WO2012009911A1 - Method, apparatus and system for processing alarm screening rule - Google Patents

Method, apparatus and system for processing alarm screening rule Download PDF

Info

Publication number
WO2012009911A1
WO2012009911A1 PCT/CN2010/078923 CN2010078923W WO2012009911A1 WO 2012009911 A1 WO2012009911 A1 WO 2012009911A1 CN 2010078923 W CN2010078923 W CN 2010078923W WO 2012009911 A1 WO2012009911 A1 WO 2012009911A1
Authority
WO
WIPO (PCT)
Prior art keywords
alarm
rule
management device
rules
masking
Prior art date
Application number
PCT/CN2010/078923
Other languages
French (fr)
Chinese (zh)
Inventor
刘伟
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2012009911A1 publication Critical patent/WO2012009911A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0604Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time

Definitions

  • the present invention relates to the field of communications, and in particular, to a method, device and system for processing an alarm screening rule. Background technique
  • Alarm management is one of the important functions of the modern network management system (referred to as the network management system).
  • the alarm tube is composed of two parts: the alarm display and the alarm setting.
  • the alarm mask is one of the most complicated functions in the alarm setting part and has an irreplaceable function.
  • the so-called alarm masking means that the user can set all the alarm items of the management device through the graphical user interface. The user can block any alarm item so that the masked alarm item does not generate an alarm.
  • each board can be installed with multiple boards.
  • Each board has multiple ports, and each port may also contain logical ports.
  • FTP floating terminal point
  • CTP Connection Termination Point
  • a telecommunication device is composed of a board, a port, a logical port, and the like, in each resource.
  • the device cannot support the tree-type relationship of the resource-detection point-alarm item in the command line mode.
  • the complex rules can be sent through the NMS to achieve the purpose of alarm shielding.
  • the description of the alarm screening rule needs to use three elements: resource, detection point, and alarm item, and the three elements have a certain hierarchical relationship.
  • the user may select multiple resources when setting the alarm mask. In each resource, multiple detection points are selected, and for each detection point, multiple alarm items are selected for screening.
  • the description of the hierarchical structure on the network management device is a report containing a tree data structure. Text, and on the management device is this The tree structure relationship is divided into multiple records for storage. For example, the user selects m resources, includes n detection points in each resource, and j alarm items for each detection point.
  • the network management device saves the hierarchical structure by generating a message, and the network management device will After the packet is sent to the management device, it is split into m X n X j alarm mask rules on the management device for saving.
  • the method is simple to implement. However, when the alarm masking item that has been set up is cleared, the masking rule of the alarm item needs to be re-issued, and a lot of unnecessary packets are sent, and when the alarm masking rule is cleared. This alarm may be generated, and then the alarm is set to be masked, and the alarm will disappear. This will easily cause confusion for the user and is not conducive to the user experience.
  • Another method is to first query the alarm masking rules that have been set by the management device, and then compare them with the alarm masking rules set by the user, and clear the alarm items that have been set on the management device but are not set by the user, and shield the newly set alarms.
  • the masking rule is not sent, and only the alarm masking rules are changed before and after the setting. Therefore, unnecessary packets are not sent, but the method is on the network management device and
  • When comparing the alarm masking rules of the management device compare two groups of tree structures. For each comparison, you need to first locate the nodes of the same level of the two tree structures, and then compare the nodes of this level. It is necessary to compare all the nodes of the tree structure, and the implementation is very complicated. Summary of the invention
  • the invention provides a method, a device and a system for processing an alarm screening rule, which are used to reduce the complexity of the alarm shielding rule setting and improve the efficiency while saving the transmission of the message and ensuring the correctness of the shielding.
  • the present invention provides a method for processing an alarm screening rule, including: Obtaining, by the network management device, a first alarm screening rule recorded by the local preset tree structure, and acquiring, by the at least one management device, a second alarm screening rule recorded for the at least one management device preset tree structure record;
  • All the obtained alarm mask rules recorded by the linear structure are grouped into a set of alarm mask rules.
  • the linear structure is in the form of a string, and the string is composed of one or more of a resource, a detection point or an alarm item, and a string represents an alarm screening rule.
  • the masking rule is incrementally characterized by a masking rule that needs to be cleared on the management device and a masking rule that needs to be added on the management device.
  • the method includes: sending the screening rule increment to the management device, and the management device incrementally updates the alarm screening rule according to the shielding rule.
  • the present invention also provides an apparatus for processing an alarm screening rule, including:
  • a first processing unit configured to acquire, by the network management device, a first alarm screening rule recorded by the local preset tree structure, and acquire, for the at least one management device, the at least one management device Preparing a second alarm masking rule recorded by the preset tree structure;
  • a second processing unit configured to convert the first alarm screening rule and the second alarm screening rule into a first group of alarm screening rules and a second group of alarm shielding rules recorded by using a linear structure
  • a third processing unit configured to compare the first group of alarm screening rules with the second group of alarm screening rules to obtain a screening rule increment.
  • the second processing unit converts the alarm screening rule recorded by the tree structure into a set of alarm screening rules recorded by the linear structure
  • All the obtained alarm mask rules recorded by the linear structure are grouped into a set of alarm mask rules.
  • the linear structure is in the form of a string, and the string is composed of one or more of a resource, a detection point or an alarm item, and a string represents an alarm screening rule.
  • the mask rule increment obtained by the third processing unit is characterized by a mask rule that needs to be cleared on the management device and a mask rule that needs to be added on the management device.
  • the present invention also provides an alarm shielding rule processing system, including: an alarm shielding rule processing device and a management device;
  • the alarm masking rule processing device is configured to acquire, by the network management device, a first alarm screening rule recorded by the local preset tree structure, and acquire preset presets for the at least one of the management devices from the at least one management device. Converting, by the second alarm rule recorded by the tree structure, the first alarm screening rule and the second alarm screening rule to the first recorded by the linear structure The group alarming rule and the second group of the alarming rule are compared, and the first group of the alarming rule is compared with the second group of the alarming rule, and the masking rule increment is obtained, and the shielding rule increment is sent;
  • the management device is configured to receive the mask rule increment sent by the alarm mask rule processing device, and update the local alarm mask rule according to the mask rule incrementally.
  • the network management device converts the alarm screening rule recorded by the tree structure into the alarm shielding rule of the linear structure, and compares the alarm shielding rules recorded by the linear structure on the network management device and the management device. Therefore, comparing two sets of tree structures into two sets of data of multiple linear structures is compared, which greatly reduces the complexity of the comparison, improves the efficiency, and obtains the increase of the masking rule after the comparison, and the network management device issues the shielding. In the rule, only the masking rule increment is sent. The masking rule is not issued for the alarm items with the same masking rules before and after the user setting, so that the delivered packets are saved without affecting the correctness of the masking rules.
  • FIG. 2 is a structural diagram of a processing system for an alarm screening rule according to an embodiment of the present invention
  • FIG. 3 is a structural diagram of an alarm shielding rule processing apparatus according to an embodiment of the present invention.
  • FIG. 4 is a detailed flowchart of setting an alarm mask rule of a management device according to an embodiment of the present invention
  • FIG. 5 is a detailed flowchart of an alarm mask rule process according to an embodiment of the present invention. detailed description
  • the embodiment of the present invention provides a method for processing the alarm screening rule, which can save the delivered message and reduce the alarm under the premise of ensuring the correctness of the shielding setting. Block the complexity of rule settings and increase efficiency.
  • the method is: the network management device obtains the first alarm shielding rule recorded by the local preset tree structure, Obtaining, from the at least one management device, a second alarm screening rule for the at least one preset tree structure record preset by the management device; and converting the first alarm screening rule and the second alarm shielding rule to the linear
  • the first group of alarm masking rules and the second group of alarm masking rules are recorded; the first group of alarm masking rules is compared with the second group of alarm masking rules to obtain a masking rule increment.
  • the above-mentioned masking rule is characterized by a masking item that is changed before and after the setting.
  • the masking rule increment includes a clearing masking rule and a new masking rule.
  • the clearing masking rule refers to a masking rule that needs to be cleared on the management device.
  • Blocking rules refer to the new blocking rules that need to be added to the management device.
  • the alarm shielding rule processing system mainly includes an alarm shielding rule processing device 20 and a management device 21, where
  • the alarm masking rule processing device 20 is configured to acquire, by the network management device, a first alarm screening rule recorded by the local preset tree structure, and acquire, from the at least one management device 21, a preset tree for the at least one management device 21 a second alarm rule recorded by the type structure, converting the first alarm screening rule and the second alarm screening rule into a first group of alarm screening rules and a second group of alarm shielding rules recorded by the linear structure, respectively, and Comparing the first set of alarm masking rules with the second set of alarm masking rules, obtaining a masking rule increment, and delivering the masking rule increment;
  • the management device 21 is configured to receive the mask rule increment sent by the alarm mask rule processing device 20, and incrementally update the local alarm mask rule according to the mask rule.
  • the alarm mask rule processing apparatus 20 mainly includes the following processing units:
  • the first processing unit 201 is configured to acquire, by the network management device, a first alarm screening rule recorded by the local preset tree structure, and acquire, from the at least one management device, the at least one management device. Preparing a second alarm masking rule recorded by the preset tree structure;
  • the second processing unit 202 is configured to convert the first alarm screening rule and the second alarm screening rule into a first group of alarm screening rules and a second group of alarm shielding rules respectively recorded by the linear structure;
  • the third processing unit 203 is configured to compare the first group alarm mask rule with the second group alarm mask rule to obtain a mask rule increment.
  • the detailed process of setting the alarm screening rule of the management device is as follows:
  • Step 401 Query the alarm screening rule on the management device, and determine whether there is an alarm screening rule on the management device, that is, whether there is an alarm item that has been set to be masked on the management device. If there is no alarm shielding rule on the management device, The alarm masking rule set by the user on the network management device is converted into a new masking rule. The newly added masking rule is the masking rule increment, and step 404 is performed; otherwise, the alarming rule exists on the management device, and the alarm of the management device is read. The rule is masked and saved in the tree data structure defined in the network management device to be converted into the alarm blocking rule of the tree structure. Step 402 is performed.
  • the tree data structure defined in the network management device is used to save the alarm screening rule.
  • the alarm screening rule on the management device is separately stored in the database of the management device, and the network management device reads the above management. After the alarm is masked on the device, the alarm masking rule is saved in the tree data structure. The alarm masking rule that forms the tree structure is saved on the network management side.
  • Step 402 Determine whether there is a masking item in the alarm masking rule set by the user on the network management device. If not, the alarm masking rule on the management device is converted into a clearing masking rule. 404; Otherwise, there is a masking item in the alarm masking rule set by the user on the network management device, and a comparison step 403 is performed.
  • Step 403 The alarm shielding rule of the network management device and the obtained alarm shielding rule of the management device Then compare and get the mask rule increment.
  • Step 404 The above-mentioned masking rule is sent to the management device in an incremental manner, and the alarm masking rule of the management device is incrementally updated according to the masking rule.
  • the foregoing filtering rule increment is sent to the management device, and the corresponding shielding item on the management device is cleared for the clearing and blocking rule in the filtering rule increment, and the new shielding rule pair is added to the filtering rule increment.
  • the corresponding mask on this management device sets the mask.
  • step 403 alarm masking rule comparison is as follows:
  • Step 501 The network management device acquires a first alarm screening rule recorded by the local preset tree structure, and acquires a second alarm mask recorded from the at least one management device for the preset tree structure record preset by the at least one management device. rule.
  • Step 502 Convert the first alarm screening rule recorded in the tree structure of the network management device and the second alarm screening rule recorded in the tree structure of the management device to the linear structure record respectively.
  • the first set of alarm screening rules and the second set of alarm screening rules are the first set of alarm screening rules and the second set of alarm screening rules.
  • the process of converting the alarm masking rule recorded by the tree structure into the alarm masking rule recorded by the linear structure is: traversing and recording the data of each node in the alarm masking rule recorded by the above-mentioned tree structure, the above knot The point is the root node, the child node, or the leaf node; each time it traverses to a leaf node, the data from all the nodes on the path from the root node to the leaf node is combined into a linear structure of data.
  • the data of the structure corresponds to an alarm masking rule recorded by the linear structure; all the alarm masking rules recorded by the linear structure are grouped into a set of alarm masking rules.
  • the linear structure is in the form of a string, that is, the alarm masking rule of the tree structure is converted into a plurality of string forms, wherein a string represents an alarm screening rule, and the alarm shielding rule is set according to user setting requirements. It can be set for resources, detection points, or alarm items.
  • the leaf nodes corresponding to the tree structure alarm screening rule are resources, detection points, or alarm items.
  • a string that is changed to a linear structure may consist of one or more of a resource, a detection point, or an alarm item. If the alarm masking rule is set for the alarm item, the root node is the resource, the child node is the detection point, and the leaf node is the alarm item.
  • Each string is composed of resources, detection points, and alarm items, with a comma between them. Separated, the most fine-grained alarm blocking rule.
  • the user when setting a masking rule, the user needs to mask all alarm items corresponding to the detection point 1 under the resource 1.
  • the string corresponding to the masking rule can only contain the resource 1 and the detection point 1 to indicate the detection point. All the alarm items in 1 are set to be masked.
  • the string corresponding to the mask rule contains the resource 1, and the detection point 1
  • the alarm item 1 is the finest-grained alarm masking rule.
  • Step 503 Compare the first set of alarm screening rules for the linear structure of the network management device and the second set of alarm shielding rules for the linear structure of the management device to obtain the screening rule increment.
  • the masking rule increment includes the clearing of the masking rule and the addition of the masking rule.
  • the clearing masking rule is characterized by the masking rule that needs to be cleared on the management device.
  • the new masking rule is characterized as the new masking rule required on the management device.
  • the first group of alarm shielding rules of the management device is taken as the standard, and the linear structure of the network management device is traversed.
  • the second set of alarm masking rules is not included in the first group of alarm masking rules of the network management device, and the alarm items included in the second group of alarm masking rules of the management device are used as clearing mask rules to be managed on the device. The mask setting of the corresponding alarm item is cleared.
  • the second group of alarm masking rules of the management device is traversed, and the first group of alarm masking rules of the management device is traversed, and the second set of alarm masking rules of the management device is not included, and the network management device is first.
  • the alarm items included in the alarm masking rule are added as masking rules to mask the corresponding alarm items on the management device.
  • the alarm blocking rules saved on the management device are A, B, and C.
  • the user is in the network management.
  • the alarm masking rules set on the device are B, C, and D.
  • A, B, C, and D are alarms.
  • the alarm masking rules on the management device are used to traverse the alarm masking rules on the network management device. If no alarm masking rule A exists on the device, A is used as the clearing mask rule.
  • the alarm masking rule on the management device is traversed.
  • the alarm masking rule D is found on the management device. Then, D is added as a new blocking rule.
  • the alarm screening rule on the management device and the network management device there are B and C. Then, the alarm items corresponding to B and C are unchanged before and after the setting, and the screening rule A and the new blocking rule are cleared. D is used as a mask rule increment.
  • Example 1 The alarm mask data structure defined in the network management device is as follows:
  • AlarmSurvSetList-T SEQUENCE OF AlarmSurvSet-T
  • ProbableCauseList-T:: SEQUENCE OF ProbableCause-T
  • An alarmSurvSetList-T indicates a series of alarm masking rules under a resource.
  • the resName indicates a resource (board, port, or logical port) in the management device.
  • the survSet indicates the corresponding detection point of a series of alarm-alarms. Relationship, layerRate represents the name of the detection point, probableCauseList represents the list of alarm items under the detection point, assuming the name is resName 1 There are two detection points under the resource: layerRatel and layerRate2. There are two alarm items under each detection point.
  • the alarm items corresponding to layerRatel are ProbableCausel and ProbableCause2, and the alarm item corresponding to layerRate2 is ProbableCause3.
  • ProbableCause4 traversing each node of the tree structure, can be converted into 4 strings, namely ⁇ resNamel , layerRatel , ProbableCausel ⁇ , ⁇ resNamel , layerRatel , ProbableCause2 ⁇ , ⁇ resNamel , layerRate2 , ProbableCause3 ⁇ , ⁇ resNamel , layerRate2, ProbableCause4 ⁇ , where each string represents a blocking rule.
  • the tree structure is converted into a linear structure in the form of a string, and the process of comparing the alarm masking rules of the network management device and the management device in step 503 is illustrated.
  • Example 2 It is assumed that the masking rule of the acquired management device is to mask the ProbableCausel in the layerRatel of the resource resNamel, and the masking rule that the user resets on the network management device is: ProbableCause2 in the layerRatel of the detection point of the resource resName1 and detection Point the mask on the ProbableCause4 in layerRate2.
  • the string that converts the masking rules of the management device into a linear structure is ⁇ resNamel , layerRatel , ProbableCausel ⁇
  • the string of the user-set masking rule set on the network management into a linear structure is ⁇ resNamel , layerRate 1 , ProbableCause2 ⁇ , ⁇ resName 1 , layerRate2 , ProbableCause4 ⁇ .
  • a string in the masking rule for extracting the linear structure of the management device is compared with each string in the masking rule of the linear structure set by the user on the network management device, that is, the string ⁇ resNamel , layerRatel , ProbableCausel ⁇ and the network management device are shielded. All the strings of the rule are compared. After the comparison, the string representing the masking rule of the network management device does not contain the string ⁇ resName 1 , layerRate 1 , ProbableCause 1 ⁇ , and the mask represented by the string ⁇ resName 1 , layerRatel , ProbableCausel ⁇ is blocked.
  • the rule is used as a clearing block rule; each string in the string representing the NMS device blocking rule is compared with all the strings representing the management device blocking rule, that is, the string in the NMS device blocking rule ⁇ resNamel , layerRatel , ProbableCause2 ⁇ Compared to all strings that represent management device blocking rules In contrast, the string ⁇ resNamel , layerRate2 , ProbableCause4 ⁇ in the NMS device blocking rule is compared with all the strings representing the management device blocking rule.
  • the alarm screening rule recorded by the user using the tree data structure preset on the network management device and the alarm screening rule set on the management device recorded by the tree data structure on the network management side are respectively converted into The linear structure of the string form, then compare the masking rules of the two linear structures, the essence is to convert to compare two sets of strings, compare two sets of multiple tree data structures to compare two sets of multiple strings , which greatly reduces the complexity of the comparison and improves the efficiency.
  • the masking rule increment is obtained.
  • the NMS sends the masking rule
  • the NMS only sends the masking rule increment.
  • the masking rule is not sent for the alarm items with the same masking rules before and after the user setting, thus saving unnecessary packets. Send, can guarantee the correctness of the shielding settings.
  • the alarm masking rule processing method in the embodiment of the present invention reduces the complexity of the alarm masking rule comparison and improves the efficiency under the premise of saving the delivered message and ensuring the correctness of the mask setting. .
  • the spirit and scope of the invention Thus, it is intended that the present invention cover the modifications and modifications of the invention

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

A method, an apparatus and a system for processing an alarm screening rule are disclosed in the present invention, which serve to decrease the complexity of processing the alarm screening rule and increase the efficiency. The method comprises: a network management device obtains a first alarm screening rule preset locally and recorded using a tree structure, and obtains a second alarm screening rule preset for at least one management device and recorded using the tree structure from the at least one management device; the first alarm screening rule and the second alarm screening rule are converted respectively into a first alarm screening rule group and a second alarm screening rule group which are recorded using a linear structure; the first alarm screening rule group is compared with the second alarm screening rule group to obtain a screening rule increment. Thus, in the precondition of saving unnecessary distribution of messages and guaranteeing the correctness of setting screening rules, the complexity of comparing alarm screening rules can be decreased and the efficiency can be increased. Meanwhile, an apparatus and a system for processing the alarm screening rule are disclosed in the present invention.

