeated alarm intervals and the like. All information of each monitoring object is written into the configuration file, and finally a rule list is generated. According to the rule list, the device can perform round group judgment and fault judgment.
In this embodiment, the device corresponds the user terminal and the processing terminal based on the alarm identifier and converts the user terminal and the processing terminal into the codes, so that all relevant information of the target monitoring objects can be quickly matched in the pre-stored configuration file according to the codes, the device can load the information of all the target monitoring objects at one time without manual classification and judgment, thereby improving the processing speed, ensuring the processing accuracy and improving the alarm forwarding efficiency.
Fig. 4 is a schematic flow chart of a fourth embodiment of an alert routing method provided in the embodiment of the present application, and on the basis of the embodiments of fig. 1 to 3, as shown in fig. 4, the specific implementation steps of S103 include:
step S401, according to the pre-stored route receiving group, locating the target network hook corresponding to the Internet protocol address, the alarm level and the alarm period from the plurality of network hooks.
In this embodiment, the device locates, among the plurality of network hooks, a target network hook corresponding to an internet protocol address, an alarm level, and an alarm period of the target monitoring object according to the pre-stored route reception group.
Routing refers to the process of transmitting data from a user end to a processing end. And a route reception group refers to one or a group of network routes that can be received and processed. The device can locate the target network hook corresponding to the Internet protocol address, the alarm level and the alarm period of the target monitoring object according to the pre-stored route receiving group.
Specifically, the network hook is a network communication mechanism, and is used for sending asynchronous messages between the user end and the processing end. In this embodiment, it consists of two parts: a user terminal and a server terminal. After the user side generates the alarm, a request for analyzing the alarm is sent to the server side, and after the server side receives the request for analyzing the alarm, the server side executes corresponding operation according to the parameter script in the request.
Step S402, positioning the target controller corresponding to the target network hook through the identifier of the target network hook based on the frame guiding procedure.
In this embodiment, the routing policy is located to the target controller corresponding to the target network hook based on the frame bootstrap program according to the identifiers of the different target network hooks.
In particular, based on the framework bootstrap, the route reception group is typically composed of a series of target controllers, each of which is responsible for handling specific network requests and providing corresponding responses. And the identifier is used to uniquely identify a particular target controller in the route reception group. When a request is received, the system matches the identifier according to defined routing rules and then locates to the corresponding target controller, thereby achieving customized processing and delivery.
Step S403, taking the preset routing strategy of the target controller as the alarm routing strategy.
The routing strategy comprises the following steps: the processing end related to the Internet protocol address, the transmission mode related to the alarm level and the repeated alarm interval related to the alarm period.
In this embodiment, the device uses a preset routing policy of the target controller as the routing policy of the alarm. The routing strategy comprises the following steps: the processing end related to the Internet protocol address, namely the processing end specially processing the alarm; the transmission modes related to the alarm levels, that is, the alarms of different levels, all correspond to different transmission modes, for example: transmitting mild alarms in the form of short messages, transmitting severe alarms in the form of telephones and the like; the repeated alarm interval associated with the alarm period, that is, the interval time of repeated alarms after the alarm is sent out, is each time the interval time of repeated alarms passes, and if the alarm is not processed in the interval time, the device retransmits the alarm again at the end of the interval time until the alarm is processed.
In this embodiment, based on the frame bootstrap program, the routing policy is located to the target controller corresponding to the target network hook according to the identifiers of different target network hooks, so as to implement the customized processing and transmission of the alarm, avoid the low accuracy and long time consumption caused by manual judgment, and thus improve the alarm forwarding efficiency.
Fig. 5 is a schematic structural diagram of an embodiment of an alert routing apparatus provided in an embodiment of the present application, where, as shown in fig. 5, the apparatus includes: an alarm generation means 51, an alarm analysis means 52, and an alarm transmission means 53;
the alarm generating device 51 is configured to generate an alarm and an alarm identifier of the alarm according to a pre-stored alarm template.
And the alarm analysis device 52 is used for analyzing the alarm identification to obtain the internet protocol address, the alarm level and the alarm period of the alarm.
The alarm parsing means 52 is further configured to customize the routing policy of the alarm according to the internet protocol address, the alarm level and the alarm period.
And the alarm transmission device 53 is used for transmitting the alarm according to the routing policy so as to facilitate the alarm to be transmitted to the processing end related to the internet protocol address.
In the embodiment of the present application, the alarm parsing device 52 is further configured to:
according to a pre-stored route receiving group, positioning a target network hook corresponding to an Internet protocol address, an alarm level and an alarm period from a plurality of network hooks;
positioning a target controller corresponding to the target network hook through an identifier of the target network hook based on the frame bootstrap program;
and taking the preset routing strategy of the target controller as the alarm routing strategy.
In an embodiment of the present application, the routing policy includes: the processing end related to the Internet protocol address, the transmission mode related to the alarm level and the repeated alarm interval related to the alarm period.
In the embodiment of the present application, the alarm transmission device 53 is further configured to:
according to the transmission mode, the alarm is transmitted once every interval of repeated alarm interval in the alarm period.
In the embodiment of the present application, the alarm parsing device 52 is further configured to:
analyzing the alarm identification to obtain a user end and a processing end;
and according to the user terminal and the processing terminal, obtaining the Internet protocol address, the alarm level and the alarm period corresponding to the user terminal and the processing terminal from the pre-stored configuration file.
In the embodiment of the present application, the alarm parsing device 52 is further configured to:
judging whether the alarm can affect the service level target;
and when the alarm can influence the service level target, marking the alarm, wherein the marking label is used for indicating that the alarm generates substantial faults.
In the embodiment of the present application, the alarm generating device 51 monitors a plurality of monitoring objects simultaneously;
the configuration file further includes: a configuration value threshold for each monitored object;
the alarm generating device 51 is further configured to:
obtaining a configuration value of a target monitoring object from a plurality of monitoring objects through wheel group judgment, wherein the target monitoring object is any one of the plurality of monitoring objects;
when the configuration value of the target monitoring object is larger than the configuration value threshold value of the target monitoring object, generating an alarm of the target monitoring object according to a pre-stored alarm template;
matching an alarm identification template corresponding to the alarm of the target monitoring object from a plurality of pre-stored alarm identification templates to generate an alarm identification of the alarm of the target monitoring object
Fig. 6 is a schematic structural diagram of an embodiment of an electronic device provided in the present application; referring to fig. 6, the electronic device 60 includes: at least one processor 61 and a memory 62. The electronic device 60 further comprises a communication part 63. Wherein 61, memory 62 and communication section 63 are connected by bus 64.
In a specific implementation, the at least one processor 61 executes computer-executable instructions stored in the memory 62, such that the at least one processor 61 performs an alert routing method as performed on the electronic device side above.
The specific implementation process of the processor 61 can be referred to the above method embodiment, and its implementation principle and technical effects are similar, and this embodiment will not be described herein again.
In the above embodiment, it should be understood that the processor may be a central processing unit (english: central Processing Unit, abbreviated as CPU), or may be other general purpose processors, digital signal processors (english: digital Signal Processor, abbreviated as DSP), application specific integrated circuits (english: application Specific Integrated Circuit, abbreviated as ASIC), or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present invention may be embodied directly in a hardware processor for execution, or in a combination of hardware and software modules in a processor for execution.
The memory may comprise high speed RAM memory or may further comprise non-volatile storage NVM, such as at least one disk memory.
The bus may be an industry standard architecture (Industry Standard Architecture, ISA) bus, an external device interconnect (Peripheral Component, PCI) bus, or an extended industry standard architecture (Extended Industry Standard Architecture, EISA) bus, among others. The buses may be divided into address buses, data buses, control buses, etc. For ease of illustration, the buses in the drawings of the present application are not limited to only one bus or one type of bus.
The scheme provided by the embodiment of the invention is introduced aiming at the functions realized by the electronic equipment and the main control equipment. It will be appreciated that the electronic device or the master device, in order to implement the above-described functions, includes corresponding hardware structures and/or software modules that perform the respective functions. The present embodiments can be implemented in hardware or a combination of hardware and computer software in combination with the various exemplary elements and algorithm steps described in connection with the embodiments disclosed in the embodiments of the present invention. Whether a function is implemented as hardware or computer software driven hardware depends upon the particular application and design constraints imposed on the solution. Those skilled in the art may implement the described functionality using different approaches for each particular application, but such implementation is not to be considered as beyond the scope of the embodiments of the present invention.
The present application also provides a computer-readable storage medium having stored therein computer-executable instructions for implementing an alert routing method as above when executed by a processor.
The above-described readable storage medium may be implemented by any type or combination of volatile or non-volatile memory devices, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk. A readable storage medium can be any available medium that can be accessed by a general purpose or special purpose computer.
An exemplary readable storage medium is coupled to the processor such the processor can read information from, and write information to, the readable storage medium. In the alternative, the readable storage medium may be integral to the processor. The processor and the readable storage medium may reside in an application specific integrated circuit (Application Specific Integrated Circuits, ASIC for short). The processor and the readable storage medium may reside as discrete components in an electronic device or a master device.
The present application also provides a computer program product comprising: a computer program stored in a readable storage medium, from which at least one processor of an electronic device can read, the at least one processor executing the computer program causing the electronic device to perform the solution provided by any one of the embodiments described above.
Those of ordinary skill in the art will appreciate that: all or part of the steps for implementing the above method embodiments may be performed by hardware associated with program instructions. The foregoing program may be stored in a computer readable storage medium. The program, when executed, performs steps including the method embodiments described above; and the aforementioned storage medium includes: various media that can store program code, such as ROM, RAM, magnetic or optical disks.
While the present application has been described in connection with the preferred embodiments illustrated in the accompanying drawings, it will be readily understood by those skilled in the art that the scope of the application is not limited to such specific embodiments, and the above examples are intended to illustrate the technical aspects of the application, but not to limit it; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the corresponding technical solutions from the scope of the technical solutions of the embodiments of the present application.

