how to deal with Number of In-Use CPUs on the Host Exceeds 90% of the Licensed Total Number alarm on FusionCompute V1R5C00 version

2

The system checks the number of in-use CPUs on a host every 5 minutes. This alarm is generated when the system detects that the number of in-use CPUs on the host is greater than or equal to 90% of the licensed capacity.

This alarm is cleared when the number of CPUs on the host is less than 90% of the licensed capacity
Check whether new hosts need to be added.

Check whether new hosts need to be added.

If yes, go to Step 2.
If no, no further action is required.

Check whether the license file is loaded to the system.

ChooseSystem Management > System Configuration > License Management, and check whether the license validity period is displayed.

If yes, go toStep 3.
If no, log in to the FusionAccess system and update the license information.

Update the available license file.

Check whether the CPU license file is available.

If yes, go to Step 5.
If no, go to Step 4.

Apply for a license.
For details, see the FusionCompute License Usage Guide.

Visit Product Support > IT > FusionCloud > FusionSphere > FusionCompute to Obtain.


Updating the License File.
After 5 or 6 minutes, choose System > System Configuration > License Management and check whether the license information is correct and whether the alarm is cleared.

Other related questions:
how to deal with Host CPU Usage Exceeds the Threshold alarm on FusionCompute V1R5C00 version
The system monitors the host CPU usage every 60 seconds. This alarm is generated when the system detects that the host CPU usage is greater than or equal to the specified alarm threshold for three consecutive times. This alarm is cleared when the host CPU usage is less than the minor alarm threshold Check the alarm thresholds for the host CPU usage. On the FusionCompute, choose System > Service Configuration, expand Alarm in the Configuration Item area on the left, and select Alarm Threshold. On the Alarm Threshold page, expand CPU usage in the Entity column and check whether the alarm thresholds for the host CPU usage are too low. If yes, go to Step 2. If no, go to Step 4. Adjust the alarm thresholds and check whether the alarm is cleared. For details about alarm threshold adjustment, see Configuring Alarm Thresholds. After 3 or 4 minutes, switch to the Alarm page and check whether the alarm is cleared. If yes, no further action is required. If no, go to Step 4. Migrate VMs from this host to other hosts. Migrate VMs from this host to other hosts. For details, see Migrating a VM. If no host is to be migrated, go toStep 7 After 3 or 4 minutes, switch to the Alarm page and check whether the alarm is cleared. If yes, go to Step 6. If no, go to Step 7. On the Alarm page, click the alarm object in the Alarm Object column, view CPU usage in the Monitoring Information pane in the lower right part of the Summary page, and check whether it is less than the minor alarm threshold.

how to deal with Host Memory Usage Exceeds the Threshold alarm on FusionCompute V1R5C00 version
The system monitors the host memory usage every 60 seconds. This alarm is generated when the system detects that the host memory usage is greater than or equal to the specified alarm threshold for three consecutive times. This alarm is cleared when the host memory usage is less than the minor alarm threshold Check the alarm thresholds for the host memory usage. On the FusionCompute, choose System > Service Configuration, expand Alarm in the Configuration Item area on the left, and select Alarm Threshold. On the Alarm Threshold page, expand Memory usage in the Entity column and check whether the alarm thresholds for the host memory usage are too low. If yes, go to Step 2. If no, go to Step 4. Adjust the alarm thresholds and check whether the alarm is cleared. For details about alarm threshold adjustment, see Configuring Alarm Thresholds. After 3 or 4 minutes, switch to the Alarm page and check whether the alarm is cleared. If yes, go to Step 6. If no, go to Step 4. Migrate VMs from this host to other hosts. Migrate VMs from this host to other hosts. For details, see Migrating a VM. If no host is to be migrated, go toStep 7 After 3 or 4 minutes, switch to the Alarm page and check whether the alarm is cleared. If yes, go to Step 6. If no, go to Step 7. On the Alarm page, click the alarm object in the Alarm Object column, view Memory usage in the Monitoring Information pane in the lower right part of the Summary page, and check whether it is less than the minor alarm threshold.

