-
公开(公告)号:US11438212B2
公开(公告)日:2022-09-06
申请号:US17120605
申请日:2020-12-14
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Jian Li , Zengjun Huang , Min Hu , Bo Xie , Kang Cheng
IPC: H04L41/0631 , H04L41/069 , H04L43/04
Abstract: A fault root cause analysis method and apparatus are provided. The method includes: obtaining a first alarm event set, where the first alarm event set includes a plurality of alarm events; for a first alarm event in the first alarm event set, extracting a feature vector of the first alarm event, where a part of or all features of the feature vector are used to represent a relationship between the first alarm event and another alarm event in the first alarm event set; and determining, based on the feature vector of the first alarm event, whether the first alarm event is a root cause alarm event. In this application, whether the first alarm event is the root cause alarm event is determined based on a feature vector of the relationship between the first alarm event and the another alarm event, and the accuracy of fault root cause identification is improved.
-
2.
公开(公告)号:US20200092169A1
公开(公告)日:2020-03-19
申请号:US16694160
申请日:2019-11-25
Applicant: Huawei Technologies Co., Ltd.
Inventor: Lv Ding , Kang Cheng , Jian Li , Jianfeng Wang , Xiaoping Ma
IPC: H04L12/24
Abstract: A method for obtaining a standard configuration template of a network device and a computing device includes obtaining configuration commands of a plurality of network devices, erating a command template set including a plurality of different command templates, generating a correlation matrix based on the command template set, clustering the plurality of network devices based on the correlation matrix to obtain at least two categories of network devices, dividing the correlation matrix into a plurality of submatrixes based on a clustering result, performing singular value decomposition on each submatrix to obtain a non-zero singular value, and using, as a standard configuration template of a corresponding category, a command template in the command template set that makes a contribution greater than a threshold to the non-zero singular value.
-
公开(公告)号:US11513932B2
公开(公告)日:2022-11-29
申请号:US16749711
申请日:2020-01-22
Applicant: Huawei Technologies Co., Ltd.
Inventor: Xin Xiao , Kang Cheng , Liang Zhang , Jian Li , Jiyu Pan
Abstract: A method includes obtaining a first memory log, where the first memory log includes log information of a plurality of garbage collections, and log information of each garbage collection includes a garbage collection time, and includes at least one of a downtime, memory usage after garbage collection, and memory usage before garbage collection, obtaining, based on log information in a first detection time window, first statistical information corresponding to the first detection time window, and determining, based on the first statistical information corresponding to the first detection time window, an anomaly degree corresponding to the log information in the first detection time window.
-
公开(公告)号:US20200159636A1
公开(公告)日:2020-05-21
申请号:US16749711
申请日:2020-01-22
Applicant: Huawei Technologies Co., Ltd.
Inventor: Xin Xiao , Kang Cheng , Liang Zhang , Jian Li , Jiyu Pan
Abstract: A memory anomaly detection method and device are provided. The method includes: obtaining a first memory log, where the first memory log includes log information of a plurality of garbage collections, and log information of each garbage collection includes a garbage collection time, and includes at least one of a downtime, memory usage after garbage collection, and memory usage before garbage collection; obtaining, based on log information in a first detection time window, first statistical information corresponding to the first detection time window; and determining, based on the first statistical information corresponding to the first detection time window, an anomaly degree corresponding to the log information in the first detection time window. It can be learned that by implementing the method described in the embodiments of this application, accuracy of a detection result of a memory anomaly degree is improved.
-
公开(公告)号:US20190288904A1
公开(公告)日:2019-09-19
申请号:US16431975
申请日:2019-06-05
Applicant: Huawei Technologies Co., Ltd.
Inventor: Kang Cheng , Jian Li , Dewei Bao , Jun Wu , Donghong Peng
Abstract: A network detection method and apparatus are provided. The method includes: obtaining parsed data of one or more target network performance indicators, where the parsed data of each target network performance indicator includes measured values corresponding to the target network performance indicator at a plurality of collection time points; analyzing the parsed data, to obtain a plurality of data sequences, where each data sequence includes a plurality of measured values corresponding to a target network performance indicator; determining an abnormal collection time point or an abnormal data sequence based on the plurality of data sequences; and determining that a network performance indicator corresponding to the abnormal collection time point or the abnormal data sequence is an abnormal network performance indicator.
-
公开(公告)号:US20180123971A1
公开(公告)日:2018-05-03
申请号:US15855730
申请日:2017-12-27
Applicant: Huawei Technologies Co., Ltd.
Inventor: Kang Cheng , Wenxiao Yu , Xingfen Wu , Yinliang Hu
IPC: H04L12/927 , H04L29/08
CPC classification number: H04L47/803 , H04L41/00 , H04L41/50 , H04L67/16 , H04L67/30
Abstract: An application implementation method and a service controller to facilitate application development and improve application implementation efficiency, where the method includes receiving, by the service controller, description information of a first application, where the description information is received from an application server, determining, by the service controller, target network resource information according to the description information, where the target network resource information indicates a network resource required by the first application, and sending, by the service controller to a network controller, an invoking instruction carrying a network policy, where the invoking instruction instructs the network controller to invoke the target network resource according to the network policy to implement the first application.
-
7.
公开(公告)号:US10917300B2
公开(公告)日:2021-02-09
申请号:US16694160
申请日:2019-11-25
Applicant: Huawei Technologies Co., Ltd.
Inventor: Lv Ding , Kang Cheng , Jian Li , Jianfeng Wang , Xiaoping Ma
IPC: H04L12/24
Abstract: A method for obtaining a standard configuration template of a network device and a computing device includes obtaining configuration commands of a plurality of network devices, erating a command template set including a plurality of different command templates, generating a correlation matrix based on the command template set, clustering the plurality of network devices based on the correlation matrix to obtain at least two categories of network devices, dividing the correlation matrix into a plurality of submatrixes based on a clustering result, performing singular value decomposition on each submatrix to obtain a non-zero singular value, and using, as a standard configuration template of a corresponding category, a command template in the command template set that makes a contribution greater than a threshold to the non-zero singular value.
-
公开(公告)号:US20190251093A1
公开(公告)日:2019-08-15
申请号:US16396193
申请日:2019-04-26
Applicant: Huawei Technologies Co., Ltd.
Inventor: Dewei Bao , Yuming Xie , Shihao Li , Jian Li , Kang Cheng
CPC classification number: G06F16/254 , G06F11/34 , G06F16/00 , G06F16/21 , G06F16/2379 , G06F16/285
Abstract: A data processing device determines, based on a plurality of logs of a same log type, a log template of the log type (i.e. a parsing rule), and extracts, based on the log template, variables of the plurality of logs to generate a structured log so that the parsing rule does not need to be manually set, and manual maintenance on the parsing rule is not needed. A data processing method includes obtaining a log set; determining that N logs in the log set belong to a first type; determining based on the N logs, a log template corresponding to the first type, where the log template corresponding to the first type is used to indicate a variable location of the N logs; and extracting based on the variable location, variables from one or more logs in the N logs to generate a structured log.
-
-
-
-
-
-
-