Claims (10)

1. An alert routing method, the method comprising:
generating an alarm and an alarm identification of the alarm according to a pre-stored alarm template;
analyzing the alarm identification to obtain the Internet protocol address, the alarm level and the alarm period of the alarm;
customizing a routing strategy of the alarm according to the Internet protocol address, the alarm level and the alarm period;
and transmitting the alarm according to the routing strategy so as to facilitate the transmission of the alarm to a processing end related to the Internet protocol address.
2. The method of claim 1, wherein customizing the routing policy of the alert based on the internet protocol address, the alert level, and the alert period comprises:
positioning a target network hook corresponding to the Internet protocol address, the alarm level and the alarm period from a plurality of network hooks according to a pre-stored route receiving group;
positioning a target controller corresponding to the target network hook through an identifier of the target network hook based on a frame bootstrap program;
and taking the preset routing strategy of the target controller as the routing strategy of the alarm.
3. The method of claim 2, wherein the routing policy comprises: and the processing end related to the Internet protocol address, the transmission mode related to the alarm level and the repeated alarm interval related to the alarm period.
4. A method according to claim 3, wherein said transmitting said alert according to said routing policy comprises:
and according to the transmission mode, transmitting the alarm once every the repeated alarm interval in the alarm period.
5. The method according to any one of claims 1-4, wherein said parsing the alarm identification to obtain an internet protocol address, an alarm level and an alarm period of the alarm comprises:
analyzing the alarm identifier to obtain a user end and a processing end;
and obtaining the Internet protocol address, the alarm level and the alarm period corresponding to the user terminal and the processing terminal from a pre-stored configuration file according to the user terminal and the processing terminal.
6. The method of claim 5, wherein after generating an alert according to a pre-stored alert template and the alert identification of the alert, the method further comprises:
judging whether the alarm can influence a service level target;
and when the alarm can influence the service level target, marking the alarm, wherein the marking label is used for indicating that the alarm generates substantial faults.
7. The method of claim 6, wherein a plurality of monitored objects are monitored simultaneously;
the configuration file further includes: a configuration value threshold for each monitored object;
the generating the alarm according to the pre-stored alarm template and the alarm identification of the alarm comprises the following steps:
obtaining a configuration value of a target monitoring object from the plurality of monitoring objects through wheel group judgment, wherein the target monitoring object is any one of the plurality of monitoring objects;
when the configuration value of the target monitoring object is larger than the configuration value threshold of the target monitoring object, generating an alarm of the target monitoring object according to the pre-stored alarm template;
and matching the alarm identification templates corresponding to the alarms of the target monitoring object from a plurality of pre-stored alarm identification templates to generate alarm identifications of the alarms of the target monitoring object.
8. An alert routing apparatus, comprising: an alarm generating device, an alarm analyzing device and an alarm transmitting device;
the alarm generating device is used for generating an alarm and an alarm identifier of the alarm according to a pre-stored alarm template;
the alarm analysis device is used for analyzing the alarm identification to obtain the Internet protocol address, the alarm level and the alarm period of the alarm;
the alarm analysis device is further configured to customize a routing policy of the alarm according to the internet protocol address, the alarm level and the alarm period;
the alarm transmission device is used for transmitting the alarm according to the routing strategy so as to facilitate the alarm to be transmitted to the processing end related to the Internet protocol address.
9. An electronic device, comprising: a processor, and a memory communicatively coupled to the processor;
the memory stores computer-executable instructions;
the processor, when executing the computer-executable instructions stored in the memory, is configured to implement the alert routing method as claimed in any one of claims 1 to 7.
10. A computer readable storage medium having stored therein computer executable instructions which when executed by a processor are for implementing the alert routing method as claimed in any one of claims 1 to 7.
CN202311734373.7A 2023-12-15 2023-12-15 Alarm routing method, device, equipment and storage medium Pending CN117650977A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311734373.7A CN117650977A (en) 2023-12-15 2023-12-15 Alarm routing method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311734373.7A CN117650977A (en) 2023-12-15 2023-12-15 Alarm routing method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117650977A true CN117650977A (en) 2024-03-05