Description

一种告警屏蔽规则的处理方法、 装置及*** 技术领域  Method, device and system for processing alarm shielding rule
本发明涉及通信领域, 尤其涉及一种告警屏蔽规则的处理方法、 装置 及***。 背景技术  The present invention relates to the field of communications, and in particular, to a method, device and system for processing an alarm screening rule. Background technique
告警管理是现代网络管理***(简称网管) 的重要功能之一, 告警管 理由告警显示和告警设置两部分组成, 而告警屏蔽是告警设置部分中最为 复杂的功能之一, 具有不可替代的作用。 所谓告警屏蔽是指用户通过图形 用户界面对管理设备所有的告警项进行设置, 用户可以屏蔽任意告警项, 使得屏蔽后的告警项不产生告警。  Alarm management is one of the important functions of the modern network management system (referred to as the network management system). The alarm tube is composed of two parts: the alarm display and the alarm setting. The alarm mask is one of the most complicated functions in the alarm setting part and has an irreplaceable function. The so-called alarm masking means that the user can set all the alarm items of the management device through the graphical user interface. The user can block any alarm item so that the masked alarm item does not generate an alarm.
电信设备是以网元为基本单位, 参阅附图 1 所示, 每个网元上可以安 插多块单板, 在每块单板上有多个端口, 在每个端口内可能还包含逻辑端 口 (如浮动终端点 (FTP, Float Termination Point ), 连接终端点 (CTP, Connection Termination Point )等逻辑端口), 也就是说电信设备是由单板、 端口、 逻辑端口等资源组成, 在每个资源下包含有多个检测点, 而在每个 检测点下又包含有多个告警项。 一般情况下, 设备是无法支持直接用命令 行的方式来描述上述的资源-检测点-告警项的树型结构关系的,只能通过网 管下发复杂的规则以达到告警屏蔽的目的。  The telecom equipment is based on the network element. As shown in Figure 1, each board can be installed with multiple boards. Each board has multiple ports, and each port may also contain logical ports. (For example, a floating terminal point (FTP, Float Termination Point), a connection terminal point (CTP, Connection Termination Point) and other logical ports), that is, a telecommunication device is composed of a board, a port, a logical port, and the like, in each resource. There are multiple detection points under, and there are multiple alarm items under each detection point. In general, the device cannot support the tree-type relationship of the resource-detection point-alarm item in the command line mode. The complex rules can be sent through the NMS to achieve the purpose of alarm shielding.
由上述内容可知, 对告警屏蔽规则的描述需要使用资源、 检测点、 告 警项三个元素, 并且此三个元素之间具有一定的层次结构关系, 用户在设 置告警屏蔽时可能会选择多个资源, 在每个资源下又会选择多个检测点, 而针对每个检测点又会选择多个告警项进行屏蔽, 在网管设备上对此种层 次结构的描述是一个包含树型数据结构的报文, 而在管理设备上则是将这 种树型结构关系拆分为多条记录分别进行保存。例如, 用户选择 m个资源, 在每个资源中包含有 n个检测点, 而对每个检测点又有 j个告警项, 网管设 备通过生成一个报文来保存这种层次结构, 网管设备将此报文下发到管理 设备后, 在管理设备上拆分为 m X n X j条告警屏蔽规则进行保存。 It can be seen from the above that the description of the alarm screening rule needs to use three elements: resource, detection point, and alarm item, and the three elements have a certain hierarchical relationship. The user may select multiple resources when setting the alarm mask. In each resource, multiple detection points are selected, and for each detection point, multiple alarm items are selected for screening. The description of the hierarchical structure on the network management device is a report containing a tree data structure. Text, and on the management device is this The tree structure relationship is divided into multiple records for storage. For example, the user selects m resources, includes n detection points in each resource, and j alarm items for each detection point. The network management device saves the hierarchical structure by generating a message, and the network management device will After the packet is sent to the management device, it is split into m X n X j alarm mask rules on the management device for saving.
网管设备向管理设备下发告警屏蔽规则可以釆取以下方法: 首先下发 命令清除管理设备上的全部告警屏蔽规则, 然后向管理设备下发用户设置 的告警屏蔽规则。 该方法实现简单, 但是对于原来已经设置的告警屏蔽项, 清除后再重新设置时需要重新下发该告警项的屏蔽规则, 导致下发了很多 不必要的报文, 并且在清除告警屏蔽规则时可能会导致该告警产生, 然后 再对该告警项设置屏蔽, 又会使该告警消失, 这样容易使用户产生疑惑, 不利于用户的使用体验。  You can use the following methods to send alarm trapping rules to the management device: First, the command is used to clear all alarm masking rules on the management device, and then the alarm masking rules set by the user are sent to the management device. The method is simple to implement. However, when the alarm masking item that has been set up is cleared, the masking rule of the alarm item needs to be re-issued, and a lot of unnecessary packets are sent, and when the alarm masking rule is cleared. This alarm may be generated, and then the alarm is set to be masked, and the alarm will disappear. This will easily cause confusion for the user and is not conducive to the user experience.
另一种方法是首先查询管理设备已经设置的告警屏蔽规则, 然后和用 户设置的告警屏蔽规则进行比较, 清除管理设备上已经设置屏蔽但用户此 次没有设置的告警项, 屏蔽用户新设置的告警项, 对于用户设置前后不变 的告警项不下发屏蔽规则, 而只下发设置前后有所改变的告警屏蔽规则, 这样, 不需要下发不必要的报文, 但是该方法在对网管设备和管理设备的 告警屏蔽规则进行比较时, 是比较两组多个树型结构, 每次比较时需要先 定位到两个树型结构同一等级的结点, 再对这一等级的结点进行比较, 需 要比较树型结构的所有结点, 实现非常复杂。 发明内容  Another method is to first query the alarm masking rules that have been set by the management device, and then compare them with the alarm masking rules set by the user, and clear the alarm items that have been set on the management device but are not set by the user, and shield the newly set alarms. For the alarm item that is set before and after the user is set, the masking rule is not sent, and only the alarm masking rules are changed before and after the setting. Therefore, unnecessary packets are not sent, but the method is on the network management device and When comparing the alarm masking rules of the management device, compare two groups of tree structures. For each comparison, you need to first locate the nodes of the same level of the two tree structures, and then compare the nodes of this level. It is necessary to compare all the nodes of the tree structure, and the implementation is very complicated. Summary of the invention
本发明提供一种告警屏蔽规则的处理方法、 装置及***, 用以在节省 下发报文、 保证屏蔽正确性的同时, 降低告警屏蔽规则设置的复杂度, 提 高效率。  The invention provides a method, a device and a system for processing an alarm screening rule, which are used to reduce the complexity of the alarm shielding rule setting and improve the efficiency while saving the transmission of the message and ensuring the correctness of the shielding.
为了实现上述目的, 本发明的技术方案是这样实现的:  In order to achieve the above object, the technical solution of the present invention is implemented as follows:
本发明提供了一种告警屏蔽规则的处理方法, 包括: 网管设备获取本地预设的釆用树型结构记录的第一告警屏蔽规则, 以 及从至少一个管理设备获取针对至少一个所述管理设备预设的釆用树型结 构记录的第二告警屏蔽规则; The present invention provides a method for processing an alarm screening rule, including: Obtaining, by the network management device, a first alarm screening rule recorded by the local preset tree structure, and acquiring, by the at least one management device, a second alarm screening rule recorded for the at least one management device preset tree structure record;
将所述第一告警屏蔽规则和第二告警屏蔽规则分别转换为釆用线性结 构记录的第一组告警屏蔽规则和第二组告警屏蔽规则;  Converting the first alarm screening rule and the second alarm screening rule into a first group of alarm screening rules and a second group of alarm shielding rules respectively recorded by the linear structure;
将所述第一组告警屏蔽规则与第二组告警屏蔽规则进行比较, 获得屏 蔽规则增量。  Comparing the first set of alarm screening rules with the second set of alarm screening rules to obtain a screening rule increment.
将釆用树型结构记录的告警屏蔽规则转换为釆用线性结构记录的一组 告警屏蔽规则, 包括:  Convert the alarm masking rules recorded in the tree structure to a set of alarm masking rules recorded in the linear structure, including:
遍历所述釆用树型结构记录的告警屏蔽规则中每个结点的数据并记 录, 所述结点为根结点、 子结点或叶子结点;  Traversing and recording data of each node in the alarm mask rule recorded by the tree structure, the node being a root node, a child node or a leaf node;
