WO2017054555A1 - Procédé de gestion d'alertes adopté dans un système de gestion de réseau et système de gestion de réseau - Google Patents

Procédé de gestion d'alertes adopté dans un système de gestion de réseau et système de gestion de réseau Download PDF

Info

Publication number
WO2017054555A1
WO2017054555A1 PCT/CN2016/090208 CN2016090208W WO2017054555A1 WO 2017054555 A1 WO2017054555 A1 WO 2017054555A1 CN 2016090208 W CN2016090208 W CN 2016090208W WO 2017054555 A1 WO2017054555 A1 WO 2017054555A1
Authority
WO
WIPO (PCT)
Prior art keywords
alarm
current
list
preset
management system
Prior art date
Application number
PCT/CN2016/090208
Other languages
English (en)
Chinese (zh)
Inventor
郭慧峰
刘海瑞
薛亮
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2017054555A1 publication Critical patent/WO2017054555A1/fr

Links

Images

Definitions

  • This document relates to, but is not limited to, the field of communication technologies, and in particular, to an alarm management method and a network management system in a network management system.
  • Alarm management is the core part of the network management system, that is, the network management. It is responsible for monitoring, isolating, and correcting abnormalities of devices and service nodes to ensure normal operation of services.
  • the alarm can be managed in two parts in the NMS.
  • the current alarm is the key monitoring and operation of the user.
  • the NMS needs to monitor the alarms in the current alarm in real time.
  • the second is the historical alarm. When the alarm is removed from the current alarm. After the entry, the historical alarm is entered. The historical alarm is used for the traceability and statistical analysis of the fault after the event.
  • the network management user does not need to monitor the historical alarm in real time.
  • the current alarm list contains only alarms that have not disappeared.
  • the shortcoming of this management mode is that the alarm may be missed for the flashing but important alarm. Because the alarm disappears, the interval is too short. The user has not noticed that the alarm is generated. The alarm disappears and enters the historical alarm. Was discovered in time.
  • the current alarm list contains alarms that have not disappeared and alarms that have disappeared but are not confirmed.
  • This management mode requires that the alarm must be acknowledged and disappeared before entering the historical alarm, which solves the problem that the flashing alarm may miss the monitoring.
  • this management method has the disadvantage that the disappearance of the alarm may not be monitored.
  • the alarm confirmation operation can be performed after the alarm is generated or disappeared, but once executed, the alarm status is modified to be confirmed. In fact, unless it is a flashing alarm, the user has no time to confirm when it is generated. Most of the alarm confirmation operations are performed after the alarm is generated, and the marked user knows that the alarm occurs. When the alarm disappears, because it is generating The time has already been confirmed, then the historical alarm will be automatically entered without user intervention.
  • alarms that need to be monitored in critical time need not only be able to monitor their occurrence in real time, but also need to be able to monitor their disappearance. After the alarm disappears, manual intervention is required to enter the historical alarm.
  • the library archives to confirm that the fault has been processed. Because sometimes the alarm disappears, it does not mean that the fault is solved. For example, if the CPU utilization exceeds the alarm, the alarm disappears only that the current CPU utilization has dropped, but it does not mean that the equipment failure with high utilization rate has been solved. If the fault is completely resolved, it can be considered that there is no need to pay attention to the alarm.
  • the alarm management method in the related art cannot monitor all processes in which alarms that need to be monitored from the generation to the disappearance until the entry of the historical alarm.
  • This document provides an alarm management method and a network management system in a network management system, which can monitor all processes in which alarms that need to be monitored from the generation to the disappearance until the entry of historical alarms.
  • the alarm management method in the network management system provided by the present application includes:
  • the alarm is added to the current alarm list
  • the alarm is retained in the current alarm list until a recovery verification instruction for indicating an alarm failure of the alarm is received, and the alarm is The current alarm list is removed to a preset historical alarm library.
  • the foregoing method further includes:
  • the alarm is removed from the current alarm list to a preset historical alarm library.
  • adding the alarm to the current alarm list includes:
  • the alarm is added to the current alarm list, and the user is prompted to process the alarm by using a preset prompt.
  • the alarm is retained in the current alarm list
  • the method of removing the alarm from the current alarm list to the preset historical alarm library includes: a recovery verification instruction for receiving an alarm fault resolution for the user to indicate the alarm:
  • the preset prompting manner includes any one or more of the following manners:
  • Preset dialog prompts audible prompts, and illuminated prompts.
  • This article also discloses a network management system, including:
  • a judging module configured to determine whether the alarm is a preset key alarm when detecting that the alarm disappears
  • the determining module determines that the alarm is a preset key alarm, retaining the alarm in the current alarm list until receiving an alarm fault that is used by the user to indicate the alarm
  • the recovery verification command removes the alarm from the current alarm list to a preset historical alarm library.
  • the removing module is further configured to:
  • the determining module determines that the alarm is not a preset key alarm, the alarm is removed from the current alarm list to a preset historical alarm library.
  • adding the alarm to the current alarm list includes:
  • the alarm is added to the current alarm list, and the user is prompted to process the alarm by using a preset prompt.
  • the removing module keeps the alarm in the current alarm list until receiving a recovery verification instruction that is used by the user to indicate an alarm failure of the alarm, and the alarm is
  • the removal of the current alarm list to the preset historical alarm library includes:
  • the preset prompting manner includes any one or more of the following manners:
  • Preset dialog prompts audible prompts, and illuminated prompts.
  • the alarm management method and the network management system in the network management system proposed by the present invention when detecting that the alarm added to the current alarm list disappears, determining whether the alarm is a preset key alarm;
