V100R003C00
Issue 01
Date 2013-04-10
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: http://enterprise.huawei.com
Purpose
This document describes how to install the FusionStack software and configure, operate, and
maintain the FusionStack system.
Intended Audience
This document is intended for:
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Change History
Changes between document issues are cumulative. The latest document issue contains all the
changes made in earlier issues.
Issue 01 (2013-04-10)
This issue is the first official release.
Contents
2 Software Commissioning.............................................................................................................8
2.1 Overview............................................................................................................................................................9
2.1.1 Solution Overview.....................................................................................................................................9
2.1.2 Installation Process..................................................................................................................................10
2.2 Preparations......................................................................................................................................................11
2.2.1 System Requirements..............................................................................................................................11
2.2.2 Software Packages...................................................................................................................................13
2.2.3 Documents and Tools..............................................................................................................................15
2.2.4 Data..........................................................................................................................................................15
2.3 Software Installation in Virtualization Deployment.........................................................................................17
2.3.1 Installation Overview..............................................................................................................................17
2.3.2 Creating VMs..........................................................................................................................................18
2.3.3 Installing ESC Nodes...............................................................................................................................21
2.3.4 Installing IMGS Nodes............................................................................................................................25
2.3.5 Installing the ESC and IMGS Based VM Templates..............................................................................29
2.4 Software Installation in Physical Deployment.................................................................................................32
2.4.1 Installing ESC Nodes...............................................................................................................................32
2.4.2 Installing IMGS Nodes............................................................................................................................37
2.5 Initial Configuration.........................................................................................................................................42
2.5.1 Configuration Overview..........................................................................................................................42
2.5.2 Configuring the License Server...............................................................................................................44
2.5.3 Configure the active and standby ESCs..................................................................................................46
2.5.4 Configuring a Virtual Firewall................................................................................................................47
2.5.5 Configuring Resource Access Points......................................................................................................56
3 Feature Configuration.................................................................................................................84
3.1 VPC Feature Configuration..............................................................................................................................85
3.1.1 Configuration Overview..........................................................................................................................85
3.1.2 Adding a VPC Subnet Pool.....................................................................................................................85
3.1.3 Configuring a Bandwidth Template........................................................................................................86
3.1.4 Configuring VPC Network Specifications..............................................................................................88
3.1.5 Adding Default DHCP Options...............................................................................................................89
3.2 Security Group Feature Configuration.............................................................................................................91
3.2.1 Configuration Overview..........................................................................................................................91
3.2.2 Configuring a Bandwidth Template........................................................................................................92
3.2.3 Configuring Security Group Network.....................................................................................................93
3.2.4 Adding Default DHCP Options...............................................................................................................94
3.2.5 Adding a Security Group Subnet.............................................................................................................96
3.2.6 Enabling the Public IP Address...............................................................................................................98
3.3 LB Feature Configuration.................................................................................................................................99
3.3.1 Configuration Overview..........................................................................................................................99
3.3.2 Registering an LB VM Image...............................................................................................................100
3.3.3 Configuring the LB Manager................................................................................................................101
3.3.4 Adding LB Instance Specifications.......................................................................................................103
3.3.5 Adding LB VM Specifications..............................................................................................................104
3.3.6 Adding a Management Subnet..............................................................................................................106
3.3.7 Adding a Service Subnet.......................................................................................................................107
3.3.8 Configuring the LB Instance Limit.......................................................................................................109
5 Fault Management.....................................................................................................................176
5.1 Alarm Handling..............................................................................................................................................177
5.1.1 ALM-15.1000077 License Is About to Expire......................................................................................177
5.1.2 ALM-15.1000078 License Has Expired................................................................................................178
5.1.3 ALM-15.1001000 VRM Node Unreachable.........................................................................................180
5.1.4 ALM-15.1001004 LDAP Database Unreachable..................................................................................183
5.1.5 ALM-15.1001005 License File Not Loaded.........................................................................................185
5.1.6 ALM-15.1001007 Failure in Recovering VM Data from the Database During ESC Start...................187
5.1.7 ALM-15.1001010 FTP Server Unreachable.........................................................................................189
5.1.8 ALM-15.1001013 Image Storage Server Unreachable.........................................................................192
5.1.9 ALM-15.1001014 Image Storage Space Insufficient............................................................................195
5.1.10 ALM-15.1001015 Data Store Space Insufficient................................................................................197
5.1.11 ALM-15.1001020 SLB Node Unreachable.........................................................................................199
5.1.12 ALM-15.1002000 Heartbeat Communication Between Active and Standby Nodes Interrupted.......201
5.1.13 ALM-15.1002006 Heartbeat Communication Between the Node and the NTP Server Interrupted
........................................................................................................................................................................206
5.1.14 ALM-15.1004000 Invalid License File...............................................................................................209
5.1.15 ALM-15.1007004 NOTIFY Process Abnormal..................................................................................211
5.1.16 ALM-15.1007005 System Time Offset Exceeds One Minute............................................................213
5.1.17 ALM-15.1007006 Abnormal Clock Synchronization Process............................................................216
5.1.18 ALM-15.1007007 Abnormal System Timing Service Process...........................................................218
5.1.19 ALM-15.1007011 Configuration Channel Client Process Is Abnormal.............................................220
5.1.20 ALM-15.1007012 NFS Service Process on the Image Storage Server Abnormal..............................222
5.1.21 ALM-15.1007013 Image Management (IMGM) Process Abnormal..................................................224
5.1.22 ALM-15.1007014 Elastic Computing Service Process on the ESC Node Abnormal.........................225
5.1.23 ALM-15.1007015 UPF Service Process Abnormal............................................................................227
5.1.24 ALM-15.1007016 ELB Service Process Abnormal............................................................................229
5.1.25 ALM-15.1007099 Failure in Backing up or Uploading Key Data......................................................231
5.1.26 ALM-15.1008000 Communication with License Server Is Abnormal...............................................233
5.1.27 ALM-15.1008001 Free Upgrade Service Is About to Expire..............................................................235
5.1.28 ALM-15.1008002 Free Upgrade Service Has Expired.......................................................................236
5.1.29 ALM-15.3002005 Number of In-Use CPUs on the CNA Exceeds 90% of the Licensed Total Number
........................................................................................................................................................................238
5.2 Troubleshooting..............................................................................................................................................240
5.2.1 ESC VM Fault.......................................................................................................................................240
5.2.2 IMGS VM Fault.....................................................................................................................................244
5.2.3 LB VM Faulty.......................................................................................................................................244
5.2.4 Active and Standby ESC Faults.............................................................................................................247
5.3 Backup and Restoration..................................................................................................................................248
5.3.1 Backup and Restoration Policy..............................................................................................................248
5.3.2 Backing up Data....................................................................................................................................250
5.3.3 Restoring Data.......................................................................................................................................253
A Glossary......................................................................................................................................257
A.1 A-E.................................................................................................................................................................258
A.2 F-J..................................................................................................................................................................259
A.3 K-O................................................................................................................................................................260
A.4 P-T.................................................................................................................................................................261
A.5 U-Z.................................................................................................................................................................263
1 Description
Overview
The FusionStack is based on the basic virtualization capabilities provided by the Huawei
virtualization software (FusionCompute), and provides customers with elastic computing
services, such as VMs, disks, security groups, elastic IP addresses.
Basic services
Resource management
Technical Features
Cloud Security
The FusionStack adopts various security measures and policies and complies with local
information security laws and regulations to provide end-to-end protection for user access,
management and maintenance, data, networks, and virtualization.
Scalability
Based on the Huawei virtualization service clusters, the maximum number of sites the
FusionStack supports can be expanded to 16. With application programming interfaces (APIs),
VMs can be migrated between hosts on one site.
Fine-Grained Charging
The FusionStack provides different types of charging services based on service types:
l Charging by service resources
l Charging by hours
Software Components
The FusionStack consists of Elastic Service Controller (ESC), Image Storage (IMGS), User
Profile Function (UPF), Provisioning Orchestration Engine (POE), and other logical units.
Figure 1-2 shows the logical architecture of the FusionStack.
FusionStack
IMGM: Image Management ESC: Elastic Service ESC-OM: ESC Operation and
Controller Maintenance Management
Logical Nodes
The management nodes of the FusionStack are Elastic Service Controller (ESC) and Image
Storage (IMGS). Figure 1-3 shows their logical relationships.
...
Virtual infrastructure
Site 1 Site 2 Site n
...
Active Standby Active Standby Active Standby
VRM VRM VRM VRM VRM VRM
Virtual resources Virtual resources Virtual resources
Deployment Principles
Table 1-1 lists the node deployment principles for cloud basic services.
Elastic Service Controller (ESC) One or two ESCs (active and standby) can be deployed in
the system.
In virtualization deployment, the ESC is deployed on a
VM in the management cluster.
In physical deployment, the ESC is deployed on a physical
server.
Table 1-2 lists the VM specifications requirements when the ESC and IMGS are deployed on
VMs.
VPC
A virtual private cloud (VPC) is a private cloud constructed for a customer within a public cloud,
and can connect to the customer networks. A private cloud is entirely isolated from all VMs that
are not hosted by this private cloud. An enterprise can apply for virtual private clouds on the
public cloud platform and use independent IP addresses on its private cloud networks.
The enterprise can connect the private cloud to their own network using the Virtual Private
Network (VPN) gateway, and use VMs on the private cloud like using IT devices on its own
networks.
Security Group
Public cloud tenants can apply for security groups based on their VM security requirements, and
set access policies for the obtained security groups to enhance VM security. VMs that are added
to a security group implement security isolation and access control under the protection of the
access policies.
ELB
The Elastic Load Balancing (ELB) function provides load balancing services for tenants, so that
end users can apply for virtual load balancers and associate them with their hosts. Based on the
customized load balancing policies, the obtained load balancer evenly sends service requests to
associated hosts to enhance service stability and reliability.
Image Management
Using an Image Storage (IMGS) node, the FusionStack manages images offering different types
of operating systems (OSs), and supports image registration, deregistration, query, and deletion.
On the FusionCompute, users can create customized VMs and deploy applications, and
download and save images exported by the VMs to the IMGS node.
Registered images can be updated in the system. To modify an image in use, users can freeze
the image, modify the image, and then unfreeze the image to resume image services.
To expand the image server capacity, users can configure storage path that saves images using
ports provided by the image server.
Elastic IP address
The FusionStack assigns a public IP address for each user VM. The assigned public IP address
can be used as an elastic IP address to be bound with a user account, so that users can connect
to the VM using this IP address through Internet. Bound IP addresses can be unbound to release
the public IP address.
If a running VM is faulty, the elastic IP address of the fault VM can be rapidly mapped to another
VM, so that the user can use a VM without service interruption.
Charging
The FusionStack generates charging data records (CDRs) according to the usage of VMs, disks,
elastic IP addresses, virtual local area networks (VLANs), VPCs, security groups, VM snapshots,
LB instances, and other service resource, and send the CDRs to the billing center. The billing
center generates bills based on the CDRs.
1.5 Reliability
Management Node HA
Management nodes work in active/standby mode to ensure high availability (HA). If the active
node is faulty, the standby node takes over services from the active node, ensuring uninterrupted
service processing of management nodes.
The active and standby nodes check the status of each other using the heartbeat messages sent
over the management plane. The active node is automatically determined based on the heartbeat
messages.
l Only the active node provides services. The standby node only provides basic functions
and periodically synchronizes data with the active node.
l If the active node is faulty, the standby node takes over services from the active node and
changes to the active state. The original active node changes to the idle state.
The active node faults include the network interruption, abnormal state, or faulty service
process of the active node.
Snapshot
The snapshot feature enables the FusionStack to recover a damaged virtual machine (VM) by
using its snapshots.
A snapshot is a set of system files and directories of a VM kept in storage as they were some
time in the past.
l When a VM is faulty, a user can quickly create a VM based on the backed-up VM snapshot.
l A user can also restore a VM to the time the snapshot is created.
2 Software Commissioning
2.1 Overview
2.2 Preparations
2.3 Software Installation in Virtualization Deployment
2.4 Software Installation in Physical Deployment
2.5 Initial Configuration
2.6 FAQ
2.1 Overview
Logical Nodes
Figure 2-1 shows the logical nodes of cloud basic services.
...
Virtual infrastructure
Site 1 Site 2 Site n
...
Active Standby Active Standby Active Standby
VRM VRM VRM VRM VRM VRM
Virtual resources Virtual resources Virtual resources
Deployment Principles
Table 2-1 lists the node deployment principles for cloud basic services.
Elastic Service Controller (ESC) One or two ESCs (active and standby) can be deployed in
the system.
In virtualization deployment, the ESC is deployed on a
VM in the management cluster.
In physical deployment, the ESC is deployed on a physical
server.
Table 2-2 lists the VM specifications requirements when the ESC and IMGS are deployed on
VMs.
Installation Process
Figure 2-2 shows the software installation process of cloud basic services.
Start
End
2.2 Preparations
Memory ≥ 2 GB
Hard disk l The partition in which the operating system (OS) is installed has
more than 1 GB free space.
l Except the partition for the OS, at least one partition has more than
2 GB free space.
Network The local PC and the available host are connected to the same switch,
and their IP addresses belong to the same management network segment.
Memory ≥ 16 GB
The recommended memory size is greater than 48 GB.
Hard disk ≥ 50 GB
Redundant Array You are advised to use RAID 1 that consists of hard disks 1 and 2 to
of Independent install host OS and software to enhance reliability.
Disks (RAID) If the host uses local storage resources, ensure that the host still has
unpartitioned disks after the OS and software is installed, because the
host OS and software require a whole physical hard disk.
Boot device Set the first boot device to Hard disk, the second boot device to
Network, and the third boot device to CD-ROM.
Item Requirements
Basic device l Two firewall devices (active and standby) must be mounted to the
networking service and management switches in offline mode.
requirements l The network has two service switches stacked and two management
switches stacked.
l The FusionStack does not support a single firewall or two switches
deployed in active/standby mode.
NOTE
l To ensure that the obtained software packages are valid for use, you need to verify the software package
integrity and validity. For details, see Verifying Software Packages.
l After downloading the template file package, decompress the package, which must contain a .xml file
and a .vhd file.
Network Design Provides the software Obtain the document from the
deployment plan. engineering supervisor.
Obtaining Tools
2.2.4 Data
Table 2-11 lists the data required for installing the cloud basic services.
Table 2-11 Data required for installing the cloud basic services.
Category Paramete Description Example Value
r
ESC ESC node Specifies the name of the Elastic Service ESC01
informatio name Controller (ESC) node.
n Value: a string of 1 to 32 characters
The node name can contain only digits,
letters, and underscores (_) and must start
with a letter.
The node name must be unique and
different from the cluster name.
Installation Process
The Elastic Service Controller (ESC) node and Image Storage (IMGS) node can be installed
using a template or an ISO file. Figure 2-3 shows the process for installing the two nodes.
Figure 2-3 Process for installing the ESC and IMGS nodes
Start
Determine Yes
Whether to use templates
to install.
No
Creating VMs
End
Prerequisites
Conditions
– You have installed and configured the FusionCompute.
– You have configured the IP address of the local PC to communicate with the management
plane of FusionCompute.
– You have installed the JRE 1.6 or a later version on the local PC.
– You have logged in to the FusionCompute.
Data
Table 2-12 lists the data required for performing this operation.
Data storage Data storage Specifies the data storage for the disk. datastore01
information
Procedure
NOTE
You must create VMs for deploying the active and standby ESCs on different hosts.
3 On the Getting Started page, click Create VM.
The Create VM page is displayed.
4 Select the required host and Bind to the select host, and click Next.
The Properties page is displayed.
5 Set the VM name, and select the Operating System (OS) type and version.
– VM name: Enter the name of the management VM, for example, ESC01.
– OS type: Select Linux.
– OS version: Select Novell SUSE Linux Enterprise Server 11 SP1 64bit.
6 Configure the hardware specifications of the VM.
– CPU: Select the required number of CPUs based on the data plan, for example, 4.
– Memory (MB): Enter the memory size based on the data plan, for example, 8192.
– Number of disks: Set the number of disks to 1.
– Number of NICs: Set the number of NICs to 1.
7 Click QoS Settings, and set CPU Resource Control and Memory Resource Control.
For example, select ManagementDVS for DVS and Portgroup01 for port group.
12 Click OK.
13 Set the following parameters:
– Data storage: Select the created data storage, for example, datastore01.
– Configuration mode: Select Ordinary.
----End
Scenarios
Install Elastic Service Controller (ESC) nodes on VMs. When the ESCs are deployed in the
active and standby mode, the VMs on which the active and standby ESCs are deployed must
run on different hosts.
Prerequisites
Conditions
– You have logged in to the FusionCompute.
– You have created the VMs for installing ESCs.
Data
Table 2-13 lists the data required for performing this operation.
Subnet mask of the Specifies the subnet mask of the ESC 255.255.255.0
management plane management plane.
This parameter is mandatory.
Software
FusionCompute V100R003C00_ESC.iso
Procedure
Mount a CD-ROM drive to the VM.
1 Share the folder containing the FusionCompute V100R003C00_ESC.iso file with the
administrator of the local PC.
2 On the FusionCompute, choose VDC Management > VM and Template.
3 In the navigation tree on the left, expand Site, and click the name of the VM on which the
ESC is to be deployed.
4 In the Operation area on the right, click Mount CD-ROM.
5 In the displayed dialog box, enter the ISO file path: \\IP address of the local PC\name of
the shared folder\name of the image file,
for example, \\182.168.5.5\soft\FusionCompute V100R003C00_ESC.iso. The IP address
of the local PC communicates with that of the management plane.
6 Select Use the username and password of the local computer.
7 Enter the username and the password shared in Step 1.
8 Select Restart the VM now to install the OS and click OK.
Install the ESC.
9 Click Log In Using VNC.
The system installation window is displayed, as shown in Figure 2-4.
NOTE
l If you select Boot from local disk, the system skips the installation and starts from the local disk.
l If you select Install, the system performs the installation.
l If you do not perform any operation during 30 seconds, the system starts from the local disk by
default. Then you must restart the VM before performing the subsequent operations.
