No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

HUAWEI CLOUD Stack 6.5.0 Alarm and Event Reference 04

Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
ALM-2013 Failed to Connect to the Service Center

ALM-2013 Failed to Connect to the Service Center

Description

This alarm is generated when cse-governance-service fails to connect to cse-service-center.

Attribute

Alarm ID

Alarm Severity

Alarm Type

2013

Major

Environmental alarm

Parameters

Parameter

Description

Namespace

Indicates the namespace of the service for which the alarm is generated.

ServiceName

Indicates the name of the service for which the alarm is generated.

InstanceName

Indicates the name of the service instance for which the alarm is reported.

NodeIp

Indicates the IP address of the host where the microservice instance is deployed.

Impact on the System

When the connection to the service center fails, some service governance functions are unavailable.

Possible Causes

  • A network fault occurs.
  • Domain name resolution fails.
  • The service center status is abnormal.

Procedure

  1. Use PuTTY to log in to the manage_lb1_ip node.

    The default username is paas, and the default password is QAZ2wsx@123!.

  2. Run the following command and enter the password of the root user to switch to the root user:

    su - root

    Default password: QAZ2wsx@123!

  3. Check whether the network is normal.

    1. Run the required commands to access the pod of the CSE service (for example, cse-governance-service-3753537994-rpmgf) for which the alarm is generated:

      kubectl get pod -n fst-manage | grep cse-governance-service

      kubectl -n fst-manage exec -it cse-governance-service-3753537994-rpmgf sh

    2. Run the required command in the pod to check whether the network is normal:

      curl -kv https://cse-service-center.fst-manage.svc.cluster.local:31100

      The network is normal if information similar to the following is displayed. If the network is abnormal, contact related personnel to rectify the network fault.

  4. Check the status of the service center.

    Log in to the manage_lb1_ip node and run the kubectl get pod -n fst-manage | grep service-center command to check the service status.

    • If the service center is abnormal, restore the service center by restarting the pod of the corresponding instance.

      Restart all pods of the cse-service-center service. The following uses the pod of cse-service-center-3608034112-ht6lx as an example to show how to restart a pod:

      kubectl delete pod -n fst-manage cse-service-center-3608034112-ht6lx

    • If the service center is normal, go to the next step.

  5. Check whether the Domain Name Service (DNS) resolution is normal.

    1. Check whether the /etc/resolv.conf permission and content of the pod are correct.

      If any user can read the /etc/resolv.conf file, the permission is normal.

      • If the /etc/resolv.conf file contains the following information, the file content is normal:
        search fst-manage.svc.cluster.local svc.cluster.local cluster.local
        nameserver 10.247.0.20
        options ndots:4
    2. If the DNS resolution is normal but the network connection fails, restart the service pod. If the alarm persists, contact IaaS engineers.

      The following uses the pod of cse-governance-service-3753537994-rpmgf as an example to describe how to restart a pod:

      kubectl delete pod -n fst-manage cse-governance-service-3753537994-rpmgf

      After the command is executed, the pod of cse-governance-service-3753537994-rpmgf is deleted and another pod whose name starts with cse-governance-service is generated.

  6. Check whether the alarm is cleared.

    • If yes, no further action is required.
    • If no, contact technical support for assistance.

Alarm Clearing

This alarm will be automatically cleared after the fault is rectified.

Related Information

None

Translation
Download
Updated: 2019-08-30

Document ID: EDOC1100062365

Views: 34043

Downloads: 31

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next