每遍历到一个叶子结点, 将从根结点到所述叶子结点路径上的所有结 点的数据组合为一条线性结构的数据; 所述线性结构的数据对应一条釆用 线性结构记录的告警屏蔽规则;  Each time a leaf node is traversed, the data of all the nodes from the root node to the leaf node path are combined into one linear structure data; the data of the linear structure corresponds to an alarm recorded by the linear structure Shielding rules;
将获得的所有釆用线性结构记录的告警屏蔽规则组成一组告警屏蔽规 则。  All the obtained alarm mask rules recorded by the linear structure are grouped into a set of alarm mask rules.
所述线性结构为字符串的形式, 所述字符串由资源、 检测点或告警项 中的一个或多个组成, 一个字符串代表一条告警屏蔽规则。  The linear structure is in the form of a string, and the string is composed of one or more of a resource, a detection point or an alarm item, and a string represents an alarm screening rule.
所述屏蔽规则增量表征为所述管理设备上需要清除的屏蔽规则以及所 述管理设备上需要新增的屏蔽规则。  The masking rule is incrementally characterized by a masking rule that needs to be cleared on the management device and a masking rule that needs to be added on the management device.
获得所述屏蔽规则增量后, 包括: 下发所述屏蔽规则增量到所述管理 设备, 所述管理设备按照该屏蔽规则增量更新告警屏蔽规则。  After the filtering rule is incremented, the method includes: sending the screening rule increment to the management device, and the management device incrementally updates the alarm screening rule according to the shielding rule.
本发明还提供了一种告警屏蔽规则的处理装置, 包括:  The present invention also provides an apparatus for processing an alarm screening rule, including:
第一处理单元, 用于网管设备获取本地预设的釆用树型结构记录的第 一告警屏蔽规则, 以及从至少一个管理设备获取针对至少一个所述管理设 备预设的釆用树型结构记录的第二告警屏蔽规则; a first processing unit, configured to acquire, by the network management device, a first alarm screening rule recorded by the local preset tree structure, and acquire, for the at least one management device, the at least one management device Preparing a second alarm masking rule recorded by the preset tree structure;
第二处理单元, 用于将所述第一告警屏蔽规则和第二告警屏蔽规则分 别转换为釆用线性结构记录的第一组告警屏蔽规则和第二组告警屏蔽规 则;  a second processing unit, configured to convert the first alarm screening rule and the second alarm screening rule into a first group of alarm screening rules and a second group of alarm shielding rules recorded by using a linear structure;
第三处理单元, 用于将所述第一组告警屏蔽规则与所述第二组告警屏 蔽规则进行比较, 获得屏蔽规则增量。  And a third processing unit, configured to compare the first group of alarm screening rules with the second group of alarm screening rules to obtain a screening rule increment.
所述第二处理单元将釆用树型结构记录的告警屏蔽规则转换为釆用线 性结构记录的一组告警屏蔽规则时,  When the second processing unit converts the alarm screening rule recorded by the tree structure into a set of alarm screening rules recorded by the linear structure,
还用于遍历所述釆用树型结构记录的告警屏蔽规则中每个结点的数据 并记录, 所述结点为根结点、 子结点或叶子结点;  And traversing and recording the data of each node in the alarm masking rule recorded by the tree structure, where the node is a root node, a child node or a leaf node;
每遍历到一个叶子结点, 将从根结点到所述叶子结点路径上的所有结 点的数据组合为一条线性结构的数据; 所述线性结构的数据对应一条釆用 线性结构记录的告警屏蔽规则;  Each time a leaf node is traversed, the data of all the nodes from the root node to the leaf node path are combined into one linear structure data; the data of the linear structure corresponds to an alarm recorded by the linear structure Shielding rules;
将获得的所有釆用线性结构记录的告警屏蔽规则组成一组告警屏蔽规 则。  All the obtained alarm mask rules recorded by the linear structure are grouped into a set of alarm mask rules.
所述线性结构为字符串的形式, 所述字符串由资源、 检测点或告警项 中的一个或多个组成, 一个字符串代表一条告警屏蔽规则。  The linear structure is in the form of a string, and the string is composed of one or more of a resource, a detection point or an alarm item, and a string represents an alarm screening rule.
所述第三处理单元获得的所述屏蔽规则增量表征为所述管理设备上需 要清除的屏蔽规则以及所述管理设备上需要新增的屏蔽规则。  The mask rule increment obtained by the third processing unit is characterized by a mask rule that needs to be cleared on the management device and a mask rule that needs to be added on the management device.
本发明还提供了一种告警屏蔽规则处理***, 包括: 告警屏蔽规则处 理装置和管理设备; 其中,  The present invention also provides an alarm shielding rule processing system, including: an alarm shielding rule processing device and a management device;
所述告警屏蔽规则处理装置, 用于网管设备获取本地预设的釆用树型 结构记录的第一告警屏蔽规则, 以及从至少一个所述管理设备获取针对至 少一个所述管理设备预设的釆用树型结构记录的第二告警规则, 将所述第 一告警屏蔽规则和第二告警屏蔽规则分别转换为釆用线性结构记录的第一 组告警屏蔽规则和第二组告警屏蔽规则, 并将所述第一组告警屏蔽规则和 所述第二组告警屏蔽规则进行比较, 获得屏蔽规则增量, 并下发所述屏蔽 规则增量; The alarm masking rule processing device is configured to acquire, by the network management device, a first alarm screening rule recorded by the local preset tree structure, and acquire preset presets for the at least one of the management devices from the at least one management device. Converting, by the second alarm rule recorded by the tree structure, the first alarm screening rule and the second alarm screening rule to the first recorded by the linear structure The group alarming rule and the second group of the alarming rule are compared, and the first group of the alarming rule is compared with the second group of the alarming rule, and the masking rule increment is obtained, and the shielding rule increment is sent;
所述管理设备, 用于接收所述告警屏蔽规则处理装置下发的所述屏蔽 规则增量, 并按照所述屏蔽规则增量更新本地的告警屏蔽规则。  And the management device is configured to receive the mask rule increment sent by the alarm mask rule processing device, and update the local alarm mask rule according to the mask rule incrementally.
基于上述技术方案, 本发明实施例中, 网管设备将树型结构记录的告 警屏蔽规则转换为线性结构的告警屏蔽规则, 再针对网管设备和管理设备 上釆用线性结构记录的告警屏蔽规则进行比较, 从而将比较两组多个树型 结构转换为比较两组多个线性结构的数据, 大大减少了比较的复杂度, 提 高了效率, 并且在比较后获得屏蔽规则增量, 网管设备在下发屏蔽规则时 只下发该屏蔽规则增量, 对于用户设置前后屏蔽规则不变的告警项不下发 屏蔽规则, 从而在不影响屏蔽规则设置的正确性的前提下, 节省了下发的 报文。 附图说明 Based on the foregoing technical solution, in the embodiment of the present invention, the network management device converts the alarm screening rule recorded by the tree structure into the alarm shielding rule of the linear structure, and compares the alarm shielding rules recorded by the linear structure on the network management device and the management device. Therefore, comparing two sets of tree structures into two sets of data of multiple linear structures is compared, which greatly reduces the complexity of the comparison, improves the efficiency, and obtains the increase of the masking rule after the comparison, and the network management device issues the shielding. In the rule, only the masking rule increment is sent. The masking rule is not issued for the alarm items with the same masking rules before and after the user setting, so that the delivered packets are saved without affecting the correctness of the masking rules. DRAWINGS
Figure imgf000007_0001
Figure imgf000007_0001
图 2为本发明实施例中告警屏蔽规则的处理***架构图;  2 is a structural diagram of a processing system for an alarm screening rule according to an embodiment of the present invention;
图 3为本发明实施例中告警屏蔽规则处理装置结构图;  3 is a structural diagram of an alarm shielding rule processing apparatus according to an embodiment of the present invention;
图 4为本发明实施例中对管理设备的告警屏蔽规则设置的详细流程图; 图 5为本发明实施例中告警屏蔽规则处理的详细流程图。 具体实施方式  4 is a detailed flowchart of setting an alarm mask rule of a management device according to an embodiment of the present invention; FIG. 5 is a detailed flowchart of an alarm mask rule process according to an embodiment of the present invention. detailed description
为了降低告警屏蔽规则设置的复杂度, 提高效率, 本发明实施例中提 供了一种告警屏蔽规则的处理方法, 能够在保证屏蔽设置正确性的前提下, 节省下发的报文, 并降低告警屏蔽规则设置的复杂度, 提高效率。 该方法 为: 网管设备获取本地预设的釆用树型结构记录的第一告警屏蔽规则, 以 及从至少一个管理设备获取针对至少一个该管理设备预设的釆用树型结构 记录的第二告警屏蔽规则; 并将上述第一告警屏蔽规则和上述第二告警屏 蔽规则分别转换为釆用线性结构记录的第一组告警屏蔽规则和第二组告警 屏蔽规则; 将第一组告警屏蔽规则和第二组告警屏蔽规则进行比较, 获得 屏蔽规则增量。 In order to reduce the complexity of the alarm screening rule setting and improve the efficiency, the embodiment of the present invention provides a method for processing the alarm screening rule, which can save the delivered message and reduce the alarm under the premise of ensuring the correctness of the shielding setting. Block the complexity of rule settings and increase efficiency. The method is: the network management device obtains the first alarm shielding rule recorded by the local preset tree structure, Obtaining, from the at least one management device, a second alarm screening rule for the at least one preset tree structure record preset by the management device; and converting the first alarm screening rule and the second alarm shielding rule to the linear The first group of alarm masking rules and the second group of alarm masking rules are recorded; the first group of alarm masking rules is compared with the second group of alarm masking rules to obtain a masking rule increment.
