WO2016119436A1 - Alarm processing method and device, and controller - Google Patents

Alarm processing method and device, and controller Download PDF

Info

Publication number
WO2016119436A1
WO2016119436A1 PCT/CN2015/086803 CN2015086803W WO2016119436A1 WO 2016119436 A1 WO2016119436 A1 WO 2016119436A1 CN 2015086803 W CN2015086803 W CN 2015086803W WO 2016119436 A1 WO2016119436 A1 WO 2016119436A1
Authority
WO
WIPO (PCT)
Prior art keywords
alarm
controller
resource
occupied
service
Prior art date
Application number
PCT/CN2015/086803
Other languages
French (fr)
Chinese (zh)
Inventor
陈俏钢
薄开涛
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2016119436A1 publication Critical patent/WO2016119436A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/40Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities

Definitions

  • the present invention relates to the field of communications, and in particular to an alarm processing method, apparatus, and controller.
  • a network In a communication network, a network consists of a number of communication device nodes, which are called network elements.
  • the network elements are connected by communication lines, including fiber optic cables and the like.
  • the network elements are distributed in various regions, some in the communication building laboratory in the city, and some network elements are in remote areas.
  • the equipment of these network elements needs to be configured, maintained and monitored. It is impossible to assign personnel to each place. This requires a central network management system, which is placed in the central computer room to configure and maintain various nodes on the network through remote communication. monitor.
  • FIG. 1 is a schematic diagram of networking in which a controller management network is used in the related art. As shown in FIG.
  • a controller forms a tree management system, and an upper layer is an SC, an underlying DC partition management domain, and a management communication network. And network elements.
  • the controller is managed by the interface in the south direction and the network device, and the northbound interface allows the application layer to access the network APP (Application) for network management, and also through the side interface and the same network management plane (including: the network element management system ( Element Management System (referred to as EMS), Network Management System (NMS), or Operation Support System (OSS) communicates management information.
  • the network APP is the actual business application of the network, and uses the resources provided by the controller to issue requests for service establishment, deletion, and modification.
  • the controller establishes, deletes, and modifies the service according to the request of the network APP, and monitors the alarm and performance of the service.
  • 2 is a schematic diagram of a relationship between a controller and other network entities in a Software Defined Network (SDN) network in the related art.
  • SDN Software Defined Network
  • the DC directly manages the communication network, and the SC manages the DC. It can also communicate with traditional network management systems to provide resources and services to the APP.
  • the network device reports an alert. Since the direct communication of the network device is closely related, if a device or a part of the resource reports a fault on the fault, the network will generate an alarm in a large area. Produce a lot of reports police. For network administrators, it is difficult to find so many alarms for the real cause of the failure. The occurrence of a fault in the network triggers an alarm that directly reflects the fault. At the same time, a series of alarms are triggered because the fault affects other devices or services. For example, alarm A triggers alarm B, alarm A is the root alarm, and alarm B is the derivative alarm.
  • the alarms are generated by the device. After receiving the alarm, the network controller directly forwards the alarm to the upper-layer network device that processes the alarm. Therefore, in the related technology, not only the alarm processing is not timely, but also the number of alarms. In many cases, the performance of the upper layer network device is low.
  • the embodiment of the present invention provides an alarm processing method, device, and controller, so as to solve at least the problem that the performance of the upper layer network device is low, not only in the case that the alarm processing is not timely, but also in the case that the number of alarms is large.
  • an alarm processing method including: receiving an alarm from a network device; analyzing the alarm to obtain an analysis result; and processing the alarm according to the analysis result.
  • the analyzing the alarm to obtain the analysis result comprises: analyzing, according to the alarm cause of generating the alarm, whether the alarm has an impact on the service managed by the controller; The relationship between the resource of the alarm and the resource occupied by the service managed by the controller is analyzed to determine whether the alarm has an impact on the service managed by the controller.
  • analyzing, according to the relationship between the resource that generates the alarm and the resource occupied by the service managed by the controller analyzing whether the alarm affects the service managed by the controller
  • the result includes one of the following: in a case where the root resource generating the alarm is not occupied by the service managed by the controller, and the sub-resource corresponding to the root resource is not occupied by the service managed by the controller Determining that the alarm does not affect the service managed by the controller; the root resource that generates the alarm is not occupied by the service managed by the controller, but the sub-resource corresponding to the root resource is In the case that the service managed by the controller is occupied, the alarm is determined to have an impact on the service managed by the controller; and the root resource generating the alarm is not occupied by the service managed by the controller.
  • the sub-resource corresponding to the root resource is not occupied by the service managed by the controller, but the root resource and/or the sub-resource corresponding to the root resource and the service managed by the controller If the mapping relationship exists, determining that the alarm has an impact on the service managed by the controller; and determining that the root resource that generates the alarm is occupied by a service managed by the controller The business production impact on the controller management.
  • processing the alarm according to the analysis result includes one of: following the alarm The reason is that if the alarm does not affect the service managed by the controller, the alarm is suppressed; and the resource occupied by the resource generated by the controller and the controller is used according to the resource that generates the alarm. If the relationship determines that the alarm does not affect the service managed by the controller, the alarm is suppressed; where the root resource generating the alarm is not managed by the controller If the sub-resource corresponding to the root resource is occupied by the service managed by the controller, the alarm is derived as a sub-resource-derived alarm; the root resource that generates the alarm is not used by the controller.
  • the sub-resource corresponding to the root resource is not occupied by the service managed by the controller, but the root resource and/or the sub-resource corresponding to the root resource are managed by the controller. If the service has a mapping relationship, the alarm is derived as a relationship-derived alarm according to the mapping relationship; the root resource that generates the alarm is occupied by the service managed by the controller. If the alarm is used, the alarm is directly reported to the upper-layer network device.
  • the method further includes: recording an association between the alarm and the derived derivative alarm, where the derivative alarm includes: a sub-resource-derived alarm and/or relationship Deriving the alarm; reporting the derived alarm and the association relationship to the upper layer network device, and/or providing the association relationship for the network element device in the controller management system to query.
  • the derivative alarm includes: a sub-resource-derived alarm and/or relationship Deriving the alarm
  • the method further includes: generating, according to a state change of the network element device caused by the alarm, or a state change of an object representing the resource of the alarm.
  • the status notification of the network element device or the object representing the resource; the status notification of the generated network element device or the object representing the resource is reported to the upper layer network device.
  • an alarm processing apparatus including: a receiving module configured to receive an alarm from a network device; and an analysis module configured to analyze the alarm to obtain an analysis result; The module is configured to process the alarm according to the analysis result.
  • the analysis module includes: a first analysis unit, configured to analyze, according to the cause of the alarm that generates the alarm, whether the alarm has an impact on the service managed by the controller; and the second analysis unit And analyzing, according to the relationship between the resource that generates the alarm and the resource occupied by the service managed by the controller, analyzing, by the analysis, whether the alarm affects the service managed by the controller result.
  • a first analysis unit configured to analyze, according to the cause of the alarm that generates the alarm, whether the alarm has an impact on the service managed by the controller
  • the second analysis unit And analyzing, according to the relationship between the resource that generates the alarm and the resource occupied by the service managed by the controller, analyzing, by the analysis, whether the alarm affects the service managed by the controller result.
  • the second analyzing unit comprises one of: a first determining subunit, configured to be occupied by a service in which a root resource generating the alarm is not managed by the controller, and also having no corresponding root resource In the case that the sub-resource is occupied by the service managed by the controller, it is determined that the alarm does not affect the service managed by the controller; and the second determining sub-unit is set to generate the root of the alarm.
  • the resource is not occupied by the service managed by the controller, but if the sub-resource corresponding to the root resource is occupied by the service managed by the controller, determining the service that the alarm manages to the controller
  • the third determining subunit is configured to be occupied by a service in which the root resource generating the alarm is not managed by the controller, and the sub resource corresponding to the root resource is not used by the controller managed by the controller.
  • the root resource and/or the corresponding resource of the root resource If the source has a mapping relationship with the service managed by the controller, determining that the alarm has an impact on the service managed by the controller; and determining, by the fourth determining subunit, that the root resource that generates the alarm is In the case that the service managed by the controller is occupied, the impact of the alarm on the service production managed by the controller is determined.
  • the processing module includes one of the following: a first suppression unit, configured to: if the alarm is not affected by the service managed by the controller according to the alarm cause, The alarm is suppressed; the second suppression unit is configured to determine, according to the relationship between the resource that generates the alarm and the resource occupied by the controller, that the alarm does not manage the service managed by the controller In the case of an impact, the alarm is suppressed; the first derivative unit is configured to be occupied by a service in which the root resource generating the alarm is not managed by the controller, but the sub-resource corresponding to the root resource is In the case that the service managed by the controller is occupied, the alarm is derived as a sub-resource-derived alarm; and the second derivation unit is configured to be occupied by a service in which the root resource generating the alarm is not managed by the controller.
  • a first suppression unit configured to: if the alarm is not affected by the service managed by the controller according to the alarm cause, The alarm is suppressed; the second suppression unit is configured to determine, according
  • the sub-resource corresponding to the root resource is not occupied by the service managed by the controller, but the root resource and/or the sub-resource corresponding to the root resource and the controller
  • the alarm is derived as a relationship-derived alarm according to the mapping relationship
  • the first reporting unit is configured to be a service that is managed by the controller in the root resource that generates the alarm. The alarm is reported to the upper-layer network device.
  • the processing module further includes: a recording unit, configured to record an association relationship between the alarm and the derived derivative alarm in the case of deriving the alarm, wherein the derivative alarm includes: a sub-resource-derived alarm and/or a relationship-derived alarm; the second reporting unit is configured to report the derived alarm and the association relationship to an upper-layer network device, and/or a providing unit, configured to provide the association relationship The network element device query in the controller management system.
  • a recording unit configured to record an association relationship between the alarm and the derived derivative alarm in the case of deriving the alarm
  • the derivative alarm includes: a sub-resource-derived alarm and/or a relationship-derived alarm
  • the second reporting unit is configured to report the derived alarm and the association relationship to an upper-layer network device
  • a providing unit configured to provide the association relationship The network element device query in the controller management system.
  • the device further includes: a generating module, configured to generate the network element device or the representative according to a state change of the network element device caused by the alarm, or a state change of an object representing the resource of the alarm The status notification of the object of the resource; the reporting module is configured to report the status notification of the generated network element device or the object representing the resource to the upper layer network device.
  • a generating module configured to generate the network element device or the representative according to a state change of the network element device caused by the alarm, or a state change of an object representing the resource of the alarm The status notification of the object of the resource
  • the reporting module is configured to report the status notification of the generated network element device or the object representing the resource to the upper layer network device.
  • a controller comprising the alarm processing apparatus of any of the above.
  • the controller comprises at least one of: a domain controller DC, a super controller SC, wherein the SC is an upper layer controller of the DC.
  • the alarm is received from the network device, and the alarm is analyzed to obtain an analysis result; the alarm is processed according to the analysis result, and the related technology is not only timely Moreover, in the case of a large number of alarms, the performance of the upper layer network device is low, and the effect of efficiently and timely processing the alarm is achieved.
  • FIG. 1 is a schematic diagram of networking in which a controller management network is used in the related art
  • FIG. 2 is a schematic diagram of a relationship between a controller and other network entities in an SDN network in the related art
  • FIG. 3 is a flowchart of an alarm processing method according to an embodiment of the present invention.
  • FIG. 4 is a structural block diagram of an alarm processing apparatus according to an embodiment of the present invention.
  • FIG. 5 is a block diagram showing a preferred structure of an analysis module 44 in an alarm processing apparatus according to an embodiment of the present invention
  • FIG. 6 is a block diagram showing a preferred structure of a second analyzing unit 54 in the analyzing module 44 in the alarm processing apparatus according to an embodiment of the present invention
  • FIG. 7 is a block diagram 1 of a preferred structure of a processing module 46 in an alarm processing apparatus according to an embodiment of the present invention
  • FIG. 8 is a block diagram 2 of a preferred structure of a processing module 46 in an alarm processing apparatus according to an embodiment of the present invention
  • FIG. 9 is a block diagram showing a preferred structure of an alarm processing apparatus according to an embodiment of the present invention.
  • FIG. 10 is a structural block diagram of a controller according to an embodiment of the present invention.
  • FIG. 11 is a schematic structural diagram of a controller alarm analysis module according to an embodiment of the present invention.
  • FIG. 12 is a schematic diagram of alarm reporting processing according to an embodiment of the present invention.
  • FIG. 13 is a schematic diagram of alarm reporting processing according to a preferred embodiment 2 of the present invention.
  • FIG. 3 is a flowchart of an alarm processing method according to an embodiment of the present invention. As shown in FIG. 3, the flow includes the following steps:
  • Step S302 receiving an alarm from the network device
  • the network device may be the network element device itself that generates the alarm, or may be a controller device;
  • Step S304 analyzing the alarm to obtain an analysis result
  • Step S306 processing the alarm according to the analysis result.
  • the controller analyzes and processes the received alarms, which solves the problem that the alarm processing is not timely in the related art, and the performance of the upper layer network device is low in the case of a large number of alarms.
  • the analysis result is different, and the analysis result may be different.
  • the alarm may be generated according to the alarm cause of the alarm, and the analysis may be performed to analyze whether the alarm affects the service managed by the controller.
  • the analysis result of whether the alarm affects the service managed by the controller may be analyzed according to the relationship between the resource that generates the alarm and the resource occupied by the controller.
  • the root of the alarm is generated. If the resource is not occupied by the service managed by the controller, and the sub-resource corresponding to the root resource is occupied by the service managed by the controller, the alarm is determined to have no impact on the service managed by the controller; If the service is not occupied by the controller, but the sub-resource corresponding to the root resource is occupied by the service managed by the controller, it is determined that the alarm affects the service managed by the controller; the root resource that generates the alarm is not controlled by the controller.
  • the sub-resource corresponding to the root resource is not occupied by the service managed by the controller. However, if the root resource and/or the sub-resource corresponding to the root resource are mapped to the service managed by the controller, the alarm is determined. Impact on the services managed by the controller; the situation in which the root resource generating the alarm is occupied by the controller Next, determine the impact of the alarm on the business production managed by the controller.
  • the alarm is processed differently according to the analysis result.
  • the following example shows that the alarm can be suppressed in the following cases: for example, the alarm is analyzed according to the cause of the alarm. If the controller does not affect the service managed by the controller, the alarm is suppressed. For example, the relationship between the resource generated by the alarm and the resource occupied by the controller is determined.
  • the alarm is suppressed; the alarm may be derivatized in the following cases: for example, the root resource that generates the alarm is not occupied by the service managed by the controller, but the sub-resource corresponding to the root resource is
  • the alarm is derived as a sub-resource-derived alarm; for example, the root resource that generates the alarm is not occupied by the service managed by the controller, and the sub-resource corresponding to the root resource is not used by the controller.
