This disclosure relates generally to systems and methods of handling network incidents on a computer network.
A telecommunication network system includes network devices (such as switch, router, etc.) and other types of hardware. Some of this hardware implements software to perform network functions. In some cases, problems occur in the network and tickets are generated so that the responsible personnel can fix the problem. Managing changes in network systems is complex and challenging due to the amount of coordination and communications performed between different parties.
Systems and methods of automatically generating tickets for incidents on a computer network are disclosed. In some embodiments, method of setting rules for automating creation of a ticket related to incidents on a computer network is disclosed. The method includes presenting a graphical user interface (GUI), wherein the GUI includes one or more first graphical items for defining a network incident type on a network. One or more user selections are received of the one or more first graphical items. One or more automated incident identification characteristics of an incident management data structure are generated based on the user selections of the first graphical items. Furthermore, a user input is received in the GUI that defines one or more automated ticket generation rules of the incident management data structure. In this manner, automated rules for automatically identifying network incidents and generating tickets based on the network incidents created by a user through a GUI.
Systems and methods of automatically identifying network incidents on a computer network and for generating tickets as a result of those incidents are also disclosed. In some embodiments, incident management data structures are stored (e.g., in a database). Each of the incident management data structures includes one or more defined incident identification characteristics and one or more automated ticket generation rules. In response to a network incident, a network incident data structure is received that describes a network incident on a network. A target incident management data structure is selected from the incident management data structures based on the defined automated incident identification characteristics of the target incident management data structure matching the network incident described by the network incident data structure. A ticket incident data structure is generated in accordance with the one or more automated ticket generation rules of the target incident management data structure. In this manner, tickets are automatically generated upon detection of network incidents on the network.
Aspects of the present disclosure are best understood from the following detailed description when read with the accompanying figures. It is noted that, in accordance with the standard practice in the industry, various features are not drawn to scale. In fact, the dimensions of the various features may be arbitrarily increased or reduced for clarity of discussion.
The following disclosure provides many different embodiments, or examples, for implementing different features of the provided subject matter. Specific examples of components, values, operations, materials, arrangements, or the like, are described below to simplify the present disclosure. These are, of course, merely examples and are not intended to be limiting. Other components, values, operations, materials, arrangements, or the like, are contemplated. For example, the formation of a first feature over or on a second feature in the description that follows may include embodiments in which the first and second features are formed in direct contact and may also include embodiments in which additional features may be formed between the first and second features, such that the first and second features may not be in direct contact. In addition, the present disclosure may repeat reference numerals and/or letters in the various examples. This repetition is for the purpose of simplicity and clarity and does not in itself dictate a relationship between the various embodiments and/or configurations discussed.
(Optional, use when applicable) Further, spatially relative terms, such as “beneath,” “below,” “lower,” “above,” “upper” and the like, may be used herein for ease of description to describe one element or feature's relationship to another element(s) or feature(s) as illustrated in the figures. The spatially relative terms are intended to encompass different orientations of the device in use or operation in addition to the orientation depicted in the figures. The apparatus may be otherwise oriented (rotated 90 degrees or at other orientations) and the spatially relative descriptors used herein may likewise be interpreted accordingly.
Systems and methods of automatically generating tickets for incidents on a computer network are disclosed. In addition, systems and methods for setting up automated characteristics and automated rules that generate the tickets are disclosed. In some embodiments, user selections and user input is received to define the automated incident identification characteristics and automated ticket generation rules. In this manner, different network incidents correspond to different ones of the network incident managements structures. In response to the automated incident identification characteristics matching a description of an incident, automated ticket generation rules are implemented to automatically generate a ticket.
The computing system 100 includes a network incident management computer device 102, at least one database 104, a computer network 105, and user devices 107, 109. In
In some embodiments, the network incident management computer device 102 and the cellular network 106 are connected to each other through the IP network 108. In some embodiments, the IP network 108 includes a wide area network (WAN) (i.e., the internet), a local area network (LAN), a wide area local area network (WLAN), and/or the like. In some embodiments, the cellular network 106 includes a wireless WAN (WWAN).
The cellular network 106 includes a radio access network (RAN) 160. The RAN 160 is the radio element of the cellular network 106. The RAN 160 includes network elements such as base stations that include one or more radio transceivers. The base stations cover land areas called cells. User equipment, such as cell phones, smartphones, laptops, etc., connect to each of the base stations that cover the cells. RAN 160 connects to the core 170 through back haul links, which are provided by the transport 180.