上述屏蔽规则增量表征为设置前后有所改变的屏蔽项, 该屏蔽规则增 量包括清除屏蔽规则以及新增屏蔽规则, 其中, 清除屏蔽规则指的是管理 设备上需要清除的屏蔽规则, 新增屏蔽规则指的是管理设备上需要新增的 屏蔽规则。  The above-mentioned masking rule is characterized by a masking item that is changed before and after the setting. The masking rule increment includes a clearing masking rule and a new masking rule. The clearing masking rule refers to a masking rule that needs to be cleared on the management device. Blocking rules refer to the new blocking rules that need to be added to the management device.
下面结合附图对本发明优选的实施方式进行详细说明。  Preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
参阅附图 2, 本发明实施例中, 告警屏蔽规则的处理***主要包括告警 屏蔽规则处理装置 20和管理设备 21 , 其中,  Referring to FIG. 2, in the embodiment of the present invention, the alarm shielding rule processing system mainly includes an alarm shielding rule processing device 20 and a management device 21, where
告警屏蔽规则处理装置 20, 用于网管设备获取本地预设的釆用树型结 构记录的第一告警屏蔽规则, 以及从至少一个管理设备 21获取针对该至少 一个管理设备 21预设的釆用树型结构记录的第二告警规则, 将所述第一告 警屏蔽规则和第二告警屏蔽规则分别转换为釆用线性结构记录的第一组告 警屏蔽规则和第二组告警屏蔽规则, 并将所述第一组告警屏蔽规则和所述 第二组告警屏蔽规则进行比较, 获得屏蔽规则增量, 并下发所述屏蔽规则 增量;  The alarm masking rule processing device 20 is configured to acquire, by the network management device, a first alarm screening rule recorded by the local preset tree structure, and acquire, from the at least one management device 21, a preset tree for the at least one management device 21 a second alarm rule recorded by the type structure, converting the first alarm screening rule and the second alarm screening rule into a first group of alarm screening rules and a second group of alarm shielding rules recorded by the linear structure, respectively, and Comparing the first set of alarm masking rules with the second set of alarm masking rules, obtaining a masking rule increment, and delivering the masking rule increment;
管理设备 21 ,用于接收告警屏蔽规则处理装置 20下发的所述屏蔽规则 增量, 并按照该屏蔽规则增量更新本地的告警屏蔽规则。  The management device 21 is configured to receive the mask rule increment sent by the alarm mask rule processing device 20, and incrementally update the local alarm mask rule according to the mask rule.
参阅附图 3 , 本发明实施例中, 告警屏蔽规则处理装置 20主要包括以 下处理单元:  Referring to FIG. 3, in the embodiment of the present invention, the alarm mask rule processing apparatus 20 mainly includes the following processing units:
第一处理单元 201 ,用于网管设备获取本地预设的釆用树型结构记录的 第一告警屏蔽规则, 以及从至少一个管理设备获取针对该至少一个管理设 备预设的釆用树型结构记录的第二告警屏蔽规则; The first processing unit 201 is configured to acquire, by the network management device, a first alarm screening rule recorded by the local preset tree structure, and acquire, from the at least one management device, the at least one management device. Preparing a second alarm masking rule recorded by the preset tree structure;
第二处理单元 202,用于将上述第一告警屏蔽规则和第二告警屏蔽规则 分别转换为釆用线性结构记录的第一组告警屏蔽规则和第二组告警屏蔽规 则;  The second processing unit 202 is configured to convert the first alarm screening rule and the second alarm screening rule into a first group of alarm screening rules and a second group of alarm shielding rules respectively recorded by the linear structure;
第三处理单元 203 ,用于将上述第一组告警屏蔽规则与上述第二组告警 屏蔽规则进行比较, 获得屏蔽规则增量。  The third processing unit 203 is configured to compare the first group alarm mask rule with the second group alarm mask rule to obtain a mask rule increment.
参阅附图 4所示, 本发明实施例中, 对管理设备的告警屏蔽规则进行 设置的详细流程如下:  Referring to FIG. 4, in the embodiment of the present invention, the detailed process of setting the alarm screening rule of the management device is as follows:
步骤 401 : 查询管理设备上的告警屏蔽规则, 并判断该管理设备上是否 存在告警屏蔽规则, 也就是判断管理设备上是否存在已设置屏蔽的告警项, 如果该管理设备上不存在告警屏蔽规则, 将网管设备上用户设置的告警屏 蔽规则转换为新增屏蔽规则, 该新增屏蔽规则即为屏蔽规则增量, 执行步 骤 404; 否则上述管理设备上存在告警屏蔽规则, 读取该管理设备的告警屏 蔽规则, 并保存在网管设备中定义的树型数据结构中, 以转换为树型结构 的告警屏蔽规则, 执行步骤 402。  Step 401: Query the alarm screening rule on the management device, and determine whether there is an alarm screening rule on the management device, that is, whether there is an alarm item that has been set to be masked on the management device. If there is no alarm shielding rule on the management device, The alarm masking rule set by the user on the network management device is converted into a new masking rule. The newly added masking rule is the masking rule increment, and step 404 is performed; otherwise, the alarming rule exists on the management device, and the alarm of the management device is read. The rule is masked and saved in the tree data structure defined in the network management device to be converted into the alarm blocking rule of the tree structure. Step 402 is performed.
其中, 在网管设备中定义的树型数据结构用于保存告警屏蔽规则, 管 理设备上的告警屏蔽规则是拆分成多条的形式分别保存在上述管理设备的 数据库中, 网管设备读取上述管理设备上的告警屏蔽规则后, 将该告警屏 蔽规则保存于树型数据结构中, 形成树型结构的告警屏蔽规则保存在网管 侧。  The tree data structure defined in the network management device is used to save the alarm screening rule. The alarm screening rule on the management device is separately stored in the database of the management device, and the network management device reads the above management. After the alarm is masked on the device, the alarm masking rule is saved in the tree data structure. The alarm masking rule that forms the tree structure is saved on the network management side.
步骤 402: 判断网管设备上用户设置的告警屏蔽规则中是否存在屏蔽 项, 如不存在, 将管理设备上的告警屏蔽规则转换为清除屏蔽规则, 该清 除屏蔽规则即为屏蔽规则增量, 执行步骤 404; 否则网管设备上用户设置的 告警屏蔽规则中存在屏蔽项, 执行比较步骤 403。  Step 402: Determine whether there is a masking item in the alarm masking rule set by the user on the network management device. If not, the alarm masking rule on the management device is converted into a clearing masking rule. 404; Otherwise, there is a masking item in the alarm masking rule set by the user on the network management device, and a comparison step 403 is performed.
步骤 403:将网管设备的告警屏蔽规则和获取的管理设备的告警屏蔽规 则进行比较, 获取屏蔽规则增量。 Step 403: The alarm shielding rule of the network management device and the obtained alarm shielding rule of the management device Then compare and get the mask rule increment.
步骤 404: 将上述屏蔽规则增量下发给上述管理设备,按照该屏蔽规则 增量更新上述管理设备的告警屏蔽规则。  Step 404: The above-mentioned masking rule is sent to the management device in an incremental manner, and the alarm masking rule of the management device is incrementally updated according to the masking rule.
其中, 下发上述屏蔽规则增量给上述管理设备, 针对屏蔽规则增量中 的清除屏蔽规则对该管理设备上相应的屏蔽项做清除处理, 而针对屏蔽规 则增量中的新增屏蔽规则对该管理设备上相应的屏蔽项设置屏蔽。  The foregoing filtering rule increment is sent to the management device, and the corresponding shielding item on the management device is cleared for the clearing and blocking rule in the filtering rule increment, and the new shielding rule pair is added to the filtering rule increment. The corresponding mask on this management device sets the mask.
基于上述***架构, 参阅附图 5 , 本发明实施例中, 实现步骤 403告警 屏蔽规则比较的详细流程如下:  Based on the above system architecture, referring to FIG. 5, in the embodiment of the present invention, the detailed process of implementing the step 403 alarm masking rule comparison is as follows:
步骤 501 : 网管设备获取本地预设的釆用树型结构记录的第一告警屏蔽 规则, 以及从至少一个管理设备获取针对该至少一个管理设备预设的釆用 树型结构记录的第二告警屏蔽规则。  Step 501: The network management device acquires a first alarm screening rule recorded by the local preset tree structure, and acquires a second alarm mask recorded from the at least one management device for the preset tree structure record preset by the at least one management device. rule.