  • Managed business, but sub-resources corresponding to root resources and/or root resources and controller-managed industries If a mapping relationship exists, the alarm is derived as a relationship-derived alarm according to the mapping relationship.
  • the upper layer network device herein is a relative concept.
  • the upper layer network device is the upper layer network device SC of the controller DC, and for example, when the upper layer network is used.
  • the upper layer network device is the upper layer network device NMS of the SC.
  • the alarm in the case of deriving the alarm, it is also possible to: record the alarm and the derived Derived alarm relationship, where the derivative alarm includes: a sub-resource-derived alarm and/or a relationship-derived alarm; the derived alarm and the association relationship are reported to the upper-layer network device, and/or the association relationship is provided for the controller management system. NE device query.
  • the following processing may be further included: generating a network element device or an object representing a resource according to a state change of the network element device caused by the alarm, or a state change of an object representing the resource of the alarm
  • the status notification of the generated network element device or the object representing the resource is reported to the upper layer network device.
  • an alarm processing device is also provided, which is used to implement the above-mentioned embodiments and preferred embodiments, and has not been described again.
  • the term "module” may implement a combination of software and/or hardware of a predetermined function.
  • the apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and contemplated.
  • the apparatus includes a receiving module 42, an analyzing module 44, and a processing module 46, which will be described below.
  • the receiving module 42 is configured to receive an alarm of the network element device in the controller management system; the analyzing module 44 is connected to the receiving module 42 and configured to analyze the alarm to obtain an analysis result; the processing module 46 is connected to the analysis module. 44. Set to process the alarm according to the analysis result.
  • FIG. 5 is a block diagram showing a preferred structure of an analysis module 44 in an alarm processing apparatus according to an embodiment of the present invention.
  • the analysis module 44 includes one of the following: a first analysis unit 52, a second analysis unit 54, and the like. The analysis module 44 will be described.
  • the first analyzing unit 52 is configured to analyze whether the alarm has an impact on the service managed by the controller according to the alarm cause of generating the alarm; and the second analyzing unit 54 is configured to be managed according to the resource and the controller that generate the alarm.
  • the relationship between the resources occupied by the service analyzes the analysis result of whether the alarm affects the service managed by the controller.
  • FIG. 6 is a block diagram showing a preferred structure of the second analyzing unit 54 in the analyzing module 44 in the alarm processing apparatus according to the embodiment of the present invention.
  • the second analyzing unit 54 includes one of the following: the first determining sub-unit 62.
  • the second determining subunit 64, the third determining subunit 66, and the fourth determining subunit 68, the second analyzing unit 54 will be described below.
  • the first determining sub-unit 62 is configured to determine the alarm pair control in the case that the root resource generating the alarm is not occupied by the service managed by the controller, and the sub-resource corresponding to the root resource is not occupied by the service managed by the controller.
  • the service managed by the device does not have an impact;
  • the second determining sub-unit 64 is configured to be occupied by the service that the root resource that generates the alarm is not occupied by the controller, but the sub-resource corresponding to the root resource is occupied by the service managed by the controller. Determining that the alarm has an impact on the service managed by the controller;
  • the third determining subunit 66 is set to be the root of the alarm generated.
  • the resource is not occupied by the service managed by the controller, and the sub-resource corresponding to the root resource is not occupied by the service managed by the controller, but the sub-resource corresponding to the root resource and/or the root resource is mapped to the service managed by the controller.
  • the fourth determining sub-unit 68 is configured to determine the service production managed by the controller for the alarm when the root resource generating the alarm is occupied by the service managed by the controller. influences.
  • FIG. 7 is a block diagram of a preferred structure of a processing module 46 in an alarm processing apparatus according to an embodiment of the present invention.
  • the processing module 46 includes one of the following: a first suppression unit 70, a second suppression unit 72, and a first A derivation unit 74, a second derivation unit 76, and a first reporting unit 78, the processing module 46 will be described below.
  • the first suppression unit 70 is configured to suppress the alarm if the alarm does not affect the service managed by the controller according to the cause of the alarm; the second suppression unit 72 is configured to be based on the resource generated by the alarm.
  • the relationship between the resources occupied by the controller-managed service determines that the alarm does not affect the service managed by the controller, and the alarm is suppressed; the first derivative unit 74 is configured to not control the root resource that generates the alarm. If the service managed by the device is occupied by the service, but the sub-resource corresponding to the root resource is occupied by the service managed by the controller, the alarm is derived as a sub-resource-derived alarm; and the second derivation unit 76 is set to not generate the root resource of the alarm.
  • the service is managed by the controller, and the sub-resource corresponding to the root resource is not occupied by the service managed by the controller. However, if the root resource and/or the sub-resource corresponding to the root resource are mapped to the service managed by the controller, According to the mapping relationship, the alarm is derived as a relationship-derived alarm; the first reporting unit 78 is set to be controlled at the root resource that generates the alarm. The case manager of business occupied, alarm reporting directly to the upper-layer network device.
  • FIG. 8 is a block diagram of a preferred structure of the processing module 46 in the alarm processing apparatus according to the embodiment of the present invention.
  • the processing module 46 includes the first derivative module 74 and/or the first derivative module 76, Also included is a recording unit 82, a second reporting unit 84, and/or a providing unit 86, which is described below.
  • the recording unit 82 is configured to: record, in the case of deriving the alarm, the association between the alarm and the derived derivative alarm, where the derivative alarm includes: a sub-resource-derived alarm and/or a relationship-derived alarm; the second report
  • the unit 84 is configured to report the derived alarm and the association relationship to the upper layer network device, and/or the providing unit 86 is configured to provide an association relationship for the network element device query in the controller management system.
  • FIG. 9 is a block diagram of a preferred structure of an alarm processing apparatus according to an embodiment of the present invention. As shown in FIG. 9, the apparatus includes: a generating module 92 and a reporting module 94, in addition to all the modules shown in FIG. The device is described.
  • the generating module 92 is connected to the processing module 46, and configured to generate a status notification of the network element device or the object representing the resource according to the state change of the network element device caused by the alarm or the state change of the object representing the resource of the alarm;
  • the module 94 is connected to the generating module 92, and is configured to report the status notification of the generated network element device or the object representing the resource to the upper layer network device.
  • FIG. 10 is a block diagram showing the structure of a controller according to an embodiment of the present invention. As shown in FIG. 10, the controller 100 includes the alarm processing device 102 of any of the above.
  • the controller may include at least one of the following: a domain controller DC, a super controller SC, wherein the SC is an upper layer controller of the DC. It should be pointed out that there can be multiple SCs. From the perspective of DC, SC is the upper controller. If there is SC on the SC, the above is the upper controller. This is the relative relationship.
  • the original alarm may be generated by resources unrelated to the service, or by the controller.
  • the management of the business but the impact on the controller management business, resulting in business failure, or quality degradation.
  • the network management system or the control plane does not generate alarms for the device resources and the service.
  • the alarm is also presented as a service alarm.
  • the controller derives the affected service alarms.
  • the controller also needs to analyze the alarm affecting the service, and the alarm continues to be reported.
  • FIG. 11 is a schematic structural diagram of a controller alarm analysis module according to an embodiment of the present invention. As shown in FIG. 11, the alarm analysis module performs the following steps:
  • Step 1 After the device detects the fault, it generates an alarm and reports it to the controller and the NMS.
  • Step 2 After the controller receives the device alarm, it analyzes and processes it, including flexible combination of one or more of the following sub-steps:
  • Step 2.1 According to the cause of the alarm, the alarm causes no impact on the service. If one of the alarm causes is received, the alarm may not be processed or suppressed. Such alarm causes include, but are not limited to, temperature alarms, voltage alarms, smoke alarms, and the like, which are not listed one by one. Alarms that the controller needs to process, including but not limited to: LOS (Loss of Signal), DEG (Degraded Signal), LOC (Loss of Connectivity/Loss of Connection), AIS (Alarm Indication Signal).
  • LOS Liss of Signal
  • DEG Degraded Signal
  • LOC Liss of Connectivity/Loss of Connection
  • AIS Alarm Indication Signal
  • Step 2.2 Analyze the alarm and find that the resource that generates the alarm is not the resource occupied by the service, nor does it affect the resources occupied by the service. Such alarms may not be processed or suppressed.
  • Such resources include, but are not limited to, power modules, fan modules, backplane buses, and the like.
  • the controller needs to process the generated alarm resources, including but not limited to: physical port, connection terminal point, path termination point, logical terminal point, flow point, and stream point pool.
  • Step 2.3 Analyze the alarm and find that the resource that generates the alarm is not the resource directly occupied by the service. However, if the sub-resource is occupied by the service, the alarm can be deduced into an alarm of the sub-resource occupied by the service, and then the controller sends the generated alarm. Reported to the upper controller and the network management plane. The original alarm can continue to be reported according to the implementation needs or Not reported.
  • Step 2.4 Analyze the alarm and find that the resource that generates the alarm is the resource occupied by the service.
  • the alarm that is reported is the alarm of the service.
  • the alarm is sent to the upper-layer controller and the network management plane.
  • Step 2.5 Analyze the alarm and find that the resource that generates the alarm has no direct correspondence with the resource object of the service, but has an indirect mapping relationship (for example, virtualization), and the controller derives according to the indirect mapping relationship.
  • the alarm of the service resource, and then the controller reports the derivative alarm to the upper layer control and the network management plane.
  • the original alarm can be reported or not reported according to the implementation requirements.
  • Step 2.6 Analyze the alarm and find that the alarm is a network element alarm, but the controller is not interested in the alarm, but is interested in the change of the network element status caused by the alarm.
  • the controller suppresses or discards the alarm, generates a status notification, and modifies the alarm.
  • the status of the local NE is reported to the upper-layer controller and the NMS plane.
  • Step 2.7 The new alarm generated by the controller, the corresponding relationship between the original alarm and the derived alarm is recorded, and provided when the alarm is reported, or a query is provided, so that the network management plane performs root cause analysis to find the root cause of the fault, and repair and Troubleshoot.
  • Step 3 After the EMS receives the original alarm from the device and receives the derived alarm from the controller, the EMS can perform local storage, display, confirmation, and annotation management. The EMS reports both alarms to the NMS/OSS.
  • Step 4 After receiving the derivative alarm reported by the lower-layer controller, the upper-layer controller performs the local analysis processing by using the analysis and processing method of step 2. The result is reported to the APP and the OSS/NMS.
  • Step 5 After receiving the service alarm, the APP is used for interface display and service quality assessment.
  • Step 6 The OSS/NMS receives the original alarms reported by the EMS, and the derived alarms, and the derived alarms reported from the upper-layer controllers for comprehensive analysis, including analysis of alarm correlations, root cause analysis, etc., for network operation, maintenance, and elimination. Provide basis for failure, billing, etc.
  • the method for processing device resource alarms by the controller includes analyzing, processing, deriving, and continuing to report to other systems after receiving the alarm. It provides an efficient and feasible alarm processing method for the controller to handle alarms.
  • the following describes an alarm analysis processing method by taking an alarm generated in a service across multiple controllers as an example.
  • FIG. 12 is a schematic diagram of an alarm reporting process according to a preferred embodiment of the present invention.
  • domain controllers DC1 and DC2, a zone management communication network, and a super controller SC are used as upper controllers to manage DC1 and DC2. .
  • Two management domains are connected to NE1, and NE2 to NE6 form a communication network.
  • the connection between NE1 and NE6 indicates the service that the APP cares about.
  • the service A endpoint is at NE1, the Z endpoint is at NE6, and the NE2 is passed through.
  • NE3, NE4, and NE5 are directly managed by DC1 and DC2, respectively, and the dotted line in the figure indicates the management relationship.
  • DC1, DC2, and SC respectively have a paired network management system. It is assumed that an alarm Alarm1 is generated in the network element 1, and other network elements also generate alarms.
  • Step 1 NE1 detects the fault, the smoke detector feels that the smoke is excessive, the smoke detection module generates the alarm alarm1, and reports it to DC1 and EMS1.
  • Step 2 After DC1 receives Alarm1, the analysis module analyzes the cause of the alarm and finds that the alarm cause of alarm1 is a smoke alarm, which is an alarm cause unrelated to the service, so DC1 ignores the alarm.
  • Step 3 If the fault is detected by the NE2, the fan module finds that the fan speed is abnormal. The alarm alarm2 is generated and reported to DC1 and EMS1.
  • Step 4 After DC1 receives alarm2, the analysis module analyzes the alarm source and finds that the resource generated by alarm2 is a fan module, which has nothing to do with the service, so DC1 ignores the alarm.
  • Step 5 The OTN optical port of the NE1 is faulty, and the OTN has a signal degradation alarm.
  • the alarm alarm3 is generated and reported to DC1 and EMS1.
  • Step 6 DC1 receives the alarm3 and analyzes it.
  • the analysis module analyzes the OTN port. Although the resource is not directly used by the service, the sub-channel ODU1-1 under the OTN is used in the service 1, and the DC1 derives the ODU1-1 resource. Degradation alarm alarm4, and record the corresponding relationship of alarm3-alarm4, then DC1 reports alarm4 to SC and EMS1, and the association of alarm3-alarm4 is attached.
  • Step 7 The EMS receives a total of alarm1, alarm2, alarm3, and alarm4. While performing traditional EMS alarm management, these alarms are reported to NMS/OSS1.
  • Step 8 The SC receives the alarm alarm4, and the analysis module finds that the resource ODU1 and the service 1 in the SC are virtualized and mapped to the service 2, and the ODU1 is virtualized into the LTP1.
  • the derived module SC derives the alarm5 of the LTP1 resource from alarm4, and records the correspondence of alarm4-alarm5.
  • the SC reports alarm5 to the app and NMS/OSS1 with the association of alarm4-alarm5.
  • Step 9 NMS/OSS1 receives alarms alarm1, alarm2, alarm3, alarm4, alarm5. Since the derived correspondence of alarm3-alarm4-alarm5 is already available, NMS/OSS1 can easily analyze that alarm3 is the root cause alarm. It is necessary to notify the maintenance personnel to repair the device and eliminate the fault.
  • Step 10 After receiving the alarm5, the APP knows that its service 2 has generated alarm 5, and service 2 has received an impact. App users communicate and coordinate with the network operator.
  • FIG. 13 is a schematic diagram of an alarm reporting process according to a preferred embodiment of the present invention.
  • one network element NE1 in the network is managed by the implemented domain controller DC1, and is managed by the EMS1 network management system, and NE1 is generated.
  • An alarm a the result processing flow is as follows
  • Step 1 NE1 detects the fault and reports alarm a.
  • Step 2 DC1 analyzes the alarm a, analyzes the alarm cause and the alarm source, and finds that the sub-resource of the alarm a is used by the service, discards the alarm a according to the analysis result, derives the alarm b, and then reports the alarm b to the upper layer. Controller SC1, and network management system EMS1.
  • Step 3 After EMS1 receives alarm a and alarm b, alarms a and b are reported to the upper-layer network management system OSS1.
  • Step 4 After receiving the alarm b reported by the DC1, the SC1 analyzes the alarm reason and the alarm source, and finds that the resource of the alarm b is virtualized and becomes the logical object obj1. They belong to the virtualized mapping relationship, and the SC1 discards. Alarm b, derived from alarm c. SC1 reports the alarm c to the app and OSS1 at the same time.
  • Step 5 The app receives the alarm notification and knows that the abstract object obj1 in its own service has an alarm c. For the purpose of troubleshooting, the app issues a request for querying all alarms and associations to OSS1.
  • Step 6 OSS1 queries the alarm association relationship from SC1 to obtain the association relationship between alarm b and alarm c.
  • Step 7 OSS1 queries the alarm association relationship from EMS1.
  • Step 8 EMS1 finds the association between alarm a and alarm b from DC1. Report to OSS1.
  • Step 9 OSS1 summarizes the associations of alarms a, b, and c, and reports them to the APP.
  • Step 10 The app gets all the alarms a, b, c from the query response and knows that a is the root cause alarm. It is used to notify the operation and maintenance personnel to repair the equipment.
  • modules or steps of the embodiments of the present invention can be implemented by a general computing device, which can be concentrated on a single computing device or distributed in multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device such that they may be stored in the storage device by the computing device and, in some cases, may be different from The steps shown or described are performed sequentially, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps thereof are fabricated into a single integrated circuit module. Thus, the invention is not limited to any specific combination of hardware and software.
  • the above-mentioned embodiments and the preferred embodiments solve the problem that the alarm processing is not timely in the related art, and the performance of the upper layer network device is low in the case of a large number of alarms, thereby achieving efficient and timely processing.
  • the effect of the alarm is not timely in the related art, and the performance of the upper layer network device is low in the case of a large number of alarms, thereby achieving efficient and timely processing. The effect of the alarm.

