Network Function Virtualization over Cloud-Cloud Computing ...
Cloud Eye - User Guide
-
Upload
khangminh22 -
Category
Documents
-
view
2 -
download
0
Transcript of Cloud Eye - User Guide
Copyright © Huawei Technologies Co., Ltd. 2018. All rights reserved.No part of this document may be reproduced or transmitted in any form or by any means without prior writtenconsent of Huawei Technologies Co., Ltd. Trademarks and Permissions
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.All other trademarks and trade names mentioned in this document are the property of their respectiveholders. NoticeThe purchased products, services and features are stipulated by the contract made between Huawei and thecustomer. All or part of the products, services and features described in this document may not be within thepurchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,and recommendations in this document are provided "AS IS" without warranties, guarantees orrepresentations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in thepreparation of this document to ensure accuracy of the contents, but all statements, information, andrecommendations in this document do not constitute a warranty of any kind, express or implied.
Huawei Technologies Co., Ltd.Address: Huawei Industrial Base
Bantian, LonggangShenzhen 518129People's Republic of China
Website: http://www.huawei.com
Email: [email protected]
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
i
Contents
1 Product Introduction.....................................................................................................................11.1 What Is Cloud Eye?........................................................................................................................................................11.2 Advantages..................................................................................................................................................................... 21.3 Application Scenarios.....................................................................................................................................................31.4 Service Pricing................................................................................................................................................................31.5 Related Services............................................................................................................................................................. 41.6 Basic Concepts............................................................................................................................................................... 51.7 User Quota Restrictions..................................................................................................................................................6
2 Getting Started............................................................................................................................... 72.1 Monitoring Overview..................................................................................................................................................... 72.2 Server Monitoring...........................................................................................................................................................82.3 Using Website Monitoring..............................................................................................................................................92.4 Resource Groups...........................................................................................................................................................102.5 Basic Monitoring.......................................................................................................................................................... 112.5.1 Querying ECS Basic Metrics.....................................................................................................................................112.5.2 Querying Metrics of Other Cloud Services............................................................................................................... 13
3 Moitoring Panels......................................................................................................................... 163.1 Creating Panels............................................................................................................................................................. 163.2 Adding Graphs..............................................................................................................................................................163.3 Viewing Graphs............................................................................................................................................................ 173.4 Configuring Graphs...................................................................................................................................................... 183.5 Delete Graph.................................................................................................................................................................193.6 Deleting Panels............................................................................................................................................................. 19
4 Resource Groups..........................................................................................................................204.1 Creating Resource Groups............................................................................................................................................204.2 Viewing Resource Groups............................................................................................................................................ 214.2.1 Resource Group List..................................................................................................................................................214.2.2 Resource Overview....................................................................................................................................................224.2.3 Unhealthy Resources................................................................................................................................................. 234.2.4 Alarm Rules...............................................................................................................................................................234.2.5 Alarm History............................................................................................................................................................ 234.3 Managing Resource Groups......................................................................................................................................... 24
Cloud EyeUser Guide Contents
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
ii
4.3.1 Modifying Resource Groups..................................................................................................................................... 244.3.2 Deleting Resource Groups.........................................................................................................................................24
5 Server Monitoring....................................................................................................................... 265.1 Agent Features Across Versions................................................................................................................................... 265.2 Installing and Configuring the Agent........................................................................................................................... 275.2.1 Using Cloud-Init to Automatically Install and Configure the Agent (Linux)........................................................... 285.2.2 Installing and Configuring the Agent (Linux)...........................................................................................................305.2.2.1 Adding a DNS Server Address...............................................................................................................................305.2.2.2 Installing the Agent................................................................................................................................................ 335.2.2.3 Manually Configuring the Agent............................................................................................................................355.2.3 Installing and Configuring the Agent (Windows)..................................................................................................... 375.3 Installing Agents in Batches on ECSs Running Linux OSs......................................................................................... 385.4 Managing the Agent..................................................................................................................................................... 415.4.1 Managing the Agent (Linux)..................................................................................................................................... 415.4.2 Managing the Agent (Windows)................................................................................................................................425.5 Installing the GPU and RAID Metric Collection Plug-in.............................................................................................425.6 Viewing Graphs............................................................................................................................................................ 445.7 Creating Alarm Rules................................................................................................................................................... 465.8 Process Monitoring.......................................................................................................................................................48