  • the key alarm is set, and the alarm is retained in the current alarm list until a recovery verification command for indicating an alarm failure of the alarm is received, and the alarm is moved from the current alarm list.
  • the preset historical alarm library In addition to the preset historical alarm library.
  • the historical alarm library can effectively monitor all the processes of the key alarms that need to be monitored from the generation to the disappearance until the entry of historical alarms, thereby improving the operation and maintenance capabilities of the network management system.
  • FIG. 1 is a schematic flowchart of an alarm management method in a network management system according to Embodiment 1 of the present invention
  • FIG. 2 is a schematic flowchart of an alarm management method in a network management system according to Embodiment 2 of the present invention
  • FIG. 3 is a schematic diagram of functional modules of a network management system according to Embodiment 3 of the present invention.
  • the embodiment of the invention provides an alarm management method in a network management system.
  • FIG. 1 is a schematic flowchart of an alarm management method in a network management system according to Embodiment 1 of the present invention.
  • the alarm management method in the network management system includes the following steps S10 to S30:
  • Step S10 When the network management system receives the reported alarm, add the alarm to the current alarm list.
  • the network management system monitors the alarm of the client in real time.
  • the alarm is added to the current alarm list to monitor the current alarm in real time.
  • the user may be reminded of the current alarm by using a preset prompt manner, and the alarm needs to be processed in time.
  • the preset prompting manner may include any one or more of the following manners, which are not limited herein:
  • Step S20 When it is detected that the alarm disappears, determine whether the alarm is a preset key alarm
  • the user may be reminded that the current alarm exists, and the user may perform faulty dispatching, processing, etc. on the currently existing alarm according to the prompt, and eliminate the situation at the same time. Said the alarm.
  • the key alarm may be an alarm that the user needs to pay special attention to. The user needs the key alarm to be generated from the generation to the disappearance, and the fault can be monitored from the occurrence to the recovery.
  • the key alarm may include a single ticket that affects the service operation.
  • the CPU usage violation alarm (BRD_CPU_TCA) and the Ethernet port signal loss alarm (ETH_LOS) alarms; all alarms on the device that is undergoing software upgrade are not limited here.
  • the key alarm may be operated and preset by the user according to the needs of the actual application scenario, and the key alarm may also be performed by the network management system.
  • the alarms that need to be focused on in different operation and maintenance scenarios are obtained from the cloud server, and are not limited herein.
  • step S30 if it is determined that the alarm is a preset key alarm, the alarm is retained in the current alarm list until a recovery verification instruction that is used by the user to indicate the alarm failure of the alarm is received. The alarm is removed from the current alarm list to a preset historical alarm library.
  • the alarm is not directly removed from the current alarm list to a preset historical alarm library, but the alarm is retained. In the current alarm list, until the recovery verification command for indicating the alarm failure of the alarm is received, the alarm is removed from the current alarm list to a preset historical alarm library. In this way, for a key alarm that requires special attention, even after the alarm disappears, the user must send a recovery verification command to remove the alarm from the current alarm list to a preset historical alarm library, ensuring the focus.
  • the alarm can be monitored in real time from the generation to the disappearance until the historical alarm is entered. The last step of the life cycle of the key alarm is to enter the historical alarm.
  • the user must manually intervene, and effectively implement the key alarms that need to be monitored. It disappears until the entire life cycle of the historical alarm is monitored, which makes the engineering operation and maintenance form a closed loop for the fault handling process, which greatly improves the operation and maintenance capability of the network management system.
  • the preset prompt manner is used to remind the user that the current key alarm disappears, and the focus alarm needs to be paid attention to.
  • the preset prompting manner may include a preset dialog box prompt, an audible prompt, or a light prompt, and is not limited herein.
  • the recovery verification operation may send a recovery verification instruction for indicating the alarm failure of the alarm to the network management system, where the recovery verification operation may be that the user clicks on the network management.
  • the operations such as preset buttons or sliding in the system are not limited herein.
  • the alarm when detecting that the alarm added to the current alarm list disappears, determining whether the alarm is a preset key alarm; if the alarm is determined to be a preset key alarm, retaining the alarm in the In the current alarm list, until the recovery verification command for indicating the alarm failure of the alarm is received, the alarm is removed from the current alarm list to a preset historical alarm library. Because when the key alarm disappears, only the user's recovery verification command is received. The key alarms are removed from the current alarm list to the preset historical alarm database. They are not directly removed to the preset historical alarm database when they disappear, and the important alarms that need to be monitored can be effectively generated from the generation. Until all processes of historical alarms are monitored, the operation and maintenance capabilities of the network management system are improved.
  • a method for managing an alarm in a network management system is provided in the second embodiment of the present invention.
  • the method further includes:
  • Step S40 If it is determined that the alarm is not a preset key alarm, the alarm is removed from the current alarm list to a preset historical alarm library.
  • the alarm is processed according to the normal alarm process, that is, after the alarm disappears, the alarm is directly sent from the current alarm list. Remove to the preset historical alarm library.
  • the normal alarm is removed from the current alarm list to a preset historical alarm library, so that the flash alarm is prevented from being leaked. The situation of monitoring.