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Disclosed are an alarm processing method and device, and a controller. The method comprises: receiving an alarm from a network device; analyzing the alarm to obtain an analysis result; and processing the alarm according to the analysis result. By means of the present invention, the problem in the related art is solved that alarms are not processed timely and performance an upper layer network device is low when the number of the alarms is great, and accordingly the effect of efficiently and timely processing the alarms is achieved.

Description

告警处理方法、装置及控制器Alarm processing method, device and controller 技术领域Technical field
本发明涉及通信领域,具体而言,涉及一种告警处理方法、装置及控制器。The present invention relates to the field of communications, and in particular to an alarm processing method, apparatus, and controller.
背景技术Background technique
在通讯网络中,网络由许多通讯设备节点组成,这些网络节点叫做网元。网元之间通过通讯线路进行连接,包括光纤电缆等多种形式。网元则分散分布在各个地区,有的在城市里的通讯大楼实验室里,有的网元在偏远地区。然而这些网元的设备需要进行配置,维护和监控,不可能每处都派人值守,这样就需要一个中心网络管理系统,放在中心机房,通过远程通讯对网络上各个节点进行配置,维护和监控。In a communication network, a network consists of a number of communication device nodes, which are called network elements. The network elements are connected by communication lines, including fiber optic cables and the like. The network elements are distributed in various regions, some in the communication building laboratory in the city, and some network elements are in remote areas. However, the equipment of these network elements needs to be configured, maintained and monitored. It is impossible to assign personnel to each place. This requires a central network management system, which is placed in the central computer room to configure and maintain various nodes on the network through remote communication. monitor.
通过控制器管理网络可以由一种新出现的网络管理控制系统来实现。在这个控制系统中,把传统网管中对业务资源的控制功能独立出来,仅仅关注业务资源。控制器可以按树型层次化组织,以便关联大规模网络。其中,直接管理网元的可以称为域控制器(Domain Controller,或者D-Controller,简称为DC);而上层的控制器(Super Controller,或者S-Controller,简称为SC)不直接管理网元,而是管理域控制器,然后再通过域控制器提供的虚拟网络管理,实现对实际网络的管理。图1是相关技术中使用控制器管控网络的组网示意图,如图1所示,在一个应用场景中,控制器形成树形管理体系,上层是SC,底层的DC划分管理域,管理通讯网络和网元。控制器除了南向和网络设备通过接口进行管理,还有北向接口可以让应用层的网络APP(Application)接入进行网络管理,还可以通过侧接口,同网管平面(包括:网元管理系统(Element Management System,简称为EMS),网络管理系统(Network Management System,简称为NMS),或者操作支撑系统(Operation Support System,简称为OSS))沟通管理信息。网络APP是网络的实际业务应用,使用控制器提供的资源,发出业务建立,删除,修改的请求。而控制器根据网络APP的请求建立,删除,修改业务,并对业务的告警,性能进行监控。图2是相关技术中软件定义网络(Software Defined Network,简称为SDN)网络中控制器与其它网络实体之间的关系示意图,如图2所示,DC直接管理通讯网络,而SC管理DC,同时还可以和传统网络管理系统进行交流,最终提供给APP提供资源和服务。Managing the network through the controller can be achieved by an emerging network management control system. In this control system, the control functions of the service resources in the traditional network management are separated, and only the service resources are concerned. Controllers can be hierarchically organized in a tree to correlate large-scale networks. The controller that directly manages the NEs can be called a domain controller (D-Controller, or DC). The controller of the upper layer (Super Controller, or S-Controller, or SC) does not directly manage NEs. Instead, the domain controller is managed, and then the virtual network management provided by the domain controller is used to manage the actual network. FIG. 1 is a schematic diagram of networking in which a controller management network is used in the related art. As shown in FIG. 1 , in an application scenario, a controller forms a tree management system, and an upper layer is an SC, an underlying DC partition management domain, and a management communication network. And network elements. The controller is managed by the interface in the south direction and the network device, and the northbound interface allows the application layer to access the network APP (Application) for network management, and also through the side interface and the same network management plane (including: the network element management system ( Element Management System (referred to as EMS), Network Management System (NMS), or Operation Support System (OSS) communicates management information. The network APP is the actual business application of the network, and uses the resources provided by the controller to issue requests for service establishment, deletion, and modification. The controller establishes, deletes, and modifies the service according to the request of the network APP, and monitors the alarm and performance of the service. 2 is a schematic diagram of a relationship between a controller and other network entities in a Software Defined Network (SDN) network in the related art. As shown in FIG. 2, the DC directly manages the communication network, and the SC manages the DC. It can also communicate with traditional network management systems to provide resources and services to the APP.
网络实际运行过程中,可能会遇到故障,或者收到干扰而通讯质量下降。一旦发送这种情况,网络设备就会报告警。由于网络设备直接的通讯是密切关联的,一个设备或者一部分资源有故障上报告警,就会引发网络大面积产生告警。产生非常多的告 警量。对网络管理员来说,这么多告警要找出真正的故障原因是困难的。网络中一个故障的出现会引发一个直接反映该故障的告警,同时由于故障影响到其他设备或者业务,会引发一系列告警。例如,告警A引发了告警B,告警A是根源告警,告警B是衍生告警。During the actual operation of the network, faults may be encountered, or interference may be received and communication quality may be degraded. Once this is sent, the network device reports an alert. Since the direct communication of the network device is closely related, if a device or a part of the resource reports a fault on the fault, the network will generate an alarm in a large area. Produce a lot of reports Police. For network administrators, it is difficult to find so many alarms for the real cause of the failure. The occurrence of a fault in the network triggers an alarm that directly reflects the fault. At the same time, a series of alarms are triggered because the fault affects other devices or services. For example, alarm A triggers alarm B, alarm A is the root alarm, and alarm B is the derivative alarm.
在传统的网络中,告警都是在设备产生的,网络控制器接收到告警后直接将告警转发给处理告警的上层网络设备,因而在相关技术中,不仅存在告警处理不及时,而且在告警数量多的情况下,造成上层网络设备性能低下的问题。In the traditional network, the alarms are generated by the device. After receiving the alarm, the network controller directly forwards the alarm to the upper-layer network device that processes the alarm. Therefore, in the related technology, not only the alarm processing is not timely, but also the number of alarms. In many cases, the performance of the upper layer network device is low.
发明内容Summary of the invention
本发明实施例提供了一种告警处理方法、装置及控制器,以至少解决相关技术中,不仅存在告警处理不及时,而且在告警数量多的情况下,造成上层网络设备性能低下的问题。The embodiment of the present invention provides an alarm processing method, device, and controller, so as to solve at least the problem that the performance of the upper layer network device is low, not only in the case that the alarm processing is not timely, but also in the case that the number of alarms is large.
根据本发明实施例的一个方面,提供了一种告警处理方法,包括:接收到来自网络设备的告警;对所述告警进行分析得出分析结果;依据所述分析结果对所述告警进行处理。According to an aspect of the embodiments of the present invention, an alarm processing method is provided, including: receiving an alarm from a network device; analyzing the alarm to obtain an analysis result; and processing the alarm according to the analysis result.
优选地,对所述告警进行分析得到所述分析结果包括:依据产生所述告警的告警原因,分析得出所述告警是否对控制器管理的业务产生影响的所述分析结果;依据产生所述告警的资源与所述控制器管理的业务所占用的资源之间的关系,分析得出所述告警是否对所述控制器管理的所述业务产生影响的所述分析结果。Preferably, the analyzing the alarm to obtain the analysis result comprises: analyzing, according to the alarm cause of generating the alarm, whether the alarm has an impact on the service managed by the controller; The relationship between the resource of the alarm and the resource occupied by the service managed by the controller is analyzed to determine whether the alarm has an impact on the service managed by the controller.
优选地,依据产生所述告警的资源与所述控制器管理的业务所占用的资源之间的关系,分析得出所述告警是否对所述控制器管理的所述业务产生影响的所述分析结果包括以下之一:在产生所述告警的根资源不被所述控制器管理的业务所占用,并且也没有所述根资源对应的子资源被所述控制器管理的业务所占用的情况下,确定所述告警对所述控制器管理的所述业务不产生影响;在产生所述告警的根资源不被所述控制器管理的业务所占用,但所述根资源对应的子资源被所述控制器管理的业务所占用的情况下,确定所述告警对所述控制器管理的所述业务产生影响;在产生所述告警的根资源不被所述控制器管理的业务所占用,所述根资源对应的子资源也不被所述控制器管理的业务所占用,但所述根资源和/或所述根资源对应的子资源与所述控制器管理的业务存在映射关系的情况下,确定所述告警对所述控制器管理的所述业务产生影响;在产生所述告警的根资源被所述控制器管理的业务所占用的情况下,确定所述告警对所述控制器管理的所述业务生产影响。Preferably, analyzing, according to the relationship between the resource that generates the alarm and the resource occupied by the service managed by the controller, analyzing whether the alarm affects the service managed by the controller The result includes one of the following: in a case where the root resource generating the alarm is not occupied by the service managed by the controller, and the sub-resource corresponding to the root resource is not occupied by the service managed by the controller Determining that the alarm does not affect the service managed by the controller; the root resource that generates the alarm is not occupied by the service managed by the controller, but the sub-resource corresponding to the root resource is In the case that the service managed by the controller is occupied, the alarm is determined to have an impact on the service managed by the controller; and the root resource generating the alarm is not occupied by the service managed by the controller. The sub-resource corresponding to the root resource is not occupied by the service managed by the controller, but the root resource and/or the sub-resource corresponding to the root resource and the service managed by the controller If the mapping relationship exists, determining that the alarm has an impact on the service managed by the controller; and determining that the root resource that generates the alarm is occupied by a service managed by the controller The business production impact on the controller management.
优选地,依据所述分析结果对所述告警进行处理包括以下之一:在依据所述告警 原因,分析得出所述告警对所述控制器管理的业务不产生影响的情况下,对所述告警进行抑制;在依据产生所述告警的资源与所述控制器管理的业务所占用的资源之间的关系确定所述告警对所述控制器管理的所述业务不产生影响的情况下,对所述告警进行抑制;在产生所述告警的根资源不被所述控制器管理的业务所占用,但所述根资源对应的子资源被所述控制器管理的业务所占用的情况下,将所述告警衍生为子资源衍生告警;在产生所述告警的根资源不被所述控制器管理的业务所占用,所述根资源对应的子资源也不被所述控制器管理的业务所占用,但所述根资源和/或所述根资源对应的子资源与所述控制器管理的业务存在映射关系的情况下,依据所述映射关系,将所述告警衍生为关系衍生告警;在产生所述告警的根资源被所述控制器管理的业务所占用的情况下,直接将所述告警上报给上层网络设备。Preferably, processing the alarm according to the analysis result includes one of: following the alarm The reason is that if the alarm does not affect the service managed by the controller, the alarm is suppressed; and the resource occupied by the resource generated by the controller and the controller is used according to the resource that generates the alarm. If the relationship determines that the alarm does not affect the service managed by the controller, the alarm is suppressed; where the root resource generating the alarm is not managed by the controller If the sub-resource corresponding to the root resource is occupied by the service managed by the controller, the alarm is derived as a sub-resource-derived alarm; the root resource that generates the alarm is not used by the controller. The sub-resource corresponding to the root resource is not occupied by the service managed by the controller, but the root resource and/or the sub-resource corresponding to the root resource are managed by the controller. If the service has a mapping relationship, the alarm is derived as a relationship-derived alarm according to the mapping relationship; the root resource that generates the alarm is occupied by the service managed by the controller. If the alarm is used, the alarm is directly reported to the upper-layer network device.
优选地,在对所述告警进行衍生处理的情况下,还包括:记录所述告警与衍生后的衍生告警之间的关联关系,其中,所述衍生告警包括:子资源衍生告警和/或关系衍生告警;将所述衍生告警以及所述关联关系上报给上层网络设备,和/或提供所述关联关系供所述控制器管理系统中的网元设备查询。Preferably, in the case of deriving the alarm, the method further includes: recording an association between the alarm and the derived derivative alarm, where the derivative alarm includes: a sub-resource-derived alarm and/or relationship Deriving the alarm; reporting the derived alarm and the association relationship to the upper layer network device, and/or providing the association relationship for the network element device in the controller management system to query.
优选地,在依据所述分析结果对所述告警进行处理之后,还包括:依据所述告警所引起的网元设备的状态变化,或者所述告警的代表资源的对象的状态变化,生成所述网元设备或者所述代表资源的对象的状态通知;将生成的所述网元设备或者所述代表资源的对象的状态通知上报给上层网络设备。Preferably, after the alarm is processed according to the analysis result, the method further includes: generating, according to a state change of the network element device caused by the alarm, or a state change of an object representing the resource of the alarm The status notification of the network element device or the object representing the resource; the status notification of the generated network element device or the object representing the resource is reported to the upper layer network device.
根据本发明实施例的另一方面,提供了一种告警处理装置,包括:接收模块,设置为接收到来自网络设备的告警;分析模块,设置为对所述告警进行分析得出分析结果;处理模块,设置为依据所述分析结果对所述告警进行处理。According to another aspect of the present invention, an alarm processing apparatus is provided, including: a receiving module configured to receive an alarm from a network device; and an analysis module configured to analyze the alarm to obtain an analysis result; The module is configured to process the alarm according to the analysis result.
优选地,所述分析模块包括:第一分析单元,设置为依据产生所述告警的告警原因,分析得出所述告警是否对控制器管理的业务产生影响的所述分析结果;第二分析单元,设置为依据产生所述告警的资源与所述控制器管理的业务所占用的资源之间的关系,分析得出所述告警是否对所述控制器管理的所述业务产生影响的所述分析结果。Preferably, the analysis module includes: a first analysis unit, configured to analyze, according to the cause of the alarm that generates the alarm, whether the alarm has an impact on the service managed by the controller; and the second analysis unit And analyzing, according to the relationship between the resource that generates the alarm and the resource occupied by the service managed by the controller, analyzing, by the analysis, whether the alarm affects the service managed by the controller result.
优选地,所述第二分析单元包括以下之一:第一确定子单元,设置为在产生所述告警的根资源不被所述控制器管理的业务所占用,并且也没有所述根资源对应的子资源被所述控制器管理的业务所占用的情况下,确定所述告警对所述控制器管理的所述业务不产生影响;第二确定子单元,设置为在产生所述告警的根资源不被所述控制器管理的业务所占用,但所述根资源对应的子资源被所述控制器管理的业务所占用的情况下,确定所述告警对所述控制器管理的所述业务产生影响;第三确定子单元,设置为在产生所述告警的根资源不被所述控制器管理的业务所占用,所述根资源对应的子资源也不被所述控制器管理的业务所占用,但所述根资源和/或所述根资源对应的子资 源与所述控制器管理的业务存在映射关系的情况下,确定所述告警对所述控制器管理的所述业务产生影响;第四确定子单元,设置为在产生所述告警的根资源被所述控制器管理的业务所占用的情况下,确定所述告警对所述控制器管理的所述业务生产影响。Preferably, the second analyzing unit comprises one of: a first determining subunit, configured to be occupied by a service in which a root resource generating the alarm is not managed by the controller, and also having no corresponding root resource In the case that the sub-resource is occupied by the service managed by the controller, it is determined that the alarm does not affect the service managed by the controller; and the second determining sub-unit is set to generate the root of the alarm. The resource is not occupied by the service managed by the controller, but if the sub-resource corresponding to the root resource is occupied by the service managed by the controller, determining the service that the alarm manages to the controller The third determining subunit is configured to be occupied by a service in which the root resource generating the alarm is not managed by the controller, and the sub resource corresponding to the root resource is not used by the controller managed by the controller. Occupied, but the root resource and/or the corresponding resource of the root resource If the source has a mapping relationship with the service managed by the controller, determining that the alarm has an impact on the service managed by the controller; and determining, by the fourth determining subunit, that the root resource that generates the alarm is In the case that the service managed by the controller is occupied, the impact of the alarm on the service production managed by the controller is determined.
优选地,所述处理模块包括以下之一:第一抑制单元,设置为在依据所述告警原因,分析得出所述告警对所述控制器管理的业务不产生影响的情况下,对所述告警进行抑制;第二抑制单元,设置为在依据产生所述告警的资源与所述控制器管理的业务所占用的资源之间的关系确定所述告警对所述控制器管理的所述业务不产生影响的情况下,对所述告警进行抑制;第一衍生单元,设置为在产生所述告警的根资源不被所述控制器管理的业务所占用,但所述根资源对应的子资源被所述控制器管理的业务所占用的情况下,将所述告警衍生为子资源衍生告警;第二衍生单元,设置为在产生所述告警的根资源不被所述控制器管理的业务所占用,所述根资源对应的子资源也不被所述控制器管理的业务所占用,但所述根资源和/或所述根资源对应的子资源与所述控制器管理的业务存在映射关系的情况下,依据所述映射关系,将所述告警衍生为关系衍生告警;第一上报单元,设置为在产生所述告警的根资源被所述控制器管理的业务所占用的情况下,直接将所述告警上报给上层网络设备。Preferably, the processing module includes one of the following: a first suppression unit, configured to: if the alarm is not affected by the service managed by the controller according to the alarm cause, The alarm is suppressed; the second suppression unit is configured to determine, according to the relationship between the resource that generates the alarm and the resource occupied by the controller, that the alarm does not manage the service managed by the controller In the case of an impact, the alarm is suppressed; the first derivative unit is configured to be occupied by a service in which the root resource generating the alarm is not managed by the controller, but the sub-resource corresponding to the root resource is In the case that the service managed by the controller is occupied, the alarm is derived as a sub-resource-derived alarm; and the second derivation unit is configured to be occupied by a service in which the root resource generating the alarm is not managed by the controller. The sub-resource corresponding to the root resource is not occupied by the service managed by the controller, but the root resource and/or the sub-resource corresponding to the root resource and the controller In the case that the managed service has a mapping relationship, the alarm is derived as a relationship-derived alarm according to the mapping relationship; the first reporting unit is configured to be a service that is managed by the controller in the root resource that generates the alarm. The alarm is reported to the upper-layer network device.
优选地,该处理模块还包括:记录单元,设置为在对所述告警进行衍生处理的情况下,记录所述告警与衍生后的衍生告警之间的关联关系,其中,所述衍生告警包括:子资源衍生告警和/或关系衍生告警;第二上报单元,设置为将所述衍生告警以及所述关联关系上报给上层网络设备,和/或,提供单元,设置为提供所述关联关系供所述控制器管理系统中的网元设备查询。Preferably, the processing module further includes: a recording unit, configured to record an association relationship between the alarm and the derived derivative alarm in the case of deriving the alarm, wherein the derivative alarm includes: a sub-resource-derived alarm and/or a relationship-derived alarm; the second reporting unit is configured to report the derived alarm and the association relationship to an upper-layer network device, and/or a providing unit, configured to provide the association relationship The network element device query in the controller management system.
优选地,该装置还包括:生成模块,设置为依据所述告警所引起的网元设备的状态变化,或者所述告警的代表资源的对象的状态变化,生成所述网元设备或者所述代表资源的对象的状态通知;上报模块,设置为将生成的所述网元设备或者所述代表资源的对象的状态通知上报给上层网络设备。Preferably, the device further includes: a generating module, configured to generate the network element device or the representative according to a state change of the network element device caused by the alarm, or a state change of an object representing the resource of the alarm The status notification of the object of the resource; the reporting module is configured to report the status notification of the generated network element device or the object representing the resource to the upper layer network device.