6 Custom Monitoring.....................................................................................................................52
7 Website Monitoring.................................................................................................................... 537.1 Creating Monitors.........................................................................................................................................................547.2 Creating Alarm Rules................................................................................................................................................... 577.3 Viewing Website Monitoring........................................................................................................................................607.4 Managing Website Monitoring..................................................................................................................................... 607.4.1 Modifying Monitors.................................................................................................................................................. 617.4.2 Disabling Monitors.................................................................................................................................................... 617.4.3 Enabling Monitors..................................................................................................................................................... 617.4.4 Deleting Monitors......................................................................................................................................................61
8 Log Monitoring............................................................................................................................ 628.1 Specifying a Custom Metric Filter............................................................................................................................... 628.2 Viewing Graphs............................................................................................................................................................ 63
9 Event Monitoring.........................................................................................................................649.1 Viewing Graphs............................................................................................................................................................ 649.2 Creating Alarm Rules................................................................................................................................................... 65
10 Viewing Alarm History............................................................................................................ 6810.1 Configuring Data Storage...........................................................................................................................................6810.2 Viewing Raw Data......................................................................................................................................................69
11 Using the Alarm Function........................................................................................................7211.1 Creating Alarm Notification Topics........................................................................................................................... 72
Cloud EyeUser Guide Contents
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
iii
11.1.1 Creating Topics........................................................................................................................................................ 7211.1.2 Adding Subscriptions...............................................................................................................................................7411.2 Creating Alarm Rules................................................................................................................................................. 7411.2.1 Using Alarm Templates to Create Alarm Rules...................................................................................................... 7511.2.2 Creating a Custom Alarm Rule for a Specific Metric............................................................................................. 7711.3 Example: Creating an Alarm Rule to Monitor ECS CPU Usage............................................................................... 8011.4 Viewing the Alarm History.........................................................................................................................................81
12 Alarm Rule Management.........................................................................................................8312.1 Modifying Alarm Rules..............................................................................................................................................8312.2 Disabling Alarm Rules............................................................................................................................................... 8512.3 Enabling Alarm Rules................................................................................................................................................ 8512.4 Deleting Alarm Rules................................................................................................................................................. 86
13 Alarm Templates....................................................................................................................... 8713.1 Viewing Alarm Templates.......................................................................................................................................... 8713.2 Creating Custom Templates........................................................................................................................................8713.3 Modifying Custom Templates.................................................................................................................................... 9013.4 Deleting Custom Templates........................................................................................................................................90
14 Auditing Operation Records on Cloud Eye......................................................................... 9114.1 Key Cloud Eye Operations......................................................................................................................................... 9114.2 Viewing Cloud Eye Logs............................................................................................................................................92
15 Services Supported by Cloud Eye.......................................................................................... 9415.1 Computing.................................................................................................................................................................. 9415.1.1 ECS Metrics.............................................................................................................................................................9415.1.2 BMS Metrics............................................................................................................................................................9615.1.2.1 Metrics Under Basic Monitoring..........................................................................................................................9615.1.2.2 OS Monitoring Metrics.........................................................................................................................................9815.1.3 AS Metrics............................................................................................................................................................. 11015.2 Storage...................................................................................................................................................................... 11115.2.1 EVS Metrics...........................................................................................................................................................11215.2.2 OBS Metrics.......................................................................................................................................................... 11215.2.3 SFS Metrics............................................................................................................................................................11315.3 Network.................................................................................................................................................................... 11315.3.1 VPC Metrics.......................................................................................................................................................... 11415.3.2 ELB Metrics...........................................................................................................................................................11415.3.3 NAT Gateway Metrics........................................................................................................................................... 11615.4 Security..................................................................................................................................................................... 11615.4.1 WAF Metrics..........................................................................................................................................................11615.5 Application................................................................................................................................................................11715.5.1 DMS Metrics..........................................................................................................................................................11715.5.2 FunctionGraph Metrics.......................................................................................................................................... 11915.5.3 API Gateway Metrics.............................................................................................................................................119
