WO2020228276A1 - 网络告警的方法及装置 - Google Patents

网络告警的方法及装置 Download PDF

Info

Publication number
WO2020228276A1
WO2020228276A1 PCT/CN2019/117168 CN2019117168W WO2020228276A1 WO 2020228276 A1 WO2020228276 A1 WO 2020228276A1 CN 2019117168 W CN2019117168 W CN 2019117168W WO 2020228276 A1 WO2020228276 A1 WO 2020228276A1
Authority
WO
WIPO (PCT)
Prior art keywords
network
alarm
level
information
target
Prior art date
Application number
PCT/CN2019/117168
Other languages
English (en)
French (fr)
Inventor
谢文
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2020228276A1 publication Critical patent/WO2020228276A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/069Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Definitions

  • This application relates to the technical field of network security, and in particular to a method and device for network alarms.
  • Alarm management can reflect the operating status of the entire network in real time by monitoring the device status of each network device in the network. For abnormal situations that occur in the network, it can provide network maintenance personnel with detailed abnormal information and corresponding handling solutions. .
  • the prior art alarm management has disadvantages such as a large number of alarms for network failure alarms, high difficulty of network maintenance, large workload of network maintenance, poor flexibility of alarm management, and low applicability.
  • the embodiments of the present application provide a method and device for network alarms, which can realize hierarchical management of network alarms, have high alarm flexibility, improve the efficiency of network security management, and have a wide range of applications.
  • an embodiment of the present application provides a network alarm method, which includes:
  • the above-mentioned network alarm information is sent to the network manager through the above-mentioned target alarm method.
  • the foregoing obtaining network alarm information includes:
  • the above alarm word segmentation type includes at least one of time, identification, level, and failure;
  • the above-mentioned key information includes at least one of the alarm occurrence timestamp corresponding to the above-mentioned time, the network device identifier corresponding to the above-mentioned identifier, the alarm level corresponding to the above-mentioned level, and the alarm fault corresponding to the above-mentioned fault.
  • an embodiment of the present application provides a network alarm device, which includes:
  • the information obtaining unit is used to obtain network alarm information, and extract the network device identifier carried in the above-mentioned network alarm information;
  • the network level determining unit is configured to determine the target network level to which the network device corresponding to the network alarm information belongs according to the network device identifier determined by the information acquiring unit;
  • An alarm mode determining unit configured to determine the target alarm mode corresponding to the network alarm information according to the target network level determined by the network level determining unit;
  • the network alarm information sending unit is configured to send the network alarm information to the network administrator through the target alarm method determined by the alarm method determining unit.
  • an embodiment of the present application provides a terminal device.
  • the terminal device includes a processor and a memory, and the processor and the memory are connected to each other.
  • the memory is used to store a computer program that supports the terminal device to execute the method provided in the first aspect and/or any one of the possible implementations of the first aspect
  • the computer program includes program instructions, and the processor is configured to call the foregoing
  • the program instructions execute the method provided in the first aspect and/or any possible implementation manner of the first aspect.
  • embodiments of the present application provide a computer non-volatile readable storage medium
  • the computer non-volatile readable storage medium stores a computer program
  • the computer program includes program instructions
  • the program instructions are When the processor is executed, the processor executes the method provided in the foregoing first aspect and/or any possible implementation manner of the first aspect.
  • the network level to which the network device corresponding to the above-mentioned network alarm information belongs can be determined, and the corresponding alarm method can be determined through the network level, thereby realizing the classification of network alarms, making the alarm more flexible and more convenient Network security management has a wide range of applications.
  • FIG. 1 is a schematic flowchart of a network alarm method provided by an embodiment of the present application
  • FIG. 2 is a schematic diagram of another process of a network alarm provided by an embodiment of the present application.
  • Figure 3 is a schematic structural diagram of a network alarm device provided by an embodiment of the present application.
  • Fig. 4 is a schematic structural diagram of a terminal device provided by an embodiment of the present application.
  • the network alarm method provided in the embodiments of the present application can be widely applied to network devices capable of generating log files. Each network device generates a large number of log files during operation. By analyzing the obtained alarm log files, key information including alarm occurrence timestamp, network device identification, alarm level, and alarm failure can be obtained to determine network alarm information. According to the network device identification in the network alarm information, the target network level to which the network device corresponding to the network alarm information belongs can be determined, and the corresponding target alarm mode can be determined through the target network level, so as to achieve the classification of network alarms.
  • the embodiments of the present application provide a network alarm method and device, which can realize the classification of network alarms, has high alarm flexibility, is convenient for network security management, and has a wide application range.
  • the methods and related devices provided by the embodiments of the present application will be described in detail below with reference to FIGS. 1 to 4 respectively.
  • the method provided in the embodiments of the present application may include data processing stages for obtaining network alarm information, determining the target network level, determining the target alarm mode, sending network alarm information, and setting network device identification based on the network level.
  • the implementation manners of the above-mentioned data processing stages can be referred to the implementation manners shown in Figures 1 to 2 below.
  • Fig. 1 is a schematic flowchart of a network alarm method provided by an embodiment of the application.
  • the method provided in the embodiment of the present application may include the following steps 101 to 104:
  • each network device will generate an event record called log during operation, which is what we often call a log file.
  • the log file is a file with increasing content, just like the life recorder of a network device , It records in detail the operation of network equipment.
  • network equipment refers to computers, servers, systems, switches, routers, modems, access control, UPS (Uninterruptible Power Supply), surveillance, cameras, etc. that can generate log files, which can be determined according to actual application scenarios.
  • UPS Uninterruptible Power Supply
  • the number of log files generated by network devices has become larger and more diverse. Therefore, by setting screening parameters to filter the received log files, you can select from massive logs Find the log file of interest in the file.
  • the aforementioned log files of interest refer to log files containing errors and/or warnings and/or exceptions and/or important information, which can be specifically determined according to actual application scenarios, and there is no limitation here.
  • the alarm word segmentation type includes but is not limited to time, identification, level, fault, equipment name, etc., which is not limited here.
  • word segmentation processing By performing word segmentation processing on the text included in the obtained alarm log file, multiple word segmentation corresponding to the text can be obtained. Then, based on semantic analysis, the word segmentation type to which each of the above multiple word segmentation belongs can be determined.
  • any word segmentation type belonging to the alarm word segmentation type is the target word segmentation type, and the word segmentation corresponding to the target word segmentation type is the alarm log file.
  • Key information can be directly used as network alarm information, where the above-mentioned key information includes alarm occurrence timestamp, network equipment identification, alarm level, alarm failure, etc., which can be determined according to actual application scenarios. No restrictions. It is understandable that word segmentation is the process of recombining consecutive word sequences into word sequences according to certain specifications.
  • the alarm log file 1 includes the text "Package loss occurs on a class A switch”
  • the text "Package loss occurs on a class A switch” can be divided into “Class A”, “Switch”, “Occurs” and " 4 participles of "packet loss”.
  • the word segmentation types to which the above 4 word segmentation belongs are "identification”, "equipment name”, "auxiliary word” and "fault”.
  • the target word segmentation type By matching the word segmentation type of each of the above 4 word segmentation with the preset alarm word segmentation type, the target word segmentation type can be determined as "identification”, "device name” and “fault”, and then the target word segmentation type can be corresponding
  • the participles "Class A”, “switch” and “packet loss” are determined as the key information of the alarm log file 1.
  • the key information "Class A”, “switch” and "packet loss” can be directly used as network alarm information.
  • the syntax structure and/or description format of alarm log files generated by network devices of different manufacturers are usually relatively different. Big difference. Therefore, after obtaining the alarm log file, each field of the alarm log file can be parsed to obtain some key information, the key information is sorted according to the set rules, and the sorted key information is used as an embodiment of the application Network alarm information in Among them, the above-mentioned set rules may be to sort the obtained key information according to a set arrangement format. For example, the obtained key information may be sorted in the order of alarm occurrence timestamp, network device identification, alarm level, and alarm failure. As network alarm information, it can also organize the key information obtained in the order of alarm occurrence timestamp, alarm level, network device identification, and alarm failure as network alarm information. The specific information can be determined according to the actual application scenario, and there is no restriction here. .
  • the network device identification carried in the above-mentioned network alarm information can be extracted, where the above-mentioned network device identification can be a network device name, character identification, etc., which can be specifically based on actual application scenarios OK, there is no restriction here.
  • any network device identifier can determine the network level to which any network device belongs.
  • any network device identifier can determine the network level to which any network device belongs.
  • the aforementioned network device identification may be a network device name, character identification, etc.
  • CSW CoreSwitch, core switch
  • DSW Distribution Switch, aggregation switch
  • ASW Access Switch
  • CSW CoreSwitch, core switch
  • DSW Distribution Switch, aggregation switch
  • ASW Access Switch
  • the target network layers corresponding to CSW, DSW, and ASW can be determined as the core layer, the convergence layer, and the access layer.
  • the switches located at the core layer, the aggregation layer, and the access layer can also be a type A switch, a type B interactive machine, and a type C interactive machine.
  • the target network levels corresponding to the character identifiers "Type A", "Type B” and "Type C" are the core layer, the convergence layer and the access layer, respectively.
  • the range of influence when a fault occurs is also different.
  • the alarm methods include, but are not limited to, telephone alarms, SMS alarms, email alarms, etc., which can be determined according to actual application scenarios and are not limited here. It is not difficult to understand that in order to distinguish between alarms from different network levels and prioritize the alarms generated by core network equipment, different alarm methods can be set for different network levels.
  • the alarm method corresponding to the core layer can be set as the first alarm method "telephone alarm”.
  • the second alarm method "SMS alarm” can be set as the second alarm method at the convergence layer.
  • the third alarm method "email alarm” can be set as the alarm method of the access layer.
  • the alarm immediacy of the first alarm mode is higher than that of the second alarm mode, and the alarm immediacy of the second alarm mode is higher than that of the third alarm mode.
  • the alarm immediacy of phone alarms is higher than that of SMS alarms, and the alarm immediacy of SMS alarms is higher than that of email alarms.
  • the high alarm mode can be determined according to actual application scenarios, and there is no restriction here.
  • the target network layer corresponding to the Class A switch can be determined to be the core layer, according to the network layer and the alarm method Correspondence between the two, it can be determined that the alarm mode of the core layer is the first alarm mode, that is, the target alarm mode of the network alarm information corresponding to the Class A switch is "telephone alarm”.
  • the purpose of the alarm is to alert the network manager and/or technical personnel that a network failure has occurred somewhere in the network, and it is hoped that the network manager and/or technical personnel can resolve the generated failure as soon as possible and stop the loss in time.
  • time cost and labor cost it is usually impossible to choose to send a network alarm message to all network managers and/or technicians. Therefore, when dividing the labor, it can be divided into various networks according to geographical area and/or network level.
  • the alarm information specifies the corresponding network manager and/or technical staff. The advantage of this is that the network manager and/or technical staff can know the scope of their responsibilities and perform their duties.
  • the above-mentioned network alarm information can be sent to the corresponding one or more network managers and/or technicians through the target alarm mode , To alert network administrators and/or technicians of a network failure somewhere in the network.
  • the alarm processing priority of the first network layer is higher than that of the first network layer.
  • the second network level therefore, the set alarm immediacy of the first alarm mode corresponding to the first network level is higher than the alarm immediacy of the second alarm mode corresponding to the second network level.
  • the first alarm mode can be set to correspond to the first network manager
  • the second alarm mode can be set to correspond to the second network manager.