  • the normal alarm is directly removed from the current alarm list to the preset historical alarm library, which is faster.
  • the key alarm and the common alarm are differentiated: for the key alarm, only the received user is used for After the recovery verification command indicating the alarm failure of the alarm is cleared, the alarm is removed from the current alarm list to a preset historical alarm library; and for the normal alarm, after the common alarm disappears, directly The normal alarm is removed from the current alarm list to a preset historical alarm library. It enriches the alarm management method of the network management system and improves the operation and maintenance efficiency of the network management system.
  • the embodiment of the invention further provides a network management system.
  • FIG. 3 is a schematic diagram of functional modules of a network management system according to Embodiment 3 of the present invention.
  • the network management system includes:
  • Adding a module 01 configured to: when the network management system receives the reported alarm, the alarm is Join the current alarm list;
  • the network management system monitors the alarm of the client in real time.
  • the alarm is added to the current alarm list to monitor the current alarm in real time.
  • the user may be prompted to present an alarm by using a preset prompt manner, and the alarm needs to be processed in time.
  • the preset prompting manner may include any one or more of the following manners:
  • the determining module 02 is configured to determine whether the alarm is a preset key alarm when detecting that the alarm disappears;
  • the preset dialog box prompt, audible prompt, or illuminating prompt may remind the user that the current alarm exists, and the user may perform fault dispatching, processing, and the like on the current alarm according to the prompt, and eliminate the alarm in time.
  • the alarm is a preset key alarm.
  • the key alarm is a warning that the user needs to pay special attention to. The user needs the key alarm from the generation to the disappearance, and the fault can be monitored from the occurrence to the recovery.
  • the CPU usage limit alarm (BRD_CPU_TCA) and the Ethernet port signal loss alarm (ETH_LOS) alarms; all alarms on the device that is undergoing software upgrade are not limited here.
  • the key alarm may be preset and operated by the user according to the needs of the actual application scenario, and the key alarm may also be obtained by the network management system from the cloud server. Alarms that need to be focused on in different operation and maintenance scenarios are not limited here.
  • the removing module 03 is configured to: if the determining module determines that the alarm is a preset key alarm, retain the alarm in the current alarm list until receiving an alarm fault that is used by the user to indicate the alarm.
  • the resolved recovery verification command removes the alarm from the current alarm list to a preset historical alarm library.
  • the alarm is not directly removed from the current alarm list to a preset historical alarm library, but the alarm is retained. In the current alarm list, until an alarm fault solution is received from the user for indicating the alarm
  • the recovery verification command removes the alarm from the current alarm list to a preset historical alarm library. In this way, for the key alarms that require special attention, even after the alarm disappears, the user must send a recovery verification command to remove it from the current alarm list to the preset historical alarm library, ensuring the key alarms.
  • the entire life cycle from generation to disappearance until the entry of historical alarms can be monitored in real time, and the last step of the life cycle of the key alarms is to enter the historical alarms.
  • the removing module 03 may notify the user that the current key alarm disappears by using a preset prompt mode when determining that the alarm is a preset key alarm and retaining the alarm in the current alarm list. You need to pay attention to the status of the key alarms, and you need to confirm whether the faults that caused the key alarms are resolved in time.
  • the preset prompting manner may include a preset dialog box prompt, an audible prompt, or a light prompt, and is not limited herein.
  • the recovery verification operation may send a recovery verification instruction for indicating the alarm failure of the alarm to the network management system, where the recovery verification operation may be that the user clicks on the network management.
  • the operations such as preset buttons or sliding in the system are not limited herein.
  • the alarm when detecting that the alarm added to the current alarm list disappears, determining whether the alarm is a preset key alarm; if the alarm is determined to be a preset key alarm, retaining the alarm in the In the current alarm list, until the recovery verification command for indicating the alarm failure of the alarm is received, the alarm is removed from the current alarm list to a preset historical alarm library.
  • the key alarm disappears, only the user's recovery verification command is received, and the key alarm is removed from the current alarm list to the preset historical alarm library, and is not directly removed to the preset when it disappears.
  • the historical alarm library can effectively monitor all the processes of the key alarms that need to be monitored from the generation to the disappearance until the entry of historical alarms, thereby improving the operation and maintenance capabilities of the network management system.
  • the above removal module 03 is further configured to:
  • the alarm is removed from the current alarm list to a preset historical alarm library.
  • the alarm is processed according to the normal alarm process, that is, after the alarm disappears, the alarm is directly removed from the current alarm list to a preset historical alarm library.
  • the normal alarm is removed from the current alarm list to a preset historical alarm library, so that the flash alarm is prevented from being leaked. The situation of monitoring.
  • the normal alarm is directly removed from the current alarm list to the preset historical alarm library, which is faster.
  • the alarm when it is detected that the alarm in the current alarm list disappears, it is determined whether the alarm is a preset key alarm, and the key alarm and the common alarm are differentiated: for the key alarm, only the user is received. And after the recovery verification instruction indicating the alarm failure of the alarm is removed, the alarm is removed from the current alarm list to a preset historical alarm library; and for the normal alarm, that is, after the common alarm disappears, The normal alarm is directly removed from the current alarm list to a preset historical alarm library. It enriches the alarm management method of the network management system and improves the operation and maintenance efficiency of the network management system.

