Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method, device and equipment for processing an alarm message

A technology of alarm messages and processing methods, applied in the field of information processing, can solve problems such as inability to directly apply new systems, poor generalization performance, etc., and achieve the effect of saving time and cost and efficient compression methods

Active Publication Date: 2021-10-22
CLOUD WISDOM BEIJING TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

To solve the existing technology, it takes a lot of time to design reasonable rules for the system. At the same time, operation and maintenance personnel are required to have sufficient understanding of the system to design and continuously improve these rules, which leads to the generalization performance of such methods Poor, problems that cannot be directly applied to new systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, device and equipment for processing an alarm message
  • A method, device and equipment for processing an alarm message
  • A method, device and equipment for processing an alarm message

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0122] Example 1: An example of an alarm management method, in which the improved Prefixspan algorithm is used in the association stage.

[0123] Such as Figure 5 As shown, in order to clarify the processing process and results, five alarm messages are taken as examples from a large number of alarm messages. These five alarm messages belong to two different nodes, and the host (operation and maintenance node host) IDs are 1041 and 1043 respectively.

[0124] In the alarm merging phase, five alarm messages [a, b, c, d, e] are combined to generate alarm A and alarm B. The alarm message is given the ID of the corresponding alarm;

[0125] Before alarm correlation, alarm messages need to be divided into sequences based on events. With 5 minutes as an event granularity, these five alarm messages can be divided into three sequences. [a, b], [c, d], [e] corresponds to the alarm sequence [A, B], [A, B], [B]. Using the improved Prefixspan algorithm, assuming that the sequence with ...

Embodiment 2

[0126] Embodiment 2: an example of an alarm management method, wherein the association stage adopts a historical rule base algorithm.

[0127] Such as Figure 6 As shown, suppose there are the following 6 alarm messages. Although they are similar in text, they come from four different nodes. There are four types of HostID. The divided alarm sequences are [A, B] and [C, D, A, B].

[0128] In this case, based on the improved Prefixspan algorithm, only [A, B] alarm sequence can be excavated. In this case, it is assumed that the real frequent sequence in the system is [A, B, C, D, A], but because the sequence only appears once, and it happens to be separated by the event window, the Prefixspan algorithm fails to find out the sequence effectively. However, from the perspective of practical application and operation and maintenance experience, due to the frequent occurrence of [A, B, C, D, A] sequences in history, there may already be a complete troubleshooting method, so finding ...

Embodiment 3

[0131] Embodiment 3: Example of Improved Prefixspan Algorithm

[0132] Such as Figure 8 As shown, the algorithm that introduces the tree structure is splitting the data at the same time. Create a root node for the rule tree, count the frequent items in the split sequence set, and remove the infrequent items from the sequence data.

[0133] Take item a among the frequent items as an example, the process of other frequent items is the same as a, create a new leaf node for a, and mark a as processed. Such as Figure 9 shown. Transfer to the newly created a node, find that the frequent item is only d, and create a child node d. If it is found that d does not have a suffix item, check to see if there are other unprocessed frequent items, and transfer to it if it exists. Finally, an example graph of the rule tree looks like Figure 8 shown. It can be seen that the sequence set has common frequent sequences [a, d], [a], [b], [c], [d].

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method, device and equipment for processing an alarm message. The method includes: acquiring the occurrence time of the alarm information and the alarm label to which the alarm message belongs; dividing the alarm message into multiple alarm messages according to the occurrence time of the alarm message sequences, each of which includes alarm tags arranged in chronological order; according to the plurality of sequences, a rule tree is constructed, and the rule tree stores frequent items and the number of times that frequent items appear in each sequence, and the frequent items are An object in the sequence; according to the rule tree, determine frequent sequence rules; determine events according to the frequent sequence rules. The solution of the present invention prevents the generation of a large number of meaningless sequence rules in extreme cases, provides a more efficient compression method for operation and maintenance personnel, no longer needs to manually set the rules for event generation, and greatly saves time and cost.

Description

technical field [0001] The present invention relates to the technical field of information processing, in particular to a method, device and equipment for processing alarm messages. Background technique [0002] Alarm messages are a common source of information in the O&M field and an important way for O&M personnel to understand the system's operating status. Usually, a system is equipped with different monitoring centers, which monitor the operating status of the system all the time, and send out an alarm message describing the fault information when the system fails. [0003] The alarm message contains information such as the time, source, level, and description of the fault phenomenon. However, in reality, due to the large number of equipment nodes and measurement nodes in most systems, different monitoring centers have different alarm standards, resulting in a large number of alarm messages and mixed information, requiring manual screening by operation and maintenance ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/32G06F16/2458
CPCG06F11/327G06F2216/03G06F16/2465
Inventor 卢鑫源郑铁樵张博
Owner CLOUD WISDOM BEIJING TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products