步骤 502:将网管设备本地预设的釆用树型结构记录的第一告警屏蔽规 则和上述管理设备预设的釆用树型结构记录的第二告警屏蔽规则, 分别转 换为釆用线性结构记录的第一组告警屏蔽规则和第二组告警屏蔽规则。  Step 502: Convert the first alarm screening rule recorded in the tree structure of the network management device and the second alarm screening rule recorded in the tree structure of the management device to the linear structure record respectively. The first set of alarm screening rules and the second set of alarm screening rules.
将釆用树型结构记录的告警屏蔽规则转换为釆用线性结构记录的告警 屏蔽规则的过程为: 遍历上述釆用树型结构记录的告警屏蔽规则中每个结 点的数据并记录, 上述结点为根结点、 子结点或叶子结点; 每遍历到一个 叶子结点, 将从根结点到该叶子结点路径上的所有结点的数据组合为一条 线性结构的数据, 该线性结构的数据对应一条釆用线性结构记录的告警屏 蔽规则; 将获得的所有釆用线性结构记录的告警屏蔽规则组成一组告警屏 蔽规则。  The process of converting the alarm masking rule recorded by the tree structure into the alarm masking rule recorded by the linear structure is: traversing and recording the data of each node in the alarm masking rule recorded by the above-mentioned tree structure, the above knot The point is the root node, the child node, or the leaf node; each time it traverses to a leaf node, the data from all the nodes on the path from the root node to the leaf node is combined into a linear structure of data. The data of the structure corresponds to an alarm masking rule recorded by the linear structure; all the alarm masking rules recorded by the linear structure are grouped into a set of alarm masking rules.
较优地, 该线性结构釆用字符串的形式, 即将树型结构的告警屏蔽规 则转换为多个字符串的形式, 其中, 一个字符串代表一条告警屏蔽规则, 根据用户设置需求, 告警屏蔽规则可以针对资源、 检测点或告警项进行设 置, 对应树型结构告警屏蔽规则的叶子结点为资源、 检测点或告警项, 转 换为线性结构的字符串可以由资源、 检测点或告警项中的一个或多个信息 组成。 如果告警屏蔽规则是针对告警项进行设置, 则根结点为资源, 子结 点为检测点, 叶子结点为告警项, 每个字符串是由资源、 检测点、 告警项 组成, 其间以逗号分隔, 为最细粒度的告警屏蔽规则。 Preferably, the linear structure is in the form of a string, that is, the alarm masking rule of the tree structure is converted into a plurality of string forms, wherein a string represents an alarm screening rule, and the alarm shielding rule is set according to user setting requirements. It can be set for resources, detection points, or alarm items. The leaf nodes corresponding to the tree structure alarm screening rule are resources, detection points, or alarm items. A string that is changed to a linear structure may consist of one or more of a resource, a detection point, or an alarm item. If the alarm masking rule is set for the alarm item, the root node is the resource, the child node is the detection point, and the leaf node is the alarm item. Each string is composed of resources, detection points, and alarm items, with a comma between them. Separated, the most fine-grained alarm blocking rule.
例如, 用户在设置屏蔽规则时, 需要将资源 1下的检测点 1对应的所 有告警项都屏蔽, 这时, 对应该屏蔽规则的字符串可以只包含资源 1 和检 测点 1 , 表示对检测点 1下的所有告警项设置屏蔽; 又如, 用户在设置屏蔽 规则时, 需要将资源 1下的检测点 1对应的告警项 1屏蔽, 则对应该屏蔽 规则的字符串包含资源 1、 检测点 1、 告警项 1 , 为最细粒度的告警屏蔽规 则。  For example, when setting a masking rule, the user needs to mask all alarm items corresponding to the detection point 1 under the resource 1. In this case, the string corresponding to the masking rule can only contain the resource 1 and the detection point 1 to indicate the detection point. All the alarm items in 1 are set to be masked. For example, when you set the masking rule, you need to mask the alarm item 1 corresponding to the detection point 1 under resource 1. The string corresponding to the mask rule contains the resource 1, and the detection point 1 The alarm item 1 is the finest-grained alarm masking rule.
步骤 503:比较上述针对网管设备的线性结构的第一组告警屏蔽规则和 针对管理设备的线性结构的第二组告警屏蔽规则, 获得屏蔽规则增量。  Step 503: Compare the first set of alarm screening rules for the linear structure of the network management device and the second set of alarm shielding rules for the linear structure of the management device to obtain the screening rule increment.
其中, 屏蔽规则增量包括清除屏蔽规则和新增屏蔽规则, 清除屏蔽规 则表征为管理设备上需要清除的屏蔽规则, 新增屏蔽规则表征为管理设备 上需要的新增的屏蔽规则。  The masking rule increment includes the clearing of the masking rule and the addition of the masking rule. The clearing masking rule is characterized by the masking rule that needs to be cleared on the management device. The new masking rule is characterized as the new masking rule required on the management device.
较佳地, 在对网管设备线性结构的第一组告警屏蔽和管理设备线性结 构的第二组告警屏蔽规则进行比较时, 以管理设备的第一组告警屏蔽规则 为准, 遍历网管设备线性结构的第二组告警屏蔽规则, 通过比较后将网管 设备第一组告警屏蔽规则中不包含, 而管理设备的第二组告警屏蔽规则中 包含的告警项, 作为清除屏蔽规则, 以将管理设备上相应告警项的屏蔽设 置清除。 同理, 以网管设备的第二组告警屏蔽规则为准, 遍历管理设备的 第一组告警屏蔽规则, 通过比较后将管理设备的第二组告警屏蔽规则中不 包含, 而网管设备的第一组告警屏蔽规则中包含的告警项, 作为新增屏蔽 规则, 以对管理设备上相应的告警项设置屏蔽。  Preferably, when comparing the first group of alarm shielding of the linear structure of the network management device with the second group of alarm shielding rules of the linear structure of the management device, the first group of alarm shielding rules of the management device is taken as the standard, and the linear structure of the network management device is traversed. The second set of alarm masking rules is not included in the first group of alarm masking rules of the network management device, and the alarm items included in the second group of alarm masking rules of the management device are used as clearing mask rules to be managed on the device. The mask setting of the corresponding alarm item is cleared. Similarly, the second group of alarm masking rules of the management device is traversed, and the first group of alarm masking rules of the management device is traversed, and the second set of alarm masking rules of the management device is not included, and the network management device is first. The alarm items included in the alarm masking rule are added as masking rules to mask the corresponding alarm items on the management device.
例如, 管理设备上保存的告警屏蔽规则为 A、 B、 C, 用户此次在网管 设备上设置的告警屏蔽规则为 B、 C、 D, 其中, A、 B、 C、 D为告警项, 首先以管理设备上的告警屏蔽规则为准, 遍历网管设备上的告警屏蔽规则, 发现网管设备上不存在告警屏蔽规则 A, 则将 A作为清除屏蔽规则; 其次, 以网管设备上的告警屏蔽规则为准, 遍历管理设备上的告警屏蔽规则, 发 现管理设备上不存在告警屏蔽规则 D, 则将 D作为新增屏蔽规则, 管理设 备和网管设备上的告警屏蔽规则中都有 B、 C, 则 B、 C对应的告警项在设 置前后不变, 将清除屏蔽规则 A和新增屏蔽规则 D作为屏蔽规则增量。 For example, the alarm blocking rules saved on the management device are A, B, and C. The user is in the network management. The alarm masking rules set on the device are B, C, and D. A, B, C, and D are alarms. The alarm masking rules on the management device are used to traverse the alarm masking rules on the network management device. If no alarm masking rule A exists on the device, A is used as the clearing mask rule. Secondly, the alarm masking rule on the management device is traversed. The alarm masking rule D is found on the management device. Then, D is added as a new blocking rule. In the alarm screening rule on the management device and the network management device, there are B and C. Then, the alarm items corresponding to B and C are unchanged before and after the setting, and the screening rule A and the new blocking rule are cleared. D is used as a mask rule increment.
首先对上述步骤 502 中将树型结构的告警屏蔽规则转换为字符串形式 的线性结构告警屏蔽规则的过程进行举例说明。  First, the process of converting the alarm masking rule of the tree structure into the linear structure alarm masking rule in the form of a string is illustrated by the above step 502.
例 1 , 网管设备中定义的告警屏蔽数据结构如下:  Example 1 The alarm mask data structure defined in the network management device is as follows:
AlarmSurvSetList-T:: = SEQUENCE OF AlarmSurvSet-T  AlarmSurvSetList-T:: = SEQUENCE OF AlarmSurvSet-T
AlarmSurvSet-T:: = SEQUENCE {  AlarmSurvSet-T:: = SEQUENCE {
resName Naming Attributes-T 资源、  resName Naming Attributes-T resources,
survSet LayeredProbableCauseList-T 检测点-告警项对应关系列表 }  survSet LayeredProbableCauseList-T detection point-alarm item correspondence list }
