WO2017054555A1 - Warning management method for use in network management system and network management system - Google Patents

Warning management method for use in network management system and network management system Download PDF

Info

Publication number
WO2017054555A1
WO2017054555A1 PCT/CN2016/090208 CN2016090208W WO2017054555A1 WO 2017054555 A1 WO2017054555 A1 WO 2017054555A1 CN 2016090208 W CN2016090208 W CN 2016090208W WO 2017054555 A1 WO2017054555 A1 WO 2017054555A1
Authority
WO
WIPO (PCT)
Prior art keywords
alarm
current
list
preset
management system
Prior art date
Application number
PCT/CN2016/090208
Other languages
French (fr)
Chinese (zh)
Inventor
郭慧峰
刘海瑞
薛亮
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2017054555A1 publication Critical patent/WO2017054555A1/en

Links

Images

Definitions

  • This document relates to, but is not limited to, the field of communication technologies, and in particular, to an alarm management method and a network management system in a network management system.
  • Alarm management is the core part of the network management system, that is, the network management. It is responsible for monitoring, isolating, and correcting abnormalities of devices and service nodes to ensure normal operation of services.
  • the alarm can be managed in two parts in the NMS.
  • the current alarm is the key monitoring and operation of the user.
  • the NMS needs to monitor the alarms in the current alarm in real time.
  • the second is the historical alarm. When the alarm is removed from the current alarm. After the entry, the historical alarm is entered. The historical alarm is used for the traceability and statistical analysis of the fault after the event.
  • the network management user does not need to monitor the historical alarm in real time.
  • the current alarm list contains only alarms that have not disappeared.
  • the shortcoming of this management mode is that the alarm may be missed for the flashing but important alarm. Because the alarm disappears, the interval is too short. The user has not noticed that the alarm is generated. The alarm disappears and enters the historical alarm. Was discovered in time.
  • the current alarm list contains alarms that have not disappeared and alarms that have disappeared but are not confirmed.
  • This management mode requires that the alarm must be acknowledged and disappeared before entering the historical alarm, which solves the problem that the flashing alarm may miss the monitoring.
  • this management method has the disadvantage that the disappearance of the alarm may not be monitored.
  • the alarm confirmation operation can be performed after the alarm is generated or disappeared, but once executed, the alarm status is modified to be confirmed. In fact, unless it is a flashing alarm, the user has no time to confirm when it is generated. Most of the alarm confirmation operations are performed after the alarm is generated, and the marked user knows that the alarm occurs. When the alarm disappears, because it is generating The time has already been confirmed, then the historical alarm will be automatically entered without user intervention.
  • alarms that need to be monitored in critical time need not only be able to monitor their occurrence in real time, but also need to be able to monitor their disappearance. After the alarm disappears, manual intervention is required to enter the historical alarm.
  • the library archives to confirm that the fault has been processed. Because sometimes the alarm disappears, it does not mean that the fault is solved. For example, if the CPU utilization exceeds the alarm, the alarm disappears only that the current CPU utilization has dropped, but it does not mean that the equipment failure with high utilization rate has been solved. If the fault is completely resolved, it can be considered that there is no need to pay attention to the alarm.
  • the alarm management method in the related art cannot monitor all processes in which alarms that need to be monitored from the generation to the disappearance until the entry of the historical alarm.
  • This document provides an alarm management method and a network management system in a network management system, which can monitor all processes in which alarms that need to be monitored from the generation to the disappearance until the entry of historical alarms.
  • the alarm management method in the network management system provided by the present application includes:
  • the alarm is added to the current alarm list
  • the alarm is retained in the current alarm list until a recovery verification instruction for indicating an alarm failure of the alarm is received, and the alarm is The current alarm list is removed to a preset historical alarm library.
  • the foregoing method further includes:
  • the alarm is removed from the current alarm list to a preset historical alarm library.
  • adding the alarm to the current alarm list includes:
  • the alarm is added to the current alarm list, and the user is prompted to process the alarm by using a preset prompt.
  • the alarm is retained in the current alarm list
  • the method of removing the alarm from the current alarm list to the preset historical alarm library includes: a recovery verification instruction for receiving an alarm fault resolution for the user to indicate the alarm:
  • the preset prompting manner includes any one or more of the following manners:
  • Preset dialog prompts audible prompts, and illuminated prompts.
  • This article also discloses a network management system, including:
  • a judging module configured to determine whether the alarm is a preset key alarm when detecting that the alarm disappears
  • the determining module determines that the alarm is a preset key alarm, retaining the alarm in the current alarm list until receiving an alarm fault that is used by the user to indicate the alarm
  • the recovery verification command removes the alarm from the current alarm list to a preset historical alarm library.
  • the removing module is further configured to:
  • the determining module determines that the alarm is not a preset key alarm, the alarm is removed from the current alarm list to a preset historical alarm library.
  • adding the alarm to the current alarm list includes:
  • the alarm is added to the current alarm list, and the user is prompted to process the alarm by using a preset prompt.
  • the removing module keeps the alarm in the current alarm list until receiving a recovery verification instruction that is used by the user to indicate an alarm failure of the alarm, and the alarm is
  • the removal of the current alarm list to the preset historical alarm library includes:
  • the preset prompting manner includes any one or more of the following manners:
  • Preset dialog prompts audible prompts, and illuminated prompts.
  • the alarm management method and the network management system in the network management system proposed by the present invention when detecting that the alarm added to the current alarm list disappears, determining whether the alarm is a preset key alarm;
  • the key alarm is set, and the alarm is retained in the current alarm list until a recovery verification command for indicating an alarm failure of the alarm is received, and the alarm is moved from the current alarm list.
  • the preset historical alarm library In addition to the preset historical alarm library.
  • the historical alarm library can effectively monitor all the processes of the key alarms that need to be monitored from the generation to the disappearance until the entry of historical alarms, thereby improving the operation and maintenance capabilities of the network management system.
  • FIG. 1 is a schematic flowchart of an alarm management method in a network management system according to Embodiment 1 of the present invention
  • FIG. 2 is a schematic flowchart of an alarm management method in a network management system according to Embodiment 2 of the present invention
  • FIG. 3 is a schematic diagram of functional modules of a network management system according to Embodiment 3 of the present invention.
  • the embodiment of the invention provides an alarm management method in a network management system.
  • FIG. 1 is a schematic flowchart of an alarm management method in a network management system according to Embodiment 1 of the present invention.
  • the alarm management method in the network management system includes the following steps S10 to S30:
  • Step S10 When the network management system receives the reported alarm, add the alarm to the current alarm list.
  • the network management system monitors the alarm of the client in real time.
  • the alarm is added to the current alarm list to monitor the current alarm in real time.
  • the user may be reminded of the current alarm by using a preset prompt manner, and the alarm needs to be processed in time.
  • the preset prompting manner may include any one or more of the following manners, which are not limited herein:
  • Step S20 When it is detected that the alarm disappears, determine whether the alarm is a preset key alarm
  • the user may be reminded that the current alarm exists, and the user may perform faulty dispatching, processing, etc. on the currently existing alarm according to the prompt, and eliminate the situation at the same time. Said the alarm.
  • the key alarm may be an alarm that the user needs to pay special attention to. The user needs the key alarm to be generated from the generation to the disappearance, and the fault can be monitored from the occurrence to the recovery.
  • the key alarm may include a single ticket that affects the service operation.
  • the CPU usage violation alarm (BRD_CPU_TCA) and the Ethernet port signal loss alarm (ETH_LOS) alarms; all alarms on the device that is undergoing software upgrade are not limited here.
  • the key alarm may be operated and preset by the user according to the needs of the actual application scenario, and the key alarm may also be performed by the network management system.
  • the alarms that need to be focused on in different operation and maintenance scenarios are obtained from the cloud server, and are not limited herein.
  • step S30 if it is determined that the alarm is a preset key alarm, the alarm is retained in the current alarm list until a recovery verification instruction that is used by the user to indicate the alarm failure of the alarm is received. The alarm is removed from the current alarm list to a preset historical alarm library.
  • the alarm is not directly removed from the current alarm list to a preset historical alarm library, but the alarm is retained. In the current alarm list, until the recovery verification command for indicating the alarm failure of the alarm is received, the alarm is removed from the current alarm list to a preset historical alarm library. In this way, for a key alarm that requires special attention, even after the alarm disappears, the user must send a recovery verification command to remove the alarm from the current alarm list to a preset historical alarm library, ensuring the focus.
