CN116016121B - Method, device, equipment and storage medium for determining associated data of alarm data - Google Patents
Method, device, equipment and storage medium for determining associated data of alarm data Download PDFInfo
- Publication number
- CN116016121B CN116016121B CN202310293280.9A CN202310293280A CN116016121B CN 116016121 B CN116016121 B CN 116016121B CN 202310293280 A CN202310293280 A CN 202310293280A CN 116016121 B CN116016121 B CN 116016121B
- Authority
- CN
- China
- Prior art keywords
- alarm
- alarm data
- association
- data
- rule
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
本申请提供一种告警数据的关联数据确定方法、装置、设备及存储介质。该方法包括:获取告警数据以及网络拓扑图,所述网络拓扑图包括发生所述告警数据的告警设备之间的关联关系,所述告警设备包括物理设备和虚拟设备;基于预设的挖掘规则对所述告警数据进行挖掘,得到多个初始关联规则,所述初始关联规则包括相互关联的两个告警数据;根据所述网络拓扑图,将所述多个初始关联规则中其两个告警数据对应的告警设备之间存在关联关系的初始关联规则,确定为目标关联规则;根据所述目标关联规则,确定与待分析的告警数据关联的关联数据。本申请的方法,提升了对关联规则的挖掘准确性。
The present application provides a method, device, equipment and storage medium for determining associated data of alarm data. The method includes: obtaining alarm data and a network topology diagram, the network topology diagram including the association relationship between the alarm devices that generate the alarm data, and the alarm devices include physical devices and virtual devices; The alarm data is mined to obtain a plurality of initial association rules, the initial association rules include two interrelated alarm data; according to the network topology map, the two alarm data in the plurality of initial association rules correspond to The initial association rule that has an association relationship between the alarm devices is determined as the target association rule; according to the target association rule, the associated data associated with the alarm data to be analyzed is determined. The method of the present application improves the mining accuracy of association rules.
Description
技术领域technical field
本申请涉及通信技术,尤其涉及一种告警数据的关联数据确定方法、装置、设备及存储介质。The present application relates to communication technology, and in particular to a method, device, device and storage medium for determining associated data of alarm data.
背景技术Background technique
电信网络中,管理服务运维每天面对几百万的海量告警数据,传统的告警处理方式存在很多问题。例如,监控工作量大,人工负荷高;易出现告警刷屏的现象,导致无法及时发现重要告警,使得告警处理延误;对多条同根因告警同时处理导致资源浪费等。In the telecommunications network, management service operation and maintenance face millions of massive alarm data every day, and there are many problems in the traditional alarm processing method. For example, the monitoring workload is heavy and the manual load is high; the phenomenon of alarm swiping is easy to occur, resulting in the failure to find important alarms in time, resulting in delays in alarm processing; simultaneous processing of multiple alarms of the same root cause waste of resources, etc.
因此,目前通常会获取某个时间段内的所有告警,通过关联规则算法,把告警作为关联规则算法的输入,生成告警之间的关联规则。Therefore, at present, all alarms in a certain period of time are usually obtained, and the alarms are used as the input of the association rule algorithm through the association rule algorithm to generate association rules between alarms.
然而,通过上述方式得到的关联规则,大都是算法上有关联,而无逻辑上的关联,存在较多无效的关联规则,导致闭环效率较低,得到的关联规则不准确。However, most of the association rules obtained through the above methods are algorithmically related but not logically related, and there are many invalid association rules, resulting in low closed-loop efficiency and inaccurate association rules.
发明内容Contents of the invention
本申请提供一种告警数据的关联数据确定方法、装置、设备及存储介质,用以解决目前通过关联规则算法得到的告警数据的关联规则不准确的问题。The present application provides a method, device, device, and storage medium for determining associated data of alarm data, which are used to solve the problem of inaccurate association rules of alarm data currently obtained through association rule algorithms.
第一方面,本申请提供一种告警数据的关联数据确定方法,包括:In a first aspect, the present application provides a method for determining associated data of alarm data, including:
获取告警数据以及网络拓扑图,所述网络拓扑图包括发生所述告警数据的告警设备之间的关联关系,所述告警设备包括物理设备和虚拟设备;Acquiring alarm data and a network topology diagram, the network topology diagram including associations between alarm devices that generate the alarm data, the alarm devices including physical devices and virtual devices;
基于预设的挖掘规则对所述告警数据进行挖掘,得到多个初始关联规则,所述初始关联规则包括相互关联的两个告警数据;Mining the alarm data based on preset mining rules to obtain a plurality of initial association rules, the initial association rules including two associated alarm data;
根据所述网络拓扑图,将所述多个初始关联规则中其两个告警数据对应的告警设备之间存在关联关系的初始关联规则,确定为目标关联规则;According to the network topology diagram, an initial association rule with an association relationship between alarm devices corresponding to two alarm data among the plurality of initial association rules is determined as a target association rule;
根据所述目标关联规则,确定与待分析的告警数据关联的关联数据。According to the target association rule, the association data associated with the alarm data to be analyzed is determined.
第二方面,本申请提供一种告警数据的关联数据确定装置,包括:In a second aspect, the present application provides an apparatus for determining associated data of alarm data, including:
信息获取模块,用于获取告警数据以及网络拓扑图,所述网络拓扑图包括发生所述告警数据的告警设备之间的关联关系,所述告警设备包括物理设备和虚拟设备;An information acquisition module, configured to acquire alarm data and a network topology diagram, the network topology diagram including associations between alarm devices that generate the alarm data, and the alarm devices include physical devices and virtual devices;
规则挖掘模块,用于基于预设的挖掘规则对所述告警数据进行挖掘,得到多个初始关联规则,所述初始关联规则包括相互关联的两个告警数据;A rule mining module, configured to mine the alarm data based on preset mining rules to obtain a plurality of initial association rules, the initial association rules including two associated alarm data;
目标关联规则确定模块,用于根据所述网络拓扑图,将所述多个初始关联规则中其两个告警数据对应的告警设备之间存在关联关系的初始关联规则,确定为目标关联规则。The target association rule determining module is configured to determine, according to the network topology diagram, an initial association rule in the plurality of initial association rules that has an association relationship between alarm devices corresponding to two alarm data as a target association rule.
关联数据确定模块,用于根据所述目标关联规则,确定与待分析的告警数据关联的关联数据。An associated data determining module, configured to determine associated data associated with the alarm data to be analyzed according to the target association rule.
第三方面,本申请提供一种电子设备,包括:处理器,以及与所述处理器通信连接的存储器;所述存储器存储计算机执行指令;所述处理器执行所述存储器存储的计算机执行指令,以实现第一方面所述的方法。In a third aspect, the present application provides an electronic device, including: a processor, and a memory communicatively connected to the processor; the memory stores computer-executable instructions; the processor executes the computer-executable instructions stored in the memory, To realize the method described in the first aspect.
第四方面,本申请提供一种计算机可读存储介质,所述计算机可读存储介质中存储有计算机执行指令,所述计算机执行指令被处理器执行时用于实现第一方面所述的告警数据的关联数据确定方法。In a fourth aspect, the present application provides a computer-readable storage medium, where computer-executable instructions are stored in the computer-readable storage medium, and the computer-executable instructions are used to implement the alarm data described in the first aspect when executed by a processor Linked data determination method.
第五方面,本申请提供一种计算机程序产品,包括计算机程序,该计算机程序被处理器执行时实现第一方面所述的方法。In a fifth aspect, the present application provides a computer program product, including a computer program, and when the computer program is executed by a processor, the method described in the first aspect is implemented.
本申请提供的告警数据的关联数据确定方法,通过获取告警数据以及网络拓扑图,网络拓扑图包括发生告警数据的告警设备之间的关联关系,告警设备包括物理设备和虚拟设备;基于预设的挖掘规则对告警数据进行挖掘,得到多个初始关联规则,初始关联规则包括相互关联的两个告警数据;根据网络拓扑图,将多个初始关联规则中其两个告警数据对应的告警设备之间存在关联关系的初始关联规则,确定为目标关联规则;根据目标关联规则,确定与待分析的告警数据关联的关联数据。由于网络拓扑图中包括发生告警数据的告警设备之间的关联关系,所以通过该网络拓扑图可以确定告警数据之间的逻辑关系,也就是说,在通过预设的挖掘规则对告警数据进行挖掘,得到多个初始关联规则后,再通过网络拓扑图对多个初始关联规则中是否存在逻辑关系进行验证,过滤掉验证没有通过的初始关联规则后,即可得到既有算法关联,又有逻辑关联的关联规则,从而保证了得到的目标关联规则的准确性,进而提升了通过该目标关联规则确定的与待分析的告警数据对应的关联数据的准确性。The method for determining associated data of alarm data provided in this application obtains alarm data and a network topology map, and the network topology map includes the association relationship between alarm devices that generate alarm data, and the alarm devices include physical devices and virtual devices; based on preset Mining rules Mining the alarm data to obtain multiple initial association rules, the initial association rules include two related alarm data; The initial association rule with association relationship is determined as the target association rule; according to the target association rule, the associated data associated with the alarm data to be analyzed is determined. Since the network topology diagram includes the association relationship between the alarm devices that generate the alarm data, the logical relationship between the alarm data can be determined through the network topology diagram, that is, the alarm data is mined through the preset mining rules. After obtaining multiple initial association rules, verify whether there is a logical relationship in the multiple initial association rules through the network topology diagram, and filter out the initial association rules that fail the verification, you can get both algorithm association and logic The associated association rules ensure the accuracy of the obtained target association rules, thereby improving the accuracy of the associated data determined through the target association rules and corresponding to the alarm data to be analyzed.
附图说明Description of drawings
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本申请的实施例,并与说明书一起用于解释本申请的原理。The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description serve to explain the principles of the application.
图1是根据一示例性实施例示出的一种告警数据的关联数据确定方法的方法流程图;Fig. 1 is a method flowchart of a method for determining associated data of alarm data according to an exemplary embodiment;
图2是根据图1实施例示出的一种网络拓扑图;Fig. 2 is a kind of network topology diagram shown according to the embodiment of Fig. 1;
图3是根据另一示例性实施例示出的一种告警数据的关联数据确定方法的方法流程图;Fig. 3 is a method flowchart of a method for determining associated data of alarm data according to another exemplary embodiment;
图4是根据图3实施例示出的告警数据的关联数据确定方法的具体实施流程图;Fig. 4 is a specific implementation flowchart of the method for determining associated data of alarm data according to the embodiment shown in Fig. 3;
图5是根据又一示例性实施例示出的一种告警数据的关联数据确定方法的方法流程图;Fig. 5 is a method flowchart of a method for determining associated data of alarm data according to yet another exemplary embodiment;
图6是根据一示例性实施例示出的一种告警数据的关联数据确定装置的框图;Fig. 6 is a block diagram of an apparatus for determining associated data of alarm data according to an exemplary embodiment;
图7是根据一示例性实施例示出的一种电子设备的结构示意图。Fig. 7 is a schematic structural diagram of an electronic device according to an exemplary embodiment.
通过上述附图,已示出本申请明确的实施例,后文中将有更详细的描述。这些附图和文字描述并不是为了通过任何方式限制本申请构思的范围,而是通过参考特定实施例为本领域技术人员说明本申请的概念。By means of the above drawings, specific embodiments of the present application have been shown, which will be described in more detail hereinafter. These drawings and text descriptions are not intended to limit the scope of the concept of the application in any way, but to illustrate the concept of the application for those skilled in the art by referring to specific embodiments.