根据本发明实施例的还一方面,提供了一种控制器,包括上述任一项所述的告警处理装置。According to still another aspect of the embodiments of the present invention, there is provided a controller comprising the alarm processing apparatus of any of the above.
优选地,所述控制器包括以下至少之一:域控制器DC、超级控制器SC,其中,所述SC为所述DC的上层控制器。Preferably, the controller comprises at least one of: a domain controller DC, a super controller SC, wherein the SC is an upper layer controller of the DC.
通过本发明实施例,采用接收到来自网络设备的告警;对所述告警进行分析得出分析结果;依据所述分析结果对所述告警进行处理,解决了相关技术中,不仅存在告警处理不及时,而且在告警数量多的情况下,造成上层网络设备性能低下的问题,进而达到了高效及时处理告警的效果。 According to the embodiment of the present invention, the alarm is received from the network device, and the alarm is analyzed to obtain an analysis result; the alarm is processed according to the analysis result, and the related technology is not only timely Moreover, in the case of a large number of alarms, the performance of the upper layer network device is low, and the effect of efficiently and timely processing the alarm is achieved.
附图说明DRAWINGS
此处所说明的附图用来提供对本发明的进一步理解,构成本申请的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:The drawings described herein are intended to provide a further understanding of the invention, and are intended to be a part of the invention. In the drawing:
图1是相关技术中使用控制器管控网络的组网示意图;1 is a schematic diagram of networking in which a controller management network is used in the related art;
图2是相关技术中SDN网络中控制器与其它网络实体之间的关系示意图;2 is a schematic diagram of a relationship between a controller and other network entities in an SDN network in the related art;
图3是根据本发明实施例的告警处理方法的流程图;FIG. 3 is a flowchart of an alarm processing method according to an embodiment of the present invention; FIG.
图4是根据本发明实施例的告警处理装置的结构框图;4 is a structural block diagram of an alarm processing apparatus according to an embodiment of the present invention;
图5是根据本发明实施例的告警处理装置中分析模块44的优选结构框图;FIG. 5 is a block diagram showing a preferred structure of an analysis module 44 in an alarm processing apparatus according to an embodiment of the present invention; FIG.
图6是根据本发明实施例的告警处理装置中分析模块44中第二分析单元54的优选结构框图;6 is a block diagram showing a preferred structure of a second analyzing unit 54 in the analyzing module 44 in the alarm processing apparatus according to an embodiment of the present invention;
图7是根据本发明实施例的告警处理装置中处理模块46的优选结构框图一;7 is a block diagram 1 of a preferred structure of a processing module 46 in an alarm processing apparatus according to an embodiment of the present invention;
图8是根据本发明实施例的告警处理装置中处理模块46的优选结构框图二;8 is a block diagram 2 of a preferred structure of a processing module 46 in an alarm processing apparatus according to an embodiment of the present invention;
图9是根据本发明实施例的告警处理装置的优选结构框图;9 is a block diagram showing a preferred structure of an alarm processing apparatus according to an embodiment of the present invention;
图10是根据本发明实施例的控制器的结构框图;FIG. 10 is a structural block diagram of a controller according to an embodiment of the present invention; FIG.
图11是根据本发明实施例的控制器告警分析模块的结构示意图;11 is a schematic structural diagram of a controller alarm analysis module according to an embodiment of the present invention;
图12是根据本发明实施例的告警上报处理的示意图;FIG. 12 is a schematic diagram of alarm reporting processing according to an embodiment of the present invention; FIG.
图13是根据本发明优选实施例二的告警上报处理的示意图。FIG. 13 is a schematic diagram of alarm reporting processing according to a preferred embodiment 2 of the present invention.
具体实施方式detailed description
下文中将参考附图并结合实施例来详细说明本发明。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。The invention will be described in detail below with reference to the drawings in conjunction with the embodiments. It should be noted that the embodiments in the present application and the features in the embodiments may be combined with each other without conflict.
在本实施例中提供了一种告警处理方法,图3是根据本发明实施例的告警处理方法的流程图,如图3所示,该流程包括如下步骤:An alarm processing method is provided in this embodiment. FIG. 3 is a flowchart of an alarm processing method according to an embodiment of the present invention. As shown in FIG. 3, the flow includes the following steps:
步骤S302,接收到来自网络设备的告警,需要说明的是,该网络设备可以是产生该告警的网元设备本身,也可以是控制器设备;Step S302, receiving an alarm from the network device, it should be noted that the network device may be the network element device itself that generates the alarm, or may be a controller device;
步骤S304,对告警进行分析得出分析结果; Step S304, analyzing the alarm to obtain an analysis result;
步骤S306,依据分析结果对告警进行处理。Step S306, processing the alarm according to the analysis result.
通过上述步骤,由控制器来对接收到的告警进行分析处理,解决了相关技术中,不仅存在告警处理不及时,而且在告警数量多的情况下,造成上层网络设备性能低下的问题,进而达到了高效及时处理告警的效果。Through the above steps, the controller analyzes and processes the received alarms, which solves the problem that the alarm processing is not timely in the related art, and the performance of the upper layer network device is low in the case of a large number of alarms. The effect of efficient and timely processing of alarms.
优选地,对告警进行分析得到分析结果时,采用不同的分析依据,分析的结果也可以不同,例如,可以依据产生告警的告警原因,分析得出告警是否对控制器管理的业务产生影响的分析结果;也可以依据产生告警的资源与控制器管理的业务所占用的资源之间的关系,分析得出告警是否对控制器管理的业务产生影响的分析结果。Preferably, when the analysis is performed on the alarm, the analysis result is different, and the analysis result may be different. For example, the alarm may be generated according to the alarm cause of the alarm, and the analysis may be performed to analyze whether the alarm affects the service managed by the controller. As a result, the analysis result of whether the alarm affects the service managed by the controller may be analyzed according to the relationship between the resource that generates the alarm and the resource occupied by the controller.
在依据产生告警的资源与控制器管理的业务所占用的资源之间的关系,分析得出告警是否对控制器管理的业务产生影响的分析结果时,可以包括以下之一:在产生告警的根资源不被控制器管理的业务所占用,并且也没有根资源对应的子资源被控制器管理的业务所占用的情况下,确定告警对控制器管理的业务不产生影响;在产生告警的根资源不被控制器管理的业务所占用,但根资源对应的子资源被控制器管理的业务所占用的情况下,确定告警对控制器管理的业务产生影响;在产生告警的根资源不被控制器管理的业务所占用,根资源对应的子资源也不被控制器管理的业务所占用,但根资源和/或根资源对应的子资源与控制器管理的业务存在映射关系的情况下,确定告警对控制器管理的业务产生影响;在产生告警的根资源被控制器管理的业务所占用的情况下,确定告警对控制器管理的业务生产影响。When analyzing the result of analyzing whether the alarm affects the service managed by the controller according to the relationship between the resource generated by the alarm and the resource occupied by the controller, the following may be included: the root of the alarm is generated. If the resource is not occupied by the service managed by the controller, and the sub-resource corresponding to the root resource is occupied by the service managed by the controller, the alarm is determined to have no impact on the service managed by the controller; If the service is not occupied by the controller, but the sub-resource corresponding to the root resource is occupied by the service managed by the controller, it is determined that the alarm affects the service managed by the controller; the root resource that generates the alarm is not controlled by the controller. When the managed service is occupied, the sub-resource corresponding to the root resource is not occupied by the service managed by the controller. However, if the root resource and/or the sub-resource corresponding to the root resource are mapped to the service managed by the controller, the alarm is determined. Impact on the services managed by the controller; the situation in which the root resource generating the alarm is occupied by the controller Next, determine the impact of the alarm on the business production managed by the controller.
依据分析结果对告警进行处理时,依据分析结果的不同,对该告警进行处理也不同,下面举例说明:可以在以下情况下,对告警进行抑制处理:例如,在依据告警原因,分析得出告警对控制器管理的业务不产生影响的情况下,对告警进行抑制;又例如,在依据产生告警的资源与控制器管理的业务所占用的资源之间的关系确定告警对控制器管理的业务不产生影响的情况下,对告警进行抑制;可以在以下情况下,对该告警进行衍生处理:例如,在产生告警的根资源不被控制器管理的业务所占用,但根资源对应的子资源被控制器管理的业务所占用的情况下,将告警衍生为子资源衍生告警;又例如,在产生告警的根资源不被控制器管理的业务所占用,根资源对应的子资源也不被控制器管理的业务所占用,但根资源和/或根资源对应的子资源与控制器管理的业务存在映射关系的情况下,依据映射关系,将告警衍生为关系衍生告警;另外,在产生告警的根资源被控制器管理的业务所占用的情况下,直接将告警上报给上层网络设备。需要说明的是,此处的上层网络设备是一个相对概念,例如,当控制器DC接收到该告警时,该上层网络设备即是该控制器DC的上层网络设备SC,再例如,当上层网络设备SC接收到该告警时,该上层网络设备即是该SC的上层网络设备NMS。When the alarm is processed according to the analysis result, the alarm is processed differently according to the analysis result. The following example shows that the alarm can be suppressed in the following cases: for example, the alarm is analyzed according to the cause of the alarm. If the controller does not affect the service managed by the controller, the alarm is suppressed. For example, the relationship between the resource generated by the alarm and the resource occupied by the controller is determined. In the case of an impact, the alarm is suppressed; the alarm may be derivatized in the following cases: for example, the root resource that generates the alarm is not occupied by the service managed by the controller, but the sub-resource corresponding to the root resource is When the controller manages the service, the alarm is derived as a sub-resource-derived alarm; for example, the root resource that generates the alarm is not occupied by the service managed by the controller, and the sub-resource corresponding to the root resource is not used by the controller. Managed business, but sub-resources corresponding to root resources and/or root resources and controller-managed industries If a mapping relationship exists, the alarm is derived as a relationship-derived alarm according to the mapping relationship. In addition, when the root resource generating the alarm is occupied by the service managed by the controller, the alarm is directly reported to the upper-layer network device. It should be noted that the upper layer network device herein is a relative concept. For example, when the controller DC receives the alarm, the upper layer network device is the upper layer network device SC of the controller DC, and for example, when the upper layer network is used. When the device SC receives the alarm, the upper layer network device is the upper layer network device NMS of the SC.
需要说明的是,在对告警进行衍生处理的情况下,还可以:记录告警与衍生后的 衍生告警之间的关联关系,其中,衍生告警包括:子资源衍生告警和/或关系衍生告警;将衍生告警以及关联关系上报给上层网络设备,和/或提供关联关系供控制器管理系统中的网元设备查询。It should be noted that, in the case of deriving the alarm, it is also possible to: record the alarm and the derived Derived alarm relationship, where the derivative alarm includes: a sub-resource-derived alarm and/or a relationship-derived alarm; the derived alarm and the association relationship are reported to the upper-layer network device, and/or the association relationship is provided for the controller management system. NE device query.
另外,在依据分析结果对告警进行处理之后,还可以包括以下处理:依据告警所引起的网元设备的状态变化,或者告警的代表资源的对象的状态变化,生成网元设备或者代表资源的对象的状态通知;将生成的网元设备或者代表资源的对象的状态通知上报给上层网络设备。In addition, after the alarm is processed according to the analysis result, the following processing may be further included: generating a network element device or an object representing a resource according to a state change of the network element device caused by the alarm, or a state change of an object representing the resource of the alarm The status notification of the generated network element device or the object representing the resource is reported to the upper layer network device.
在本实施例中还提供了一种告警处理装置,该装置用于实现上述实施例及优选实施方式,已经进行过说明的不再赘述。如以下所使用的,术语“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的装置较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。In the embodiment, an alarm processing device is also provided, which is used to implement the above-mentioned embodiments and preferred embodiments, and has not been described again. As used below, the term "module" may implement a combination of software and/or hardware of a predetermined function. Although the apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and contemplated.
图4是根据本发明实施例的告警处理装置的结构框图,如图4所示,该装置包括接收模块42、分析模块44和处理模块46,下面对该装置进行说明。4 is a block diagram showing the structure of an alarm processing apparatus according to an embodiment of the present invention. As shown in FIG. 4, the apparatus includes a receiving module 42, an analyzing module 44, and a processing module 46, which will be described below.
接收模块42,设置为接收到控制器管理系统中网元设备的告警;分析模块44,连接至上述接收模块42,设置为对告警进行分析得出分析结果;处理模块46,连接至上述分析模块44,设置为依据分析结果对告警进行处理。The receiving module 42 is configured to receive an alarm of the network element device in the controller management system; the analyzing module 44 is connected to the receiving module 42 and configured to analyze the alarm to obtain an analysis result; the processing module 46 is connected to the analysis module. 44. Set to process the alarm according to the analysis result.
图5是根据本发明实施例的告警处理装置中分析模块44的优选结构框图,如图5所示,该分析模块44包括以下之一:第一分析单元52、第二分析单元54,下面对该分析模块44进行说明。FIG. 5 is a block diagram showing a preferred structure of an analysis module 44 in an alarm processing apparatus according to an embodiment of the present invention. As shown in FIG. 5, the analysis module 44 includes one of the following: a first analysis unit 52, a second analysis unit 54, and the like. The analysis module 44 will be described.
第一分析单元52,设置为依据产生告警的告警原因,分析得出告警是否对控制器管理的业务产生影响的分析结果;第二分析单元54,设置为依据产生告警的资源与控制器管理的业务所占用的资源之间的关系,分析得出告警是否对控制器管理的业务产生影响的分析结果。The first analyzing unit 52 is configured to analyze whether the alarm has an impact on the service managed by the controller according to the alarm cause of generating the alarm; and the second analyzing unit 54 is configured to be managed according to the resource and the controller that generate the alarm. The relationship between the resources occupied by the service analyzes the analysis result of whether the alarm affects the service managed by the controller.
图6是根据本发明实施例的告警处理装置中分析模块44中第二分析单元54的优选结构框图,如图6所示,该第二分析单元54包括以下之一:第一确定子单元62、第二确定子单元64、第三确定子单元66、第四确定子单元68,下面对该第二分析单元54进行说明。FIG. 6 is a block diagram showing a preferred structure of the second analyzing unit 54 in the analyzing module 44 in the alarm processing apparatus according to the embodiment of the present invention. As shown in FIG. 6, the second analyzing unit 54 includes one of the following: the first determining sub-unit 62. The second determining subunit 64, the third determining subunit 66, and the fourth determining subunit 68, the second analyzing unit 54 will be described below.
第一确定子单元62,设置为在产生告警的根资源不被控制器管理的业务所占用,并且也没有根资源对应的子资源被控制器管理的业务所占用的情况下,确定告警对控制器管理的业务不产生影响;第二确定子单元64,设置为在产生告警的根资源不被控制器管理的业务所占用,但根资源对应的子资源被控制器管理的业务所占用的情况下,确定告警对控制器管理的业务产生影响;第三确定子单元66,设置为在产生告警的根 资源不被控制器管理的业务所占用,根资源对应的子资源也不被控制器管理的业务所占用,但根资源和/或根资源对应的子资源与控制器管理的业务存在映射关系的情况下,确定告警对控制器管理的业务产生影响;第四确定子单元68,设置为在产生告警的根资源被控制器管理的业务所占用的情况下,确定告警对控制器管理的业务生产影响。The first determining sub-unit 62 is configured to determine the alarm pair control in the case that the root resource generating the alarm is not occupied by the service managed by the controller, and the sub-resource corresponding to the root resource is not occupied by the service managed by the controller. The service managed by the device does not have an impact; the second determining sub-unit 64 is configured to be occupied by the service that the root resource that generates the alarm is not occupied by the controller, but the sub-resource corresponding to the root resource is occupied by the service managed by the controller. Determining that the alarm has an impact on the service managed by the controller; the third determining subunit 66 is set to be the root of the alarm generated. The resource is not occupied by the service managed by the controller, and the sub-resource corresponding to the root resource is not occupied by the service managed by the controller, but the sub-resource corresponding to the root resource and/or the root resource is mapped to the service managed by the controller. In the case that the alarm is determined to affect the service managed by the controller, the fourth determining sub-unit 68 is configured to determine the service production managed by the controller for the alarm when the root resource generating the alarm is occupied by the service managed by the controller. influences.
图7是根据本发明实施例的告警处理装置中处理模块46的优选结构框图一,如图7所示,该处理模块46包括以下之一:第一抑制单元70、第二抑制单元72、第一衍生单元74、第二衍生单元76、第一上报单元78,下面对该处理模块46进行说明。FIG. 7 is a block diagram of a preferred structure of a processing module 46 in an alarm processing apparatus according to an embodiment of the present invention. As shown in FIG. 7, the processing module 46 includes one of the following: a first suppression unit 70, a second suppression unit 72, and a first A derivation unit 74, a second derivation unit 76, and a first reporting unit 78, the processing module 46 will be described below.
第一抑制单元70,设置为在依据告警原因,分析得出告警对控制器管理的业务不产生影响的情况下,对告警进行抑制;第二抑制单元72,设置为在依据产生告警的资源与控制器管理的业务所占用的资源之间的关系确定告警对控制器管理的业务不产生影响的情况下,对告警进行抑制;第一衍生单元74,设置为在产生告警的根资源不被控制器管理的业务所占用,但根资源对应的子资源被控制器管理的业务所占用的情况下,将告警衍生为子资源衍生告警;第二衍生单元76,设置为在产生告警的根资源不被控制器管理的业务所占用,根资源对应的子资源也不被控制器管理的业务所占用,但根资源和/或根资源对应的子资源与控制器管理的业务存在映射关系的情况下,依据映射关系,将告警衍生为关系衍生告警;第一上报单元78,设置为在产生告警的根资源被控制器管理的业务所占用的情况下,直接将告警上报给上层网络设备。The first suppression unit 70 is configured to suppress the alarm if the alarm does not affect the service managed by the controller according to the cause of the alarm; the second suppression unit 72 is configured to be based on the resource generated by the alarm. The relationship between the resources occupied by the controller-managed service determines that the alarm does not affect the service managed by the controller, and the alarm is suppressed; the first derivative unit 74 is configured to not control the root resource that generates the alarm. If the service managed by the device is occupied by the service, but the sub-resource corresponding to the root resource is occupied by the service managed by the controller, the alarm is derived as a sub-resource-derived alarm; and the second derivation unit 76 is set to not generate the root resource of the alarm. The service is managed by the controller, and the sub-resource corresponding to the root resource is not occupied by the service managed by the controller. However, if the root resource and/or the sub-resource corresponding to the root resource are mapped to the service managed by the controller, According to the mapping relationship, the alarm is derived as a relationship-derived alarm; the first reporting unit 78 is set to be controlled at the root resource that generates the alarm. The case manager of business occupied, alarm reporting directly to the upper-layer network device.
图8是根据本发明实施例的告警处理装置中处理模块46的优选结构框图二,如图8所示,该处理模块46除包括上述第一衍生模块74和/或第一衍生模块76外,还包括:记录单元82、第二上报单元84和/或提供单元86,下面对该处理模块46进行说明。FIG. 8 is a block diagram of a preferred structure of the processing module 46 in the alarm processing apparatus according to the embodiment of the present invention. As shown in FIG. 8, the processing module 46 includes the first derivative module 74 and/or the first derivative module 76, Also included is a recording unit 82, a second reporting unit 84, and/or a providing unit 86, which is described below.
记录单元82,设置为在对告警进行衍生处理的情况下,记录告警与衍生后的衍生告警之间的关联关系,其中,衍生告警包括:子资源衍生告警和/或关系衍生告警;第二上报单元84,设置为将衍生告警以及关联关系上报给上层网络设备,和/或,提供单元86,设置为提供关联关系供控制器管理系统中的网元设备查询。The recording unit 82 is configured to: record, in the case of deriving the alarm, the association between the alarm and the derived derivative alarm, where the derivative alarm includes: a sub-resource-derived alarm and/or a relationship-derived alarm; the second report The unit 84 is configured to report the derived alarm and the association relationship to the upper layer network device, and/or the providing unit 86 is configured to provide an association relationship for the network element device query in the controller management system.