The core 170 is a central part of the overall cellular network 106. The core 170 allows mobile subscribers to get access to the services (e.g. international calling, text messaging, local cellular calls). In some embodiments, the core 170 is responsible for critical functions such as maintaining subscriber profile information, subscriber location, authentication of services, and the necessary switching functions for voice and data sessions. The core 170 includes network elements. In some embodiments, the network elements include a Mobility Management Entity (MME), a Serving Gateway, a Multimedia Broadcast Multicast Service (MBMS) Gateway, a Broadcast Multicast Service Center (BM-SC), and a Packet Data Network (PDN) Gateway. In some embodiments, the MME is in communication with a Home Subscriber Server (HSS). The MME is the control node that processes the signaling between the user equipment and the core 170. Generally, the MME provides bearer and connection management. In some embodiments, Internet protocol (IP) packets are transferred through a serving gateway, which itself is connected to the IP network 108.
The transport 180 refers to the transport network that connects the core 170 and the RAN 160 of the cellular network 106. The transport 180 includes network elements 182 such as backhaul links, connectors, relays, Voice over IP devices, etc. In some embodiments, the transport 180 includes a fronthaul that connects macrocell to the small cells, radio units, digital units and/or the like.
The network incident management computer device 102 (server 102 in some embodiments) is a computer device that includes at least one processor 126 and a non-transitory computer readable medium 128. The non-transitory computer readable medium 128 stores computer executable instructions 124. In some embodiments, non-transitory computer readable medium 128 include a random-access memory (RAM), a read-only memory (ROM), an electrically erasable programmable ROM (EEPROM), optical disk storage, magnetic disk storage, other magnetic storage devices, combinations of the aforementioned types of computer-readable mediums, or any other medium that can be used to store computer executable code in the form of instructions or data structures that can be accessed by a computer device. When the processor 126 executes the computer executable instructions 124, the processor 126 executes the network incident management computer software 127.
The network incident management computer software 127 is configured to automate the handling of network incidents on the computer network 105. In some embodiments, network incident relate to malfunctions or errors that occur in hardware of the computer network 105. In some embodiments, network incidents relate to bugs and errors that occur in software of the computer network 105. In some embodiments, network incidents relate to malfunctions, errors, bugs, and other failures of operation in both hardware and software of the computer network 105. In some embodiments, the hardware of network 105 comprises server, base station, radio unit, and/or any other suitable hardware in a network system, and the software of network 105 comprises a plurality of applications performing telecommunication functions, managing the telecommunication performance, and/or any other suitable software in a network system. In some embodiments, the network incident management computer software 127 is configured to automate the incident management of a network incident so that the appropriate procedures are applied to correct the network incident in the computer network 105.
In some embodiments, the network incident management computer device 102 is a server. In some embodiments, the network incident management computer device 102 is configured to implement other software besides the network incident management computer software 127. In some embodiments, the network incident management computer device 102 is a dedicated computer device that is configured to only implement the network incident management computer software 127.
The network incident management computer software 127 implemented by the network incident management computer device 102 is configured to monitor the computer network 105 to detect when a network incident occurs on the computer network 105. In some embodiments, any kind of failure that occurs in any service or device is a network incident that results in the generation of a ticket. For an example, if connectivity between two devices fails, then the failure in the connectivity between the devices impacts associated services or network devices and that failure can is treated as a network incident that results in the generation of a ticket. Other examples of network incidents that result in the generation of a ticket include high temperatures in one or more network devices, power failures in network devices, battery down in network devices, and/or the like. In some embodiments, the network incident management computer software 127 implements an automated script (e.g., a crawler) that is configured to detect network incidents that occur on the computer network 105. In some embodiments, the network script is the input in response to network events/alarms. In some embodiments, the network script correlates a set of algorithms using set of rules that users define in different correlation configurations. Each algorithm is implemented sequentially to reduce the events/alarm count after each algorithm to avoid duplicate incident creation on same network events and/or alarms. In response to detecting a network incident on the computer network 105, the network incident management computer software 127 is configured to generate a network incident data structure 156 that describes the network incident on the computer network 105. In some embodiments, the network incident data structure 156 describes the network domain in which the incident occurred. In some embodiments, the network incident data structure 156 describes an IP address or a LAN in the IP Network 108 where the network incident occurred. In some embodiments, the network incident data structure 156 identifies the location where the network incident occurred in the RAN 160, Core 170 or the Transport 180 of the cellular network 106. In some embodiments, the network incident data structure 156 describes and provides a network location of a particular piece of equipment in which the network incident occurred. In some embodiments, the network incident data structure 156 describes a geographical location of the network equipment where the network incident occurred. In some embodiments, the network incident data structure 156 identifies a vendor that provides services related to the network incident. In some embodiments, the network incident data structure 156 identifies a correlation type related to the network incident. In some embodiments, the network incident data structure 156 identifies a category of the network incident. In some embodiments, the network incident data structure 156 identifies a cause code of the network incident. In some embodiments, the network incident data structure 156 includes error codes, error messages, alarm codes, warning codes, event data, event times, and/or the like related to the network incident.
The network incident management computer software 127 stores the network incident data structures 156 in the database 113. The network incident management computer software 127 also stores incident management data structures 154. Each of the incident management data structures 154 includes one or more defined incident identification characteristics and one or more automated ticket generation rules. The incident identification characteristics are used to match the incident management data structures 154 to network incident data structures 156. For example, if a particular type of network incident occurs because of a software error in the RAN 160, one of the network incident data structures 156 is recorded to describe the software error in the RAN 160. In order to identify the incident management data structures 154 that handles the software error in the RAN 160, a particular incident management data structure 154 includes network incident identification characteristics that identify a software error that is correctable through the particular incident management data structure 154. If the network incident identification characteristics of the incident management data structure 154 match the description of the network incident in the network incident data structure 156, then the network incident management computer software 127 identifies the particular incident management data structure 154 as the target incident management data structure 154. The network incident management computer software 127 implements automated ticket generation rules of the incident management data structure 154 to automatically generate a ticket incident data structure 152.
In some embodiments, the ticket incident data structure 152 describes the network incident; schedules service for the network incident, gathers details for debugging or correcting the network incident, gathers logs related to the network incident, assigns groups or personnel responsible for correcting and authorizing network changes for the network incident, and/or the like. In some embodiments, the network incident management computer software 127 automatically transmits the ticket incident data structure 152 to the responsible groups or personnel, such as to the user devices 107, 109 of users 130, 140. In some embodiments, the ticket incident data structure 152 includes an algorithm (e.g., a script) for administering the ticket in an automated manner. In some embodiments, the ticket incident data structure 152 includes an algorithm (e.g., a script) for correcting or fixing the network incident on the computer network 105.
Examples of user devices 107, 109 include a cellular phone, a smart phone, a session initiation protocol (SIP) phone, a laptop, a desktop, a smart watch, a personal digital assistant (PDA), a satellite radio, a global positioning system, a multimedia device, a video device, a digital audio player (e.g., MP3 player), a camera, a game console, a tablet, a smart device, and a wearable communication device.
The user device 107 includes one or more processors(s) 139. The user device 107 also includes a non-transitory computer readable medium 135. The non-transitory computer readable storage medium 135 stored computer executable instructions 137. In some embodiments, non-transitory computer readable medium 135 include a random-access memory (RAM), a read-only memory (ROM), an electrically erasable programmable ROM (EEPROM), optical disk storage, magnetic disk storage, other magnetic storage devices, combinations of the aforementioned types of computer-readable mediums, or any other medium that can be used to store computer executable code in the form of instructions or data structures that can be accessed by a computer device. When the processor(s) 139 executes the computer executable instructions 137, the processor(s) 139 are configured to execute the functionality described for the user device 107 herein.
The user device 109 includes one or more processors(s) 141. The user device 109 also includes a non-transitory computer readable medium 143. The non-transitory computer readable storage medium 143 stored computer executable instructions 142. In some embodiments, non-transitory computer readable medium 143 include a random-access memory (RAM), a read-only memory (ROM), an electrically erasable programmable ROM (EEPROM), optical disk storage, magnetic disk storage, other magnetic storage devices, combinations of the aforementioned types of computer-readable mediums, or any other medium that can be used to store computer executable code in the form of instructions or data structures that can be accessed by a computer device. When the processor(s) 141 executes the computer executable instructions 142, the processor(s) 141 are configured to execute the functionality described for the user device 109 herein.
In some embodiments, the user devices 107, 109 are used by the users 130, 140 to transmit instructions, user selections, and user input to the network incident management computer software 127 implemented by the network incident management computer device 102. In some embodiments, the users 130, 140 input instructions, user selections, and user input for the network incident management computer software 127 directly to the network incident management computer device 102.
The network incident management computer device 102 is configured to implement the computer executable instructions 124 through the processors 126 and generate a graphical user interface 144. In some embodiments, the GUI 144 is presented directly through a display device (not shown) of the network incident management computer device 102. In some embodiments, the GUI 144 is presented through a display device (not shown) of the user devices 107, 109.
In some embodiments, a crawler is implemented by the network incident management computer software 127 to detect network incidents on the computer network 105 and generate network incident data structure(s) 156 that describe the network incident. If no incident management data structure 154 exists for automatically generating a ticket incident data structure 152 for this type of network incident, the GUI 144 provides the users 130, 140 with the ability for setting up an incident management data structure 154 that can automate the generation of ticket incident data structure(s) for this type of network incident.
To set up the incident management data structures 154 that handle the generation of ticket incident data structure(s) 152, the GUI 144 includes one or more graphical items for defining a network incident type on the computer network 105. The network incident management computer software 127 receives one or more user selections of the first graphical items and generates one or more automated incident identification characteristics of an incident management data structure based on the user selections of the first graphical items. In this manner, network incident management computer software 127 defines the characteristics of a network incident on the computer network 105 for which it is capable of handling the generation of a ticket incident data structure 152.
