how to deal with Logical Disk Usage of Management Nodes Exceeds the Threshold alarm on FusionCompute V1R5C00 version

1

The system periodically detects the logical disk usage of nodes. This alarm is generated when the logical disk usage hits 95%.

This alarm is cleared when the logical disk usage is less than 95%.
Confirm the IP address of the faulty node.

On the FusionCompute portal, click Monitoring, and choose Alarm in the navigation tree on the left. On the Alarm page, locate the row that contains the alarm and click the name in the Alarm Object column.
The Service and Management Node page is displayed.

On the Service and Management Node page, view information about the management nodes and obtain the IP address of the node whose name is the same as that of Alarm Object in Step 1.
Confirm and clear files in the directory that contains the logical disk for which the alarm is generated.

Use PuTTY to log in to the faulty node.
Ensure that the management IP address and username gandalf are used to establish the connection.

Run the following command and enter the password of user root to switch to user root:

su - root


Query the directory that contains the disk for which the alarm is generated, and run the following command to view the usage of each disk directory:

df -l

Information similar to the following is displayed:

VRM8810:~ # df -l
Filesystem 1K-blocks Used Available Use% Mounted on
/dev/sda1 10317828 1572360 8221352 17% /
devtmpfs 8147620 212 8147408 1% /dev
tmpfs 8147620 0 8147620 0% /dev/shm
/dev/sda6 1027768 17912 957648 2% /etc/galax
/dev/sda10 880874308 204948 835923520 1% /extend
/dev/sda8 1106800 34188 1016388 4% /opt/galax/upgrade
/dev/mapper/vg_vrm-lv_gaussdb
18578172 870716 16763740 5% /opt/gaussdb
/dev/sda5 18572112 392648 17236052 3% /var
/dev/mapper/vg_vrm-lv_backup
30834692 176196 29092188 1% /var/backup


NOTE:
Filesystem: specifies the name of a disk partition.
1K-blocks: specifies the disk capacity.
Used: specifies the used disk capacity.
Available: specifies the available disk capacity.
Use%: specifies the disk directory usage.
Mounted on: specifies the directory to which the disk is attached.

Enter the directory where the alarm object locates, and delete the files that are unnecessary or that you have copied.

NOTICE:
File deletion is a high-risk operation. Therefore, make sure that the files to be deleted are not those that are stored in the system directory or in the directory that contains important in-use services.


After 10 or 15 minutes, check whether the alarm is cleared.

Other related questions:
how to deal with Host CPU Usage Exceeds the Threshold alarm on FusionCompute V1R5C00 version
The system monitors the host CPU usage every 60 seconds. This alarm is generated when the system detects that the host CPU usage is greater than or equal to the specified alarm threshold for three consecutive times. This alarm is cleared when the host CPU usage is less than the minor alarm threshold Check the alarm thresholds for the host CPU usage. On the FusionCompute, choose System > Service Configuration, expand Alarm in the Configuration Item area on the left, and select Alarm Threshold. On the Alarm Threshold page, expand CPU usage in the Entity column and check whether the alarm thresholds for the host CPU usage are too low. If yes, go to Step 2. If no, go to Step 4. Adjust the alarm thresholds and check whether the alarm is cleared. For details about alarm threshold adjustment, see Configuring Alarm Thresholds. After 3 or 4 minutes, switch to the Alarm page and check whether the alarm is cleared. If yes, no further action is required. If no, go to Step 4. Migrate VMs from this host to other hosts. Migrate VMs from this host to other hosts. For details, see Migrating a VM. If no host is to be migrated, go toStep 7 After 3 or 4 minutes, switch to the Alarm page and check whether the alarm is cleared. If yes, go to Step 6. If no, go to Step 7. On the Alarm page, click the alarm object in the Alarm Object column, view CPU usage in the Monitoring Information pane in the lower right part of the Summary page, and check whether it is less than the minor alarm threshold.

how to deal with Host Memory Usage Exceeds the Threshold alarm on FusionCompute V1R5C00 version
The system monitors the host memory usage every 60 seconds. This alarm is generated when the system detects that the host memory usage is greater than or equal to the specified alarm threshold for three consecutive times. This alarm is cleared when the host memory usage is less than the minor alarm threshold Check the alarm thresholds for the host memory usage. On the FusionCompute, choose System > Service Configuration, expand Alarm in the Configuration Item area on the left, and select Alarm Threshold. On the Alarm Threshold page, expand Memory usage in the Entity column and check whether the alarm thresholds for the host memory usage are too low. If yes, go to Step 2. If no, go to Step 4. Adjust the alarm thresholds and check whether the alarm is cleared. For details about alarm threshold adjustment, see Configuring Alarm Thresholds. After 3 or 4 minutes, switch to the Alarm page and check whether the alarm is cleared. If yes, go to Step 6. If no, go to Step 4. Migrate VMs from this host to other hosts. Migrate VMs from this host to other hosts. For details, see Migrating a VM. If no host is to be migrated, go toStep 7 After 3 or 4 minutes, switch to the Alarm page and check whether the alarm is cleared. If yes, go to Step 6. If no, go to Step 7. On the Alarm page, click the alarm object in the Alarm Object column, view Memory usage in the Monitoring Information pane in the lower right part of the Summary page, and check whether it is less than the minor alarm threshold.