具体实施方式Detailed ways
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本申请相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本申请的一些方面相一致的装置和方法的例子。Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.
首先对本申请所涉及的名词进行解释:First, the nouns involved in this application are explained:
告警数据,是指告警系统发生故障时,监控单元将视故障情况给出告警信号。通常,告警可以用告警发生时间、发生告警的设备的名称、告警类型或告警名称、告警消除时间中的一个或者多个来表示。Alarm data means that when the alarm system fails, the monitoring unit will give an alarm signal depending on the failure situation. Generally, an alarm can be represented by one or more of the time when the alarm occurred, the name of the device where the alarm occurred, the type or name of the alarm, and the time when the alarm was cleared.
项集、单项集、k项集和频繁项集,其中,项的集合称为项集。包含k个项的项集可以称为k项集。当k=1时,项集也可以称为单项集。频繁项集是在数据库中大量频繁出现的项集。在本申请中,项集中的项为告警,因此项集也可以称为告警项集或者事件项集。Itemsets, single itemsets, k-itemsets and frequent itemsets, where a collection of items is called an itemset. An itemset that contains k items can be called a k-itemset. When k=1, the item set can also be called a single item set. Frequent itemsets are itemsets that appear frequently in a large number of databases. In this application, the items in the itemset are alarms, so the itemset may also be called an alarm itemset or an event itemset.
支持度,支持度指某个项集在整个数据集中的比例。Support refers to the proportion of an item set in the entire data set.
置信度,置信度是针对某个关联规则定义的。在给定A发生的情况下,由关联规则“A->B”推出B出现的概率。Confidence, which is defined for an association rule. Given the occurrence of A, the probability of B appearing is deduced from the association rule "A->B".
关联规则,关联规则是在频繁项集的基础上得到的。关联规则指由项集A,可以在某置信度下推出项集B。Association rules, association rules are obtained on the basis of frequent itemsets. Association rules mean that from itemset A, itemset B can be deduced under a certain degree of confidence.
网络拓扑,网络拓扑是指用传输介质互连各种设备的物理布局,是构成网络的设备间特定的物理的(即真实的)或者逻辑的(即虚拟的)排列方式。如果两个网络的连接结构相同我们就说它们的网络拓扑相同,尽管它们各自内部的物理接线、节点间距离可能会有不同。Network topology, network topology refers to the physical layout of various devices interconnected by transmission media, and is a specific physical (that is, real) or logical (that is, virtual) arrangement of devices that constitute a network. If two networks have the same connection structure, we say that their network topology is the same, although their respective internal physical wiring and distance between nodes may be different.
随着虚拟化网络的发展及普及,网络架构也演进的越来越复杂。由网络设备产生的告警,从原来的硬件设备,演进为硬件设备与虚拟设备相互影响、相互作用的复杂告警。在此背景下,告警量出现倍数增长。网络运维人员,面对百万级的海量告警,依然沿用传统的监控方式,存在着如下问题:告警量太大无法全量监控;重要告警被大量告警掩盖,容易被遗漏;新网络架构下人工经验积累不足,难以梳理全量的关联规则;网络拓扑复杂,网络结构上的任何一个节点出现故障,都可能影响其他节点,通过人工梳理大量告警的根因已,越来越困难。在此背景下,如何针对新的网络架构获取准确、实用的关联规则,对告警进行压缩,减少故障派单量显得尤为重要。With the development and popularization of virtualized networks, network architectures are becoming more and more complex. Alarms generated by network devices have evolved from original hardware devices to complex alarms that interact and interact with each other between hardware devices and virtual devices. In this context, the number of alarms has increased exponentially. Network operation and maintenance personnel still use the traditional monitoring method in the face of millions of alarms, and there are the following problems: the number of alarms is too large to be fully monitored; important alarms are covered by a large number of alarms and are easy to be missed; Insufficient experience accumulation makes it difficult to sort out all the association rules; the network topology is complex, and the failure of any node on the network structure may affect other nodes. It is becoming more and more difficult to manually sort out the root causes of a large number of alarms. In this context, how to obtain accurate and practical association rules for the new network architecture, compress alarms, and reduce the number of fault orders is particularly important.
目前对于主要关联规则的生成,主要集中在两个方面。一是,获取某个时间段内的所有告警,通过关联规则算法,把告警作为关联规则算法的输入,生成告警之间的关联规则。例如在一种相关技术中,将告警之间的信息转化为向量之间的关系,根据向量之间的关系得到近似的频繁项,再根据近似的频繁项生成告警关联规则。在另一种相关技术中,根据标准化告警数据和每类告警数据对应的特征字段构建告警族谱;基于告警族谱,按照预设告警规则挖掘参数挖掘告警关联规则,获得挖掘后告警关联规则。At present, the generation of main association rules mainly focuses on two aspects. One is to obtain all alarms within a certain period of time, and use the alarm as the input of the association rule algorithm through the association rule algorithm to generate association rules between alarms. For example, in a related technology, information between alarms is converted into a relationship between vectors, approximate frequent items are obtained according to the relationship between vectors, and alarm association rules are generated based on the approximate frequent items. In another related technology, the alarm family tree is constructed according to the standardized alarm data and the characteristic fields corresponding to each type of alarm data; based on the alarm family tree, the alarm association rules are mined according to the preset alarm rule mining parameters, and the mined alarm association rules are obtained.
在又一种相关技术中,在上述相关技术的基础上,增加了网元拓扑约束模型约,利用约束模型,进行对故障进行定位。例如,通过构建网元拓扑约束模型;检测被管网络中各个网元设备的运行状态,以发现故障事件;采集故障事件;利用网元拓扑约束模型,对采集到的故障事件进行时间层关联和空间层关联,确定故障位置。In yet another related technology, on the basis of the above related technologies, a network element topology constraint model is added, and a fault is located using the constraint model. For example, by constructing a network element topology constraint model; detecting the running status of each network element device in the managed network to discover fault events; collecting fault events; Spatial layer correlation to determine fault location.
综上所述,在相关技术中,告警关联大都是算法上有关联而无逻辑上的关联,存在较多无效的关联规则,导致闭环效率较低。在对告警增加了网元拓扑约束的,拓扑的模型是采用简单网络管理协议(Simple Network Management Protocol,SNMP)协议和Internet控制报文协议(Internet Control Message Protocol,ICMP)等协议来构建的网元拓扑约束,而虚拟化网络中,仅采用这些协议来构建拓扑,已经不再适用;如果无法构建出虚拟化网络的拓扑,约束亦不再成立。另外,目前所有的方案中,针对关联规则的挖掘,均是线下训练完成,然后通过人工经验判断,再应用到生产环境中。To sum up, in related technologies, most of the alarm associations are algorithmic but not logical, and there are many invalid association rules, resulting in low closed-loop efficiency. When the network element topology constraint is added to the alarm, the topology model is a network element constructed by using protocols such as Simple Network Management Protocol (SNMP) and Internet Control Message Protocol (Internet Control Message Protocol, ICMP). Topology constraints, and in a virtualized network, only using these protocols to construct a topology is no longer applicable; if the topology of a virtualized network cannot be constructed, the constraints are no longer valid. In addition, in all the current schemes, the mining of association rules is completed offline training, and then judged by manual experience, and then applied to the production environment.
本申请提供的告警数据的关联数据确定方法,旨在解决现有技术的如上技术问题。The method for determining associated data of alarm data provided in this application aims to solve the above technical problems in the prior art.
下面以具体地实施例对本申请的技术方案以及本申请的技术方案如何解决上述技术问题进行详细说明。下面这几个具体的实施例可以相互结合,对于相同或相似的概念或过程可能在某些实施例中不再赘述。下面将结合附图,对本申请的实施例进行描述。The technical solution of the present application and how the technical solution of the present application solves the above technical problems will be described in detail below with specific embodiments. The following specific embodiments may be combined with each other, and the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present application will be described below in conjunction with the accompanying drawings.
图1是根据一示例性实施例示出的一种告警数据的关联数据确定方法,如图1所示,该告警数据的关联数据确定方法可以包括:Fig. 1 is a method for determining associated data of alarm data according to an exemplary embodiment. As shown in Fig. 1 , the method for determining associated data of alarm data may include:
110、获取告警数据以及网络拓扑图,网络拓扑图包括发生告警数据的告警设备之间的关联关系,告警设备包括物理设备和虚拟设备。110. Acquire alarm data and a network topology diagram, where the network topology diagram includes association relationships between alarm devices that generate alarm data, and the alarm devices include physical devices and virtual devices.
示例性地,本实施例的执行主体可以是电子设备、或者终端设备、或者可以执行该告警数据的关联数据确定方法的处理装置或设备、或者其他可以执行本实施例的装置或设备,不做限制。本实施例以执行主体为电子设备进行说明。Exemplarily, the execution subject of this embodiment may be an electronic device, or a terminal device, or a processing device or device that can execute the method for determining the associated data of the alarm data, or other devices or devices that can execute this embodiment. limit. In this embodiment, the execution subject is an electronic device for description.
在一些实施方式中,电子设备可以连接告警数据的数据库,该数据库中可以存储过去一段时间内产生的告警数据以及实时产生的告警数据。电子设备可以从该告警数据的数据库中电子设备可以调用指定时间段内发生的告警数据,从而获得告警数据。其中,该告警数据的数量为多个。可选地,告警数据可以包括告警发生时间、发生告警的设备的名称、告警类型、告警标识以及告警名称等。In some embodiments, the electronic device may be connected to a database of alarm data, and the database may store alarm data generated in a past period of time and alarm data generated in real time. The electronic device can call the alarm data that occurs within a specified time period from the alarm data database, so as to obtain the alarm data. Wherein, the quantity of the alarm data is multiple. Optionally, the alarm data may include the alarm occurrence time, the name of the device where the alarm occurred, the alarm type, the alarm identifier, the alarm name, and the like.
在一些实施方式中,电子设备可以连接云化网络,从而结合云化网络资源生成网络拓扑图。示例性地,如图2所示,该网络拓扑图可以为纵向云化网络拓扑图,该纵向云化网络拓扑图可以包括网元层、虚拟层、主机层、TOR层、EOR层以及路由层等,其中,网元层、虚拟层、主机层、TOR层、EOR层以及路由层从上到下依次连接,每个层中可以包括多个节点,例如网元层可以包括节点a1,虚拟层可以包括节点b1至节点bn,主机层可以包括节点c1至节点cn,TOR层可以包括节点d1至节点dn。不同层之间的节点可以相互连接,例如主机层的节点c1与TOR层的节点d1连接,则可以表示节点c1对应的设备和节点d1对应的设备之间存在关联关系,也可以看作是节点c1对应的设备和节点d1对应的设备之间存在逻辑关系。其中,该多个节点中有些表示物理设备,有些表示虚拟设备。In some implementations, the electronic device can be connected to the cloud network, so as to generate a network topology map in combination with cloud network resources. Exemplarily, as shown in FIG. 2, the network topology diagram may be a vertical cloud network topology diagram, and the vertical cloudization network topology diagram may include a network element layer, a virtualization layer, a host layer, a TOR layer, an EOR layer, and a routing layer etc., wherein, the network element layer, the virtual layer, the host layer, the TOR layer, the EOR layer and the routing layer are sequentially connected from top to bottom, each layer may include multiple nodes, for example, the network element layer may include node a1, and the virtual layer It may include node b1 to node bn, the host layer may include node c1 to node cn, and the TOR layer may include node d1 to node dn. Nodes between different layers can be connected to each other. For example, node c1 of the host layer is connected to node d1 of the TOR layer, which means that there is an association between the device corresponding to node c1 and the device corresponding to node d1, and can also be regarded as a node There is a logical relationship between the device corresponding to c1 and the device corresponding to node d1. Wherein, some of the plurality of nodes represent physical devices, and some represent virtual devices.
作为一种示例,该网元层可以是结合云化网络资源生成的网络功能虚拟化(Network Functions Virtualization,NFV)横向云化网络拓扑图,在该网元层中,基础网元均下挂在总线上,从而可以对网元总体情况进行总览。具体可以参考现有技术中5GC网元的网络拓扑图,故不在此赘述。其中,网元层主要包括节点对应物理设备。上述告警数据可以发生在上述网络拓扑图中的任意节点对应的设备中。可选地,电子设备在通过云化网络资源生成网络拓扑图后,可以将其存储到其缓存中。As an example, the network element layer may be a network function virtualization (Network Functions Virtualization, NFV) horizontal cloud network topology diagram generated in combination with cloud network resources. In this network element layer, all basic network elements are connected to On the bus, you can have an overview of the overall situation of the network elements. For details, reference may be made to the network topology diagram of the 5GC network element in the prior art, so details are not described here. Wherein, the network element layer mainly includes physical devices corresponding to nodes. The foregoing alarm data may occur in devices corresponding to any node in the foregoing network topology diagram. Optionally, after the electronic device generates the network topology map through the cloudified network resources, it can store it in its cache.
在本实施方式中,将虚拟化网络横纵一体网络拓扑引入告警关联规则数据挖掘过程中。在虚拟网络背景下,将新型的网络拓扑关系从逻辑关系上连接了不同的设备,确保进入关联规则的告警均是物理和逻辑上存在关系的数据,确保了关联规则的准确性,提高了关联效率。In this implementation manner, the network topology of the virtualized network integrated horizontally and vertically is introduced into the data mining process of alarm association rules. In the context of the virtual network, the new network topology relationship is logically connected to different devices to ensure that the alarms entering the association rules are all physically and logically related data, ensuring the accuracy of the association rules and improving the association efficiency.
120、基于预设的挖掘规则对告警数据进行挖掘,得到多个初始关联规则,初始关联规则包括相互关联的两个告警数据。120. Mining the alarm data based on preset mining rules to obtain a plurality of initial association rules, where the initial association rules include two associated alarm data.
在一些实施方式中,预设的挖掘规则可以包括FP-growth算法,针对上述得到的告警数据,通过FP-growth算法进行关联规则的挖掘,可以得到多个初始关联规则。示例性地,例如,得到的多个初始关联规则可以包括初始关联规则u1、初始关联规则u2、初始关联规则u3.... ,其中,初始关联规则u1可以表示为:{网管告警ID1,网管告警ID2,支持度S,置信度D},其中,网管告警ID1、网管告警ID2分别表示两个告警数据的告警标识。同理,如初始关联规则u2、初始关联规则u3等初始关联规则的表示可以参考初始关联规则u1。In some implementations, the preset mining rules may include an FP-growth algorithm. For the alarm data obtained above, the FP-growth algorithm is used to mine association rules to obtain a plurality of initial association rules. Exemplarily, for example, the obtained multiple initial association rules may include initial association rules u1, initial association rules u2, initial association rules u3... , where the initial association rules u1 may be expressed as: {network management alarm ID1, network management Alarm ID2, support degree S, confidence degree D}, wherein, the network management alarm ID1 and the network management alarm ID2 represent the alarm identifiers of the two alarm data respectively. Similarly, for representations of initial association rules such as initial association rule u2, initial association rule u3, etc., reference may be made to initial association rule u1.
130、根据网络拓扑图,将多个初始关联规则中其两个告警数据对应的告警设备之间存在关联关系的初始关联规则,确定为目标关联规则。130. According to the network topology diagram, among the multiple initial association rules, an initial association rule that has an association relationship between two alarm devices corresponding to the alarm data is determined as a target association rule.
示例性地,以初始关联规则u1为例,电子设备可以通过网管告警ID1在网络拓扑图中查找到发生该告警数据的设备,并通过网管告警ID2在网络拓扑图中查找到发生该告警数据的设备,并确定这两个设备在网络拓扑图中是否存在关联关系,即这两个设备在网络拓扑图中是否存在连接,若存在,则可以确定将初始关联规则u1确定为目标关联规则。以此类推,通过上述方式遍历多个初始关联规则中的每一初始关联规则,既可以从多个初始关联规则中筛选出目标关联规则。Exemplarily, taking the initial association rule u1 as an example, the electronic device can find the device that has the alarm data in the network topology map through the network management alarm ID1, and find the device that has the alarm data in the network topology map through the network management alarm ID2. device, and determine whether there is an association relationship between the two devices in the network topology diagram, that is, whether there is a connection between the two devices in the network topology diagram, and if so, determine the initial association rule u1 as the target association rule. By analogy, by traversing each of the multiple initial association rules in the above manner, the target association rules can be filtered out from the multiple initial association rules.
140、根据目标关联规则,确定与待分析的告警数据关联的关联数据。140. Determine associated data associated with the alarm data to be analyzed according to the target association rule.
在一些实施方式中,电子设备可以将上述得到的关联规则应用到实际生产系统中进行关联数据的挖掘。沿用上述示例,例如在实际生产系统中,产生了告警数据为网管告警ID1对应的告警数据,通过上述得到的目标关联规则,可以挖局出关联数据为网管告警ID2对应的告警数据。其中,该实际生产系统可以实时产生告警数据。In some implementation manners, the electronic device may apply the association rules obtained above to an actual production system to mine associated data. Using the above example, for example, in the actual production system, the alarm data corresponding to the network management alarm ID1 is generated. Through the target association rules obtained above, the associated data can be excavated to be the alarm data corresponding to the network management alarm ID2. Wherein, the actual production system can generate alarm data in real time.
可见,本实施例通过获取告警数据以及网络拓扑图,网络拓扑图包括发生告警数据的告警设备之间的关联关系,告警设备包括物理设备和虚拟设备;基于预设的挖掘规则对告警数据进行挖掘,得到多个初始关联规则,初始关联规则包括相互关联的两个告警数据;根据网络拓扑图,将多个初始关联规则中其两个告警数据对应的告警设备之间存在关联关系的初始关联规则,确定为目标关联规则;根据目标关联规则,确定与待分析的告警数据关联的关联数据。由于网络拓扑图中包括发生告警数据的告警设备之间的关联关系,所以通过该网络拓扑图可以确定告警数据之间的逻辑关系,也就是说,在通过预设的挖掘规则对告警数据进行挖掘,得到多个初始关联规则后,再通过网络拓扑图对多个初始关联规则中是否存在逻辑关系进行验证,过滤掉验证没有通过的初始关联规则后,即可得到既有算法关联,又有逻辑关联的关联规则,从而保证了得到的目标关联规则的准确性,进而提升了通过该目标关联规则确定的与待分析的告警数据对应的关联数据的准确性。It can be seen that, in this embodiment, by acquiring the alarm data and the network topology map, the network topology map includes the association relationship between the alarm devices that generate the alarm data, and the alarm devices include physical devices and virtual devices; the alarm data is mined based on the preset mining rules , to obtain a plurality of initial association rules, the initial association rules include two interrelated alarm data; according to the network topology diagram, the initial association rules that have an association relationship between the alarm devices corresponding to the two alarm data in the multiple initial association rules , is determined as the target association rule; according to the target association rule, the associated data associated with the alarm data to be analyzed is determined. Since the network topology diagram includes the association relationship between the alarm devices that generate the alarm data, the logical relationship between the alarm data can be determined through the network topology diagram, that is, the alarm data is mined through the preset mining rules. After obtaining multiple initial association rules, verify whether there is a logical relationship in the multiple initial association rules through the network topology diagram, and filter out the initial association rules that fail the verification, you can get both algorithm association and logic The associated association rules ensure the accuracy of the obtained target association rules, thereby improving the accuracy of the associated data determined through the target association rules and corresponding to the alarm data to be analyzed.
图3是根据另一示例性实施例示出的一种告警数据的关联数据确定方法,如图3所示,该告警数据的关联数据确定方法可以包括:Fig. 3 is a method for determining associated data of alarm data according to another exemplary embodiment. As shown in Fig. 3 , the method for determining associated data of alarm data may include:
210、获取告警数据以及网络拓扑图,网络拓扑图包括发生告警数据的告警设备之间的关联关系,告警设备包括物理设备和虚拟设备。210. Acquire alarm data and a network topology diagram, where the network topology diagram includes association relationships between alarm devices that generate alarm data, and the alarm devices include physical devices and virtual devices.
220、基于预设的挖掘规则对告警数据进行挖掘,得到多个初始关联规则,初始关联规则包括相互关联的两个告警数据。220. Mining the alarm data based on a preset mining rule to obtain a plurality of initial association rules, where the initial association rules include two associated alarm data.
230、根据网络拓扑图,将多个初始关联规则中其两个告警数据对应的告警设备之间存在关联关系的初始关联规则,确定为目标关联规则。230. According to the network topology diagram, an initial association rule in which two alarm data corresponding alarm devices have an association relationship among multiple initial association rules is determined as a target association rule.
其中,步骤210至步骤230的具体实施方式可以参考步骤110至步骤130,故不在此赘述。Wherein, for the specific implementation manners of steps 210 to 230, reference may be made to steps 110 to 130, so details are not repeated here.
240、根据预设的挖掘规则从预生产系统产生的多个告警数据中挖掘多个第一关联规则;其中,预生产系统用于在指定场景下产生多个告警数据。240. Mining a plurality of first association rules from the plurality of alarm data generated by the pre-production system according to a preset mining rule; wherein the pre-production system is configured to generate a plurality of alarm data in a specified scenario.
在一些实施方式中,电子设备可以通过用于挖掘出初始关联规则的预设的挖掘规则,来对预生产系统产生的多个告警数据进行挖掘,从而得到第一关联规则。In some implementations, the electronic device may mine the multiple alarm data generated by the pre-production system by using a preset mining rule for mining the initial association rule, so as to obtain the first association rule.
可以理解的是,由于预生产系统的挖掘环境相比于初始关联规则对应的挖掘环境可能不同,所以在与生产系统中挖掘出来的第一关联规则可能与初始关联规则不同,例如初始关联规则对应的挖掘环境下指定设备为开启状态,而第一关联规则对应的挖掘环境下指定设备为关闭状态。It can be understood that, since the mining environment of the pre-production system may be different from the mining environment corresponding to the initial association rules, the first association rules mined in the production system may be different from the initial association rules, for example, the initial association rules correspond to The designated device in the mining environment corresponding to the first association rule is in the on state, while the designated device in the mining environment corresponding to the first association rule is in the off state.
可选地,指定场景可以是支付场景、网约车打车场景、外卖平台订餐场景等,在此不做限定,用户可以根据自己的需求来设定指定场景。Optionally, the specified scenario may be a payment scenario, an online car-hailing scenario, a food delivery platform ordering scenario, etc., which are not limited here, and users can set the specified scenario according to their own needs.
250、从多个第一关联规则中确定与目标关联规则对应的第二关联规则。250. Determine a second association rule corresponding to the target association rule from multiple first association rules.
在一些实施方式中,网络拓扑图包括网元拓扑图,网元拓扑图包括告警数据对应的网元名称,第一关联规则的告警数据包括主告警数据和子告警数据,步骤250的具体实施方式可以包括:In some implementations, the network topology diagram includes a network element topology diagram, and the network element topology diagram includes the name of the network element corresponding to the alarm data, and the alarm data of the first association rule includes main alarm data and sub-alarm data. The specific implementation of step 250 can be include:
针对多个第一关联规则中的每个第一关联规则,若确定第一关联规则满足指定条件,则将第一关联规则确定为第二关联规则,其中,指定条件包括:For each first association rule in the plurality of first association rules, if it is determined that the first association rule satisfies a specified condition, then the first association rule is determined as the second association rule, wherein the specified condition includes:
第一关联规则的主告警数据的告警标识与目标关联规则的第一告警标识相同。The alarm identifier of the main alarm data of the first association rule is the same as the first alarm identifier of the target association rule.
第一关联规则的子告警数据的告警标识与目标关联规则的第二告警标识相同。The alarm identifier of the sub-alarm data of the first association rule is the same as the second alarm identifier of the target association rule.
主告警数据对应网络拓扑图中的网元名称与子告警数据对应网络拓扑图中的网元名称相同,且主告警数据的告警级别与子告警数据的告警级别相同。The name of the network element in the network topology map corresponding to the main alarm data is the same as the name of the network element in the network topology map corresponding to the sub-alarm data, and the alarm level of the main alarm data is the same as that of the sub-alarm data.
示例性地,电子设备中预先存储了的指定条件可以包括:主告警条件、子告警的条件以及主子告警之间的锚点关系条件。Exemplarily, the specified conditions pre-stored in the electronic device may include: a main alarm condition, a sub-alarm condition, and an anchor relationship condition between the main and sub-alarms.
作为一种示例,例如,主告警条件为:第一关联规则中的一个告警数据的告警标识(即网管告警ID)等于目标关联规则u1中网管告警ID1的值。子告警的条件为:第一关联规则中另一个告警数据的告警标识等于目标关联规则u1中网管告警ID2的值。主子告警之间的锚点关系为:第一关联规则中的主告警的网元名称等于子告警的网元名称&&主告警的告警级别等于子告警的告警级别。电子设备可以将满足上述指定条件的将第一关联规则确定为第二关联规则。其中,&&表示同时满足。As an example, for example, the main alarm condition is: the alarm identifier (that is, the network management alarm ID) of an alarm data in the first association rule is equal to the value of the network management alarm ID1 in the target association rule u1. The condition of the sub-alarm is: the alarm identifier of another alarm data in the first association rule is equal to the value of the network management alarm ID2 in the target association rule u1. The anchor relationship between the main and sub-alarms is: in the first association rule, the network element name of the main alarm is equal to the network element name of the sub-alarm && the alarm level of the main alarm is equal to the alarm level of the sub-alarm. The electronic device may determine the first association rule satisfying the specified condition as the second association rule. Among them, && means to satisfy at the same time.
可选地,该电子设备中可以预先设定自适应周期T,在通过预设的挖掘规则对预生产系统中的关联规则进行挖掘的过程中,每经过一次自适应周期T,则可以对通过步骤250的具体实施方式从多个第一关联规则中确定与目标关联规则对应的第二关联规则。Optionally, the electronic device may preset an adaptive period T, and during the process of mining the association rules in the pre-production system through the preset mining rules, each time the adaptive period T passes, the passed A specific implementation manner of step 250 is to determine a second association rule corresponding to the target association rule from the plurality of first association rules.
260、获取第二关联规则的对应的告警数据集合,并根据告警数据集合中每一告警数据对应的告警标识,将告警数据集合进行分组,得到每一告警标识对应的告警数据组。260. Acquire the alarm data set corresponding to the second association rule, and group the alarm data set according to the alarm identifier corresponding to each alarm data in the alarm data set to obtain the alarm data group corresponding to each alarm identifier.
示例性地,电子设备可以按照网管告警ID对进行分组,得到分组G为:{网管告警ID1:{主告警1_1{子告警1_1_1,子告警1_1_2....},主告警1_2{子告警1_2_1,子告警1_2_2....},...}。网管告警ID2:{主告警2_1{子告警2_1_1,子告警2_1_2....},主告警2_2{子告警2_2_1,子告警2_2_2....}...}},可见,网管告警ID1对应一个告警数据组,网管告警ID2对应一个告警数据组。Exemplarily, the electronic device can be grouped according to the network management alarm ID, and the group G obtained is: {network management alarm ID1:{main alarm 1_1{sub-alarm 1_1_1, sub-alarm 1_1_2....}, main alarm 1_2{sub-alarm 1_2_1 , sub-alarm 1_2_2....},...}. Network management alarm ID2: {main alarm 2_1{sub-alarm 2_1_1, sub-alarm 2_1_2...}, main alarm 2_2{sub-alarm 2_2_1, sub-alarm 2_2_2...}...}}, it can be seen that the network management alarm ID1 corresponds An alarm data group, the network management alarm ID2 corresponds to an alarm data group.
270、针对每一告警标识对应的告警数据组,计算告警数据组的关联系数,并在关联系数大于或等于系数阈值的情况下,将告警数据组对应的告警标识确定为目标告警标识,且将目标告警标识对应的第二关联规则确定为第三关联规则。其中,关联系数表征告警数据组中主告警数据和子告警数据之间的关联程度。270. For the alarm data group corresponding to each alarm identifier, calculate the correlation coefficient of the alarm data group, and when the correlation coefficient is greater than or equal to the coefficient threshold, determine the alarm identifier corresponding to the alarm data group as the target alarm identifier, and set The second association rule corresponding to the target alarm identifier is determined as the third association rule. Among them, the correlation coefficient represents the degree of correlation between the main alarm data and the sub-alarm data in the alarm data group.
在一些实施方式中,告警数据组包括多个主告警数据,主告警数据包括多个子告警数据,步骤270的具体实施方式可以包括:In some embodiments, the alarm data group includes a plurality of main alarm data, and the main alarm data includes a plurality of sub-alarm data, and the specific implementation manner of step 270 may include:
271、针对每一告警标识对应的告警数据组,若根据网络拓扑图确定主告警数据和子告警数据之间不存在关联关系,则将子告警数据从告警数据组中删除,得到新的告警数据组。271. For the alarm data group corresponding to each alarm identifier, if it is determined according to the network topology that there is no correlation between the main alarm data and the sub-alarm data, delete the sub-alarm data from the alarm data group to obtain a new alarm data group .
其中,根据网络拓扑图确定主告警数据和子告警数据之间是否存在关联关系的具体实施方式可以参考步骤130,故不在此赘述。Wherein, the specific implementation manner of determining whether there is an association relationship between the main alarm data and the sub-alarm data according to the network topology diagram can refer to step 130, so details are not repeated here.
沿用上述示例,以网管告警ID1对应的告警数据组{网管告警ID1:{主告警1_1{子告警1_1_1,子告警1_1_2....}为例,如果根据网络拓扑图确定主告警1_1与子告警1_1_2之间不存在关联关系,则可以将子告警1_1_2从网管告警ID1对应的告警数据组中删除。得到新的告警数据组{网管告警ID1:{主告警1_1{子告警1_1_1....}。Following the above example, take the alarm data group corresponding to the network management alarm ID1 {network management alarm ID1:{main alarm 1_1{sub-alarm 1_1_1, sub-alarm 1_1_2...} as an example, if the main alarm 1_1 and sub-alarm are determined according to the network topology diagram If there is no correlation between 1_1_2, the sub-alarm 1_1_2 can be deleted from the alarm data group corresponding to the network management alarm ID1. Obtain a new alarm data group {Network Management Alarm ID1: {Main Alarm 1_1{Sub Alarm 1_1_1....}.
272、根据新的告警数据组和告警数据组,确定告警数据组的关联系数。272. Determine the correlation coefficient of the alarm data set according to the new alarm data set and the alarm data set.
在一些实施方式中,步骤272的具体实施方式可以包括:In some embodiments, the specific implementation manner of step 272 may include:
通过如下公式计算告警数据组的关联系数:Calculate the correlation coefficient of the alarm data group by the following formula:
。 .
其中,R为告警数据组的关联系数,n为新的告警数据组的主告警对应网络拓扑图中与其它告警数据之间的关联关系个数,m为告警数据组的主告警对应网络拓扑图中与其它告警数据之间的关联关系个数,cnt为主告警数据和子告警数据之间的关联关系个数,为告警数据组, />为新的告警数据组。其中,i表示第i个告警数据组。Among them, R is the correlation coefficient of the alarm data group, n is the number of association relationships between the main alarm corresponding network topology map of the new alarm data group and other alarm data, and m is the network topology map corresponding to the main alarm of the alarm data group The number of association relationships between the main alarm data and other alarm data, cnt the number of association relationships between the main alarm data and sub-alarm data, For the alarm data group, /> It is a new alarm data group. Wherein, i represents the i-th alarm data group.
可以理解的是,上述关联关系可以相当于网络拓扑图中的连线,所以关联关系个数也就是相当于连线的数量。It can be understood that the above-mentioned association relationship may be equivalent to the connection lines in the network topology diagram, so the number of association relationships is equivalent to the number of connection lines.
沿用上述示例,在通过上述公式计算得到每个告警数据组的关联系数后,可以将每个告警数据组的关联系数与系数阈值进行比较,如果关联系数大于系数阈值,则可以将该关联系数对应的告警数据组的告警标识确定为目标告警标识,且将目标告警标识对应的第二关联规则确定为第三关联规则。例如,系数阈值为0.7,可以将如果告警数据组的关联系数大于0.7,则可以将该告警数据组对应的关联规则保留并确定为第三关联规则,否则将该告警数据组对应的关联规则删除。Following the example above, after the correlation coefficient of each alarm data group is calculated by the above formula, the correlation coefficient of each alarm data group can be compared with the coefficient threshold. If the correlation coefficient is greater than the coefficient threshold, the correlation coefficient can be corresponding to The alarm identifier of the alarm data group is determined as the target alarm identifier, and the second association rule corresponding to the target alarm identifier is determined as the third association rule. For example, if the coefficient threshold is 0.7, if the correlation coefficient of the alarm data group is greater than 0.7, the association rule corresponding to the alarm data group can be retained and determined as the third association rule, otherwise the association rule corresponding to the alarm data group can be deleted .
在一些实施方式中,在步骤271之后,该步骤270还可以包括:In some embodiments, after step 271, this step 270 may also include:
若确定新的告警数据组中被删除的子告警数量大于或等于数量阈值,则将新的告警数据组从告警数据集合中删除。If it is determined that the number of deleted sub-alarms in the new alarm data set is greater than or equal to the number threshold, the new alarm data set is deleted from the alarm data set.
沿用上述示例,如果根据步骤271确定,新的告警数据组中剔除的告警个数占比超过原来告警数据组中的告警个数的50%,则电子设备可以将此新的告警数据组剔除。Using the above example, if it is determined according to step 271, the new alarm data set If the number of alarms eliminated in the alarm exceeds 50% of the number of alarms in the original alarm data set, the electronic device can add this new alarm data set remove.
280、返回执行根据预设的挖掘规则从预生产系统产生的多个告警数据中挖掘出多个第一关联规则的操作,直到执行次数达到指定次数,得到多个第三关联规则,并根据多个第三关联规则,更新目标关联规则。其中,指定次数与指定场景对应。280. Go back and execute the operation of mining multiple first association rules from the multiple alarm data generated by the pre-production system according to the preset mining rules until the number of times of execution reaches the specified number of times to obtain multiple third association rules, and perform the operation according to the multiple A third association rule to update the target association rule. Wherein, the specified number of times corresponds to the specified scene.
示例性地,指定场景可以根据预生产系统的使用频率分为高频场景、低频场景等,例如预订汽车、房产的场景可以确定为低频场景,网约车打车、点外卖等场景可以确定为高频场景。高频场景对应的指定次数大于低频场景对应的指定次数。For example, specified scenarios can be divided into high-frequency scenarios and low-frequency scenarios according to the frequency of use of the pre-production system. For example, the scenarios of booking cars and real estate can be determined as low-frequency scenarios; video scene. The specified number of times corresponding to the high-frequency scene is greater than the specified number of times corresponding to the low-frequency scene.
作为一种示例,指定次数可以为20次,电子设备可以重复执行步骤240至步骤270的操作20次,从而可以得到多个第三关联规则,并根据多个第三关联规则,更新目标关联规则。可选地,可以将原目标关联规则替换为多个第三关联规则,从而更新目标关联规则。也可以将原目标关联规则的集合中加入多个第三关联规则,从而更新目标关联规则。As an example, the specified number of times can be 20 times, and the electronic device can repeatedly perform the operations from step 240 to step 270 20 times, so that multiple third association rules can be obtained, and the target association rule can be updated according to the multiple third association rules . Optionally, the original target association rules may be replaced with multiple third association rules, so as to update the target association rules. It is also possible to add multiple third association rules to the set of original target association rules, so as to update the target association rules.
290、根据目标关联规则,确定与待分析的告警数据关联的关联数据。290. Determine associated data associated with the alarm data to be analyzed according to the target association rule.
其中,步骤290的具体实施方式可以参考步骤140,故不在此赘述。Wherein, for the specific implementation manner of step 290, reference may be made to step 140, so details are not repeated here.
示例性地,步骤210至步骤290的具体实施流程可以如图4所示,该电子设备可以具有告警管理系统,告警管理系统中包括数据库、关联规则管理模块以及消息平台,其中数据库中包括告警数据,关联规则管理模块用于对挖掘得到的关联规则进行管理,消息平台用于提供预生产系统所需的数据。作为一种示例,电子设备可以从数据库中调用告警数据,并对告警数据进行压缩,得到压缩后的告警数据。Exemplarily, the specific implementation process of steps 210 to 290 can be shown in FIG. 4 , the electronic device can have an alarm management system, and the alarm management system includes a database, an association rule management module, and a message platform, wherein the database includes alarm data , the association rule management module is used to manage the mined association rules, and the message platform is used to provide the data required by the pre-production system. As an example, the electronic device may call the alarm data from the database, and compress the alarm data to obtain the compressed alarm data.
然后,对压缩后的告警数据进行初步关联规则挖掘,可以得到初步关联规则,在得到初步关联规则的同时可以通过云化网络资源生成横纵云化网络拓扑(即上述实施例中的网络拓扑图),结合网络拓扑图对初步关联规则进行验证,即可得到验证通过的关联规则1(即上述实施例中的目标关联规则)。此后可以通过消息平台的相关数据提供预生产系统,并将目标关联规则应用到预生产系统中,结合网络拓扑图进行规则调优后可以得到关联规则2(即上述实施例中的第三关联规则),最后将关联规则2发送到关联规则管理模块中进行存储,以便关联规则管理模块后续可以将关联规则2应用到真实的生产系统中对实时产生的告警数据进行关联数据的挖掘。Then, the preliminary association rules are mined on the compressed alarm data to obtain the preliminary association rules, and at the same time the preliminary association rules can be generated through the cloud network resources to generate the horizontal and vertical cloud network topology (that is, the network topology diagram in the above-mentioned embodiment ), and verify the preliminary association rules in combination with the network topology diagram, and then the verified association rule 1 (that is, the target association rule in the above embodiment) can be obtained. Afterwards, the pre-production system can be provided through the relevant data of the message platform, and the target association rules can be applied to the pre-production system. Association rule 2 (that is, the third association rule in the above-mentioned embodiment) can be obtained after rule optimization combined with the network topology map ), and finally send the association rule 2 to the association rule management module for storage, so that the association rule management module can apply the association rule 2 to the real production system to mine the alarm data generated in real time.
考虑到上述目标关联规则,并未被应用到所需场景中进行调优,导致关联出来的结果准确性低、实用性差,在本实施例中,通过将关联规则应用到告预生产系统中进行实时数据的关联,并对结果进行分析,从而达到规则自适应调优,保证了调优后得到的关联规则的准确性。Considering that the above target association rules have not been applied to the required scenarios for optimization, resulting in low accuracy and poor practicability of the associated results, in this embodiment, by applying the association rules to the pre-announcement production system Association of real-time data, and analysis of the results, so as to achieve self-adaptive tuning of the rules and ensure the accuracy of the association rules obtained after tuning.
图5是根据又一示例性实施例示出的一种告警数据的关联数据确定方法,如图5所示,该告警数据的关联数据确定方法可以包括:Fig. 5 is a method for determining associated data of alarm data according to yet another exemplary embodiment. As shown in Fig. 5 , the method for determining associated data of alarm data may include:
310、获取告警数据以及网络拓扑图,网络拓扑图包括发生告警数据的告警设备之间的关联关系,告警设备包括物理设备和虚拟设备。310. Acquire alarm data and a network topology diagram, where the network topology diagram includes association relationships between alarm devices that generate alarm data, and the alarm devices include physical devices and virtual devices.
320、基于预设的挖掘规则对告警数据进行挖掘,得到多个初始关联规则,初始关联规则包括相互关联的两个告警数据。初始关联规则包括第一告警数据的第一告警标识和第二告警数据的第二告警标识。320. Mining the alarm data based on a preset mining rule to obtain a plurality of initial association rules, where the initial association rules include two associated alarm data. The initial association rule includes a first alarm identifier of the first alarm data and a second alarm identifier of the second alarm data.
在一些实施方式中,步骤320的具体实施方式可以包括:In some embodiments, the specific implementation manner of step 320 may include:
通过预设的挖掘参数和FP-growth算法,对告警数据进行挖掘,得到多个初始关联规则;其中,挖掘参数包括告警数据的发生时间段、滑动窗口时长、滑动步长、最小支持度以及最小置信度。Through the preset mining parameters and the FP-growth algorithm, the alarm data is mined to obtain multiple initial association rules; among them, the mining parameters include the occurrence time period of the alarm data, the length of the sliding window, the sliding step size, the minimum support and the minimum Confidence.
示例性地,电子设备可以设定挖掘参数:{告警发生时间段T[T1,T2],滑动窗口时长TW,滑动步长TL,最小支持度S,最小置信度D},基于FP-growth算法进行关联规则挖掘,得到挖掘规则U{u1,u2,u3....},其中u1为{网管告警ID1,网管告警ID2,支持度S,置信度D}。Exemplarily, the electronic device can set mining parameters: {alarm occurrence time period T[T1, T2], sliding window duration TW, sliding step size TL, minimum support S, minimum confidence D}, based on the FP-growth algorithm Association rule mining is carried out to obtain mining rules U{u1, u2, u3....}, where u1 is {network management alarm ID1, network management alarm ID2, support S, confidence D}.
其中,基于FP-growth算法构建FP树,查找出频繁模式集F(即多个初始关联规则)的过程如下:Among them, the process of constructing the FP tree based on the FP-growth algorithm and finding out the frequent pattern set F (that is, multiple initial association rules) is as follows:
扫描告警数据集合,将所有出现的告警数据作为元素项进行计数,剔除掉不符合预设的最小支持度的数据集合(以下可称项集)。其中,对上述每个项集进行过滤和排序,过滤是去掉不满足最小支持度的元素项,排序基于元素项的绝对出现频率来进行,出现频率越大的元素项排序越靠前。创建只包含空集合的根节点,将过滤和排序后的每个项集依次添加到树中,如果树中已经存在该路径,则增加对应元素项上的值。如果该路径不存在,则创建一条新路径。从而获得一个FP树,进而得到频繁项集合F。Scan the alarm data set, count all the alarm data that appear as element items, and eliminate the data sets that do not meet the preset minimum support (hereinafter referred to as item sets). Among them, filter and sort each item set above. Filtering is to remove the element items that do not meet the minimum support. The sorting is based on the absolute frequency of occurrence of the element items. The higher the frequency of occurrence, the higher the sorting of the element items. Create a root node containing only an empty collection, add each item set after filtering and sorting to the tree in turn, and increase the value on the corresponding element item if the path already exists in the tree. If the path does not exist, a new path is created. In this way, an FP tree is obtained, and then the frequent item set F is obtained.
可以理解的是,上述网管告警ID1、网管告警ID2,可以映射出可读性规则。例如,通过关联规则挖掘出的网管告警ID,可以映射出厂商、专业、设备类型、告警级别、告警类型、告警标题等告警数据。It can be understood that the aforementioned network management alarm ID1 and network management alarm ID2 can be mapped to readability rules. For example, network management alarm IDs mined through association rules can map out alarm data such as manufacturer, specialty, device type, alarm level, alarm type, and alarm title.
在一些实施方式中,步骤320的具体实施方式可以包括:In some embodiments, the specific implementation manner of step 320 may include:
321、对告警数据进行压缩处理,得到压缩后的告警数据。321. Compress the alarm data to obtain compressed alarm data.
在一些实施方式中,步骤321的具体实施方式可以包括:In some embodiments, the specific implementation manner of step 321 may include:
对告警数据中的指定告警数据进行过滤,得到压缩后的告警数据,指定告警数据包括未上传到云端的告警数据和\或工程告警。Filter the specified alarm data in the alarm data to obtain the compressed alarm data. The specified alarm data includes alarm data and/or engineering alarms that have not been uploaded to the cloud.
其中,由于未上云产生的告警多为调测阶段,不需要重点关注,所以电子设备可以将告警设备中未上传到云端的告警数据进行过滤。另外,由于工程中产生的告警,均无需关注,因此,电子设备可以同时过滤掉告警数据中的工程告警。Among them, since most of the alarms that are not uploaded to the cloud are in the commissioning stage and do not need to be focused on, the electronic device can filter the alarm data that has not been uploaded to the cloud in the alarm device. In addition, since the alarms generated in the engineering do not need to be concerned, the electronic device can filter out the engineering alarms in the alarm data at the same time.
在另一些实施方式中,步骤321的具体实施方式可以包括;In other implementations, the specific implementation of step 321 may include;
对告警数据进行标准化处理,得到告警数据对应的告警标识,告警标识包括多个字段,其中,多个字段中的每一字段对应告警数据中一种告警信息,告警信息包括告警级别、告警标题、告警类型、告警解释以及发生告警数据的设备信息;将告警标识确定为压缩后的告警数据。Standardize the alarm data to obtain an alarm identifier corresponding to the alarm data. The alarm identifier includes multiple fields, wherein each field in the multiple fields corresponds to a kind of alarm information in the alarm data, and the alarm information includes alarm level, alarm title, Alarm type, alarm explanation, and information about the device where the alarm data occurs; determine the alarm identifier as the compressed alarm data.
可选地,对告警数据进行标准化处理的具体实施方式还可以包括字段维度压缩,现有网管告警中字段属性值有上百个,例如{厂家告警唯一标识,发生时间,专业,厂家,设备类型,告警对象类型,告警标题,告警类型.........}。首先对告警进行标准化处理,每个告警标准化后均有网管告警ID属性。网管告警ID:对厂商标准化告警的统一编码,此编码可以确定一类告警,如专业、厂商、设备类型、告警标题、厂家告警级别等相同的告警。通过网管告警ID标准化的告警,具备了标准的告警名,告警级别,告警解释等信息。以表1所示的网管告警ID为例:Optionally, the specific implementation of standardized processing of alarm data may also include field dimension compression. There are hundreds of field attribute values in existing network management alarms, for example {unique identifier of manufacturer alarm, time of occurrence, specialty, manufacturer, device type , alarm object type, alarm title, alarm type...}. First, the alarms are standardized, and each alarm has a network management alarm ID attribute after being standardized. Network management alarm ID: a uniform code for manufacturer-standardized alarms. This code can determine a type of alarm, such as alarms with the same specialty, manufacturer, device type, alarm title, and manufacturer’s alarm level. Alarms standardized by the network management alarm ID have standard alarm names, alarm levels, and alarm explanations. Take the network management alarm ID shown in Table 1 as an example:
表1Table 1
示例性地,根据表1可知,表1左侧是未经过标准化处理的原始告警信息,其中,厂家告警ID的表达方式不相同,告警级别的表示方式也不相同,经过标准化处理后,告警ID统一由多个字段的网管告警ID表示,告警级别也由统一格式表示,从而可以方便后续进行告警数据的关联规则挖掘。其中,标准化后以网管告警ID代表相关告警,只需网管告警ID和时间进入挖掘算法,多个字段属性值采用关键字(key)和值(value)的形式进行映射,映射成一个属性值,从而降低内存匹配消耗,提高关联挖掘效率,其中,关键字可以为网管告警ID(即告警标识),值可以表示与网管告警ID对应的告警级别、告警解释等。Exemplarily, according to Table 1, it can be seen that the left side of Table 1 is the original alarm information that has not been standardized. Among them, the manufacturers’ alarm IDs are expressed in different ways, and the alarm levels are also expressed in different ways. After standardized processing, the alarm ID It is uniformly represented by the network management alarm ID of multiple fields, and the alarm level is also represented by a uniform format, which facilitates subsequent mining of association rules for alarm data. Among them, after standardization, the network management alarm ID is used to represent the relevant alarms. Only the network management alarm ID and time need to be entered into the mining algorithm. The attribute values of multiple fields are mapped in the form of keywords (keys) and values (values), and are mapped into an attribute value. Thereby reducing the consumption of memory matching and improving the efficiency of association mining. The keyword can be the network management alarm ID (that is, the alarm identifier), and the value can represent the alarm level and alarm explanation corresponding to the network management alarm ID.
在一些实施方式中,对告警数据进行标准化处理,还可以包括告警分类分组。具体地,电子设备可以将同质化的告警,通过网管告警ID将告警进行分类分组,后续关联规则也根据网管告警ID进行关联,可极大提关联的准确性。作为一种示例,网管告警ID可以标记为一系列具有某些相同特性的告警,例如:网管告警ID为2005-001-125-10-000001的告警标识对应的告警数据包括:专业:虚拟化-VEPC,厂家:爱立信,设备类型:PCRF,告警对象类型:PCRF,告警标题:A Fallback Operation will soon be started,告警类型:设备原始告警的一系列告警。In some embodiments, the standardization processing of the alarm data may also include alarm classification and grouping. Specifically, the electronic device can classify and group the homogenized alarms according to the network management alarm ID, and the subsequent association rules are also associated according to the network management alarm ID, which can greatly improve the accuracy of the association. As an example, the network management alarm ID can be marked as a series of alarms with the same characteristics, for example: the alarm data corresponding to the alarm ID of the network management alarm ID 2005-001-125-10-000001 includes: professional: virtualization- VEPC, manufacturer: Ericsson, device type: PCRF, alarm object type: PCRF, alarm title: A Fallback Operation will soon be started, alarm type: a series of alarms of the original alarm of the device.
可选地,该方法还可以包括对告警数据进行流式处理,具体地电子设备可以获取指定时间范围内的告警数据,采用流式输入的方式输入到处理引擎中,作为关联规则挖掘的数据输入。Optionally, the method may further include performing stream processing on the alarm data. Specifically, the electronic device may acquire alarm data within a specified time range, and input the alarm data into the processing engine in a stream input mode as data input for association rule mining. .
322、基于预设的挖掘规则对压缩后的告警数据进行挖掘,得到多个初始关联规则。322. Mining the compressed alarm data based on preset mining rules to obtain multiple initial association rules.
其中,步骤322的具体实施方式可以参考步骤120,故不在此赘述。Wherein, for the specific implementation manner of step 322, reference may be made to step 120, so details are not repeated here.
330、针对多个初始关联规则中的每一初始关联规则,根据第一告警标识确定与第一告警数据对应的第一告警设备,并根据第二告警标识确定与第二告警数据对应的第二告警设备。330. For each of the multiple initial association rules, determine the first alarm device corresponding to the first alarm data according to the first alarm identifier, and determine the second alarm device corresponding to the second alarm data according to the second alarm identifier. Alarm device.
示例性地,以初始关联规则u1为例,初始关联规则u1表示为{网管告警ID1,网管告警ID2,支持度S,置信度D},其中,网管告警ID1为第一告警标识,网管告警ID2为第二告警标识。由于告警标识的不同字段映射了不同的告警数据信息,所以根据第一告警标识相应字段可以映射出发生该网管告警ID1的第一告警设备。根据第二告警标识相应字段可以映射出发生该网管告警ID2的第二告警设备。Exemplarily, taking the initial association rule u1 as an example, the initial association rule u1 is expressed as {network management alarm ID1, network management alarm ID2, support S, confidence D}, wherein the network management alarm ID1 is the first alarm identifier, and the network management alarm ID2 It is the second warning sign. Since different fields of the alarm identifier map different alarm data information, the first alarm device that generates the network management alarm ID1 can be mapped according to the corresponding field of the first alarm identifier. According to the corresponding field of the second alarm identifier, the second alarm device that has generated the network management alarm ID2 can be mapped.
340、若确定第一告警设备和第二告警设备在网络拓扑图像中存在关联关系,则将初始关联规则确定为目标关联规则。340. If it is determined that the first alarm device and the second alarm device have an association relationship in the network topology image, determine the initial association rule as the target association rule.
沿用上述示例,电子设备可以在网络拓扑图中确定第一告警设备和第二告警设备之间是否存在连线,若存在,则可以确定第一告警设备和第二告警设备之间存在关联关系,并可以将初始关联规则u1确定为目标关联规则。Following the above example, the electronic device can determine whether there is a connection between the first alarm device and the second alarm device in the network topology diagram, and if so, can determine that there is an association relationship between the first alarm device and the second alarm device, And the initial association rule u1 can be determined as the target association rule.
350、根据目标关联规则,确定与待分析的告警数据关联的关联数据。350. Determine associated data associated with the alarm data to be analyzed according to the target association rule.
其中,步骤350的具体实施方式可以参考步骤140,故不在此赘述。Wherein, for the specific implementation manner of step 350, reference may be made to step 140, so details are not repeated here.
考虑到在关联规则挖掘的过程中告警数据属性过多,导致挖掘过程中需要更多的硬件资源和时间,导致关联挖掘效率降低,在本实施例中,通过对告警数据采用数据压缩特性提取,从而可以降低关联维度、降低告警量,提高关联效率。Considering that there are too many alarm data attributes in the process of association rule mining, which leads to the need for more hardware resources and time in the mining process, resulting in a decrease in the efficiency of association mining, in this embodiment, by using the data compression feature to extract the alarm data, In this way, the correlation dimension can be reduced, the number of alarms can be reduced, and the correlation efficiency can be improved.
图6是根据一示例性实施例示出的一种告警数据的关联数据确定装置,如图6所示,该装置400可以包括:Fig. 6 is an apparatus for determining associated data of alarm data according to an exemplary embodiment. As shown in Fig. 6, the apparatus 400 may include:
信息获取模块410,用于获取告警数据以及网络拓扑图,上述网络拓扑图包括发生上述告警数据的告警设备之间的关联关系,上述告警设备包括物理设备和虚拟设备。The information acquisition module 410 is configured to acquire alarm data and a network topology diagram, the network topology diagram includes associations between alarm devices that generate the alarm data, and the alarm devices include physical devices and virtual devices.
规则挖掘模块420,用于基于预设的挖掘规则对上述告警数据进行挖掘,得到多个初始关联规则,上述初始关联规则包括相互关联的两个告警数据。The rule mining module 420 is configured to mine the above-mentioned alarm data based on preset mining rules to obtain a plurality of initial association rules, and the above-mentioned initial association rules include two associated alarm data.
目标关联规则确定模块430,用于根据上述网络拓扑图,将上述多个初始关联规则中其两个告警数据对应的告警设备之间存在关联关系的初始关联规则,确定为目标关联规则。The target association rule determination module 430 is configured to determine, according to the above network topology diagram, an initial association rule among the above multiple initial association rules that has an association relationship between alarm devices corresponding to two alarm data as a target association rule.
关联数据确定模块440,用于根据上述目标关联规则,确定与待分析的告警数据关联的关联数据。The associated data determining module 440 is configured to determine the associated data associated with the alarm data to be analyzed according to the above target association rule.
在一些实施方式中,上述初始关联规则包括第一告警数据的第一告警标识和第二告警数据的第二告警标识,上述目标关联规则确定模块430,具体用于针对上述多个初始关联规则中的每一初始关联规则,根据上述第一告警标识确定与上述第一告警数据对应的第一告警设备,并根据上述第二告警标识确定与上述第二告警数据对应的第二告警设备;若确定上述第一告警设备和上述第二告警设备在上述网络拓扑图像中存在关联关系,则将上述初始关联规则确定为上述目标关联规则。In some implementations, the above-mentioned initial association rules include the first alarm identifier of the first alarm data and the second alarm identifier of the second alarm data, and the above-mentioned target association rule determination module 430 is specifically used for the above-mentioned multiple initial association rules. For each initial association rule, determine the first warning device corresponding to the first warning data according to the first warning identification, and determine the second warning device corresponding to the second warning data according to the second warning identification; if determined If there is an association relationship between the first alarm device and the second alarm device in the network topology image, the initial association rule is determined as the target association rule.
在一些实施方式中,该装置400还可以包括:目标关联规则更新模块,该目标关联规则更新模块包括:In some implementation manners, the apparatus 400 may further include: a target association rule updating module, the target association rule updating module including:
第一关联规则确定子模块,用于根据上述预设的挖掘规则从预生产系统产生的多个告警数据中挖掘多个第一关联规则;其中,上述预生产系统用于在指定场景下产生多个告警数据。The first association rule determination sub-module is used to mine a plurality of first association rules from the plurality of alarm data generated by the pre-production system according to the above-mentioned preset mining rules; wherein, the above-mentioned pre-production system is used to generate multiple alarm data.
第二关联规则确定子模块,用于从上述多个第一关联规则中确定与上述目标关联规则对应的第二关联规则。The second association rule determining submodule is configured to determine a second association rule corresponding to the above-mentioned target association rule from the above-mentioned plurality of first association rules.
告警数据组确定子模块,用于获取上述第二关联规则的对应的告警数据集合,并根据上述告警数据集合中每一告警数据对应的告警标识,将上述告警数据集合进行分组,得到每一告警标识对应的告警数据组。The alarm data group determination sub-module is used to obtain the corresponding alarm data set of the above-mentioned second association rule, and group the above-mentioned alarm data set according to the alarm identifier corresponding to each alarm data in the above-mentioned alarm data set to obtain each alarm data set Identify the corresponding alarm data group.
第二关联规则确定子模块,用于针对上述每一告警标识对应的告警数据组,计算上述告警数据组的关联系数,并在上述关联系数大于或等于系数阈值的情况下,将上述告警数据组对应的告警标识确定为目标告警标识,且将上述目标告警标识对应的第二关联规则确定为第三关联规则;其中,上述关联系数表征上述告警数据组中主告警数据和子告警数据之间的关联程度。The second association rule determination submodule is used to calculate the correlation coefficient of the above-mentioned alarm data group for the alarm data group corresponding to each of the above-mentioned alarm identifiers, and when the above-mentioned correlation coefficient is greater than or equal to the coefficient threshold value, the above-mentioned alarm data group The corresponding alarm identifier is determined as the target alarm identifier, and the second association rule corresponding to the above-mentioned target alarm identifier is determined as the third association rule; wherein, the above-mentioned correlation coefficient represents the association between the main alarm data and the sub-alarm data in the above-mentioned alarm data group degree.
返回执行子模块,用于返回执行上述根据上述预设的挖掘规则从预生产系统产生的多个告警数据中挖掘出多个第一关联规则的操作,直到执行次数达到指定次数,得到多个第三关联规则,上述指定次数与上述指定场景对应。Return to the execution sub-module, which is used to return to execute the operation of mining a plurality of first association rules from the plurality of alarm data generated by the pre-production system according to the above-mentioned preset mining rules, until the number of times of execution reaches the specified number of times, and a plurality of first association rules are obtained. Three association rules, the above specified times correspond to the above specified scenarios.
更新子模块,用于根据上述多个第三关联规则,更新上述目标关联规则。The update submodule is configured to update the above-mentioned target association rules according to the above-mentioned multiple third association rules.
在一些实施方式中,上述网络拓扑图包括网元拓扑图,上述网元拓扑图包括告警数据对应的网元名称,上述第一关联规则的告警数据包括主告警数据和子告警数据,第二关联规则确定子模块,具体用于针对上述多个第一关联规则中的每个第一关联规则,若确定上述第一关联规则满足指定条件,则将上述第一关联规则确定为上述第二关联规则,其中,上述指定条件包括:上述第一关联规则的主告警数据的告警标识与上述目标关联规则的第一告警标识相同;上述第一关联规则的子告警数据的告警标识与上述目标关联规则的第二告警标识相同;上述主告警数据对应上述网络拓扑图中的网元名称与上述子告警数据对应上述网络拓扑图中的网元名称相同,且上述主告警数据的告警级别与上述子告警数据的告警级别相同。In some implementations, the network topology diagram includes a network element topology diagram, the network element topology diagram includes the network element name corresponding to the alarm data, the alarm data of the first association rule includes main alarm data and sub-alarm data, and the second association rule The determining submodule is specifically configured to, for each first association rule among the plurality of first association rules, determine the first association rule as the second association rule if it is determined that the first association rule satisfies a specified condition, Wherein, the specified conditions include: the alarm identifier of the main alarm data of the first association rule is the same as the first alarm identifier of the target association rule; the alarm identifier of the sub-alarm data of the first association rule is the same as the first alarm identifier of the target association rule The two alarm identifiers are the same; the above-mentioned main alarm data corresponds to the network element name in the above-mentioned network topology diagram and the above-mentioned sub-alarm data corresponds to the same network element name in the above-mentioned network topology diagram, and the alarm level of the above-mentioned main alarm data is the same as that of the above-mentioned sub-alarm data The alarm levels are the same.
在一些实施方式中,上述告警数据组包括多个主告警数据,上述主告警数据包括多个子告警数据,第二关联规则确定子模块,具体还用于针对上述每一告警标识对应的告警数据组,若根据上述网络拓扑图确定上述主告警数据和上述子告警数据之间不存在关联关系,则将上述子告警数据从上述告警数据组中删除,得到新的告警数据组;根据上述新的告警数据组和上述告警数据组,确定上述告警数据组的关联系数。In some implementations, the above-mentioned alarm data group includes a plurality of main alarm data, the above-mentioned main alarm data includes a plurality of sub-alarm data, and the second association rule determination submodule is also specifically used for the alarm data group corresponding to each of the above-mentioned alarm identifiers , if it is determined according to the above-mentioned network topology diagram that there is no correlation between the above-mentioned main alarm data and the above-mentioned sub-alarm data, then the above-mentioned sub-alarm data is deleted from the above-mentioned alarm data group to obtain a new alarm data group; according to the above-mentioned new alarm The data group and the above-mentioned alarm data group determine the correlation coefficient of the above-mentioned alarm data group.
在一些实施方式中,第二关联规则确定子模块,具体还用于通过如下公式计算上述告警数据组的关联系数:In some implementations, the second association rule determination submodule is specifically further used to calculate the association coefficient of the above-mentioned alarm data group through the following formula:
; ;
其中,R为上述告警数据组的关联系数,n为上述新的告警数据组的主告警对应上述网络拓扑图中与其它告警数据之间的关联关系个数,m为上述告警数据组的主告警对应上述网络拓扑图中与其它告警数据之间的关联关系个数,cnt为主告警数据和子告警数据之间的关联关系个数, 为告警数据组, />为新的告警数据组。Among them, R is the correlation coefficient of the above-mentioned alarm data group, n is the number of association relationships between the main alarm of the above-mentioned new alarm data group and other alarm data in the above-mentioned network topology diagram, and m is the main alarm of the above-mentioned alarm data group Corresponding to the number of association relationships between the above network topology diagram and other alarm data, cnt is the number of association relationships between the main alarm data and sub-alarm data, For the alarm data group, /> It is a new alarm data group.
在一些实施方式中,该目标关联规则更新模块,还用于若确定上述新的告警数据组中被删除的子告警数量大于或等于数量阈值,则将上述新的告警数据组从上述告警数据集合中删除。In some implementations, the target association rule update module is further configured to, if it is determined that the number of deleted sub-alarms in the new alarm data set is greater than or equal to the number threshold, then delete the new alarm data set from the alarm data set Deleted in .
在一些实施方式中,规则挖掘模块420,具体用于通过预设的挖掘参数和FP-growth算法,对上述告警数据进行挖掘,得到多个初始关联规则;其中,上述挖掘参数包括告警数据的发生时间段、滑动窗口时长、滑动步长、最小支持度以及最小置信度。In some implementations, the rule mining module 420 is specifically configured to mine the above-mentioned alarm data through preset mining parameters and FP-growth algorithm to obtain a plurality of initial association rules; wherein, the above-mentioned mining parameters include occurrence of alarm data Time period, sliding window duration, sliding step size, minimum support and minimum confidence.
在一些实施方式中,规则挖掘模块420,具体用于对上述告警数据进行压缩处理,得到压缩后的告警数据;基于预设的挖掘规则对上述压缩后的告警数据进行挖掘,得到多个初始关联规则。In some implementations, the rule mining module 420 is specifically configured to compress the above-mentioned alarm data to obtain compressed alarm data; to mine the above-mentioned compressed alarm data based on preset mining rules to obtain multiple initial associations rule.
在一些实施方式中,规则挖掘模块420,具体还用于对上述告警数据中的指定告警数据进行过滤,得到上述压缩后的告警数据,上述指定告警数据包括未上传到云端的告警数据和\或工程告警。In some implementations, the rule mining module 420 is further configured to filter the specified alarm data in the above-mentioned alarm data to obtain the above-mentioned compressed alarm data, and the above-mentioned specified alarm data includes alarm data that has not been uploaded to the cloud and/or Engineering alert.
在一些实施方式中,规则挖掘模块420,具体还用于对上述告警数据进行标准化处理,得到上述告警数据对应的告警标识,上述告警标识包括多个字段,其中,上述多个字段中的每一字段对应上述告警数据中一种告警信息,上述告警信息包括告警级别、告警标题、告警类型、告警解释以及发生上述告警数据的设备信息;将上述告警标识确定为上述压缩后的告警数据。In some implementations, the rule mining module 420 is further configured to perform standardization processing on the above-mentioned alarm data to obtain an alarm identifier corresponding to the above-mentioned alarm data, and the above-mentioned alarm identifier includes a plurality of fields, wherein each of the above-mentioned multiple fields The field corresponds to a kind of alarm information in the above-mentioned alarm data, and the above-mentioned alarm information includes alarm level, alarm title, alarm type, alarm explanation, and information of the device where the above-mentioned alarm data occurs; the above-mentioned alarm identifier is determined as the above-mentioned compressed alarm data.
图7是根据一示例性实施例示出的一种电子设备的结构示意图,该电子设备可以是计算机,服务器等。其中,该电子设备可以相当于上述实施例中的服务端,该电子设备也可以相当于上述实施例中的服务端客户端。Fig. 7 is a schematic structural diagram of an electronic device according to an exemplary embodiment, where the electronic device may be a computer, a server, or the like. Wherein, the electronic device may be equivalent to the server in the above embodiment, and the electronic device may also be equivalent to the server client in the above embodiment.
电子设备800可以包括以下一个或多个组件:处理组件802,存储器804,电源组件806,多媒体组件808,音频组件810,输入/输出(I/O)接口812,传感器组件814,以及通信组件816。Electronic device 800 may include one or more of the following components: processing component 802, memory 804, power supply component 806, multimedia component 808, audio component 810, input/output (I/O) interface 812, sensor component 814, and communication component 816 .
处理组件802通常控制电子设备800的整体操作,诸如与显示,电话呼叫,数据通信,相机操作和记录操作相关联的操作。处理组件802可以包括一个或多个处理器820来执行指令,以完成上述的方法的全部或部分步骤。此外,处理组件802可以包括一个或多个模块,便于处理组件802和其他组件之间的交互。例如,处理组件802可以包括多媒体模块,以方便多媒体组件808和处理组件802之间的交互。The processing component 802 generally controls the overall operations of the electronic device 800, such as those associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 802 may include one or more processors 820 to execute instructions to complete all or part of the steps of the above method. Additionally, processing component 802 may include one or more modules that facilitate interaction between processing component 802 and other components. For example, processing component 802 may include a multimedia module to facilitate interaction between multimedia component 808 and processing component 802 .
存储器804被配置为存储各种类型的数据以支持在电子设备800的操作。这些数据的示例包括用于在电子设备800上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器804可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。The memory 804 is configured to store various types of data to support operations at the electronic device 800 . Examples of such data include instructions for any application or method operating on the electronic device 800, contact data, phonebook data, messages, pictures, videos, and the like. The memory 804 can be realized by any type of volatile or non-volatile storage device or their combination, such as Static Random Access Memory (SRAM), Electrically Erasable Programmable Read Only Memory (EEPROM), Erasable Programmable Read Only Memory (EPROM), Programmable Read Only Memory (PROM), Read Only Memory (ROM), Magnetic Memory, Flash Memory, Magnetic Disk or Optical Disk.
电源组件806为电子设备800的各种组件提供电力。电源组件806可以包括电源管理系统,一个或多个电源,及其他与为电子设备800生成、管理和分配电力相关联的组件。The power supply component 806 provides power to various components of the electronic device 800 . Power components 806 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for electronic device 800 .
多媒体组件808包括在上述电子设备800和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。上述触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与上述触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件808包括一个前置摄像头和/或后置摄像头。当电子设备800处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜系统或具有焦距和光学变焦能力。The multimedia component 808 includes a screen providing an output interface between the above-mentioned electronic device 800 and the user. In some embodiments, the screen may include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user. The touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The above-mentioned touch sensor may not only sense a boundary of a touch or a sliding action, but also detect a duration and pressure related to the above-mentioned touching or sliding operation. In some embodiments, the multimedia component 808 includes a front camera and/or a rear camera. When the electronic device 800 is in an operation mode, such as a shooting mode or a video mode, the front camera and/or the rear camera can receive external multimedia data. Each front camera and rear camera can be a fixed optical lens system or have focal length and optical zoom capability.
