Professional Documents
Culture Documents
PUBM UME R18 Alarm Automation EXpert Operation Guide en
PUBM UME R18 Alarm Automation EXpert Operation Guide en
Version: V16.19.40
ZTE CORPORATION
No. 55, Hi-tech Road South, ShenZhen, P.R.China
Postcode: 518057
Tel: +86-755-26771900
URL: http://support.zte.com.cn
E-mail: support@zte.com.cn
LEGAL INFORMATION
Copyright 2020 ZTE CORPORATION.
The contents of this document are protected by copyright laws and international treaties. Any reproduction
or distribution of this document or any portion of this document, in any form by any means, without the
prior written consent of ZTE CORPORATION is prohibited. Additionally, the contents of this document
All company, brand and product names are trade or service marks, or registered trade or service marks,
This document is provided as is, and all express, implied, or statutory warranties, representationsor
conditions are disclaimed, including without limitation any implied warranty of merchantability, fitness for
a particular purpose, title or non-infringement. ZTE CORPORATION and its licensors shall not be liable
for damages resulting from the use of or reliance on the information contained herein.
ZTE CORPORATION or its licensors may have current or pending intellectual property rights or
applications covering the subject matter of this document. Except as expressly provided in any written
license between ZTE CORPORATION and its licensee, the user of this document shall not acquire any
ZTE CORPORATION reserves the right to upgrade or make technical change to this product without
further notice.
Users may visit the ZTE technical support website http://support.zte.com.cn to inquire for related
information.
Revision History
I
About This Manual
Purpose
The ElasticNet UME R18, hereafter referred to as UME, is a radio network management
system.
This manual describes automatic alarm operations on the UME, including rule package
management and automatic alarm analysis.
Targeted Audience
Familiarity with the meaning and basic handling of alarms of 4G and 5G devices is
required.
Chapter 1, Overview Describes the automatic alarm management operations of the UME and
application scenario.
Chapter 2, Quick Start This section introduces the topic management function of the AAX,
the intelligent mining function of the alarm association rule, and the
knowledge map editing and presentation function.
Chapter 3, Rule Design This section introduces the topic management function of the AAX,
the intelligent mining function of the alarm association rule, and the
knowledge map editing and presentation function.
Chapter 4, Rule Package Describes how to load a rule package, how to view rule packages and
Management rules, how to start and stop a rule, and how to view the rule audit logs.
Chapter 5, Performance Performance Staticstics support the automatic analysis of All Alarm, Out
Staticstics of Service, Link Broken.
Related Documentation
Conventions
III
IV
Chapter 1
Overview
The Alarm Automation eXpert (AAX) is used for automatic alarm handling. It can
automatically correlate current alarms on the 4G/5G wireless network and automatically
locate the fault cause, thus improving the efficiency of on-site operation and
maintenance.
You can start and start automatic alarm handling and view the results of automatic alarm
analysis.
This section introduces the topic management function of the AAX, the intelligent mining
function of the alarm association rule, and the knowledge map editing and presentation
function.
Related Information
Related Information
AI Intelligent Mining
AI can mine the data intelligently, the mining tasks can be started, edited, deleted,
and enabled, and results can be viewed.
Knowledge Map
The alarm association rules discovered by AI intelligent mining are displayed in the form
of knowledge maps.
This describes the rule package management of the AAX APP, including viewing rule
packages and rules, importing and exporting a rule package, starting and stopping a
rule, and viewing rule audit logs.
Context
Prerequisite
Steps
3. You can view the query interface for the specific rules by clicking Rule Management
in the left pane.
Result
The system loads rule packages and you can view the rule package and rule
information on the AAX interface.
Steps
1. Delete the existing rule package with the same name: Click Rule Package
Management in the left pane. The Rule Package Management page is displayed,
with rule packages already loaded. Select the rule package to be deleted and click
the Delete button for this rule package in the Operations column.
2. Import a rule package: Click the Import button on the Rule Package Management
page and select a rule package file (file name extension: .ura) on the local computer
to import. You do not need to restart the UME after the rule package is imported.
The rule package is imported into the AAX. You need to enable the rules included in
the imported rule package.
Result
On the Rule Package Management page of the AAX, you can view the imported rule
packages.
Prerequisite
Context
Operation path: AAX portal > Alarm Automation > Rule Management
Steps
1. Enable a rule.
If the status of a rule is close, click open in the Operations column to enable the rule.
If the rule is successfully enabled, its status is open, and the stop button is displayed in
the Operations column. If the rule is not successfully enabled, a failure notification box
is displayed.
2. Disable a rule.
If a rule is in open status, you can click the close button in the Operations column to
disable it.
If the rule is successfully disabled, its status is stop, and the open button is displayed in
the Operations column. If the rule is not successfully disabled, a failure notification box
is displayed.
Result
Prerequisite
Steps
1. Query audit logs: On the AAX page, click Rule Audit Log under Rule Package
Manager in the left page.
a. You can do fuzzy search for logs by execution time, rule name, or rule package.
b. Logs can be displayed in ascending or descending order of execution time.
c. You can view the alarm details handled by the rule, and view the IDs of new
alarms and associated alarms.
Result
Context
AAX has been started. The alarm data generated from an effective rule exists.
Steps
1. Click Performance Statistics in the left menu to enter the AAX Performance Statistics
interface.
2. Under the TopicSelector, switch to the types of alarms to be counted, including global
alarms, out-of-service alarms and link alarms.
3. Global Performance Statistics
a. Click Global button. The default data is History Alarm data. Select the alarm type
and time interval for performance statistics. By default, all data is used.
b. After the selection, the system analyzes and collects the root cause analysis,
automatic analysis rate, and alarm reduction rate of the selected area.
a. Click Out-of-service button. The default is History alarm data. Select the alarm
type requiring performance statistics.
b. After the selection, the system analyzes and collects the root cause analysis,
automatic analysis rate, and alarm reduction rate of the selected area.
b. After the selection, the system analyzes and collects the root cause analysis,
automatic analysis rate, and alarm reduction rate of the selected area. The S1
link does not provide the root cause analysis function.
6. Click Export to export the root cause analysis, automatic analysis rate and reduction
rate of the current t to the excel table.
7. Click the Rule button and the system will navigate to the Rule Management function.
8. Click Refresh, and the system will refresh the root cause analysis, automatic analysis
rate and reduction rate of the current page.
Result
UME