LayeredProbableCauseList-T :: = SEQUENCE OF LayeredProbableCauseList-T :: = SEQUENCE OF
LayeredProbableCause-T LayeredProbableCause-T
LayeredProbableCause-T:: = SEQUENCE!  LayeredProbableCause-T:: = SEQUENCE!
layerRate LayerRate-T, 检测点  layerRate LayerRate-T, checkpoint
probableCauseList ProbableCauseList-T 告警项歹1 J表 probableCauseList ProbableCauseList-T Alarm item 歹1 J table
ProbableCauseList-T:: = SEQUENCE OF ProbableCause-T ProbableCauseList-T:: = SEQUENCE OF ProbableCause-T
其中, 一个 AlarmSurvSetList-T表示一个资源下的一系列告警屏蔽规 则, resName表示管理设备中的一个资源(单板、端口或逻辑端口), survSet 表示该资源下的一系列检测点 -告警项的对应关系, layerRate表示检测点的 名称, probableCauseList表示检测点下的告警项列表,假设名称为 resName 1 的资源下有 2个检测点, 分别为 layerRatel、 layerRate2, 在每个检测点下 又有 2 个告警项, 检测点 layerRatel 对应的告警项为 ProbableCausel、 ProbableCause2 , 检测点 layerRate2 对应的告警项为 ProbableCause3、 ProbableCause4, 遍历该树型结构的每个结点, 可转换为 4个字符串, 分别 为{ resNamel , layerRatel , ProbableCausel }、 { resNamel , layerRatel , ProbableCause2 }、 { resNamel , layerRate2 , ProbableCause3 }、 { resNamel , layerRate2, ProbableCause4 } , 其中, 每个字符串代表一条屏蔽规则。 An alarmSurvSetList-T indicates a series of alarm masking rules under a resource. The resName indicates a resource (board, port, or logical port) in the management device. The survSet indicates the corresponding detection point of a series of alarm-alarms. Relationship, layerRate represents the name of the detection point, probableCauseList represents the list of alarm items under the detection point, assuming the name is resName 1 There are two detection points under the resource: layerRatel and layerRate2. There are two alarm items under each detection point. The alarm items corresponding to layerRatel are ProbableCausel and ProbableCause2, and the alarm item corresponding to layerRate2 is ProbableCause3. ProbableCause4, traversing each node of the tree structure, can be converted into 4 strings, namely { resNamel , layerRatel , ProbableCausel }, { resNamel , layerRatel , ProbableCause2 }, { resNamel , layerRate2 , ProbableCause3 }, { resNamel , layerRate2, ProbableCause4 } , where each string represents a blocking rule.
在上述例 1 将树型结构转换为字符串形式的线性结构的基础上, 对步 骤 503中比较网管设备和管理设备的告警屏蔽规则的过程进行举例说明。  On the basis of the above-mentioned example 1, the tree structure is converted into a linear structure in the form of a string, and the process of comparing the alarm masking rules of the network management device and the management device in step 503 is illustrated.
例 2, 假设获取的管理设备的屏蔽规则为对资源 resNamel 的检测点 layerRatel中的 ProbableCausel设置屏蔽, 而用户在网管设备上重新设置的 屏蔽规则为, 对资源 resNamel的检测点 layerRatel中的 ProbableCause2以 及检测点 layerRate2中的 ProbableCause4设置屏蔽。将管理设备的屏蔽规则 转换为线性结构的字符串为 { resNamel , layerRatel , ProbableCausel } , 将 网管上用户设置的屏蔽规则转换为线性结构的字符串为 { resNamel , layerRate 1 , ProbableCause2 }、 { resName 1 , layerRate2 , ProbableCause4 }。 提取管理设备的线性结构的屏蔽规则中的一个字符串与网管设备上用户设 置的线性结构的屏蔽规则中的每个字符串进行比较, 即将字符串 { resNamel , layerRatel , ProbableCausel }与表示网管设备屏蔽规则的所有 字符串进行比较, 比较后发现表示网管设备屏蔽规则的字符串中不包含字 符串 { resName 1 , layerRate 1 , ProbableCause 1 } , 则将字符串 { resName 1 , layerRatel , ProbableCausel }表示的屏蔽规则作为清除屏蔽规则; 将表示网 管设备屏蔽规则的字符串中的每个字符串与表示管理设备屏蔽规则的所有 字符串进行比较, 即将网管设备屏蔽规则中的字符串 { resNamel , layerRatel , ProbableCause2}与表示管理设备屏蔽规则的所有字符串进行比 较, 再将网管设备屏蔽规则中的字符串 { resNamel , layerRate2 , ProbableCause4}与表示管理设备屏蔽规则的所有字符串进行比较, 比较后 发现, 网管设备屏蔽规则中的{ resNamel , layerRatel , ProbableCause2 } , { resNamel , layerRate2, ProbableCause4}字符串在表示管理设备屏蔽规则 的字符串中不存在,则将屏蔽规则 { resNamel , layerRatel , ProbableCause2 }、 { resNamel , layerRate2, ProbableCause4}作为新增展蔽规则。 Example 2: It is assumed that the masking rule of the acquired management device is to mask the ProbableCausel in the layerRatel of the resource resNamel, and the masking rule that the user resets on the network management device is: ProbableCause2 in the layerRatel of the detection point of the resource resName1 and detection Point the mask on the ProbableCause4 in layerRate2. The string that converts the masking rules of the management device into a linear structure is { resNamel , layerRatel , ProbableCausel } , and the string of the user-set masking rule set on the network management into a linear structure is { resNamel , layerRate 1 , ProbableCause2 }, { resName 1 , layerRate2 , ProbableCause4 }. A string in the masking rule for extracting the linear structure of the management device is compared with each string in the masking rule of the linear structure set by the user on the network management device, that is, the string { resNamel , layerRatel , ProbableCausel } and the network management device are shielded. All the strings of the rule are compared. After the comparison, the string representing the masking rule of the network management device does not contain the string { resName 1 , layerRate 1 , ProbableCause 1 } , and the mask represented by the string { resName 1 , layerRatel , ProbableCausel } is blocked. The rule is used as a clearing block rule; each string in the string representing the NMS device blocking rule is compared with all the strings representing the management device blocking rule, that is, the string in the NMS device blocking rule { resNamel , layerRatel , ProbableCause2} Compared to all strings that represent management device blocking rules In contrast, the string { resNamel , layerRate2 , ProbableCause4} in the NMS device blocking rule is compared with all the strings representing the management device blocking rule. After comparison, it is found that { resNamel , layerRatel , ProbableCause2 } in the NMS device shielding rule, The { resNamel , layerRate2 , ProbableCause4} string does not exist in the string representing the management device masking rule, and the blocking rules { resNamel , layerRatel , ProbableCause2 }, { resNamel , layerRate2 , ProbableCause4} are used as the new blinding rules.
基于上述实施例, 将用户在网管设备上预设的釆用树型数据结构记录 的告警屏蔽规则, 以及在网管侧使用树型数据结构记录的在管理设备上设 置的告警屏蔽规则, 分别转换为字符串形式的线性结构, 再对两个线性结 构的屏蔽规则进行比较, 实质是转换为对两组字符串进行比较, 将比较两 组多个树型数据结构转换为比较两组多条字符串, 从而大大减少了比较的 复杂度, 提高了效率。 同时, 比较后获得屏蔽规则增量, 网管在下发屏蔽 规则时只下发该屏蔽规则增量, 对于用户设置前后屏蔽规则不变的告警项 不下发屏蔽规则, 从而节省了不必要报文的下发, 又能保证屏蔽设置的正 确性。  Based on the foregoing embodiment, the alarm screening rule recorded by the user using the tree data structure preset on the network management device and the alarm screening rule set on the management device recorded by the tree data structure on the network management side are respectively converted into The linear structure of the string form, then compare the masking rules of the two linear structures, the essence is to convert to compare two sets of strings, compare two sets of multiple tree data structures to compare two sets of multiple strings , which greatly reduces the complexity of the comparison and improves the efficiency. At the same time, after the comparison, the masking rule increment is obtained. When the NMS sends the masking rule, the NMS only sends the masking rule increment. The masking rule is not sent for the alarm items with the same masking rules before and after the user setting, thus saving unnecessary packets. Send, can guarantee the correctness of the shielding settings.
综上所述, 釆用本发明实施例中的告警屏蔽规则处理方法, 实现了在 节省下发报文、 保证屏蔽设置正确性的前提下, 降低了告警屏蔽规则比较 的复杂度, 提高了效率。 本发明的精神和范围。 这样, 倘若本发明的这些修改和变型属于本发明权 利要求及其等同技术的范围之内, 则本发明也意图包含这些改动和变型在 内。  In summary, the alarm masking rule processing method in the embodiment of the present invention reduces the complexity of the alarm masking rule comparison and improves the efficiency under the premise of saving the delivered message and ensuring the correctness of the mask setting. . The spirit and scope of the invention. Thus, it is intended that the present invention cover the modifications and modifications of the invention

