WO2019080918A1 - 压减冗余告警的方法、网管设备及存储介质 - Google Patents

压减冗余告警的方法、网管设备及存储介质

Info

Publication number
WO2019080918A1
WO2019080918A1 PCT/CN2018/112041 CN2018112041W WO2019080918A1 WO 2019080918 A1 WO2019080918 A1 WO 2019080918A1 CN 2018112041 W CN2018112041 W CN 2018112041W WO 2019080918 A1 WO2019080918 A1 WO 2019080918A1
Authority
WO
WIPO (PCT)
Prior art keywords
alarm
data
historical
alarm data
rule
Prior art date
Application number
PCT/CN2018/112041
Other languages
English (en)
French (fr)
Inventor
郭慧峰
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2019080918A1 publication Critical patent/WO2019080918A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B29/00Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
    • G08B29/02Monitoring continuously signalling or alarm systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0604Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time
    • H04L41/0622Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time based on time

Definitions

  • the present application relates to the field of communications technologies, and in particular, to a method for reducing redundant alarms, a network management device, and a storage medium.
  • the deduction rules for redundant alarms are manually set, and the rule parameters are statically formulated. Different networks, different sites, and different moments have different rules for generating alarms. Different rule parameters need to be set. Static rules cannot adjust rule parameters with different rules, resulting in the failure of redundant alarm decompression.
  • the embodiment of the present application provides a network management device, including a memory and a processor.
  • the memory stores a computer program
  • the processor executes the computer program to implement the steps of the method in the embodiment of the present application.
  • the embodiment of the present application provides a computer readable storage medium, which stores a computer program, which is executed by at least one processor to implement the steps of the method in the embodiment of the present application.
  • the method for reducing the redundancy alarm, the network management device, and the storage medium in the embodiment of the present application acquires the historical alarm data stored in the preset time period in the preset detection node of the preset execution period, and extracts the obtained historical alarms.
  • the network, different sites, and different time periods are used to maximize the voltage reduction for redundant alarms.
  • FIG. 1 is a flowchart of a method for reducing a redundancy alarm in an embodiment of the present invention
  • FIG. 2 is a graph showing a rule of occurrence of a "call alarm” in an embodiment of the present invention
  • FIG. 3 is a schematic structural diagram of a network management device according to an embodiment of the present invention.
  • the preset detection node in the preset execution period acquires the historical alarm data stored in the preset time period, and extracts the preset attributes of the obtained historical alarm data, and further, according to the extracted historical alarm data.
  • the attribute determines the rule parameters in the preset decompression rule, so that the alarm occurrence rule can be automatically found, and the decompression rule is automatically configured, and adaptive to different networks, different sites, and different time segments, thereby achieving redundancy
  • the pressure reduction of the remaining alarms is maximized.
  • the decompression rule includes a jitter alarm decompression rule of the jitter redundancy alarm data and a momentary alarm decompression rule of the instantaneous redundancy alarm data.
  • the rule parameters in the embodiment of the present application include the jitter interval in the jitter alarm decompression rule, and the alarm delay time in the transient alarm decompression rule.
  • step 21 historical alarm data of a specified time period is acquired from a historical alarm library.
  • Step 22 The data pre-processing includes: extracting important attributes in the historical alarm data, where the important attributes may include at least one of the following: an alarm occurrence location, an alarm code, an alarm occurrence time, and an alarm disappearance time;
  • the interval at which the alarm data of the same history is generated is the same as that of the data identifier (for example, the location and alarm code). Specifically, the alarms of the same occurrence location and the same alarm code are separately detected, sorted according to the alarm occurrence time, and then the difference between the current and the last occurrence time (ie, the alarm occurrence interval) is calculated as the mining " The basis of the law of jitter alarms.
  • the following at least one type of data information is obtained: an alarm occurrence location (which may be referred to as a location in the embodiment of the present application), an alarm code, an alarm occurrence time, an alarm disappearance time, an alarm duration, and an alarm occurrence interval. Referred to as interval).
  • the alarm occurrence interval is the interval between the alarm and the alarm occurrence time of the same alarm code in the same position.
  • the threshold parameter 1 may be set as the alarm duration threshold x i of the historical alarm data; and the optimal threshold parameter 1 is set as the optimal alarm duration threshold.
  • the law of occurrence of "short-circuit alarm" is obtained.
  • n is the preset extraction quantity, which is a natural number and can be set according to the actual situation.
  • a TOPn is issued according to the alarm amount for the same location and the same alarm code, and then the alarm occurrence rule is generated for each alarm. As shown in Table 2, the alarm occurrence rule indicates how many seconds of the alarm are occupied. What percentage of the total amount of this alarm.
  • the alarm reduction rate corresponding to each threshold parameter may be determined by determining a ratio of the alarm data amount corresponding to the threshold parameter to the total alarm data of all historical alarm data.
  • Step 24 Run a data mining algorithm to obtain rule parameters in the decompression rule.
  • the determining the rule parameter in the preset decompression rule according to the attribute of the extracted historical alarm data may include: according to the attribute of the historical alarm data, by using a preset data mining algorithm, Determining a specific threshold parameter corresponding to a specific alarm reduction rate; and setting a rule parameter in the decompression rule according to the specific threshold parameter.
  • a curve is fitted, and the data mining algorithm (such as finding the second derivative) is used to find the curve.
  • the inflection point is to achieve the maximum alarm reduction rate for the minimum duration.
  • the result is a pair of specific threshold parameters x optimumFlash and a specific alarm reduction rate y optimumFlash value.
  • the above method is also used to obtain the minimum The maximum reduction rate is reached during the interval, that is, the TOP1 alarm law (q i , s i %) sequence yields the optimal pair of specific threshold parameters x 1optimumDithering and the specific alarm reduction rate y 1optimumDithering value, TOP2 ( q j , s j %) also obtains a pair of specific threshold parameters x 2optimumDithering and a specific alarm reduction rate y 2optimumDithering value until all TOPn data sequences get a pair of optimal values.
  • the determining, according to the attribute of the historical alarm data, a specific threshold parameter corresponding to a specific alarm reduction rate by using a preset data mining algorithm including: calculating a preset according to the attribute of the historical alarm data And an alarm depression rate corresponding to the threshold parameter; fitting a curve according to the threshold parameter and an alarm depression rate corresponding to the threshold parameter; determining, by the data mining algorithm, an inflection point of the curve; according to the inflection point, Determining the particular alarm reduction rate, and corresponding specific threshold parameters.
  • the alarm depression rate corresponding to the preset threshold parameter is calculated according to the attribute of the historical alarm data, and includes: an alarm occurrence time for extracting historical alarm data and The alarm disappearance time determines the alarm duration of each historical alarm data; according to the determined alarm duration, the alarm data amount in the alarm duration threshold is counted; according to the statistical alarm data amount and the total alarm data of all historical alarm data, Determine the alarm reduction rate corresponding to the alarm duration threshold.
  • the alarm depression rate corresponding to the preset threshold parameter is calculated according to the attribute of the historical alarm data, including: extracting a data identifier corresponding to the historical alarm data; and extracting each data according to the data
  • the alarm data volume of the historical alarm data is determined.
  • the alarm reduction rate corresponding to the threshold parameter is determined according to the statistical alarm data amount and the total alarm data of all historical alarm data.