  • the alarm can be monitored in real time from the generation to the disappearance until the historical alarm is entered. The last step of the life cycle of the key alarm is to enter the historical alarm.
  • the user must manually intervene, and effectively implement the key alarms that need to be monitored. It disappears until the entire life cycle of the historical alarm is monitored, which makes the engineering operation and maintenance form a closed loop for the fault handling process, which greatly improves the operation and maintenance capability of the network management system.
  • the preset prompt manner is used to remind the user that the current key alarm disappears, and the focus alarm needs to be paid attention to.
  • the preset prompting manner may include a preset dialog box prompt, an audible prompt, or a light prompt, and is not limited herein.
  • the recovery verification operation may send a recovery verification instruction for indicating the alarm failure of the alarm to the network management system, where the recovery verification operation may be that the user clicks on the network management.
  • the operations such as preset buttons or sliding in the system are not limited herein.
  • the alarm when detecting that the alarm added to the current alarm list disappears, determining whether the alarm is a preset key alarm; if the alarm is determined to be a preset key alarm, retaining the alarm in the In the current alarm list, until the recovery verification command for indicating the alarm failure of the alarm is received, the alarm is removed from the current alarm list to a preset historical alarm library. Because when the key alarm disappears, only the user's recovery verification command is received. The key alarms are removed from the current alarm list to the preset historical alarm database. They are not directly removed to the preset historical alarm database when they disappear, and the important alarms that need to be monitored can be effectively generated from the generation. Until all processes of historical alarms are monitored, the operation and maintenance capabilities of the network management system are improved.
  • a method for managing an alarm in a network management system is provided in the second embodiment of the present invention.
  • the method further includes:
  • Step S40 If it is determined that the alarm is not a preset key alarm, the alarm is removed from the current alarm list to a preset historical alarm library.
  • the alarm is processed according to the normal alarm process, that is, after the alarm disappears, the alarm is directly sent from the current alarm list. Remove to the preset historical alarm library.
  • the normal alarm is removed from the current alarm list to a preset historical alarm library, so that the flash alarm is prevented from being leaked. The situation of monitoring.
  • the normal alarm is directly removed from the current alarm list to the preset historical alarm library, which is faster.
  • the key alarm and the common alarm are differentiated: for the key alarm, only the received user is used for After the recovery verification command indicating the alarm failure of the alarm is cleared, the alarm is removed from the current alarm list to a preset historical alarm library; and for the normal alarm, after the common alarm disappears, directly The normal alarm is removed from the current alarm list to a preset historical alarm library. It enriches the alarm management method of the network management system and improves the operation and maintenance efficiency of the network management system.
  • the embodiment of the invention further provides a network management system.
  • FIG. 3 is a schematic diagram of functional modules of a network management system according to Embodiment 3 of the present invention.
  • the network management system includes:
  • Adding a module 01 configured to: when the network management system receives the reported alarm, the alarm is Join the current alarm list;
  • the network management system monitors the alarm of the client in real time.
  • the alarm is added to the current alarm list to monitor the current alarm in real time.
  • the user may be prompted to present an alarm by using a preset prompt manner, and the alarm needs to be processed in time.
  • the preset prompting manner may include any one or more of the following manners:
  • the determining module 02 is configured to determine whether the alarm is a preset key alarm when detecting that the alarm disappears;
  • the preset dialog box prompt, audible prompt, or illuminating prompt may remind the user that the current alarm exists, and the user may perform fault dispatching, processing, and the like on the current alarm according to the prompt, and eliminate the alarm in time.
  • the alarm is a preset key alarm.
  • the key alarm is a warning that the user needs to pay special attention to. The user needs the key alarm from the generation to the disappearance, and the fault can be monitored from the occurrence to the recovery.
  • the CPU usage limit alarm (BRD_CPU_TCA) and the Ethernet port signal loss alarm (ETH_LOS) alarms; all alarms on the device that is undergoing software upgrade are not limited here.
  • the key alarm may be preset and operated by the user according to the needs of the actual application scenario, and the key alarm may also be obtained by the network management system from the cloud server. Alarms that need to be focused on in different operation and maintenance scenarios are not limited here.
  • the removing module 03 is configured to: if the determining module determines that the alarm is a preset key alarm, retain the alarm in the current alarm list until receiving an alarm fault that is used by the user to indicate the alarm.
  • the resolved recovery verification command removes the alarm from the current alarm list to a preset historical alarm library.
  • the alarm is not directly removed from the current alarm list to a preset historical alarm library, but the alarm is retained. In the current alarm list, until an alarm fault solution is received from the user for indicating the alarm
  • the recovery verification command removes the alarm from the current alarm list to a preset historical alarm library. In this way, for the key alarms that require special attention, even after the alarm disappears, the user must send a recovery verification command to remove it from the current alarm list to the preset historical alarm library, ensuring the key alarms.
  • the entire life cycle from generation to disappearance until the entry of historical alarms can be monitored in real time, and the last step of the life cycle of the key alarms is to enter the historical alarms.
  • the removing module 03 may notify the user that the current key alarm disappears by using a preset prompt mode when determining that the alarm is a preset key alarm and retaining the alarm in the current alarm list. You need to pay attention to the status of the key alarms, and you need to confirm whether the faults that caused the key alarms are resolved in time.
  • the preset prompting manner may include a preset dialog box prompt, an audible prompt, or a light prompt, and is not limited herein.
  • the recovery verification operation may send a recovery verification instruction for indicating the alarm failure of the alarm to the network management system, where the recovery verification operation may be that the user clicks on the network management.
  • the operations such as preset buttons or sliding in the system are not limited herein.
  • the alarm when detecting that the alarm added to the current alarm list disappears, determining whether the alarm is a preset key alarm; if the alarm is determined to be a preset key alarm, retaining the alarm in the In the current alarm list, until the recovery verification command for indicating the alarm failure of the alarm is received, the alarm is removed from the current alarm list to a preset historical alarm library.
  • the key alarm disappears, only the user's recovery verification command is received, and the key alarm is removed from the current alarm list to the preset historical alarm library, and is not directly removed to the preset when it disappears.
  • the historical alarm library can effectively monitor all the processes of the key alarms that need to be monitored from the generation to the disappearance until the entry of historical alarms, thereby improving the operation and maintenance capabilities of the network management system.
  • the above removal module 03 is further configured to:
  • the alarm is removed from the current alarm list to a preset historical alarm library.
  • the alarm is processed according to the normal alarm process, that is, after the alarm disappears, the alarm is directly removed from the current alarm list to a preset historical alarm library.
  • the normal alarm is removed from the current alarm list to a preset historical alarm library, so that the flash alarm is prevented from being leaked. The situation of monitoring.
  • the normal alarm is directly removed from the current alarm list to the preset historical alarm library, which is faster.
  • the alarm when it is detected that the alarm in the current alarm list disappears, it is determined whether the alarm is a preset key alarm, and the key alarm and the common alarm are differentiated: for the key alarm, only the user is received. And after the recovery verification instruction indicating the alarm failure of the alarm is removed, the alarm is removed from the current alarm list to a preset historical alarm library; and for the normal alarm, that is, after the common alarm disappears, The normal alarm is directly removed from the current alarm list to a preset historical alarm library. It enriches the alarm management method of the network management system and improves the operation and maintenance efficiency of the network management system.

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Maintenance And Management Of Digital Transmission (AREA)

Abstract

A warning management method for use in a network management system and a network management system. The warning management method comprises: when a network management system receives a reported warning, said warning is added to a current warning list; when it is detected that the warning is cleared, determining whether the warning is a predefined major warning; and if so, keeping the warning in the current warning list until receiving a recovery validation command from a user indicating that a malfunction warning regarding the warning is resolved, then moving the warning from the current warning list to a preconfigured warning history database.