Additionally, the network incident management computer software 127 receives user input that defines one or more automated ticket generation rules of the incident management data structure 154. The automated ticket generation rules are configured to automate the generation of the ticket incident data structure 152 for the network incident.
In some embodiments, the ticket incident data structures 152 are transmitted to maintenance personnel to correct or fix the incident on the computer network 105. In some embodiments, the ticket incident data structures 152 include instructions directed the maintenance personnel to repair or replace hardware on the computer network 105. In some embodiments, the ticket incident data structures 152 include instructions directed the maintenance personnel to update or reconfigure software implemented in the computer network 105. In some embodiments, the ticket described by the ticket incident data structure 152 is sent to approval personnel for approval of maintenance procedures before the maintenance personnel correct or fix the incident on the computer network 105. In response to approval being received by the appropriate personnel, maintenance personnel receive the ticket incident data structure 152 on user devices and implement the approved procedures to correct or fix the incident on the computer network 105.
In some embodiments, the network incident management data structures of
The network incident management data structures are organized into different subsets of incident management data structures. The different subsets of incident management data structures are organized into different tiers of incident management data structures. More specifically, one subset of incident management data structures are tier 1 of incident management data structures. Tier 1 of incident management data structures is the highest tier of incident management data structures. Another subset of incident management data structures are tier 2 of incident management data structures. Tier 2 of incident management data structures are the second highest tier of incident management data structures. Another subset of incident management data structures are tier 3 of incident management data structures. Tier 3 of incident management data structures are the third highest tier of incident management data structures. Another subset of incident management data structures are tier 4 of incident management data structures. Tier 4 of incident management data structures are the lowest tier of incident management data structures.
In
To select a target incident management data structure 154 that matches a particular network incident data structure 156, the network incident management computer software 127 iterates through the incident management data structures 154 to find a match with the network incident data structure 156 in the order of the tiers. More specifically, the network incident management computer software 127 iterates through the one or more automated incident identification characteristics of the tier 1 the network incident management computer software 127 until a compliance is found or a predetermined condition is satisfied (e.g., a match is found between the automated incident identification characteristics and the description of the network incident data structure 156). If compliance is not found or if the predetermined condition is not met, the network incident management computer software 127 iterates through the one or more automated incident identification characteristics of the tier 2 the network incident management computer software 127 until a compliance is found or a predetermined condition is satisfied (e.g., a match is found between the automated incident identification characteristics and the description of the network incident data structure 156). If compliance is not found or if the predetermined condition is not met, the network incident management computer software 127 iterates through the one or more automated incident identification characteristics of the tier 3 the network incident management computer software 127 until a compliance is found or a predetermined condition is satisfied (e.g., a match is found between the automated incident identification characteristics and the description of the network incident data structure 156). If compliance is not found or if the predetermined condition is not met, the network incident management computer software 127 iterates through the one or more automated incident identification characteristics of the tier 4 the network incident management computer software 127 until a compliance is found or a predetermined condition is satisfied (e.g., a match is found between the automated incident identification characteristics and the description of the network incident data structure 156). If there has been iteration through all of the tiers 1, 2, 3, 4, then an incident management data structure 154 does not exist for the network incident data structure 156. In some embodiments, a user 130, 140 then uses the GUI 144 to set up an new incident management data structure 154 to handle these new type of network incident. However, if compliance is found or the precondition is met in one of the tiers, then the automated ticket generation rules of the first matching incident management data structure 154 are implemented to generate a ticket incident data structure 152.
Panel 302 includes graphical items that each indicate a different domain in the computer network 105. The graphical items are named domain 1-domain 11 and have graphical symbols to identify different domains in the computer network 105. A user selection of one of the domains defines the domain in the computer network 105 of the incident management data structure 154 being defined. In this case, the user selection has selected domain 9. As a result, the selection of domain 9 is shown in the panel 304. Accordingly, the description of the network incident data structure 156 matches the incident management data structure 154 being defined in panel 302 if the network incident described by the network incident data structure 156 is related to domain 9.
Panel 400 includes graphical items that each indicate different vendors that service the computer network 105. The graphical items are named vendor 1-vendor 29 and have graphical symbols to identify different vendors that service the computer network 105. A user selection of one of the vendors defines the vendor in the computer network 105 of the incident management data structure 154 being. In this case, the user selection has selected vendor 27. As a result, the selection of vendor 27 is shown in the panel 304. Accordingly, the description of the network incident data structure 156 matches the incident management data structure 154 being defined in panel 400 if the network incident described by the network incident data structure 156 is related to vendor 27.