  • the network fault handling authority of the first network manager should be higher than that of the second network manager.
  • the network fault handling authority can be set according to the work experience or business proficiency of the network manager or the technicality of the job position. For example, if you set permissions for network administrators based on work experience or business proficiency, network management with rich experience (such as the number of historical business processing times, the number of historical business processing successes, and/or the longer cumulative business processing time) Set the network administrator as a network administrator with high network fault handling authority. If the network administrator is set up with the technicality of the job position, the highly technical personnel (such as developers) can be set as the network administrator with high network fault handling authority. Set weakly technical personnel (such as customer service personnel) as network administrators with low network fault handling authority. The specifics can be determined according to actual application scenarios, and there is no restriction here.
  • the network manager responsible for handling telephone alarms is "administrator a”.
  • the network device The identification "Class A” can determine that the above "Class A switch” belongs to the core layer, and the corresponding target alarm mode and network manager are “phone alarm” and "administrator a” respectively. Therefore, the above-mentioned network alarm information “2018-12-3 11:54:35 A switch error mail sending error occurred” can be sent to “administrator a” by means of “phone alarm”.
  • the embodiment of the present application by analyzing the obtained alarm log file, key information including alarm occurrence timestamp, network device identification, alarm level, and alarm failure can be obtained, thereby determining network alarm information.
  • the target network level to which the network device corresponding to the network alarm information belongs can be determined, and the corresponding target alarm mode can be determined through the target network level, thereby realizing the classification of the network alarm.
  • Sending the above-mentioned network alarm information to the network manager through the above-mentioned target alarm method can remind the network manager of the malfunction and/or abnormality of the network equipment during the operation.
  • the embodiments of the present application provide a network alarm method and device, which can realize the classification of network alarms, has high alarm flexibility, is convenient for network security management, and has a wide application range.
  • FIG. 2 is a schematic flowchart of another network alarm method provided by an embodiment of the present application.
  • the network alarm method provided in the embodiment of the present application can be described by the implementation manner provided in the following steps 201 to 207:
  • the computer network is a very complex system, with many problems to be solved and different in nature. Therefore, when designing the network, people put forward the idea of "layering", which is to divide the complex network design into several Each level focuses on certain specific functions, so that a complex big problem can be turned into many simple small problems.
  • the senior management is mainly responsible for the core content of the entire company's strategic plan and development direction; the middle management plays the role of implementing the strategies communicated by the senior management and managing the vast number of grassroots employees. In fact, it plays the role of uploading and distributing; and the responsibility of the grassroots employees is Performing various tasks assigned by middle-level management is, in short, immersed in work.
  • the access layer is mainly used for the high-speed switching backbone of the network
  • the convergence layer focuses on providing policy-based connections
  • the access layer is responsible for connecting workstations including computers and wireless access points (APs).
  • APs wireless access points
  • the entities that make up each layer of the network architecture are actually some network equipment.
  • the above network equipment includes but not limited to computers, servers, systems, switches, routers, modems, access control, UPS, surveillance, cameras, etc.
  • the network equipment also has different levels.
  • the access layer switches, aggregation layer switches, and core layer switches we usually refer to are not based on the types or attributes of the switches themselves. Classified, but divided according to its position in the network structure. Among them, the core layer is the hub center of the network, and its importance is prominent. Therefore, the core layer switch is a three-layer switch, and its performance is higher than that of the aggregation layer switch and the access layer switch.
  • the aggregation layer is the "intermediary" between the network access layer and the core layer.
  • the aggregation layer switch can be a layer 2 and/or layer 3 switch.
  • the performance of the aggregation layer switch is between the core layer switch and the access layer switch. Compared with the entry switch, the performance is higher.
  • the main purpose of the access layer is to allow end users to connect to the network, so the access layer switches are Layer 2 switches with the lowest performance. It is not difficult to understand that the network hierarchy of the network device can be reflected by naming the network device and/or setting the network device identifier.
  • the network level of the network device can be directly added to the name of the network device.
  • the network device For example, for switches, they can be named core layer switches, aggregation layer switches, and access layer switches.
  • the network device identification By setting the network device identification to reflect the network level of the network device, you can add characters and/or symbols to the name of the network device.
  • the switch you can set the network device of the switch at the core layer, the aggregation layer and the access layer
  • the identifiers are type A, type B, type C or type I, type II, type III, etc., which can be determined according to actual application scenarios and are not limited here.
  • a network device will generate an event record called log when it is operating, which is what we often call a log file. Normally, network administrators can understand the network device’s status in time by viewing the content of the log file. Software and hardware information, errors in the configuration process and the reasons for the errors. It is understandable that due to the different positions in the network structure of the network equipment, when a network failure occurs, the scope of the failure impact is also different.
  • the network level includes the first network level and the second network level and the importance of the first network level is greater than that of the second network level
  • the alarm mode is the second alarm mode, wherein the alarm immediacy of the first alarm mode is higher than that of the second alarm mode. That is, for the most core and/or the highest priority and/or the network level with the largest fault impact range, the corresponding alarm mode should be set to the highest instantaneous, so that the network alarm information appears first in the network at this layer. Time has attracted the attention of network managers.
  • the core layer is the backbone part of the network, so a small problem in the core layer network equipment may also cause the entire network to be paralyzed. Therefore, in order to initially determine the network level to which the network device belongs and/or determine the importance of the generated network alarm information during the alarm phase, after setting the network device identifier, you can also match different alarm methods for each network level. Including but not limited to phone alarms, SMS alarms, email alarms, etc., which can be determined according to actual application scenarios and are not limited here. Among them, for the alarms generated by the core layer network equipment, due to the characteristics of the core layer affecting the whole body, the alarm method can be set to telephone alarm.
  • the aggregation layer has multiple units The convergence point of the access layer network equipment, so you can set its alarm mode to be SMS alert.
  • the access layer network equipment because the access layer provides users with the ability to access the application system in the local network segment, it can be set The warning method is email warning.
  • email warning we believe that the immediateness of phone alerts is higher than that of SMS alerts, and that of SMS alerts is higher than that of email alerts.
  • different division methods can be used to specify the jurisdiction for the network manager. For example, network alarm information belonging to the same network level can be sent to one or more corresponding network administrators through corresponding alarm methods, or network devices located in a certain area can be divided into corresponding one or more network devices based on geographic location.
  • a network manager is responsible for maintenance.
  • steps 204-206 please refer to the implementation manners provided in steps 101-103 in the embodiment corresponding to FIG. 1, which will not be repeated here.
  • tens of thousands of network devices may be operated at the same time in some application scenarios. Therefore, even if you only view each network device belonging to the same network level at the same time and/or within a certain period of time The amount of network alarm information is also very large, and the severity of the failure of each network device in the same network level is different. At this time, if each piece of network alarm information generated by the above-mentioned network equipment is sent to the network administrator in real time, the difficulty and workload of network maintenance are also very huge. Therefore, for network alarm information with a small degree of failure, you can choose to delay the alarm.
  • the severity of the network device can be determined, and then obtain the alarm level corresponding to each of the multiple alarm levels set in advance when the network alarm information is allowed to be sent Threshold for the number of occurrences of alarm levels (for convenience of description, referred to as preset times), and compare the number of occurrences of network alarm information of a certain alarm level generated by the network equipment with the preset number of times to determine whether the network can be The alarm information is sent to the network manager.
  • the alarm level is a first-level alarm, including emerg, alert, and crit
  • the network alarm information can be sent immediately through the target alarm method To the corresponding network manager.
  • the preset number of first-level alarms is 1, once a network device generates a first-level alarm, the network alarm information is immediately sent to the corresponding network manager through the target alarm method, so that the network manager can Troubleshoot network faults immediately after receiving network alarm information.
  • the alarm level is a secondary alarm error, it usually indicates that although an error event has occurred in the network, it still does not affect the continued operation of the system.
  • the network alarm information is sent to the corresponding network manager through the target alarm method.
  • the alarm level is a three-level warning warning, it usually indicates that the network device may have a potential error.
  • the number of warnings generated by the network device can be counted.
  • the target alarm is passed The network alarm information is sent to the corresponding network manager.
  • the preset number of error and the preset number of warnings can be the same, or can be set to be different, and both the preset number of error and the preset number of warnings are greater than 1, which is determined according to the actual application scenario, and will not be done here. limit. It is understandable that when the number of statistics is less than the preset number of times, the network alarm information will not be sent, and the greater the preset number of times is set, the greater the delay of the alarm will be, and the delayed alarm will be realized through the set preset times
  • the method can greatly reduce the number of alarms received by the network manager, which not only avoids a large number of repeated alarms, but also provides timely reminders to the network manager.
  • the target alarm method corresponding to the core layer can be determined as "telephone alarm”, and the network manager corresponding to each alarm method set in advance can determine the network management responsible for the "phone alarm” Those are “Administrator a” and “Administrator b". Since the alarm level “alert" belongs to the first level alarm, the above network alarm information "2018-12-3 11:54:35 Class A switch alert packet loss” can be sent to the "administrator a” by means of "phone alarm” "And “Administrator b".
  • the above-mentioned alarm level is greater than the preset level by comparing the alarm level in the extracted network alarm information with a preset level. Specifically, if the above-mentioned alarm level is greater than the preset level, the above-mentioned network alarm information is immediately sent to the network manager through the above-mentioned target alarm method. If the alarm level is less than or equal to the preset level, the number of occurrences of the alarm level is counted, until the number of occurrences of the alarm level is greater than or equal to the preset number of times, the network alarm information is sent to the network manager in a target alarm mode.
  • the network alarm information will not be issued. In this way, network management can also be reduced.
  • the number of alarms received by the user not only avoids a large number of repeated alarms, but also provides timely reminders to the network manager.
  • the network manager responsible for handling SMS alarms is "administrator c", where the preset level is set to second level alarms, and the preset number of times is set to 5.
  • the network device identifier "Class B” can determine that the above "Class B switch 1" belongs to the convergence layer, and its corresponding The target alert mode and network manager are “SMS alert” and "Administrator c” respectively. Since the alarm level error is a second-level alarm, which is equal to the second-level alarm in the preset level, the number of occurrences of "error” in the above-mentioned "Class B switch 1" is counted.
  • a large number of network warning messages with low warning levels were received during the period.
  • the alarm level and the alarm occurrence time stamp carried in the network alarm information can be extracted, and the extracted alarm level can be compared with the preset level. If the alarm level is greater than the preset level, it indicates that the network device has a serious failure, and the network alarm information is immediately sent to the network manager through the target alarm method to remind the network manager of a major failure in the network.
  • the network equipment has a low degree of failure and will not affect the operation of the entire network in a short time.
  • delay alarms can be used to avoid the use of limited network administrator resources during periods of high failure.
  • the network alarm information is sent to the network manager in the target alarm mode. This not only avoids the issuance of alarm information for the low-fault network during the high-fault period, but also controls the low-fault network alarm information to be issued during the idle period to prompt the network manager in a timely manner.