Cloud EyeUser Guide Contents
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
iv
15.6 Database....................................................................................................................................................................12015.6.1 RDS Metrics.......................................................................................................................................................... 12015.6.2 DDS Metrics.......................................................................................................................................................... 12715.6.3 DCS Metrics.......................................................................................................................................................... 13615.6.4 DDM Metrics.........................................................................................................................................................14415.7 Migration.................................................................................................................................................................. 14415.7.1 CDM Metrics.........................................................................................................................................................14415.8 Enterprise Intelligence..............................................................................................................................................14515.8.1 DWS Metrics......................................................................................................................................................... 14515.8.2 MLS Metrics..........................................................................................................................................................14615.8.3 CloudTable Service Metrics.................................................................................................................................. 14715.8.4 AIS Metrics............................................................................................................................................................14915.8.5 Prediction Service Metrics.....................................................................................................................................15315.8.6 Elasticsearch Metrics.............................................................................................................................................15415.9 Enterprise Applications............................................................................................................................................ 15415.9.1 Workspace Metrics................................................................................................................................................ 154
16 Operations Supported by Event Monitoring..................................................................... 156
17 FAQs...........................................................................................................................................16117.1 Concepts................................................................................................................................................................... 16117.1.1 What Is Cloud Eye?...............................................................................................................................................16117.1.2 What Alarm Status Does Cloud Eye Support?......................................................................................................16117.1.3 What Is Rollup?..................................................................................................................................................... 16117.1.4 How Long Is the Metric Data Retained?............................................................................................................... 16217.1.5 How Many Rollup Methods Does Cloud Eye Support?........................................................................................16217.1.6 What Is Server Monitoring?.................................................................................................................................. 16317.1.7 What OSs Does the Agent Support?......................................................................................................................16317.1.8 What ECS Metrics Can Be Monitored by OS Monitoring?.................................................................................. 16417.1.9 How Do I Upgrade the Agent?.............................................................................................................................. 17617.1.10 Why Is the Metric Collection Point Lost During Certain Period of Time?.........................................................17717.2 Usages.......................................................................................................................................................................17717.2.1 What Is an Alarm Notification? How Many Types of Alarm Notifications Exist? How Can I Configure Them?.......................................................................................................................................................................................... 17717.2.2 Why Are the Network Traffic Metrics in Cloud Eye Different from Those Detected in ECS?............................17817.2.3 What Are the Effects on ECS Metrics If vmtools Is Not Installed on ECSs?....................................................... 17817.2.4 How Can I Export Monitoring Data?.................................................................................................................... 17817.2.5 Under What Circumstances Will an Alarm Rule Trigger "Insufficient data"?......................................................17917.2.6 How do I Handle the Garbled CSV File If I Open It with Excel?.........................................................................17917.2.7 Why I Cannot See the Monitoring Data on the Cloud Eye Console After Purchasing Cloud Service Resources?.......................................................................................................................................................................................... 17917.2.8 How Can I Ensure the Newly Purchased ECS Has the OS Monitoring Function?...............................................18017.2.9 Why the Cloud Eye Console Does Not Display the OS Monitoring Data or the Data Display Is Lagged AfterAgent Is Installed and Configured on ECS?.....................................................................................................................181
Cloud EyeUser Guide Contents
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
v
17.2.10 What Should I Do if Plug-in Status Is Faulty?.................................................................................................... 18217.2.11 Restoring the Plug-in Configuration....................................................................................................................18217.2.11.1 Servers Without Agency Configured................................................................................................................18217.2.11.2 Current Agency Permission Being Abnormal.................................................................................................. 18417.2.11.3 Current Agency Being Expired.........................................................................................................................18517.2.12 Permission Being Abnormal................................................................................................................................18517.2.13 Agencies Cannot Be Created...............................................................................................................................18517.2.14 Agencies Being Used...........................................................................................................................................18617.2.15 What Should I do If the Service Port Is Used by the Agent?.............................................................................. 186
A Change History......................................................................................................................... 187
Cloud EyeUser Guide Contents
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
vi
1 Product Introduction
1.1 What Is Cloud Eye?Cloud Eye is a multi-dimensional resource monitoring platform. With Cloud Eye, you canunderstand the resource usage and running status of services running on the cloud platform,receive alarm notifications in a timely manner, and react to changes to keep your servicesrunning smoothly. Figure 1-1 shows the Cloud Eye architecture.