音频组件810被配置为输出和/或输入音频信号。例如,音频组件810包括一个麦克风(MIC),当电子设备800处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器804或经由通信组件816发送。在一些实施例中,音频组件810还包括一个扬声器,用于输出音频信号。The audio component 810 is configured to output and/or input audio signals. For example, the audio component 810 includes a microphone (MIC), which is configured to receive an external audio signal when the electronic device 800 is in an operation mode, such as a call mode, a recording mode and a voice recognition mode. Received audio signals may be further stored in memory 804 or sent via communication component 816 . In some embodiments, the audio component 810 also includes a speaker for outputting audio signals.
I/ O接口812为处理组件802和外围接口模块之间提供接口,上述外围接口模块可以是键盘,点击轮,按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。The I/O interface 812 provides an interface between the processing component 802 and a peripheral interface module, which may be a keyboard, a click wheel, a button, and the like. These buttons may include, but are not limited to: a home button, volume buttons, start button, and lock button.
传感器组件814包括一个或多个传感器,用于为电子设备800提供各个方面的状态评估。例如,传感器组件814可以检测到电子设备800的打开/关闭状态,组件的相对定位,例如上述组件为电子设备800的显示器和小键盘,传感器组件814还可以检测电子设备800或电子设备800一个组件的位置改变,用户与电子设备800接触的存在或不存在,电子设备800方位或加速/减速和电子设备800的温度变化。传感器组件814可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件814还可以包括光传感器,如CMOS或CCD图像传感器,用于在成像应用中使用。在一些实施例中,该传感器组件814还可以包括加速度传感器,陀螺仪传感器,磁传感器,压力传感器或温度传感器。Sensor assembly 814 includes one or more sensors for providing status assessments of various aspects of electronic device 800 . For example, the sensor component 814 can detect the open/close state of the electronic device 800, the relative positioning of the components, such as the above-mentioned components are the display and the keypad of the electronic device 800, the sensor component 814 can also detect the electronic device 800 or a component of the electronic device 800 Changes in the position of , presence or absence of user contact with the electronic device 800 , orientation or acceleration/deceleration of the electronic device 800 and temperature changes of the electronic device 800 . Sensor assembly 814 may include a proximity sensor configured to detect the presence of nearby objects in the absence of any physical contact. Sensor assembly 814 may also include an optical sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor component 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor or a temperature sensor.
通信组件816被配置为便于电子设备800和其他设备之间有线或无线方式的通信。电子设备800可以接入基于通信标准的无线网络,如WiFi,2G或3G,或它们的组合。在一个示例性实施例中,通信组件816经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,上述通信组件816还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其他技术来实现。The communication component 816 is configured to facilitate wired or wireless communication between the electronic device 800 and other devices. The electronic device 800 can access a wireless network based on communication standards, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 816 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the aforementioned communication component 816 also includes a near field communication (NFC) module to facilitate short-range communication. For example, the NFC module can be implemented based on Radio Frequency Identification (RFID) technology, Infrared Data Association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology and other technologies.
在示例性实施例中,电子设备800可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述方法。In an exemplary embodiment, electronic device 800 may be implemented by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable A programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic component implementation for performing the method described above.
在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器804,上述指令可由电子设备800的处理器820执行以完成上述方法。例如,上述非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。In an exemplary embodiment, there is also provided a non-transitory computer-readable storage medium including instructions, such as the memory 804 including instructions, which can be executed by the processor 820 of the electronic device 800 to complete the above method. For example, the above-mentioned non-transitory computer-readable storage medium may be ROM, random access memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, and the like.
在示例性实施例中,还提供了一种非临时性计算机可读存储介质,当该存储介质中的指令由终端设备的处理器执行时,使得终端设备能够执行上述电子设备的告警数据的关联数据确定方法。In an exemplary embodiment, there is also provided a non-transitory computer-readable storage medium, when the instructions in the storage medium are executed by the processor of the terminal device, the terminal device can perform the association of the alarm data of the above-mentioned electronic device Data determination method.
在示例性实施例中,还提供了一种计算机程序产品,包括计算机程序,该计算机程序被处理器执行时上述实施例中的告警数据的关联数据确定方法。In an exemplary embodiment, a computer program product is also provided, including a computer program. When the computer program is executed by a processor, the method for determining associated data of alarm data in the above embodiments is provided.
本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本申请的其它实施方案。本申请旨在涵盖本申请的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本申请的一般性原理并包括本申请未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本申请的真正范围和精神由下面的权利要求书指出。Other embodiments of the present application will be readily apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any modification, use or adaptation of the application, these modifications, uses or adaptations follow the general principles of the application and include common knowledge or conventional technical means in the technical field not disclosed in the application . The specification and examples are to be considered exemplary only, with a true scope and spirit of the application indicated by the following claims.
应当理解的是,本申请并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本申请的范围仅由所附的权利要求书来限制。It should be understood that the present application is not limited to the precise constructions which have been described above and shown in the accompanying drawings, and various modifications and changes may be made without departing from the scope thereof. The scope of the application is limited only by the appended claims.
Claims (13)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310293280.9A CN116016121B (en) | 2023-03-24 | 2023-03-24 | Method, device, equipment and storage medium for determining associated data of alarm data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310293280.9A CN116016121B (en) | 2023-03-24 | 2023-03-24 | Method, device, equipment and storage medium for determining associated data of alarm data |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116016121A CN116016121A (en) | 2023-04-25 |
CN116016121B true CN116016121B (en) | 2023-07-18 |
Family
ID=86032172
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310293280.9A Active CN116016121B (en) | 2023-03-24 | 2023-03-24 | Method, device, equipment and storage medium for determining associated data of alarm data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116016121B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116708036B (en) * | 2023-08-07 | 2023-11-03 | 北京升鑫网络科技有限公司 | Scoring method and scoring system for alarm data and electronic equipment |
CN117114454B (en) * | 2023-10-25 | 2024-01-23 | 南京中鑫智电科技有限公司 | DC sleeve state evaluation method and system based on Apriori algorithm |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020238810A1 (en) * | 2019-05-25 | 2020-12-03 | 华为技术有限公司 | Alarm analysis method and related device |
CN112988525A (en) * | 2021-03-22 | 2021-06-18 | 新华三技术有限公司 | Method and device for matching alarm association rules |
WO2022111265A1 (en) * | 2020-11-25 | 2022-06-02 | 深圳前海微众银行股份有限公司 | Information alerting method and device, and storage medium |
CN115712646A (en) * | 2021-08-18 | 2023-02-24 | 腾讯科技(深圳)有限公司 | Alarm strategy generation method, device and storage medium |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103746831B (en) * | 2013-12-24 | 2017-08-18 | 华为技术有限公司 | A kind of method of alert analysis, apparatus and system |
US10169191B2 (en) * | 2016-04-23 | 2019-01-01 | International Business Machines Corporation | Warning data management with respect to a development phase |
CN107770797A (en) * | 2016-08-17 | 2018-03-06 | 中国移动通信集团内蒙古有限公司 | Correlation analysis method and system for wireless network alarm management |
CN109358602A (en) * | 2018-10-23 | 2019-02-19 | 山东中创软件商用中间件股份有限公司 | A kind of failure analysis methods, device and relevant device |
WO2022015313A1 (en) * | 2020-07-16 | 2022-01-20 | Hewlett-Packard Development Company, L.P. | Generation of alerts of correlated time-series behavior of environments |
CN115599830A (en) * | 2021-06-28 | 2023-01-13 | 深信服科技股份有限公司(Cn) | Method, device, equipment and medium for determining data association relation |
CN114448774B (en) * | 2021-12-16 | 2023-12-05 | 武汉光迅科技股份有限公司 | Alarm processing method, device and storage medium |
CN114358312A (en) * | 2021-12-31 | 2022-04-15 | 中国联合网络通信集团有限公司 | Training method, equipment and storage medium for network alarm event recognition model |
CN115811459A (en) * | 2022-11-09 | 2023-03-17 | 阿里巴巴(中国)有限公司 | A warning marking method, device, electronic equipment and storage medium |
-
2023
- 2023-03-24 CN CN202310293280.9A patent/CN116016121B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020238810A1 (en) * | 2019-05-25 | 2020-12-03 | 华为技术有限公司 | Alarm analysis method and related device |
WO2022111265A1 (en) * | 2020-11-25 | 2022-06-02 | 深圳前海微众银行股份有限公司 | Information alerting method and device, and storage medium |
CN112988525A (en) * | 2021-03-22 | 2021-06-18 | 新华三技术有限公司 | Method and device for matching alarm association rules |
CN115712646A (en) * | 2021-08-18 | 2023-02-24 | 腾讯科技(深圳)有限公司 | Alarm strategy generation method, device and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN116016121A (en) | 2023-04-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11632383B2 (en) | Predictive model selection for anomaly detection | |
US11777945B1 (en) | Predicting suspiciousness of access between entities and resources | |
CN116016121B (en) | Method, device, equipment and storage medium for determining associated data of alarm data | |
US11915156B1 (en) | Identifying leading indicators for target event prediction | |
EP1886469B1 (en) | A method for generating an update status alert in a device | |
US11194794B2 (en) | Search input recommendations | |
CN107133309B (en) | Method and device for storing and querying process example, storage medium and electronic equipment | |
WO2016026389A1 (en) | Method for creating context-aware application and user terminal | |
US20210286815A1 (en) | Systems and methods for accessing a database management system | |
CN114936039A (en) | Program data processing method, program data processing device, electronic device, and storage medium | |
CN115062046A (en) | Database query method and device, electronic equipment and storage medium | |
CN110442844A (en) | Data processing method, device, electronic equipment and storage medium | |
CN112328658A (en) | User profile data processing method, device, equipment and storage medium | |
CN111382064B (en) | Test method, test device, test medium and electronic equipment | |
CN116701663B (en) | Method for constructing knowledge graph based on digital retina system | |
CN117149777B (en) | Data query method, device, equipment and storage medium | |
WO2024159967A1 (en) | Government affair data resource directory updating method and apparatus, electronic device, and medium | |
US10193990B2 (en) | System and method for creating user profiles based on multimedia content | |
CN113377780A (en) | Database fragmentation method and device, electronic equipment and readable storage medium | |
US20210132855A1 (en) | Method and device for detecting slow node and computer-readable storage medium | |
CN117389787A (en) | Method and device for determining alarm root causes, electronic equipment, and chips | |
CN113419667A (en) | Snapshot capacity calculation method and device, electronic device and computer-readable storage medium | |
CN111382161A (en) | State data processing method and device, electronic equipment and storage medium | |
WO2023207520A1 (en) | Information association method and apparatus, device, storage medium and product | |
CN116032782A (en) | Fault detection method, device and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder | ||
CP01 | Change in the name or title of a patent holder |
Address after: No. 1 Minshan Road, Huangdao District, Qingdao, Shandong Province, 266000 Patentee after: CAOS industrial Intelligence Research Institute (Qingdao) Co.,Ltd. Patentee after: Karos IoT Technology Co.,Ltd. Patentee after: Kaos Digital Technology (Qingdao) Co.,Ltd. Address before: No. 1 Minshan Road, Huangdao District, Qingdao, Shandong Province, 266000 Patentee before: CAOS industrial Intelligence Research Institute (Qingdao) Co.,Ltd. Patentee before: Karos IoT Technology Co.,Ltd. Patentee before: Haier digital technology (Qingdao) Co.,Ltd. |