图9是根据本发明实施例的告警处理装置的优选结构框图,如图9所示,该装置除包括图4所示的所有模块外,还包括:生成模块92和上报模块94,下面对该装置进行说明。FIG. 9 is a block diagram of a preferred structure of an alarm processing apparatus according to an embodiment of the present invention. As shown in FIG. 9, the apparatus includes: a generating module 92 and a reporting module 94, in addition to all the modules shown in FIG. The device is described.
生成模块92,连接至上述处理模块46,设置为依据告警所引起的网元设备的状态变化,或者告警的代表资源的对象的状态变化,生成网元设备或者代表资源的对象的状态通知;上报模块94,连接至上述生成模块92,设置为将生成的网元设备或者代表资源的对象的状态通知上报给上层网络设备。 The generating module 92 is connected to the processing module 46, and configured to generate a status notification of the network element device or the object representing the resource according to the state change of the network element device caused by the alarm or the state change of the object representing the resource of the alarm; The module 94 is connected to the generating module 92, and is configured to report the status notification of the generated network element device or the object representing the resource to the upper layer network device.
图10是根据本发明实施例的控制器的结构框图,如图10所示,该控制器100包括上述任一项的告警处理装置102。FIG. 10 is a block diagram showing the structure of a controller according to an embodiment of the present invention. As shown in FIG. 10, the controller 100 includes the alarm processing device 102 of any of the above.
优选地,该控制器可以包括以下至少之一:域控制器DC、超级控制器SC,其中,SC为DC的上层控制器。需要指出的是,SC可以有多个,从DC看,SC都是上层控制器,SC上面如果还有SC,上面的是更上层的控制器,这个是相对关系。Preferably, the controller may include at least one of the following: a domain controller DC, a super controller SC, wherein the SC is an upper layer controller of the DC. It should be pointed out that there can be multiple SCs. From the perspective of DC, SC is the upper controller. If there is SC on the SC, the above is the upper controller. This is the relative relationship.
在SDN控制器管控的网络中,由于SDN控制器的控制特性,其只关心业务相关的资源,而且由于权限划分原因,原始告警可能是由与业务无关的资源产生的,或者是由控制器不管理的业务产生的,但是对控制器管理的业务会产生影响,造成业务不通,或者质量下降。由于控制器的主要核心是进行业务管理,在网络管理系统或者控制平面是不对设备资源和业务产生告警的,鉴于此,在本实施例中,提出了告警也要表现成业务的告警,要由控制器衍生出受影响的业务告警。另外,除了告警衍生外,控制器还需要对告警进行影响业务的分析,告警继续上报等处理。In the network controlled by the SDN controller, due to the control characteristics of the SDN controller, it only cares about the resources related to the service, and due to the division of the rights, the original alarm may be generated by resources unrelated to the service, or by the controller. The management of the business, but the impact on the controller management business, resulting in business failure, or quality degradation. Since the main core of the controller is to perform service management, the network management system or the control plane does not generate alarms for the device resources and the service. In this embodiment, in the embodiment, the alarm is also presented as a service alarm. The controller derives the affected service alarms. In addition, in addition to the alarm derivation, the controller also needs to analyze the alarm affecting the service, and the alarm continues to be reported.
下面对该方案进行简单说明。The scheme is briefly described below.
在网络控制器中增加一个告警分析模块,图11是根据本发明实施例的控制器告警分析模块的结构示意图,如图11所示,该告警分析模块执行以下步骤的分析处理:An alarm analysis module is added to the network controller. FIG. 11 is a schematic structural diagram of a controller alarm analysis module according to an embodiment of the present invention. As shown in FIG. 11, the alarm analysis module performs the following steps:
步骤1:设备检测到故障后产生告警,同时上报给控制器和网管。Step 1: After the device detects the fault, it generates an alarm and reports it to the controller and the NMS.
步骤2:控制器收到设备告警后进行分析和处理,包括下面几个子步骤的一个或多个的灵活组合:Step 2: After the controller receives the device alarm, it analyzes and processes it, including flexible combination of one or more of the following sub-steps:
步骤2.1:根据告警原因进行分类,部分告警原因对业务没有影响,如果收到的是这些告警原因之一,该告警可以不处理,或者加以抑制。这样的告警原因包括但不限于:温度告警,电压告警,烟雾告警,等等很多,不一一列出。控制器需要处理的告警,包括但不限于:LOS(Loss of Signal),DEG(Degraded Signal),LOC(Loss of Connectivity/Loss of Connection),AIS(Alarm Indication Signal)。Step 2.1: According to the cause of the alarm, the alarm causes no impact on the service. If one of the alarm causes is received, the alarm may not be processed or suppressed. Such alarm causes include, but are not limited to, temperature alarms, voltage alarms, smoke alarms, and the like, which are not listed one by one. Alarms that the controller needs to process, including but not limited to: LOS (Loss of Signal), DEG (Degraded Signal), LOC (Loss of Connectivity/Loss of Connection), AIS (Alarm Indication Signal).
步骤2.2:分析告警,发现产生告警的资源,不是业务占用的资源,也不对业务所占用的资源产生影响,这样的告警也可以不处理,或者加以抑制。这样的资源包括但不限于:电源模块,风扇模块,背板总线等等不一一列出。控制器需要处理的产生告警资源,包括但不限于:物理端口,连接终端点,路径终端点,逻辑终端点,流点,流点池。Step 2.2: Analyze the alarm and find that the resource that generates the alarm is not the resource occupied by the service, nor does it affect the resources occupied by the service. Such alarms may not be processed or suppressed. Such resources include, but are not limited to, power modules, fan modules, backplane buses, and the like. The controller needs to process the generated alarm resources, including but not limited to: physical port, connection terminal point, path termination point, logical terminal point, flow point, and stream point pool.
步骤2.3:分析告警,发现产生告警的资源,不是业务直接占用的资源,但是该资源下有子资源被业务占用,可以把告警衍生为业务所占用的子资源的告警,然后控制器把衍生告警上报给上层控制器和网管平面。原始告警可以根据实现需要继续上报或 者不上报。Step 2.3: Analyze the alarm and find that the resource that generates the alarm is not the resource directly occupied by the service. However, if the sub-resource is occupied by the service, the alarm can be deduced into an alarm of the sub-resource occupied by the service, and then the controller sends the generated alarm. Reported to the upper controller and the network management plane. The original alarm can continue to be reported according to the implementation needs or Not reported.
步骤2.4:分析告警,发现产生告警的资源,是业务占用的资源,上报的告警直接就属于业务的告警,可以不做衍生,把该告警继续上报给上层控制器和网管平面。Step 2.4: Analyze the alarm and find that the resource that generates the alarm is the resource occupied by the service. The alarm that is reported is the alarm of the service. The alarm is sent to the upper-layer controller and the network management plane.
步骤2.5:分析告警,发现产生告警的资源,没有和业务的资源对象有直接对应关系,而是存在间接的映射关系(例如,虚拟化virtualization),控制器根据这种间接的映射关系,衍生出业务资源的告警,然后控制器把衍生告警上报给上层控制和网管平面。原始告警可以根据实现需要继续上报或者不上报。Step 2.5: Analyze the alarm and find that the resource that generates the alarm has no direct correspondence with the resource object of the service, but has an indirect mapping relationship (for example, virtualization), and the controller derives according to the indirect mapping relationship. The alarm of the service resource, and then the controller reports the derivative alarm to the upper layer control and the network management plane. The original alarm can be reported or not reported according to the implementation requirements.
步骤2.6:分析告警,发现该告警是网元告警,但是控制器对该告警不感兴趣,而是对告警所引起的网元状态变化感兴趣,控制器抑制或丢弃该告警,生成状态通知,修改本地网元状态,将状态通知上报上层控制器和网管平面。Step 2.6: Analyze the alarm and find that the alarm is a network element alarm, but the controller is not interested in the alarm, but is interested in the change of the network element status caused by the alarm. The controller suppresses or discards the alarm, generates a status notification, and modifies the alarm. The status of the local NE is reported to the upper-layer controller and the NMS plane.
步骤2.7:控制器衍生出的新告警,原始告警和衍生告警的对应关系记录下来,并在上报告警时提供,或者提供查询,以便网管平面进行根因分析,找出故障根源,进行修复和排除故障。Step 2.7: The new alarm generated by the controller, the corresponding relationship between the original alarm and the derived alarm is recorded, and provided when the alarm is reported, or a query is provided, so that the network management plane performs root cause analysis to find the root cause of the fault, and repair and Troubleshoot.
步骤3:EMS从设备收到原始告警和从控制器收到衍生告警后,可以进行本地保存、显示、确认、注释等管理,EMS把这两个告警都上报给NMS/OSS。Step 3: After the EMS receives the original alarm from the device and receives the derived alarm from the controller, the EMS can perform local storage, display, confirmation, and annotation management. The EMS reports both alarms to the NMS/OSS.
步骤4:上层控制器收到下层控制器上报的衍生告警后,采用步骤2的分析处理方法,进行本地分析处理,结果上报APP和OSS/NMS。Step 4: After receiving the derivative alarm reported by the lower-layer controller, the upper-layer controller performs the local analysis processing by using the analysis and processing method of step 2. The result is reported to the APP and the OSS/NMS.
步骤5:APP收到业务告警后,用于界面显示,以及业务质量评估等用途。Step 5: After receiving the service alarm, the APP is used for interface display and service quality assessment.
步骤6:OSS/NMS收到EMS上报的原始告警,和衍生告警,以及从上层控制器上报的衍生告警,进行综合分析,包括分析告警关联关系,根因分析等,为网络运行、维护、排除故障、计费等提供根据。Step 6: The OSS/NMS receives the original alarms reported by the EMS, and the derived alarms, and the derived alarms reported from the upper-layer controllers for comprehensive analysis, including analysis of alarm correlations, root cause analysis, etc., for network operation, maintenance, and elimination. Provide basis for failure, billing, etc.
通过控制器对设备资源告警进行处理的方法,包括收到告警后的分析,处理,衍生,和继续向其他系统上报的方法。为控制器处理告警提供一种高效可行的,满足业务管理目的的告警处理方法。The method for processing device resource alarms by the controller includes analyzing, processing, deriving, and continuing to report to other systems after receiving the alarm. It provides an efficient and feasible alarm processing method for the controller to handle alarms.
下面以一个跨多控制器的业务中产生告警为例,说明告警分析处理方法。The following describes an alarm analysis processing method by taking an alarm generated in a service across multiple controllers as an example.
优选实施例一Preferred embodiment 1
图12是根据本发明优选实施例一的告警上报处理的示意图,如图12所示,域控制器DC1和DC2,划分区域管理通讯网络,以及超级控制器SC,作为上层控制器管理DC1和DC2。两个管理域中连接NE1,NE2到NE6组成通讯网络。NE1到NE6的连线表示一个APP关心的业务,业务A端点在NE1,Z端点在NE6,中间经过NE2, NE3,NE4,NE5,分别被DC1,DC2直接管理,图中虚线表示管理关系。DC1、DC2和SC分别有配对的网管系统,假设在网元1产生了一个告警Alarm1,其他几个网元也有告警产生。12 is a schematic diagram of an alarm reporting process according to a preferred embodiment of the present invention. As shown in FIG. 12, domain controllers DC1 and DC2, a zone management communication network, and a super controller SC are used as upper controllers to manage DC1 and DC2. . Two management domains are connected to NE1, and NE2 to NE6 form a communication network. The connection between NE1 and NE6 indicates the service that the APP cares about. The service A endpoint is at NE1, the Z endpoint is at NE6, and the NE2 is passed through. NE3, NE4, and NE5 are directly managed by DC1 and DC2, respectively, and the dotted line in the figure indicates the management relationship. DC1, DC2, and SC respectively have a paired network management system. It is assumed that an alarm Alarm1 is generated in the network element 1, and other network elements also generate alarms.
第1步:NE1检测到故障,烟雾探测器感觉到烟雾超标,烟雾探测模块产生告警alarm1,同时上报给DC1和EMS1。Step 1: NE1 detects the fault, the smoke detector feels that the smoke is excessive, the smoke detection module generates the alarm alarm1, and reports it to DC1 and EMS1.
第2步:DC1收到Alarm1后分析,分析模块对告警原因进行分析,发现alarm1的告警原因是烟雾告警,属于和业务无关的告警原因,于是DC1忽略这个告警。Step 2: After DC1 receives Alarm1, the analysis module analyzes the cause of the alarm and finds that the alarm cause of alarm1 is a smoke alarm, which is an alarm cause unrelated to the service, so DC1 ignores the alarm.
第3步:NE2检测到故障,风扇模块发现风扇转速异常,产生告警alarm2,同时上报给DC1和EMS1。Step 3: If the fault is detected by the NE2, the fan module finds that the fan speed is abnormal. The alarm alarm2 is generated and reported to DC1 and EMS1.
第4步:DC1收到alarm2后分析,分析模块对告警源进行分析,发现alarm2产生的资源是风扇模块,和业务无关,于是DC1忽略这个告警。Step 4: After DC1 receives alarm2, the analysis module analyzes the alarm source and finds that the resource generated by alarm2 is a fan module, which has nothing to do with the service, so DC1 ignores the alarm.
第5步:NE1的OTN光端口有故障,OTN有信号劣化告警,产生告警alarm3,同时上报给DC1和EMS1。Step 5: The OTN optical port of the NE1 is faulty, and the OTN has a signal degradation alarm. The alarm alarm3 is generated and reported to DC1 and EMS1.
第6步:DC1收到alarm3后分析,分析模块分析OTN端口,该资源虽然没有被业务直接使用,但是OTN下的子通道ODU1-1被正在业务1使用,DC1衍生出了ODU1-1资源的劣化告警alarm4,并记录alarm3-alarm4的对应关系,然后DC1把alarm4报告给SC和EMS1,并附带alarm3-alarm4的关联关系。Step 6: DC1 receives the alarm3 and analyzes it. The analysis module analyzes the OTN port. Although the resource is not directly used by the service, the sub-channel ODU1-1 under the OTN is used in the service 1, and the DC1 derives the ODU1-1 resource. Degradation alarm alarm4, and record the corresponding relationship of alarm3-alarm4, then DC1 reports alarm4 to SC and EMS1, and the association of alarm3-alarm4 is attached.
第7步:EMS总共收到alarm1,alarm2,alarm3,alarm4。在进行传统的EMS告警管理的同时,把这几个告警都上报给NMS/OSS1。Step 7: The EMS receives a total of alarm1, alarm2, alarm3, and alarm4. While performing traditional EMS alarm management, these alarms are reported to NMS/OSS1.
第8步:SC收到告警alarm4,分析模块发现,由于告警的资源ODU1以及所在的业务1在SC经过虚拟化(virtualization)和映射到业务2,并且ODU1虚拟化成LTP1。衍生模块SC从alarm4衍生出LTP1资源的alarm5,并记录alarm4-alarm5的对应关系。SC把alarm5报告给app和NMS/OSS1,并附带alarm4-alarm5的关联关系。Step 8: The SC receives the alarm alarm4, and the analysis module finds that the resource ODU1 and the service 1 in the SC are virtualized and mapped to the service 2, and the ODU1 is virtualized into the LTP1. The derived module SC derives the alarm5 of the LTP1 resource from alarm4, and records the correspondence of alarm4-alarm5. The SC reports alarm5 to the app and NMS/OSS1 with the association of alarm4-alarm5.
第9步:NMS/OSS1总共收到告警alarm1,alarm2,alarm3,alarm4,alarm5。由于已经有alarm3-alarm4-alarm5的衍生对应关系,NMS/OSS1很容易分析得出alarm3是根源告警,需要通知维护人员修复设备,排除故障。Step 9: NMS/OSS1 receives alarms alarm1, alarm2, alarm3, alarm4, alarm5. Since the derived correspondence of alarm3-alarm4-alarm5 is already available, NMS/OSS1 can easily analyze that alarm3 is the root cause alarm. It is necessary to notify the maintenance personnel to repair the device and eliminate the fault.
第10步:APP收到alarm5后,得知自己的业务2,产生了告警5,业务2收到影响。App用户以此和网络运营商沟通协调。Step 10: After receiving the alarm5, the APP knows that its service 2 has generated alarm 5, and service 2 has received an impact. App users communicate and coordinate with the network operator.
类似的NE3,NE4产生的告警,在DC2,EMS2,NMS/OSS2进行了类似的处理流程。 Similar alarms generated by NE3 and NE4 have been processed in DC2, EMS2, and NMS/OSS2.
优选实施例二Preferred embodiment two
图13是根据本发明优选实施例二的告警上报处理的示意图,如图13所示,网络中的一个网元NE1,被实施的域控制器DC1管理,同时被EMS1网管系统管理,NE1产生了一个告警a,结果处理流程如下FIG. 13 is a schematic diagram of an alarm reporting process according to a preferred embodiment of the present invention. As shown in FIG. 13, one network element NE1 in the network is managed by the implemented domain controller DC1, and is managed by the EMS1 network management system, and NE1 is generated. An alarm a, the result processing flow is as follows
第1步:NE1检测到故障,上报了告警a。Step 1: NE1 detects the fault and reports alarm a.
第2步:DC1对告警a进行分析,根据告警原因和告警源进行分析,发现告警a的子资源被业务使用,按照分析结果把告警a丢弃,衍生了告警b,然后把告警b上报给上层控制器SC1,和网管系统EMS1.Step 2: DC1 analyzes the alarm a, analyzes the alarm cause and the alarm source, and finds that the sub-resource of the alarm a is used by the service, discards the alarm a according to the analysis result, derives the alarm b, and then reports the alarm b to the upper layer. Controller SC1, and network management system EMS1.
第3步:EMS1收到告警a和告警b后,告警a和b都上报到上层网管OSS1。Step 3: After EMS1 receives alarm a and alarm b, alarms a and b are reported to the upper-layer network management system OSS1.
第4步:SC1收到DC1上报的告警b后,根据告警原因和告警源进行分析,发现告警b的资源经过虚拟化后,变成了逻辑对象obj1,他们属于虚拟化的映射关系,SC1丢弃告警b,衍生了告警c。SC1把告警c同时上报给app和OSS1。Step 4: After receiving the alarm b reported by the DC1, the SC1 analyzes the alarm reason and the alarm source, and finds that the resource of the alarm b is virtualized and becomes the logical object obj1. They belong to the virtualized mapping relationship, and the SC1 discards. Alarm b, derived from alarm c. SC1 reports the alarm c to the app and OSS1 at the same time.
第5步:app收到告警通知,得知自己的业务中的抽象对象obj1有告警c,出于排除故障的目的,app向OSS1发出查询所有告警以及关联关系的请求。Step 5: The app receives the alarm notification and knows that the abstract object obj1 in its own service has an alarm c. For the purpose of troubleshooting, the app issues a request for querying all alarms and associations to OSS1.
第6步:OSS1从SC1查询告警关联关系,得到告警b和告警c之间的关联关系。Step 6: OSS1 queries the alarm association relationship from SC1 to obtain the association relationship between alarm b and alarm c.
第7步:OSS1从EMS1查询告警关联关系。Step 7: OSS1 queries the alarm association relationship from EMS1.
第8步:EMS1从DC1那里查到告警a和告警b的关联关系。汇报给OSS1。Step 8: EMS1 finds the association between alarm a and alarm b from DC1. Report to OSS1.
第9步:OSS1汇总得到告警a,b,c的关联关系,报告给APP。Step 9: OSS1 summarizes the associations of alarms a, b, and c, and reports them to the APP.
第10步:app从查询应答得到所有告警a,b,c并知道a是根源告警。用于通知运维人员进行修复设备排除故障。Step 10: The app gets all the alarms a, b, c from the query response and knows that a is the root cause alarm. It is used to notify the operation and maintenance personnel to repair the equipment.
显然,本领域的技术人员应该明白,上述的本发明实施例的各模块或各步骤可以用通用的计算装置来实现,它们可以集中在单个的计算装置上,或者分布在多个计算装置所组成的网络上,可选地,它们可以用计算装置可执行的程序代码来实现,从而,可以将它们存储在存储装置中由计算装置来执行,并且在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤,或者将它们分别制作成各个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。这样,本发明不限制于任何特定的硬件和软件结合。Obviously, those skilled in the art should understand that the above modules or steps of the embodiments of the present invention can be implemented by a general computing device, which can be concentrated on a single computing device or distributed in multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device such that they may be stored in the storage device by the computing device and, in some cases, may be different from The steps shown or described are performed sequentially, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps thereof are fabricated into a single integrated circuit module. Thus, the invention is not limited to any specific combination of hardware and software.
以上仅为本发明的优选实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本发明的精神和原则之内,所作的任何 修改、等同替换、改进等,均应包含在本发明的保护范围之内。The above are only the preferred embodiments of the present invention, and are not intended to limit the present invention, and various modifications and changes can be made to the present invention. Anything made within the spirit and principles of the present invention Modifications, equivalent substitutions, improvements, etc., are intended to be included within the scope of the present invention.
工业实用性Industrial applicability
如上所述,通过上述实施例及优选实施方式,解决了相关技术中,不仅存在告警处理不及时,而且在告警数量多的情况下,造成上层网络设备性能低下的问题,进而达到了高效及时处理告警的效果。 As described above, the above-mentioned embodiments and the preferred embodiments solve the problem that the alarm processing is not timely in the related art, and the performance of the upper layer network device is low in the case of a large number of alarms, thereby achieving efficient and timely processing. The effect of the alarm.