Family

ID=90043345

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311734373.7A Pending CN117650977A (en) 2023-12-15 2023-12-15 Alarm routing method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117650977A (en)

Similar Documents

Publication Publication Date Title
CN112148887B (en) Equipment fault diagnosis method, device, storage medium and electronic equipment
CN110213068B (en) Message middleware monitoring method and related equipment
CN110309029B (en) Abnormal data acquisition method and device, computer equipment and storage medium
CN110164101B (en) Alarm information processing method and equipment
CN110708315A (en) Asset vulnerability identification method, device and system
CN109218407B (en) Code management and control method based on log monitoring technology and terminal equipment
CN109995555B (en) Monitoring method, device, equipment and medium
CN108111346B (en) Method and device for determining frequent item set in alarm correlation analysis and storage medium
CN107395451B (en) Processing method, device and equipment for internet traffic abnormity and storage medium
CN110505219B (en) Dubbo-based micro-service registration control management system and method
CN110737565B (en) Data monitoring method and device, electronic equipment and storage medium
CN110955581A (en) Online software abnormity warning method and device, electronic equipment and storage medium
CN113987519A (en) Vulnerability rule base generation method and device, electronic equipment, storage medium and system
CN111949421B (en) SDK calling method, device, electronic equipment and computer readable storage medium
CN112306871A (en) Data processing method, device, equipment and storage medium
CN115296979B (en) Fault processing method, device, equipment and storage medium
CN117650977A (en) Alarm routing method, device, equipment and storage medium
CN115037653B (en) Service flow monitoring method, device, electronic equipment and storage medium
CN111262731A (en) Alarm method, alarm device, server equipment and storage medium
CN112583617A (en) Fault determination method, server, control terminal and storage medium
CN113835961B (en) Alarm information monitoring method, device, server and storage medium
CN114281774A (en) Log identification method and device, electronic equipment and storage medium
CN112654004B (en) Short message issuing method, device and system and electronic equipment
CN109995618B (en) Network survival monitoring method, device, equipment and computer readable storage medium
CN112583825A (en) Method and device for detecting abnormality of industrial system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination