Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Alarm message processing method, device and equipment

An alarm message and processing method technology, applied in the field of information processing, can solve problems such as poor generalization performance, inability to directly apply new systems, etc., and achieve the effect of efficient compression method and saving time and cost

Active Publication Date: 2021-08-24
CLOUD WISDOM BEIJING TECH
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

To solve the existing technology, it takes a lot of time to design reasonable rules for the system. At the same time, operation and maintenance personnel are required to have sufficient understanding of the system to design and continuously improve these rules, which leads to the generalization performance of such methods Poor, problems that cannot be directly applied to new systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Alarm message processing method, device and equipment
  • Alarm message processing method, device and equipment
  • Alarm message processing method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0122] Example 1: An example of an alarm management method, in which the improved Prefixspan algorithm is used in the association stage.

[0123] Such as Figure 5 As shown, in order to clarify the processing process and results, five alarm messages are taken as examples from a large number of alarm messages. These five alarm messages belong to two different nodes, and the host (operation and maintenance node host) IDs are 1041 and 1043 respectively.

[0124] In the alarm merging phase, five alarm messages [a, b, c, d, e] are combined to generate alarm A and alarm B. The alarm message is given the ID of the corresponding alarm;

[0125] Before alarm correlation, alarm messages need to be divided into sequences based on events. With 5 minutes as an event granularity, these five alarm messages can be divided into three sequences. [a, b], [c, d], [e] corresponds to the alarm sequence [A, B], [A, B], [B]. Using the improved Prefixspan algorithm, assuming that the sequence with ...

Embodiment 2

[0126] Embodiment 2: an example of an alarm management method, wherein the association stage adopts a historical rule base algorithm.

[0127] Such as Figure 6 As shown, suppose there are the following 6 alarm messages. Although they are similar in text, they come from four different nodes. There are four types of HostID. The divided alarm sequences are [A, B] and [C, D, A, B].

[0128] In this case, based on the improved Prefixspan algorithm, only [A, B] alarm sequence can be excavated. In this case, it is assumed that the real frequent sequence in the system is [A, B, C, D, A], but because the sequence only appears once, and it happens to be separated by the event window, the Prefixspan algorithm fails to find out the sequence effectively. However, from the perspective of practical application and operation and maintenance experience, due to the frequent occurrence of [A, B, C, D, A] sequences in history, there may already be a complete troubleshooting method, so finding ...

Embodiment 3

[0131] Embodiment 3: Example of Improved Prefixspan Algorithm

[0132] Such as Figure 8 As shown, the algorithm that introduces the tree structure is splitting the data at the same time. Create a root node for the rule tree, count the frequent items in the split sequence set, and remove the infrequent items from the sequence data.

[0133] Take item a among the frequent items as an example, the process of other frequent items is the same as a, create a new leaf node for a, and mark a as processed. Such as Figure 9 shown. Transfer to the newly created a node, find that the frequent item is only d, and create a child node d. If it is found that d does not have a suffix item, check to see if there are other unprocessed frequent items, and transfer to it if it exists. Finally, an example graph of the rule tree looks like Figure 8 shown. It can be seen that the sequence set has common frequent sequences [a, d], [a], [b], [c], [d].

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an alarm message processing method, device and equipment. The method comprises the following steps: acquiring the occurrence time of alarm information and an alarm label to which the alarm information belongs; dividing the alarm message into a plurality of sequences according to the occurrence time of the alarm message, wherein each sequence comprises alarm tags arranged according to a time sequence; according to the multiple sequences, constructing a rule tree, wherein frequent items and the frequency of occurrence of the frequent items in all the sequences are stored in the rule tree, and each frequent item is an object in the corresponding sequence; determining a frequent sequence rule according to the rule tree; and determining an event according to the frequent sequence rule. According to the scheme, a large number of meaningless sequence rules are prevented from being generated under the extreme condition, a more efficient compression method is provided for operation and maintenance personnel, the event generation rules do not need to be manually set, and the time cost is greatly saved.

Description

technical field [0001] The present invention relates to the technical field of information processing, in particular to a method, device and equipment for processing alarm messages. Background technique [0002] Alarm messages are a common source of information in the O&M field and an important way for O&M personnel to understand the system's operating status. Usually, a system is equipped with different monitoring centers, which monitor the operating status of the system all the time, and send out an alarm message describing the fault information when the system fails. [0003] The alarm message contains information such as the time, source, level, and description of the fault phenomenon. However, in reality, due to the large number of equipment nodes and measurement nodes in most systems, different monitoring centers have different alarm standards, resulting in a large number of alarm messages and mixed information, requiring manual screening by operation and maintenance ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/32G06F16/2458
CPCG06F11/327G06F2216/03G06F16/2465
Inventor 卢鑫源郑铁樵张博
Owner CLOUD WISDOM BEIJING TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products