  • the data identifier includes an alarm code and an alarm occurrence location
  • the alarm data amount of the historical alarm data is collected according to the extracted data identifier, according to the statistical alarm data amount and all history.
  • the total amount of alarm data of the alarm data, and the alarm reduction rate corresponding to the threshold parameter including: the alarm data amount of the historical alarm data according to the extracted alarm code and the alarm occurrence position; according to the alarm code and the alarm occurrence position, Sorting the amount of alarm data; extracting corresponding historical alarm data according to the preset extraction quantity; and counting the amount of alarm data of the extracted historical alarm data in each alarm occurrence interval; according to the statistical alarm data amount and all historical alarm data
  • the total amount of alarm data is used to determine the alarm reduction rate corresponding to the alarm occurrence interval of the extracted historical alarm data.
  • step 25 the data mining result is automatically applied to the alarm decompression rule.
  • the setting the rule parameter in the decompression rule according to the specific threshold parameter including: the specific alarm duration
  • the threshold is set to the alarm delay time of the instantaneous alarm decompression rule.
  • the momentary alarm decompression rule is: in the execution period, when the alarm duration of the detected alarm data reaches the alarm delay time, prompting according to a preset prompt manner.
  • the setting the rule parameter in the decompression rule according to the specific threshold parameter includes:
  • the jitter alarm decompression rule is: determining, within the execution period, the number of occurrences of the detected alarm data in a unit time (for example, 1 minute, 10 minutes, 30 seconds, 300 seconds, etc.), and according to the The data identifier of the alarm data determines a corresponding decompression rule; when the number of occurrences is greater than or equal to the jitter frequency in the determined decompression rule, the first alarm data that is detected is prompted according to a preset prompt manner.
  • the setting the rule parameter in the decompression rule according to the specific threshold parameter may further include: according to the alarm The code is used to classify the specific alarm occurrence interval of each historical alarm data; according to the preset selection principle, determine the optimal alarm occurrence interval corresponding to each alarm code; for each alarm code, according to the optimal alarm corresponding to the alarm code The occurrence interval determines the number of jitters per unit time; the number of jitters is set to the frequency of jitter in the decompression rule corresponding to the alarm code.
  • the jitter alarm decompression rule is: determining, according to the detected alarm data, the number of occurrences of the alarm in a unit time, and determining a corresponding decompression rule according to the alarm code of the alarm data; When the occurrence frequency is greater than or equal to the jitter frequency in the determined decompression rule, the first alarm data that is detected is prompted according to a preset prompt manner.
  • the alarm delay time x optimumFlash is automatically set. The effect is that after the alarm is reported, it is not displayed on the alarm monitoring interface. If the x optimumFlash time has elapsed and the alarm does not disappear, it will be displayed on the alarm monitoring interface. Otherwise, if it disappears within the x optimumFlash time, then it will enter the historical alarm library. This is the most likely way to avoid the impact of the momentary alarm on the alarm monitoring interface.
  • the TOPn alarm is classified according to the alarm code, and the q ioptimumDithering and s ioptimumDithering values of the alarm code are obtained according to a certain rule (for example, taking the largest qioptimumDithering) to obtain an optimal interval q optimumDithering value.
  • the decompression rule for the "jitter alarm” is automatically set for this alarm code, that is, the judgment condition for setting the jitter for the alarm code is "N/q optimumDithering times".
  • N/q optimumDithering alarms are generated in N minutes, the first alarm is retained, other alarms are discarded, and the number of occurrences is recorded only in the first alarm, which greatly reduces the number of jitter alarms and the impact on the monitoring interface.
  • results in Table 3 above are directly applied to the “Short-Shutdown Alarm” decompression rule, and the system automatically sets the alarm delay to report in 10 seconds. That is, after the alarm is generated, it is not displayed on the monitoring interface. Wait for 10 seconds. If it disappears within 10 seconds, it is directly like the historical alarm library, otherwise it will be displayed on the monitoring interface.
  • FIG. 3 is a schematic structural diagram of a network management device according to an embodiment of the present invention.
  • the device includes a memory 30 and a processor 32.
  • the memory 30 stores A computer program, the processor 32 executing the computer program to implement the steps of the method of reducing redundancy alarms as described in any of the embodiments of the present application.
  • the preset detection node in the preset execution period obtains the historical alarm data stored in the preset time period, and extracts the preset attribute of the acquired historical alarm data, and further, according to the attribute of the extracted historical alarm data, Determine the rule parameters in the preset decompression rules, so that the alarm occurrence rules can be automatically found, and the decompression rules are automatically configured, and adaptive to different networks, different sites, and different time segments, thereby achieving redundancy alarms.
  • the pressure is maximized.
  • the processor 32 executes the computer program to implement the following steps: acquiring a preset alarm data stored in a preset time period in a preset detection node of a preset execution period; and extracting the historical alarm data
  • the preset attribute is determined according to the attribute of the extracted historical alarm data, and the rule of the preset decompression rule is used to reduce the redundant alarm data in the execution period.
  • the processor 32 executes the computer program to implement the following steps: determining, according to an attribute of the historical alarm data, a preset corresponding data compression algorithm to determine a specific alarm reduction rate a threshold parameter; setting a rule parameter in the decompression rule according to the specific threshold parameter.
  • the processor 32 executes the computer program to implement the following steps: calculating, according to an attribute of the historical alarm data, an alarm depression rate corresponding to a preset threshold parameter; according to the threshold parameter and An alarm depression rate corresponding to the threshold parameter, a fitting curve; determining, by the data mining algorithm, an inflection point of the curve; determining, according to the inflection point, the specific alarm reduction rate, and a corresponding specific threshold parameter .
  • the processor 32 executes the computer program to implement the steps of determining a ratio of the amount of alarm data corresponding to the threshold parameter to the total amount of alarm data for all historical alarm data.
  • the threshold parameter is an alarm duration threshold of historical alarm data
  • the specific threshold parameter is a specific alarm duration threshold.
  • the processor 32 executes the computer program to: extract an alarm occurrence time and an alarm disappearance time of the historical alarm data, and determine an alarm duration of the historical alarm data; according to the determined alarm duration The amount of alarm data in the alarm duration threshold is counted; the alarm depression rate corresponding to the alarm duration threshold is determined according to the statistical alarm data amount and the total alarm data of all historical alarm data.
  • the decompression rule is a momentary alarm decompression rule; the processor 32 executes the computer program to implement the step of setting the specific alarm duration threshold to the transient alarm The alarm delay time of the decompression rule.
  • the momentary alarm decompression rule is: in the execution period, when the alarm duration of the detected alarm data reaches the alarm delay time, prompting according to a preset prompt manner.
  • the threshold parameter is an alarm occurrence interval of historical alarm data
  • the specific threshold parameter is a specific alarm occurrence interval of the historical alarm data
  • the attribute includes a data identifier
  • the processor 32 executes the computer program to implement the following steps: extracting a data identifier corresponding to the historical alarm data; and collecting an alarm of the historical alarm data according to the extracted data identifier The amount of data; determining the alarm reduction rate corresponding to the threshold parameter according to the statistical alarm data amount and the total amount of alarm data of all historical alarm data.