Claims

权利要求书 Claim
1、 一种告警屏蔽规则的处理方法, 其特征在于, 包括:  A method for processing an alarm screening rule, comprising:
网管设备获取本地预设的釆用树型结构记录的第一告警屏蔽规则, 以 及从至少一个管理设备获取针对至少一个所述管理设备预设的釆用树型结 构记录的第二告警屏蔽规则;  Obtaining, by the network management device, a first alarm screening rule recorded by the local preset tree structure, and acquiring, by the at least one management device, a second alarm screening rule recorded for the at least one management device preset tree structure record;
将所述第一告警屏蔽规则和第二告警屏蔽规则分别转换为釆用线性结 构记录的第一组告警屏蔽规则和第二组告警屏蔽规则;  Converting the first alarm screening rule and the second alarm screening rule into a first group of alarm screening rules and a second group of alarm shielding rules respectively recorded by the linear structure;
将所述第一组告警屏蔽规则与第二组告警屏蔽规则进行比较, 获得屏 蔽规则增量。  Comparing the first set of alarm screening rules with the second set of alarm screening rules to obtain a screening rule increment.
2、 如权利要求 1所述的方法, 其特征在于, 将釆用树型结构记录的告 警屏蔽规则转换为釆用线性结构记录的一组告警屏蔽规则, 包括:  2. The method according to claim 1, wherein the alarm masking rule recorded by the tree structure is converted into a set of alarm masking rules recorded by the linear structure, including:
遍历所述釆用树型结构记录的告警屏蔽规则中每个结点的数据并记 录, 所述结点为根结点、 子结点或叶子结点;  Traversing and recording data of each node in the alarm mask rule recorded by the tree structure, the node being a root node, a child node or a leaf node;
每遍历到一个叶子结点, 将从根结点到所述叶子结点路径上的所有结 点的数据组合为一条线性结构的数据; 所述线性结构的数据对应一条釆用 线性结构记录的告警屏蔽规则;  Each time a leaf node is traversed, the data of all the nodes from the root node to the leaf node path are combined into one linear structure data; the data of the linear structure corresponds to an alarm recorded by the linear structure Shielding rules;
将获得的所有釆用线性结构记录的告警屏蔽规则组成一组告警屏蔽规 则。  All the obtained alarm mask rules recorded by the linear structure are grouped into a set of alarm mask rules.
3、 如权利要求 1或 2所述的方法, 其特征在于, 所述线性结构为字符 串的形式, 所述字符串由资源、 检测点或告警项中的一个或多个组成, 一 个字符串代表一条告警屏蔽规则。  The method according to claim 1 or 2, wherein the linear structure is in the form of a string, and the character string is composed of one or more of a resource, a detection point or an alarm item, and a string Represents an alarm blocking rule.
4、 如权利要求 1所述的方法, 其特征在于, 所述屏蔽规则增量表征为 所述管理设备上需要清除的屏蔽规则以及所述管理设备上需要新增的屏蔽 规则。  The method according to claim 1, wherein the masking rule is incrementally characterized by a masking rule that needs to be cleared on the management device and a masking rule that needs to be added on the management device.
5、 如权利要求 1或 4所述的方法, 其特征在于, 获得所述屏蔽规则增 量后, 包括: 下发所述屏蔽规则增量到所述管理设备, 所述管理设备按照 该屏蔽规则增量更新告警屏蔽规则。 The method according to claim 1 or 4, wherein the obtaining of the masking rule is increased After the quantity, the method includes: sending the screening rule increment to the management device, and the management device incrementally updates the alarm screening rule according to the shielding rule.
6、 一种告警屏蔽规则的处理装置, 其特征在于, 包括:  A processing device for an alarm shielding rule, comprising:
第一处理单元, 用于网管设备获取本地预设的釆用树型结构记录的第 一告警屏蔽规则, 以及从至少一个管理设备获取针对至少一个所述管理设 备预设的釆用树型结构记录的第二告警屏蔽规则;  a first processing unit, configured to acquire, by the network management device, a first alarm screening rule recorded by the local preset tree structure, and acquire, from the at least one management device, a preset tree structure record preset for the at least one management device Second alarm screening rule;
第二处理单元, 用于将所述第一告警屏蔽规则和第二告警屏蔽规则分 别转换为釆用线性结构记录的第一组告警屏蔽规则和第二组告警屏蔽规 则;  a second processing unit, configured to convert the first alarm screening rule and the second alarm screening rule into a first group of alarm screening rules and a second group of alarm shielding rules recorded by using a linear structure;
第三处理单元, 用于将所述第一组告警屏蔽规则与所述第二组告警屏 蔽规则进行比较, 获得屏蔽规则增量。  And a third processing unit, configured to compare the first group of alarm screening rules with the second group of alarm screening rules to obtain a screening rule increment.
7、 如权利要求 6所述的装置, 其特征在于, 所述第二处理单元将釆用 树型结构记录的告警屏蔽规则转换为釆用线性结构记录的一组告警屏蔽规 则时,  7. The apparatus according to claim 6, wherein the second processing unit converts an alarm masking rule recorded by the tree structure into a group of alarm masking rules recorded by the linear structure,
还用于遍历所述釆用树型结构记录的告警屏蔽规则中每个结点的数据 并记录, 所述结点为根结点、 子结点或叶子结点;  And traversing and recording the data of each node in the alarm masking rule recorded by the tree structure, where the node is a root node, a child node or a leaf node;
每遍历到一个叶子结点, 将从根结点到所述叶子结点路径上的所有结 点的数据组合为一条线性结构的数据; 所述线性结构的数据对应一条釆用 线性结构记录的告警屏蔽规则;  Each time a leaf node is traversed, the data of all the nodes from the root node to the leaf node path are combined into one linear structure data; the data of the linear structure corresponds to an alarm recorded by the linear structure Shielding rules;
将获得的所有釆用线性结构记录的告警屏蔽规则组成一组告警屏蔽规 则。  All the obtained alarm mask rules recorded by the linear structure are grouped into a set of alarm mask rules.
8、 如权利要求 6或 7所述的装置, 其特征在于, 所述线性结构为字符 串的形式, 所述字符串由资源、 检测点或告警项中的一个或多个组成, 一 个字符串代表一条告警屏蔽规则。  The device according to claim 6 or 7, wherein the linear structure is in the form of a string, and the character string is composed of one or more of a resource, a detection point or an alarm item, and a string Represents an alarm blocking rule.
9、 如权利要求 6所述的装置, 其特征在于, 所述第三处理单元获得的 所述屏蔽规则增量表征为所述管理设备上需要清除的屏蔽规则以及所述管 理设备上需要新增的屏蔽规则。 9. The apparatus according to claim 6, wherein the third processing unit obtains The masking rule is incrementally characterized by a masking rule that needs to be cleared on the management device and a masking rule that needs to be added on the management device.
10、 一种告警屏蔽规则处理***, 其特征在于, 包括: 告警屏蔽规则 处理装置和管理设备; 其中,  An alarm shielding rule processing system, comprising: an alarm shielding rule processing device and a management device; wherein
所述告警屏蔽规则处理装置, 用于网管设备获取本地预设的釆用树型 结构记录的第一告警屏蔽规则, 以及从至少一个所述管理设备获取针对至 少一个所述管理设备预设的釆用树型结构记录的第二告警规则, 将所述第 一告警屏蔽规则和第二告警屏蔽规则分别转换为釆用线性结构记录的第一 组告警屏蔽规则和第二组告警屏蔽规则, 并将所述第一组告警屏蔽规则和 所述第二组告警屏蔽规则进行比较, 获得屏蔽规则增量, 并下发所述屏蔽 规则增量;  The alarm masking rule processing device is configured to acquire, by the network management device, a first alarm screening rule recorded by the local preset tree structure, and acquire preset presets for the at least one of the management devices from the at least one management device. Converting, by the second alarm rule recorded by the tree structure, the first alarm screening rule and the second alarm screening rule into a first group of alarm shielding rules and a second group of alarm shielding rules recorded by using a linear structure, respectively, and Comparing the first group of alarm masking rules with the second group of alarm masking rules, obtaining a masking rule increment, and delivering the masking rule increment;
所述管理设备, 用于接收所述告警屏蔽规则处理装置下发的所述屏蔽 规则增量, 并按照所述屏蔽规则增量更新本地的告警屏蔽规则。  And the management device is configured to receive the mask rule increment sent by the alarm mask rule processing device, and update the local alarm mask rule according to the mask rule incrementally.
PCT/CN2010/078923 2010-07-20 2010-11-19 Method, apparatus and system for processing alarm screening rule WO2012009911A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010233571.1A CN101917282B (en) 2010-07-20 2010-07-20 Method, device and system for processing alarm shielding rules
CN201010233571.1 2010-07-20

Publications (1)

Publication Number Publication Date
WO2012009911A1 true WO2012009911A1 (en) 2012-01-26

Family

ID=43324679

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/078923 WO2012009911A1 (en) 2010-07-20 2010-11-19 Method, apparatus and system for processing alarm screening rule

Country Status (2)

Country Link
CN (1) CN101917282B (en)
WO (1) WO2012009911A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11171851B2 (en) 2014-01-28 2021-11-09 Hewlett Packard Enterprise Development Lp Group alert in server systems

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106326262A (en) * 2015-06-29 2017-01-11 中兴通讯股份有限公司 Alarm inquiry method and device, and optical transmission network management system
CN110213207B (en) * 2018-05-07 2021-12-28 腾讯科技(深圳)有限公司 Network security defense method and equipment based on log analysis
CN113055213B (en) * 2019-12-27 2024-05-28 中兴通讯股份有限公司 Alarm information management method, alarm information management system and server
CN114448774B (en) * 2021-12-16 2023-12-05 武汉光迅科技股份有限公司 Alarm processing method, device and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1581170A (en) * 2003-08-15 2005-02-16 国际商业机器公司 Method and system for comparing files of two computers
CN101106477A (en) * 2006-07-12 2008-01-16 中兴通讯股份有限公司 Method for generating incremental data based on flow number

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1581170A (en) * 2003-08-15 2005-02-16 国际商业机器公司 Method and system for comparing files of two computers
CN101106477A (en) * 2006-07-12 2008-01-16 中兴通讯股份有限公司 Method for generating incremental data based on flow number

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11171851B2 (en) 2014-01-28 2021-11-09 Hewlett Packard Enterprise Development Lp Group alert in server systems

Also Published As

Publication number Publication date
CN101917282B (en) 2014-12-17
CN101917282A (en) 2010-12-15

Similar Documents

Publication Publication Date Title
US11146454B2 (en) Intent driven network policy platform
US20160357424A1 (en) Collapsing and placement of applications
US9043461B2 (en) Firewall event reduction for rule use counting
WO2012009911A1 (en) Method, apparatus and system for processing alarm screening rule
US20180262585A1 (en) Sub-second network telemetry using a publish-subscribe messaging system
CN106487558B (en) A kind of method and apparatus for realizing the scalable appearance of access device
CN107168847A (en) The full link application monitoring method and device of a kind of support distribution formula framework
CN105379168B (en) Conversion synchronization is reconfigured online
US11716343B2 (en) Secure neighborhoods assessment in enterprise networks
US20240037001A1 (en) Large-scale k8s cluster monitoring method, apparatus, device, and readable medium
CN111131079B (en) Policy query method and device
CN110120957B (en) Safe disposal digital twin method and system based on intelligent scoring mechanism
WO2019223178A1 (en) Cross-platform task scheduling method and system, computer device, and storage medium
US20180278481A1 (en) Distributed Policy Store
CN108322318A (en) Alert analysis method and apparatus
CN105933301A (en) SDN based concentrated network worm prevention-control method and device
CN107977310B (en) Traversal test command generation method and device
CN110213073A (en) Data flow variation, electronic equipment, calculate node and storage medium
CN109617746B (en) SCD network configuration verification method based on SPCD file
CN109710693A (en) A kind of Recursive Implementation Method and system that LDAP numeric field data is synchronous
CN102891760B (en) Tunnel protection configuration method and system in a kind of network management system
CN108111420A (en) A kind of flow table item management method, device, electronic equipment and storage medium
CN104580512B (en) Data processing method and device and distributed file system
CN110932875B (en) Alarm device and method in big data cloud computing environment
CN109495178B (en) Method and device for constructing FTTx network topology link

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10854941

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10854941

Country of ref document: EP

Kind code of ref document: A1