  • key information including alarm occurrence timestamp, network device identification, alarm level, and alarm failure can be obtained, thereby determining network alarm information.
  • the target network level to which the network device corresponding to the network alarm information belongs can be determined, and the corresponding target alarm mode can be determined through the target network level, so as to achieve the classification of network alarms.
  • the embodiments of the present application provide a network alarm method and device, which can realize the classification of network alarms, has high alarm flexibility, is convenient for network security management, and has a wide application range.
  • FIG. 3 is a schematic structural diagram of a network alarm device provided by an embodiment of the present application.
  • the network alarm device provided by the embodiment of the application includes:
  • the information obtaining unit 31 is configured to obtain network alarm information, and extract the network device identifier carried in the above-mentioned network alarm information.
  • the network level determining unit 32 is configured to determine, according to the network device identifier determined by the information acquiring unit 31, the target network level to which the network device corresponding to the network alarm information belongs.
  • the alarm mode determining unit 33 is configured to determine the target alarm mode corresponding to the network alarm information according to the target network level determined by the network level determining unit 32.
  • the network alarm information sending unit 34 is configured to send the network alarm information to the network administrator through the target alarm method determined by the alarm method determining unit 33.
  • the aforementioned information acquiring unit 31 is specifically configured to:
  • the above alarm word segmentation type includes at least one of time, identification, level, and failure;
  • the above-mentioned key information includes at least one of the alarm occurrence timestamp corresponding to the above-mentioned time, the network device identifier corresponding to the above-mentioned identifier, the alarm level corresponding to the above-mentioned level, and the alarm fault corresponding to the above-mentioned fault.
  • the above-mentioned information acquisition unit 31 is further configured to:
  • the foregoing network alarm device further includes:
  • the network device identification setting unit 35 is configured to obtain multiple network devices, and determine the network level to which each of the multiple network devices belongs;
  • the network device identifier setting unit 35 is further configured to set the network device identifier corresponding to each of the above-mentioned network devices based on the network layer to which each of the above-mentioned network devices belongs, wherein any network device identifier is used to determine the network layer to which any of the above-mentioned network devices belongs .
  • the network layers to which each network device belongs include at least a first network layer and a second network layer, and the alarm processing priority of the first network layer is higher than the second network layer; the network device The device also includes:
  • the alarm mode setting unit 36 is configured to set the alarm mode corresponding to the first network level as the first alarm mode, and set the alarm mode corresponding to the second network level as the second alarm mode;
  • the alarm immediacy of the first alarm method is higher than that of the second alarm method
  • the first alarm method includes one of telephone alarm, SMS alarm, and email alarm
  • the second alarm method includes telephone alarm
  • SMS alerts and email alerts is different from the above-mentioned first alert mode.
  • the foregoing network alarm information includes an alarm level; the foregoing network alarm information sending unit 34 is configured to:
  • the above network alarm information is sent to the network manager through the above target alarm method
  • the number of occurrences of the alarm level is counted, and when the number of occurrences of the alarm level is greater than or equal to the preset number, the network alarm information is sent to the network manager through the target alarm method.
  • the foregoing network alarm information includes an alarm level and an alarm occurrence timestamp; the foregoing network alarm information sending unit 34 is configured to:
  • the above network alarm information is sent to the network manager through the above target alarm method
  • the above alarm level is not greater than the preset level, determine the preset alarm delay time corresponding to the above alarm level, and start from the time stamp when the above alarm occurs. After the above preset alarm delay time, the above network alarm will be sent through the above target alarm method. The information is sent to the network manager.
  • the foregoing network alarm information sending unit 34 is specifically configured to:
  • the target alarm mode is the first alarm mode, send the network alarm information to the one or more first network managers corresponding to the first alarm mode through the first alarm mode;
  • the target alarm mode is the second alarm mode, send the network alarm information to one or more second network managers corresponding to the second alarm mode through the second alarm mode;
  • the network fault handling authority of the first network manager is higher than the network fault handling authority of the second network manager.
  • the device further includes:
  • the network fault processing authority setting unit is used to obtain the work record parameters of each network manager among multiple network managers, where the work record parameters include the number of historical business processing times, the number of historical business processing successes, and the cumulative duration of business processing;
  • the network fault handling authority of each network manager is set according to the multiple work experience scores corresponding to the multiple network managers.
  • the above-mentioned network alarm device can execute the implementation manners provided in the above-mentioned steps in FIGS. 1 to 2 through various built-in functional modules.
  • the above-mentioned information obtaining unit 31 may be used to perform the above-mentioned various steps in obtaining network alarm information and extracting network device identification and other implementation methods.
  • the above-mentioned network level determining unit 32 may be configured to execute the implementation manners described in the relevant steps of determining the target network level in the above-mentioned steps.
  • the above-mentioned alarm mode determining unit 33 may be used to perform the implementation modes such as determining the target alarm mode in the above-mentioned steps.
  • the above-mentioned network alarm information sending unit 34 may be used to perform the implementation manners of sending network alarm information in the above-mentioned steps.
  • the implementation manners provided in the above-mentioned steps which will not be repeated here.
  • the above-mentioned network device identification setting unit 35 can be used to perform the above-mentioned steps to obtain network equipment, determine the network level of the network device, and set the network equipment identification and other implementation methods. For details, please refer to the implementation methods provided in the above-mentioned steps, which will not be repeated here. .
  • the above-mentioned alarm mode setting unit 36 can be used to implement the above-mentioned steps in setting the alarm mode corresponding to each network level and other implementation methods. For details, please refer to the implementation methods provided by the above-mentioned steps, which will not be repeated here.
  • the network alarm device can determine the target network level to which the network device corresponding to the network alarm information belongs based on the network device identifier in the network alarm information, and the corresponding target alarm mode can be determined through the target network level. So as to realize the classification of network alarms.
  • the embodiments of the present application provide a network alarm method and device, which can realize the classification of network alarms, has high alarm flexibility, is convenient for network security management, and has a wide application range.
  • FIG. 4 is a schematic structural diagram of a terminal device provided by an embodiment of the present application.
  • the terminal device in this embodiment may include: one or more processors 401 and a memory 402.
  • the aforementioned processor 401 and memory 402 are connected through a bus 403.
  • the memory 402 is configured to store a computer program, and the computer program includes program instructions.
  • the processor 401 is configured to execute the program instructions stored in the memory 402, and perform the following operations:
  • the above-mentioned network alarm information is sent to the network manager through the above-mentioned target alarm method.
  • the aforementioned processor 401 is configured to:
  • the above alarm word segmentation type includes at least one of time, identification, level, and failure;
  • the above-mentioned key information includes at least one of the alarm occurrence timestamp corresponding to the above-mentioned time, the network device identifier corresponding to the above-mentioned identifier, the alarm level corresponding to the above-mentioned level, and the alarm fault corresponding to the above-mentioned fault.
  • the aforementioned processor 401 is configured to:
  • the aforementioned processor 401 is configured to:
  • a network device identifier corresponding to each of the foregoing network devices is set, where any network device identifier is used to determine the network level to which any of the foregoing network devices belongs.
  • the network layers to which each network device belongs include at least a first network layer and a second network layer, and the alarm processing priority of the first network layer is higher than the second network layer; the processor 401 is used for:
  • the alarm immediacy of the first alarm method is higher than that of the second alarm method
  • the first alarm method includes one of telephone alarm, SMS alarm, and email alarm
  • the second alarm method includes telephone alarm
  • SMS alerts and email alerts is different from the above-mentioned first alert mode.
  • the foregoing network alarm information includes an alarm level; the foregoing processor 401 is configured to:
  • the above network alarm information is sent to the network manager through the above target alarm method
  • the number of occurrences of the alarm level is counted, and when the number of occurrences of the alarm level is greater than or equal to the preset number of times, the network alarm information is sent to the network manager through the target alarm method.
  • the foregoing network alarm information includes an alarm level and an alarm occurrence time stamp; the foregoing processor 401 is configured to:
  • the above network alarm information is sent to the network manager through the above target alarm method
  • the above alarm level is not greater than the preset level, determine the preset alarm delay time corresponding to the above alarm level, and start from the time stamp when the above alarm occurs. After the above preset alarm delay time, the above network alarm will be sent through the above target alarm method. The information is sent to the network manager.
  • the aforementioned processor 401 is configured to:
  • the target alarm mode is the first alarm mode, send the network alarm information to the one or more first network managers corresponding to the first alarm mode through the first alarm mode;
  • the target alarm mode is the second alarm mode, send the network alarm information to one or more second network managers corresponding to the second alarm mode through the second alarm mode;
  • the network fault handling authority of the first network manager is higher than the network fault handling authority of the second network manager.
  • the aforementioned processor 401 is configured to:
  • the network fault handling authority of each network manager is set according to the multiple work experience scores corresponding to the multiple network managers.
  • the aforementioned processor 401 may be a central processing unit (CPU), and the processor may also be other general-purpose processors or digital signal processors (DSP). , Application specific integrated circuit (ASIC), ready-made programmable gate array (field programmable gate array, FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the memory 402 may include a read-only memory and a random access memory, and provides instructions and data to the processor 401. A part of the memory 402 may also include a non-volatile random access memory. For example, the memory 402 may also store device type information.
  • the above-mentioned terminal device can execute the implementation manners provided in the steps in Figures 1 to 2 through its built-in functional modules.
  • the implementation manners provided in the above-mentioned steps which will not be repeated here.
  • the terminal device can determine the target network level to which the network device corresponding to the above network alarm information belongs based on the network device identifier in the network alarm information, and the corresponding target alarm mode can be determined through the target network level, thereby Classification of network alarms.
  • the embodiments of the present application provide a network alarm method and device, which can realize the classification of network alarms, has high alarm flexibility, is convenient for network security management, and has a wide application range.
  • the embodiment of the present application also provides a computer-readable storage medium, the computer-readable storage medium stores a computer program, and the computer program includes program instructions that, when executed by a processor, implement the steps shown in FIGS. 1 to 2
  • the computer program includes program instructions that, when executed by a processor, implement the steps shown in FIGS. 1 to 2
  • the provided network alarm method please refer to the implementation manner provided in the above steps for details, which will not be repeated here.
  • the foregoing computer-readable storage medium may be the network-level alarm device provided in any of the foregoing embodiments or the internal storage unit of the foregoing terminal device, such as the hard disk or memory of an electronic device.
  • the computer-readable storage medium may also be an external storage device of the electronic device, such as a plug-in hard disk, a smart media card (SMC), or a secure digital (SD) card equipped on the electronic device. Flash card, etc.
  • the computer-readable storage medium may also include both an internal storage unit of the electronic device and an external storage device.
  • the computer-readable storage medium is used to store the computer program and other programs and data required by the electronic device.
  • the computer-readable storage medium can also be used to temporarily store data that has been output or will be output.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本申请实施例公开了一种网络告警的方法及装置,该方法适用于网络管理。该方法包括:获取网络告警信息,提取所述网络告警信息中携带的网络设备标识;根据所述网络设备标识确定所述网络告警信息对应的网络设备所属的目标网络层级;根据所述目标网络层级确定所述网络告警信息对应的目标告警方式;通过所述目标告警方式将所述网络告警信息发送给网络管理者。采用本申请实施例,可实现网络告警的分级,告警灵活性高,便于网络安全管理,适用范围广。