10 Select Install and press Enter.
It takes about 3 minutes for the automatic loading of the system. After the loading is
complete, the Main Installation Window is displayed, as shown in Figure 2-5.
TIP
You can refer to the following tips when performing operations on the Main Installation
Window:
l Press Tab or up and down arrow keys to move the cursor.
l Press Enter to enter or perform the items that the cursor pointing at.
l Press the space bar to select the items that the cursor pointing at.
11 Select Network and press Enter.
The Network Configuration window is displayed.
12 Select the network interface card (NIC) eth0 and press Enter.
The IP Configuration for eth0 window is displayed.
13 Use the arrow keys to locate Manual address configuration and press the space bar to
select it.
14 Press Tab to set the following parameters:
– IP address: Enter the planned ESC management IP address.
– Netmask: Enter the subnet mask of the management plane.
15 Press F12.
The Network Configuration window is displayed.
16 Select Default Gateway and set the gateway of the ESC management plane.
17 Press F12.
The Main Installation Window is displayed.
18 Select Hostname and press Enter.
The Hostname Configuration window is displayed.
19 Enter the planned ESC node name, for example, ESCO1, and press F12.
The Main Installation Window is displayed.
20 Select Timezone and press Enter.
The Time Zone Selection window is displayed.
21 Select the local time zone and set the time.
22 Press F12.
The Main Installation Window is displayed.
23 Select Password and press Enter.
The Root Password Configuration window is displayed.
24 Enter the password for user root and confirm the password, and press F12.
NOTE
The Package Installation window is displayed, and the system starts to install the operating
system (OS) of the ESC.
The installation takes about 15 minutes. After the installation, the VM restarts
automatically. When the login information is displayed, the installation of the ESC is
complete.
28 Determine whether to deploy the ESC in the active and standby mode.
– If yes, go to Step 29.
– If no, go to Step 30.
Install the standby ESC.
29 Install the standby ESC. For details, see Step 2 to Step 27.
Unmount a CD-ROM drive from the VM.
30 On the GalaxEngine, choose VDC Management > VM and Template.
31 In the navigation tree, expand Site and click the VM on which the ESC is deployed.
32 In the Operation area on the right, select Unmount CD-ROM.
A confirmation dialog box is displayed.
33 Click OK.
A dialog box is displayed, indicating that the system begins to unmount the CD-ROM drive.
You can view the task progress in the Task Tracing page.
34 Click OK.
NOTE
If the ESCs are deployed in the active and standby mode, you need to unmount the CD-ROM drives
from both the active standby nodes.
----End
Scenarios
Install Image Storage (IMGS) nodes on VMs.
Prerequisites
Conditions
– You have logged in to the FusionCompute.
– You have created the VMs for installing IMGSs.
Data
Table 2-14 lists the data required for performing this operation.
IMGS node name Specifies the name of the IMGS node. IMGS01
Value: a string of 1 to 32 characters
The node name can contain only digits,
letters, and underscores (_) and must start
with a letter.
The node name must be unique and different
from the cluster name.
This parameter is mandatory.
Subnet mask of the Specifies the subnet mask of the IMGS 255.255.255.0
management plane management plane.
This parameter is mandatory.
Software
FusionCompute V100R003C00_IMGS.iso
Procedure
Mount a CD-ROM drive to the VM.
1 Share the folder containing the FusionCompute V100R003C00_IMGS.iso file with the
administrator of the local PC.
2 On the FusionCompute, choose VDC Management > VM and Template.
3 In the navigation tree on the left, expand Site, and click the names of the VMs to be deployed
with the IMGSs.
4 In the Operation area on the right, click Mount CD-ROM.
5 In the displayed dialog box, enter the ISO file path. The format of the path is \\IP address
of the local PC\name of the shared folder\name of the image file,
for example, \\182.168.5.5\soft\FusionCompute V100R003C00_IMGS.iso. The IP address
of the local PC communicates with that of the management plane.
6 Select Use the username and password of the local computer.
7 Enter the username and the password shared in Step 1.
8 Select Restart the VM now to install the OS and click OK.
Install the IMGS.
NOTE
l If you select Boot from local disk, the system skips the installation and starts from the local disk.
l If you select Install, the system performs the installation.
l If you do not perform any operation during 30 seconds, the system starts from the local disk by
default. Then you must restart the VM before performing the subsequent operations.
10 Select Install and press Enter.
It takes about 3 minutes for the automatic loading of the system. After the loading is
complete, the Main Installation Window is displayed, as shown in Figure 2-7.
TIP
You can refer to the following tips when performing operations on the Main Installation
Window:
l Press Tab or up and down arrow keys to move the cursor.
l Press Enter to enter or perform the items that the cursor pointing at.
l Press the space bar to select the items that the cursor pointing at.
11 Select Network and press Enter.
The Network Configuration window is displayed.
12 Select the network interface card (NIC) eth0 and press Enter.
The IP Configuration for eth0 window is displayed.
13 Use the arrow keys to locate Manual address configuration and press the space bar to
select it.
14 Press Tab to set the following parameters:
– IP address: Enter the planned IMGS management IP address.
– Netmask: Enter the subnet mask of the management plane.
15 Press F12.
The Network Configuration window is displayed.
16 Select Default Gateway and set the gateway of the ESC management plane.
17 Press F12.
The Main Installation Window is displayed.
18 Select Hostname and press Enter.
The Hostname Configuration window is displayed.
19 Enter the planned IMGS name, for example, IMGSO1, and press F12.
The Main Installation Window is displayed.
20 Select Timezone and press Enter.
The Time Zone Selection window is displayed.
21 Select the local time zone and set the time.
22 Press F12.
The Main Installation Window is displayed.
23 Select Password and press Enter.
The Root Password Configuration window is displayed.
24 Enter the password for user root and confirm the password, and press F12.
NOTE
Prerequisites
Conditions
– You have installed and configured the FusionCompute.
– You have obtained and shared the VM template file, and the VM template file is accessible
to the FusionCompute. The shared template name is the same as the name of the folder in
which the template file is stored.
– You have disabled the firewall on the local PC.
– You have logged in to the FusionCompute.
Data
Table 2-15 lists the data required for performing this operation.
– Table 2-15 lists the data required for importing the template.
File path Specifies the shared path of the template file. \\192.168.100.11\Share
The path format is \\IP address of the shared
server\Name of the folder in which the
template file is located.
Data Data storage Specifies the data storage selected for datastore01
storage the disk.
informatio
n
Procedure
Create a VM.
1 On the FusionCompute, choose VDC Management > VM and Template.
The VM and Template page is displayed.
2 Click Create VM Using Template in the Operation area on the Summary tab page.
The Import Template page is displayed.
3 Configure the template importing information.
– Template configure file: Select a template file based on the type of the node to be
installed.
– File path: The path format is \\IP address of the shared server\Name of the folder in
which the template file is located.
– Username and password: If a user account is registered in multiple domains, enter the
username with the specified domain name. For example, enter Domain\w00123456.
4 Click Next.
The VM Settings page is displayed.
5 Enter the VM name.
6 In Select a location for creating a VM, select a host to create the VM on it.
NOTE
Create VMs for deploying the active and standby ESCs on different hosts.
Scenarios
Install Elastic Service Controller (ESC) nodes on physical servers.
Prerequisites
Conditions
– You have set the first boot device of the physical server on which the ESC is to be installed
to hard disk, the second boot device to network, and the third one to CD-ROM drive.
– You have obtained the BMC IP address of the physical server.
– You have obtained the username and password for logging in to the BMC system of the
physical server.
Data
Table 2-17 lists the data required for performing this operation.
Subnet mask of the Specifies the subnet mask of the ESC 255.255.255.0
management plane management plane.
This parameter is mandatory.
Software
FusionCompute V100R003C00_ESC.iso
Procedure
Load the ISO file.
NOTE
The following operations use Tecal RH2285 server as an example to describe how to attach and install the
image file using the remote control function of BMC system.
1 In the address box of your web browser, enter http://BMC IP address of the host, and
press Enter.
2 Log in to the BMC system of the server as instructed.
3 Click Remote Control.
The Remote Control command window is displayed.
4 On the tool bar of the Remote Control command window, click .
The Image file selection dialog box is displayed, as shown in Figure 2-8.
5 In the image file selection dialog box, choose Image File, and click Browse.
NOTE
l If you select Boot from local disk, the system skips the installation and starts from the local disk.
l If you select Install, the system performs the installation.
l If you do not perform any operation during 30 seconds, the system starts from the local disk by
default. Then you must restart the VM before performing the following operations:
12 Choose Install and press Enter.
It takes about 3 minutes for the automatic loading of the system. After the loading is
complete, the Main Installation Window is displayed, as shown in Figure 2-11.
TIP
You can refer to the following tips when performing operations on the Main Installation
Window:
l Press Tab or up and down arrow keys to move the cursor.
l Press Enter to enter or perform the items that the cursor pointing at.
l Press the space bar to select the items that the cursor pointing at.
27 Press F12.
28 Select Yes and press Enter.
The system displays a message, asking you whether the configuration is complete.
29 Select Yes.
The Package Installation window is displayed, and the system starts to install the operating
system (OS) of the ESC.
The installation takes about 15 minutes. After the installation, the VM restarts
automatically. When the login information is displayed, the installation of the ESC is
complete.
30 Determine whether to deploy the ESC in the active and standby mode.
– If yes, go to Step 31.
– If no, no further action is required.
Install the standby ESC.
31 Install the standby ESC.
For details, see Step 1 to Step 29.
----End
Scenarios
Install Image Storage (IMGS) nodes on physical servers.
Prerequisites
Conditions
– You have set the first boot device of the physical server on which the ESC is to be installed
to hard disk, the second boot device to network, and the third one to CD-ROM drive.
– You have obtained the BMC IP address of the physical server.
– You have obtained the username and password for logging in to the BMC system of the
physical server.
Data
Table 2-18 lists the data required for performing this operation.
IMGS node name Specifies the name of the IMGS node. IMGS01
Value: a string of 1 to 32 characters
The node name can contain only digits,
letters, and underscores (_) and must start
with a letter.
The node name must be unique and different
from the cluster name.
This parameter is mandatory.
Subnet mask of the Specifies the subnet mask of the IMGS 255.255.255.0
management plane management plane.
This parameter is mandatory.
Software
FusionCompute V100R003C00_IMGS.iso
Procedure
Load the ISO file.
NOTE
The following operations use Tecal RH2285 server as an example to describe how to attach and install the
image file using the remote control function of BMC system.
1 In the address box of your web browser, enter http://BMC IP address of the host, and
press Enter.
2 Log in to the BMC system of the server as instructed.
3 Click Remote Control.
The Remote Control command window is displayed.
4 On the tool bar of the Remote Control command window, click .
The Image file selection dialog box is displayed, as shown in Figure 2-12.
5 In the image file selection dialog box, choose Image File, and click Browse.
NOTE
l If you select Boot from local disk, the system skips the installation and starts from the local disk.
l If you select Install, the system performs the installation.
l If you do not perform any operation during 30 seconds, the system starts from the local disk by
default. Then you must restart the VM before performing the following operations:
12 Choose Install and press Enter.
It takes about 3 minutes for the automatic loading of the system. After the loading is
complete, the Main Installation Window is displayed, as shown in Figure 2-15.
TIP
You can refer to the following tips when performing operations on the Main Installation
Window:
l Press Tab or up and down arrow keys to move the cursor.
l Press Enter to enter or perform the items that the cursor pointing at.
l Press the space bar to select the items that the cursor pointing at.
27 Press F12.
28 Select Yes and press Enter.
The system displays a message, asking you whether the configuration is complete.
29 Select Yes.
The Package Installation window is displayed, and the system starts to install the operating
system (OS) of the IMGS.
The installation takes about 10 minutes. After the installation, the server restarts
automatically. When the login information is displayed, the installation of the IMGS is
complete.
Install other IMGSs.
30 Install other IMGSs.
For details, see Step 1 to Step 29.
----End
Start
Configuring the License Server Configure the license server to provide licensed services
in the specified period.
Configure the active and Configure the active and standby Elastic Service
standby ESCs Controllers (ESCs) on the FusionStack to improve
system reliability.
After the configuration, users can log in to the active ESC
or the FusionStack using the floating IP address.
Configuring a Virtual Firewall After performing basic configuration for the physical
firewalls, such as creating a Secure Shell (SSH) user,
configuring the Simple Network Management Protocol
(SNMP), and configuring the Huawei Redundancy
Protocol (HRP) for the active and standby firewalls,
create and configure virtual firewalls of the required
number so that users can connect to the virtual private
cloud (VPC) or VMs in the security group through an
external network.
Configuring Resource Access Add virtualization resource access points and firewall
Points access points on the FusionStack. Before adding a
virtualization resource access point, create an interface
interconnection user to access the virtualization
resources.
Adding an L2Area Network Add a layer 2 network (L2Area network), which contains
all network resources on the aggregation switches
deployed in the system.
Creating a Service Cluster Create a service cluster for providing users with
virtualization resources.
Configuring Time Configure the system time synchronization and the time
Synchronization and Time Zone zone to ensure the FusionStack services run properly.
Adding an Image Server Add an image server that is used to manage images stored
on it.
Prerequisites
Conditions
– You have loaded a license file to a site on the FusionCompute.
Procedure
5 Click OK.
----End
Scenarios
Configure the active and standby Elastic Service Controllers (ESCs) on the FusionStack. After
the configuration, users can log in to the active ESC or the FusionStack using the floating IP
address.
Prerequisites
Conditions
The active and standby ESCs haven been installed.
Data
Table 2-21 lists the data required for performing this operation.
Procedure
Configure the active and standby ESCs.
NOTE
Before this configuration, ensure that both ESC nodes are powered on. During the configuration, do not
power them off. Otherwise, the system will break down.
1 Log in to the FusionStack using the management IP address of the planned active ESC.
For details, see Logging In to the FusionStack.
2 On the FusionStack, choose System > Service Configuration.
The Service Configuration page is displayed.
3 In the navigation tree on the left, choose Service and Management Node.
4 In Service list locate the row that contains ESC, click Operation, and select Configure
Deployment Mode.
A dialog box is displayed.
5 Set the following parameters:
– Network port: specifies the management network port of the active and standby ESCs.
– Floating IP address: specifies the floating IP address of the active and standby ESCs.
It must be an idle IP address that belongs to the management IP address segment planned
for the ESCs.
– Subnet mask: specifies the subnet mask of the floating IP address.
6 Enter the management IP address of the planned standby ESC in Peer IP address, and
click Obtain Host Name.
7 Check whether a dialog box is displayed indicating that the node names are duplicate.
– If yes, go to Step 8.
– If no, go to Step 9.
8 Enter a new node name of the standby ESC in Peer node name.
9 Specifies the Arbitration IP address that is used to determine the status of the active and
standby ESCs.
You are advised to set the first arbitration IP address to the gateway address of the
management plane, and set other arbitration IP addresses to IP addresses of servers that can
communicate with the management plane, such as the AD server or the DNS server.
10 Click Modify.
A dialog box is displayed.
11 Click OK.
The active and standby ESC configuration is complete.
----End
Scenarios
Create and configure a virtual firewall. This section uses Eudemon 1000E-X as an example to
describe how to use commands to create and configure a virtual firewall.
Figure 2-17 shows the standard networking for firewalls.
Operation and
maintenance Internet
Firewall (active) Firewall (standby)
Stack Stack
NOTE
If the Eudemon 8000E is used as the firewall, it can connect to switches using Eth-Trunk links. If the
Eudemon 1000E is used as the firewall, it can connect to switches only using physical network ports.
Prerequisites
Conditions
Before configuring the virtual firewall, you have completed the following basic configurations
for the firewall by referring to the documentation related to the Eudemon firewall version.
– Secure shell (SSH) users have been created on the firewall. This allows you to log in to the
firewall to perform basic configurations and add firewalls on the FusionStack.
– The information about the simple network management protocol (SNMP) has been
configured on the firewall. The information is used to add firewalls on the FusionStack.
– The reliability configuration, including Huawei redundancy protocol (HRP), interface
tracking, and link-group configuration, has been implemented on active and standby
firewalls.
– If the Eudemon 1000E firewall is used, you must run the undo packet sequence-kept
enable command on the system view interface to disable the packet sequence function.
You have logged in to the firewall devices using hyperterminals.
Data
Table 2-22 lists the data required for performing this operation.
Workflow
Figure 2-18 shows the operation process of Configuring a Virtual Firewall.
Procedure
Create a virtual firewall.
1 Run the following command to switch to the system view:
<Eudemon>system-view
2 Run the following command to create a virtual firewall:
[Eudemon-vpn-instance-vfw101]route-distinguisher vpn-route-distinguisher
[Eudemon-vpn-instance-vfw101]route-distinguisher 101:1
The virtual firewall can be created on the active firewall and it can be synchronously created
on the standby firewall.
4 Run the following command to switch to the system view:
[Eudemon-vpn-instance-vfw101]quit
Configure the network forwarding policy for the virtual firewall.
5 Run the following commands to filter packets between trust and untrust zones for the virtual
firewall:
NOTE
The service-plane open shortest path first (OSPF) instances share an area corresponding to the service
area ID of the firewall.
Configure the management sub-interface of the downlink mgnt zone for the virtual firewall.
19 Run the following command to create the Ethernet sub-interface view and then switch to
the view:
[Eudemon]interface interface-type interface-number.subinterface-number
For example, run the following command to configure the Ethernet sub-interface whose
number is 3.101 and whose type is interface GigabitEthernet:
[Eudemon]interface interface GigabitEthernet0/0/3.101
20 Run the following command to configure a management-plane VLAN ID of the firewall
sub-interface:
[Eudemon-interface GigabitEthernet0/0/3.101]vlan-type dot1q vlan-id
For example, run the following command to configure the management-plane VLAN
whose ID is 201:
For example, run the following commands to bind the sub-interface to virtual firewall
vfw101 and configure the IP address of the sub-interface to be 192.168.201.1:
For example, run the following command to configure a backup group (whose ID is 1 and
whose virtual IP address is 192.168.201.3) on the active firewall:
Configure the backup group ID and its virtual IP address on both active and standby
firewalls.
