how to deal with Inbound Flow Bandwidth Usage of a Cluster Exceeds the Threshold alarm on FusionCompute V1R5C00 version

The system monitors the inbound flow bandwidth usage of a cluster every 60 seconds. This alarm is generated when the system detects that the inbound flow bandwidth usage of the cluster is greater than or equal to the specified alarm threshold for three consecutive times.

This alarm is cleared when the inbound flow bandwidth usage of the cluster is less than the minor alarm threshold.
Check the alarm thresholds for the inbound flow bandwidth usage of the cluster.

On the FusionCompute, choose System > Service Configuration, expand Alarm in the Configuration Item area on the left, and select Alarm Threshold.
On the Alarm Threshold page, expand Inbound flow bandwidth in the Entity column and check whether the alarm thresholds for the inbound flow bandwidth usage of the cluster are too low.


If yes, go to Step 2.
If no, go to Step 4.

Adjust the alarm thresholds and check whether the alarm is cleared. For details about alarm threshold adjustment, see Configuring Alarm Thresholds.
After 3 or 4 minutes, switch to the Alarm page and check whether the alarm is cleared.

If yes, no further action is required.
If no, go to Step 4.

Check whether a network storm or security attack has occurred.

Have the network administrator check whether a network storm has occurred.
If you find one of the following symptoms, a network storm may have occurred:

The network access speed is slow, with the packet loss rate exceeding 0.1% and the transmission delay longer than 20 ms.
The cluster CPU usage is close to 100%.
The inbound traffic of the network port on the server is close to 80% of the port rate.
The indicators of the switch ports in the same broadcasting domain are blinking regularly and simultaneously.

Check whether a network storm has occurred.

If yes, go to Step 7.
If no, go to Step 5.

Check whether a security attack has occurred.

If an intrusion detection system is available, log in to it to check associated alarms and logs and analyze the attack causes.

On the Alarm page, click the alarm object in the Alarm Object column, view Inbound traffic rate in the Monitoring Information pane in the lower right part of the Summary page, and check whether it is less than the minor alarm threshold.

Scroll to top