Description

网络告警的方法及装置
本申请要求于2019年05月16日提交中国专利局、申请号为2019104091426、申请名称为“网络告警的方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及网络安全技术领域,尤其涉及一种网络告警的方法及装置。
背景技术
随着网络的普及,网络安全的形势日益严峻。可以理解的是,网络故障会造成网络性能的下降甚至导致整个网络系统的瘫痪,为了保证内部网络中的计算机和网络系统的安全,人们提出了针对网络故障的告警管理。告警管理通过对网络中各个网络设备的设备状态的监控,能够实时地反映出整个网络的运行状态,对于网络中发生的异常情况,能够为网络维护人员提供详细的异常信息及相应的处理解决方案。然而,现有技术的告警管理中存在网络故障告警的告警数量庞大,网络维护的难度高,网络维护的工作量大以及告警管理的灵活性差,适用性低等缺点。
发明内容
本申请实施例提供一种网络告警的方法及装置,可实现网络告警的分级管理,告警灵活性高,提高了网络安全管理的效率,适用范围广。
第一方面,本申请实施例提供了一种网络告警的方法,该方法包括:
获取网络告警信息,提取上述网络告警信息中携带的网络设备标识;
根据上述网络设备标识确定上述网络告警信息对应的网络设备所属的目标网络层级;
根据上述目标网络层级确定上述网络告警信息对应的目标告警方式;
通过上述目标告警方式将上述网络告警信息发送给网络管理者。
结合第一方面,在一种可能的实施方式中,上述获取网络告警信息包括:
确定告警分词类型,上述告警分词类型包括时间、标识、等级以及故障中的至少一项;
获取告警日志文件,并对上述告警日志文件中包括的文本进行分词处理以得到上述文本对应的多个分词;
从上述多个分词中各分词所属的分词类型中确定出属于上述告警分词类型的目标分词类型,并将上述目标分词类型对应的分词确定为上述告警日志文件的关键信息;
根据上述关键信息确定网络告警信息;
其中,上述关键信息包括上述时间对应的告警发生时间戳、上述标识对应的网络设备标识、上述等级对应的告警等级以及上述故障对应的告警故障中的至少一项。
第二方面,本申请实施例提供了一种网络告警的装置,该装置包括:
信息获取单元,用于获取网络告警信息,提取上述网络告警信息中携带的网络设备标识;
网络层级确定单元,用于根据上述信息获取单元确定的上述网络设备标识确定上述网络告警信息对应的网络设备所属的目标网络层级;
告警方式确定单元,用于根据上述网络层级确定单元确定的上述目标网络层级确定上述网络告警信息对应的目标告警方式;
网络告警信息发送单元,用于通过上述告警方式确定单元确定的上述目标告警方式将上述网络告警信息发送给网络管理者。
第三方面,本申请实施例提供了一种终端设备,该终端设备包括处理器和存储器,该处理器和存储器相互连接。该存储器用于存储支持该终端设备执行上述第一方面和/或第一方面任一种可能的实现方式提供的方法的计算机程序,该计算机程序包括程序指令,该处理器被配置用于调用上述程序指令,执行上述第一方面和/或第一方面任一种可能的实施方式所提供的方法。
第四方面,本申请实施例提供了一种计算机非易失性可读存储介质,该计算机非易失性可读存储介质存储有计算机程序,该计算机程序包括程序指令,该程序指令当被处理器执行时使该处理器执行上述第一方面和/或第一方面任一种可能的实施方式所提供的方法。
实施本申请实施例,具有如下有益效果:
通过提取网络告警信息中的网络设备标识,可以确定上述网络告警信息对应的网络设备所属的网络层级,通过网络层级确定对应的告警方式,从而实现网络告警的分级,使告警灵活性高,更加便于网络安全管理,适用范围广。
附图说明
图1是本申请实施例提供的网络告警方法的一流程示意图;
图2是本申请实施例提供的网络告警的另一流程示意图;
图3是本申请实施例提供的网络告警装置的结构示意图;
图4是本申请实施例提供的终端设备的结构示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
本申请实施例提供的网络告警的方法,可广泛适用于能够产生日志文件的网络设备。各个网络设备在运行期间会产生海量的日志文件,通过对获取到的告警日志文件进行解析可得到包括告警发生时间戳、网络设备标识、告警等级以及告警故障的关键信息,从而确定网络告警信息。根据上述网络告警信息中的网络设备标识,可以确定上述网络告警信息对应的网络设备所属的目标网络层级,通过目标网络层级能够确定其对应的目标告警方式,从而实现网络告警的分级。通过将上述网络告警信息中的告警等级与预设等级进行比较,可得到当上述告警等级大于预设等级时,将上述网络告警信息通过上述目标告警方式发送 给网络管理者;当上述告警等级小于或者等于预设等级时,统计上述告警等级发生的次数,当统计的次数大于或者等于预设次数时,再将上述网络告警信息通过上述目标告警方式发送给网络管理者,以提醒网络管理者网络设备在运行期间出现的故障和/或异常,且减少了告警数量。本申请实施例提供一种网络告警的方法及装置,可实现网络告警的分级,告警灵活性高,便于网络安全管理,适用范围广。
下面将结合图1至图4分别对本申请实施例提供的方法及相关装置分别进行详细说明。本申请实施例提供的方法中可包括用于获取网络告警信息、确定目标网络层级、确定目标告警方式、发送网络告警信息以及基于网络层级设置网络设备标识等数据处理阶段。其中,上述各个数据处理阶段的实现方式可参见如下图1至图2所示的实现方式。
参见图1,图1为本申请实施例提供的网络告警方法的一流程示意图。本申请实施例提供的方法可以包括如下步骤101至104:
101、获取网络告警信息,提取上述网络告警信息中携带的网络设备标识。
在一些可行的实施方式中,各个网络设备在运作时会产生一个叫log的事件记录,就是我们常说的日志文件,日志文件作为一个内容不断在增长的文件,就像网络设备的生命记录仪,详细记录下了网络设备运行的点点滴滴。其中,网络设备是指能够产生日志文件的计算机、服务器、系统、交换机、路由器、调制解调器、门禁、UPS(Uninterruptible Power Supply,不间断电源)、监控、摄像头等,具体可根据实际应用场景确定,在此不做限制。随着分布式系统成为企业应用的主流形态,由网络设备产生的日志文件的数量更是变得庞大而种类多样化,于是,通过设置筛查参数对接收的日志文件进行筛选,可从海量日志文件中找出感兴趣日志文件。其中,上述感兴趣日志文件是指包含错误和/或警告和/或异常和/或重要信息的日志文件,具体可根据实际应用场景确定,在此不做限制。在本申请实施例中,通过获取预设的告警分词类型,可确定出告警分词类型包括但不限于时间、标识、等级、故障以及设备名称等,在此不做限制。通过对获取到的告警日志文件中包括的文本进行分词处理,可得到该文本对应的多个分词。然后基于语义分析可确定出上述多个分词中各分词所属的分词类型,其中,任一属于上述告警分词类型的分词类型即为目标分词类型,且目标分词类型对应的分词即为上述告警日志文件的关键信息。在本申请实施例中,可将上述关键信息直接作为网络告警信息,其中,上述关键信息包括告警发生时间戳、网络设备标识、告警等级以及告警故障等,具体可根据实际应用场景确定,在此不做限制。可以理解的是,分词处理就是将连续的字序列按照一定的规范重新组合成词序列的过程。例如,假设告警日志文件1中包括文本“A类交换机发生丢包”,基于分词处理,可将文本“A类交换机发生丢包”划分成“A类”、“交换机”、“发生”以及“丢包”4个分词。通过对上述4个分词进行语义分析,可确定出上述4个分词分别所属的分词类型为“标识”、“设备名称”、“助词”以及“故障”。通过将上述4个分词中各分词所属的分词类型与预设的告警分词类型进行匹配,可确定出目标分词类型为“标识”、“设备名称”以及“故障”,进而可将目标分词类型对应的分词“A类”、“交换机”以及“丢包”确定为告警日志文件1的关键信息,这里,关键信息“A类”、“交换机”以及“丢包”可直接作为网络告警信息。
可选的,在一些可行的实施方式中,由于当前国际上还没有形成标准的日志文件的格式,因此不同厂商的网络设备所产生的告警日志文件的语法结构和/或描述格式通常会有较 大差异。因此,在获取告警日志文件后,可对上述告警日志文件的各个字段进行解析,得到一些关键信息,将上述关键信息按设定的规则进行整理,并将整理后的关键信息作为本申请实施例中的网络告警信息。其中,上述设定的规则可以是将获取到的关键信息按照设定的排列格式进行排序,例如可以按照告警发生时间戳、网络设备标识、告警等级和告警故障的顺序整理获取到的关键信息以作为网络告警信息,也可以是按照告警发生时间戳、告警等级、网络设备标识和告警故障的顺序整理获取到的关键信息以作为网络告警信息,具体可根据实际应用场景确定,在此不做限制。
在一些可行的实施方式中,通过获取上述网络告警信息,可提取上述网络告警信息中携带的网络设备标识,其中,上述网络设备标识可以是网络设备名称、字符标识等,具体可根据实际应用场景确定,在此不做限制。其中,任一网络设备标识能够确定任一网络设备所属的网络层级。
102、根据上述网络设备标识确定上述网络告警信息对应的网络设备所属的目标网络层级。
在一些可行的实施方式中,任一网络设备标识能够确定任一网络设备所属的网络层级。其中,上述网络设备标识可以是网络设备名称、字符标识等。例如,在一些应用场景中,CSW(CoreSwitch,核心交换机)、DSW(DistributionSwitch,汇聚交换机)和ASW(Access Switch,接入交换机)分别是核心层、汇聚层和接入层的交换机名称。于是,根据交换机名称可确定CSW、DSW和ASW分别对应的目标网络层级是核心层,汇聚层和接入层。又举例来说,如果是字符标识,对于交换机来讲,位于核心层、汇聚层和接入层的交换机还可以是A类交换机,B类交互机,C类交互机。其中,字符标识“A类”、“B类”和“C类”对应的目标网络层级分别是核心层,汇聚层和接入层。
103、根据上述目标网络层级确定上述网络告警信息对应的目标告警方式。
在一些可行的实施方式中,当网络设备在网络结构中所处的位置不同时,其发生故障时影响范围也是不同的。举例来说,对于核心层交换机来讲,由于核心层是网络主干部分,是整个网络性能的保障,因此当核心交换机产生包含错误信息的日志文件时,应立即发出告警引起网络管理者的重点关注。其中,告警方式包括但不限于电话告警、短信告警、邮件告警等,具体可根据实际应用场景而确定,在此不做限制。不难理解的是,为了对来自不同网络层级的告警加以区分以及优先处理核心网络设备产生的告警,可针对不同的网络层级设置不同的告警方式。
举例来说,对于核心层网络设备所产生的告警,由于一个小问题就可能导致整个网络的瘫痪,因此可设置核心层对应的告警方式是第一告警方式“电话告警”。对于汇聚层网络设备所产生的告警,由于汇聚层网络设备是多台接入层网络设备的汇聚点,因此可设置汇聚层的告警方式是第二告警方式“短信告警”。而对于接入层网络设备来讲,由于接入层是为用户提供在本地网段访问应用系统的能力,因此可设置接入层的告警方式是第三告警方式“邮件告警”。其中,第一告警方式的告警即时性高于第二告警方式的告警即时性,第二告警方式的告警即时性高于所述第三告警方式的告警即时性。在本申请实施例中,电话告警的告警即时性高于短信告警的告警即时性,短信告警的告警即时性高于邮件告警的告警即时性,当然,并不排除其他情况下还有即时性更高的告警方式,具体可根据实际应用场 景而确定,在此不做限制。当获取的网络告警信息中的网络设备标识是“A类”时,根据网络设备标识与网络层级间的对应关系,可确定A类交换机对应的目标网络层级是核心层,根据网络层级与告警方式间的对应关系,可确定核心层的告警方式为第一告警方式,即A类交换机对应的网络告警信息的目标告警方式为“电话告警”。
104、通过上述目标告警方式将上述网络告警信息发送给网络管理者。
在一些可行的实施方式中,告警的目的在于提醒网络管理者和/或技术人员网络某处发生了网络故障,并希望网络管理者和/或技术人员能够尽快解决产生的故障,及时止损。考虑到时间成本以及人力开销,通常不可能选择将一个网络告警信息发给所有的网络管理者和/或技术人员,因此在分工时,可按照地理区域和/或网络层级等划分方式为各个网络告警信息指定相应的网络管理者和/或技术人员,这样做的好处是能够让网络管理者和/或技术人员能够知晓自己的职责范围,做到各司其职。于是,在确定目标告警方式及对应的一个或者多个网络管理者和/或技术人员之后,可通过目标告警方式将上述网络告警信息发送给对应的一个或者多个网络管理者和/或技术人员,以提醒网络管理者和/或技术人员网络某处发生了网络故障。
可选的,在一些可行的实施方式中,由于各网络层级的重要性不同,已为不同网络层级的告警设置了不同的告警方式,其中,由于第一网络层级的告警处理优先级高于第二网络层级,因此,设置的第一网络层级对应的第一告警方式的告警即时性高于第二网络层级对应的第二告警方式的告警即时性。不难理解的是,由于各网络层级的重要性不同,还可以为不同的网络层级设置具有不同网络故障处理权限的网络管理者。一般而言,第一告警方式可对应设置第一网络管理者,第二告警方式可对应设置第二网络管理者,这里,由于第一告警方式对应的第一网络层级的网络故障处于最高处理优先级,因此第一网络管理者的网络故障处理权限应高于第二网络管理者的网络故障处理权限。具体地,网络故障处理权限可根据网络管理者的工作经验或业务熟练度或工作岗位技术性进行设置。例如,如果以工作经验或业务熟练度对网络管理者进行权限设置,则可将经验丰富(比如历史业务处理次数多、历史业务处理成功次数多和/或业务处理累积时长较长)的网络管理者设置为网络故障处理权限高的网络管理者,如果以工作岗位技术性对网络管理者进行权限设置,则可将技术性强的人员(比如开发人员)设置为网络故障处理权限高的网络管理者,将技术性弱的人员(比如客服人员)设置为网络故障处理权限低的网络管理者,具体可根据实际应用场景确定,在此不做限制。