  • the data identifier includes an alarm code and an alarm occurrence location
  • the processor 32 executes the computer program to implement the following steps: collecting alarms of historical alarm data according to the extracted alarm code and the location of the alarm occurrence Data volume; sorting the alarm data amount according to the alarm code and the alarm occurrence position; extracting corresponding historical alarm data according to the preset extraction quantity; and collecting the alarm data of the extracted historical alarm data in each alarm occurrence interval
  • the amount of the alarm is determined according to the amount of alarm data and the total amount of alarm data of all historical alarm data, and the alarm reduction rate corresponding to the alarm occurrence interval of the extracted historical alarm data is determined.
  • the decompression rule is a dither alert decompression rule; the processor 32 executes the computer program to implement the following steps: for each historical alarm data: a specific alarm occurs according to the historical alarm data The interval is determined by determining the number of times the historical alarm data is dithered per unit time; and the number of times of the jitter is set to a frequency of jitter in the decompression rule corresponding to the data identifier of the historical alarm data.
  • the jitter alarm decompression rule is: determining, according to the detected alarm data, the number of occurrences of the alarm in a unit time during the execution period, and determining corresponding according to the data identifier of the alarm data.
  • the decompression rule when the number of occurrences is greater than or equal to the jitter frequency in the determined decompression rule, the first alarm data detected is prompted according to a preset prompt manner.
  • the processor 32 executes the computer program to implement the following steps: according to the alarm code, a specific alarm occurrence interval of historical alarm data Performing classification; determining a specific alarm occurrence interval corresponding to each alarm code according to a preset selection principle; for each alarm code, determining a jitter number in a unit time according to a specific alarm occurrence interval corresponding to the alarm code; The number of times is set to the jitter frequency in the decompression rule corresponding to the alarm code.
  • the jitter alarm decompression rule is: determining, according to the detected alarm data, the number of occurrences of the alarm in a unit time, and determining a corresponding decompression rule according to the alarm code of the alarm data; When the occurrence frequency is greater than or equal to the jitter frequency in the determined decompression rule, the first alarm data that is detected is prompted according to a preset prompt manner.
  • memory 30 can be either volatile memory or non-volatile memory, as well as both volatile and non-volatile memory.
  • the non-volatile memory may be a Read Only Memory (ROM), a Programmable Read-Only Memory (PROM), or an Erasable Programmable Read (EPROM). Only Memory), Electrically Erasable Programmable Read-Only Memory (EEPROM), Ferromagnetic Random Access Memory (FRAM), Flash Memory, Magnetic Surface Memory , CD-ROM, or Compact Disc Read-Only Memory (CD-ROM); the magnetic surface memory can be a disk storage or a tape storage.
  • the volatile memory can be a random access memory (RAM) that acts as an external cache.
  • RAM Random Access Memory
  • SRAM Static Random Access Memory
  • SSRAM Synchronous Static Random Access Memory
  • SSRAM Dynamic Random Access
  • DRAM Dynamic Random Access Memory
  • SDRAM Synchronous Dynamic Random Access Memory
  • DDRSDRAM Double Data Rate Synchronous Dynamic Random Access Memory
  • ESDRAM enhancement Enhanced Synchronous Dynamic Random Access Memory
  • SLDRAM Synchronous Dynamic Random Access Memory
  • DRRAM Direct Memory Bus Random Access Memory
  • Processor 32 may be an integrated circuit chip with signal processing capabilities. In the implementation process, each step of the above method may be completed by an integrated logic circuit of hardware in the processor 32 or an instruction in the form of software.
  • the processor 32 described above may be a general purpose processor, a digital signal processor (DSP), or other programmable logic device, discrete gate or transistor logic device, discrete hardware component, or the like.
  • DSP digital signal processor
  • the processor may implement or perform the methods, steps, and logic blocks disclosed in the embodiments of the present invention.
  • a general purpose processor can be a microprocessor or any conventional processor or the like.
  • the steps of the method disclosed in the embodiment of the present invention may be directly implemented as a hardware decoding processor, or may be performed by a combination of hardware and software modules in the decoding processor.
  • the software module can reside in a storage medium located in memory 30, and processor 32 reads the information in the memory and, in conjunction with its hardware, performs the steps of the foregoing methods.
  • the network management device when the network management device provided by the foregoing embodiment performs the voltage reduction and redundancy alarm, only the division of each of the foregoing program modules is illustrated. In an actual application, the foregoing processing may be allocated by different program modules according to requirements. Upon completion, the internal structure of the network management device is divided into different program modules to complete all or part of the processing described above.
  • the network management device and the embodiment of the method for reducing the redundancy alarm are provided in the same embodiment, and the specific implementation process is described in detail in the method embodiment, and details are not described herein again.
  • the embodiment of the present application further provides a computer readable storage medium storing a computer program, when the computer program is executed by at least one processor, to implement the steps of any of the methods in the method embodiment of the present application. .
  • the computer readable storage medium in the embodiments of the present application may be a RAM memory, a flash memory, a ROM memory, an EPROM memory, an EEPROM memory, a register, a hard disk, a removable hard disk, a CD-ROM, or any other form of storage medium known in the art.
  • a storage medium can be coupled to the processor to enable the processor to read information from, and write information to, the storage medium; or the storage medium can be an integral part of the processor.
  • the processor and the storage medium may be located in an application specific integrated circuit.
  • the disclosed apparatus and method may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner such as: multiple units or components may be combined, or Can be integrated into another system, or some features can be ignored or not executed.
  • the coupling, or direct coupling, or communication connection of the components shown or discussed may be indirect coupling or communication connection through some interfaces, devices or units, and may be electrical, mechanical or other forms. of.
  • the units described above as separate components may or may not be physically separated, and the components displayed as the unit may or may not be physical units, that is, may be located in one place or distributed to multiple network units; Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may be separately used as one unit, or two or more units may be integrated into one unit;
  • the unit can be implemented in the form of hardware or in the form of hardware plus software functional units.
  • the foregoing program may be stored in a computer readable storage medium, and the program is executed when executed.
  • the foregoing steps include the steps of the foregoing method embodiments; and the foregoing storage medium includes: a removable storage device, a ROM, a RAM, a magnetic disk, or an optical disk, and the like, which can store program codes.
  • the above-described integrated unit of the present invention may be stored in a computer readable storage medium if it is implemented in the form of a software function module and sold or used as a standalone product.
  • the technical solution of the embodiments of the present invention may be embodied in the form of a software product in essence or in the form of a software product stored in a storage medium, including a plurality of instructions.
  • a computer device (which may be a personal computer, server, or network device, etc.) is caused to perform all or part of the methods described in various embodiments of the present invention.
  • the foregoing storage medium includes various media that can store program codes, such as a mobile storage device, a ROM, a RAM, a magnetic disk, or an optical disk.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Maintenance And Management Of Digital Transmission (AREA)
  • Telephonic Communication Services (AREA)
  • Alarm Systems (AREA)