Panel 500 includes graphical items for selecting between geography, correlation type, category, and cause code. By receiving a user selection of geography, the user can define automated incident identification characteristics of the incident management data structure 154 as geographical incident identification characteristics. Panel 500 includes a text box 502 where a user enters user text to define the geography of the geographical incident identification characteristics. A selection menu 504 provides category selections that related to the geographical selection. In some embodiments, the category under geography-based auto ticket generation rules that distinguishes the types of services and device type auto tickets to be generated. This is because in a geographical area lots of network incidents occur but automated ticket generations is performed for only for few specific network incidents within in the geographical area. In some embodiments, categories also include a v device type, device type, and/or any other category that is relevant to the network incidents on the computer network. In this case, a user selection of the macro category has been received. A user selection of one of the geography defines the geographical location of the incident management data structure 154 being. As a result, the selection of geography is shown in the panel 304, along with the selection of Macro. Accordingly, the description of the network incident data structure 156 matches the incident management data structure 154 being defined in panel 500 if the network incident described by the network incident data structure 156 is related to the defined geographical location. In some embodiments, geographical incident management data structures 154 are tier 1 incident management data structures as discussed in
Panel 600 includes graphical items for selecting between geography, correlation type, category, and cause code. By receiving a user selection of correlation type, the user can define automated incident identification characteristics of the incident management data structure 154 as correlation type incident identification characteristics. Panel 600 includes a selection menu 602 where a user selects a correlation type that defines the correlation type of the correlation type incident identification characteristics. Correlation type relates to algorithms. In some embodiments, correlation type include Topology Correlation, Mass Outage Alarm Correlation, Parent Child Alarm Correlation, Managed Object Correlation, and Self-Correlation & Normal Correlation. It should be noted that correlation types are added and removed in accordance with the algorithms available, in accordance with some embodiments, a selection menu 604 provides category selections that related to the correlation name. Correlation name is the name of rule users defined at the time of configuring incident creation rule. For example, at the time of configuring a Mass Outage correlation rule, the user sets some conditions to for generating a ticket and which system generates the ticket. In some embodiments, this also helps a user to identify which rule incident and auto ticket has been created. In this case, a user selection of the 100+Site Down name has been received. A user selection of one of the correlation type defines the correlation type of the incident management data structure 154 being. As a result, the selection of correlation type and correlation name are shown in the panel 304. Accordingly, the description of the network incident data structure 156 matches the incident management data structure 154 being defined in panel 500 if the network incident described by the network incident data structure 156 is related to the defined correlation type. In some embodiments, correlation type incident management data structures 154 are tier 2 incident management data structures as discussed in
Panel 700 includes graphical items for selecting between geography, correlation type, category, and cause code. By receiving a user selection of category, the user can define automated incident identification characteristics of the incident management data structure 154 as category incident identification characteristics. Panel 700 includes a selection menu 702 where a user selects a category of the category incident identification characteristics. The categories can vary and, in some embodiments, the categories are derived from pasts network incidents created on a type of service or a type of network device, For example if an incident is created due to a connection failure between two Routers a category is an identifier for Router Type (e.g., AG1). In this case, the category of Macro has been selected. A selection menu 704 provides site category that related to the category. Site category is the classification of devices based on their importance, for example, when a service provides data to military area, then the site category is VVIP to identify a single point of failure on services to be monitored and fixed on priority. In some embodiments, an auto ticket framework has the capability to add more configuration based field type to filter out incident tickets. Panel 700 also includes a selection menu 704 where a user selects a cause code type of the category incident identification characteristics. Cause Code types define the type of problem for which an incident is created. Values for cause code types differ based on an incident creation algorithm, in some embodiments. For example, if an incident is created using events or alarms the value is an Alarm Code. In another example if the incident is created using performance management of Key Performance Indicators (KPIs) the Cause Code is the KPI. In this case, the cause code type of the Alarm Code has been selected. A selection menu 708 provides cause codes that related to the cause code type. In this example, a cause code of an invalid license is selected. Accordingly, the description of the network incident data structure 156 that matches the incident management data structure 154 being defined in panel 700 is selected as the target incident management data structure 154. In some embodiments, category incident management data structures 154 are tier 3 incident management data structures as discussed in
Panel 800 includes graphical items for selecting between geography, correlation type, category, and cause code. By receiving a user selection of cause code, the user can define automated incident identification characteristics of the incident management data structure 154 as cause code incident identification characteristics. Panel 800 also includes a selection menu 802 where a user selects a cause code type of the category incident identification characteristics. In this case, the cause code type of the Alarm Code has been selected. A selection menu 804 provides cause codes that related to the cause code type. In this example, a cause code of an invalid license is selected. Accordingly, the description of the network incident data structure 156 that matches the incident management data structure 154 being defined in panel 800 is selected as the target incident management data structure 154. In some embodiments, cause code incident management data structures 154 are tier 4 incident management data structures as discussed in
Panel 900 includes graphical items for selection of an incident status for automated incident identification characteristics of the incident management data structure 154. The incident status of the incident management data structure 154 matching the incident status of the network incident data structure 156, then one of the characteristics for matching the incident management data structure 154 and the network incident data structure 156 is met.