Figure 1-1 Cloud Eye architecture
Cloud Eye provides the following functions:
l Automatic Monitoring: Monitoring starts automatically after Elastic Cloud Servers(ECSs) or Auto Scaling (AS) groups are created. After deploying a cloud service, youcan view the service running status and set alarm rules on the Cloud Eye console.
l Server Monitoring: After installing the Agent (Telescope) on an ECS or BMS, you cancollect 10-second granularity ECS or BMS monitoring data in real-time. 40 metrics, suchas CPU, memory, and disk metrics, are provided. For details, see Server Monitoring.
l Flexible Alarm Rule Configuration: You can create alarm rules for multiple resources atthe same time. After an alarm rule is created, you can flexibly manage it, for example atany time you can modify, enable, disable, or delete it.
l Real-time Notification: You can enable Simple Message Notification (SMN) whencreating alarm rules. When the cloud service status changes and the monitoring data of
Cloud EyeUser Guide 1 Product Introduction
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
1
the metric reaches the threshold specified in an alarm rule, Cloud Eye notifies you bytext messages, emails, or by sending messages to server addresses. In this way, you canmonitor the cloud resource status and changes in real time.
l Monitoring Panel: The panel enables you to view cross-service and cross-dimensionmonitoring data. It displays key metrics centrally, providing an overview of the serviceoperating status and allowing monitoring details to be checked when troubleshooting.
l OBS Dump: Raw monitoring data of metrics is kept for only two days on Cloud Eye. Ifyou need permanent data storage, enable Object Storage Service (OBS), and rawmonitoring data will be saved to OBS synchronously and permanently.
l Resource Groups: This function enables management of resources based on services,including management of ECSs, EVS disks, elastic IP addresses, bandwidth, anddatabases. Resources of different types, alarm rules, and alarm history are managedbased on service, helping to improve O&M efficiency.
l Website Monitoring: It simulates real user access to websites and continuously monitorswebsite status, such as availability and connectivity.
l Log Monitoring: It enables you to monitor log content in real time. You can use bothCloud Eye and Log Tank Service (LTS) to collect log content monitoring statistics, setalarm rules for logs, and perform other log-related operations.
1.2 Advantages
Automatic ProvisioningAfter registration on the cloud platform has been completed, Cloud Eye is enabledautomatically. You can view the service running status and set alarm rules on the Cloud Eyeconsole after deploying a cloud service.
Real-time and Reliable MonitoringRaw monitoring data is reported to Cloud Eye in real time to realize real-time monitoring forcloud services.
Alarms are generated and triggered in real time to provide you with real-time notifications.
Visualized MonitoringCloud Eye monitoring panels provide you with rich monitoring graphs, in which dataautomatic refresh and multi-metric comparison are supported, meeting your requirements formonitoring data virtualization.