23 Run the following commands to add a service downlink port to the mgnt zone of the VPN:
NOTE
The management-plane OSPF instances share an area corresponding to the service area ID of the
firewall.
Configure the service sub-interface of the uplink trust zone for the virtual firewall.
30 Perform the configurations based on network types.
– Perform Step 31 for the security group network.
– Perform Step 37 for the VPC network.
31 Run the following command to create the Ethernet sub-interface view and then switch to
the view:
For example, run the following command to configure the Ethernet sub-interface whose
number is 2.101 and whose type is interface GigabitEthernet:
For example, run the following command to configure the service-plane VLAN whose ID
is 301:
For example, run the following commands to bind the sub-interface to virtual firewall
vfw101 and configure the IP address of the sub-interface to be 192.168.301.1:
For example, run the following command to configure a backup group (whose ID is 1 and
whose virtual IP address is 192.168.301.3) on the active firewall:
Configure the backup group ID and its virtual IP address on both active and standby
firewalls.
35 Run the following commands to add a service uplink port to the untrust zone of the virtual
private network (VPN):
If the physical trunk interface has been added into the trust zone when the firewall of the
VPC network was configured at the first time, this step can be ignored.
[Eudemon-zone-trust]set priority 80
[Eudemon-ospf-1]import-route static
[Eudemon-ospf-1]area 1
[Eudemon-ospf-1]import-route static
[Eudemon-ospf-1]area 2
[Eudemon]traffic-policy enable
After the policy is enabled on the active firewall, it will be automatically synchronized on
the standby firewall.
Configure basic services for the service convergence LAN switch.
42 Run the following commands to configure the service LAN switch to communicate with
service planes of the firewall and servers in the layer-2 network:
[Quidway_A-interface GigabitEthernet0/0/4]quit
43 Run the following commands to enable the OSPF process of the firewall trust-zone sub-
interface:
[Quidway_A]ospf 1
[Quidway_A-ospf-1]area 1
[Quidway_B-interface GigabitEthernet0/0/4]quit
45 Run the following commands to enable the OSPF process of the firewall trust-zone sub-
interface:
[Quidway_B]ospf 1
[Quidway_B-ospf-1]area 1
----End
Scenarios
After the FusionStack is installed, add virtualization resource access points and firewall access
points on the FusionStack. Before adding a virtualization resource access point, create an
interface interconnection user to access the virtualization resources.
Prerequisites
Conditions
– You have logged in to the FusionCompute.
– You have logged in to the FusionStack.
– The FusionManager has been installed, because the FusionStack manages firewalls using
the Unified Hardware Manager (UHM) that is regarded as a firewall access point. For details,
see Software Installation in the product documentation of the FusionManager.
Data
Table 2-23 lists the data required for performing this operation.
Procedure
Create an interface interconnection user.
1 On the FusionCompute, choose System Management > Rights Management.
The Rights Management page is displayed.
2 Click Add user.
The username and password of the account created for Interface interconnection user.
11 Click OK.
An information dialog box is displayed indicating that the access point is added.
12 Click OK.
13 Do you want to use the firewall function?
– If yes, go to Step 14
– If no, no further action is required.
Add a firewall access point.
14 Click Add Firewall Access Point.
A dialog box is displayed.
15 Set the following parameters as planned:
– Name: specifies the name of the firewall access point.
– Management IP Address: specifies the floating IP address of the FusionManager.
– Port: Specifies the management port ID of the firewall access point. The default value
is 8088.
– Username: specify the username for logging in to the firewall access point. The default
username is GmUhmRest.
– Password: specify the password for logging in to the firewall access point. The default
password is Rest@GmUhm123.
– Description: provides supplementary information about the firewall access point.
16 Click OK.
An information dialog box is displayed indicating that the access point is added.
17 Click OK.
----End
Scenarios
On the FusionStack, add a layer 2 network (L2Area network), which contains all network
resources on the aggregation switches deployed in the system.
Prerequisites
Conditions
– All the created virtual firewalls have been configured based on the data plan. For details, see
Configuring a Virtual Firewall.
– You have logged in to the FusionStack.
Data
Table 2-24 lists the data required for performing this operation.
Procedure
Configure L2Area information.
1 On the FusionStack, choose System > System Configuration.
2 In the navigation tree on the left, choose L2Area Network Resources > L2Area, and click
Add L2Area.
3 Set Name and Description for the L2Area network.
4 Click Next.
5 Check whether a firewall access point is configured.
– If yes, go to Step 6.
– If no, go to Step 26.
Configure physical firewalls.
6 Click Add Physical Firewall.
The Add Physical Firewall dialog box is displayed.
7 Select a firewall access point and set the following information:
– Management IP Address: specifies the management IP address of the physical
firewall.
– Protocol: specifies the firewall connection mode.
– Username: specifies the management user created on the physical firewall.
– Password: specifies the user password for logging in to the physical firewall.
8 Determine the SNMP version to be used and configure the required SNMP information.
SNMPv2 or a later version is recommended. Table 2-25 lists the configuration information
required by each SNMP version.
V1, V2, and V3 SNMP Port Identifies the SNMP port used by
the physical firewall. The default
port number is 161.
Scenarios
Add site resources on the FusionStack.
Prerequisites
Conditions
The virtualization resource access point and the L2Area network have been configured.
Data
Table 2-26 lists the data required for performing this operation.
Procedure
Scenarios
On the FusionStack, create a service cluster for providing users with virtualization resources.
Prerequisites
Conditions
– A site has been added.
– You have logged in to the FusionStack.
Data
Table 2-27 lists the data required for performing this operation.
Cluster Select Site Specifies the name of the site where Site 01
information the service cluster to be created is
located.
This parameter is mandatory.
Data store Data Store Specifies the data store required for datastore01
providing storage resources for
VMs on the service cluster to be
created.
NOTE
l Local hard disks do not apply to
cloud infrastructure services. User
disks created on a local hard disk
can be attached to only VMs on the
host that provides the local hard
disk.
l Data stores created on a local hard
disk or a Logic unit number (LUN)
on an IP storage area network (IP
SAN) device do not support the VM
snapshot function. When selecting
data stores for a service cluster, the
selected data stores must all support
or do not support VM snapshot.
This parameter is mandatory.
Security group Name Specifies the name of the security Security group
subnet group subnet. subnet 01
(required only This parameter is mandatory.
when a security
group network Subnet IP Specifies the IP address segment of 10.85.52.0
is configured) address the security group subnet.
This parameter is mandatory.
Procedure
l Local hard disks do not apply to cloud infrastructure services. User disks created on a local hard
disk can be attached to only VMs on the host that provides the local hard disk.
l Data stores created on a local hard disk or a Logic unit number (LUN) on an IP storage area
network (IP SAN) device do not support the VM snapshot function. When selecting data stores
for a service cluster, the selected data stores must all support or do not support VM snapshot.
7 Enter the Network Pool name and select the required DVS from the drop-down list.
The VLANs available on the DVS are displayed in a list.
8 Enter the supported VLAN pool range based on the VLAN list information.
9 Enter the descriptive information, and click Next.
The page for configuring a security group subnet is displayed.
10 Determine whether to configure a security group subnet.
– If yes, go to Step 11.
– If no, go to Step 15.
11 Click Add.
The Add Security Group Subnet dialog box is displayed.
12 Set the following security group subnet parameters:
– Name: specifies the name of the security group subnet.
– Subnet IP address: specifies the IP address segment of the security group subnet.
– Subnet mask: specifies the subnet mask of the security group subnet IP address
segment.
– Gateway: specifies the gateway address of the security group subnet.
– VLAN ID: identifies the VLAN to be used by the security group subnet.
– Description: provides supplementary information about the security group subnet.
– DHCP options: specify DHCP parameters for assigning IP addresses to user VMs.
Select an option in the created DHCP options. If DHCP options is set to Custom,
specify Domain name, DNS, and WINS.
13 Click OK.
A dialog box is displayed indicating that the security group subnet is added.
14 Click OK.
15 Click Next.
16 Click Complete.
The service cluster creation progress is displayed.
17 Click Close.
----End
Scenarios
On the FusionStack, configure the system time synchronization and the time zone to ensure the
FusionStack services run properly.
Prerequisites
Conditions
– The network communication between the clock source and the system is normal.
– You have logged in to the FusionStack.
– If multiple Network Time Protocol (NTP) servers are to be deployed, ensure that all the NTP
servers use the same upper-layer clock source so that the system times of the NTP servers
are the same.
Data
Table 2-28 lists the data required for performing this operation.
Procedure
Configure the time synchronization.
1 On the FusionStack, choose System > Service Configuration.
The Service Configuration page is displayed.
2 In the navigation tree on the left, choose Configure Time Zone > Time
Synchronization.
The information about the time synchronization and time zone is displayed on the right of
the page.
3 Set the following parameters:
CAUTION
If multiple Network Time Protocol (NTP) servers are to be deployed, ensure that all the
NTP servers use the same upper-layer clock source so that the system times of the NTP
servers are the same.
– NTP server: specifies the IP address of the NTP server. Enter one to three IP addresses
of the NTP servers.
– Time synchronization interval (s): specifies the interval for time synchronization
(seconds), which is two to the power of n.
4 Click Save.
A confirmation dialog box is displayed.
5 Click OK.
An information dialog box is displayed indicating that the configuration is successful.
6 Click OK.
Configure the Time Zone.
7 In the navigation tree on the left, choose Configure Time Zone > Time Zone.
The information about the time synchronization and time zone is displayed on the right of
the page.
8 Configure the time zone parameters.
9 Click Save.
A confirmation dialog box is displayed.
10 Click OK.
An information dialog box is displayed indicating that the configuration is successful.
11 Click OK.
----End
Scenarios
On the FusionStack, add an image server that is used to manage images stored on it.
Prerequisites
Conditions
– The image server has been installed.
– You have logged in to the FusionStack.
Data
Table 2-29 lists the data required for performing this operation.
Procedure
----End
Scenarios
Configure a third-party backup server to back up critical data on the Elastic Service Controller
(ESC) node. After the backup File Transfer Protocol (FTP) server is configured, critical ESC
data is automatically transmitted to it at 02:00:00 every day. If a system exception occurs, the
system can be restored using the data backup.
Prerequisites
Conditions
– The ESC has been installed.
– A tool that can be used for remote access on various platforms, such as PuTTY, is available.
– You have obtained the IP address and port ID of the third-party backup server.
– You have obtained the username and password for logging in to the FTP server and the user
account has the following rights: read, write, and delete files; add permission for files; create,
delete, and access sub-directories; and add permission for sub-directories.
Data
You have planned the directory where the data backup is to be stored on the backup server, for
example, /Backup/ESC/.
If multiple sites share one backup server, you are advised to set the directory to /Backup/ESC-
IP address of the ESC/ to differentiate them. IP address of the ESC refers to the ESC
management IP address when one ESC is deployed on one site, and refers to the ESC floating
IP address when two ESCs are deployed on one site.
NOTE
The data backup will be stored in /Directory of the data backup/YYYY-MM-DD_sn on the backup server.
Procedure
NOTE
If you press Enter without performing the subsequent operations, the system uses the default values
displayed at the end of each command output.
6 Enter the protocol type of the FTP backup server, and press Enter.
The protocol types include ftp and ftps. You can enter a type based on the actual situation.
The following information is displayed:
Please input the ftp server ip address, press enter and default value
[127.0.0.1] :
7 Enter the IP address of the FTP backup server, and press Enter.
The following information is displayed:
Please input the ftp server port, press enter and default value [21] :
8 Enter the port ID of the FTP backup service, and press Enter.
The following information is displayed:
Please input the ftp upload user name, press enter and default value [ftp] :
9 Enter the username of the FTP backup server, and press Enter.
The following information is displayed:
Please input the ftp upload user password, press enter and default value
[XXX] :
10 Enter the password of the FTP backup server, and press Enter.
The following information is displayed:
Please input the ftp upload root directory, press enter and default value [/
GalaxEngineBackup/ESC/] :
11
CAUTION
If multiple sites share one FTP backup server, do not set the default root directory to the
directory where the data backup is to be stored on the backup server. Otherwise, data
backups will overwrite each other and get mixed up.
Enter the root directory where the data backup is to be stored on the FTP backup server,
and press Enter.
If you press Enter without entering any information, the root directory is set to /
GalaxEngineBackup/ESC/ by default.
The following information is displayed:
Backup configure :
1.Upload network protocol : ftp
2.Ftp server IP : xxx.xxx.xxx.xxx
3.Ftp server port : xx
4.Ftp server user name : XXX
5.Ftp server user password : XXX
6.Ftp server upload root directory : XXX
Are you sure Save ? (yes/no)
12 Ensure that all configuration information is correct, enter yes, and press Enter.
The FTP backup server is configured.
----End
2.6 FAQ
Scenarios
Verify the obtained software packages using sha256deep.
NOTE
This section uses the local PC that runs Windows 7 as an example to describe how to verify software packages.
Prerequisites
Conditions
You have obtained the software package to be verified, and the verification file whose name is
the same as the software package and whose file name extension is *.sha256.
Data
Data preparation is not required for this operation.
Software
You have obtained sha256deep.exe. It is a free tool, and can be obtained by visiting http://
sourceforge.net/projects/md5deep/files/ to download md5deep-x.x.zip.
NOTE
After decompressing the md5deep-x.x.zip, select the sha256deep tool whose version matches the OS of
the local PC. If the local PC runs Windows XP or Windows 7 32-bit, select sha256deep.exe. If the local
PC runs Windows 7 64-bit, select sha256deep64.exe.
Procedure
Step 1 On the local PC, choose Start > Run.
Step 2 Enter cmd, and click OK.
Step 3 Run the following command to switch to the disk containing sha256deep:
Drive letter of the drive containing sha256deep:
For example, if sha256deep is located in drive D. Run the following command:
D:
Step 4 Run the following command to switch to the directory containing sha256deep:
cd / directory containing sha256deep
For example, if sha256deep is located in the admin/test/ directory. Run the following command:
cd /admin/test/
Step 5 Run the following command to verify the software package:
sha256deep.exe -x Path of the verification file Path of the software package
For example, if the path of the verification file is FusionCompute
V100R003C00_ESC.sha256, and the path of the software package is FusionCompute
V100R003C00_ESC.iso, run the following command:
sha256deep.exe -x "D:\software\FusionCompute V100R003C00_ESC.sha256" "D:
\software\FusionCompute V100R003C00_ESC.iso"
If the following information is displayed, which does not contain the path of the software
package, the verification succeeds.
D:\>
If the following information is displayed, which contains the path of the software package, the
verification fails.
D:\software\FusionCompute V100R003C00_ESC.iso
Step 6 Check whether the path of the software package is contained in the command output.
l If yes, go to Step 7.
l If no, no further action is required.
----End
Scenarios
Log in to the FusionStack to manage virtual, service, and user resources in a centralized manner.
Prerequisites
Conditions
The browser for logging in to the FusionStack is available.
NOTE
Data
Table 2-30 lists the data required for performing this operation.
Procedure
Enter the login page.
1 Open Internet Explorer.
2 Enter http://IP address of the ESC node, and press Enter.
3 Click Continue to this website (not recommended).
The FusionStack login page is displayed in common mode.
Install the security certificate.
4 In the address box of Internet Explorer, click Certificate Error, and click View
certificates in the dialog box displayed.
The Certificate dialog box is displayed.
5 Click Install Certificate.
The Certificate Import Wizard dialog box is displayed.
6 Click Next.
The Certificate Store dialog box is displayed.
7 Select Place all certificates in the following store, and click Browse.
The Select Certificate Store dialog box is displayed.
8 Select Trusted Root Certification Authorities, and click OK.
The Certificate Store dialog box is displayed.
9 Click Next.
The Completing the Certificate Import Wizard dialog box is displayed.
10 Click Finish.
The Security Warning dialog box is displayed.
11 Click Yes.
The system displays "The import was successful."
12 Click OK.
13 Click OK in the Certificate dialog box.
The GalaxEngine login page is displayed.
14 Close Internet Explorer, open it again, and log in to the FusionStack.
The configuration takes effect after Internet Explorer is restarted.
Log in to the system.
15 Set the Username, Password, and Verification code, select the required User type and
Login type, and click Login.
– Common login mode: The initial login username is admin and the password is
Admin@123.
– High-security login mode: Three types of users can log in to the system in this mode:
system administrator, security administrator, and security auditor. The login username
and password are the respective user's username and password.
NOTE
l If it is your first login using the admin username, the system asks you to change the password
of the admin username.
l The new password must meet the following requirements:
l It contains a minimum of 6 characters and a maximum of 32 characters.
l It must contain at least three of the following combinations:
l Lowercase letters
l Uppercase letters
l Digits
l Spaces or special characters `~!@#$%^&*()-_=+\|[{}];:'",<.>/?
The main page of the FusionCompute is displayed.
----End
Scenarios
Log in to the FusionCompute to manage virtual, service, and user resources in a centralized
manner.
Prerequisites
Conditions
– The browser for logging in to the FusionCompute is available.
– The Internet Explorer or Mozilla Firefox is set properly.
NOTE
Procedure
NOTE
If Internet Explorer slows down after running for a period of time and no data is required to be saved,
press F6 on the current page to move the cursor to the address bar of the browser. Then, press F5 to
refresh the page and increase the browser running speed.
3 Click Continue to this website (not recommended).
The login page is displayed.
In the FusionCube, FusionSphere, and FusionCloud Desktop solutions, after
FusionCompute and FusionManager are deployed, you can determine whether to configure
single sign-on (SSO).
After the SSO is configured, if you open the login page of the FusionCompute, the system
switches to the login page of the FusionManager. Log in to the FusionManager as user
geadmin, you can enter the FusionCompute and perform operations. However, multiple
users cannot log in to the FusionCompute using the same account.
4 Perform the required operation based on the login page.
– If the FusionCompute login page shown in Figure 2-19 is displayed, go to Step 5.
– If the FusionManager login page shown in Figure 2-20 is displayed, go to Step 6.