Description

网络管理系统中的告警管理方法及网络管理系统Alarm management method and network management system in network management system 技术领域Technical field
本文涉及但不限于通信技术领域,尤其涉及一种网络管理系统中的告警管理方法及网络管理系统。This document relates to, but is not limited to, the field of communication technologies, and in particular, to an alarm management method and a network management system in a network management system.
背景技术Background technique
告警管理是网络管理系统即网管中的核心部分,负责对设备和业务节点的异常进行监测、隔离、校正,以保证业务正常运行。告警在网管中可分为两部分进行管理,一是当前告警,是用户重点监控和操作的内容,网管需要对当前告警中的告警进行实时监控;二是历史告警,当告警从当前告警中移除后,就进入了历史告警,历史告警用于事后对故障的追溯和统计分析,网管用户不用对历史告警进行实时监控。Alarm management is the core part of the network management system, that is, the network management. It is responsible for monitoring, isolating, and correcting abnormalities of devices and service nodes to ensure normal operation of services. The alarm can be managed in two parts in the NMS. The current alarm is the key monitoring and operation of the user. The NMS needs to monitor the alarms in the current alarm in real time. The second is the historical alarm. When the alarm is removed from the current alarm. After the entry, the historical alarm is entered. The historical alarm is used for the traceability and statistical analysis of the fault after the event. The network management user does not need to monitor the historical alarm in real time.
相关技术中,对当前告警的管理方法主要有以下两种:In the related art, there are mainly two methods for managing current alarms:
一,当前告警列表中仅包含未消失的告警。这种管理方式的缺点是:可能对闪断但重要的告警漏掉监控,因为告警产生消失时间间隔太短,用户还没注意到该告警产生,告警就消失并进入历史告警,导致故障隐患不能被及时发现。First, the current alarm list contains only alarms that have not disappeared. The shortcoming of this management mode is that the alarm may be missed for the flashing but important alarm. Because the alarm disappears, the interval is too short. The user has not noticed that the alarm is generated. The alarm disappears and enters the historical alarm. Was discovered in time.
二,当前告警列表中包含未消失的告警以及已消失但未确认的告警。这种管理方式要求告警必须被确认且消失后才能进入历史告警,解决了闪断告警可能漏掉监控的问题。但这种管理方式存在这样的缺点:告警消失可能没被监控到。在这种管理方式中,告警确认操作虽然可以在告警产生后或者是消失后执行,但一旦被执行,告警状态就修改为已确认。而事实上,除非是闪断告警,用户来不及在产生时确认,绝大多数告警确认操作都是在告警产生后就执行,标记用户已知晓该告警发生,当该告警消失后,因为其在产生时已经被确认过了,那么无需用户干预便会自动进入历史告警。而在实际运维场景中,对那些需要重点监控的告警,不但需要能实时监控其产生,还需要能监控其消失,即告警消失后,必须需要经过人工干预才能进入历史告警 库归档,表示确认故障处理完毕。因为有时告警虽然消失了,但并不代表故障解决了,比如CPU利用率越限告警,告警消失仅说明当前CPU利用率降下来了,但并不代表导致利用率高的设备故障已经解决,只有故障完全解决才可以认为不需要再关注该告警。Second, the current alarm list contains alarms that have not disappeared and alarms that have disappeared but are not confirmed. This management mode requires that the alarm must be acknowledged and disappeared before entering the historical alarm, which solves the problem that the flashing alarm may miss the monitoring. However, this management method has the disadvantage that the disappearance of the alarm may not be monitored. In this management mode, the alarm confirmation operation can be performed after the alarm is generated or disappeared, but once executed, the alarm status is modified to be confirmed. In fact, unless it is a flashing alarm, the user has no time to confirm when it is generated. Most of the alarm confirmation operations are performed after the alarm is generated, and the marked user knows that the alarm occurs. When the alarm disappears, because it is generating The time has already been confirmed, then the historical alarm will be automatically entered without user intervention. In actual operation and maintenance scenarios, alarms that need to be monitored in critical time need not only be able to monitor their occurrence in real time, but also need to be able to monitor their disappearance. After the alarm disappears, manual intervention is required to enter the historical alarm. The library archives to confirm that the fault has been processed. Because sometimes the alarm disappears, it does not mean that the fault is solved. For example, if the CPU utilization exceeds the alarm, the alarm disappears only that the current CPU utilization has dropped, but it does not mean that the equipment failure with high utilization rate has been solved. If the fault is completely resolved, it can be considered that there is no need to pay attention to the alarm.
因此,相关技术中的告警管理方式无法对那些需要重点监控的告警从其产生到消失直至进入历史告警的全部过程进行监控。Therefore, the alarm management method in the related art cannot monitor all processes in which alarms that need to be monitored from the generation to the disappearance until the entry of the historical alarm.
发明内容Summary of the invention
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。The following is an overview of the topics detailed in this document. This Summary is not intended to limit the scope of the claims.
本文提供一种网络管理系统中的告警管理方法及网络管理系统,可以对需要重点监控的告警从其产生到消失直至进入历史告警的全部过程进行监控。This document provides an alarm management method and a network management system in a network management system, which can monitor all processes in which alarms that need to be monitored from the generation to the disappearance until the entry of historical alarms.
本文提供的一种网络管理系统中的告警管理方法,包括:The alarm management method in the network management system provided by the present application includes:
当网络管理系统接收到上报的告警时,将所述告警加入当前告警列表;When the network management system receives the reported alarm, the alarm is added to the current alarm list;
当检测到所述告警消失时,判断所述告警是否为预设的重点告警;When it is detected that the alarm disappears, it is determined whether the alarm is a preset key alarm;
若判断所述告警为预设的重点告警,则将所述告警保留在所述当前告警列表中,直至接收到用户用于指示所述告警的告警故障解决的恢复验证指令,将所述告警从所述当前告警列表中移除至预设的历史告警库。If it is determined that the alarm is a preset key alarm, the alarm is retained in the current alarm list until a recovery verification instruction for indicating an alarm failure of the alarm is received, and the alarm is The current alarm list is removed to a preset historical alarm library.
可选地,上述方法,还包括:Optionally, the foregoing method further includes:
若判断所述告警不是预设的重点告警,则将所述告警从所述当前告警列表中移除至预设的历史告警库。If it is determined that the alarm is not a preset key alarm, the alarm is removed from the current alarm list to a preset historical alarm library.
可选地,上述方法中,所述当网络管理系统接收到上报的告警时,将所述告警加入当前告警列表包括:Optionally, in the foregoing method, when the network management system receives the reported alarm, adding the alarm to the current alarm list includes:
当网络管理系统接收到上报的告警时,将所述告警加入当前告警列表,并通过预设提示方式提醒用户对所述告警进行处理。When the network management system receives the reported alarm, the alarm is added to the current alarm list, and the user is prompted to process the alarm by using a preset prompt.
可选地,上述方法中,所述将所述告警保留在所述当前告警列表中,直 至接收到用户用于指示所述告警的告警故障解决的恢复验证指令,将所述告警从所述当前告警列表中移除至预设的历史告警库包括:Optionally, in the above method, the alarm is retained in the current alarm list, The method of removing the alarm from the current alarm list to the preset historical alarm library includes: a recovery verification instruction for receiving an alarm fault resolution for the user to indicate the alarm:
将所述告警保留在所述当前告警列表中,并通过预设提示方式提醒用户对所述告警的故障进行确认,直至接收到用户用于指示所述告警的告警故障解决的恢复验证指令,将所述告警从所述当前告警列表中移除至预设的历史告警库。Retaining the alarm in the current alarm list, and prompting the user to confirm the fault of the alarm by using a preset prompt manner, until receiving a recovery verification instruction that is used by the user to indicate the alarm fault resolution of the alarm, The alarm is removed from the current alarm list to a preset historical alarm library.
可选地,上述方法中,所述预设提示方式包括如下任一种或多种方式:Optionally, in the foregoing method, the preset prompting manner includes any one or more of the following manners:
预设的对话框提示、发声提示、发光提示。Preset dialog prompts, audible prompts, and illuminated prompts.
本文还公开了一种网络管理系统,包括:This article also discloses a network management system, including:
添加模块,设置为当网络管理系统接收到上报的告警时,将所述告警加入当前告警列表;Adding a module, and setting the alarm to the current alarm list when the network management system receives the reported alarm;
判断模块,设置为当检测到所述告警消失时,判断所述告警是否为预设的重点告警;a judging module, configured to determine whether the alarm is a preset key alarm when detecting that the alarm disappears;
移除模块,设置为若所述判断模块判断所述告警是预设的重点告警,则将所述告警保留在所述当前告警列表中,直至接收到用户用于指示所述告警的告警故障解决的恢复验证指令,将所述告警从所述当前告警列表中移除至预设的历史告警库。And removing the module, if the determining module determines that the alarm is a preset key alarm, retaining the alarm in the current alarm list until receiving an alarm fault that is used by the user to indicate the alarm The recovery verification command removes the alarm from the current alarm list to a preset historical alarm library.
可选地,上述系统中,所述移除模块还设置为:Optionally, in the above system, the removing module is further configured to:
若所述判断模块判断所述告警不是预设的重点告警,则将所述告警从所述当前告警列表中移除至预设的历史告警库。If the determining module determines that the alarm is not a preset key alarm, the alarm is removed from the current alarm list to a preset historical alarm library.
可选地,上述系统中,所述添加模块为当网络管理系统接收到上报的告警时,将所述告警加入当前告警列表包括:Optionally, in the foregoing system, when the network management system receives the reported alarm, adding the alarm to the current alarm list includes:
当网络管理系统接收到上报的告警时,将所述告警加入当前告警列表;并通过预设提示方式提醒用户对所述告警进行处理。When the network management system receives the reported alarm, the alarm is added to the current alarm list, and the user is prompted to process the alarm by using a preset prompt.
可选地,上述系统中,所述移除模块将所述告警保留在所述当前告警列表中,直至接收到用户用于指示所述告警的告警故障解决的恢复验证指令,将所述告警从所述当前告警列表中移除至预设的历史告警库包括: Optionally, in the above system, the removing module keeps the alarm in the current alarm list until receiving a recovery verification instruction that is used by the user to indicate an alarm failure of the alarm, and the alarm is The removal of the current alarm list to the preset historical alarm library includes:
将所述告警保留在所述当前告警列表中,并通过预设提示方式提醒用户对所述告警的故障进行确认,直至接收到用户用于指示所述告警的告警故障解决的恢复验证指令,将所述告警从所述当前告警列表中移除至预设的历史告警库。Retaining the alarm in the current alarm list, and prompting the user to confirm the fault of the alarm by using a preset prompt manner, until receiving a recovery verification instruction that is used by the user to indicate the alarm fault resolution of the alarm, The alarm is removed from the current alarm list to a preset historical alarm library.
可选地,上述系统中,所述预设提示方式包括如下任一种或多种方式:Optionally, in the foregoing system, the preset prompting manner includes any one or more of the following manners:
预设的对话框提示、发声提示、发光提示。Preset dialog prompts, audible prompts, and illuminated prompts.
本文提出的一种网络管理系统中的告警管理方法及网络管理系统,当检测加入到当前告警列表中的告警消失时,判断所述告警是否为预设的重点告警;若判断所述告警是预设的重点告警,则将所述告警保留在所述当前告警列表中,直至接收到用户用于指示所述告警的告警故障解决的恢复验证指令,将所述告警从所述当前告警列表中移除至预设的历史告警库。由于在重点告警消失时,只有接收到用户的恢复验证指令,才将该重点告警从当前告警列表中移除至预设的历史告警库,并不是在其消失时将其直接移除至预设的历史告警库,能有效地对需要监控的重点告警从其产生到消失直至进入历史告警的全部过程进行监控,提升了网络管理系统的运维能力。The alarm management method and the network management system in the network management system proposed by the present invention, when detecting that the alarm added to the current alarm list disappears, determining whether the alarm is a preset key alarm; The key alarm is set, and the alarm is retained in the current alarm list until a recovery verification command for indicating an alarm failure of the alarm is received, and the alarm is moved from the current alarm list. In addition to the preset historical alarm library. When the key alarm disappears, only the user's recovery verification command is received, and the key alarm is removed from the current alarm list to the preset historical alarm library, and is not directly removed to the preset when it disappears. The historical alarm library can effectively monitor all the processes of the key alarms that need to be monitored from the generation to the disappearance until the entry of historical alarms, thereby improving the operation and maintenance capabilities of the network management system.
在阅读并理解了附图和详细描述后,可以明白其他方面。Other aspects will be apparent upon reading and understanding the drawings and detailed description.
附图概述BRIEF abstract
图1为本发明实施例一提供的网络管理系统中的告警管理方法的流程示意图;1 is a schematic flowchart of an alarm management method in a network management system according to Embodiment 1 of the present invention;
图2为本发明实施例二提供的网络管理系统中的告警管理方法的流程示意图;2 is a schematic flowchart of an alarm management method in a network management system according to Embodiment 2 of the present invention;
图3为本发明实施例三提供的网络管理系统的功能模块示意图。FIG. 3 is a schematic diagram of functional modules of a network management system according to Embodiment 3 of the present invention.
本发明的实施方式Embodiments of the invention
下文中将结合附图对本文的实施例进行详细说明。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互任意组合。 The embodiments herein will be described in detail below with reference to the accompanying drawings. It should be noted that, in the case of no conflict, the features in the embodiments and the embodiments in the present application may be arbitrarily combined with each other.
本发明实施例提供一种网络管理系统中的告警管理方法。The embodiment of the invention provides an alarm management method in a network management system.
参照图1,图1为本发明实施例一提供的网络管理系统中的告警管理方法的流程示意图。1 is a schematic flowchart of an alarm management method in a network management system according to Embodiment 1 of the present invention.
在实施例一中,该网络管理系统中的告警管理方法包括如下步骤S10至S30:In the first embodiment, the alarm management method in the network management system includes the following steps S10 to S30:
步骤S10,当网络管理系统接收到上报的告警时,将所述告警加入当前告警列表;Step S10: When the network management system receives the reported alarm, add the alarm to the current alarm list.
可选地,本实施例中,网络管理系统对客户端的告警进行实时监控,当接收到客户端最新上传的告警时,将该告警加入到当前告警列表中,以对当前告警进行实时监控。在一种可选实施方式中,可以在将告警加入到当前告警列表中时,通过预设提示方式提醒用户当前存在告警,需及时对所述告警进行处理。其中,该预设提示方式可以包括如下一任一种或多种方式,在此不作限定:Optionally, in this embodiment, the network management system monitors the alarm of the client in real time. When receiving the latest alarm sent by the client, the alarm is added to the current alarm list to monitor the current alarm in real time. In an optional implementation manner, when an alarm is added to the current alarm list, the user may be reminded of the current alarm by using a preset prompt manner, and the alarm needs to be processed in time. The preset prompting manner may include any one or more of the following manners, which are not limited herein:
通过预设的对话框提示、发声提示、发光提示。Through preset dialog prompts, audible prompts, and illuminated prompts.
步骤S20,当检测到所述告警消失时,判断所述告警是否为预设的重点告警;Step S20: When it is detected that the alarm disappears, determine whether the alarm is a preset key alarm;
可选地,可以通过预设的对话框提示、发声提示或发光提示等提醒用户当前存在告警后,用户可根据提示对当前存在的所述告警进行故障派单、处理等操作,以及时消除所述告警。当检测到用户对所述告警进行处理后告警消失时,判断所述告警是否为预设的重点告警。其中,该重点告警可以是用户需要进行特别关注的告警,用户需要该重点告警从产生到消失,故障从发生到恢复,都能处于监控之下,如该重点告警可以包括影响业务运行的“单板CPU利用率越限告警(BRD_CPU_TCA)”、“以太网端口信号丢失告警(ETH_LOS)”告警;正在进行软件升级的设备上的所有告警等,在此不作限定。Optionally, after the preset dialog box prompt, audible prompt, or illuminating prompt, the user may be reminded that the current alarm exists, and the user may perform faulty dispatching, processing, etc. on the currently existing alarm according to the prompt, and eliminate the situation at the same time. Said the alarm. When it is detected that the alarm disappears after the user processes the alarm, it is determined whether the alarm is a preset key alarm. The key alarm may be an alarm that the user needs to pay special attention to. The user needs the key alarm to be generated from the generation to the disappearance, and the fault can be monitored from the occurrence to the recovery. For example, the key alarm may include a single ticket that affects the service operation. The CPU usage violation alarm (BRD_CPU_TCA) and the Ethernet port signal loss alarm (ETH_LOS) alarms; all alarms on the device that is undergoing software upgrade are not limited here.
需要说明的是,本实施例中,该重点告警既可以由用户根据实际应用场景的需要预先设定重点的告警进行运维,该重点告警也可以是由网络管理系 统从云端服务器上获取惯用的在不同运维场景中需重点关注的告警,在此不作限定。It should be noted that, in this embodiment, the key alarm may be operated and preset by the user according to the needs of the actual application scenario, and the key alarm may also be performed by the network management system. The alarms that need to be focused on in different operation and maintenance scenarios are obtained from the cloud server, and are not limited herein.
步骤S30,若判断所述告警是预设的重点告警,则将所述告警保留在所述当前告警列表中,直至接收到用户用于指示所述告警的告警故障解决的恢复验证指令,将所述告警从所述当前告警列表中移除至预设的历史告警库。In step S30, if it is determined that the alarm is a preset key alarm, the alarm is retained in the current alarm list until a recovery verification instruction that is used by the user to indicate the alarm failure of the alarm is received. The alarm is removed from the current alarm list to a preset historical alarm library.