Graphical items are included for selecting between an incident status of both, an incident status of open, and an incident status of closed. In some embodiments, an Auto Ticket is created both during the opening and the closing of an incident (i.e., both the statuses of incident). In response to a problem occurring on the network the incident is closed immediately, but the incident is not fixed in some embodiments. As a result, automated ticket generation is generated in both incident statuses. In some embodiments, in response to a network incident being fixed, the RCA of the problem is determined for the ticket so that similar incidents are not generated in the future. In
In
In response to the incident status being closed, then the network incident management computer software 127 determines a temporal difference between an incident start time in the network incident data structure 156 and the end time in the network incident data structure 156. In response to the temporal difference between the incident start time and the incident end time being greater than the delay, then then the network incident management computer software 127 implements an incident closing script in the target incident management data structure 154 that closes the incident related with the network incident data structure 156 and generates a ticket incident data structure 152 that indicates that the incident has been closed.
In response to the incident status being open, then the network incident management computer software 127 determines whether an incident start time in the network incident data structure 156 and the end time in the network incident data structure 156. In response to the temporal difference between the incident start time and the current time being greater than the delay, then then the network incident management computer software 127 implements a script from the incident management data structure 154 that generates a ticket incident data structure 152 for the incident described by the network incident data structure 156. In some embodiments, the script also automatically sends notifications regarding the ticket incident data structure 152 to the appropriate personnel. In some embodiments, the script also implements procedures to deal of fix the incident related to the ticket incident data structure 152 that has been generated.
Panel 900 also includes a selection box named “Equipment ID Status.” Equipment ID Status is a filter criteria for auto ticket creation. This field filters the incident for which auto ticket implemented by a user that is not based on the service status of device and service. In some embodiments, few devices in network can be ignored and are monitored during an initial phase of configuration. The failure of network devices during configuration sometimes result in failure, which are sometimes to be ignored or implemented for a different type of ticket assignment.
Network incident data structure 1002 is an example of the network incident data structure 156. The panel 1000 includes a subpanel 1004. The subpanel 1004 includes incident details (i.e., “Incident Details” in
The subpanel 1006 includes alarm details (i.e., “Alarm Details” in
The subpanel 1008 includes details related to entities impacted by the incident (i.e., “Impacted Entity Details” in
The subpanel 1010 includes geographical details related to the incident (i.e., “Geography Details” in
The subpanel 1012 includes ticket details related to a ticket generated for the incident (i.e., “Geography Details” in
Panel 1100A in
Subpanel 1104A illustrates details regarding a selected template of the automated ticket generation rules. In some embodiments, the automated ticket generation rules are a script. Subpanel 1104A includes table with fields that describe a network element type (i.e., “NE Type” in
Panel 1100B in
Panel 1100C in
The output field includes several subfields in order to describe the technical characteristics of the resulting ticket incident data structure 152. The output field in
In some examples, the ticket incident data structure 1202 is an example of a ticket incident data structure 152 in
Panel 1200A includes a subpanel 1204A that includes data fields describing the generated ticket incident data structure 1202. Subpanel 1204A includes domain field that describes the domain of the ticket incident data structure 1202 (i.e., “Domain” in
Panel 1200A includes a subpanel 1206A that includes data fields with information related to the ticket incident data structure 1202. Subpanel 1206A includes title field that indicates the title of the ticket incident data structure 1202 (i.e., “TT Title” in
Panel 1200B in
Subpanel 1206B in
Subpanel 1208B includes a search bar for receiving user text where a user searches for workgroups to associate with the ticket incident data structure 1202 (i.e., “Notifications” in
Subpanel 1210B in
Panel 1200C in
Subpanel 1206C includes a text box to enter a number related to a number of days until the ticket described by the ticket incident data structure 1202 is closed (i.e., “Number of days to auto close” in
Flowchart 1300 is implemented by the network incident management computer software executed by the network incident management computer device 102, in accordance with some embodiments. Flowchart 1300 includes blocks 1302-1310. Flow begins at block 1302.
At block 1302, a GUI is presented, wherein the GUI includes one or more graphical items for defining a network incident type on a network. An example of the graphical items in the GUI are the graphical items described shown in
At block 1304, one or more user selections are received for the one or more graphical items. An example of the user selections are user selection received with respect to the graphical items described shown in
At block 1306, one or more automated incident identification characteristics of an incident management data structure are generated based on the user selections of the first graphical items. Examples of the incident management data structure include the incident management data structure(s) 154 in
At 1308, user input is received in the GUI that defines one or more automated ticket generation rules. In some embodiments, the automated ticket generation rules are a script. In some embodiments, the automated ticket generation rules through another type of algorithm. An example of the characteristics of the automated ticket generation rules are described in
At 1310, a visual representation the network incident management structure in the GUI.
