Unlock instant, AI-driven research and patent intelligence for your innovation.

An alarm processing method and device

A processing method and processing device technology, applied in the field of cloud computing, can solve problems such as system server pressure, redundant data, and a large number of alarms concurrently generated, so as to reduce pressure, reduce sending, and reduce invalid alarms and redundant alarm data the effect of

Active Publication Date: 2019-10-18
NEW H3C CLOUD TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the cloud operation and maintenance scenario, the diversity of resource types and the complexity of management methods in the cloud operation and maintenance center determine that the number of resources managed by the operation and maintenance management platform will be several times larger than that in the traditional operation and maintenance scenario. Correspondingly, the number and frequency of alarms generated in the operation and maintenance management platform will be much higher than those in traditional operation and maintenance, which will put greater pressure on the system performance of the operation and maintenance management platform
In addition, not all alarms generated in the operation and maintenance management platform are effective alarms. For example, if the entire cluster network of a virtual machine cluster monitored by the platform is unreachable, the cluster unreachable alarm will be triggered first, but the The virtual machine and the application on each virtual machine will also trigger an unreachable alarm. At this time, a large number of alarms will be generated in the operation and maintenance management platform system at the same time, but for the operation and maintenance personnel in this scenario, they only need to receive one Cluster unreachable alarms are fine, and other alarms are triggered by cluster unreachable alarms, which are of no value in actual operation and maintenance and monitoring, and are invalid alarms; however, whether they are valid alarms or invalid alarms, they will be directly issued by The alarm source is sent to the alarm receiver, causing a large number of alarms to be generated concurrently, resulting in a lot of redundant data, which puts pressure on the system server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An alarm processing method and device
  • An alarm processing method and device
  • An alarm processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Unlike the prior art where the alarm source generates the alarm information and then directly sends the alarm information to the alarm receiver, in the embodiment of the present application, after receiving the pending alarm information sent by the alarm source, it will The set of labels and the set of labels carried in the received historical alarm information can be processed to eliminate invalid alarms for the alarm information to be processed, so as to effectively reduce the number of alarms sent to the alarm receiver, reduce redundant data, and reduce the need for alarms. pressure from the receiver.

[0026] Generally, when an alarm source fails, the same fault may trigger multiple alarms, including direct alarms directly caused by the fault, and indirect alarms indirectly caused by the fault; some or all of the indirect alarms are invalid Alarms, for example: when a LAN is disconnected, the direct alarm triggered is the LAN unreachable alarm, and the indirect alar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application relates to the field of cloud computing technology, and particularly to an alert processing method and device, which are used for carrying out processing of invalid-alert elimination on to-be-processed alert information, which is sent by an alert source, after the to-be-processed alert information is received, and can thus effectively decrease the number of alerts sent to an alertreceiver, reduce redundant data, and reduce pressure caused on the alert receiver. The method includes: receiving the to-be-processed alert information sent by the alert source, wherein the to-be-processed alert information includes a tag set, and the tag set contains at least one tag; according to a source matching tag set corresponding to historical alert information, determining whether the tagset carried in the to-be-processed alert information includes a target matching tag set corresponding to the source matching tag set; and carrying out suppression processing on the to-be-processed alert information when it is determined that the tag set carried in the to-be-processed alert information includes the target matching tag set corresponding to the source matching tag set.

Description

technical field [0001] The present application relates to the technical field of cloud computing, and in particular to an alarm processing method and device. Background technique [0002] Cloud Computing (Cloud Computing) is a computing method based on the Internet. In this way, the software and hardware resources and information shared on the Internet can be provided to various terminals and other devices on demand. Compared with traditional operation and maintenance, cloud operation and maintenance is very different in terms of operation and maintenance form, management resource type, management resource quantity, monitoring granularity, degree of automation and intelligence, etc. The form of operation and maintenance has gradually changed from traditional manual troubleshooting and problem solving to automatic operation and maintenance, and fault self-healing. The types of management resources range from traditional operation and maintenance physical devices to physical ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/32G06Q10/00
Inventor 李思捷
Owner NEW H3C CLOUD TECH CO LTD