Abstract

本申请实施例公开了一种压减冗余告警的方法、相应设备及存储介质,所述方法包括:在预设的执行周期的预设检测节点,获取预设时间段内存储的历史告警数据;提取所述历史告警数据的预设属性;根据提取的历史告警数据的属性,确定预设的减压规则中的规则参数。

Description

压减冗余告警的方法、网管设备及存储介质
相关申请的交叉引用
本申请基于申请号为201711010992.6、申请日为2017年10月26日的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此以引入方式并入本申请。
技术领域
本申请涉及通讯技术领域,特别涉及一种压减冗余告警的方法、网管设备及存储介质。
背景技术
随着传输网络规模的急剧扩大,承载业务的日趋多样,以及运营商对于网管以省为单位集中化部署的要求,网管需要监控的告警数量越来越多。由于传输设备的业务特性,极易产生抖动告警、瞬断告警等冗余告警,大量的冗余告警将会淹没重要告警,从而加大监控人员的运维难度。
目前,冗余告警的压减规则是人工设定,并且规则参数等都是静态制定,而不同的网络,不同的局点,不同的时刻,告警发生规律不一样,需要设置不同的规则参数,静态规则无法随着不同的规律来自行调整规则参数,导致冗余告警减压无法最大化。
发明内容
本申请实施例期望提供一种压减冗余告警的方法、网管设备及存储介质,用以提高冗余告警技术的压减程度。
为解决上述技术问题,本申请实施例提供了一种压减冗余告警的方法, 包括:
在预设的执行周期的预设检测节点,获取预设时间段内存储的历史告警数据;
提取所述历史告警数据的预设属性;
根据提取的历史告警数据的属性,确定预设的减压规则中的规则参数,所述减压规则用于压减所述执行周期中冗余告警数据。
本申请实施例提供了一种网管设备,包括存储器和处理器;所述存储器存储有计算机程序,所述处理器执行所述计算机程序,以实现本申请实施例所述方法的步骤。
本申请实施例提供了一种计算机可读存储介质,存储有计算机程序,所述计算机程序被至少一个处理器执行时,以实现本申请实施例所述方法的步骤。
本申请实施例中压减冗余告警的方法、网管设备及存储介质,在预设的执行周期的预设检测节点,获取预设时间段内存储的历史告警数据,并提取获取的各个历史告警数据的预设属性,进而根据提取的各个历史告警数据的属性,确定预设的减压规则中的规则参数,从而能自动发现告警发生规律,并自动配置减压规则,并自适应于不同的网络、不同局点、不同的时间段,从而达到针对冗余告警的压减最大化。
附图说明
图1是本发明实施例中压减冗余告警的方法流程图;
图2是本发明实施例中“瞬断告警”发生规律曲线图;
图3是本发明实施例中一种网管设备的结构示意图。
具体实施方式
以下结合附图以及实施例,对本申请实施例进行进一步详细说明。应 当理解,此处所描述的具体实施例仅用以解释本发明,并不限定本发明。
本申请实施例提供一种压减冗余告警的方法,如图1所示,所述方法包括:
S101,在预设的执行周期的预设检测节点,获取预设时间段内存储的历史告警数据;
S102,提取所述历史告警数据的预设属性;
S103,根据提取的历史告警数据的属性,确定预设的减压规则中的规则参数,所述减压规则用于压减所述执行周期中冗余告警数据。
本申请实施例在预设的执行周期的预设检测节点,获取预设时间段内存储的历史告警数据,并提取获取的各个历史告警数据的预设属性,进而根据提取的各个历史告警数据的属性,确定预设的减压规则中的规则参数,从而能自动发现告警发生规律,并自动配置减压规则,并自适应于不同的网络、不同局点、不同的时间段,从而达到针对冗余告警的压减最大化。
本申请实施例中的执行周期、检测节点、预设时间段都可以根据实际情况设置;例如每周(即执行周期)执行的减压规则,从每周日凌晨6点(即检测节点)执行确定规则参数,使用每周日的最近7天(即预设时间段)的历史告警数据作为分析数据(即获取的历史数据)。
本申请实施例中属性可以包括告警发生位置、告警码、告警发生时间、告警消失时间等。
本申请实施例中减压规则包括抖动冗余告警数据的抖动告警减压规则以及瞬断冗余告警数据的瞬断告警减压规则。
本申请实施例中规则参数包括抖动告警减压规则中抖动间隔、瞬断告警减压规则中告警延迟时间等。
以下通过一可选实施例对上述实施例进行详细描述。
本可选实施例中压减冗余告警的方法,包括:
步骤1,创建数据挖掘定时任务,设定任务执行周期(比如每天/每周/每月...)和执行时刻(即检测节点);设定使用最近7天的历史告警数据作为挖掘数据。
步骤2,执行数据挖掘任务,将挖掘结果自动应用到告警减压规则上。
作为一种示例,步骤21,从历史告警库中获取规定时间段的历史告警数据。
步骤22,数据预处理包括:提取历史告警数据中的重要属性,所述重要属性可包括以下至少之一:告警发生位置、告警码、告警发生时间、告警消失时间;
计算每条历史告警数据的持续时间,即告警持续时间=告警消失时间-告警产生时间,作为挖掘“瞬断告警”规律的基础;
计算同一历史条告警数据的发生间隔,所谓同一历史条告警是指数据标识(例如发生位置、告警码)相同的告警。具体地,首先将相同发生位置且相同告警码的告警单独查出来,按照告警发生时间排序,然后计算本历史告警数据在本次和上次发生时间之差(即告警发生间隔),作为挖掘“抖动告警”规律的基础。
从而得到的以下至少一种数据信息:告警发生位置(本申请实施例中可以简称为位置)、告警码、告警发生时间、告警消失时间、告警持续时间、告警发生间隔(本申请实施例中可以简称为间隔)。其中告警发生间隔是指:本告警与上一条相同位置相同告警码的告警发生时间的间隔。
步骤23,统计告警发生规律。
针对告警持续时间,可以设置阈值参数1为历史告警数据的告警持续时间阈值x i;设置最佳阈值参数1为最佳告警持续时间阈值。从而对所有历史告警数据,得出统计结果序列(x i,y i%)i=1,2,3...,即持续x i时间以内的告警量占总告警量的y i%。从而得到“瞬断告警”的发生规律。
对所有告警,针对告警持续时间,得出统计结果序列,如表1所示,表示告警持续时间为多少秒内的告警占总告警了的百分之多少。
表1
告警总量 告警发生规律
60000 (1s,2%)(3s,4%)...(20s,41.6%)
针对告警发生间隔,可以设置阈值参数2为同一历史告警数据的各个告警发生间隔q i、q j;设置最佳阈值参数2为该历史告警数据的最佳告警发生间隔。从而对所有同位置同告警码的告警按告警量排出TOPn,然后针对TOPn中的每种告警,都得出一组统计结果序列,比如TOP1的告警规律为(q i,s i%)i=1,2,3...,表示与上一条告警间隔q i时间以内的告警量占该告警总告警量的s i%;TOP2的告警规律为(q j,s j%)j=1,2,3...,表示与上一条告警间隔q j时间以内的告警量占该告警总告警量的s j%;依次得到所有TOPn的告警的“抖动告警”的发生规律。其中n为预设提取数量,为自然数,可以根据实际情况设置。
针对告警发生间隔,首先针对相同位置和相同告警码按告警量排一个TOPn,然后对每种告警统计告警发生规律,如表2所示,得出的告警发生规律表示间隔多少秒内的告警占该告警总量的百分之多少。
表2
Figure PCTCN2018112041-appb-000001
Figure PCTCN2018112041-appb-000002
也就是说,在本发明实施例中,可以采用如下方式确定每个阈值参数对应的告警压减率:确定该阈值参数对应的告警数据量与所有历史告警数据的告警数据总量的比值。
步骤24,运行数据挖掘算法获取减压规则中的规则参数。
在本申请实施例中,所述根据提取的历史告警数据的属性,确定预设的减压规则中的规则参数,可以包括:根据所述历史告警数据的属性,通过预设的数据挖掘算法,确定特定的告警压减率对应的特定阈值参数;根据所述特定阈值参数,设置所述减压规则中的规则参数。
例如,针对“瞬断告警”的发生规律,即一组数据序列(x i,y i%),拟合出一条曲线,使用数据挖掘的算法(比如求二阶导数),求出这条曲线的拐点,即求得最小的持续时间内达到最大的告警压减率,结果是一对特定阈值参数x optimumFlash和特定的告警压减率y optimumFlash值。
同理针对“抖动告警”的发生规律,对每组数据序列(q i,s i%)(q j,s j%)......,也是使用上述方式,分别求得在最小的间隔时间内达到最大的压减率,即TOP1的告警规律(q i,s i%)序列得出最佳的一对特定阈值参数x 1optimumDithering和特定的告警压减率y 1optimumDithering值,TOP2的(q j,s j%)也得到一对特定阈值参数x 2optimumDithering和特定的告警压减率y 2optimumDithering值,直到所有TOPn数据序列都得到一对最佳值。