举例来说,假设负责处理电话告警的网络管理者是“管理员a”,当获取网络告警信息“2018-12-3 11:54:35 A类交换机error邮件发送出现错误”时,通过网络设备标识“A类”可确定上述“A类交换机”属于核心层,且对应的目标告警方式和网络管理者分别为“电话告警”和“管理员a”。于是,可通过“电话告警”的方式将上述网络告警信息“2018-12-3 11:54:35 A类交换机error邮件发送出现错误”发送给“管理员a”。
在本申请实施例中,通过对获取到的告警日志文件进行解析可得到包括告警发生时间戳、网络设备标识、告警等级以及告警故障的关键信息,从而确定网络告警信息。根据上述网络告警信息中的网络设备标识,可以确定上述网络告警信息对应的网络设备所属的目标网络层级,通过目标网络层级能够确定其对应的目标告警方式,从而实现网络告警的分 级。将上述网络告警信息通过上述目标告警方式发送给网络管理者,能够提醒网络管理者网络设备在运行期间出现的故障和/或异常。本申请实施例提供一种网络告警的方法及装置,可实现网络告警的分级,告警灵活性高,便于网络安全管理,适用范围广。
参见图2,图2是本申请实施例提供的网络告警方法的另一流程示意图。本申请实施例提供的网络告警的方法可通过如下步骤201至207提供的实现方式进行说明:
201、获取多个网络设备,基于上述各个网络设备所属的网络层级,设置上述各个网络设备对应的网络设备标识。
在一些可行的实施方式中,计算机网络是一个非常复杂的系统,需要解决的问题很多并且性质各不相同,所以人们在设计网络时提出了“分层”的思想,即将复杂的网络设计分成几个层次,每个层次着重于某些特定的功能,这样就能够使一个复杂的大问题变成许多简单的小问题。
举例来说,在一个公司的组织架构里,通常会有高层管理、中层管理和基层员工。高层管理主要负责整个公司战略计划、发展方向等核心内容;中层管理则起着执行高层传达下来的策略,并管理广大的基层员工,实际上是起着上传下达的作用;而基层员工的职责就是执行中层管理分配的各项工作任务,简而言之就是埋头干活。
在一些可行的实施方式中,与公司组织架构中的三层架构相似,网络构成方式中也有一个三层网络架构,分别是接入层、汇聚层和核心层,这三个层次分别侧重于某些特定的功能。其中,核心层主要用于网络的高速交换主干,汇聚层着重于提供基于策略的连接,而接入层则负责将包括电脑,无线访问接入点(WirelessAccessPoint,简称AP)等在内的工作站接入到网络。从物理连接的角度看,组成每一层网络架构的实体其实是一些网络设备,其中,上述网络设备包括但不限于计算机、服务器、系统、交换机、路由器、调制解调器、门禁、UPS、监控、摄像头等,具体可根据实际应用场景确定,在此不做限制。根据网络设备在网络结构中所处位置的划分,网络设备也有不同的层级,举例来说,我们通常提到的接入层交换机、汇聚层交换机、核心层交换机并非根据交换机本身的种类或者属性进行分类的,而是根据其在网络结构中所处位置的划分。其中,核心层是网络的枢纽中心,重要性突出,因此核心层交换机是三层交换机,它的性能比汇聚层交换机和接入层交换机都要高。汇聚层是网络接入层和核心层的“中介”,因此汇聚层交换机可以是二层和/或三层交换机,汇聚层交换机的性能介于核心层交换机和接入层交换机之间,与接入层交换机相比,性能更高。接入层的主要目的是允许终端用户连接到网络,因此接入层交换机属于二层交换机,性能最低。不难理解的是,通过对网络设备的命名和/或设置网络设备标识能够体现网络设备的网络层级。
举例来说,通过对网络设备的命名体现网络设备的网络层级,可以在网络设备的名称中直接添加其所在的网络层级。例如,对于交换机来讲,可以将其命名为核心层交换机、汇聚层交换机、接入层交换机。通过设置网络设备标识体现网络设备的网络层级,可以在网络设备的名称中添加字符和/或符号,例如,对于交换机来讲,可设置位于核心层、汇聚层和接入层的交换机的网络设备标识分别是A类、B类、C类或者是I类、II类、III类等,具体可根据实际应用场景确定,在此不做限制。
202、设置各个网络层级对应的告警方式。
在一些可行的实施方式中,网络设备在运作时会产生一个叫log的事件记录,就是我们常说的日志文件,通常情况下,网络管理者通过查看日志文件的内容,能够及时了解网络设备的软硬件信息、检查配置过程中的错误及错误发生的原因。可以理解的是,由于网络设备所处网络结构中位置的不同,其发生网络故障时,其故障影响的范围也不一样。如果网络层级包括第一网络层级和第二网络层级且第一网络层级的重要性大于第二网络层级,因此可设置第一网络层级对应的告警方式为第一告警方式,第二网络层级对应的告警方式为第二告警方式,其中,第一告警方式的告警即时性高于第二告警方式的告警即时性。即,对于最核心的和/或优先级最高的和/或故障影响范围最大的网络层级,其对应的告警方式应该设置成即时性最高的,以便在该层网络中出现网络告警信息时第一时间引起网络管理者的重点关注。
举例来说,核心层是网络中的主干部分,因此核心层网络设备出现的一个小问题也极可能导致整个网络的瘫痪。于是,为了在告警阶段就能初步确定网络设备所属的网络层级和/或确定产生的网络告警信息的重要程度,在设置网络设备标识之后,还可以为各个网络层级匹配不同的告警方式,告警方式包括但不限于电话告警、短信告警、邮件告警等,具体可根据实际应用场景确定,在此不做限制。其中,对于核心层网络设备所产生的告警,由于核心层牵一发而动全身的特性,因此可以设置其告警方式是电话告警,对于汇聚层网络设备所产生的告警,由于汇聚层是多台接入层网络设备的汇聚点,因此可以设置其告警方式是短信告警,而对于接入层网络设备来讲,由于接入层是为用户提供在本地网段访问应用系统的能力,因此可以设置其告警方式是邮件告警。这里,我们认为电话告警的即时性高于短信告警,短信告警的即时性高于邮件告警。
203、设置各个告警方式对应的网络管理者。
在一些可行的实施方式中,网络管理者通常不止一人,为了给网络管理者设置明确的分工,可以通过不同的划分方式为网络管理者指定管辖范围。例如,可以将属于相同网络层级的网络告警信息通过对应的告警方式发送给对应的一个或者多个网络管理者,也可以根据地理位置,将位于某一区域的网络设备划分给相应的一个或者多个网络管理者负责维护。
204、获取网络告警信息,提取上述网络告警信息中携带的网络设备标识。
205、根据上述网络设备标识确定上述网络告警信息对应的网络设备所属的目标网络层级。
206、根据上述目标网络层级确定上述网络告警信息对应的目标告警方式。
其中,步骤204-206的具体实现过程请参见图1所对应的实施例中步骤101-103所提供的实现方式,这里不再进行赘述。
207、提取上述网络告警信息中携带的告警等级,确定上述告警等级是否大于预设等级;若上述告警等级不大于预设等级,则统计上述告警等级发生的次数,当上述告警等级发生的次数大于或者等于预设次数时,通过上述目标告警方式将上述网络告警信息发送给网络管理者。
在一些可行的实施方式中,一些应用场景里可能会同时运营上万台网络设备,因此即使是只查看属于某一相同网络层级中的各个网络设备在同一时刻和/或在某一段时间内产 生的网络告警信息的数量也是非常庞大的,且同一网络层级中各个网络设备的故障严重程度也不一样。此时,如果把上述网络设备产生的每一条网络告警信息都即时地发送给网络管理者,那么网络维护的难度和工作量也是非常巨大的。因此,对于故障程度很小的网络告警信息,可选择延迟告警。
在一些可行的实施方式中,通过提取网络告警信息中携带的告警等级,可确定网络设备的故障严重程度,然后获取事先设置的多个告警等级中各告警等级对应的允许发出网络告警信息时的告警等级发生次数阈值(为方便描述,简称预设次数),并将统计的网络设备产生某个告警等级的网络告警信息的发生次数与预设次数进行比较,可确定是否通过目标告警方式将网络告警信息发送给网络管理者。在实际应用中,当告警等级是一级告警时,即包括emerg、alert、crit时,可确定网络设备在运行时出现了严重故障或重大错误,于是可通过目标告警方式立即将网络告警信息发送给对应的网络管理者。换句话说,一级告警对应的预设次数为1次,一旦某个网络设备产生了一级告警,则通过目标告警方式立即将网络告警信息发送给对应的网络管理者,以便网络管理者在接收网络告警信息后即时排查网络故障。当告警等级是二级告警error时,通常表明虽然网络中发生了错误事件,但仍然不影响系统的继续运行,此时,可统计该网络设备产生error的次数,当error的统计次数大于或者等于error预设次数时,通过目标告警方式将网络告警信息发送给对应的网络管理者。当告警等级是三级告警warning时,通常表明网络设备可能出现了潜在错误,此时,可统计该网络设备产生warning的次数,当warning的统计次数大于或者等于warning预设次数时,通过目标告警方式将网络告警信息发送给对应的网络管理者。其中,上述error预设次数和上述warning预设次数可以是相同的,也可以设置成不同且error预设次数和warning预设次数都大于1次,具体根据实际应用场景而确定,在此不做限制。可以理解的是,当统计次数小于预设次数时,网络告警信息将不会发出,且预设次数设置得越大,则告警的延迟程度也越大,通过设定的预设次数实现延迟告警的方式,可大大减少网络管理者接收到的告警数量,既避免了大量的重复告警,同时能够做到对网络管理者的适时提醒。
举例来说,假设负责处理电话告警的网络管理者是“管理员a”和“管理员b”,负责处理短信告警的网络管理者是“管理员c”,负责处理邮件告警的网络管理者是“管理员d”。当获取网络告警信息“2018-12-3 11:54:35 A类交换机alert丢包”时,通过网络设备标识“A类”可确定上述“A类交换机”属于核心层。通过事先设置的各个网络层级对应的告警方式,可确定核心层对应的目标告警方式为“电话告警”,通过事先设置的各个告警方式对应的网络管理者,可确定负责“电话告警”的网络管理者是“管理员a”和“管理员b”。由于告警等级“alert”属于一级告警,于是,可通过“电话告警”的方式将上述网络告警信息“2018-12-3 11:54:35 A类交换机alert丢包”发送给“管理员a”和“管理员b”。
可选的,在一些可行的实施方式中,还可以通过将提取的网络告警信息中的告警等级与预设等级进行比较,可确定上述告警等级是否大于预设等级。具体地,若上述告警等级大于预设等级,则立即通过上述目标告警方式将上述网络告警信息发送给网络管理者。若上述告警等级小于或者等于预设等级,则统计上述告警等级发生的次数,直到上述告警等级发生的次数大于或者等于预设次数时,将上述网络告警信息以目标告警方式发送给网络 管理者。可以理解的是,通过设定预设等级和预设次数,当告警等级小于预设等级且统计次数小于预设次数时,网络告警信息将不会发出,通过这种方式,同样可以减少网络管理者接收到的告警数量,既避免了大量的重复告警,同时能够做到对网络管理者的适时提醒。
举例来说,假设负责处理短信告警的网络管理者是“管理员c”,其中,预设等级设置成二级告警,预设次数设置为5次。当获取网络告警信息“2018-12-4 10:23:35B类交换机1 error邮件发送出现错误”时,通过网络设备标识“B类”可确定上述“B类交换机1”属于汇聚层,其对应的目标告警方式和网络管理者分别为“短信告警”和“管理员c”。由于告警等级error是二级告警,其等于预设等级中的二级告警,于是,统计上述“B类交换机1”中“error”的发生次数。如果“B类交换机1”产生“error”的统计次数等于6,可确定上述统计次数大于预设次数5。因此,通过“短信告警”的方式将上述网络告警信息“2018-12-4 10:23:35 B类交换机1error邮件发送出现错误”发送给“管理员c”。
可选的,在一些可行的实施方式中,还可以通过事先设定出预设等级以及预设告警延迟时间来控制故障严重程度较低的网络告警信息的发出,以避免网络管理者在故障高发时段收到大量低告警等级的网络告警信息。具体地,当获取到某个网络设备的网络告警信息时,可提取网络告警信息中携带的告警等级和告警发生时间戳,并将提取出的告警等级与预设等级进行比较。若告警等级大于预设等级,说明该网络设备出现了严重故障,则立即通过目标告警方式将网络告警信息发送给网络管理者,以提醒网络管理者网络中出现重大故障。若告警等级不大于预设等级,说明该网络设备的故障程度较低,短时间内都不会影响整个网络的运行,此时可采用延迟告警以避免故障高发时段占用有限的网络管理者资源。具体地,通过确定出该告警等级对应的预设告警延迟时间,可从上述告警发生时间戳开始,经预设告警延迟时间后,再将网络告警信息以目标告警方式发送给网络管理者。这样既避免了故障高发时段较低故障网络告警信息的发出,同时可控制低故障网络告警信息在空闲时段发出以对网络管理者作出适时提醒。
在本申请实施例中,通过对获取到的告警日志文件进行解析可得到包括告警发生时间戳、网络设备标识、告警等级以及告警故障的关键信息,从而确定网络告警信息。根据上述网络告警信息中的网络设备标识,可以确定上述网络告警信息对应的网络设备所属的目标网络层级,并通过目标网络层级能够确定其对应的目标告警方式,从而实现网络告警的分级。通过将上述网络告警信息中的告警等级与预设等级进行比较,可得到当上述告警等级大于预设等级时,将上述网络告警信息通过上述目标告警方式发送给网络管理者;当上述告警等级小于或者等于预设等级时,统计上述告警等级发生的次数,当统计的次数大于或者等于预设次数时,再将上述网络告警信息通过上述目标告警方式发送给网络管理者,以提醒网络管理者网络设备在运行期间出现的故障和/或异常,且减少了告警数量。本申请实施例提供一种网络告警的方法及装置,可实现网络告警的分级,告警灵活性高,便于网络安全管理,适用范围广。