Claims (14)

  1. 一种告警处理方法,包括:An alarm processing method includes:
    接收到来自网络设备的告警;Receiving an alarm from a network device;
    对所述告警进行分析得出分析结果;The alarm is analyzed to obtain an analysis result;
    依据所述分析结果对所述告警进行处理。The alarm is processed according to the analysis result.
  2. 根据权利要求1所述的方法,其中,对所述告警进行分析得到所述分析结果包括:The method according to claim 1, wherein analyzing the alarm to obtain the analysis result comprises:
    依据产生所述告警的告警原因,分析得出所述告警是否对控制器管理的业务产生影响的所述分析结果;Determining, according to the cause of the alarm that generates the alarm, whether the alarm has an impact on the service managed by the controller;
    依据产生所述告警的资源与所述控制器管理的业务所占用的资源之间的关系,分析得出所述告警是否对所述控制器管理的所述业务产生影响的所述分析结果。And analyzing, according to the relationship between the resource that generates the alarm and the resource occupied by the service managed by the controller, whether the alarm has an impact on the service managed by the controller.
  3. 根据权利要求2所述的方法,其中,依据产生所述告警的资源与所述控制器管理的业务所占用的资源之间的关系,分析得出所述告警是否对所述控制器管理的所述业务产生影响的所述分析结果包括以下之一:The method according to claim 2, wherein, according to the relationship between the resource generating the alarm and the resource occupied by the service managed by the controller, analyzing whether the alarm is managed by the controller The analysis results of the impact of the business include one of the following:
    在产生所述告警的根资源不被所述控制器管理的业务所占用,并且也没有所述根资源对应的子资源被所述控制器管理的业务所占用的情况下,确定所述告警对所述控制器管理的所述业务不产生影响;Determining the alarm pair if the root resource that generates the alarm is not occupied by the service managed by the controller, and the sub-resource corresponding to the root resource is not occupied by the service managed by the controller. The service managed by the controller has no impact;
    在产生所述告警的根资源不被所述控制器管理的业务所占用,但所述根资源对应的子资源被所述控制器管理的业务所占用的情况下,确定所述告警对所述控制器管理的所述业务产生影响;And determining, in the case that the root resource that generates the alarm is not occupied by the service managed by the controller, but the sub-resource corresponding to the root resource is occupied by the service managed by the controller, determining the alarm to the The business managed by the controller has an impact;
    在产生所述告警的根资源不被所述控制器管理的业务所占用,所述根资源对应的子资源也不被所述控制器管理的业务所占用,但所述根资源和/或所述根资源对应的子资源与所述控制器管理的业务存在映射关系的情况下,确定所述告警对所述控制器管理的所述业务产生影响;The root resource that generates the alarm is not occupied by the service managed by the controller, and the sub-resource corresponding to the root resource is not occupied by the service managed by the controller, but the root resource and/or the If the mapping between the sub-resources corresponding to the root resource and the service managed by the controller is performed, determining that the alarm has an impact on the service managed by the controller;
    在产生所述告警的根资源被所述控制器管理的业务所占用的情况下,确定所述告警对所述控制器管理的所述业务生产影响。And determining, in the case that the root resource that generates the alarm is occupied by the service managed by the controller, determining the impact of the alarm on the service production managed by the controller.
  4. 根据权利要求3所述的方法,其中,依据所述分析结果对所述告警进行处理包括以下之一:The method according to claim 3, wherein processing the alarm according to the analysis result comprises one of the following:
    在依据所述告警原因,分析得出所述告警对所述控制器管理的业务不产生影响的情况下,对所述告警进行抑制; The alarm is suppressed if the alarm does not affect the service managed by the controller according to the cause of the alarm;
    在依据产生所述告警的资源与所述控制器管理的业务所占用的资源之间的关系确定所述告警对所述控制器管理的所述业务不产生影响的情况下,对所述告警进行抑制;And determining, in the case that the alarm does not affect the service managed by the controller, according to a relationship between a resource that generates the alarm and a resource that is used by the controller, inhibition;
    在产生所述告警的根资源不被所述控制器管理的业务所占用,但所述根资源对应的子资源被所述控制器管理的业务所占用的情况下,将所述告警衍生为子资源衍生告警;If the root resource that generates the alarm is not occupied by the service managed by the controller, but the sub-resource corresponding to the root resource is occupied by the service managed by the controller, the alarm is derived as a sub- Resource derived alarm;
    在产生所述告警的根资源不被所述控制器管理的业务所占用,所述根资源对应的子资源也不被所述控制器管理的业务所占用,但所述根资源和/或所述根资源对应的子资源与所述控制器管理的业务存在映射关系的情况下,依据所述映射关系,将所述告警衍生为关系衍生告警;The root resource that generates the alarm is not occupied by the service managed by the controller, and the sub-resource corresponding to the root resource is not occupied by the service managed by the controller, but the root resource and/or the In the case that the sub-resource corresponding to the root resource has a mapping relationship with the service managed by the controller, the alarm is derived as a relationship-derived alarm according to the mapping relationship;
    在产生所述告警的根资源被所述控制器管理的业务所占用的情况下,直接将所述告警上报给上层网络设备。The alarm is directly reported to the upper-layer network device in the case that the root resource that generates the alarm is occupied by the service managed by the controller.
  5. 根据权利要求4所述的方法,其中,在对所述告警进行衍生处理的情况下,还包括:The method according to claim 4, wherein, in the case of deriving the alarm, the method further comprises:
    记录所述告警与衍生后的衍生告警之间的关联关系,其中,所述衍生告警包括:子资源衍生告警和/或关系衍生告警;Recording an association between the alarm and the derived derivative alarm, where the derived alarm includes: a sub-resource derived alarm and/or a relationship derivative alarm;
    将所述衍生告警以及所述关联关系上报给上层网络设备,和/或提供所述关联关系供所述控制器管理系统中的网元设备查询。And reporting the associated alarm to the upper-layer network device, and/or providing the association relationship for the network element device in the controller management system to query.
  6. 根据权利要求1至5中任一项所述的方法,其中,在依据所述分析结果对所述告警进行处理之后,还包括:The method according to any one of claims 1 to 5, further comprising: after processing the alarm according to the analysis result, further comprising:
    依据所述告警所引起的网元设备的状态变化,或者所述告警的代表资源的对象的状态变化,生成所述网元设备或者所述代表资源的对象的状态通知;Generating a status notification of the network element device or the object representing the resource according to a state change of the network element device caused by the alarm, or a state change of an object representing the resource of the alarm;
    将生成的所述网元设备或者所述代表资源的对象的状态通知上报给上层网络设备。The status notification of the generated network element device or the object representing the resource is reported to the upper layer network device.
  7. 一种告警处理装置,包括:An alarm processing device includes:
    接收模块,设置为接收到来自网络设备的告警;a receiving module, configured to receive an alarm from a network device;
    分析模块,设置为对所述告警进行分析得出分析结果;An analysis module configured to analyze the alarm to obtain an analysis result;
    处理模块,设置为依据所述分析结果对所述告警进行处理。The processing module is configured to process the alarm according to the analysis result.
  8. 根据权利要求7所述的装置,其中,所述分析模块包括: The apparatus of claim 7 wherein said analyzing module comprises:
    第一分析单元,设置为依据产生所述告警的告警原因,分析得出所述告警是否对控制器管理的业务产生影响的所述分析结果;The first analyzing unit is configured to analyze, according to the cause of the alarm that generates the alarm, whether the alarm has an impact on the service managed by the controller;
    第二分析单元,设置为依据产生所述告警的资源与所述控制器管理的业务所占用的资源之间的关系,分析得出所述告警是否对所述控制器管理的所述业务产生影响的所述分析结果。The second analyzing unit is configured to analyze, according to the relationship between the resource that generates the alarm and the resource occupied by the service managed by the controller, whether the alarm has an impact on the service managed by the controller The results of the analysis.
  9. 根据权利要求8所述的装置,其中,所述第二分析单元包括以下之一:The apparatus of claim 8 wherein said second analysis unit comprises one of:
    第一确定子单元,设置为在产生所述告警的根资源不被所述控制器管理的业务所占用,并且也没有所述根资源对应的子资源被所述控制器管理的业务所占用的情况下,确定所述告警对所述控制器管理的所述业务不产生影响;a first determining subunit, configured to be occupied by a service in which the root resource generating the alarm is not managed by the controller, and where the sub resource corresponding to the root resource is occupied by a service managed by the controller In case, determining that the alarm does not affect the service managed by the controller;
    第二确定子单元,设置为在产生所述告警的根资源不被所述控制器管理的业务所占用,但所述根资源对应的子资源被所述控制器管理的业务所占用的情况下,确定所述告警对所述控制器管理的所述业务产生影响;a second determining subunit, configured to be used when the root resource that generates the alarm is not occupied by the service managed by the controller, but the sub-resource corresponding to the root resource is occupied by the service managed by the controller Determining that the alarm has an impact on the service managed by the controller;
    第三确定子单元,设置为在产生所述告警的根资源不被所述控制器管理的业务所占用,所述根资源对应的子资源也不被所述控制器管理的业务所占用,但所述根资源和/或所述根资源对应的子资源与所述控制器管理的业务存在映射关系的情况下,确定所述告警对所述控制器管理的所述业务产生影响;a third determining subunit, configured to be occupied by a service that is not managed by the controller, where the root resource that generates the alarm is not occupied by the controller, but the sub-resource corresponding to the root resource is not occupied by the service managed by the controller, but If the root resource and/or the sub-resource corresponding to the root resource are in a mapping relationship with the service managed by the controller, determining that the alarm has an impact on the service managed by the controller;
    第四确定子单元,设置为在产生所述告警的根资源被所述控制器管理的业务所占用的情况下,确定所述告警对所述控制器管理的所述业务生产影响。The fourth determining subunit is configured to determine, in the case that the root resource generating the alarm is occupied by the service managed by the controller, the impact of the alarm on the service production managed by the controller.
  10. 根据权利要求9所述的装置,其中,所述处理模块包括以下之一:The apparatus of claim 9 wherein said processing module comprises one of:
    第一抑制单元,设置为在依据所述告警原因,分析得出所述告警对所述控制器管理的业务不产生影响的情况下,对所述告警进行抑制;The first suppression unit is configured to suppress the alarm if the alarm does not affect the service managed by the controller according to the alarm cause;
    第二抑制单元,设置为在依据产生所述告警的资源与所述控制器管理的业务所占用的资源之间的关系确定所述告警对所述控制器管理的所述业务不产生影响的情况下,对所述告警进行抑制;a second suppression unit, configured to determine, in a relationship between the resource generated by the alarm and a resource occupied by the service managed by the controller, that the alarm does not affect the service managed by the controller And suppressing the alarm;
    第一衍生单元,设置为在产生所述告警的根资源不被所述控制器管理的业务所占用,但所述根资源对应的子资源被所述控制器管理的业务所占用的情况下,将所述告警衍生为子资源衍生告警;a first derivation unit, configured to: when a root resource that generates the alarm is not occupied by a service managed by the controller, but a sub-resource corresponding to the root resource is occupied by a service managed by the controller, Deriving the alarm as a sub-resource derived alarm;
    第二衍生单元,设置为在产生所述告警的根资源不被所述控制器管理的业务所占用,所述根资源对应的子资源也不被所述控制器管理的业务所占用,但所述根资源和/或所述根资源对应的子资源与所述控制器管理的业务存在映射关系的 情况下,依据所述映射关系,将所述告警衍生为关系衍生告警;The second derivation unit is configured to be occupied by a service that is not managed by the controller, and the sub-resource corresponding to the root resource is not occupied by the service managed by the controller, but Mapping a root resource and/or a sub-resource corresponding to the root resource to a service managed by the controller In the case, the alarm is derived as a relationship-derived alarm according to the mapping relationship;
    第一上报单元,设置为在产生所述告警的根资源被所述控制器管理的业务所占用的情况下,直接将所述告警上报给上层网络设备。The first reporting unit is configured to directly report the alarm to the upper-layer network device if the root resource that generates the alarm is occupied by the service managed by the controller.
  11. 根据权利要求10所述的装置,其中,还包括:The apparatus of claim 10, further comprising:
    记录单元,设置为在对所述告警进行衍生处理的情况下,记录所述告警与衍生后的衍生告警之间的关联关系,其中,所述衍生告警包括:子资源衍生告警和/或关系衍生告警;a recording unit, configured to record an association between the alarm and the derived derivative alarm, where the derivative alarm includes: a sub-resource-derived alarm and/or a relationship derivative Alarm
    第二上报单元,设置为将所述衍生告警以及所述关联关系上报给上层网络设备,和/或,提供单元,设置为提供所述关联关系供所述控制器管理系统中的网元设备查询。a second reporting unit, configured to report the derived alarm and the association relationship to an upper layer network device, and/or a providing unit, configured to provide the association relationship for querying by a network element device in the controller management system .
  12. 根据权利要求7至11中任一项所述的装置,其中,还包括:The apparatus according to any one of claims 7 to 11, further comprising:
    生成模块,设置为依据所述告警所引起的网元设备的状态变化,或者所述告警的代表资源的对象的状态变化,生成所述网元设备或者所述代表资源的对象的状态通知;Generating a module, configured to generate a state notification of the network element device or the object representing the resource according to a state change of the network element device caused by the alarm, or a state change of an object representing the resource of the alarm;
    上报模块,设置为将生成的所述网元设备或者所述代表资源的对象的状态通知上报给上层网络设备。The reporting module is configured to report the status notification of the generated network element device or the object representing the resource to the upper layer network device.
  13. 一种控制器,包括上述任一项所述的告警处理装置。A controller comprising the alarm processing device of any of the above.
  14. 根据权利要求13所述的控制器,其中,所述控制器包括以下至少之一:域控制器DC、超级控制器SC,其中,所述SC为所述DC的上层控制器。 The controller of claim 13, wherein the controller comprises at least one of: a domain controller DC, a super controller SC, wherein the SC is an upper layer controller of the DC.
PCT/CN2015/086803 2015-01-27 2015-08-12 Alarm processing method and device, and controller WO2016119436A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510042309 2015-01-27
CN201510042309.1 2015-01-27