本实施例中,若判断所述告警是预设的重点告警,则并不直接将所述告警从所述当前告警列表中移除至预设的历史告警库,而是将所述告警继续保留在所述当前告警列表中,直至接收到用户用于指示所述告警的告警故障解决的恢复验证指令,将所述告警从所述当前告警列表中移除至预设的历史告警库。这样,对于需要进行特别关注的重点告警,即使在告警消失后,也必须由用户发送恢复验证指令,才能将该告警从所述当前告警列表中移除至预设的历史告警库,保证了重点告警从产生到消失直至进入历史告警的整个生命周期都能被实时监控,且重点告警的生命周期最后一个环节即进入历史告警必须由用户人工干预,有效的实施对需要监控的重点告警从其产生到消失直至进入历史告警的整个生命周期进行监控,使得工程运维对故障处理流程形成闭环,极大提升了网络管理系统的运维能力。In this embodiment, if it is determined that the alarm is a preset key alarm, the alarm is not directly removed from the current alarm list to a preset historical alarm library, but the alarm is retained. In the current alarm list, until the recovery verification command for indicating the alarm failure of the alarm is received, the alarm is removed from the current alarm list to a preset historical alarm library. In this way, for a key alarm that requires special attention, even after the alarm disappears, the user must send a recovery verification command to remove the alarm from the current alarm list to a preset historical alarm library, ensuring the focus. The alarm can be monitored in real time from the generation to the disappearance until the historical alarm is entered. The last step of the life cycle of the key alarm is to enter the historical alarm. The user must manually intervene, and effectively implement the key alarms that need to be monitored. It disappears until the entire life cycle of the historical alarm is monitored, which makes the engineering operation and maintenance form a closed loop for the fault handling process, which greatly improves the operation and maintenance capability of the network management system.
在一种可选实施方式中,可在判断所述告警为预设的重点告警并将所述告警保留在当前告警列表中时,通过预设提示方式提醒用户当前重点告警消失,需要关注重点告警的状态,并需要及时确认引发该重点告警的故障是否解决。其中,该预设提示方式可包括通过预设的对话框提示、发声提示或发光提示等,在此不作限定。用户在确认引发该重点告警的故障已经解决时,可通过恢复验证操作向网络管理系统发送用于指示所述告警的告警故障解决的恢复验证指令,其中,该恢复验证操作可以是用户点击网络管理系统中的预设按钮或滑动等操作,在此不作限定。In an optional implementation manner, when the alarm is determined to be a preset key alarm and the alarm is retained in the current alarm list, the preset prompt manner is used to remind the user that the current key alarm disappears, and the focus alarm needs to be paid attention to. The status and need to confirm in time whether the fault that caused the key alarm is resolved. The preset prompting manner may include a preset dialog box prompt, an audible prompt, or a light prompt, and is not limited herein. When the user confirms that the fault that caused the key alarm has been resolved, the recovery verification operation may send a recovery verification instruction for indicating the alarm failure of the alarm to the network management system, where the recovery verification operation may be that the user clicks on the network management. The operations such as preset buttons or sliding in the system are not limited herein.
本实施例中当检测加入到当前告警列表中的告警消失时,判断所述告警是否为预设的重点告警;若判断所述告警是预设的重点告警,则将所述告警保留在所述当前告警列表中,直至接收到用户用于指示所述告警的告警故障解决的恢复验证指令,将所述告警从所述当前告警列表中移除至预设的历史告警库。由于在重点告警消失时,只有接收到用户的恢复验证指令,才将该 重点告警从当前告警列表中移除至预设的历史告警库,并不是在其消失时将其直接移除至预设的历史告警库,能有效地对需要监控的重点告警从其产生到消失直至进入历史告警的全部过程进行监控,提升了网络管理系统的运维能力。In this embodiment, when detecting that the alarm added to the current alarm list disappears, determining whether the alarm is a preset key alarm; if the alarm is determined to be a preset key alarm, retaining the alarm in the In the current alarm list, until the recovery verification command for indicating the alarm failure of the alarm is received, the alarm is removed from the current alarm list to a preset historical alarm library. Because when the key alarm disappears, only the user's recovery verification command is received. The key alarms are removed from the current alarm list to the preset historical alarm database. They are not directly removed to the preset historical alarm database when they disappear, and the important alarms that need to be monitored can be effectively generated from the generation. Until all processes of historical alarms are monitored, the operation and maintenance capabilities of the network management system are improved.
如图2所示,为本发明实施例二提出一种网络管理系统中的告警管理方法,在上述实施例一的基础上,在上述步骤S20后还包括:As shown in FIG. 2, a method for managing an alarm in a network management system is provided in the second embodiment of the present invention. On the basis of the foregoing Embodiment 1, after the step S20, the method further includes:
步骤S40,若判断所述告警不是预设的重点告警,则将所述告警从所述当前告警列表中移除至预设的历史告警库。Step S40: If it is determined that the alarm is not a preset key alarm, the alarm is removed from the current alarm list to a preset historical alarm library.
本实施例中,若判断当前告警列表中消失的告警不是预设的重点告警,则按照普通告警的流程对其进行处理,即在该告警消失后,直接将该告警从所述当前告警列表中移除至预设的历史告警库。在一种可选实施方式中,可在普通告警被确认且取消后,才将该普通告警从所述当前告警列表中移除至预设的历史告警库,这样,能避免闪断告警被漏掉监控的情况。在一种可选实施方式中,也可以在普通告警取消后,直接将该普通告警从所述当前告警列表中移除至预设的历史告警库,更加快捷。In this embodiment, if it is determined that the alarm that disappears in the current alarm list is not the preset key alarm, the alarm is processed according to the normal alarm process, that is, after the alarm disappears, the alarm is directly sent from the current alarm list. Remove to the preset historical alarm library. In an optional implementation manner, after the normal alarm is confirmed and cancelled, the normal alarm is removed from the current alarm list to a preset historical alarm library, so that the flash alarm is prevented from being leaked. The situation of monitoring. In an optional implementation manner, after the normal alarm is cancelled, the normal alarm is directly removed from the current alarm list to the preset historical alarm library, which is faster.
本实施例中,当检测到当前告警列表中的告警消失时,判断所述告警是否为预设的重点告警,对重点告警和普通告警进行区分处理:对于重点告警,只有在接收到用户用于指示所述告警的告警故障解决的恢复验证指令之后,才将所述告警从所述当前告警列表中移除至预设的历史告警库;而对于普通告警,即在该普通告警消失后,直接将该普通告警从所述当前告警列表中移除至预设的历史告警库。丰富了网络管理系统的告警管理方法,提升了网络管理系统的运维效率。In this embodiment, when it is detected that the alarm in the current alarm list disappears, it is determined whether the alarm is a preset key alarm, and the key alarm and the common alarm are differentiated: for the key alarm, only the received user is used for After the recovery verification command indicating the alarm failure of the alarm is cleared, the alarm is removed from the current alarm list to a preset historical alarm library; and for the normal alarm, after the common alarm disappears, directly The normal alarm is removed from the current alarm list to a preset historical alarm library. It enriches the alarm management method of the network management system and improves the operation and maintenance efficiency of the network management system.
本发明实施例还提供一种网络管理系统。The embodiment of the invention further provides a network management system.
图3所示,为本发明实施例三的网络管理系统的功能模块示意图。FIG. 3 is a schematic diagram of functional modules of a network management system according to Embodiment 3 of the present invention.
该网络管理系统包括:The network management system includes:
添加模块01,设置为当网络管理系统接收到上报的告警时,将所述告警 加入当前告警列表;Adding a module 01, configured to: when the network management system receives the reported alarm, the alarm is Join the current alarm list;
可选地,本实施例中,网络管理系统对客户端的告警进行实时监控,当接收到客户端最新上传的告警时,将该告警加入到当前告警列表中,以对当前告警进行实时监控。在一种可选实施方式中,可在将告警加入到当前告警列表中时,可以通过预设提示方式提醒用户当前存在告警,需及时对所述告警进行处理。其中,该预设提示方式可包括如下任一种或多种方式:Optionally, in this embodiment, the network management system monitors the alarm of the client in real time. When receiving the latest alarm sent by the client, the alarm is added to the current alarm list to monitor the current alarm in real time. In an optional implementation manner, when an alarm is added to the current alarm list, the user may be prompted to present an alarm by using a preset prompt manner, and the alarm needs to be processed in time. The preset prompting manner may include any one or more of the following manners:
通过预设的对话框提示、发声提示、发光提示。Through preset dialog prompts, audible prompts, and illuminated prompts.
判断模块02,设置为当检测到所述告警消失时,判断所述告警是否为预设的重点告警;The determining module 02 is configured to determine whether the alarm is a preset key alarm when detecting that the alarm disappears;
可选地,可以通过预设的对话框提示、发声提示或发光提示等提醒用户当前存在告警后,用户可根据提示对当前告警进行故障派单、处理等操作,以及时消除告警。当检测到用户对当前告警进行处理后告警消失时,判断所述告警是否为预设的重点告警。其中,该重点告警是用户需要进行特别关注的告警,用户需要该重点告警从产生到消失,故障从发生到恢复,都能处于监控之下,如该重点告警可以包括影响业务运行的“单板CPU利用率越限告警(BRD_CPU_TCA)”、“以太网端口信号丢失告警(ETH_LOS)”告警;正在进行软件升级的设备上的所有告警等,在此不作限定。Optionally, the preset dialog box prompt, audible prompt, or illuminating prompt may remind the user that the current alarm exists, and the user may perform fault dispatching, processing, and the like on the current alarm according to the prompt, and eliminate the alarm in time. When it is detected that the alarm disappears after the current alarm is processed by the user, it is determined whether the alarm is a preset key alarm. The key alarm is a warning that the user needs to pay special attention to. The user needs the key alarm from the generation to the disappearance, and the fault can be monitored from the occurrence to the recovery. The CPU usage limit alarm (BRD_CPU_TCA) and the Ethernet port signal loss alarm (ETH_LOS) alarms; all alarms on the device that is undergoing software upgrade are not limited here.