5 Set the Username, Password, and Verification code, select the required User type and
Login type, and click Login.
Enter the username and password based on the rights management mode configured during
VRM installation.
– Common login mode: The initial login username is admin and the password is
Admin@123.
– High-security login mode: The username of the system administrator is sysadmin, the
username of the security administrator is secadmin, and the username of the security
auditor is auditor. The initial passwords are all Admin@123.
NOTE
l If it is your first login using the admin username, the system asks you to change the password
of the admin username.
l The new password must meet the following requirements:
l It contains a minimum of 6 characters and a maximum of 32 characters.
l It must contain at least three of the following combinations:
l Lowercase letters
l Uppercase letters
l Digits
l Spaces or special characters `~!@#$%^&*()-_=+\|[{}];:'",<.>/?
The FusionCompute operation page is displayed after you log in to the system.
The login operation is complete.
6 Set the Username and Password and select the user domain from User domain.
The default username is geadmin and password is Admin@123.
If the user fails to log in to the system the first time, Verification code is displayed under
User domain.
7 Click Login.
The FusionCompute operation page is displayed.
----End
3 Feature Configuration
Configure resources in the virtual private cloud (VPC) to provide them for users, such as subnet
pools and bandwidth templates.
Adding a VPC Subnet Pool In the specified L2Area, add subnet resources
used for VPC services.
Scenarios
On the FusionStack, add a virtual private cloud (VPC) subnet pool to provide subnet resources
for VPC services.
Prerequisites
Conditions
You have logged in to the FusionStack.
Data
Table 3-2 lists the data required for performing this operation.
Procedure
----End
Scenarios
On the FusionStack, configure a bandwidth template to set bandwidth for VMs.
Prerequisites
Conditions
You have logged in to the FusionStack.
Data
Table 3-3 lists the data required for performing this operation.
Procedure
– Type: specifies the type of the bandwidth template. Select Elastic IP address to set the
bandwidth for VMs that provides elastic IP addresses service; select VPC to set the
bandwidth for VPC VMs.
– Maximum bandwidth (kbit/s): specifies the maximum bandwidth for VMs running
VPC or elastic IP address services.
– Description: provides supplementary information about the bandwidth template.
5 Click OK.
An information dialog box is displayed indicating that the bandwidth template is added.
6 Click OK.
The newly added bandwidth template is displayed in the list.
----End
Scenarios
On the FusionStack, configure bandwidth templates for elastic IP addresses in the VPC network
and port number ranges for the destination network address translation (DNAT) function.
Prerequisites
Conditions
You have logged in to the FusionStack.
Data
Table 3-4 lists the data required for performing this operation.
Procedure
– DNAT start port: Enter the start port number to which an internal IP address is mapped
on the public network using the DNAT function. For example, enter 1.
– DNAT end port: Enter the end port number to which an internal IP address is mapped
on the public network using the DNAT function. For example, enter 65535.
4 Click Save.
An information dialog box is displayed indicating that the configuration is successful.
5 Click OK.
----End
Scenarios
On the FusionStack, add default Dynamic Host Configuration Protocol (DHCP) options for
users, so that users can use the specified default DHCP options to configure the domain name
server (DNS), Windows Internet Name Service (WINS) server, and domain for user VMs.
Prerequisites
Conditions
Procedure
– Active DNS: specifies the IP address of the active DNS for creating user VMs.
– Standby DNS: specifies the IP address of the standby DNS.
– Active WINS: specifies the IP address of the active WINS server for creating user VMs.
– Standby WINS: specifies the IP address of the standby WINS.
– Description: provides supplementary information about DHCP options.
5 Click OK.
An information dialog box is displayed indicating that the DHCP options are added.
6 Click OK.
The newly added DHCP options are displayed in the list.
----End
Configure resources in the security group network to provide them for users, such as bandwidth
templates and network specifications.
Adding a Security Group Subnet Add subnet resources used for security group
services.
Enabling the Public IP Address Enable the public IP address to assign public
IP addresses for VMs in the security group.
Scenarios
On the FusionStack, configure a bandwidth template to set bandwidth for VMs.
Prerequisites
Conditions
You have logged in to the FusionStack.
Data
Table 3-7 lists the data required for performing this operation.
Procedure
– Type: specifies the type of the bandwidth template. Select Elastic IP address to set the
bandwidth for VMs that provides elastic IP addresses service; select VPC to set the
bandwidth for VPC VMs.
– Maximum bandwidth (kbit/s): specifies the maximum bandwidth for VMs running
VPC or elastic IP address services.
– Description: provides supplementary information about the bandwidth template.
5 Click OK.
An information dialog box is displayed indicating that the bandwidth template is added.
6 Click OK.
The newly added bandwidth template is displayed in the list.
----End
Scenarios
On the FusionStack, configure bandwidth templates for elastic IP addresses in the security group
network and port number ranges for the destination network address translation (DNAT)
function.
Prerequisites
Conditions
You have logged in to the FusionStack.
Data
Table 3-8 lists the data required for performing this operation.
Procedure
----End
Scenarios
On the FusionStack, add default Dynamic Host Configuration Protocol (DHCP) options for
users, so that users can use the specified default DHCP options to configure the domain name
server (DNS), Windows Internet Name Service (WINS) server, and domain for user VMs.
Prerequisites
Conditions
You have logged in to the FusionStack.
Data
Table 3-9 lists the data required for performing this operation.
Procedure
----End
Scenarios
On the FusionStack, add a security group subnet to provide network resources for security group
services.
Prerequisites
Conditions
You have logged in to the FusionStack.
Data
Table 3-10 lists the data required for performing this operation.
Domain name Specifies the name of the domain to which the china.huawei.com
specified user VM is to be added. This
parameter is valid only when DHCP
options is set to Custom.
Active and standby Specify the IP addresses of the active and N/A
DNSs standby domain name servers (DNSs) to
which the specified user VM connects. The
parameters are valid only when DHCP
options is set to Custom.
Active and standby Specify the IP addresses of the active and N/A
WINSs standby Windows Internet Name Service
(WINS) servers to which the specified user
VM connects. The parameters are valid only
when DHCP options is set to Custom.
Procedure
2 In the navigation tree on the left, choose Cloud Service > Add Service Cluster > Cluster
name.
3 Click Add Security Group Subnet on the Security Group Subnet tab page.
The Add Security Group Subnet dialog box is displayed.
4 Set the following subnet parameters:
– Name: identifies the name of a security group subnet.
– Subnet IP address: specifies the IP address segment of the security group subnet.
– Subnet mask: specifies the subnet mask of the security group subnet IP address
segment.
– Gateway: specifies the gateway address of the security group subnet.
– VLAN ID: specifies the virtual local area network (VLAN) ID of the security group
subnet. The VLAN ID must be selected from the displayed default list.
– Description: provides supplementary information about the security group subnet.
– DHCP options: specifies the DHCP configuration for user VMs in security groups.
Select an option in the created DHCP options. If it is set to Custom, specify Domain
name, DNS, and WINS.
5 Click OK.
An information dialog box is displayed indicating that the security group subnet is added.
6 Click OK.
The newly added security group subnet is displayed in the list.
----End
Scenarios
On the FusionStack, enable the public IP address for VMs in the security group.
Prerequisites
Conditions
You have logged in to the FusionStack.
Data
Data preparation is not required for this operation.
Procedure
4 Click Save.
An information dialog box is displayed indicating that the configuration is successful.
5 Click OK.
----End
Adding a Service Subnet Add a service subnet, so that users can use the
subnet when they create LB VMs.
Prerequisites
Conditions
– The LB VM image is available on the local PC.
– You have logged in to the FusionStack.
Data
Table 3-12 lists the data required for performing this operation.
Tools
You have obtained WinSCP.
Software
– FusionCompute V100R003C00_SLB.zip
– FusionCompute V100R003C00_SLB.zip.sha256
Procedure
If the /image/base/ directory does not contain the omsportal folder, create a folder named
omsportal in the directory.
3 On the FusionStack, choose Service Catalog.
The Service Catalog page is displayed.
4 Locate the row that contains the image to be registered, choose Operation, and click
Register Image.
A dialog box is displayed.
5 Set the following parameters:
– Image Name: specifies the name of the image to be registered.
– OS Type
– Image Type: specifies the type of the LB VM image. Set it to vhd for LB VMs.
6 Click Register Image.
An information dialog box is displayed indicating that the image is registered.
7 Click OK.
----End
Prerequisites
Conditions
Procedure
Scenarios
On the FusionStack, configure load balancer (LB) instance specifications, which include the
bandwidth, maximum concurrent logins per user, and the maximum concurrent logins for an LB
instance.
Prerequisites
Conditions
You have logged in to the FusionStack.
Data
Table 3-14 lists the data required for performing this operation.
Procedure
----End
Scenarios
On the FusionStack, add (load balancer) LB VM specifications, so that users can use the
specifications when they create LB VMs.
Prerequisites
Conditions
– You have logged in to the FusionStack.
– The LB instance specifications have been created.
Data
Table 3-15 lists the data required for performing this operation.
Procedure
Scenarios
On the FusionStack, add a management subnet, so that users can use the subnet when they create
LB VMs.
Prerequisites
Conditions
You have logged in to the FusionStack.
Data
Table 3-16 lists the data required for performing this operation.
Procedure
Scenarios
On the FusionStack, add a service subnet, so that users can use the subnet when they create LB
VMs.
Prerequisites
Conditions
You have logged in to the FusionStack.
Data
Table 3-17 lists the data required for performing this operation.
Procedure
2 In the navigation tree on the left, choose LB Instance > Service Subnet.
3 Click Add.
The Add Service Subnet page is displayed.
4 Set the following parameters:
– Site: identifies the ID of the site to which the service subnet belongs.
– Name: specifies the name of the service subnet.
– Subnet IP address: specifies the IP address segment of the planned service subnet.
– Subnet mask: specifies the mask of the service subnet.
– Gateway: specifies the gateway address of the service subnet.
– VLAN ID: identifies the ID of the VLAN used by the service subnet. Select a VLAN
in the VLAN pool on the DVS used by the service cluster. Ensure that this VLAN is
not in-use.
– Description
5 Click Add.
A dialog box is displayed indicating that the service subnet is added.
6 Click OK.
The newly added service subnet is displayed in the list.
----End
Scenarios
On the FusionStack, configure the maximum number of load balancer (LB) instances for a
service cluster.
Prerequisites
Conditions
You have logged in to the FusionStack.
Data
Table 3-18 lists the data required for performing this operation.
Procedure
Scenarios
Log in to the FusionStack to manage virtual, service, and user resources in a centralized manner.
Prerequisites
Conditions
The browser for logging in to the FusionStack is available.
NOTE
Data
Table 4-1 lists the data required for performing this operation.
Procedure
Enter the login page.
1 Open Internet Explorer.
2 Enter http://IP address of the ESC node, and press Enter.
3 Click Continue to this website (not recommended).
The FusionStack login page is displayed in common mode.
Install the security certificate.
4 In the address box of Internet Explorer, click Certificate Error, and click View
certificates in the dialog box displayed.
The Certificate dialog box is displayed.
5 Click Install Certificate.
The Certificate Import Wizard dialog box is displayed.
6 Click Next.
The Certificate Store dialog box is displayed.
7 Select Place all certificates in the following store, and click Browse.
The Select Certificate Store dialog box is displayed.
8 Select Trusted Root Certification Authorities, and click OK.
The Certificate Store dialog box is displayed.
9 Click Next.
The Completing the Certificate Import Wizard dialog box is displayed.
10 Click Finish.
l If it is your first login using the admin username, the system asks you to change the password
of the admin username.
l The new password must meet the following requirements:
l It contains a minimum of 6 characters and a maximum of 32 characters.
l It must contain at least three of the following combinations:
l Lowercase letters
l Uppercase letters
l Digits
l Spaces or special characters `~!@#$%^&*()-_=+\|[{}];:'",<.>/?
The main page of the FusionCompute is displayed.
----End
System
System Configuration
The System Configuration function allows you to configure system resources and manage
service clusters.
System Configuration
Function Description Path Reference
Interface View
Service Configuration
The Service Configuration function allows you to adjust system service configurations.
Service Configuration
Function Description Path Reference
Select a time You can select the time zone of Operation and
zone the system. Maintenance >
Configuration
Management
Interface View
Operation Log
The Operation Log function allows you to query and export user operation records.
View You can view user operation logs System > Operation and
operation logs to trace historical operations Operation Log Maintenance >
performed by a user in the Operation Log
system. Management
Interface View
Rights Management
The Rights Management function allows you to manage users, roles, and password policies.
User Management
Manage users You can create users, modify System > Rights Operation and
user attributes, modify or reset Management > Maintenance >
user passwords, lock users, and User User
assign different roles for Management Management
different users to meet their
environment control
requirements.
Password Policy
Function Description Path Reference
Configure You can manage user password System > Rights Operation and
password configuration policies in a Management > Maintenance >
policies system. Password Policy User
Management
Interface View
Subscription Center
The Subscription Center function allows you to subscribe to alarm information.
Subscription Management
Function Description Path Reference
Configure You can configure mail server System > Operation and
mail server information used for Subscription Maintenance >
information subscription services. Center Subscription
Management
Configure You can configure subscription
subscription contents to determine which
contents alarms are sent to a specified
mail box for timely and efficient
system maintenance.
Interface View
License
The License function allows you to query and update license authorization information.
License Management
Function Description Path Reference
Query license You can query license System > License Software
information authorization information and Commissioning
configuration data so that you
can purchase or update a license
to obtain service usage
permission or prolong service
validity period before the current
license expires.
Interface View
Service Catalog
Image
The Image function allows you to manage VM images.
Image Management
Function Description Path Reference
Manage You can manage images to Service Catalog > Operation and
images provide image resources used for Image Maintenance >
creating VMs for users. Image Image
management operations include Management
registering, deregistering,
freezing, and unfreezing images.
Interface View
Alarm
Alarm
The Alarm function allows you to query and handle alarms.
Alarm Management
View alarms You can view alarms to locate Alarm Operation and
and troubleshoot system faults in Maintenance >
a timely manner. Health Check
Interface View
Scenarios
Make an image (also called a template) using an existing VM on the FusionCompute. This
image will be used for creating VMs.
Prerequisites
Conditions
You have logged in to the FusionCompute.
Data
Table 4-2 lists the data required for performing this operation.
Name Specifies the name for the image file after it template01
is exported.
This parameter is mandatory.
Procedure
Create a VM.
1 Create a VM used for making an image of the required specifications on the
FusionCompute.
For details, see VM Creation in the Virtual Machine Management Guide.
Convert the VM to a template.
2 On the FusionCompute, choose VDC Management > VM and Template.
The VM and Template page is displayed.
3 In the navigation tree on the left, right-click the VM to be converted, and choose Safely
stop.
4 When the VM status changes to Stopped, right-click the VM, and choose Convert to
Template.
A dialog box is displayed.
5 Click OK.
An information dialog box is displayed.
6 Click OK.
The VM is converted to a template if the VM icon in the navigation tree changes from
to .
Export the template.
7 Right-click the template, and choose Export Template.
The Export Template page is displayed.
8 Select NFS from the Protocol drop-down list.
9 In the Name box, specify the name for the exported image file.
10 In the Folder box, specify the image server directory for saving the image file. The path
to the directory is as follows:
Image server IP address:/image/storage directory/omsportal/
----End
Scenarios
Register an image file on the FusionStack, providing a complete copy of the system disk
required for creating VMs.
Prerequisites
Conditions
– You have logged in to the FusionStack.
– The image file to be registered has been saved in the /image/storage directory/omsportal/
directory on the image server.
Data
Table 4-3 lists the data required for performing this operation.
Image Name Specifies the name registered for the image. image001
This parameter is mandatory.
OS Type Specifies the operating system (OS) version Windows Server 2008
for the VMs that can be created using the Enterprise 32bit
image to be registered.
This parameter is mandatory.
Image Type Specifies the image type, which can only be vhd
vhd.
This parameter is mandatory.
Procedure
Scenarios
Deregister or delete an image on the FusionStack. A deregistered image will become available
only after it is registered again. A deleted image is removed from the image server permanently.
Before deregistering or deleting an image, check that the image is no longer needed.
Prerequisites
Conditions
– You have logged in to the FusionStack.
– The name of the image to be deregistered or deleted has been obtained.
Data
Procedure
Deregister an image.
NOTE
Scenarios
Freeze or unfreeze an image on the FusionStack.
You may perform this operation to update a registered image file. The general procedure is as
follows:
1. On the FusionStack, freeze the image file (also called a template) you need to update.
2. On the FusionCompute, convert the template to a VM, reconfigure the software on the
VM, and then convert the VM back to a template. Then, export the template to the image
server. When you export the template, set Name and Folder to be the same as those for
the old template, and select Overwrite existing template.
3. On the FusionStack, unfreeze the image file.
To modify an image file, you can first freeze the image, usage an image file of the same name
to replace the frozen image file, and then unfreeze the image.
Prerequisites
Conditions
– You have logged in to the FusionStack.
– The name of the image to be frozen or unfrozen has been obtained.
Data
Data preparation is not required for this operation.
Procedure
----End
Prerequisites
Conditions
– You have logged in to the FusionStack.
– The logo file to be uploaded is available.
– For the logo displayed in the address box of the browser, prepare an ICO image with a
size of 16 x 16.
– For the logo displayed on the login page, Version information page, and the upper-left
corner of the system page, prepare a PNG image with a size of 48 x 48.
Data
Data preparation is not required for this operation.
Procedure
Scenarios
Configure the file transfer protocol (FTP) server that receives charging bills from the billing
system and enable the charging function on the FusionStack. With the charging function
enabled, the system periodically generates charging bills for service resources, including VM,
volume, elastic IP address, virtual LAN (VLAN), virtual private cloud (VPC), security group,
VM snapshot, and LB instance, and sends the charging bills to the configured FTP server.
Prerequisites
Conditions
– You have logged in to the FusionStack.
– The ESC node is properly communicating with the third-party FTP server and traffic
measurement device.
Data
Table 4-4 lists the data required for performing this operation.