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Maintenance And Management Of Digital Transmission (AREA)

Abstract

La présente invention concerne un procédé de gestion d'alertes adopté dans un système de gestion de réseau et un système de gestion de réseau. Le procédé de gestion d'alertes consiste à : lorsqu'une alerte rapportée est reçue, l'ajouter, au moyen d'un système de gestion de réseau, dans une liste d'alertes actuelles ; lorsqu'il est détecté que l'alerte est annulée, déterminer si l'alerte constitue une alerte majeure prédéfinie ; et si tel est le cas, maintenir l'alerte dans la liste d'alertes actuelles jusqu'à réception d'une instruction de validation de récupération en provenance d'un utilisateur et indication qu'un dysfonctionnement d'alerte concernant l'alerte est résolu, et déplacer l'alerte de la liste d'alertes actuelles vers une base de données d'alertes historiques préconfigurée.
PCT/CN2016/090208 2015-09-30 2016-07-15 Procédé de gestion d'alertes adopté dans un système de gestion de réseau et système de gestion de réseau WO2017054555A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510641617.6 2015-09-30
CN201510641617.6A CN106559247B (zh) 2015-09-30 2015-09-30 网络管理系统中的告警管理方法及网络管理系统

Publications (1)

Publication Number Publication Date
WO2017054555A1 true WO2017054555A1 (fr) 2017-04-06

Family

ID=58417476

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/090208 WO2017054555A1 (fr) 2015-09-30 2016-07-15 Procédé de gestion d'alertes adopté dans un système de gestion de réseau et système de gestion de réseau

Country Status (2)

