how to deal with Available Resources on Management Nodes Are Going to Be Insufficient alarm on FusionCompute V1R5C00 version

The system periodically detects the usage of available resources on management nodes. This alarm is generated when the ratio of used resources to available resources hits 95%.

This alarm is cleared when the ratio is less than 95%.
Confirm the IP address of the faulty node.

On the FusionCompute portal, click Monitoring, and choose Alarm in the navigation tree on the left. On the Alarm page, locate the row that contains the alarm and click the name in the Alarm Object column.
The Service and Management Node page is displayed.

On the Service and Management Node page, view information about the management nodes and obtain the management IP address of the node whose name is the same as that of Alarm Object in Step 1.
Rectify the fault.

Use PuTTY to log in to the faulty node.
Ensure that the management IP address and username gandalf are used to establish the connection.

Run the following command and enter the password of user root to switch to user root:

su - root

Run the following command to query the inode usage of each disk:
df -i

Information similar to the following is displayed:

vrm4050:~ # df -i
Filesystem Inodes IUsed IFree IUse% Mounted on
/dev/sda1 655360 51954 603406 8% /
devtmpfs 0 0 0 - /dev
tmpfs 2036905 1 2036904 1% /dev/shm
/dev/sda5 1245184 11 1245173 1% /drbd0
/dev/sda6 65280 11 65269 1% /drbd1
/dev/sda7 70416 11 70405 1% /drbd2
/dev/sda8 70416 11 70405 1% /drbd3
/dev/sda9 262144 11 262133 1% /swap
/dev/sda10 58671104 3104 58668000 1% /var

Filesystem: specifies the name of a disk partition.
Inodes: specifies the total number of inodes in a disk.
IUsed: specifies the number of inodes used.
IFree: specifies the number of free inodes.
IUse%: specifies the usage of inodes.
Mounted on: specifies the directory to which the disk is attached.

Enter the directory that contains the alarm object, and delete the files that are unnecessary or that you have copied.

File deletion is a high-risk operation. Therefore, ensure that the files to be deleted are not system files or important files involving service running.

After 10 or 15 minutes, check whether the alarm is cleared.

Scroll to top