Procedure
----End
Scenarios
On the FusionStack, configure the subscription server and the mailbox that send alarm
information. After the subscription server is configured, alarms and other maintenance
information can be sent from the configured mailbox.
Prerequisites
Conditions
A mail server is available and it is communicating properly with the FusionStack.
You have logged in to the FusionStack.
Data
Table 4-5 lists the data required for performing this operation.
Procedure
----End
Scenarios
Configure domain authentication information on the FusionStack so that common users created
on the FusionStack by domain users can log in to the system.
Prerequisites
Conditions
Domain name Specifies the domain name where the domain china.huawei.com
server belongs.
This parameter is mandatory.
Procedure
Scenarios
Configure the session timeout duration on the FusionStack. If users do not perform any
operation within the configured session timeout duration, they will be logged out automatically.
Prerequisites
Conditions
You have logged in to the FusionStack.
Data
Table 4-7 lists the data required for performing this operation.
Procedure
Scenarios
Modify the time synchronization and time zone settings on the FusionStack.
Prerequisites
Conditions
– Communication between the clock source and the system is normal.
– You have logged in to the FusionStack.
– If multiple NTP servers are deployed, all the NTP servers use the same upper-layer clock
source so that the system time on all NTP servers is the same.
Data
Table 4-8 lists the data required for performing this operation.
Procedure
Configure the time synchronization.
1 On the FusionStack, choose System > Service Configuration.
The Service Configuration page is displayed.
2 In the navigation tree on the left, choose Configure Time Zone > Time
Synchronization.
The information about the time synchronization and time zone is displayed on the right of
the page.
3 Set the following parameters:
CAUTION
If multiple Network Time Protocol (NTP) servers are to be deployed, ensure that all the
NTP servers use the same upper-layer clock source so that the system times of the NTP
servers are the same.
– NTP server: specifies the IP address of the NTP server. Enter one to three IP addresses
of the NTP servers.
– Time synchronization interval (s): specifies the interval for time synchronization
(seconds), which is two to the power of n.
4 Click Save.
A confirmation dialog box is displayed.
5 Click OK.
An information dialog box is displayed indicating that the configuration is successful.
6 Click OK.
Configure the Time Zone.
7 In the navigation tree on the left, choose Configure Time Zone > Time Zone.
The information about the time synchronization and time zone is displayed on the right of
the page.
8 Configure the time zone parameters.
9 Click Save.
A confirmation dialog box is displayed.
10 Click OK.
An information dialog box is displayed indicating that the configuration is successful.
11 Click OK.
----End
Scenarios
Synchronize time forcibly on the FusionStack when the time on the NTP server changes or
when the system time is inconsistent with that on the NTP server.
Prerequisites
Conditions
You have logged in to the FusionStack.
Data
Data preparation is not required for this operation.
Procedure
2 In the navigation tree on the left, choose Configure Time Zone > Forcibly Synchronize
Time.
3 On the right panel, click Forcibly Synchronize Time.
An information dialog box is displayed indicating that the time is synchronized.
4 Click OK.
----End
Scenarios
On the FusionCompute, modify CPU and memory specifications of the Elastic Service
Controller (ESC) VM based on the number of VMs and hosts in the system.
NOTE
If two ESCs are deployed working in active/standby mode, modify the VM specifications of the standby
ESC and restart it, and then modify the VM specifications of the active ESC.
Prerequisites
Conditions
– You have logged in to the FusionCompute.
– You have obtained the floating IP address of the active and standby VRMs if two VRM are
deployed working in active/standby mode; or you have obtained the management IP address
of the VRM if only one VRM is deployed.
Data
Table 4-9 lists the ESC VM configuration script data.
Procedure
Modify VM specifications of the ESC.
1 On the FusionCompute, choose VDC Management > VM and Template.
The VM and Template page is displayed.
2 On the VM page, obtain the name of the ESC VM using the IP address of the ESC whose
VM specifications are to be modified.
You can query the target VM by clicking Advanced, entering the IP address of the ESC
in IP, and then clicking Search.
3 In the navigation tree on the left, choose Site name > ESC VM name.
The Summary page is displayed.
4 On the Virtual Hardware page, click CPU, and select the number of CPUs of the ESC
VM from the Number of kernels drop-down list.
5 Click OK.
The modification is saved.
6 Click Memory, and modify the memory size of the ESC VM in the Size (MB) text box.
7 Click OK.
The modification is saved.
Run the ESC VM configuration script.
8 Use PuTTY to log in to the ESC whose VM specifications are to be modified.
After logging in to the ESC as user gandalf, run the su - root command to switch to the
root user interface.
9 Run the following command to disable logout on timeout:
TMOUT=0
----End
Scenarios
Add an image server on the FusionStack.
Prerequisites
Conditions
– The Image Storage (IMGS) nodes have been installed.
– You have logged in to the FusionStack.
Data
Table 4-10 lists the data required for performing this operation.
Procedure
----End
Scenarios
Delete an image server that is no longer used on the FusionStack.
Prerequisites
Conditions
– You have logged in to the FusionStack.
– Information about the image server to be deleted has been obtained.
Data
Data preparation is not required for this operation.
Procedure
Scenarios
Change the name and IP address of an image server on the FusionStack.
Prerequisites
Conditions
– You have logged in to the FusionStack.
– To change the IP address of an image server on the FusionStack, change the management
IP address of the image server first.
Data
Table 4-11 lists the data required for performing this operation.
Procedure
Prerequisites
Conditions
– If the IMGS is deployed on a VM, the disk to be added or deleted has been bound to the VM
where the IMGS is deployed.
– If the IMGS is deployed on a physical server, the disk to be added or deleted has been installed
on the physical server.
– Before a disk is deleted, all the data on it has been backed up to other disks.
Data
Table 4-12 lists the data required for performing this operation.
Password of user root Specifies the password of user root for N/A
logging in to the IMGS.
Tools
Procedure
Check the disk status.
1 Use PuTTY to log in to the IMGS.
Ensure that the management IP address and username gandalf are used to establish the
connection.
NOTE
The IMGS can be deployed either on a VM or a physical server. This section uses the IMGS deployed
on a VM as an example to describe how to add or delete a disk on the IMGS.
2 Run the following command and enter the password of user root to switch to user root:
su - root
3 Run the following command to disable logout on timeout:
TMOUT=0
4 Run the following command to view the disk partition information on the current server:
fdisk -l
Information similar to the following is displayed:
Disk /dev/xvda: 53.7 GB, 53687091200 bytes
...
Disk /dev/xvdd: 266 MB, 266182656 bytes
...
Disk /dev/xvde: 10.7 GB, 10737418240 bytes
...
Disk /dev/xvdf: 10.7 GB, 10737418240 bytes
...
5 Run the following command to view attached disks on the current server:
mount
Information similar to the following is displayed:
/dev/xvda1 on / type ext3 (rw,errors=panic)
proc on /proc type proc (rw)
sysfs on /sys type sysfs (rw)
...
/dev/xvdf on /image/third type ext3 (rw)
nfsd on /proc/fs/nfsd type nfsd (rw)
Through Step 4 and Step 5, you can now determine that disk xvde is not attached. Disk
xvdf is attached to the /image/third directory.
Typically, the disks that can be added or deleted for a VM are named xvde, xvdf, …, while
those that can be added or deleted for a physical server are named sdb, sdc, ….
6 Choose the task you need to perform.
– To add a disk, go to Step 7.
– To delete a disk, go to Step 15.
Add a disk.
7 Determine whether to format the disk.
NOTE
To attach a new disk, you must format it first. If you format a disk that contains data, all the data on
it will be cleared.
– If yes, go to Step 8.
– If no, go to Step 9.
8 Run the following command to format the disk:
mkfs.ext3 -F /dev/Disk name
For example, to format disk xvde, run the following command:
mkfs.ext3 -F /dev/xvde
The disk is formatted successfully if the following information is displayed:
Writing inode tables: done
Creating journal (32768 blocks): done
Writing superblocks and filesystem accounting information: done
If the disk formatting fails, restart the IMGS and try to format the disk again. If the disk
still cannot be formatted, contact Technical Support.
9 Run the following command to attach the disk to the image storage directory:
sh /opt/galax/imgs/script/initDisk.sh Directory name Disk name
Directory name varies depending on the image storage directory actually used. It must be
unique on the image server. For example, to attach disk xvde to the /image/second/
directory, run the following command:
sh /opt/galax/imgs/script/initDisk.sh second xvde
The disk is attached successfully if the following information is displayed:
begin mount /dev/disk/by-id/scsi-SATA_QEMU_HARDDISK_QM00005.
mount disk xvde to /image/second success.
modify fstab file success.
restart nfsserver begin.
restart nfsserver success.
SUCCESS:0
10 Use PuTTY to log in to the active Elastic Service Controller (ESC) node.
Ensure that the management plane floating IP address and username gandalf are used to
establish the connection.
11 Run the following command to disable logout on timeout:
TMOUT=0
12 Run the following command to check the status of the newly added shared directory on the
image server:
ls -l /image/Image server name
Image server name is the name registered for the image server on the FusionStack.
The status of the shared directory is normal if information similar to the following is
displayed:
...
drwxrwxr-x 3 gandalf GalaX8800 4096 Feb 27 13:28 second
...
The status of the shared directory is abnormal if information similar to the following is
displayed:
ls: cannot access second: Stale NFS file handle
...
d????????? ? ? ? ? ? second
...
13 Based on the displayed information, determine whether the status of the shared directory
is normal.
– If yes, no further action is required.
– If no, go to Step 14.
14 Run the following command to unmount the shared directory on the image server:
sudo umount -l /image/Image server name
After the shared directory is unmounted using this command, the system automatically
mounts the shared directory again.
About 1 minute later, check whether the status of the shared directory is normal. If no,
contact Technical Support.
Delete a disk.
15 Run the following command to detach a disk from the image storage directory and delete
the directory that corresponds to the disk:
sh /opt/galax/imgs/script/deleteDisk.sh Directory name Disk name
For example, to detach disk xvdf from the /image/third/ directory and delete the third
directory, run the following command:
sh /opt/galax/imgs/script/deleteDisk.sh second xvdf
The disk is detached successfully if information similar to the following is displayed:
try to umount /dev/xvdf.
try to umount /dev/xvdf success.
delete /image/third from /etc/fstab success
delete dir /image/third success.
restart nfsserver begin.
restart nfsserver success.
SUCCESS:0
Prerequisites
Conditions
– Logical unit numbers (LUNs) have been created on the IP SAN. LUN mappings have been
created.
– No operations such as creating VMs, creating images, and registering images are being
performed.
Data
Table 4-13 lists the data required for performing this operation.
Tools
You have obtained PuTTY.
Procedure
Configure the storage network for the IMGS.
Ensure that the management IP address and username gandalf are used to establish the
connection.
2 Run the following command and enter the password of user root to switch to user root:
su - root
3 Run the following command to disable logout on timeout:
TMOUT=0
4 Run the following command to configure the storage network for the IMGS. If multipath
storage is configured, you can configure multiple storage paths using the following
command:
5 Run the following command to verify the configuration of the storage network:
For example, if the IP SAN storage IP address is 172.20.12.10, run the following command:
ping -c 3 -W 2 172.20.12.10
– If yes, go to Step 6.
– If no, check the storage network configuration again.
Modify the system settings for the image server.
6 Run the following command to configure open-iscsi as a default startup service:
chkconfig open-iscsi on
7 Run the following command to configure multipathd as a default startup service:
chkconfig multipathd on
8 Run the following command to check the status of the open-iscsi service:
The open-iscsi service has started if items 3 and 5 in the following information are on:
open-iscsi 0:off 1:off 2:off 3:on 4:off 5:on 6:off
9 Run the following command to check the status of the multipathd service:
The multipathd service has started if items 3 and 5 in the following information are on:
10 Run the following command to restart the IMGS for the configuration to take effect:
reboot
Mount a newly created LUN.
11 Use PuTTY to log in to the IMGS.
Ensure that the management IP address and username gandalf are used to establish the
connection.
12 Run the following command and enter the password of user root to switch to user root:
su - root
13 Run the following command to disable logout on timeout:
TMOUT=0
14 Run the following command to discover storage devices on the IMGS:
iscsiadm -m discovery -t st -p Storage IP address
For example, if the storage IP address is 172.20.12.10, run the following command:
iscsiadm -m discovery -t st -p 172.20.12.10
Information similar to the following is displayed:
172.20.12.10:3260,1 iqn.2006-08.com.huawei:oceanstor:
21000022a100d96b:notconfig:172.20.12.10
172.30.12.11:3260,12 iqn.2006-08.com.huawei:oceanstor:
21000022a100d96b:notconfig:172.30.12.11
172.20.12.11:3260,11 iqn.2006-08.com.huawei:oceanstor:
21000022a100d96b:notconfig:172.20.12.11
172.30.12.10:3260,2 iqn.2006-08.com.huawei:oceanstor:
21000022a100d96b:notconfig:172.30.12.10
15 Run the following command to check the InitiatorName of the current IMGS node:
cat /etc/iscsi/initiatorname.iscsi
In the following output, InitiatorName is iqn.1996-04.de.suse:01:edf91db6a4b5.
##
## /etc/iscsi/iscsi.initiatorname
...
InitiatorName=iqn.1996-04.de.suse:01:edf91db6a4b5
18 On the Initiator tab page, select iSCSI as the HBA Card Type, select the
InitiatorName of the IMGS from Unconfigured Initiator and add it to Configured
Initiator.
19 Run the following command to log in to the iSCSI target:
iscsiadm -m node -l
20 Run the following command to view existing iSCSI sessions:
iscsiadm -m session
Information similar to the following is displayed:
tcp:[1]172.20.12.10:3236,1 iqn.2006-08.com.huawei:oceanstor:
21000022a100d96b:notconfig:172.20.12.10
The preceding output contains the information about one link. If multiple links are
configured, the output will contain the information about multiple links.
21 Run the following command to enable automatic login over iSCSI links upon startup:
iscsiadm -m node -T iqn.2006-08.com.huawei:oceanstor:21000022a100d96b:notconfig:
172.20.12.10 -p 172.20.12.10:3260 --op update -n node.startup -v automatic
The variables in italics in the following command need to be replaced using the link
information obtained in Step 20. If multiple links are present, you need to run this command
multiple times.
Mount the LUN to the image storage directory.
22 Run the following command to query the scsi-id and volume label of the newly mounted
LUN:
ls -l /dev/disk/by-id/
In the following output, the scsi-id of the newly mounted LUN is
scsi-360022a110000d96b4e8bf2af00000034 and the volume label is dm-1.
total 0
...
24 Run the following command to mount the LUN to the image storage directory:
sh /opt/galax/imgs/script/addLunDisk.sh scsi-id directory name
NOTE
The directory name varies depending on the image storage directory actually used. It consists of
letters, digits, and underscores (_). Its maximum length is 32 characters.
You can then copy image files to the /image/second directory, and register and use them.
----End
Verification
Verify the stability of the IMGS upon restart.
1. Run the reboot command to restart the image server.
2. Log in to the BMC interface of the image server, and observe the image server restart
process on the remote control page.
If the screen stalls at the following line, try to restart the image server again on the BMC
remote management interface.
Unmounting file systems
Verify the status of the image server directory on the Elastic Service Controller (ESC). In this
example, the status of the /image/imgs01/second directory is verified, where imgs01 is the name
registered for the image server.
1. Use PuTTY to log in to the ESC, and run the following command to check the status of the
image server directory:
ls /image/imgs01/second/
If information similar to the following is displayed, the directory has failed to be mounted,
and you need to mount it again.
Is:cannot access /image/imgs01/second/: Stale NFS file handle
Scenarios
View the logs about user operations on the FusionStack. The operation logs include a description
of each operation, the time when the operation was performed, and other details. You can save
the operation logs as files on the local PC.
Prerequisites
Conditions
You have logged in to the FusionStack.
Data
Data preparation is not required for this operation.
Procedure
View operation logs.
1 On the FusionStack, choose System > Operation Log.
The Operation Logs page is displayed.
2 Click Advanced Search.
Scenarios
Create an alarm subscription task on the FusionStack. Based on the subscription configuration,
the FusionStack:
l Collects alarms generated in the specified period of time.
l Reports the collected alarm information to the upper-layer management system or sends it
to the destination mailbox addresses specified in the subscription task.
Prerequisites
Conditions
– The subscription server has been configured.
– You have logged in to the FusionStack.
Data
Table 4-14 lists the data required for performing this operation.
Procedure
6 In the Alarms box, select the alarms to subscribe to, and click to add them.
7 Click OK.
An information dialog box is displayed indicating that the alarm subscription task is created.
8 Click OK.
----End
Scenarios
On the FusionStack, modify an existing alarm subscription task.
Prerequisites
Conditions
You have logged in to the FusionStack.
Data
Table 4-15 lists the data required for performing this operation.
Procedure
----End
Scenarios
Suspend or delete an unused alarm subscription task on the FusionStack.
Prerequisites
Conditions
– You have logged in to the FusionStack.
– The name of the alarm subscription task to be suspended or deleted has been obtained.
Data
Data preparation is not required for this operation.
Procedure
Suspend an alarm subscription task.
1 On the FusionStack, choose System > Subscription Center.
2 Locate the row that contains the alarm subscription task to be suspended, click
Operation, and select Deactivate.
A confirmation dialog box is displayed.
3 Click OK.
The status of the alarm subscription task changes to Deactivate.
Delete an alarm subscription task.
4 Locate the row that contains the alarm subscription task to be deleted, click Operation,
and select Delete.
A confirmation dialog box is displayed.
5 Click OK.
An information dialog box is displayed indicating that the task is deleted.
----End
Scenarios
On the FusionStack, create a role and specify its operation rights.
Prerequisites
Conditions
You have logged in to the FusionStack.
Data
Table 4-16 lists the data required for performing this operation.
Procedure
----End
Scenarios
On the FusionStack, create a user and specify its role.
Prerequisites
Conditions
You have logged in to the FusionStack.
Data
Table 4-17 lists the data required for performing this operation.