Flowchart 1300 is implemented by the network incident management computer software executed by the network incident management computer device 102, in accordance with some embodiments. Flowchart 1400 includes block 1402-1410. Flow begins a block 1402.
At block 1400, incident management data structures are stored, each of the incident management data structures including one or more defined automated incident identification characteristics. Examples of the incident management data structure include the incident management data structure(s) 154 in
At block 1404, a network incident data structure is received that describes a network incident on a network. Examples of the network include the computer network 105, in
At block 1406, a target incident management data structure is selected from the incident management data structures based on the defined automated incident identification characteristics of the target incident management data structure matching the network incident described by the network incident data structure. Flow then proceeds to block 1408.
At block 1408, a ticket incident data structure is generated in accordance with the one or more automated ticket generation rules of the target incident management data structure. Examples of the ticket incident data structure are the ticket incident data structure 152 in
At block 1410, the ticket incident data structure is transmitted in accordance with the one or more automated ticket generation rules of the target incident management data structure.
Flowchart 1500 is implemented by the network incident management computer software executed by the network incident management computer device 102, in accordance with some embodiments. In some embodiments, the incident management data structures includes different subsets of incident management data structures such that the subsets of incident management data structures are ordered in tiers, as shown in
At block 1502, the one or more automated incident identification characteristics of a highest tiered subset of the incident management data structures are iterated through until a compliance is found or a predetermined condition is satisfied. Flow then proceeds to block 1504.
At block 1504, the one or more automated incident identification characteristics of a next highest tiered subset of the incident management data structures are iterated through in response to a failure to find a compliance in the highest tiered subset of the incident management data structures. Flow then proceeds at block 1506.
At block 1506, the one or more automated incident identification characteristics of a subsequent subset of the incident management data structures in response to a failure to find compliance in a next highest subset of the incident management data structures. Flow then proceeds at block 1508.
At block 1508, block 1506 is repeated until compliance is found or all iterations have been made through all the subsets of the incident management data structures has failed.
In some embodiments, a method, includes: storing incident management data structures, each of the incident management data structures includes one or more defined incident identification characteristics and one or more automated ticket generation rules; receiving a network incident data structure that describes a network incident on a network; selecting a target incident management data structure from the incident management data structures based on the defined automated incident identification characteristics of the target incident management data structure matching the network incident described by the network incident data structure; generating a ticket incident data structure in accordance with the one or more automated ticket generation rules of the target incident management data structure. In some embodiments, the incident management data structures includes different subsets of incident management data structures such that the subsets of incident management data structures are ordered in tiers and wherein the selecting the target incident management data structure from the incident management data structures, includes: (a) iterating through the one or more automated incident identification characteristics of a highest tiered subset of the incident management data structures until a compliance is found or a predetermined condition is satisfied; (b) iterating through the one or more automated incident identification characteristics of a next highest tiered subset of the incident management data structures in response to a failure to find a compliance in the highest tiered subset of the incident management data structures. In some embodiments, the method further includes: (c) iterating through the one or more automated incident identification characteristics of a subsequent subset of the incident management data structures in response to a failure to find compliance in a next highest subset of the incident management data structures; repeating (c) until compliance is found or all iterations have been made through all the subsets of the incident management data structures has failed. In some embodiments, the subsets of incident management data structures includes: the highest tiered subset of incident management data structures includes a subset of geography based incident management data structures; the next highest tier subset of incident management data structures includes a subset of correlation type incident management data structures; the subsequent highest tier subset of incident management data structures includes a subset of a category type incident management data structures; and a lowest tier subset of incident management data structures includes a subset of cause code incident management data structures. In some embodiments, the generating the ticket incident data structure in accordance with the one or more automated ticket generation rules of the target incident management data structure is further based on the network incident data structure. In some embodiments, the method further includes: transmitting the ticket incident data structure generated in accordance with the one or more automated ticket generation rules of the target incident management data structure. In some embodiments, the one or more automated ticket generation rules of the target incident management data structure includes a delay rule for the transmitting the ticket incident data structure.