参见图3,图3是本申请实施例提供的网络告警装置的结构示意图。本申请实施例提供的网络告警装置包括:
信息获取单元31,用于获取网络告警信息,提取上述网络告警信息中携带的网络设备标识。
网络层级确定单元32,用于根据上述信息获取单元31确定的上述网络设备标识确定上述网络告警信息对应的网络设备所属的目标网络层级。
告警方式确定单元33,用于根据上述网络层级确定单元32确定的上述目标网络层级确定上述网络告警信息对应的目标告警方式。
网络告警信息发送单元34,用于通过上述告警方式确定单元33确定的上述目标告警方式将上述网络告警信息发送给网络管理者。
在一些可行的实施方式中,上述信息获取单元31具体用于:
确定告警分词类型,上述告警分词类型包括时间、标识、等级以及故障中的至少一项;
获取告警日志文件,并对上述告警日志文件中包括的文本进行分词处理以得到上述文本对应的多个分词;
从上述多个分词中各分词所属的分词类型中确定出属于上述告警分词类型的目标分词类型,并将上述目标分词类型对应的分词确定为上述告警日志文件的关键信息;
根据上述关键信息确定网络告警信息;
其中,上述关键信息包括上述时间对应的告警发生时间戳、上述标识对应的网络设备标识、上述等级对应的告警等级以及上述故障对应的告警故障中的至少一项。
在一些可行的实施方式中,上述信息获取单元31还用于:
获取预设信息排列格式,将所述关键信息按照所述预设信息排列格式进行排序,以得到网络告警信息。
在一些可行的实施方式中,上述网络告警的装置还包括:
网络设备标识设置单元35,用于获取多个网络设备,确定上述多个网络设备中各个网络设备所属的网络层级;
网络设备标识设置单元35,还用于基于上述各个网络设备所属的网络层级,设置上述各个网络设备对应的网络设备标识,其中,任一网络设备标识用于确定上述任一网络设备所属的网络层级。
在一些可行的实施方式中,上述各个网络设备所属的网络层级中至少包括第一网络层级和第二网络层级,上述第一网络层级的告警处理优先级高于上述第二网络层级;上述网络设备的装置还包括:
告警方式设置单元36,用于设置上述第一网络层级对应的告警方式为第一告警方式,设置上述第二网络层级对应的告警方式为第二告警方式;
其中,上述第一告警方式的告警即时性高于上述第二告警方式的告警即时性,上述第一告警方式包括电话告警、短信告警以及邮件告警中的一种,上述第二告警方式包括电话告警、短信告警以及邮件告警中的一种且与上述第一告警方式不同。
在一些可行的实施方式中,上述网络告警信息中包括告警等级;上述网络告警信息发送单元34用于:
提取上述网络告警信息中携带的告警等级,确定上述告警等级是否大于预设等级;
若上述告警等级大于预设等级,则通过上述目标告警方式将上述网络告警信息发送给网络管理者;
若上述告警等级不大于预设等级,则统计上述告警等级发生的次数,当上述告警等级 发生的次数大于或者等于预设次数时,通过上述目标告警方式将上述网络告警信息发送给网络管理者。
在一些可行的实施方式中,上述网络告警信息中包括告警等级和告警发生时间戳;上述网络告警信息发送单元34用于:
提取上述网络告警信息中携带的告警等级和告警发生时间戳,并确定上述告警等级是否大于预设等级;
若上述告警等级大于预设等级,则通过上述目标告警方式将上述网络告警信息发送给网络管理者;
若上述告警等级不大于预设等级,则确定上述告警等级对应的预设告警延迟时间,并从上述告警发生时间戳开始,经上述预设告警延迟时间后,通过上述目标告警方式将上述网络告警信息发送给网络管理者。
在一些可行的实施方式中,上述网络告警信息发送单元34具体用于:
若上述目标告警方式是第一告警方式,则通过上述第一告警方式将上述网络告警信息发送给上述第一告警方式对应的一个或者多个第一网络管理者;
若上述目标告警方式是第二告警方式,则通过上述第二告警方式将上述网络告警信息发送给上述第二告警方式对应的一个或者多个第二网络管理者;
其中,上述第一网络管理者的网络故障处理权限高于上述第二网络管理者的网络故障处理权限。
在一些可行的实施方式中,所述装置还包括:
网络故障处理权限设置单元,用于获取多个网络管理者中各网络管理者的工作记录参数,其中所述工作记录参数包括历史业务处理次数、历史业务处理成功次数、业务处理累积时长;
对任一网络管理者对应的工作记录参数进行归一化处理以得到预处理工作记录参数;
获取所述预处理工作记录参数中各工作记录参数对应的参数权重,基于所述预处理工作记录参数、所述参数权重确定所述任一网络管理者对应的工作经验得分;
根据所述多个网络管理者对应的多个工作经验得分设置各网络管理者的网络故障处理权限。
具体实现中,上述网络告警装置可通过其内置的各个功能模块执行如上述图1至图2中各个步骤所提供的实现方式。例如,上述信息获取单元31可用于执行上述各个步骤中获取网络告警信息以及提取网络设备标识等实现方式,具体可参见上述各个步骤所提供的实现方式,在此不再赘述。上述网络层级确定单元32可用于执行上述各个步骤中确定目标网络层级等相关步骤所描述的实现方式,具体可参见上述各个步骤所提供的实现方式,在此不再赘述。上述告警方式确定单元33可用于执行上述各个步骤中确定目标告警方式等实现方式,具体可参见上述各个步骤所提供的实现方式,在此不再赘述。上述网络告警信息发送单元34可用于执行上述各个步骤中发送网络告警信息等实现方式,具体可参见上述各个步骤所提供的实现方式,在此不再赘述。上述网络设备标识设置单元35可用于执行上述各个步骤中获取网络设备,确定网络设备的网络层级以及设置网络设备标识等实现方式,具体可参见上述各个步骤所提供的实现方式,在此不再赘述。上述告警方式设置单元36可用 于执行上述各个步骤中设置各个网络层级对应的告警方式等实现方式,具体可参见上述各个步骤所提供的实现方式,在此不再赘述。
在本申请实施例中,网络告警的装置可基于网络告警信息中的网络设备标识,确定上述网络告警信息对应的网络设备所属的目标网络层级,通过目标网络层级能够确定其对应的目标告警方式,从而实现网络告警的分级。通过将上述网络告警信息中的告警等级与预设等级进行比较,可得到当上述告警等级大于预设等级时,将上述网络告警信息通过上述目标告警方式发送给网络管理者;当上述告警等级小于或者等于预设等级时,统计上述告警等级发生的次数,当统计的次数大于或者等于预设次数时,再将上述网络告警信息通过上述目标告警方式发送给网络管理者,以提醒网络管理者网络设备在运行期间出现的故障和/或异常,且减少了告警数量。本申请实施例提供一种网络告警的方法及装置,可实现网络告警的分级,告警灵活性高,便于网络安全管理,适用范围广。
参见图4,图4是本申请实施例提供的终端设备的结构示意图。如图4所示,本实施例中的终端设备可以包括:一个或多个处理器401和存储器402。上述处理器401和存储器402通过总线403连接。存储器402用于存储计算机程序,该计算机程序包括程序指令,处理器401用于执行存储器402存储的程序指令,执行如下操作:
获取网络告警信息,提取上述网络告警信息中携带的网络设备标识;
根据上述网络设备标识确定上述网络告警信息对应的网络设备所属的目标网络层级;
根据上述目标网络层级确定上述网络告警信息对应的目标告警方式;
通过上述目标告警方式将上述网络告警信息发送给网络管理者。
在一些可行的实施方式中,上述处理器401用于:
确定告警分词类型,上述告警分词类型包括时间、标识、等级以及故障中的至少一项;
获取告警日志文件,并对上述告警日志文件中包括的文本进行分词处理以得到上述文本对应的多个分词;
从上述多个分词中各分词所属的分词类型中确定出属于上述告警分词类型的目标分词类型,并将上述目标分词类型对应的分词确定为上述告警日志文件的关键信息;
根据上述关键信息确定网络告警信息;
其中,上述关键信息包括上述时间对应的告警发生时间戳、上述标识对应的网络设备标识、上述等级对应的告警等级以及上述故障对应的告警故障中的至少一项。
在一些可行的实施方式中,上述处理器401用于:
获取预设信息排列格式,将所述关键信息按照所述预设信息排列格式进行排序,以得到网络告警信息。
在一些可行的实施方式中,上述处理器401用于:
获取多个网络设备,确定上述多个网络设备中各个网络设备所属的网络层级;
基于上述各个网络设备所属的网络层级,设置上述各个网络设备对应的网络设备标识,其中,任一网络设备标识用于确定上述任一网络设备所属的网络层级。
在一些可行的实施方式中,上述各个网络设备所属的网络层级中至少包括第一网络层级和第二网络层级,上述第一网络层级的告警处理优先级高于上述第二网络层级;上述处理器401用于:
设置上述第一网络层级对应的告警方式为第一告警方式;
设置上述第二网络层级对应的告警方式为第二告警方式;
其中,上述第一告警方式的告警即时性高于上述第二告警方式的告警即时性,上述第一告警方式包括电话告警、短信告警以及邮件告警中的一种,上述第二告警方式包括电话告警、短信告警以及邮件告警中的一种且与上述第一告警方式不同。
在一些可行的实施方式中,上述网络告警信息中包括告警等级;上述处理器401用于:
提取上述网络告警信息中携带的告警等级,确定上述告警等级是否大于预设等级;
若上述告警等级大于预设等级,则通过上述目标告警方式将上述网络告警信息发送给网络管理者;
若上述告警等级不大于预设等级,则统计上述告警等级发生的次数,当上述告警等级发生的次数大于或者等于预设次数时,通过上述目标告警方式将上述网络告警信息发送给网络管理者。
在一些可行的实施方式中,上述网络告警信息中包括告警等级和告警发生时间戳;上述处理器401用于:
提取上述网络告警信息中携带的告警等级和告警发生时间戳,并确定上述告警等级是否大于预设等级;
若上述告警等级大于预设等级,则通过上述目标告警方式将上述网络告警信息发送给网络管理者;
若上述告警等级不大于预设等级,则确定上述告警等级对应的预设告警延迟时间,并从上述告警发生时间戳开始,经上述预设告警延迟时间后,通过上述目标告警方式将上述网络告警信息发送给网络管理者。
在一些可行的实施方式中,上述处理器401用于:
若上述目标告警方式是第一告警方式,则通过上述第一告警方式将上述网络告警信息发送给上述第一告警方式对应的一个或者多个第一网络管理者;
若上述目标告警方式是第二告警方式,则通过上述第二告警方式将上述网络告警信息发送给上述第二告警方式对应的一个或者多个第二网络管理者;
其中,上述第一网络管理者的网络故障处理权限高于上述第二网络管理者的网络故障处理权限。
在一些可行的实施方式中,上述处理器401用于:
获取多个网络管理者中各网络管理者的工作记录参数,其中所述工作记录参数包括历史业务处理次数、历史业务处理成功次数、业务处理累积时长;
对任一网络管理者对应的工作记录参数进行归一化处理以得到预处理工作记录参数;
获取所述预处理工作记录参数中各工作记录参数对应的参数权重,基于所述预处理工作记录参数、所述参数权重确定所述任一网络管理者对应的工作经验得分;
根据所述多个网络管理者对应的多个工作经验得分设置各网络管理者的网络故障处理权限。
应当理解,在一些可行的实施方式中,上述处理器401可以是中央处理单元(central processing unit,CPU),该处理器还可以是其他通用处理器、数字信号处理器(digital  signal processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现成可编程门阵列(field programmable gate array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。该存储器402可以包括只读存储器和随机存取存储器,并向处理器401提供指令和数据。存储器402的一部分还可以包括非易失性随机存取存储器。例如,存储器402还可以存储设备类型的信息。
具体实现中,上述终端设备可通过其内置的各个功能模块执行如上述图1至图2中各个步骤所提供的实现方式,具体可参见上述各个步骤所提供的实现方式,在此不再赘述。
在本申请实施例中,终端设备可基于网络告警信息中的网络设备标识,确定上述网络告警信息对应的网络设备所属的目标网络层级,通过目标网络层级能够确定其对应的目标告警方式,从而实现网络告警的分级。通过将上述网络告警信息中的告警等级与预设等级进行比较,可得到当上述告警等级大于预设等级时,将上述网络告警信息通过上述目标告警方式发送给网络管理者;当上述告警等级小于或者等于预设等级时,统计上述告警等级发生的次数,当统计的次数大于或者等于预设次数时,再将上述网络告警信息通过上述目标告警方式发送给网络管理者,以提醒网络管理者网络设备在运行期间出现的故障和/或异常,且减少了告警数量。本申请实施例提供一种网络告警的方法及装置,可实现网络告警的分级,告警灵活性高,便于网络安全管理,适用范围广。
本申请实施例还提供一种计算机可读存储介质,该计算机可读存储介质存储有计算机程序,该计算机程序包括程序指令,该程序指令被处理器执行时实现图1至图2中各个步骤所提供的网络告警的方法,具体可参见上述各个步骤所提供的实现方式,在此不再赘述。
上述计算机可读存储介质可以是前述任一实施例提供的网络层级告警的装置或者上述终端设备的内部存储单元,例如电子设备的硬盘或内存。该计算机可读存储介质也可以是该电子设备的外部存储设备,例如该电子设备上配备的插接式硬盘,智能存储卡(smart media card,SMC),安全数字(secure digital,SD)卡,闪存卡(flash card)等。进一步地,该计算机可读存储介质还可以既包括该电子设备的内部存储单元也包括外部存储设备。该计算机可读存储介质用于存储该计算机程序以及该电子设备所需的其他程序和数据。该计算机可读存储介质还可以用于暂时地存储已经输出或者将要输出的数据。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (20)