需要说明的是,本实施例中,该重点告警既可以由用户根据实际应用场景的需要预先设定重点的告警进行运维,该重点告警也可以是由网络管理系统从云端服务器上获取惯用的在不同运维场景中需重点关注的告警,在此不作限定。It should be noted that, in this embodiment, the key alarm may be preset and operated by the user according to the needs of the actual application scenario, and the key alarm may also be obtained by the network management system from the cloud server. Alarms that need to be focused on in different operation and maintenance scenarios are not limited here.
移除模块03,设置为若所述判断模块判断所述告警是预设的重点告警,则将所述告警保留在所述当前告警列表中,直至接收到用户用于指示所述告警的告警故障解决的恢复验证指令,将所述告警从所述当前告警列表中移除至预设的历史告警库。The removing module 03 is configured to: if the determining module determines that the alarm is a preset key alarm, retain the alarm in the current alarm list until receiving an alarm fault that is used by the user to indicate the alarm The resolved recovery verification command removes the alarm from the current alarm list to a preset historical alarm library.
本实施例中,若判断所述告警是预设的重点告警,则并不直接将所述告警从所述当前告警列表中移除至预设的历史告警库,而是将所述告警继续保留在所述当前告警列表中,直至接收到用户用于指示所述告警的告警故障解 决的恢复验证指令,将所述告警从所述当前告警列表中移除至预设的历史告警库。这样,对于需要进行特别关注的重点告警,即使在告警消失后,也必须由用户发送恢复验证指令,才能将其从所述当前告警列表中移除至预设的历史告警库,保证了重点告警从产生到消失直至进入历史告警的整个生命周期都能被实时监控,且重点告警的生命周期最后一个环节即进入历史告警必须由用户人工干预,有效的实施对需要监控的重点告警从其产生到消失直至进入历史告警的整个生命周期进行监控,使得工程运维对故障处理流程形成闭环,极大提升了网络管理系统的运维能力。In this embodiment, if it is determined that the alarm is a preset key alarm, the alarm is not directly removed from the current alarm list to a preset historical alarm library, but the alarm is retained. In the current alarm list, until an alarm fault solution is received from the user for indicating the alarm The recovery verification command removes the alarm from the current alarm list to a preset historical alarm library. In this way, for the key alarms that require special attention, even after the alarm disappears, the user must send a recovery verification command to remove it from the current alarm list to the preset historical alarm library, ensuring the key alarms. The entire life cycle from generation to disappearance until the entry of historical alarms can be monitored in real time, and the last step of the life cycle of the key alarms is to enter the historical alarms. The user must manually intervene, and the effective implementation of the key alarms that need to be monitored is generated from It disappears until the entire life cycle of the historical alarm is monitored, which makes the engineering operation and maintenance form a closed loop for the fault handling process, which greatly improves the operation and maintenance capability of the network management system.
在一种可选实施方式中,移除模块03可以在判断所述告警为预设的重点告警并将所述告警保留在当前告警列表中时,通过预设提示方式提醒用户当前重点告警消失,需要关注重点告警的状态,并需要及时确认引发该重点告警的故障是否解决。其中,该预设提示方式可包括通过预设的对话框提示、发声提示或发光提示等,在此不作限定。用户在确认引发该重点告警的故障已经解决时,可通过恢复验证操作向网络管理系统发送用于指示所述告警的告警故障解决的恢复验证指令,其中,该恢复验证操作可以是用户点击网络管理系统中的预设按钮或滑动等操作,在此不作限定。In an optional implementation manner, the removing module 03 may notify the user that the current key alarm disappears by using a preset prompt mode when determining that the alarm is a preset key alarm and retaining the alarm in the current alarm list. You need to pay attention to the status of the key alarms, and you need to confirm whether the faults that caused the key alarms are resolved in time. The preset prompting manner may include a preset dialog box prompt, an audible prompt, or a light prompt, and is not limited herein. When the user confirms that the fault that caused the key alarm has been resolved, the recovery verification operation may send a recovery verification instruction for indicating the alarm failure of the alarm to the network management system, where the recovery verification operation may be that the user clicks on the network management. The operations such as preset buttons or sliding in the system are not limited herein.
本实施例中当检测加入到当前告警列表中的告警消失时,判断所述告警是否为预设的重点告警;若判断所述告警是预设的重点告警,则将所述告警保留在所述当前告警列表中,直至接收到用户用于指示所述告警的告警故障解决的恢复验证指令,将所述告警从所述当前告警列表中移除至预设的历史告警库。由于在重点告警消失时,只有接收到用户的恢复验证指令,才将该重点告警从当前告警列表中移除至预设的历史告警库,并不是在其消失时将其直接移除至预设的历史告警库,能有效地对需要监控的重点告警从其产生到消失直至进入历史告警的全部过程进行监控,提升了网络管理系统的运维能力。In this embodiment, when detecting that the alarm added to the current alarm list disappears, determining whether the alarm is a preset key alarm; if the alarm is determined to be a preset key alarm, retaining the alarm in the In the current alarm list, until the recovery verification command for indicating the alarm failure of the alarm is received, the alarm is removed from the current alarm list to a preset historical alarm library. When the key alarm disappears, only the user's recovery verification command is received, and the key alarm is removed from the current alarm list to the preset historical alarm library, and is not directly removed to the preset when it disappears. The historical alarm library can effectively monitor all the processes of the key alarms that need to be monitored from the generation to the disappearance until the entry of historical alarms, thereby improving the operation and maintenance capabilities of the network management system.
在其他可选实施例中,上述移除模块03还设置为:In other optional embodiments, the above removal module 03 is further configured to:
若判断所述告警不是预设的重点告警,则将所述告警从所述当前告警列表中移除至预设的历史告警库。If it is determined that the alarm is not a preset key alarm, the alarm is removed from the current alarm list to a preset historical alarm library.
本实施例中,若判断当前告警列表中消失的告警不是预设的重点告警, 则按照普通告警的流程对其进行处理,即在该告警消失后,直接将该告警从所述当前告警列表中移除至预设的历史告警库。在一种可选实施方式中,可在普通告警被确认且取消后,才将该普通告警从所述当前告警列表中移除至预设的历史告警库,这样,能避免闪断告警被漏掉监控的情况。在另一种实施方式中,也可在普通告警取消后,直接将该普通告警从所述当前告警列表中移除至预设的历史告警库,更加快捷。In this embodiment, if it is determined that the alarm that disappears in the current alarm list is not a preset key alarm, Then, the alarm is processed according to the normal alarm process, that is, after the alarm disappears, the alarm is directly removed from the current alarm list to a preset historical alarm library. In an optional implementation manner, after the normal alarm is confirmed and cancelled, the normal alarm is removed from the current alarm list to a preset historical alarm library, so that the flash alarm is prevented from being leaked. The situation of monitoring. In another implementation manner, after the normal alarm is cancelled, the normal alarm is directly removed from the current alarm list to the preset historical alarm library, which is faster.
本领域普通技术人员可以理解上述方法中的全部或部分步骤可通过程序来指令相关硬件(例如处理器)完成,所述程序可以存储于计算机可读存储介质中,如只读存储器、磁盘或光盘等。可选地,上述实施例的全部或部分步骤也可以使用一个或多个集成电路来实现。相应地,上述实施例中的模块/单元可以采用硬件的形式实现,例如通过集成电路来实现其相应功能,也可以采用软件功能模块的形式实现,例如通过处理器执行存储于存储器中的程序指令来实现其相应功能。本申请不限制于任何特定形式的硬件和软件的结合。One of ordinary skill in the art will appreciate that all or a portion of the above steps may be performed by a program to instruct related hardware, such as a processor, which may be stored in a computer readable storage medium, such as a read only memory, disk or optical disk. Wait. Alternatively, all or part of the steps of the above embodiments may also be implemented using one or more integrated circuits. Correspondingly, the modules/units in the above embodiments may be implemented in the form of hardware, for example, by implementing integrated functions to implement their respective functions, or may be implemented in the form of software function modules, for example, executing program instructions stored in the memory by the processor. To achieve its corresponding function. This application is not limited to any specific combination of hardware and software.
工业实用性Industrial applicability
本发明实施例中,当检测到当前告警列表中的告警消失时,判断所述告警是否为预设的重点告警,对重点告警和普通告警进行区分处理:对于重点告警,只有在接收到用户用于指示所述告警的告警故障解决的恢复验证指令后,才将所述告警从所述当前告警列表中移除至预设的历史告警库;而对于普通告警,即在该普通告警消失后,直接将该普通告警从所述当前告警列表中移除至预设的历史告警库。丰富了网络管理系统的告警管理方法,提升了网络管理系统的运维效率。 In the embodiment of the present invention, when it is detected that the alarm in the current alarm list disappears, it is determined whether the alarm is a preset key alarm, and the key alarm and the common alarm are differentiated: for the key alarm, only the user is received. And after the recovery verification instruction indicating the alarm failure of the alarm is removed, the alarm is removed from the current alarm list to a preset historical alarm library; and for the normal alarm, that is, after the common alarm disappears, The normal alarm is directly removed from the current alarm list to a preset historical alarm library. It enriches the alarm management method of the network management system and improves the operation and maintenance efficiency of the network management system.