User type l Local user: logs in to the system using a Local user
local username and password.
l Domain user: logs in to the system using
a domain username and password. The
domain user is created using a domain
username.
l Interface interconnection user: creates
an internal user account for interworking
with other components.
Procedure
– Domain user: logs in to the system using a domain username and password. The domain
user is created using a domain username.
– Interface interconnection user: creates an internal user account for interworking with
other components.
5 Determine whether to use the current role to create a user.
– If yes, go to Step 8.
– If no, go to Step 7.
6 Click Add Role.
For details, see Creating a Role.
7 Select a user role from the Subrole list.
Specify the role of the administrator user. Set this parameter based on the type and operation
rights of the administrator.
8 Set the following parameters:
– Username: specifies the username. (The username of a domain user must be the same
as that created on the domain server.)
– Password: specifies the password of the user. (This parameter is not required when you
are creating a domain user.)
– Mobile number: specifies the mobile phone number of the user.
– Maximum number of concurrent logins of a user: specifies the maximum number
of users allowed to concurrently log in to the system using the same username.
– Email: specifies the email address used to receive system alarm notifications.
– Description: provides supplementary information about the username.
9 Click OK.
An information dialog box is displayed, indicating that the user is added.
10 Click OK.
----End
Prerequisites
Conditions
– The system administrator has management permission for Password Policy.
– You have logged in to the FusionStack.
Data
Data preparation is not required for this operation.
Procedure
Step 1 On the FusionStack, choose System Management > Right Management.
The Right Management page is displayed.
Step 2 At the upper left corner of the page, click Password Policy.
The Password Policy page is displayed, on which you can check the current password policies.
Step 3 Click Modify.
The parameters on the Password Policy page can be edited.
Step 4 Enter the new parameter values and modify the password policies.
The parameters must meet the requirements in the following table:
Parameter Description Example Value
----End
Scenarios
Modify user information on the FusionStack, including the user's password, role, mobile phone
number, email address, and username description.
Prerequisites
Conditions
– You have logged in to the FusionStack.
– You have obtained the information about the user to be modified.
Data
Table 4-18 lists the data required for performing this operation.
Procedure
Scenarios
On the FusionStack, modify the operation rights of a non-default role for access control
purposes.
Prerequisites
Conditions
You have logged in to the FusionStack.
Data
Table 4-19 lists the data required for performing this operation.
Procedure
----End
Scenarios
On the FusionStack, reset the passwords for users who have forgotten their passwords and
assign new passwords to them.
Prerequisites
Conditions
You have logged in to the FusionStack as an authorized administrator.
Data
Table 4-20 lists the data required for performing this operation.
Procedure
Prerequisites
Conditions
You have logged in to the FusionStack.
Data
Table 4-21 lists the data required for performing this operation.
Procedure
1 At the upper right corner of the FusionStack, click the username of the current user.
The information about the current user is displayed.
2 Click Modify in the Password row.
The Modify Password dialog box is displayed.
3 Enter the old and new passwords, and click Modify.
A dialog box is displayed, indicating that the password is changed.
4 Click OK.
----End
Prerequisites
Conditions
– The system administrator has been granted the lock or unlock permission.
– You have logged in to the FusionStack.
Data
Data preparation is not required for this operation.
Procedure
Step 1 On the FusionStack, choose System Management > Rights Management.
The Rights Management page is displayed.
Step 2 In the user list on the left, click User.
The User page is displayed.
Step 3 Locate the row that contains the account to be locked, click Operation, and select Lock user.
An information dialog box is displayed.
Step 4 Click OK.
The account is locked. The account is in the Manually locked status.
----End
Prerequisites
Conditions
– The system administrator has been granted the lock or unlock permission.
– You have logged in to the FusionStack.
Data
Data preparation is not required for this operation.
Procedure
Choose a method to unlock the account.
1 Check whether any administrator who has the permission to unlock accounts can log in to
the system.
– If yes, go to Step 2.
– If no, go to Step 6.
Unlock an account manually.
2 On the FusionStack, choose System Management > Rights Management.
The Rights Management page is displayed.
3 In the user list on the left, click User.
The User page is displayed.
4 Locate the row that contains the account to be unlocked, click Operation, and select Unlock
user.
An information dialog box is displayed.
5 Click OK.
The account is unlocked. The account is in the Normal status.
No further action is required.
Unlocking the account using a script.
6 Use PuTTY to log in to the active VRM.
Ensure that the management plane floating IP address and username gandalf are used to
establish the connection.
7 Run the following command and enter password of user root to switch to root user
interface:
su - root
8 Run the following command to disable logout on timeout:
TMOUT=0
9 Run the following command to switch to the /opt/galax/vrm/tomcat/script/omsconfig/bin
directory:
cd /opt/galax/vrm/tomcat/script/omsconfig/bin
10 Run the following command to run the script:
sh resetSystemManageUser.sh unlock
If the following information is displayed, the account is unlocked.
unlock user success.
----End
Scenarios
Delete an unused user account on the FusionStack. A user cannot delete their own account.
Prerequisites
Conditions
You have logged in to the FusionStack and are authorized to manage users.
Data
Data preparation is not required for this operation.
Procedure
Scenarios
View alarms on the FusionStack to detect and locate faults in a timely manner, improving system
stability.
Prerequisites
Conditions
You have logged in to the FusionStack.
Data
Data preparation is not required for this operation.
Procedure
View alarms.
1 On the FusionStack, choose Alarm.
The Alarms page is displayed.
2 Click Advanced.
Advanced search options are displayed.
3 Enter the search criteria.
Parameters available include Alarm severity, Alarm type, Date generated range, Object
type, Alarm object URN, Alarm ID, and Alarm name.
4 Click Search.
The query result is displayed.
View detailed alarm information.
5 Locate the row that contains the alarm you want to view, and click Alarm Name.
6 Detailed information about the alarm is displayed in the Alarm Details area at the lower
part.
7 Click the alarm ID.
An alarm handling guide is displayed. Follow the guide to clear the alarm.
8 Determine whether to export the alarm information and save it as a local file.
– If yes, go to Step 9.
– If no, no further action is required.
Export alarms.
5 Fault Management
Attribute
Alarm ID Alarm Severity
Parameters
Name Meaning
Cleared By Specifies the name of the operator who clears the alarm.
Update Time Specifies the time when the alarm occur time is updated.
Name Meaning
Integrated Component Alarm Specifies whether the object for which the alarm is generated
is an integrated component.
Alarm Object Name Specifies the name of the object for which the alarm is
generated.
Possible Causes
The license is about to expire.
Procedure
Update the license file.
1 Check whether the license is purchased.
– If yes, go to Step 3.
– If no, go to Step 2.
2 Apply for a license.
See the FusionCompute V100R003C00 License Operation Guide.
3 Updating the License File.
4 After 5 or 6 minutes, check whether the alarm is cleared.
– If yes, no further action is required.
– If no, contact technical support.
----End
Related Information
None
Description
The alarm module verifies the license validity between 00:00 to 02:00 every day. This alarm is
generated when the system detects that the license has expired for 60 days or more.
This alarm is cleared when a valid license file has been loaded to the system.
Attribute
15.1000078 Critical
Parameters
Name Meaning
Additional Information -
Cleared By Specifies the name of the operator who clears the alarm.
Update Time Specifies the time when the alarm occur time is updated.
Integrated Component Alarm Specifies whether the object for which the alarm is generated
is an integrated component.
Alarm Object Name Specifies the name of the object for which the alarm is
generated.
Possible Causes
The license has expired.
Procedure
Update the license file.
1 Check whether a new license is purchased.
– If yes, go to Step 3.
– If no, go to Step 2.
2 Apply for a license.
For details about how to apply for a license, see FusionCompute V100R003C00 License
Operation Guide.
3 Updating the License File.
4 After 5 or 6 minutes, check whether the alarm is cleared.
– If yes, no further action is required.
– If no, contact technical support.
----End
Related Information
None
Description
The alarm module checks the management services of a site every 20 seconds. This alarm is
generated when the system detects that the management services are interrupted, that is, the
Elastic Service Controller (ESC) module cannot access the Virtual Resource Management
(VRM) module.
Attribute
Parameters
Name Meaning
Additional Information Specifies the IP address of the server on which the cluster
management service is running.
Name Meaning
Cleared By Specifies the name of the operator who clears the alarm.
Update Time Specifies the time when the alarm occur time is updated.
Integrated Component Alarm Specifies whether the object for which the alarm is generated
is an integrated component.
Alarm Object Name Specifies the name of the object for which the alarm is
generated.
Possible Causes
l The network is faulty.
l The VRM service is not enabled or is disabled abnormally.
l The watchdog is abnormal.
Procedure
Check network status of the ESC and VRM.
1 Confirm information about the site whose network is disconnected.
You can obtain the ID of the site from Additional Information.
2 Locate the row that contains the alarm, and click Alarm Object.
The detailed information about this alarm object is displayed.
3 On the FusionStack, choose System > System Configuration, and view information about
the site listed on the displayed page, and obtain the management IP address of the site whose
ID is the same as that of the alarm site.
4 Use PuTTY to log in to the alarm object.
Ensure that the management IP address and username gandalf are used to establish the
connection.
5 Run the following command and enter the password of user root to switch to the user
root interface:
su - root
6 Run the following command to disable logout on timeout:
TMOUT=0
7 Check whether the communication between the ESC and the VRM is proper.
ping IP address of the VRM whose management services are interrupted
The communication is normal if the following information is displayed:
PING 192.100.41.10 (192.100.41.10) 56(84) bytes of data.
64 bytes from 192.100.41.10: icmp_seq=1 ttl=64 time=0.035 ms
64 bytes from 192.100.41.10: icmp_seq=2 ttl=64 time=0.028 ms
64 bytes from 192.100.41.10: icmp_seq=3 ttl=64 time=0.025 ms
Check whether the communication between the ESC and VRM is normal.
– If yes, go to Step 10.
– If no, go to Step 8.
8 Check network connection status in the equipment room to detect and rectify network faults.
9 After 2 or 3 minutes, view real-time alarms and check whether the alarm is cleared.
– If yes, no further action is required.
– If no, go to Step 10.
10 Use PuTTY to log in to the server listed in Step 1.
Ensure that the management IP address and username gandalf are used to establish the
connection.
11 Run the following command and enter the password of user root to switch to the user
root interface:
su - root
12 Run the following command to disable logout on timeout:
TMOUT=0
13 Run the following command to restart the VRM service:
service vrmd restart
14 After 2 or 3 minutes, view real-time alarms and check whether the alarm is cleared.
– If yes, no further action is required.
– If no, go to Step 15.
Check the status of the watchdog.
15 Run the following command to query the watchdog status:
sh /opt/galax/gcs/watchdog/watchdog.sh -query
16 Check whether the following information is displayed:
WatchDog daemon is running.
----End
Related Information
None
Description
The alarm module checks the communication between the Elastic Service Controller (ESC)
module and the Lightweight Directory Access Protocol (LDAP) database every 30 seconds. This
alarm is generated when the system detects that the ESC module cannot communicate with the
LDAP database.
This alarm is cleared when the communication between the ESC module and the LDAP database
becomes normal.
Attribute
Alarm ID Alarm Severity Auto Clear
Parameters
Name Meaning
Name Meaning
Cleared By Specifies the name of the operator who clears the alarm.
Update Time Specifies the time when the alarm occur time is updated.
Integrated Component Alarm Specifies whether the object for which the alarm is generated
is an integrated component.
Alarm Object Name Specifies the name of the object for which the alarm is
generated.
Possible Causes
l The LDAP database service is not enabled or is disabled abnormally.
l The watchdog is abnormal.
Procedure
Start the User Profile Function (UPF) service process manually.
1 Locate the row that contains the alarm, and click Alarm Object.
The detailed information about this alarm object is displayed.
2 On the FusionStack, choose System > Service Configuration, and obtain the management
IP address of the active ESC from the Service and Management Node page.
3 Use PuTTY to log in to the server listed in Step 2.
Ensure that the management IP address and username gandalf are used to establish the
connection.
4 Run the following command and enter the password of user root to switch to the user
root interface:
su - root
5 Run the following command to disable logout on timeout:
TMOUT=0
6 Run the following command to stop the UPF process:
service ldap stop
----End
Related Information
None
Description
The alarm module verifies the license validity between 00:00 to 02:00 every day. This alarm is
generated when the system detects that no license file has been loaded.
This alarm is cleared when a valid license file has been loaded to the system.
Attribute
Alarm ID Alarm Severity
15.1001005 Critical
Parameters
Name Meaning
Name Meaning
Cleared By Specifies the name of the operator who clears the alarm.
Update Time Specifies the time when the alarm occur time is updated.
Integrated Component Alarm Specifies whether the object for which the alarm is generated
is an integrated component.
Alarm Object Name Specifies the name of the object for which the alarm is
generated.
Possible Causes
The license file is not loaded to the system. As a result, the system cannot provide the functions
specified by the license.
Procedure
NOTE
----End
Related Information
None
Description
The alarm module checks the status of VM data recovery every 2 minutes during Elastic Service
Controller (ESC) start. This alarm is generated when the system detects that the recovering VM
data from the database fails or expires (the maximum duration is 15 minutes) when the ESC
starts.
Attribute
Alarm ID Alarm Severity Auto Clear
Parameters
Name Meaning
Alarm Object Specifies the physical or logical hierarchical relationship of the alarm
in the system.
SN Specifies the number assigned to the alarm based on the sequence that
the alarm is generated.
Name Meaning
Cleared By Specifies the name of the operator who clears the alarm.
Update Time Specifies the time when the alarm occur time is updated.
Possible Causes
Data recovery fails or expires.
Procedure
Confirm the IP address of the server reporting the alarm.
1 Locate the row that contains the alarm, and click Alarm Object.
The detailed information about this alarm object is displayed.
2 Obtain the management IP address of the active node from the Basic Information area.
Check the database service of the ESC.
3 Use PuTTY to log in to the server listed in Step 2.
Ensure that the management IP address and username gandalf are used to establish the
connection.
4 Run the following command and enter the password of user root to switch to the user
root interface:
su - root
5 Run the following command to disable logout on timeout:
TMOUT=0
6 Check whether the database is in the running status.
service postgresql status
– If yes, go to Step 9.
– If no, go to Step 7.
7 Run the following command to restart the database service:
service postgresql restart
8 After 2 or 3 minutes, view real-time alarms and check whether the alarm is cleared.
– If yes, no further action is required.
– If no, go to Step 9.
9 Run the following command to restart the ESC server:
sh /opt/setup/eucalyptus-cloud restart
10 After 2 or 3 minutes, view real-time alarms and check whether the alarm is cleared.
– If yes, no further action is required.
– If no, contact technical support.
----End
Related Information
None
Description
The alarm module checks the communication between the Elastic Service Controller (ESC) node
and the File Transfer Protocol (FTP) server every 5 minutes. The charging system communicates
with the FTP server and enables the charging bills saved in the ESC to be uploaded to the FTP
server. This alarm is generated when the system detects that the monitoring thread of the ESC
cannot connect to the FTP server.
This alarm is cleared when the monitoring thread properly connects to the FTP server.
Attribute
Parameters
Name Meaning
Additional Information Specifies the IP address and port number of the FTP server.
Name Meaning
Cleared By Specifies the name of the operator who clears the alarm.
Update Time Specifies the time when the alarm occur time is updated.
Integrated Component Alarm Specifies whether the object for which the alarm is generated
is an integrated component.
Alarm Object Name Specifies the name of the object for which the alarm is
generated.
Possible Causes
l The network between the ESC node and the FTP server is faulty.
l The FTP server is powered off or is faulty.
l The FTP service is abnormal.
Procedure
Check the network status of the ESC node and FTP server.
1 Obtain the IP address and port number of the FTP server from Additional Information in
the alarm list.
2 Locate the row that contains the alarm, and click Alarm Object.
The detailed information about this alarm object is displayed.
3 On the FusionStack, choose System > Service Configuration, and obtain the management
IP address of the active ESC from the Service and Management Node page.
4 Use PuTTY to log in to the alarm object listed in Step 3.
Ensure that the management IP address and username gandalf are used to establish the
connection.
5 Run the following command and enter the password of user root to switch to the user
root interface:
su - root
6 Run the following command to disable logout on timeout:
TMOUT=0
7 Run the following command:
ping IP address of the FTP server
The communication is normal if the following information is displayed:
PING 192.100.41.10 (192.100.41.10) 56(84) bytes of data.
64 bytes from 192.100.41.10: icmp_seq=1 ttl=64 time=0.035 ms
64 bytes from 192.100.41.10: icmp_seq=2 ttl=64 time=0.028 ms
64 bytes from 192.100.41.10: icmp_seq=3 ttl=64 time=0.025 ms
Check whether the communication between the ESC node and the FTP server is normal.
– If yes, go to Step 17.
– If no, go to Step 8.
8 On the FusionCompute, check whether ALM-15.1000204 Ethernet Port Status Abnormal
is generated for the server on the Alarms page.
– If yes, go to Step 9.
– If no, go to Step 11.
9 Handle the alarm by following the procedures in ALM-15.1000204 Ethernet Port Status
Abnormal.
10 After about 5 minutes, check whether the alarm is cleared.
– If yes, no further action is required.
– If no, go to Step 11.
Check the port status of the FTP server in the equipment room.
11 Check whether the FTP server is powered off or is faulty.
– If yes, go to Step 12.
– If no, go to Step 14.
12 Power on the FTP server or contact the hardware maintenance personnel to rectify the faulty
FTP server.
13 After about 5 minutes, check whether the alarm is cleared.
– If yes, no further action is required.
– If no, go to Step 14.
14 Check whether the server reporting the alarm is not properly connected to the FTP server.
– If yes, go to Step 15.
– If no, go to Step 17.
15 Reconnect the network cables.
16 After about 5 minutes, check whether the alarm is cleared.
– If yes, no further action is required.
– If no, go to Step 17.
Check the port status of the FTP server.
17 Use PuTTY to log in to the FTP server listed in Step 1.
Ensure that the management IP address and username root are used to establish the
connection.