  1. 一种网络告警的方法,其特征在于,所述方法包括:
    获取网络告警信息,提取所述网络告警信息中携带的网络设备标识;
    根据所述网络设备标识确定所述网络告警信息对应的网络设备所属的目标网络层级;
    根据所述目标网络层级确定所述网络告警信息对应的目标告警方式;
    通过所述目标告警方式将所述网络告警信息发送给网络管理者。
  2. 根据权利要求1所述方法,其特征在于,所述获取网络告警信息包括:
    确定告警分词类型,所述告警分词类型包括时间、标识、等级以及故障中的至少一项;
    获取告警日志文件,并对所述告警日志文件中包括的文本进行分词处理以得到所述文本对应的多个分词;
    从所述多个分词中各分词所属的分词类型中确定出属于所述告警分词类型的目标分词类型,并将所述目标分词类型对应的分词确定为所述告警日志文件的关键信息;
    根据所述关键信息确定网络告警信息;
    其中,所述关键信息包括所述时间对应的告警发生时间戳、所述标识对应的网络设备标识、所述等级对应的告警等级以及所述故障对应的告警故障中的至少一项。
  3. 根据权利要求2所述方法,其特征在于,所述根据所述关键信息确定网络告警信息,包括:
    获取预设信息排列格式,将所述关键信息按照所述预设信息排列格式进行排序,以得到网络告警信息。
  4. 根据权利要求1或2所述方法,其特征在于,所述获取网络告警信息之前,所述方法还包括:
    获取多个网络设备,确定所述多个网络设备中各个网络设备所属的网络层级;
    基于所述各个网络设备所属的网络层级,设置所述各个网络设备对应的网络设备标识,其中,任一网络设备标识用于确定所述任一网络设备所属的网络层级。
  5. 根据权利要求4所述方法,其特征在于,所述各个网络设备所属的网络层级中至少包括第一网络层级和第二网络层级,所述第一网络层级的告警处理优先级高于所述第二网络层级;所述设置所述各个网络设备对应的网络设备标识之后,所述方法还包括:
    设置所述第一网络层级对应的告警方式为第一告警方式;
    设置所述第二网络层级对应的告警方式为第二告警方式;
    其中,所述第一告警方式的告警即时性高于所述第二告警方式的告警即时性,所述第一告警方式包括电话告警、短信告警以及邮件告警中的一种,所述第二告警方式包括电话告警、短信告警以及邮件告警中的一种且与所述第一告警方式不同。
  6. 根据权利要求1-3任一项所述方法,其特征在于,所述网络告警信息中包括告警等级;所述通过所述目标告警方式将所述网络告警信息发送给网络管理者,包括:
    提取所述网络告警信息中携带的告警等级,确定所述告警等级是否大于预设等级;
    若所述告警等级大于预设等级,则通过所述目标告警方式将所述网络告警信息发送给网络管理者;
    若所述告警等级不大于预设等级,则统计所述告警等级发生的次数,当所述告警等级发生的次数大于或者等于预设次数时,通过所述目标告警方式将所述网络告警信息发送给网络管理者。
  7. 根据权利要求1-3任一项所述方法,其特征在于,所述网络告警信息中包括告警等级和告警发生时间戳;所述通过所述目标告警方式将所述网络告警信息发送给网络管理者,包括:
    提取所述网络告警信息中携带的告警等级和告警发生时间戳,并确定所述告警等级是否大于预设等级;
    若所述告警等级大于预设等级,则通过所述目标告警方式将所述网络告警信息发送给网络管理者;
    若所述告警等级不大于预设等级,则确定所述告警等级对应的预设告警延迟时间,并从所述告警发生时间戳开始,经所述预设告警延迟时间后,通过所述目标告警方式将所述网络告警信息发送给网络管理者。
  8. 根据权利要求1-3任一项所述方法,其特征在于,所述通过所述目标告警方式将所述网络告警信息发送给网络管理者,包括:
    若所述目标告警方式是第一告警方式,则通过所述第一告警方式将所述网络告警信息发送给所述第一告警方式对应的一个或者多个第一网络管理者;
    若所述目标告警方式是第二告警方式,则通过所述第二告警方式将所述网络告警信息发送给所述第二告警方式对应的一个或者多个第二网络管理者;
    其中,所述第一网络管理者的网络故障处理权限高于所述第二网络管理者的网络故障处理权限。
  9. 根据权利要求8所述方法,其特征在于,所述方法还包括:
    获取多个网络管理者中各网络管理者的工作记录参数,其中所述工作记录参数包括历史业务处理次数、历史业务处理成功次数、业务处理累积时长;
    对任一网络管理者对应的工作记录参数进行归一化处理以得到预处理工作记录参数;
    获取所述预处理工作记录参数中各工作记录参数对应的参数权重,基于所述预处理工作记录参数、所述参数权重确定所述任一网络管理者对应的工作经验得分;
    根据所述多个网络管理者对应的多个工作经验得分设置各网络管理者的网络故障处理权限。
  10. 一种网络告警的装置,其特征在于,所述装置包括:
    信息获取单元,用于获取网络告警信息,提取所述网络告警信息中携带的网络设备标识;
    网络层级确定单元,用于根据所述信息获取单元确定的所述网络设备标识确定所述网络告警信息对应的网络设备所属的目标网络层级;
    告警方式确定单元,用于根据所述网络层级确定单元确定的所述目标网络层级确定所述网络告警信息对应的目标告警方式;
    网络告警信息发送单元,用于通过所述告警方式确定单元确定的所述目标告警方式将所述网络告警信息发送给网络管理者。
  11. 根据权利要求10所述装置,其特征在于,所述信息获取单元具体用于:
    确定告警分词类型,所述告警分词类型包括时间、标识、等级以及故障中的至少一项;
    获取告警日志文件,并对所述告警日志文件中包括的文本进行分词处理以得到所述文本对应的多个分词;
    从所述多个分词中各分词所属的分词类型中确定出属于所述告警分词类型的目标分词类型,并将所述目标分词类型对应的分词确定为所述告警日志文件的关键信息;
    根据所述关键信息确定网络告警信息;
    其中,所述关键信息包括所述时间对应的告警发生时间戳、所述标识对应的网络设备标识、所述等级对应的告警等级以及所述故障对应的告警故障中的至少一项。
  12. 根据权利要求11所述装置,其特征在于,所述信息获取单元还用于:
    获取预设信息排列格式,将所述关键信息按照所述预设信息排列格式进行排序,以得到网络告警信息。
  13. 根据权利要求10或11所述装置,其特征在于,所述装置还包括:
    网络设备标识设置单元,用于获取多个网络设备,确定所述多个网络设备中各个网络设备所属的网络层级;
    基于所述各个网络设备所属的网络层级,设置所述各个网络设备对应的网络设备标识,其中,任一网络设备标识用于确定所述任一网络设备所属的网络层级。
  14. 根据权利要求13所述装置,其特征在于,所述各个网络设备所属的网络层级中至少包括第一网络层级和第二网络层级,所述第一网络层级的告警处理优先级高于所述第二网络层级;所述装置还包括:
    告警方式设置单元,用于设置所述第一网络层级对应的告警方式为第一告警方式;
    设置所述第二网络层级对应的告警方式为第二告警方式;
    其中,所述第一告警方式的告警即时性高于所述第二告警方式的告警即时性,所述第一告警方式包括电话告警、短信告警以及邮件告警中的一种,所述第二告警方式包括电话告警、短信告警以及邮件告警中的一种且与所述第一告警方式不同。
  15. 根据权利要求10-12任一项所述装置,其特征在于,所述网络告警信息中包括告警等级;所述网络告警信息发送单元用于:
    提取所述网络告警信息中携带的告警等级,确定所述告警等级是否大于预设等级;
    若所述告警等级大于预设等级,则通过所述目标告警方式将所述网络告警信息发送给网络管理者;
    若所述告警等级不大于预设等级,则统计所述告警等级发生的次数,当所述告警等级发生的次数大于或者等于预设次数时,通过所述目标告警方式将所述网络告警信息发送给网络管理者。
  16. 根据权利要求10-12任一项所述装置,其特征在于,所述网络告警信息中包括告警等级和告警发生时间戳;所述网络告警信息发送单元用于:
    提取所述网络告警信息中携带的告警等级和告警发生时间戳,并确定所述告警等级是否大于预设等级;
    若所述告警等级大于预设等级,则通过所述目标告警方式将所述网络告警信息发送给 网络管理者;
    若所述告警等级不大于预设等级,则确定所述告警等级对应的预设告警延迟时间,并从所述告警发生时间戳开始,经所述预设告警延迟时间后,通过所述目标告警方式将所述网络告警信息发送给网络管理者。
  17. 根据权利要求10-12任一项所述装置,其特征在于,所述网络告警信息发送单元具体用于:
    若所述目标告警方式是第一告警方式,则通过所述第一告警方式将所述网络告警信息发送给所述第一告警方式对应的一个或者多个第一网络管理者;
    若所述目标告警方式是第二告警方式,则通过所述第二告警方式将所述网络告警信息发送给所述第二告警方式对应的一个或者多个第二网络管理者;
    其中,所述第一网络管理者的网络故障处理权限高于所述第二网络管理者的网络故障处理权限。
  18. 根据权利要求17所述装置,其特征在于,所述装置还包括:
    网络故障处理权限设置单元,用于获取多个网络管理者中各网络管理者的工作记录参数,其中所述工作记录参数包括历史业务处理次数、历史业务处理成功次数、业务处理累积时长;
    对任一网络管理者对应的工作记录参数进行归一化处理以得到预处理工作记录参数;
    获取所述预处理工作记录参数中各工作记录参数对应的参数权重,基于所述预处理工作记录参数、所述参数权重确定所述任一网络管理者对应的工作经验得分;
    根据所述多个网络管理者对应的多个工作经验得分设置各网络管理者的网络故障处理权限。
  19. 一种终端设备,其特征在于,包括处理器和存储器,所述处理器和存储器相互连接;
    所述存储器用于存储计算机程序,所述计算机程序包括程序指令,所述处理器被配置用于调用所述程序指令,执行如权利要求1-9任一项所述的方法。
  20. 一种计算机非易失性可读存储介质,其特征在于,所述计算机非易失性可读存储介质存储有计算机程序,所述计算机程序包括程序指令,所述程序指令当被处理器执行时使所述处理器执行如权利要求1-9任一项所述的方法。
PCT/CN2019/117168 2019-05-16 2019-11-11 网络告警的方法及装置 WO2020228276A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910409142.6A CN110149227A (zh) 2019-05-16 2019-05-16 网络告警的方法及装置
CN201910409142.6 2019-05-16