In some embodiments, a computer device, includes: a non-transitory computer readable medium configured to store computer executable instructions; at least one processor, wherein in response to executing the computer executable instructions, the processor is configured to: store incident management data structures, each of the incident management data structures includes one or more defined incident identification characteristics and one or more automated ticket generation rules; receive a network incident data structure that describes a network incident on a network; select a target incident management data structure from the incident management data structures based on the defined automated incident identification characteristics of the target incident management data structure matching the network incident described by the network incident data structure; generate a ticket incident data structure in accordance with the one or more automated ticket generation rules of the target incident management data structure. In some embodiments, the incident management data structures includes different subsets of incident management data structures such that the subsets of incident management data structures are ordered in tiers and wherein the at least one processor is configured to select the target incident management data structure from the incident management data structures by: (a) iterating through the one or more automated incident identification characteristics of a highest tiered subset of the incident management data structures until a compliance is found or a predetermined condition is satisfied; (b) iterating through the one or more automated incident identification characteristics of a next highest tiered subset of the incident management data structures in response to a failure to find a compliance in the highest tiered subset of the incident management data structures. In some embodiments, the at least one processor is further configured to select the target incident management data structure from the incident management data structures by: (c) iterating through the one or more automated incident identification characteristics of a subsequent subset of the incident management data structures in response to a failure to find compliance in a next highest subset of the incident management data structures; repeating (c) until compliance is found or all iterations have been made through all the subsets of the incident management data structures has failed. In some embodiments, the subsets of incident management data structures includes: the highest tiered subset of incident management data structures includes a subset of geography based incident management data structures; the next highest tier subset of incident management data structures includes a subset of correlation type incident management data structures; the subsequent highest tier subset of incident management data structures includes a subset of a category type incident management data structures; and a lowest tier subset of incident management data structures includes a subset of cause code incident management data structures. In some embodiments, the generating the ticket incident data structure in accordance with the one or more automated ticket generation rules of the target incident management data structure is further based on the network incident data structure. In some embodiments, the at least one processor is further configured to: transmit the ticket incident data structure generated in accordance with the one or more automated ticket generation rules of the target incident management data structure. In some embodiments, the one or more automated ticket generation rules of the target incident management data structure includes a delay rule for the transmitting the ticket incident data structure.
In some embodiments, a non-transitory computer readable medium configured to store computer executable instructions wherein in response to executing the computer executable instructions, a processor is configured to: store incident management data structures, each of the incident management data structures includes one or more defined incident identification characteristics and one or more automated ticket generation rules; receive a network incident data structure that describes a network incident on a network; select a target incident management data structure from the incident management data structures based on the defined automated incident identification characteristics of the target incident management data structure matching the network incident described by the network incident data structure; generate a ticket incident data structure in accordance with the one or more automated ticket generation rules of the target incident management data structure. In some embodiments, the incident management data structures includes different subsets of incident management data structures such that the subsets of incident management data structures are ordered in tiers and wherein the at least one processor is configured to select the target incident management data structure from the incident management data structures by: (a) iterating through the one or more automated incident identification characteristics of a highest tiered subset of the incident management data structures until a compliance is found or a predetermined condition is satisfied; (b) iterating through the one or more automated incident identification characteristics of a next highest tiered subset of the incident management data structures in response to a failure to find a compliance in the highest tiered subset of the incident management data structures. In some embodiments, the at least one processor is further configured to select the target incident management data structure from the incident management data structures by: (c) iterating through the one or more automated incident identification characteristics of a subsequent subset of the incident management data structures in response to a failure to find compliance in a next highest subset of the incident management data structures; repeating (c) until compliance is found or all iterations have been made through all the subsets of the incident management data structures has failed. In some embodiments, the subsets of incident management data structures include: the highest tiered subset of incident management data structures includes a subset of geography based incident management data structures; the next highest tier subset of incident management data structures includes a subset of correlation type incident management data structures; the subsequent highest tier subset of incident management data structures includes a subset of a category type incident management data structures; and a lowest tier subset of incident management data structures includes a subset of cause code incident management data structures. In some embodiments, the generating the ticket incident data structure in accordance with the one or more automated ticket generation rules of the target incident management data structure is further based on the network incident data structure. In some embodiments, the at least one processor is further configured to: transmit the ticket incident data structure generated in accordance with the one or more automated ticket generation rules of the target incident management data structure.
The foregoing outlines features of several embodiments so that those skilled in the art may better understand the aspects of the present disclosure. Those skilled in the art should appreciate that they may readily use the present disclosure as a basis for designing or modifying other processes and structures for carrying out the same purposes and/or achieving the same advantages of the embodiments introduced herein. Those skilled in the art should also realize that such equivalent constructions do not depart from the spirit and scope of the present disclosure, and that they may make various changes, substitutions, and alterations herein without departing from the spirit and scope of the present disclosure.
Aspects of the present disclosure are best understood from the following detailed description when read with the accompanying figures. It is noted that, in accordance with the standard practice in the industry, various features are not drawn to scale. In fact, the dimensions of the various features may be arbitrarily increased or reduced for clarity of discussion.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US2022/024564 | 4/13/2022 | WO |