18 Check whether the port on the FTP server is monitored.
When the port is monitored, the FTP service is enabled.
netstat -nlt | grep 22
NOTE
----End
Related Information
None
Description
The alarm module checks the communication between the Elastic Service Controller (ESC) node
and the Image Storage (IMGS) server every minute. This alarm is generated when the system
detects that the monitoring thread of the ESC cannot connect to the IMGS server.
This alarm is cleared when the monitoring thread properly connects to the IMGS server.
Attribute
Alarm ID Alarm Severity Auto Clear
Parameters
Name Meaning
Name Meaning
Cleared By Specifies the name of the operator who clears the alarm.
Update Time Specifies the time when the alarm occur time is updated.
Integrated Component Alarm Specifies whether the object for which the alarm is generated
is an integrated component.
Alarm Object Name Specifies the name of the object for which the alarm is
generated.
Possible Causes
l The network between the ESC node and the IMGS server is faulty.
l The IMGS server is powered off or is faulty.
Procedure
Check the network status of the ESC node and IMGS server.
1 Obtain the IP address of the IMGS server from Additional Information in the alarm list.
2 Locate the row that contains the alarm, and click Alarm Object.
The detailed information about this alarm object is displayed.
3 Use PuTTY to log in to the alarm object listed in Step 1.
Ensure that the management IP address and username gandalf are used to establish the
connection.
4 Run the following command and enter the password of user root to switch to the user
root interface:
su - root
5 Run the following command to disable logout on timeout:
TMOUT=0
6 Run the following command:
ping IP address of the IMGS server
The communication is normal if the following information is displayed:
PING 192.100.41.10 (192.100.41.10) 56(84) bytes of data.
64 bytes from 192.100.41.10: icmp_seq=1 ttl=64 time=0.035 ms
64 bytes from 192.100.41.10: icmp_seq=2 ttl=64 time=0.028 ms
64 bytes from 192.100.41.10: icmp_seq=3 ttl=64 time=0.025 ms
Check whether the communication between the ESC node and the IMGS server is normal.
– If yes, go to Step 10.
– If no, go to Step 7.
7 On the FusionCompute, check whether ALM-15.1000204 Ethernet Port Status Abnormal
is generated on the Alarm page.
– If yes, go to Step 8.
– If no, go to Step 10.
8 Handle the alarm by following the procedures in ALM-15.1000204 Ethernet Port Status
Abnormal.
9 After about 5 minutes, check whether the alarm is cleared.
– If yes, no further action is required.
– If no, go to Step 10.
Check the port status of the IMGS server in the equipment room.
10 Check whether the IMGS server is powered off or is faulty.
– If yes, go to Step 11.
– If no, go to Step 13.
11 Power on the IMGS server or contact the hardware maintenance personnel to rectify the
faulty IMGS server.
12 After about 5 minutes, check whether the alarm is cleared.
– If yes, no further action is required.
– If no, go to Step 13.
13 Check whether the server reporting the alarm is not properly connected to the IMGS server.
– If yes, go to Step 14.
– If no, go to Step 15.
14 Reconnect the network cables.
15 After about 5 minutes, check whether the alarm is cleared.
– If yes, no further action is required.
– If no, contact technical support.
----End
Related Information
None
Description
The alarm module checks the usage of the image storage space of the Image Storage (IMGS)
node every minute. This alarm is generated when the system detects that the usage of the image
storage space exceeds the threshold.
This alarm is cleared when the Elastic Service Controller (ESC) monitoring thread detects that
the usage of the image storage space is less than the threshold.
Attribute
Parameters
Name Meaning
Additional Information Identifies the image storage server and the image storage.
Cleared By Specifies the name of the operator who clears the alarm.
Update Time Specifies the time when the alarm occur time is updated.
Name Meaning
Integrated Component Alarm Specifies whether the object for which the alarm is generated
is an integrated component.
Alarm Object Name Specifies the name of the object for which the alarm is
generated.
Possible Causes
l Too many image files are stored in the image storage space of the IMGS.
Procedure
Check the image files stored in the image storage space of the IMGS.
1 Obtain the IP address of the IMGS server from Additional Information in the alarm list.
2 Use PuTTY to log in to the alarm object listed in Step 1.
Ensure that the management IP address of the IMGS server and username gandalf are used
to establish the connection.
3 Run the following command and enter the password of user root to switch to the user
root interface:
su - root
4 Run the following command to disable logout on timeout:
TMOUT=0
5 Run the following command:
df /image/
Information similar to the following is displayed:
Filesystem 1K-blocks Used Available Use% Mounted on
/dev/sda1 10317828 5408480 4385232 56% /
Check whether the usage exceeds the threshold (the default threshold is 80%).
– If yes, go to Step 6.
– If not, go to Step 7.
6 Deregister the unnecessary images on the ESC and delete unwanted image files from the
directory /image/.
7 After about 2 minutes, check whether the alarm is cleared.
– If yes, no further action is required.
– If no, contact technical support.
–
----End
Related Information
None
Description
The alarm module checks the usage of the data store registered in the Image Storage (IMGS)
node every minute. This alarm is generated when the system detects that the usage of the data
store is greater than the threshold.
This alarm is cleared when the Elastic Service Controller (ESC) monitoring thread detects that
the usage of all the data stores registered in the ESC is less than the threshold.
Attribute
Alarm ID Alarm Severity Auto Clear
Parameters
Name Meaning
Cleared By Specifies the name of the operator who clears the alarm.
Update Time Specifies the time when the alarm occur time is updated.
Name Meaning
Integrated Component Alarm Specifies whether the object for which the alarm is generated
is an integrated component.
Alarm Object Name Specifies the name of the object for which the alarm is
generated.
Possible Causes
l Too many VMs or disks are created on the data store.
Procedure
Check the usage of the data store in the ESC system.
1 In the alarm list, obtain the ID of the data store with insufficient space from Additional
Information.
2
Ensure that the username administrator is used to establish the connection.
3 On the FusionStack, select Service Cluster on the System Configuration page.
4 View the service clusters under Service Cluster, and select Data Store to view the space
usage of each data store.
5 Expand the capacity of the data store when its space usage is greater than the threshold
(80% by default). For details, see the data store capacity expansion guide. Or delete the
unnecessary VMs or disks from the data store in the system on which the VMs and disks
are created. Note that do not delete VMs or disks from the FusionCompute. Otherwise, data
inconsistency may occur between the ESC and the Virtual Resource Management (VRM).
Then check whether the alarm is cleared.
– If yes, no further action is required.
– If no, contact technical support.
–
----End
Related Information
None
Description
The alarm module checks the status of the software load balancing (SLB) VM on the Elastic
Service Controller (ESC) node. This alarm is generated when the system detects that the SLB
VM is unreachable.
This alarm is cleared when the ESC monitoring thread detects that the SLB VM is reachable.
Attribute
Parameters
Name Meaning
Additional Information Specifies the SLB VM for which the alarm is generated.
Alarm Object Specifies the physical or logical hierarchical relationship of the alarm
in the system.
SN Specifies the number assigned to the alarm based on the sequence that
the alarm is generated.
Cleared By Specifies the name of the operator who clears the alarm.
Update Time Specifies the time when the alarm occur time is updated.
Possible Causes
l The LB service process is abnormal.
l The operating system (OS) on the LB VM is faulty.
Procedure
12 For a process in the unused state, run the corresponding command as follows to restart it:
– Slb agent:service slbagentd restart
– Slb:service slbd restart
----End
Related Information
None
Description
This alarm is generated when the active node detects that the management network connection
of the standby node is abnormal.
This alarm is generated when the active node detects that the management network connection
of the standby node becomes normal.
Attribute
15.1002000 Critical
Parameters
Name Meaning
Alarm Object Name Specifies the name of the object for which the alarm is
generated.
Integrated Component Alarm Specifies whether the object for which the alarm is generated
is an integrated component.
Name Meaning
Update Time Specifies the time when the alarm occur time is updated.
Cleared By Specifies the name of the operator who clears the alarm.
Possible Causes
l The Computing Node Agent (CNA) where the standby node is located is powered off or
restarted.
l The operating system (OS) of the CNA where the standby node is located is faulty.
l The standby node is powered off or restarted.
l The OS of the standby node is faulty.
l The network is faulty.
Procedure
Obtain the data.
NOTE
The standby node described in this document refers to the standby node running on the current system, not
the default standby node configured during system installation.
a. Log in to the FusionCompute, choose VDC Management > VM and Template, and
click the VM tab. Click Advanced Search, enter the IP address of the standby node
in IP, and click Search to search the VMs on the standby node.
b. If the VM is in the stopped state, go to Step 19.
c. If the VM is in the running state, click the name of the VM to switch to the
Summary page. From Search under Basic Information, obtain the name of the CNA
where the VM is deployed.
d. Choose VDC Management > VM and Template, and click the Host tab. In the
Name text box, enter the name of the CNA where the standby node is located, click
Search to query the information about the CNA.
e. In the search result list, obtain the management IP address of the CNA from Host IP
Address, and the baseboard management controller (BMC) IP address of the CNA
from BMC IP. If the BMC IP address is null, contact the administrator to obtain the
BMC IP address of the CNA.
3 Go following steps if the node is deployed in physical mode.
a. Contact the administrator to obtain the BMC IP address of the standby node.
b. Open Internet Explorer on a local PC, enter http://BMC IP address of the standby
node in the address box, and press Enter.
c. Log in to the BMC system of the node as instructed.
d. If POWER OFF is displayed, power on the node.
e. If a message is displayed indicating that this OS is ready for login or the user has
logged in successfully, the OS status of the node is normal. After 5 minutes, check
whether the alarm is cleared. If yes, no further action is required. If no, contact
technical support.
f. If a message is displayed indicating that the OS is faulty, the node cannot be logged
in. Contact technical support.
4 Before clearing the alarm, contact administrator to obtain the data listed in Table 5-1.
11 In the toolbar of the remote control window, click and select Power on. After power-
on, go to Step 9.
12 Use PuTTY to log in to the CNA.
Ensure that the management IP address and username gandalf are used to establish the
connection.
13 Run the following command and enter password of user root to switch to root user
interface:
su - root
14 Run the following command to check whether the management IP address of the CNA is
reachable:
ping floating IP address of the node
15 Use PuTTY to log in to the active node.
Ensure that the management plane floating IP address and username gandalf are used to
establish the connection.
16 Run the following command and enter password of user root to switch to root user
interface:
su - root
17 Run the following command to check whether the floating IP address of the CNA can be
pinged:
ping management IP address of the target CNA
18 Confirm whether Step 14 and Step 17 are pinged.
– If yes, go to Step 19.
– If no, contact technical support.
Check the VM status.
19 Check whether the VM on the standby node is in the Stopped state.
– If yes, go to Step 20.
– If no, go to Step 21.
su - root
25 Run the following command:
The IP address obtained is the peer node management IP address configured in the software
monitoring process.
26 Check whether the management IP address is the same as that provided by the administrator.
– If yes, contact technical support.
– If no, go to Step 27.
27 Use PuTTY to log in to the active node.
Ensure that the management plane floating IP address and username gandalf are used to
establish the connection.
28 Run the following command and enter password of user root to switch to root user
interface:
su - root
29 Run the following command:
vi /opt/galax/gcs/watchdog/conf/haconfig.xml
30 Press i to enter editing mode.
In the opened file, change the value of peerIp to the management IP address of the standby
node provided by the administrator.
31 Press Esc and enter :wq to save the configuration and exit the vi editor.
32 Run the following command to restart the watchdog process:
service watchdog restart
33 After 5 minutes, choose VDC Monitoring > Alarm.
----End
Related Information
None
Description
This alarm is generated when the Network Time Protocol (NTP) service of the node or the
network between the node and the NTP is abnormal.
This alarm is cleared when the NTP service of the node and the network are functioning properly.
Attribute
Alarm ID Alarm Severity
15.1002006 Critical
Parameters
Name Meaning
Alarm Object Name Specifies the name of the object for which the alarm is
generated.
Integrated Component Alarm Specifies whether the object for which the alarm is generated
is an integrated component.
Name Meaning
Update Time Specifies the time when the alarm occur time is updated.
Cleared By Specifies the name of the operator who clears the alarm.
Possible Causes
l The NTP service on the node is abnormal.
l The network between the node and the external NTP server is faulty.
Procedure
1 Select the current alarm on the Alarm page, and view Alarm Object in Alarm Details.
2 Choose System Management > System Configuration, and click Service and
Management Node. View information about the management node, and obtain the IP
address of the node whose name is the same as that of the Alarm Object in Step 1.
3 Use PuTTY to log in to the node.
Ensure that the management IP address and username gandalf are used to establish the
connection.
4 Run the following command and enter password of user root to switch to root user
interface:
su - root
5 Run the following command to check the NTP service status:
ntpq -p
Determine the NTP service status according to the command output and go to the
corresponding step.
– If the information in the command output includes ntpq: read: Connection refused,
the NTP service on this node is abnormal. In this case, go to Step 9.
– If LOCAL is displayed in the remote column, the upper-layer clock source is not
configured in the system. In this case, contact the administrator to configure the clock
source.
remote refid st t when poll reach delay offset jitter
===========================================================================
===
*LOCAL(0) .LOCL. 5 l 32 64 377 0.000 0.000
0.001
– If the information in the remote column starts with *, the upper-layer clock source is
configured in the system, but the heartbeat communication is abnormal. In this case, go
to Step 6.
remote refid st t when poll reach delay offset jitter
===========================================================================
=== *172.19.1.64 132.239.1.6 2 u 8 64 377 51.743 400.912
119.378
NOTE
l The information in the remote column indicates the remote NTP server connected to the
local computer.
l The NTP server column whose value starts with * displayed in the remote column is the
upper-layer NTP server in use.
– If the value in the reach column is 0, the heartbeat communication between the current
node and the NTP server may be interrupted. In this case, go to Step 6.
– If information in the remote column of the command output does not start with *, the
NTP service is abnormal or a heartbeat communication may be interrupted. In this case,
go to Step 6.
6 Contact the administrator to check whether the NTP server is available. After the NTP
server functions properly, obtain the IP address of the NTP server, run the following
command to check whether the heartbeat communication between the node and the upper-
layer NTP server is normal.
ping NTP server IP address
– If the heartbeat communication is abnormal, go to Step 7.
– If the heartbeat communication is normal, go to Step 8.
7 Contact the administrator to check the network between the node and the NTP server. After
the heartbeat communication is restored, go to Step 8.
NOTE
Do not perform any configuration operations when the alarm is being cleared.
8 Run the date command on the node to obtain the system time and compare the time with
the NTP server time to check whether the time difference is greater than 60 seconds.
– If yes, choose Service Configuration on the system page, choose Configure Time
Zone > Forcibly Synchronize Time, click Forcibly Synchronize Time, and click
OK in the displayed dialog box. After 60 seconds, go to Step 10.
NOTE
Forcibly synchronizing the system time with the NTP server will cause the service processes on
the node to restart. Therefore, the services that are being provided will be interrupted during the
forcible time synchronization. In addition, configuration operations are forbidden during the
alarm clearing.
– If no, go to Step 9.
9 Run the following command to stop the NTP service:
service ntp stop
The NTP service is stopped if the following information is displayed:
Shutting down network time protocol daemon (NTPD) done
10 After 30 seconds, run the following command to obtain the synchronization cycle:
service ntp status
The value in the poll column of the command output indicates the synchronization cycle
in seconds.
If the information in the command output includes ntpq: read: Connection refused, go
to Step 12.
11 After five to ten synchronization cycles, check whether the alarm is cleared.
– If yes, no further action is required.
– If no, go to Step 12.
12 Contact technical support.
----End
Related Information
None
Attribute
Alarm ID Alarm Severity
15.1004000 Major
Parameters
Name Meaning
Additional Information -
Name Meaning
Cleared By Specifies the name of the operator who clears the alarm.
Update Time Specifies the time when the alarm occur time is updated.
Integrated Component Alarm Specifies whether the object for which the alarm is generated
is an integrated component.
Alarm Object Name Specifies the name of the object for which the alarm is
generated.
Possible Causes
l The system fails to obtain the ESN.
l The device where the Virtual Resource Management (VRM) node is deployed has been
replaced but no license file has been loaded.
l The license file is lost or corrupted.
Procedure
Check whether the system can obtain the ESN.
1 Check whether the system can obtain the ESN.
– If yes, go to Step 2.
– If no, contact technical support.
Check whether the device where the VRM is deployed has been replaced.
2 Contact the administrator and check whether the device where the VRM is deployed has
been replaced.
– If yes, obtain a new ESN and use the ESN to obtain a new license.
For details about how to obtain the ESN, see FusionCompute V100R003C00 License
Operation Guide.
– If no, go to Step 3.
Update the license file.
3 Check whether a new license is purchased.
– If yes, go to Step 5.
– If no, go to Step 4.
4 Apply for a license.
For details about how to apply for a license, see FusionCompute V100R003C00 License
Operation Guide.
5 Updating the License File.
6 After 5 or 6 minutes, check whether the alarm is cleared.
– If yes, no further action is required.
– If no, contact technical support.
----End
Related Information
None
Attribute
Alarm ID Alarm Severity
15.1007004 Critical
Parameters
Name Meaning
Name Meaning
Cleared By Specifies the name of the operator who clears the alarm.
Update Time Specifies the time when the alarm occur time is updated.
Integrated Component Alarm Specifies whether the object for which the alarm is generated
is an integrated component.
Alarm Object Name Specifies the name of the object for which the alarm is
generated.
Possible Causes
l The notify process stops abnormally.
l The notify process is faulty.
Procedure
Confirm the IP address of the faulty node.
1 Select the current alarm on the Alarm page, and view Alarm Object in Alarm Details.
2 Choose System > Service Configuration, and select Service and Management Node.
View information about the management nodes, and obtain the IP address of the node whose
name is the same as that of the Alarm Object in Step 1.
Restart the notify process.
3 Use PuTTY to log in to the node.
Ensure that the management IP address and username gandalf are used to establish the
connection.
4 Run the following command and enter password of user root to switch to root user
interface:
su - root
5 Run the following command to restart the process:
– If yes, go to Step 8.
– If no, go to Step 9.