Publications (1)

Publication Number Publication Date
WO2016119436A1 true WO2016119436A1 (en) 2016-08-04

Family

ID=56542308

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/086803 WO2016119436A1 (en) 2015-01-27 2015-08-12 Alarm processing method and device, and controller

Country Status (2)

Country Link
CN (1) CN105991332A (en)
WO (1) WO2016119436A1 (en)

Cited By (69)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108156019A (en) * 2017-11-29 2018-06-12 全球能源互联网研究院有限公司 A kind of network based on SDN derives alarm filtering system and method
US10218572B2 (en) 2017-06-19 2019-02-26 Cisco Technology, Inc. Multiprotocol border gateway protocol routing validation
US10333833B2 (en) 2017-09-25 2019-06-25 Cisco Technology, Inc. Endpoint path assurance
US10333787B2 (en) 2017-06-19 2019-06-25 Cisco Technology, Inc. Validation of L3OUT configuration for communications outside a network
US10341184B2 (en) 2017-06-19 2019-07-02 Cisco Technology, Inc. Validation of layer 3 bridge domain subnets in in a network
US10348564B2 (en) 2017-06-19 2019-07-09 Cisco Technology, Inc. Validation of routing information base-forwarding information base equivalence in a network
US10411996B2 (en) 2017-06-19 2019-09-10 Cisco Technology, Inc. Validation of routing information in a network fabric
US10432467B2 (en) 2017-06-19 2019-10-01 Cisco Technology, Inc. Network validation between the logical level and the hardware level of a network
US10439875B2 (en) 2017-05-31 2019-10-08 Cisco Technology, Inc. Identification of conflict rules in a network intent formal equivalence failure
US10437641B2 (en) 2017-06-19 2019-10-08 Cisco Technology, Inc. On-demand processing pipeline interleaved with temporal processing pipeline
US10498608B2 (en) 2017-06-16 2019-12-03 Cisco Technology, Inc. Topology explorer
US10505816B2 (en) 2017-05-31 2019-12-10 Cisco Technology, Inc. Semantic analysis to detect shadowing of rules in a model of network intents
US10528444B2 (en) 2017-06-19 2020-01-07 Cisco Technology, Inc. Event generation in response to validation between logical level and hardware level
US10536337B2 (en) 2017-06-19 2020-01-14 Cisco Technology, Inc. Validation of layer 2 interface and VLAN in a networked environment
US10547715B2 (en) 2017-06-16 2020-01-28 Cisco Technology, Inc. Event generation in response to network intent formal equivalence failures
US10547509B2 (en) 2017-06-19 2020-01-28 Cisco Technology, Inc. Validation of a virtual port channel (VPC) endpoint in the network fabric
US10554483B2 (en) 2017-05-31 2020-02-04 Cisco Technology, Inc. Network policy analysis for networks
US10554493B2 (en) 2017-06-19 2020-02-04 Cisco Technology, Inc. Identifying mismatches between a logical model and node implementation
US10554477B2 (en) 2017-09-13 2020-02-04 Cisco Technology, Inc. Network assurance event aggregator
US10560355B2 (en) 2017-06-19 2020-02-11 Cisco Technology, Inc. Static endpoint validation
US10560328B2 (en) 2017-04-20 2020-02-11 Cisco Technology, Inc. Static network policy analysis for networks
US10567228B2 (en) 2017-06-19 2020-02-18 Cisco Technology, Inc. Validation of cross logical groups in a network
US10567229B2 (en) 2017-06-19 2020-02-18 Cisco Technology, Inc. Validating endpoint configurations between nodes
US10574513B2 (en) 2017-06-16 2020-02-25 Cisco Technology, Inc. Handling controller and node failure scenarios during data collection
US10572495B2 (en) 2018-02-06 2020-02-25 Cisco Technology Inc. Network assurance database version compatibility
US10581694B2 (en) 2017-05-31 2020-03-03 Cisco Technology, Inc. Generation of counter examples for network intent formal equivalence failures
US10587456B2 (en) 2017-09-12 2020-03-10 Cisco Technology, Inc. Event clustering for a network assurance platform
US10587621B2 (en) 2017-06-16 2020-03-10 Cisco Technology, Inc. System and method for migrating to and maintaining a white-list network security model
US10587484B2 (en) 2017-09-12 2020-03-10 Cisco Technology, Inc. Anomaly detection and reporting in a network assurance appliance
US10616072B1 (en) 2018-07-27 2020-04-07 Cisco Technology, Inc. Epoch data interface
US10623264B2 (en) 2017-04-20 2020-04-14 Cisco Technology, Inc. Policy assurance for service chaining
US10623271B2 (en) 2017-05-31 2020-04-14 Cisco Technology, Inc. Intra-priority class ordering of rules corresponding to a model of network intents
US10623259B2 (en) 2017-06-19 2020-04-14 Cisco Technology, Inc. Validation of layer 1 interface in a network
US10644946B2 (en) 2017-06-19 2020-05-05 Cisco Technology, Inc. Detection of overlapping subnets in a network
US10652102B2 (en) 2017-06-19 2020-05-12 Cisco Technology, Inc. Network node memory utilization analysis
US10659298B1 (en) 2018-06-27 2020-05-19 Cisco Technology, Inc. Epoch comparison for network events
US10673702B2 (en) 2017-06-19 2020-06-02 Cisco Technology, Inc. Validation of layer 3 using virtual routing forwarding containers in a network
US10686669B2 (en) 2017-06-16 2020-06-16 Cisco Technology, Inc. Collecting network models and node information from a network
US10693738B2 (en) 2017-05-31 2020-06-23 Cisco Technology, Inc. Generating device-level logical models for a network
US10700933B2 (en) 2017-06-19 2020-06-30 Cisco Technology, Inc. Validating tunnel endpoint addresses in a network fabric
US10797951B2 (en) 2014-10-16 2020-10-06 Cisco Technology, Inc. Discovering and grouping application endpoints in a network environment
US10805160B2 (en) 2017-06-19 2020-10-13 Cisco Technology, Inc. Endpoint bridge domain subnet validation
US10812318B2 (en) 2017-05-31 2020-10-20 Cisco Technology, Inc. Associating network policy objects with specific faults corresponding to fault localizations in large-scale network deployment
US10812315B2 (en) 2018-06-07 2020-10-20 Cisco Technology, Inc. Cross-domain network assurance
US10812336B2 (en) 2017-06-19 2020-10-20 Cisco Technology, Inc. Validation of bridge domain-L3out association for communication outside a network
US10826770B2 (en) 2018-07-26 2020-11-03 Cisco Technology, Inc. Synthesis of models for networks using automated boolean learning
US10826788B2 (en) 2017-04-20 2020-11-03 Cisco Technology, Inc. Assurance of quality-of-service configurations in a network
US10873509B2 (en) 2018-01-17 2020-12-22 Cisco Technology, Inc. Check-pointing ACI network state and re-execution from a check-pointed state
US10904070B2 (en) 2018-07-11 2021-01-26 Cisco Technology, Inc. Techniques and interfaces for troubleshooting datacenter networks
US10904101B2 (en) 2017-06-16 2021-01-26 Cisco Technology, Inc. Shim layer for extracting and prioritizing underlying rules for modeling network intents
US10911495B2 (en) 2018-06-27 2021-02-02 Cisco Technology, Inc. Assurance of security rules in a network
US11019027B2 (en) 2018-06-27 2021-05-25 Cisco Technology, Inc. Address translation for external network appliance
US11044273B2 (en) 2018-06-27 2021-06-22 Cisco Technology, Inc. Assurance of security rules in a network
CN113055213A (en) * 2019-12-27 2021-06-29 中兴通讯股份有限公司 Alarm information management method, alarm information management system and server
US11102053B2 (en) 2017-12-05 2021-08-24 Cisco Technology, Inc. Cross-domain assurance
US11121927B2 (en) 2017-06-19 2021-09-14 Cisco Technology, Inc. Automatically determining an optimal amount of time for analyzing a distributed network environment
US11150973B2 (en) 2017-06-16 2021-10-19 Cisco Technology, Inc. Self diagnosing distributed appliance
US11218508B2 (en) 2018-06-27 2022-01-04 Cisco Technology, Inc. Assurance of security rules in a network
CN113965452A (en) * 2021-11-02 2022-01-21 烽火通信科技股份有限公司 Equipment switching state obtaining method and device
CN114024828A (en) * 2021-10-15 2022-02-08 烽火通信科技股份有限公司 Platform side alarm suppression method, device and storage medium
US11258657B2 (en) 2017-05-31 2022-02-22 Cisco Technology, Inc. Fault localization in large-scale network policy deployment
US20220086036A1 (en) * 2019-05-25 2022-03-17 Huawei Technologies Co., Ltd. Alarm Analysis Method and Related Device
US11283680B2 (en) 2017-06-19 2022-03-22 Cisco Technology, Inc. Identifying components for removal in a network configuration
CN114285726A (en) * 2021-12-27 2022-04-05 中国联合网络通信集团有限公司 Fault positioning method and device and computer storage medium
CN114389960A (en) * 2022-01-04 2022-04-22 烽火通信科技股份有限公司 Method and system for collecting and reporting network service performance
US11343150B2 (en) 2017-06-19 2022-05-24 Cisco Technology, Inc. Validation of learned routes in a network
US11469986B2 (en) 2017-06-16 2022-10-11 Cisco Technology, Inc. Controlled micro fault injection on a distributed appliance
CN115396287A (en) * 2022-08-29 2022-11-25 武汉烽火技术服务有限公司 Fault analysis method and device
US11645131B2 (en) 2017-06-16 2023-05-09 Cisco Technology, Inc. Distributed fault code aggregation across application centric dimensions

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108183810B (en) * 2016-12-08 2019-06-04 中兴通讯股份有限公司 Multiple services parallel recovery method, apparatus and system under SDN framework
CN109309577A (en) * 2017-07-27 2019-02-05 杭州达乎科技有限公司 Alert processing method, apparatus and system for SDN network
CN109634252B (en) * 2018-11-06 2020-06-26 华为技术有限公司 Root cause diagnosis method and device
CN111865785B (en) * 2020-06-28 2022-04-29 烽火通信科技股份有限公司 SR-TP tunnel signal transmission method, device, server and storage medium
CN115941442A (en) * 2022-12-01 2023-04-07 中国联合网络通信集团有限公司 Business fault analysis method and device, electronic equipment and medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1713591A (en) * 2004-06-22 2005-12-28 中兴通讯股份有限公司 Alarm correlation analysis of light synchronous transmitting net
CN1992636A (en) * 2005-12-29 2007-07-04 华为技术有限公司 System and method for processing warning information
CN101183989A (en) * 2007-12-03 2008-05-21 中兴通讯股份有限公司 Incremental analysis method of optical synchronization transmission network alarm correlation
CN101409644A (en) * 2007-10-12 2009-04-15 中兴通讯股份有限公司 Method and system for pre-warning service quality
CN103596208A (en) * 2013-11-15 2014-02-19 大唐移动通信设备有限公司 Method and system for judging fault of network element

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101917288A (en) * 2010-08-04 2010-12-15 中兴通讯股份有限公司 Alarm processing method and network management system
CN102571407A (en) * 2010-12-30 2012-07-11 中国移动通信集团河北有限公司 Alarm correlation analysis method and device
CN103378980B (en) * 2012-04-16 2016-09-28 河南山谷网安科技股份有限公司 A kind of layer network alarm and business correlation analysis and device
US9256828B2 (en) * 2013-06-29 2016-02-09 Huawei Technologies Co., Ltd. Alarm correlation analysis method, apparatus and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1713591A (en) * 2004-06-22 2005-12-28 中兴通讯股份有限公司 Alarm correlation analysis of light synchronous transmitting net
CN1992636A (en) * 2005-12-29 2007-07-04 华为技术有限公司 System and method for processing warning information
CN101409644A (en) * 2007-10-12 2009-04-15 中兴通讯股份有限公司 Method and system for pre-warning service quality
CN101183989A (en) * 2007-12-03 2008-05-21 中兴通讯股份有限公司 Incremental analysis method of optical synchronization transmission network alarm correlation
CN103596208A (en) * 2013-11-15 2014-02-19 大唐移动通信设备有限公司 Method and system for judging fault of network element