Country Link
CN (1) CN106559247B (fr)
WO (1) WO2017054555A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111835557A (zh) * 2020-06-19 2020-10-27 青岛聚好联科技有限公司 一种告警方法及设备
CN117056177A (zh) * 2023-08-09 2023-11-14 中移互联网有限公司 测试巡检的告警方法、装置及系统

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109714387A (zh) * 2018-11-16 2019-05-03 国电南瑞南京控制系统有限公司 一种运维管理系统告警订阅方法、订阅终端、发布终端及系统

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1925427A (zh) * 2006-09-04 2007-03-07 华为技术有限公司 告警系统和告警方法
CN101656622A (zh) * 2008-08-20 2010-02-24 中兴通讯股份有限公司 一种告警管理系统及方法
CN103441885A (zh) * 2013-09-10 2013-12-11 大唐移动通信设备有限公司 一种活跃告警处理方法和设备

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100489690B1 (ko) * 2003-02-14 2005-05-17 삼성전자주식회사 실시간 장애 제어를 위한 데이터베이스 테이블 모델링 및이벤트 처리 방법
CN101425924B (zh) * 2008-06-12 2011-08-17 广东高新兴通信股份有限公司 一种对集中监控系统的告警数据的处理方法
CN102201927A (zh) * 2010-03-26 2011-09-28 北京市电力公司 处理告警信息的方法与装置
CN102098175B (zh) * 2011-01-26 2015-07-01 浪潮通信信息系统有限公司 一种移动互联网告警关联规则获取方法
WO2013053977A1 (fr) * 2011-10-11 2013-04-18 Sandvik Mining And Construction Oy Procédé, système et dispositif pour commander une machine de travail

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1925427A (zh) * 2006-09-04 2007-03-07 华为技术有限公司 告警系统和告警方法
CN101656622A (zh) * 2008-08-20 2010-02-24 中兴通讯股份有限公司 一种告警管理系统及方法
CN103441885A (zh) * 2013-09-10 2013-12-11 大唐移动通信设备有限公司 一种活跃告警处理方法和设备

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111835557A (zh) * 2020-06-19 2020-10-27 青岛聚好联科技有限公司 一种告警方法及设备
CN117056177A (zh) * 2023-08-09 2023-11-14 中移互联网有限公司 测试巡检的告警方法、装置及系统

Also Published As

Publication number Publication date
CN106559247A (zh) 2017-04-05
CN106559247B (zh) 2020-03-27

Similar Documents

Publication Publication Date Title
US10354197B2 (en) Pattern analytics for real-time detection of known significant pattern signatures
US20160055046A1 (en) System fault detection and processing method, device, and computer readable storage medium
WO2017054555A1 (fr) Procédé de gestion d'alertes adopté dans un système de gestion de réseau et système de gestion de réseau
JP2010033118A (ja) アラーム管理装置
CN108572898B (zh) 一种控制接口的方法、装置、设备、以及存储介质
EP2085850B1 (fr) Appareil de gestion d'alarme
CN110275992B (zh) 应急处理方法、装置、服务器及计算机可读存储介质
US11423494B2 (en) Plant assistance assessment system and plant assistance assessment method
CN103905271B (zh) 一种告警风暴抑制方法
US20160191495A1 (en) Privileged shared account password sanitation
CN107945897B (zh) 核电事故处理的方法及装置
JP6294145B2 (ja) 監視方法、監視装置および監視制御プログラム
JP2006318036A (ja) 障害監視システム
CN115102838B (zh) 服务器宕机风险的应急处理方法和装置、电子设备
JP2009151456A (ja) 監視システム、ネットワーク監視装置及びサービス実行環境監視方法
JP2013206105A (ja) 情報処理システム、保守方法及びプログラム
US8776071B2 (en) Microprocessor operation monitoring system
WO2016078224A1 (fr) Procédé et appareil de traitement d'informations, et support de stockage informatique
WO2014040470A1 (fr) Procédé et dispositif de traitement de message d'alarme
JP5503321B2 (ja) 運用管理方法、プログラムおよび運用管理システム
JP2017040962A (ja) 管理プログラム、管理装置及び管理方法
JP6478929B2 (ja) プラントの運転支援装置、プラント計装システムおよびプラントの運転支援方法
JP2014191513A (ja) 管理装置、管理方法及び管理プログラム
JP5978804B2 (ja) システムを管理するためのプログラム、方法及び情報処理装置
JP5997005B2 (ja) 情報処理装置、プロセスの正常終了判定方法およびプログラム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16850179

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16850179

Country of ref document: EP

Kind code of ref document: A1