也就是说,所述根据所述历史告警数据的属性,通过预设的数据挖掘算法,确定特定的告警压减率对应的特定阈值参数,包括:根据所述历史告警数据的属性,统计预设的阈值参数对应的告警压减率;根据所述阈值参数和所述阈值参数对应的告警压减率,拟合曲线;通过所述数据挖掘算法,确定所述曲线的拐点;根据所述拐点,确定所述特定的告警压减率,以及对应的特定阈值参数。
其中,所述属性为告警发生时间和告警消失时间时,所述根据所述历 史告警数据的属性,统计预设的阈值参数对应的告警压减率,包括:提取历史告警数据的告警发生时间和告警消失时间,确定各个历史告警数据的告警持续时间;根据确定的告警持续时间,统计告警持续时间阈值内的的告警数据量;根据统计的告警数据量和所有历史告警数据的告警数据总量,确定告警持续时间阈值对应的告警压减率。
其中,所述属性为数据标识时,所述根据所述历史告警数据的属性,统计预设的阈值参数对应的告警压减率,包括:提取历史告警数据对应的数据标识;根据提取的各个数据标识,统计历史告警数据的告警数据量;根据统计的告警数据量和所有历史告警数据的告警数据总量,确定阈值参数对应的告警压减率。
在本申请的一种可选实施例中,所述数据标识包括告警码和告警发生位置,所述根据提取的数据标识,统计历史告警数据的告警数据量,根据统计的告警数据量和所有历史告警数据的告警数据总量,确定阈值参数对应的告警压减率,包括:根据提取的告警码和告警发生位置,统计历史告警数据的告警数据量;根据所述告警码和告警发生位置,对所述告警数据量进行排序;根据预设提取数量,提取相应的历史告警数据;统计提取的历史告警数据在各个告警发生间隔内的告警数据量;根据统计的告警数据量和所有历史告警数据的告警数据总量,分别确定提取的历史告警数据的告警发生间隔对应的告警压减率。
例如,针对表1的数据,拟合出一条曲线,比如附图2,找到拐点位置,图2中(10s,37%)就是拐点,从而得出表3的数据。
表3
Figure PCTCN2018112041-appb-000003
针对表2中的数据,对TOPn中的每个排位的告警都拟合出一条曲线,找到拐点位置。对所有TOPn的告警都得出拐点位置。最终结果如表4所示。
表4
Figure PCTCN2018112041-appb-000004
步骤25,将数据挖掘结果,自动应用到告警减压规则中。
在本申请实施例中,所述减压规则为瞬断告警减压规则时,所述根据所述特定阈值参数,设置所述减压规则中的规则参数,包括:将所述特定告警持续时间阈值设置为所述瞬断告警减压规则的告警延迟时间。
其中,所述瞬断告警减压规则为:在所述执行周期内,当检测到的告警数据的告警持续时间达到所述告警延迟时间时,按照预设的提示方式提示。
在本申请实施例中,所述减压规则为抖动告警减压规则时,所述根据所述特定阈值参数,设置所述减压规则中的规则参数,包括:
针对每一历史告警数据:根据该历史告警数据的特定告警发生间隔,确定该历史告警数据在单位时间内抖动次数;将所述抖动次数设置为与该历史告警数据的数据标识对应的减压规则中的抖动频次。
其中,所述抖动告警减压规则为:在所述执行周期内,确定检测到的告警数据在单位时间(例如1分钟、10分钟、30秒、300秒等)内的发生次数,并根据该告警数据的数据标识确定对应的减压规则;当所述发生次数大于或等于确定的减压规则中的抖动频次时,将检测到的第一个告警数据按照预设的提示方式提示。
当然,在本申请实施例中,所述减压规则为抖动告警减压规则时,所述根据所述特定阈值参数,设置所述减压规则中的规则参数,还可以包括:根据所述告警码,对各个历史告警数据的特定告警发生间隔进行分类;按照预设的选取原则,确定每个告警码对应的最佳告警发生间隔;对于每个告警码,根据该告警码对应的最佳告警发生间隔确定在单位时间内抖动次数;将所述抖动次数设置为与该告警码对应的减压规则中的抖动频次。
其中,所述抖动告警减压规则为:在所述执行周期内,根据检测到的告警数据,确定单位时间内该告警的发生次数,并根据该告警数据的告警码确定对应的减压规则;当所述发生次数大于或等于确定的减压规则中的抖动频次时,将检测到的第一个告警数据按照预设的提示方式提示。
例如,针对“瞬断告警”的挖掘结果,自动设定告警延迟时间x optimumFlash。效果是,告警上报后不显示在告警监控界面,如果过了x optimumFlash时间,告警没有消失,那么才在告警监控界面显示,否则如果在x optimumFlash时间内就消失了,那么直接入历史告警库,这样最大可能的避免瞬断告警对告警监控界面的冲击。
针对“抖动告警”的挖掘结果,首先对TOPn的告警按告警码分类,同告警码的q ioptimumDithering和s ioptimumDithering值按照一定的规则(比如取最大的 qioptimumDithering)获取一个最佳的间隔q optimumDithering值,然后自动对这个告警码设定针对“抖动告警”的减压规则,即设定针对该告警码的抖动的判断条件为“N分钟发生了(N/q optimumDithering)次”。效果为:N分钟内产生了N/q optimumDithering次的告警,保留首条告警,其他告警丢弃,仅在首条告警中记录发生次数,大大减少了抖动告警的数量以及对监控界面的冲击。
又如,上表3的结果直接应用到“瞬断告警”减压规则中,系统自动设置告警延迟10秒上报。即告警产生后不在监控界面显示,等待10秒,如果10秒内消失了,那么直接如历史告警库,否则才在监控界面显示。
上表4中的结果先对告警码进行分类,分为C1...Cx,然后针对每个告警码的具体发生位置上的拐点位置按照取最大的间隔的原则(即预设的选取原则),选出一个最佳间隔,根据这个最佳间隔,为该告警码设置抖动告警减压规则,具体如表5所示。
表5
Figure PCTCN2018112041-appb-000005
Figure PCTCN2018112041-appb-000006
本申请实施例还提供一种网管设备,图3是本发明实施例中一种网管设备的结构示意图,如图3所示,所述设备包括存储器30和处理器32;所述存储器30存储有计算机程序,所述处理器32执行所述计算机程序,以实现如本申请实施例中任意一项所述压减冗余告警的方法的步骤。
本申请实施例在预设的执行周期的预设检测节点,获取预设时间段内存储的历史告警数据,并提取获取的历史告警数据的预设属性,进而根据提取的历史告警数据的属性,确定预设的减压规则中的规则参数,从而能自动发现告警发生规律,并自动配置减压规则,并自适应于不同的网络、不同局点、不同的时间段,从而达到针对冗余告警的压减最大化。
可选地,所述处理器32执行所述计算机程序,以实现如下步骤:在预设的执行周期的预设检测节点,获取预设时间段内存储的历史告警数据;提取所述历史告警数据的预设属性;根据提取的历史告警数据的属性,确定预设的减压规则中的规则参数,所述减压规则用于压减所述执行周期中冗余告警数据。
在一实施例中,所述处理器32执行所述计算机程序,以实现如下步骤:根据所述历史告警数据的属性,通过预设的数据挖掘算法,确定特定的告警压减率对应的最佳阈值参数;根据所述特定阈值参数,设置所述减压规则中的规则参数。
在一实施例中,所述处理器32执行所述计算机程序,以实现如下步骤:根据所述历史告警数据的属性,统计预设的阈值参数对应的告警压减率;根据所述阈值参数和所述阈值参数对应的告警压减率,拟合曲线;通过所述数据挖掘算法,确定所述曲线的拐点;根据所述拐点,确定所述特定的告警压减率,以及对应的特定阈值参数。
在一实施例中,所述处理器32执行所述计算机程序,以实现如下步骤:确定该阈值参数对应的告警数据量与所有历史告警数据的告警数据总量的比值。其中,所述阈值参数为历史告警数据的告警持续时间阈值,所述特定阈值参数为特定告警持续时间阈值。
在一实施例中,所述处理器32执行所述计算机程序,以实现如下步骤:提取历史告警数据的告警发生时间和告警消失时间,确定历史告警数据的告警持续时间;根据确定的告警持续时间,统计告警持续时间阈值内的告警数据量;根据统计的告警数据量和所有历史告警数据的告警数据总量,确定告警持续时间阈值对应的告警压减率。
在一实施例中,所述减压规则为瞬断告警减压规则;所述处理器32执行所述计算机程序,以实现如下步骤:将所述特定告警持续时间阈值设置为所述瞬断告警减压规则的告警延迟时间。
其中,所述瞬断告警减压规则为:在所述执行周期内,当检测到的告警数据的告警持续时间达到所述告警延迟时间时,按照预设的提示方式提示。
在一实施例中,所述阈值参数为历史告警数据的告警发生间隔,所述特定阈值参数为该历史告警数据的特定告警发生间隔。
在一实施例中,所述属性包括数据标识,所述处理器32执行所述计算机程序,以实现如下步骤:提取历史告警数据对应的数据标识;根据提取的数据标识,统计历史告警数据的告警数据量;根据统计的告警数据量和所有历史告警数据的告警数据总量,确定阈值参数对应的告警压减率。
