how to deal with Logical Disk Usage of Management Nodes Exceeds the Threshold alarm on FusionCompute V1R5C00 version

The system periodically detects the logical disk usage of nodes. This alarm is generated when the logical disk usage hits 95%.

This alarm is cleared when the logical disk usage is less than 95%.
Confirm the IP address of the faulty node.

On the FusionCompute portal, click Monitoring, and choose Alarm in the navigation tree on the left. On the Alarm page, locate the row that contains the alarm and click the name in the Alarm Object column.
The Service and Management Node page is displayed.

On the Service and Management Node page, view information about the management nodes and obtain the IP address of the node whose name is the same as that of Alarm Object in Step 1.
Confirm and clear files in the directory that contains the logical disk for which the alarm is generated.

Use PuTTY to log in to the faulty node.
Ensure that the management IP address and username gandalf are used to establish the connection.

Run the following command and enter the password of user root to switch to user root:

su - root

Query the directory that contains the disk for which the alarm is generated, and run the following command to view the usage of each disk directory:

df -l

Information similar to the following is displayed:

VRM8810:~ # df -l
Filesystem 1K-blocks Used Available Use% Mounted on
/dev/sda1 10317828 1572360 8221352 17% /
devtmpfs 8147620 212 8147408 1% /dev
tmpfs 8147620 0 8147620 0% /dev/shm
/dev/sda6 1027768 17912 957648 2% /etc/galax
/dev/sda10 880874308 204948 835923520 1% /extend
/dev/sda8 1106800 34188 1016388 4% /opt/galax/upgrade
18578172 870716 16763740 5% /opt/gaussdb
/dev/sda5 18572112 392648 17236052 3% /var
30834692 176196 29092188 1% /var/backup

Filesystem: specifies the name of a disk partition.
1K-blocks: specifies the disk capacity.
Used: specifies the used disk capacity.
Available: specifies the available disk capacity.
Use%: specifies the disk directory usage.
Mounted on: specifies the directory to which the disk is attached.

Enter the directory where the alarm object locates, and delete the files that are unnecessary or that you have copied.

File deletion is a high-risk operation. Therefore, make sure that the files to be deleted are not those that are stored in the system directory or in the directory that contains important in-use services.

After 10 or 15 minutes, check whether the alarm is cleared.

Scroll to top