how to deal with Cluster Memory Usage Exceeds the Threshold alarm on FusionCompute V1R5C00 version
The system monitors the cluster memory usage every 60 seconds. This alarm is generated when the system detects that the cluster memory usage is greater than or equal to the specified alarm threshold for three consecutive times. This alarm is cleared when the cluster memory usage is less than the minor alarm threshold. Check the alarm thresholds for the cluster memory usage. On the FusionCompute, choose System > Service Configuration, expand Alarm in the Configuration Item area on the left, and select Alarm Threshold. On the Alarm Threshold page, expand Memory usage in the Entity column and check whether the alarm thresholds for the cluster memory usage are too low. If yes, go to Step 2. If no, go to Step 4. Adjust the alarm thresholds and check whether the alarm is cleared. For details about alarm threshold adjustment, see Configuring Alarm Thresholds. After 3 or 4 minutes, switch to the Alarm page and check whether the alarm is cleared. If yes, no further action is required. If no, go to Step 4. Have the administrator expand the memory capacity. Have the administrator expand the memory capacity.

how to deal with Cluster CPU Usage Exceeds the Threshold alarm on FusionCompute V1R5C00 version
The system monitors the cluster CPU usage every 60 seconds. This alarm is generated when the system detects that the cluster CPU usage is greater than or equal to the specified alarm threshold for three consecutive times. This alarm is cleared when the cluster CPU usage is less than the minor alarm threshold. Check the alarm thresholds for the cluster CPU usage. On the FusionCompute, choose System > Service Configuration, expand Alarm in the Configuration Item area on the left, and select Alarm Threshold. On the Alarm Threshold page, expand CPU usage in the Entity column and check whether the alarm thresholds for the cluster CPU usage are too low. If yes, go to Step 2. If no, go to Step 4. Adjust the alarm thresholds and check whether the alarm is cleared. For details about alarm threshold adjustment, see Configuring Alarm Thresholds. After 3 or 4 minutes, switch to the Alarm page and check whether the alarm is cleared

how to deal with Outbound Flow Bandwidth Usage of a Cluster Exceeds the Threshold alarm on FusionCompute V1R5C00 version
The system monitors the outbound flow bandwidth usage of clusters every 60 seconds. This alarm is generated when the system detects that the outbound flow bandwidth usage of a cluster is greater than or equal to the specified alarm threshold for three consecutive times. This alarm is cleared when the outbound flow bandwidth usage of the cluster is less than the minor alarm threshold. Check the alarm thresholds for the outbound flow bandwidth usage of the cluster. On the FusionCompute, choose System > Service Configuration, expand Alarm in the Configuration Item area on the left, and select Alarm Threshold. On the Alarm Threshold page, expand Outbound flow bandwidth in the Entity column and check whether the alarm thresholds for the outbound flow bandwidth usage of the cluster are too low. If yes, go to Step 2. If no, go to Step 4. Adjust the alarm thresholds and check whether the alarm is cleared. For details about alarm threshold adjustment, see Configuring Alarm Thresholds. After 3 or 4 minutes, switch to the Alarm page and check whether the alarm is cleared. If yes, no further action is required. If no, go to Step 4. Check whether a network storm or security attack has occurred. Have the network administrator check whether a network storm has occurred. If you find one of the following symptoms, a network storm may have occurred: The network access speed is slow, with the packet loss rate exceeding 0.1% and the transmission delay longer than 20 ms. The cluster CPU usage is close to 100%. The inbound traffic of the network port on the server is close to 80% of the port rate. The indicators of the switch ports in the same broadcasting domain are blinking regularly and simultaneously. Check whether a network storm has occurred. If yes, go to Step 7. If no, go to Step 5. Check whether a security attack has occurred. If an intrusion detection system is available, log in to it to check associated alarms and logs and analyze the attack causes. On the Alarm page, click the alarm object in the Alarm Object column, view Outbound traffic rate in the Monitoring Information pane in the lower right part of the Summary page, and check whether it is less than the minor alarm threshold.

If you have more questions, you can seek help from following ways:
To iKnow To Live Chat
Scroll to top