在一实施例中,所述数据标识包括告警码和告警发生位置,所述处理器32执行所述计算机程序,以实现如下步骤:根据提取的告警码和告警发生位置,统计历史告警数据的告警数据量;根据所述告警码和告警发生位置,对所述告警数据量进行排序;根据预设提取数量,提取相应的历史告 警数据;统计提取的历史告警数据在各个告警发生间隔内的告警数据量;根据统计的告警数据量和所有历史告警数据的告警数据总量,分别确定提取的历史告警数据的告警发生间隔对应的告警压减率。
在一实施例中,所述减压规则为抖动告警减压规则;所述处理器32执行所述计算机程序,以实现如下步骤:针对每一历史告警数据:根据该历史告警数据的特定告警发生间隔,确定该历史告警数据在单位时间内抖动次数;将所述抖动次数设置为与该历史告警数据的数据标识对应的减压规则中的抖动频次。
在一实施例中,所述抖动告警减压规则为:在所述执行周期内,根据检测到的告警数据,确定单位时间内该告警的发生次数,并根据该告警数据的数据标识确定对应的减压规则;当所述发生次数大于或等于确定的减压规则中的抖动频次时,将检测到的第一个告警数据按照预设的提示方式提示。
在一实施例中,所述减压规则为抖动告警减压规则时,所述处理器32执行所述计算机程序,以实现如下步骤:根据所述告警码,对历史告警数据的特定告警发生间隔进行分类;按照预设的选取原则,确定每个告警码对应的特定告警发生间隔;对于每个告警码,根据该告警码对应的特定告警发生间隔确定在单位时间内抖动次数;将所述抖动次数设置为与该告警码对应的减压规则中的抖动频次。
其中,所述抖动告警减压规则为:在所述执行周期内,根据检测到的告警数据,确定单位时间内该告警的发生次数,并根据该告警数据的告警码确定对应的减压规则;当所述发生次数大于或等于确定的减压规则中的抖动频次时,将检测到的第一个告警数据按照预设的提示方式提示。
可以理解,存储器30可以是易失性存储器或非易失性存储器,也可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储 器(ROM,Read Only Memory)、可编程只读存储器(PROM,Programmable Read-Only Memory)、可擦除可编程只读存储器(EPROM,Erasable Programmable Read-Only Memory)、电可擦除可编程只读存储器(EEPROM,Electrically Erasable Programmable Read-Only Memory)、磁性随机存取存储器(FRAM,ferromagnetic random access memory)、快闪存储器(Flash Memory)、磁表面存储器、光盘、或只读光盘(CD-ROM,Compact Disc Read-Only Memory);磁表面存储器可以是磁盘存储器或磁带存储器。易失性存储器可以是随机存取存储器(RAM,Random Access Memory),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(SRAM,Static Random Access Memory)、同步静态随机存取存储器(SSRAM,Synchronous Static Random Access Memory)、动态随机存取存储器(DRAM,Dynamic Random Access Memory)、同步动态随机存取存储器(SDRAM,Synchronous Dynamic Random Access Memory)、双倍数据速率同步动态随机存取存储器(DDRSDRAM,Double Data Rate Synchronous Dynamic Random Access Memory)、增强型同步动态随机存取存储器(ESDRAM,Enhanced Synchronous Dynamic Random Access Memory)、同步连接动态随机存取存储器(SLDRAM,SyncLink Dynamic Random Access Memory)、直接内存总线随机存取存储器(DRRAM,Direct Rambus Random Access Memory)。本发明实施例描述的存储器30旨在包括但不限于这些和任意其它适合类型的存储器。
可以理解,上述本发明实施例揭示的方法可以应用于处理器32中,或者由处理器32实现。处理器32可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法的各步骤可以通过处理器32中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器32可以是通用处理器、数字信号处理器(DSP,Digital Signal Processor),或者其他可编程逻 辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。处理器可以实现或者执行本发明实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者任何常规的处理器等。结合本发明实施例所公开的方法的步骤,可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于存储介质中,该存储介质位于存储器30,处理器32读取存储器中的信息,结合其硬件完成前述方法的步骤。
需要说明的是:上述实施例提供的网管设备在进行压减冗余告警时,仅以上述各程序模块的划分进行举例说明,实际应用中,可以根据需要而将上述处理分配由不同的程序模块完成,即将网管设备的内部结构划分成不同的程序模块,以完成以上描述的全部或者部分处理。另外,上述实施例提供的网管设备与压减冗余告警方法实施例属于同一构思,其具体实现过程详见方法实施例,这里不再赘述。
本实施例在具体实现时,还可以参阅前述方法实施例,也具有相应的技术效果。
本申请实施例还提供了一种计算机可读存储介质,所述介质存储有计算机程序,所述计算机程序被至少一个处理器执行时,以实现如本申请方法实施例中任意所述方法的步骤。
本申请实施例中计算机可读存储介质可以是RAM存储器、闪存、ROM存储器、EPROM存储器、EEPROM存储器、寄存器、硬盘、移动硬盘、CD-ROM或者本领域已知的任何其他形式的存储介质。可以将一种存储介质藕接至处理器,从而使处理器能够从该存储介质读取信息,且可向该存储介质写入信息;或者该存储介质可以是处理器的组成部分。处理器和存储介质可以位于专用集成电路中。
本申请实施例在具体实现时,可以参阅前述实施例,具有相应的技术 效果。
在本申请所提供的几个实施例中,应该理解到,所揭露的设备和方法,可以通过其它的方式实现。以上所描述的设备实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,如:多个单元或组件可以结合,或可以集成到另一个系统,或一些特征可以忽略,或不执行。另外,所显示或讨论的各组成部分相互之间的耦合、或直接耦合、或通信连接可以是通过一些接口,设备或单元的间接耦合或通信连接,可以是电性的、机械的或其它形式的。
上述作为分离部件说明的单元可以是、或也可以不是物理上分开的,作为单元显示的部件可以是、或也可以不是物理单元,即可以位于一个地方,也可以分布到多个网络单元上;可以根据实际的需要选择其中的部分或全部单元来实现本实施例方案的目的。
另外,在本发明各实施例中的各功能单元可以全部集成在一个处理单元中,也可以是各单元分别单独作为一个单元,也可以两个或两个以上单元集成在一个单元中;上述集成的单元既可以采用硬件的形式实现,也可以采用硬件加软件功能单元的形式实现。
本领域普通技术人员可以理解:实现上述方法实施例的全部或部分步骤可以通过程序指令相关的硬件来完成,前述的程序可以存储于一计算机可读取存储介质中,该程序在执行时,执行包括上述方法实施例的步骤;而前述的存储介质包括:移动存储设备、ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。
或者,本发明上述集成的单元如果以软件功能模块的形式实现并作为独立的产品销售或使用时,也可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明实施例的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一 个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机、服务器、或者网络设备等)执行本发明各个实施例所述方法的全部或部分。而前述的存储介质包括:移动存储设备、ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本发明的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应以所述权利要求的保护范围为准。