Cited By (111)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11824719B2 (en) 2014-10-16 2023-11-21 Cisco Technology, Inc. Discovering and grouping application endpoints in a network environment
US11811603B2 (en) 2014-10-16 2023-11-07 Cisco Technology, Inc. Discovering and grouping application endpoints in a network environment
US11539588B2 (en) 2014-10-16 2022-12-27 Cisco Technology, Inc. Discovering and grouping application endpoints in a network environment
US10797951B2 (en) 2014-10-16 2020-10-06 Cisco Technology, Inc. Discovering and grouping application endpoints in a network environment
US10826788B2 (en) 2017-04-20 2020-11-03 Cisco Technology, Inc. Assurance of quality-of-service configurations in a network
US11178009B2 (en) 2017-04-20 2021-11-16 Cisco Technology, Inc. Static network policy analysis for networks
US10623264B2 (en) 2017-04-20 2020-04-14 Cisco Technology, Inc. Policy assurance for service chaining
US10560328B2 (en) 2017-04-20 2020-02-11 Cisco Technology, Inc. Static network policy analysis for networks
US10439875B2 (en) 2017-05-31 2019-10-08 Cisco Technology, Inc. Identification of conflict rules in a network intent formal equivalence failure
US10951477B2 (en) 2017-05-31 2021-03-16 Cisco Technology, Inc. Identification of conflict rules in a network intent formal equivalence failure
US10581694B2 (en) 2017-05-31 2020-03-03 Cisco Technology, Inc. Generation of counter examples for network intent formal equivalence failures
US10505816B2 (en) 2017-05-31 2019-12-10 Cisco Technology, Inc. Semantic analysis to detect shadowing of rules in a model of network intents
US10812318B2 (en) 2017-05-31 2020-10-20 Cisco Technology, Inc. Associating network policy objects with specific faults corresponding to fault localizations in large-scale network deployment
US11411803B2 (en) 2017-05-31 2022-08-09 Cisco Technology, Inc. Associating network policy objects with specific faults corresponding to fault localizations in large-scale network deployment
US10623271B2 (en) 2017-05-31 2020-04-14 Cisco Technology, Inc. Intra-priority class ordering of rules corresponding to a model of network intents
US10693738B2 (en) 2017-05-31 2020-06-23 Cisco Technology, Inc. Generating device-level logical models for a network
US10554483B2 (en) 2017-05-31 2020-02-04 Cisco Technology, Inc. Network policy analysis for networks
US11258657B2 (en) 2017-05-31 2022-02-22 Cisco Technology, Inc. Fault localization in large-scale network policy deployment
US11303531B2 (en) 2017-05-31 2022-04-12 Cisco Technologies, Inc. Generation of counter examples for network intent formal equivalence failures
US10547715B2 (en) 2017-06-16 2020-01-28 Cisco Technology, Inc. Event generation in response to network intent formal equivalence failures
US11469986B2 (en) 2017-06-16 2022-10-11 Cisco Technology, Inc. Controlled micro fault injection on a distributed appliance
US11563645B2 (en) 2017-06-16 2023-01-24 Cisco Technology, Inc. Shim layer for extracting and prioritizing underlying rules for modeling network intents
US10904101B2 (en) 2017-06-16 2021-01-26 Cisco Technology, Inc. Shim layer for extracting and prioritizing underlying rules for modeling network intents
US10574513B2 (en) 2017-06-16 2020-02-25 Cisco Technology, Inc. Handling controller and node failure scenarios during data collection
US10498608B2 (en) 2017-06-16 2019-12-03 Cisco Technology, Inc. Topology explorer
US11463316B2 (en) 2017-06-16 2022-10-04 Cisco Technology, Inc. Topology explorer
US11102337B2 (en) 2017-06-16 2021-08-24 Cisco Technology, Inc. Event generation in response to network intent formal equivalence failures
US10587621B2 (en) 2017-06-16 2020-03-10 Cisco Technology, Inc. System and method for migrating to and maintaining a white-list network security model
US11645131B2 (en) 2017-06-16 2023-05-09 Cisco Technology, Inc. Distributed fault code aggregation across application centric dimensions
US10686669B2 (en) 2017-06-16 2020-06-16 Cisco Technology, Inc. Collecting network models and node information from a network
US11150973B2 (en) 2017-06-16 2021-10-19 Cisco Technology, Inc. Self diagnosing distributed appliance
US10554493B2 (en) 2017-06-19 2020-02-04 Cisco Technology, Inc. Identifying mismatches between a logical model and node implementation
US10536337B2 (en) 2017-06-19 2020-01-14 Cisco Technology, Inc. Validation of layer 2 interface and VLAN in a networked environment
US10644946B2 (en) 2017-06-19 2020-05-05 Cisco Technology, Inc. Detection of overlapping subnets in a network
US10652102B2 (en) 2017-06-19 2020-05-12 Cisco Technology, Inc. Network node memory utilization analysis
US11570047B2 (en) 2017-06-19 2023-01-31 Cisco Technology, Inc. Detection of overlapping subnets in a network
US10673702B2 (en) 2017-06-19 2020-06-02 Cisco Technology, Inc. Validation of layer 3 using virtual routing forwarding containers in a network
US11595257B2 (en) 2017-06-19 2023-02-28 Cisco Technology, Inc. Validation of cross logical groups in a network
US11736351B2 (en) 2017-06-19 2023-08-22 Cisco Technology Inc. Identifying components for removal in a network configuration
US10700933B2 (en) 2017-06-19 2020-06-30 Cisco Technology, Inc. Validating tunnel endpoint addresses in a network fabric
US11750463B2 (en) 2017-06-19 2023-09-05 Cisco Technology, Inc. Automatically determining an optimal amount of time for analyzing a distributed network environment
US10805160B2 (en) 2017-06-19 2020-10-13 Cisco Technology, Inc. Endpoint bridge domain subnet validation
US10567229B2 (en) 2017-06-19 2020-02-18 Cisco Technology, Inc. Validating endpoint configurations between nodes
US10567228B2 (en) 2017-06-19 2020-02-18 Cisco Technology, Inc. Validation of cross logical groups in a network
US10812336B2 (en) 2017-06-19 2020-10-20 Cisco Technology, Inc. Validation of bridge domain-L3out association for communication outside a network
US11558260B2 (en) 2017-06-19 2023-01-17 Cisco Technology, Inc. Network node memory utilization analysis
US10560355B2 (en) 2017-06-19 2020-02-11 Cisco Technology, Inc. Static endpoint validation
US10862752B2 (en) 2017-06-19 2020-12-08 Cisco Technology, Inc. Network validation between the logical level and the hardware level of a network
US10547509B2 (en) 2017-06-19 2020-01-28 Cisco Technology, Inc. Validation of a virtual port channel (VPC) endpoint in the network fabric
US10873505B2 (en) 2017-06-19 2020-12-22 Cisco Technology, Inc. Validation of layer 2 interface and VLAN in a networked environment
US10873506B2 (en) 2017-06-19 2020-12-22 Cisco Technology, Inc. Validation of a virtual port channel (VPC) endpoint in the network fabric
US10880169B2 (en) 2017-06-19 2020-12-29 Cisco Technology, Inc. Multiprotocol border gateway protocol routing validation
US10623259B2 (en) 2017-06-19 2020-04-14 Cisco Technology, Inc. Validation of layer 1 interface in a network
US10528444B2 (en) 2017-06-19 2020-01-07 Cisco Technology, Inc. Event generation in response to validation between logical level and hardware level
US11469952B2 (en) 2017-06-19 2022-10-11 Cisco Technology, Inc. Identifying mismatches between a logical model and node implementation
US10437641B2 (en) 2017-06-19 2019-10-08 Cisco Technology, Inc. On-demand processing pipeline interleaved with temporal processing pipeline
US10972352B2 (en) 2017-06-19 2021-04-06 Cisco Technology, Inc. Validation of routing information base-forwarding information base equivalence in a network
US10432467B2 (en) 2017-06-19 2019-10-01 Cisco Technology, Inc. Network validation between the logical level and the hardware level of a network
US11438234B2 (en) 2017-06-19 2022-09-06 Cisco Technology, Inc. Validation of a virtual port channel (VPC) endpoint in the network fabric
US10411996B2 (en) 2017-06-19 2019-09-10 Cisco Technology, Inc. Validation of routing information in a network fabric
US11405278B2 (en) 2017-06-19 2022-08-02 Cisco Technology, Inc. Validating tunnel endpoint addresses in a network fabric
US11063827B2 (en) 2017-06-19 2021-07-13 Cisco Technology, Inc. Validation of layer 3 bridge domain subnets in a network
US10348564B2 (en) 2017-06-19 2019-07-09 Cisco Technology, Inc. Validation of routing information base-forwarding information base equivalence in a network
US11343150B2 (en) 2017-06-19 2022-05-24 Cisco Technology, Inc. Validation of learned routes in a network
US11102111B2 (en) 2017-06-19 2021-08-24 Cisco Technology, Inc. Validation of routing information in a network fabric
US10341184B2 (en) 2017-06-19 2019-07-02 Cisco Technology, Inc. Validation of layer 3 bridge domain subnets in in a network
US11121927B2 (en) 2017-06-19 2021-09-14 Cisco Technology, Inc. Automatically determining an optimal amount of time for analyzing a distributed network environment
US11153167B2 (en) 2017-06-19 2021-10-19 Cisco Technology, Inc. Validation of L3OUT configuration for communications outside a network
US10333787B2 (en) 2017-06-19 2019-06-25 Cisco Technology, Inc. Validation of L3OUT configuration for communications outside a network
US10218572B2 (en) 2017-06-19 2019-02-26 Cisco Technology, Inc. Multiprotocol border gateway protocol routing validation
US11303520B2 (en) 2017-06-19 2022-04-12 Cisco Technology, Inc. Validation of cross logical groups in a network
US11283682B2 (en) 2017-06-19 2022-03-22 Cisco Technology, Inc. Validation of bridge domain-L3out association for communication outside a network
US11283680B2 (en) 2017-06-19 2022-03-22 Cisco Technology, Inc. Identifying components for removal in a network configuration
US10587456B2 (en) 2017-09-12 2020-03-10 Cisco Technology, Inc. Event clustering for a network assurance platform
US11115300B2 (en) 2017-09-12 2021-09-07 Cisco Technology, Inc Anomaly detection and reporting in a network assurance appliance
US10587484B2 (en) 2017-09-12 2020-03-10 Cisco Technology, Inc. Anomaly detection and reporting in a network assurance appliance
US11038743B2 (en) 2017-09-12 2021-06-15 Cisco Technology, Inc. Event clustering for a network assurance platform
US10554477B2 (en) 2017-09-13 2020-02-04 Cisco Technology, Inc. Network assurance event aggregator
US10333833B2 (en) 2017-09-25 2019-06-25 Cisco Technology, Inc. Endpoint path assurance
CN108156019B (en) * 2017-11-29 2022-10-25 全球能源互联网研究院有限公司 SDN-based network derived alarm filtering system and method
CN108156019A (en) * 2017-11-29 2018-06-12 全球能源互联网研究院有限公司 A kind of network based on SDN derives alarm filtering system and method
US11102053B2 (en) 2017-12-05 2021-08-24 Cisco Technology, Inc. Cross-domain assurance
US11824728B2 (en) 2018-01-17 2023-11-21 Cisco Technology, Inc. Check-pointing ACI network state and re-execution from a check-pointed state
US10873509B2 (en) 2018-01-17 2020-12-22 Cisco Technology, Inc. Check-pointing ACI network state and re-execution from a check-pointed state
US10572495B2 (en) 2018-02-06 2020-02-25 Cisco Technology Inc. Network assurance database version compatibility
US11374806B2 (en) 2018-06-07 2022-06-28 Cisco Technology, Inc. Cross-domain network assurance
US11902082B2 (en) 2018-06-07 2024-02-13 Cisco Technology, Inc. Cross-domain network assurance
US10812315B2 (en) 2018-06-07 2020-10-20 Cisco Technology, Inc. Cross-domain network assurance
US11044273B2 (en) 2018-06-27 2021-06-22 Cisco Technology, Inc. Assurance of security rules in a network
US11888603B2 (en) 2018-06-27 2024-01-30 Cisco Technology, Inc. Assurance of security rules in a network
US11019027B2 (en) 2018-06-27 2021-05-25 Cisco Technology, Inc. Address translation for external network appliance
US10911495B2 (en) 2018-06-27 2021-02-02 Cisco Technology, Inc. Assurance of security rules in a network
US11218508B2 (en) 2018-06-27 2022-01-04 Cisco Technology, Inc. Assurance of security rules in a network
US11909713B2 (en) 2018-06-27 2024-02-20 Cisco Technology, Inc. Address translation for external network appliance
US10659298B1 (en) 2018-06-27 2020-05-19 Cisco Technology, Inc. Epoch comparison for network events
US10904070B2 (en) 2018-07-11 2021-01-26 Cisco Technology, Inc. Techniques and interfaces for troubleshooting datacenter networks
US11805004B2 (en) 2018-07-11 2023-10-31 Cisco Technology, Inc. Techniques and interfaces for troubleshooting datacenter networks
US10826770B2 (en) 2018-07-26 2020-11-03 Cisco Technology, Inc. Synthesis of models for networks using automated boolean learning
US10616072B1 (en) 2018-07-27 2020-04-07 Cisco Technology, Inc. Epoch data interface
US20220086036A1 (en) * 2019-05-25 2022-03-17 Huawei Technologies Co., Ltd. Alarm Analysis Method and Related Device
US11996974B2 (en) * 2019-05-25 2024-05-28 Huawei Technologies Co., Ltd. Alarm analysis method and related device
CN113055213B (en) * 2019-12-27 2024-05-28 中兴通讯股份有限公司 Alarm information management method, alarm information management system and server
CN113055213A (en) * 2019-12-27 2021-06-29 中兴通讯股份有限公司 Alarm information management method, alarm information management system and server
CN114024828B (en) * 2021-10-15 2023-05-23 烽火通信科技股份有限公司 Platform side alarm suppression method, device and storage medium
CN114024828A (en) * 2021-10-15 2022-02-08 烽火通信科技股份有限公司 Platform side alarm suppression method, device and storage medium
CN113965452A (en) * 2021-11-02 2022-01-21 烽火通信科技股份有限公司 Equipment switching state obtaining method and device
CN114285726A (en) * 2021-12-27 2022-04-05 中国联合网络通信集团有限公司 Fault positioning method and device and computer storage medium
CN114389960B (en) * 2022-01-04 2023-11-28 烽火通信科技股份有限公司 Method and system for collecting and reporting network service performance
CN114389960A (en) * 2022-01-04 2022-04-22 烽火通信科技股份有限公司 Method and system for collecting and reporting network service performance
CN115396287A (en) * 2022-08-29 2022-11-25 武汉烽火技术服务有限公司 Fault analysis method and device
CN115396287B (en) * 2022-08-29 2023-05-12 武汉烽火技术服务有限公司 Fault analysis method and device

Also Published As

Publication number Publication date
CN105991332A (en) 2016-10-05

Similar Documents

Publication Publication Date Title
WO2016119436A1 (en) Alarm processing method and device, and controller
US11218376B2 (en) Algorithmic problem identification and resolution in fabric networks by software defined operations, administration, and maintenance
US20220038353A1 (en) Technologies for annotating process and user information for network flows
US9483343B2 (en) System and method of visualizing historical event correlations in a data center
US10917324B2 (en) Network health data aggregation service
EP2109827B1 (en) Distributed network management system and method
US10862777B2 (en) Visualization of network health information
US10243820B2 (en) Filtering network health information based on customer impact
US10430257B2 (en) Alarms with stack trace spanning logical and physical architecture
US10911263B2 (en) Programmatic interfaces for network health information
US8909758B2 (en) Physical server discovery and correlation
US20220058042A1 (en) Intent-based telemetry collection service
US20150339212A1 (en) Creating searchable and global database of user visible process traces
US20130124712A1 (en) Elastic cloud networking
US10616072B1 (en) Epoch data interface
US8634330B2 (en) Inter-cluster communications technique for event and health status communications
US20150172130A1 (en) System and method for managing data center services
WO2017080161A1 (en) Alarm information processing method and device in cloud computing
CN105790972B (en) Controller and alarm correlation processing method
CN103716173A (en) Storage monitoring system and monitoring alarm issuing method
CN112956158B (en) Structural data plane monitoring
CN114244676A (en) Intelligent IT integrated gateway system
WO2018163259A1 (en) Monitoring processing program, monitoring processing method, and monitoring device
CN114389991B (en) Intelligent network flow scheduling management method and device
Ellsworth et al. A non-proprietary network operations platform for openroadm environment

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15879635

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15879635

Country of ref document: EP

Kind code of ref document: A1