how to deal with Cluster CPU Usage Exceeds the Threshold alarm on FusionCompute V1R5C00 version
The system monitors the cluster CPU usage every 60 seconds. This alarm is generated when the system detects that the cluster CPU usage is greater than or equal to the specified alarm threshold for three consecutive times. This alarm is cleared when the cluster CPU usage is less than the minor alarm threshold. Check the alarm thresholds for the cluster CPU usage. On the FusionCompute, choose System > Service Configuration, expand Alarm in the Configuration Item area on the left, and select Alarm Threshold. On the Alarm Threshold page, expand CPU usage in the Entity column and check whether the alarm thresholds for the cluster CPU usage are too low. If yes, go to Step 2. If no, go to Step 4. Adjust the alarm thresholds and check whether the alarm is cleared. For details about alarm threshold adjustment, see Configuring Alarm Thresholds. After 3 or 4 minutes, switch to the Alarm page and check whether the alarm is cleared

How to deal with Invalid License File alarm on FusionCompute V1R5C00 version
The alarm module verifies the license validity during the hours from 00:00 to 02:00 every day. This alarm is generated when the license file verification fails or the system fails to obtain the equipment serial number (ESN). This alarm is cleared when a valid license file is loaded to the system. Check whether the system can obtain the ESN successfully. On the FusionCompute, choose System > System Configuration > License Management and click Load License File. On the Load License File page, click Obtain ESN and check whether the system can obtain the ESN successfully. If yes, go to Step 2. If no, contact technical support. Check whether the device on which the VRM is deployed is replaced. Have the administrator check whether the device on which the VRM is deployed is replaced. If yes, obtain the new ESN and apply for a license based on the new ESN. For details about how to apply for a license, see the FusionCompute License Usage Guide. Visit Product Support > IT > FusionCloud > FusionSphere > FusionCompute to Obtain. If no, go to Step 3. Update the available license file. Check whether the license file is available. If yes, go to Step 5. If no, go to Step 4. Apply for a license. For details, see the FusionCompute License Usage Guide. visit http://support.huawei.com/enterprise, and choose Product Support > IT > FusionCloud > FusionSphere > FusionCompute to Obtain. Updating the License File. After 5 or 6 minutes, choose System > System Configuration > License Management and check whether the license information is correct and whether the alarm is cleared.

how to deal with Inbound Flow Bandwidth Usage of a Host Exceeds the Threshold alarm on FusionCompute V1R5C00 version
The system monitors the inbound flow bandwidth usage of hosts every 60 seconds. This alarm is generated when the system detects that the inbound flow bandwidth usage of a host is greater than or equal to the specified alarm threshold for three consecutive times. This alarm is cleared when the inbound flow bandwidth usage of the host is less than the minor alarm threshold. Check the alarm thresholds for the inbound flow bandwidth usage of the host. On the FusionCompute, choose System > Service Configuration, expand Alarm in the Configuration Item area on the left, and select Alarm Threshold. On the Alarm Threshold page, expand Inbound flow bandwidth usage in the Entity column and check whether the alarm thresholds for the inbound flow bandwidth usage of the host are too low. If yes, go to Step 2. If no, go to Step 4. Adjust the alarm thresholds and check whether the alarm is cleared. For details about alarm threshold adjustment, see Configuring Alarm Thresholds. After 3 or 4 minutes, switch to the Alarm page and check whether the alarm is cleared. If yes, no further action is required. If no, go to Step 4. Check whether a network storm or security attack has occurred. Have the network administrator check whether a network storm has occurred. If you find one of the following symptoms, a network storm may have occurred: The network access speed is slow, with the packet loss rate exceeding 0.1% and the transmission delay longer than 20 ms. The server CPU usage is close to 100%. The inbound traffic of the network port on the host is close to 80% of the port rate. The indicators of the switch ports in the same broadcasting domain are blinking regularly and simultaneously. If yes, go to Step 7. If no, go to Step 5. Check whether a security attack has occurred. If an intrusion detection system is available, log in to it to check associated alarms and logs and analyze the attack causes. After the network becomes normal, click the alarm object in the Alarm Object column on the Alarm page, view Inbound traffic rate in the Monitoring Information pane in the lower right part of the Summary page, and check whether it is less than the minor alarm threshold.

If you have more questions, you can seek help from following ways:
To iKnow To Live Chat
Scroll to top