8 After 2 or 3 minutes, view real-time alarms and check whether the alarm is cleared.
– If yes, no further action is required.
– If no, go to Step 9.
9 Contact technical support.
----End
Related Information
None
Description
The system checks the system time every 1 minute. This alarm is generated when the system
detects that the system time offset exceeds 1 minute.
Attribute
15.1007005 Major
Parameters
Name Meaning
Alarm Object Name Specifies the name of the object for which the alarm is
generated.
Name Meaning
Integrated Component Alarm Specifies whether the object for which the alarm is generated
is an integrated component.
Update Time Specifies the time when the alarm occur time is updated.
Cleared By Specifies the name of the operator who clears the alarm.
Possible Causes
l The administrator has changed the system time.
l The time on the clock source has changed.
l The administrator has changed the system time zone.
Procedure
Handle the alarm.
1 Select the current alarm on the Alarm page, and view Alarm Object in Alarm Details.
2 Choose System > Service Configuration, and select Service and Management Node.
View information about the management nodes, and obtain the IP address of the
management node whose name is the same as that of the Alarm Object in Step 1.
3 Use PuTTY to log in to the node.
Ensure that the management IP address and username gandalf are used to establish the
connection.
4 Run the following command and enter password of user root to switch to root user
interface:
su - root
5 On the System Management page, choose Service Configuration > Time
Configuration > Time Synchronization and obtain the IP address of the NTP server.
6 Check whether the NTP server is configured for the system.
– If yes, go to Step 7.
– If no, go to Step 10.
7 Run the ping NTP server IP address command to check whether the communication
between the node and the NTP server is normal.
– If yes, go to Step 8.
– If no, go to Step 14.
8 Run the sh /usr/sbin/ntpdate NTP server IP address && /sbin/hwclock -w command
to synchronize the time between the node and the NTP server.
9 Check whether the command out contains sntp: not enough valid responses received in
time.
sh /opt/galax/gms/common/config/restartPorcess.sh
11 Check whether the command output is as follows:
restart all process success.
----End
Related Information
None
Attribute
Alarm ID Alarm Severity
15.1007006 Critical
Parameters
Name Meaning
Alarm Object Name Specifies the name of the object for which the alarm is
generated.
Integrated Component Alarm Specifies whether the object for which the alarm is generated
is an integrated component.
Update Time Specifies the time when the alarm occur time is updated.
Cleared By Specifies the name of the operator who clears the alarm.
Possible Causes
l The clock synchronization process stops.
l The clock synchronization process is faulty.
Procedure
Restart the clock synchronization process.
1 Select the current alarm on the Alarm page, and view Alarm Object in Alarm Details.
2 Choose System > Service Configuration, and select Service and Management Node.
View information about the management nodes, and obtain the IP address of the
management node whose name is the same as that of the Alarm Object in Step 1.
3 Use PuTTY to log in to the node.
Ensure that the management IP address and username gandalf are used to establish the
connection.
4 Run the following command and enter password of user root to switch to root user
interface:
su - root
5 Run the following command to restart the clock synchronization process:
– If yes, go to Step 8.
– If no, go to Step 9.
8 After 2 or 3 minutes, check whether the alarm is cleared.
– If yes, no further action is required.
– If no, go to Step 9.
9 Contact technical support.
----End
Related Information
None
Attribute
Alarm ID Alarm Severity
15.1007007 Critical
Parameters
Name Meaning
Alarm Object Name Specifies the name of the object for which the alarm is
generated.
Integrated Component Alarm Specifies whether the object for which the alarm is generated
is an integrated component.
Update Time Specifies the time when the alarm occur time is updated.
Cleared By Specifies the name of the operator who clears the alarm.
Possible Causes
l The system timing service process stops.
l The system timing service process is faulty.
Procedure
Restart the system timing service process.
1 Select the current alarm on the Alarm page, and view Alarm Object in Alarm Details.
2 Choose System > Service Configuration, and select Service and Management Node.
View information about the management nodes, and obtain the IP address of the
management node whose name is the same as that of the Alarm Object in Step 1.
3 Use PuTTY to log in to the node.
Ensure that the management IP address and username gandalf are used to establish the
connection.
4 Run the following command and enter password of user root to switch to root user
interface:
su - root
5 Run the following command to restart the system timing service process:
– If yes, go to Step 8.
– If no, go to Step 9.
8 After 2 or 3 minutes, check whether the alarm is cleared.
– If yes, no further action is required.
– If no, go to Step 9.
9 Contact technical support.
----End
Related Information
None
Description
This alarm is generated when the system detects that the configuration channel client process
stops or is faulty.
This alarm is cleared when the configuration channel client process becomes normal.
Attribute
15.1007011 Critical
Parameters
Name Meaning
Cleared By Specifies the name of the operator who clears the alarm.
Update Time Specifies the time when the alarm occur time is updated.
Integrated Component Alarm Specifies whether the object for which the alarm is generated
is an integrated component.
Name Meaning
Alarm Object Name Specifies the name of the object for which the alarm is
generated.
Possible Causes
l The configuration channel client process stopped abnormally.
l The configuration channel client process is faulty.
Procedure
Confirm the IP address of the Virtual Resource Management (VRM) node.
1 Select the current alarm, and view Alarm Object in Alarm Details.
2 Choose System Management > Service Configuration, and click Service and
Management. View information about the management nodes, and obtain the IP address
of the node whose name is the same as that of the Alarm Object in Step 1.
Restart the configuration channel client process.
3 Use PuTTY to log in to the node.
Ensure that the management IP address and username gandalf are used to establish the
connection.
4 Run the following command and enter password of user root to switch to root user
interface:
su - root
5 Run the following command to restart the process:
– If yes, go to Step 8.
– If no, go to Step 9.
8 After 3 or 4 minutes, check whether the alarm is cleared.
– If yes, no further action is required.
– If no, go to Step 9.
9 Contact Huawei technical support.
----End
Related Information
None
Description
This alarm is generated when the system detects that the Network File Server (NFS) service on
the Image Storage (IMGS) server is abnormal.
Attribute
Parameters
Name Meaning
Additional Information Specifies the IP address of the object for which the alarm is
generated.
Cleared By Specifies the name of the operator who clears the alarm.
Update Time Specifies the time when the alarm occur time is updated.
Name Meaning
Integrated Component Alarm Specifies whether the object for which the alarm is generated
is an integrated component.
Alarm Object Name Specifies the name of the object for which the alarm is
generated.
Procedure
Restart the NFS process on the IMGS server.
1 On the FusionStack, locate the row that contains the alarm in the real-time alarm list, and
click Alarm Object.
2
The detailed information about this alarm object is displayed. Obtain the management IP
address of the alarm object from the Basic Information area.
3 Use PuTTY to log in to the alarm object listed in step 2. Ensure that the management IP
address and username gandalf are used to establish the connection. Run the su - root
command and enter the password of user root to switch to the user root interface:
4 Run the service nfsserver restart command to restart the process:
5 Run the service nfsserver status command to check the process status:
– If yes, go to Step 7.
– If no, contact technical support.
7 After 2 or 3 minutes, check whether the alarm is cleared.
– If yes, no further action is required.
– If no, contact technical support.
----End
Related Information
None
Description
This alarm is generated when the system detects that the Image Management (IMGM) process
is abnormal.
Attribute
Parameters
Name Meaning
Additional Information Specifies the IP address of the object for which the alarm is
generated.
Cleared By Specifies the name of the operator who clears the alarm.
Update Time Specifies the time when the alarm occur time is updated.
Integrated Component Alarm Specifies whether the object for which the alarm is generated
is an integrated component.
Name Meaning
Alarm Object Name Specifies the name of the object for which the alarm is
generated.
Procedure
Restart the IMGM process.
1 On the FusionStack, locate the row that contains the alarm in the real-time alarm list, and
click Alarm Object.
2
The detailed information about this alarm object is displayed. Obtain the management IP
address of the alarm object from the Basic Information area.
3 Use PuTTY to log in to the alarm object listed in step 2. Ensure that the management IP
address and username gandalf are used to establish the connection. Run the su - root
command and enter the password of user root to switch to the user root interface:
4 Run the service imgmd restart command to restart the process:
5 Run the service imgmd status command to check the process status:
6 Check whether the following information is displayed:
Result:normal runnning
– If yes, go to Step 7.
– If no, contact technical support.
7 After 2 or 3 minutes, check whether the alarm is cleared.
– If yes, no further action is required.
– If no, contact technical support.
----End
Related Information
None
Description
This alarm is generated when the system detects that the elastic computing service process on
the Elastic Service Controller (ESC) node is abnormal.
Attribute
Alarm ID Alarm Severity Auto Clear
Parameters
Name Meaning
Additional Information Specifies the IP address of the object for which the alarm is
generated.
Cleared By Specifies the name of the operator who clears the alarm.
Update Time Specifies the time when the alarm occur time is updated.
Integrated Component Alarm Specifies whether the object for which the alarm is generated
is an integrated component.
Alarm Object Name Specifies the name of the object for which the alarm is
generated.
Procedure
Restart the elastic computing process on the ESC node.
1 On the FusionStack, locate the row that contains the alarm in the real-time alarm list, and
click Alarm Object.
2
The detailed information about this alarm object is displayed. Obtain the management IP
address of the alarm object from the Basic Information area.
3 Use PuTTY to log in to the alarm object listed in step 2. Ensure that the management IP
address and username gandalf are used to establish the connection. Run the su - root
command and enter the password of user root to switch to the user root interface:
4 Run the service cloudd restart command to restart the process:
5 Run the service cloudd status command to check the process status:
6 Check whether the following information is displayed:
Checking for service cloud running
– If yes, go to Step 7.
– If no, contact technical support.
7 After 2 or 3 minutes, check whether the alarm is cleared.
– If yes, no further action is required.
– If no, contact technical support.
----End
Related Information
None
Description
This alarm is generated when the system detects that the User Profile Function (UPF) service
process is abnormal.
Attribute
Alarm ID Alarm Severity Auto Clear
Parameters
Name Meaning
Additional Information Specifies the IP address of the object for which the alarm is
generated.
Name Meaning
Cleared By Specifies the name of the operator who clears the alarm.
Update Time Specifies the time when the alarm occur time is updated.
Integrated Component Alarm Specifies whether the object for which the alarm is generated
is an integrated component.
Alarm Object Name Specifies the name of the object for which the alarm is
generated.
Procedure
Restart the UPF service process.
1 On the FusionStack, locate the row that contains the alarm in the real-time alarm list, and
click Alarm Object.
2
The detailed information about this alarm object is displayed. Obtain the management IP
address of the alarm object from the Basic Information area.
3 Use PuTTY to log in to the alarm object listed in step 2. Ensure that the management IP
address and username gandalf are used to establish the connection. Run the su - root
command and enter the password of user root to switch to the user root interface:
4 Run the service ldap restart command to restart the process:
5 Run the service ldap status command to check the process status:
6 Check whether the following information is displayed:
Checking for ldap: running
– If yes, go to Step 7.
– If no, contact technical support.
7 After 2 or 3 minutes, check whether the alarm is cleared.
– If yes, no further action is required.
– If no, contact technical support.
----End
Related Information
None
Description
This alarm is generated when the system detects that the elastic load balancing (ELB) service
process is abnormal.
Attribute
Alarm ID Alarm Severity Auto Clear
Parameters
Name Meaning
Additional Information Specifies the IP address of the object for which the alarm is
generated.
Name Meaning
Cleared By Specifies the name of the operator who clears the alarm.
Update Time Specifies the time when the alarm occur time is updated.
Integrated Component Alarm Specifies whether the object for which the alarm is generated
is an integrated component.
Alarm Object Name Specifies the name of the object for which the alarm is
generated.
Procedure
Restart the ELB service process.
1 On the FusionStack, locate the row that contains the alarm in the real-time alarm list, and
click Alarm Object.
2
The detailed information about this alarm object is displayed. Obtain the management IP
address of the alarm object from the Basic Information area.
3 Use PuTTY to log in to the alarm object listed in step 2. Ensure that the management IP
address and username gandalf are used to establish the connection. Run the su - root
command and enter the password of user root to switch to the user root interface:
4 Run the service elbd restart command to restart the process:
5 Run the service elbd status command to check the process status:
6 Check whether the following information is displayed:
Checking for service slb
Result:normal running
– If yes, go to Step 7.
– If no, contact technical support.
7 After 2 or 3 minutes, check whether the alarm is cleared.
– If yes, no further action is required.
– If no, contact technical support.
----End
Related Information
None
Attribute
Alarm ID Alarm Severity
15.1007099 Major
Parameters
Name Meaning
Additional Information -
Alarm Object Name Specifies the name of the object for which the alarm is
generated.
Integrated Component Alarm Specifies whether the object for which the alarm is generated
is an integrated component.
Update Time Specifies the time when the alarm occur time is updated.
Name Meaning
Cleared By Specifies the name of the operator who clears the alarm.
Possible Causes
l The remaining disk space on the node is insufficient.
l The FTP server is incorrectly configured.
l The network communication between the node and the FTP server is faulty.
l An error occurred when running the setConfig command to upload the FTP server
configurations.
Procedure
1 Select the current alarm on the Alarm page, and view Alarm Object in Alarm Details.
2 Choose System > Service Configuration, and select Service and Management Node.
View information about the management nodes, and obtain the IP address of the
management node whose name is the same as that of the Alarm Object in Step 1.
3 Use PuTTY to log in to the node.
Ensure that the management IP address and username gandalf are used to establish the
connection.
4 Run the following command and enter password of user root to switch to root user
interface:
su - root
5 Run the df -h /var/backup command to check whether the remaining storage space is
available on the node. If yes, delete unnecessary files in this directory, or transfer the
existing flies under this directory to other directories.
6 Check whether the FTP server is correctly configured.
7 Run the ping FTP server's IP address command to check whether the network connection
between the local PC and the FTP server is normal. If no, check the network configuration
and cable connection, and recover the network connection.
8 Run the setConfig command to check whether the FTP client is correctly configured. If
no, run this command again to configure the FTP client correctly.
9 Manually clear the alarm.
10 Run the cronBackupUpload command to back up data, and check whether this alarm is
generated again. If yes, go to Step 11.
----End
Related Information
None
Description
The license module checks the communication between the client and the license server every
5 minutes. This alarm is generated when the communication between the client and the license
server is interrupted for three consecutive times.
This alarm is cleared when the communication between the client and the license server becomes
normal.
Attribute
Alarm ID Alarm Severity
15.1008000 Major
Parameters
Name Meaning
Additional Information -
Cleared By Specifies the name of the operator who clears the alarm.
Name Meaning
Update Time Specifies the time when the alarm occur time is updated.
Integrated Component Alarm Specifies whether the object for which the alarm is generated
is an integrated component.
Alarm Object Name Specifies the name of the object for which the alarm is
generated.
Possible Causes
l The IP address configured for the license server is incorrect.
l The time on the client is inconsistent with that on the license server.
l The username and password configured for the license server may be incorrect.
Procedure
Check the license configuration on the client.
1 Check whether the IP address is correctly configured for the license server.
– If yes, go to Step 3.
– If no, go to Step 2.
2 Configure a correct IP address for the license server.
3 Check whether the time on the client is consistent with that on the license server.
– If yes, go to Step 4.
– If no, configure the time on the client and ensure it is consistent with that on the license
server.
4 Check whether the username and password configured for the license server is correct.
– If yes, contact technical support.
– If no, obtain the correct username and password of the license server, and configure
them for the license server again.
5 After 2 or 3 minutes, view real-time alarms and check whether the alarm is cleared.
– If yes, no further action is required.
– If no, contact technical support.
----End
Related Information
None
Description
The alarm module verifies the validity of the license for free upgrade service between 00:00 and
02:00 every day. This alarm is generated when the free upgrade service is about to expire in less
than 60 days.
This alarm is cleared when a valid license file has been loaded to the system.
Attribute
Alarm ID Alarm Severity
15.1008001 l Threshold for a warning alarm: 30 ≤ Remaining days before free upgrade
service expiration < 60
l Threshold for a minor alarm: 0 ≤ Remaining days before free upgrade service
expiration < 30
NOTE
The values 30 and 60 are the default alarm thresholds.
Parameters
Name Meaning
Cleared By Specifies the name of the operator who clears the alarm.
Update Time Specifies the time when the alarm occur time is updated.
Name Meaning
Integrated Component Alarm Specifies whether the object for which the alarm is generated
is an integrated component.
Alarm Object Name Specifies the name of the object for which the alarm is
generated.
Possible Causes
l The license for the free upgrade service is about to expire.
Procedure
Update the license for free upgrade service.
1 Check whether a new license is purchased.
– If yes, go to Step 3.
– If no, go to Step 2.
2 Apply for a new license.
For details about how to apply for a license, see FusionCompute V100R003C00 License
Operation Guide.
3 Updating the License File.
4 After 5 or 6 minutes, check whether the alarm is cleared.
– If yes, no further action is required.
– If no, contact technical support.
----End
Related Information
None
Description
The alarm module verifies the license validity during the hours from 00:00 to 02:00 every day.
This alarm is generated when the licensed free upgrade service has expired for at least 60 days.
This alarm is cleared when a valid license file is loaded to the system.
Attribute
15.1008002 Major
Parameters
Name Meaning
Cleared By Specifies the name of the operator who clears the alarm.
Update Time Specifies the time when the alarm occur time is updated.
Integrated Component Alarm Specifies whether the object for which the alarm is generated
is an integrated component.
Alarm Object Name Specifies the name of the object for which the alarm is
generated.
Possible Causes
l The free upgrade service has expired.
Procedure
Update the license for the free upgrade service.
1 Check whether the license for the free upgrade service is purchased.
– If yes, go to Step 3.
– If no, go to Step 2.
2 Apply for a license.
See the FusionCompute V100R003C00 License Operation Guide.
3 Updating the License File.
4 After 5 or 6 minutes, check whether the alarm is cleared.
– If yes, no further action is required.
– If no, contact technical support.
----End
Related Information
None
Attribute
Alarm ID Alarm Severity
15.3002005 Warning
Parameters
Name Meaning
Name Meaning