Publications (1)

Publication Number Publication Date
WO2020228276A1 true WO2020228276A1 (zh) 2020-11-19

Family

ID=67594299

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/117168 WO2020228276A1 (zh) 2019-05-16 2019-11-11 网络告警的方法及装置

Country Status (2)

Country Link
CN (1) CN110149227A (zh)
WO (1) WO2020228276A1 (zh)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110149227A (zh) * 2019-05-16 2019-08-20 平安科技(深圳)有限公司 网络告警的方法及装置
CN112598205A (zh) * 2019-09-17 2021-04-02 北京国双科技有限公司 告警信息的处理方法、装置、存储介质和电子设备
CN111277458B (zh) * 2019-10-16 2021-12-17 中国南方电网有限责任公司 网络设备的故障监测方法、装置、计算机设备和存储介质
CN110955581A (zh) * 2019-11-15 2020-04-03 北京金山云网络技术有限公司 线上软件异常告警方法、装置、电子设备及存储介质
CN113055213B (zh) * 2019-12-27 2024-05-28 中兴通讯股份有限公司 告警信息管理方法、告警信息管理系统及服务器
CN111626597A (zh) * 2020-05-22 2020-09-04 广东电网有限责任公司 一种设备报警方法、装置、设备和介质
CN111862548A (zh) * 2020-07-20 2020-10-30 中国联合网络通信集团有限公司 传输线路告警的智能化预警方法及装置
CN112770197A (zh) * 2020-12-31 2021-05-07 深圳前海微众银行股份有限公司 确定otn设备故障原因的方法、装置、设备、存储介质
CN114465870B (zh) * 2022-01-17 2024-03-08 中国工商银行股份有限公司 告警信息的处理方法及装置、存储介质和电子设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1829175A (zh) * 2005-03-01 2006-09-06 信息产业部电信研究院 Ip电信网系统中基于链路告警机制的资源管理方法
CN101145841A (zh) * 2007-06-27 2008-03-19 中兴通讯股份有限公司 一种光传输网络处理告警信息上报的方法
CN102447577A (zh) * 2011-10-31 2012-05-09 浪潮通信信息系统有限公司 一种客户导向的通信网络告警处理方法
CN104009854A (zh) * 2013-02-21 2014-08-27 中兴通讯股份有限公司 一种告警处理方法及装置、告警关联信息设置方法
CN110149227A (zh) * 2019-05-16 2019-08-20 平安科技(深圳)有限公司 网络告警的方法及装置

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101499935B (zh) * 2008-01-30 2012-09-26 中兴通讯股份有限公司 一种WiMAX基站的告警处理方法
CN105530111A (zh) * 2014-10-21 2016-04-27 中兴通讯股份有限公司 物联网告警抑制方法及系统
CN107453906A (zh) * 2017-08-01 2017-12-08 郑州云海信息技术有限公司 一种存储管理系统监控告警的设置方法及装置
CN108833148A (zh) * 2018-06-04 2018-11-16 北京天元创新科技有限公司 通信网络告警信息处理方法和系统

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1829175A (zh) * 2005-03-01 2006-09-06 信息产业部电信研究院 Ip电信网系统中基于链路告警机制的资源管理方法
CN101145841A (zh) * 2007-06-27 2008-03-19 中兴通讯股份有限公司 一种光传输网络处理告警信息上报的方法
CN102447577A (zh) * 2011-10-31 2012-05-09 浪潮通信信息系统有限公司 一种客户导向的通信网络告警处理方法
CN104009854A (zh) * 2013-02-21 2014-08-27 中兴通讯股份有限公司 一种告警处理方法及装置、告警关联信息设置方法
CN110149227A (zh) * 2019-05-16 2019-08-20 平安科技(深圳)有限公司 网络告警的方法及装置

Also Published As

Publication number Publication date
CN110149227A (zh) 2019-08-20

Similar Documents

Publication Publication Date Title
WO2020228276A1 (zh) 网络告警的方法及装置
CN110224858B (zh) 基于日志的告警方法及相关装置
CN110166290A (zh) 基于日志文件的告警方法及装置
WO2023142054A1 (zh) 一种面向容器微服务的性能监控告警方法及告警系统
US20090265288A1 (en) System and method for correlating events in a pluggable correlation architecture
CN110232006B (zh) 设备告警方法及相关装置
CN110427307A (zh) 日志解析方法、装置、计算机设备及存储介质
US11196627B1 (en) Managed remediation of non-compliant resources
CN107547228B (zh) 一种基于大数据的安全运维管理平台的实现架构
CN110995497A (zh) 一种云计算环境下统一运维的方法、终端设备及存储介质
CN110209518A (zh) 一种多数据源日志数据集中收集存储方法及装置
CN109669835A (zh) MySQL数据库监控方法、装置、设备及可读存储介质
WO2022022556A1 (zh) 故障的诊断方法及诊断规则确定方法、诊断功能部署方法,及相关设备和存储介质
CN114244676A (zh) 一种智能it综合网关系统
CN111258798A (zh) 监控数据的故障定位方法、装置、计算机设备及存储介质
CN101388794A (zh) 一种定位网络管理系统异常事件的方法和系统
CN113434327A (zh) 一种故障处理系统、方法、设备和存储介质
CN113852476A (zh) 确定异常事件关联对象的方法、装置及系统
US20220086039A1 (en) Generation of synthetic alerts and unified dashboard for viewing multiple layers of data center simultaneously
CN108390907B (zh) 一种基于Hadoop集群的管理监控系统及方法
CN111031000B (zh) 一种业务风控系统的处理方法、装置、系统及存储介质
US9443196B1 (en) Method and apparatus for problem analysis using a causal map
CN113076229A (zh) 一种通用的企业级信息技术监控系统
CN116760655A (zh) Sd-wan应用中提供cpe最优接入的pop点方法
CN109634814A (zh) 基于日志流的故障预警方法、设备、存储介质及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19929141

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19929141

Country of ref document: EP

Kind code of ref document: A1