Claims (15)

  1. 一种压减冗余告警的方法,所述方法包括:
    在预设的执行周期的预设检测节点,获取预设时间段内存储的历史告警数据;
    提取所述历史告警数据的预设属性;
    根据提取的历史告警数据的属性,确定预设的减压规则中的规则参数,所述减压规则用于压减所述执行周期中冗余告警数据。
  2. 如权利要求1所述的方法,其中,所述根据提取的历史告警数据的属性,确定预设的减压规则中的规则参数,包括:
    根据所述历史告警数据的属性,通过预设的数据挖掘算法,确定特定的告警压减率对应的特定阈值参数;
    根据所述特定阈值参数,设置所述减压规则中的规则参数。
  3. 如权利要求2所述的方法,其中,所述根据所述历史告警数据的属性,通过预设的数据挖掘算法,确定特定的告警压减率对应的特定阈值参数,包括:
    根据所述历史告警数据的属性,统计预设的阈值参数对应的告警压减率;
    根据所述阈值参数和所述阈值参数对应的告警压减率,拟合曲线;
    通过所述数据挖掘算法,确定所述曲线的拐点;
    根据所述拐点,确定所述特定的告警压减率,以及对应的特定阈值参数。
  4. 如权利要求3所述的方法,其中,采用如下方式确定每个阈值参数对应的告警压减率:确定该阈值参数对应的告警数据量与所有历史告警数据的告警数据总量的比值。
  5. 如权利要求3所述的方法,其中,所述阈值参数为历史告警数据的 告警持续时间阈值,所述特定阈值参数为特定告警持续时间阈值。
  6. 如权利要求5所述的方法,其中,所述属性包括告警发生时间和告警消失时间,所述根据所述历史告警数据的属性,统计预设的阈值参数对应的告警压减率,包括:
    提取历史告警数据的告警发生时间和告警消失时间,确定历史告警数据的告警持续时间;
    根据确定的告警持续时间,统计告警持续时间阈值内的告警数据量;
    根据统计的告警数据量和所有历史告警数据的告警数据总量,确定告警持续时间阈值对应的告警压减率。
  7. 如权利要求5所述的方法,其中,所述减压规则为瞬断告警减压规则;
    所述根据所述特定阈值参数,设置所述减压规则中的规则参数,包括:
    将所述特定告警持续时间阈值设置为所述瞬断告警减压规则的告警延迟时间。
  8. 如权利要求7所述的方法,其中,所述瞬断告警减压规则为:在所述执行周期内,当检测到的告警数据的告警持续时间达到所述告警延迟时间时,按照预设的提示方式提示。
  9. 如权利要求3所述的方法,其中,所述阈值参数为历史告警数据的告警发生间隔,所述特定阈值参数为特定告警发生间隔。
  10. 如权利要求9所述的方法,其中,所述属性包括数据标识,所述根据所述历史告警数据的属性,统计预设的阈值参数对应的告警压减率,包括:提取历史告警数据对应的数据标识;根据提取的数据标识,统计历史告警数据的告警数据量;根据统计的告警数据量和所有历史告警数据的告警数据总量,确定阈值参数对应的告警压减率。
  11. 如权利要求9所述的方法,其中,所述数据标识包括告警码和告 警发生位置,所述根据提取的数据标识,统计历史告警数据的告警数据量,根据统计的告警数据量和所有历史告警数据的告警数据总量,确定阈值参数对应的告警压减率,包括:
    根据提取的告警码和告警发生位置,统计历史告警数据的告警数据量;
    根据所述告警码和告警发生位置,对所述告警数据量进行排序;
    根据预设提取数量,提取相应的历史告警数据;
    统计提取的历史告警数据在各个告警发生间隔内的告警数据量;
    根据统计的告警数据量和所有历史告警数据的告警数据总量,分别确定提取的历史告警数据的告警发生间隔对应的告警压减率。
  12. 如权利要求11所述的方法,其中,所述减压规则为抖动告警减压规则;
    所述根据所述特定阈值参数,设置所述减压规则中的规则参数,包括:
    根据所述告警码,对历史告警数据的特定告警发生间隔进行分类;
    按照预设的选取原则,确定每个告警码对应的特定告警发生间隔;
    对于每个告警码,根据该告警码对应的特定告警发生间隔确定在单位时间内抖动次数;
    将所述抖动次数设置为与该告警码对应的减压规则中的抖动频次。
  13. 如权利要求12所述的方法,其中,所述抖动告警减压规则为:在所述执行周期内,根据检测到的告警数据,确定单位时间内该告警的发生次数,并根据该告警数据的告警码确定对应的减压规则;
    当所述发生次数大于或等于确定的减压规则中的抖动频次时,将检测到的第一个告警数据按照预设的提示方式提示。
  14. 一种网管设备,所述设备包括存储器和处理器;所述存储器存储有计算机程序,所述处理器执行所述计算机程序,以实现如权利要求1-13任一项所述方法的步骤。
  15. 一种计算机可读存储介质,所述介质存储有计算机程序,所述计算机程序被至少一个处理器执行时,以实现如权利要求1-13任一项所述方法的步骤。
PCT/CN2018/112041 2017-10-26 2018-10-26 压减冗余告警的方法、网管设备及存储介质 WO2019080918A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201711010992.6A CN109714180B (zh) 2017-10-26 2017-10-26 压减冗余告警的方法、相应设备及存储介质
CN201711010992.6 2017-10-26

Publications (1)

Publication Number Publication Date
WO2019080918A1 true WO2019080918A1 (zh) 2019-05-02

Family

ID=66246792

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/112041 WO2019080918A1 (zh) 2017-10-26 2018-10-26 压减冗余告警的方法、网管设备及存储介质

Country Status (2)

Country Link
CN (1) CN109714180B (zh)
WO (1) WO2019080918A1 (zh)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110457185A (zh) * 2019-07-25 2019-11-15 北京奇艺世纪科技有限公司 一种异常报警方法、装置及电子设备
CN110727533A (zh) * 2019-09-26 2020-01-24 华青融天(北京)软件股份有限公司 一种告警的方法、装置、设备和介质
CN110890977A (zh) * 2019-10-15 2020-03-17 平安科技(深圳)有限公司 云平台的主机节点监控方法、装置和计算机设备
CN111506625A (zh) * 2020-04-20 2020-08-07 中国建设银行股份有限公司 一种告警阈值确定方法及装置
CN112769612A (zh) * 2020-12-30 2021-05-07 北京天融信网络安全技术有限公司 一种告警事件去误报方法及装置
CN113079047A (zh) * 2021-03-29 2021-07-06 北京奇艺世纪科技有限公司 一种告警处理方法及装置
CN113590025A (zh) * 2021-06-20 2021-11-02 济南浪潮数据技术有限公司 一种分布式存储系统的告警方法和装置
CN113645073A (zh) * 2021-08-11 2021-11-12 未鲲(上海)科技服务有限公司 告警邮件处理方法、装置、电子设备及存储介质
CN113886182A (zh) * 2021-09-29 2022-01-04 深圳市金蝶天燕云计算股份有限公司 一种告警收敛方法、装置及电子设备和存储介质
CN113904815A (zh) * 2021-09-22 2022-01-07 深信服科技股份有限公司 一种告警聚合方法、装置、设备及计算机存储介质
CN114389938A (zh) * 2021-12-14 2022-04-22 武汉光迅科技股份有限公司 一种告警方法、告警装置及存储介质
CN114760185A (zh) * 2022-03-15 2022-07-15 深信服科技股份有限公司 告警信息处理方法、装置、电子设备及存储介质
CN115235543A (zh) * 2022-07-18 2022-10-25 宁夏隆基宁光仪表股份有限公司 一种用于水务系统的管网管道寿命分析告警方法及装置