Claims (10)

  1. 一种网络管理系统中的告警管理方法,包括:An alarm management method in a network management system includes:
    当网络管理系统接收到上报的告警时,将所述告警加入当前告警列表;When the network management system receives the reported alarm, the alarm is added to the current alarm list;
    当检测到所述告警消失时,判断所述告警是否为预设的重点告警;When it is detected that the alarm disappears, it is determined whether the alarm is a preset key alarm;
    若判断所述告警为预设的重点告警,则将所述告警保留在所述当前告警列表中,直至接收到用户用于指示所述告警的告警故障解决的恢复验证指令,将所述告警从所述当前告警列表中移除至预设的历史告警库。If it is determined that the alarm is a preset key alarm, the alarm is retained in the current alarm list until a recovery verification instruction for indicating an alarm failure of the alarm is received, and the alarm is The current alarm list is removed to a preset historical alarm library.
  2. 如权利要求1所述的网络管理系统中的告警管理方法,还包括:The alarm management method in the network management system of claim 1, further comprising:
    若判断所述告警不是预设的重点告警,则将所述告警从所述当前告警列表中移除至预设的历史告警库。If it is determined that the alarm is not a preset key alarm, the alarm is removed from the current alarm list to a preset historical alarm library.
  3. 如权利要求2所述的网络管理系统中的告警管理方法,其中,所述当网络管理系统接收到上报的告警时,将所述告警加入当前告警列表包括:The alarm management method in the network management system of claim 2, wherein when the network management system receives the reported alarm, adding the alarm to the current alarm list includes:
    当网络管理系统接收到上报的告警时,将所述告警加入当前告警列表,并通过预设提示方式提醒用户对所述告警进行处理。When the network management system receives the reported alarm, the alarm is added to the current alarm list, and the user is prompted to process the alarm by using a preset prompt.
  4. 如权利要求3所述的网络管理系统中的告警管理方法,其中,所述将所述告警保留在所述当前告警列表中,直至接收到用户用于指示所述告警的告警故障解决的恢复验证指令,将所述告警从所述当前告警列表中移除至预设的历史告警库包括:The alarm management method in the network management system according to claim 3, wherein the retaining the alarm in the current alarm list until receiving a recovery verification that is used by the user to indicate an alarm failure resolution of the alarm An instruction to remove the alarm from the current alarm list to a preset historical alarm library includes:
    将所述告警保留在所述当前告警列表中,并通过预设提示方式提醒用户对所述告警的故障进行确认,直至接收到用户用于指示所述告警的告警故障解决的恢复验证指令,将所述告警从所述当前告警列表中移除至预设的历史告警库。Retaining the alarm in the current alarm list, and prompting the user to confirm the fault of the alarm by using a preset prompt manner, until receiving a recovery verification instruction that is used by the user to indicate the alarm fault resolution of the alarm, The alarm is removed from the current alarm list to a preset historical alarm library.
  5. 如权利要求3或4所述的网络管理系统中的告警管理方法,其中,所述预设提示方式包括如下任一种或多种方式:The alarm management method in the network management system according to claim 3 or 4, wherein the preset prompting manner comprises any one or more of the following:
    预设的对话框提示、发声提示、发光提示。Preset dialog prompts, audible prompts, and illuminated prompts.
  6. 一种网络管理系统,包括:A network management system comprising:
    添加模块,设置为当网络管理系统接收到上报的告警时,将所述告警加 入当前告警列表;Add a module, and set the alarm to be added when the network management system receives the reported alarm. Enter the current alarm list;
    判断模块,设置为当检测到所述告警消失时,判断所述告警是否为预设的重点告警;a judging module, configured to determine whether the alarm is a preset key alarm when detecting that the alarm disappears;
    移除模块,设置为若所述判断模块判断所述告警是预设的重点告警,则将所述告警保留在所述当前告警列表中,直至接收到用户用于指示所述告警的告警故障解决的恢复验证指令,将所述告警从所述当前告警列表中移除至预设的历史告警库。And removing the module, if the determining module determines that the alarm is a preset key alarm, retaining the alarm in the current alarm list until receiving an alarm fault that is used by the user to indicate the alarm The recovery verification command removes the alarm from the current alarm list to a preset historical alarm library.
  7. 如权利要求6所述的网络管理系统,其中,所述移除模块还设置为:The network management system of claim 6 wherein said removing module is further configured to:
    若所述判断模块判断所述告警不是预设的重点告警,则将所述告警从所述当前告警列表中移除至预设的历史告警库。If the determining module determines that the alarm is not a preset key alarm, the alarm is removed from the current alarm list to a preset historical alarm library.
  8. 如权利要求7所述的网络管理系统,其中,所述添加模块为当网络管理系统接收到上报的告警时,将所述告警加入当前告警列表包括:The network management system of claim 7, wherein the adding module is configured to add the alarm to the current alarm list when the network management system receives the reported alarm:
    当网络管理系统接收到上报的告警时,将所述告警加入当前告警列表;并通过预设提示方式提醒用户对所述告警进行处理。When the network management system receives the reported alarm, the alarm is added to the current alarm list, and the user is prompted to process the alarm by using a preset prompt.
  9. 如权利要求8所述的网络管理系统,其中,所述移除模块将所述告警保留在所述当前告警列表中,直至接收到用户用于指示所述告警的告警故障解决的恢复验证指令,将所述告警从所述当前告警列表中移除至预设的历史告警库包括:The network management system according to claim 8, wherein the removing module retains the alarm in the current alarm list until receiving a recovery verification instruction that is used by the user to indicate an alarm failure of the alarm, Removing the alarm from the current alarm list to a preset historical alarm library includes:
    将所述告警保留在所述当前告警列表中,并通过预设提示方式提醒用户对所述告警的故障进行确认,直至接收到用户用于指示所述告警的告警故障解决的恢复验证指令,将所述告警从所述当前告警列表中移除至预设的历史告警库。Retaining the alarm in the current alarm list, and prompting the user to confirm the fault of the alarm by using a preset prompt manner, until receiving a recovery verification instruction that is used by the user to indicate the alarm fault resolution of the alarm, The alarm is removed from the current alarm list to a preset historical alarm library.
  10. 如权利要求8或9所述的网络管理系统,其中,所述预设提示方式包括如下任一种或多种方式:The network management system according to claim 8 or 9, wherein the preset prompting manner comprises any one or more of the following:
    预设的对话框提示、发声提示、发光提示。 Preset dialog prompts, audible prompts, and illuminated prompts.
PCT/CN2016/090208 2015-09-30 2016-07-15 Warning management method for use in network management system and network management system WO2017054555A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510641617.6 2015-09-30
CN201510641617.6A CN106559247B (en) 2015-09-30 2015-09-30 Alarm management method in network management system and network management system