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109189736B (zh) * 2018-08-01 2021-01-26 中国联合网络通信集团有限公司 一种告警关联规则的生成方法和装置
CN112152868B (zh) * 2019-06-28 2022-05-06 北京金山云网络技术有限公司 网络故障检测方法、装置、电子设备及存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101247269A (zh) * 2008-03-05 2008-08-20 中兴通讯股份有限公司 一种自动发现判定冗余告警的关联规则的方法
US20080316015A1 (en) * 2004-06-28 2008-12-25 Abb Research Ltd System and Method for Suppressing Redundant Alarms
CN102098175A (zh) * 2011-01-26 2011-06-15 浪潮通信信息系统有限公司 一种移动互联网告警关联规则获取方法
CN102625349A (zh) * 2012-03-09 2012-08-01 浪潮通信信息系统有限公司 一种告警风暴下的数据处理方法
CN103856339A (zh) * 2012-12-04 2014-06-11 中国移动通信集团广西有限公司 一种对告警信息进行压缩的方法和设备
CN107196804A (zh) * 2017-06-01 2017-09-22 国网山东省电力公司信息通信公司 电力系统终端通信接入网告警集中监控系统及方法

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104243184B (zh) * 2013-06-06 2018-01-30 中国移动通信集团河北有限公司 一种告警信息的处理方法及装置
CN107026745B (zh) * 2016-01-29 2020-07-07 华为技术有限公司 告警处理方法和告警处理设备
CN105721719B (zh) * 2016-02-24 2019-02-01 上海携程商务有限公司 呼叫中心的故障检测系统及方法

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080316015A1 (en) * 2004-06-28 2008-12-25 Abb Research Ltd System and Method for Suppressing Redundant Alarms
CN101247269A (zh) * 2008-03-05 2008-08-20 中兴通讯股份有限公司 一种自动发现判定冗余告警的关联规则的方法
CN102098175A (zh) * 2011-01-26 2011-06-15 浪潮通信信息系统有限公司 一种移动互联网告警关联规则获取方法
CN102625349A (zh) * 2012-03-09 2012-08-01 浪潮通信信息系统有限公司 一种告警风暴下的数据处理方法
CN103856339A (zh) * 2012-12-04 2014-06-11 中国移动通信集团广西有限公司 一种对告警信息进行压缩的方法和设备
CN107196804A (zh) * 2017-06-01 2017-09-22 国网山东省电力公司信息通信公司 电力系统终端通信接入网告警集中监控系统及方法

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110457185A (zh) * 2019-07-25 2019-11-15 北京奇艺世纪科技有限公司 一种异常报警方法、装置及电子设备
CN110457185B (zh) * 2019-07-25 2024-01-23 北京奇艺世纪科技有限公司 一种异常报警方法、装置及电子设备
CN110727533A (zh) * 2019-09-26 2020-01-24 华青融天(北京)软件股份有限公司 一种告警的方法、装置、设备和介质
CN110890977A (zh) * 2019-10-15 2020-03-17 平安科技(深圳)有限公司 云平台的主机节点监控方法、装置和计算机设备
CN111506625A (zh) * 2020-04-20 2020-08-07 中国建设银行股份有限公司 一种告警阈值确定方法及装置
CN112769612A (zh) * 2020-12-30 2021-05-07 北京天融信网络安全技术有限公司 一种告警事件去误报方法及装置
CN113079047B (zh) * 2021-03-29 2022-10-14 北京奇艺世纪科技有限公司 一种告警处理方法及装置
CN113079047A (zh) * 2021-03-29 2021-07-06 北京奇艺世纪科技有限公司 一种告警处理方法及装置
CN113590025A (zh) * 2021-06-20 2021-11-02 济南浪潮数据技术有限公司 一种分布式存储系统的告警方法和装置
CN113590025B (zh) * 2021-06-20 2023-12-22 济南浪潮数据技术有限公司 一种分布式存储系统的告警方法和装置
CN113645073A (zh) * 2021-08-11 2021-11-12 未鲲(上海)科技服务有限公司 告警邮件处理方法、装置、电子设备及存储介质
CN113904815A (zh) * 2021-09-22 2022-01-07 深信服科技股份有限公司 一种告警聚合方法、装置、设备及计算机存储介质
CN113904815B (zh) * 2021-09-22 2024-05-28 深信服科技股份有限公司 一种告警聚合方法、装置、设备及计算机存储介质
CN113886182A (zh) * 2021-09-29 2022-01-04 深圳市金蝶天燕云计算股份有限公司 一种告警收敛方法、装置及电子设备和存储介质
CN114389938A (zh) * 2021-12-14 2022-04-22 武汉光迅科技股份有限公司 一种告警方法、告警装置及存储介质
CN114389938B (zh) * 2021-12-14 2023-09-29 武汉光迅科技股份有限公司 一种告警方法、告警装置及存储介质
CN114760185A (zh) * 2022-03-15 2022-07-15 深信服科技股份有限公司 告警信息处理方法、装置、电子设备及存储介质
CN115235543A (zh) * 2022-07-18 2022-10-25 宁夏隆基宁光仪表股份有限公司 一种用于水务系统的管网管道寿命分析告警方法及装置

Also Published As

Publication number Publication date
CN109714180A (zh) 2019-05-03
CN109714180B (zh) 2022-03-04

Similar Documents

Publication Publication Date Title
WO2019080918A1 (zh) 压减冗余告警的方法、网管设备及存储介质
CN108845910B (zh) 大规模微服务系统的监控方法、装置及存储介质
CN108574732B (zh) 一种推送消息处理方法、计算机可读存储介质及终端设备
CN109344153B (zh) 业务数据的处理方法及终端设备
US20180210795A1 (en) Data backup method and data processing system
US20180039898A1 (en) Anomaly detection for time series data having arbitrary seasonality
WO2020062690A1 (zh) 基于大数据分析的非法用户识别方法及装置、电子设备
CN110364183A (zh) 语音质检的方法、装置、计算机设备和存储介质
CN110737594B (zh) 自动生成测试用例的数据库标准符合性测试方法及装置
CN113765881A (zh) 异常网络安全行为的检测方法、装置、电子设备及存储介质
CN109144862A (zh) 测试数据的统计方法、装置、计算机设备及存储介质
CN107402851B (zh) 一种数据恢复控制方法及装置
CN109032743A (zh) 菜单配置方法、装置、设备及可读存储介质
CN113886193A (zh) 日志数据处理方法、装置、电子设备及存储介质
WO2016119389A1 (zh) 一种系统对接的管理方法、装置和系统
CN106844694B (zh) 用于同步数据的方法及设备
CN105138447A (zh) 一种Reboot测试过程中监测硬盘和内存的实现方法
CN112988525B (zh) 一种告警关联规则的匹配方法及装置
CN109117263A (zh) 一种用户终端内存释放的方法及装置
CN105719072B (zh) 关联多段组件交易的系统及方法
CN105162622A (zh) 一种存储方法和系统
US20140161120A1 (en) Processing of call data records
CN109271442A (zh) 数据库同步恢复方法、装置、计算机可读存储介质和电子设备
CN109039695B (zh) 业务故障处理方法、装置及设备
CN111079469A (zh) 人脸图像的处理方法、装置、设备及可读存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18871781

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 08/09/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 18871781

Country of ref document: EP

Kind code of ref document: A1