Publications (1)

Publication Number Publication Date
WO2017054555A1 true WO2017054555A1 (en) 2017-04-06

Family

ID=58417476

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/090208 WO2017054555A1 (en) 2015-09-30 2016-07-15 Warning management method for use in network management system and network management system

Country Status (2)

Country Link
CN (1) CN106559247B (en)
WO (1) WO2017054555A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111835557A (en) * 2020-06-19 2020-10-27 青岛聚好联科技有限公司 Alarm method and equipment
CN117056177A (en) * 2023-08-09 2023-11-14 中移互联网有限公司 Alarming method, device and system for test inspection

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109714387A (en) * 2018-11-16 2019-05-03 国电南瑞南京控制系统有限公司 A kind of operation management system alarm method for subscribing subscribes to terminal, issue terminal and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1925427A (en) * 2006-09-04 2007-03-07 华为技术有限公司 Warning system and warning method
CN101656622A (en) * 2008-08-20 2010-02-24 中兴通讯股份有限公司 Alarm management system and alarm management method
CN103441885A (en) * 2013-09-10 2013-12-11 大唐移动通信设备有限公司 Activity alarm processing method and equipment

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100489690B1 (en) * 2003-02-14 2005-05-17 삼성전자주식회사 Method for procesing event and controlling real error and modeling database table
CN101425924B (en) * 2008-06-12 2011-08-17 广东高新兴通信股份有限公司 Centralized monitoring system alarm data processing method
CN102201927A (en) * 2010-03-26 2011-09-28 北京市电力公司 Alarm information processing method and device
CN102098175B (en) * 2011-01-26 2015-07-01 浪潮通信信息系统有限公司 Alarm association rule obtaining method of mobile internet
WO2013053977A1 (en) * 2011-10-11 2013-04-18 Sandvik Mining And Construction Oy A method, system and a device for controlling a work machine

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1925427A (en) * 2006-09-04 2007-03-07 华为技术有限公司 Warning system and warning method
CN101656622A (en) * 2008-08-20 2010-02-24 中兴通讯股份有限公司 Alarm management system and alarm management method
CN103441885A (en) * 2013-09-10 2013-12-11 大唐移动通信设备有限公司 Activity alarm processing method and equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111835557A (en) * 2020-06-19 2020-10-27 青岛聚好联科技有限公司 Alarm method and equipment
CN117056177A (en) * 2023-08-09 2023-11-14 中移互联网有限公司 Alarming method, device and system for test inspection

Also Published As

Publication number Publication date
CN106559247A (en) 2017-04-05
CN106559247B (en) 2020-03-27

Similar Documents

Publication Publication Date Title
US20160055046A1 (en) System fault detection and processing method, device, and computer readable storage medium
WO2017054555A1 (en) Warning management method for use in network management system and network management system
JP2010033118A (en) Alarm management device
US20170140295A1 (en) Pattern analytics for real-time detection of known significant pattern signatures
CN108572898B (en) Method, device, equipment and storage medium for controlling interface
CN110275992B (en) Emergency processing method, device, server and computer readable storage medium
EP3627264B1 (en) Plant assessment system and plant assessment method
EP2085850B1 (en) Alarm management apparatus
CN103905271B (en) A kind of alarm windstorm suppressing method
US10237266B2 (en) Privileged shared account password sanitation
CN107945897B (en) Method and device for processing nuclear power accidents
JP6294145B2 (en) Monitoring method, monitoring device and monitoring control program
JP2006318036A (en) Obstacle monitoring system
CN107612755A (en) The management method and its device of a kind of cloud resource
CN115102838B (en) Emergency processing method and device for server downtime risk and electronic equipment
JP2009151456A (en) Monitoring system, network monitoring apparatus and service execution environment monitoring method
CN108008800B (en) Reset request processing method, device and equipment
US9542250B2 (en) Distributed maintenance mode control
JP2013206105A (en) Information processing system, maintenance method and program
US8776071B2 (en) Microprocessor operation monitoring system
WO2016078224A1 (en) Information processing method and apparatus, and computer storage medium
WO2016026403A1 (en) Security service auditing method and apparatus
JP5503321B2 (en) Operation management method, program, and operation management system
JP2017040962A (en) Management program, management device, and management method
JP6478929B2 (en) Plant operation support device, plant instrumentation system, and plant operation support method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16850179

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16850179

Country of ref document: EP

Kind code of ref document: A1