Various Notification TypesYou can enable the SMN service when creating alarm rules. When the metric data reaches thethreshold specified in an alarm rule, Cloud Eye notifies you by sending emails and textmessages, so that the cloud resource status can be monitored in a timely manner. Cloud Eyecan also send HTTP/HTTPS requests to server addresses, helping you build smart programsto handle alarms.
Alarm Rule Creation in BatchesAlarm templates allow you to quickly create alarm rules for multiple cloud services.
Cloud EyeUser Guide 1 Product Introduction
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
2
1.3 Application Scenarios
Web Services
Cloud Eye monitors many metrics, including metrics for CPU, disk I/O, and network traffic,to ensure the reliability of your services.
Applications
You can use APIs to report custom metrics to Cloud Eye.
Optimized O&M
Leveraging flexible alarm rules and notification types of Cloud Eye, you can receive CloudEye notifications for resource changes, and integrate these notification messages to the O&Msystem to resolve the application availability issue and intelligently respond to resourcechanges.
1.4 Service PricingCloud Eye basic functions, such as viewing monitoring panels, creating alarm rules, andadding monitoring items, are free of charge. Cloud Eye may interconnect with other cloudservices to provide you with value-added services such as monitoring data file dump andalarm notification. These value-added services may incur extra fees, which are settled byservices that provide such functions.
Generally, the value-added service fee is low. Therefore, you are advised to use them asrequired.
The following are some value-added services:
l Dumping monitoring data files: Object Storage Service (OBS) is required. The dumpedmonitoring data files are saved permanently.
l Sending an alarm notification: Simple Message Notification (SMN) is required. Whenthe status change of the cloud service triggers the threshold set in the alarm rule, CloudEye sends an email, short message, HTTP, or HTTPS request to notify users.
Value-added services are charged as follows:
l Object Storage Service (OBS)OBS is charged in the pay per use mode or by month/year. You can select a chargingmode based on your actual needs. OBS is charged in the pay per use mode (based on thehourly rate of storage capacity) by default. You can also purchase a monthly/yearlysubscription package to obtain more preferences.Since Cloud Eye frequently accesses the OBS bucket that dumps event files, the OBSbucket of the standard storage type must be selected. For price details, see Product PriceDetails.
l Simple Message Notification (SMN)The SMN service is charged based on text messages, emails, HTTP, and HTTPS. Fordetails about the price, see Product Price Details.
Cloud EyeUser Guide 1 Product Introduction
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
3
1.5 Related ServicesOnce you start to use Cloud Eye, the system automatically identifies cloud services enabledon the current cloud platform, captures their key metrics, and reports monitoring data of thesemetrics to Cloud Eye.
At present, Cloud Eye supports automatic monitoring of the following metrics:
Computing
l ECS Metricsl BMS Metrics
NOTE
The Agent is required.
l AS Metrics
Storage
l EVS Metricsl OBS Metricsl SFS Metrics
Network
l VPC Metricsl ELB Metricsl NAT Gateway Metrics
Security
WAF Metrics
Application
l DMS Metricsl FunctionGraph Metricsl API Gateway Metrics
Database
l RDS Metricsl DDS Metricsl DCS Metricsl DDM Metrics
Migration
CDM Metrics
EI Enterprise Intelligence
Cloud EyeUser Guide 1 Product Introduction
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
4
l DWS Metricsl MLS Metricsl CloudTable Service Metricsl AIS Metricsl Prediction Service Metricsl Elasticsearch Metrics
Enterprise Application
l Workspace Metrics
1.6 Basic ConceptsThe following concepts are central to your understanding and use of Cloud Eye:
l Metricsl Rollupl Monitoring Panelsl Topicsl Alarm Rulesl Alarm Templates
Metrics
Metrics are the core concept in Cloud Eye. A metric refers to a quantized value of a resourcedimension on the cloud platform, such as the ECS CPU usage and memory usage. A metric isa time-dependent variable that generates a series of monitoring data over time. It helps youunderstand the metric changes over a specified period of time.
Rollup
Rollup is the process in which Cloud Eye calculates the average, maximum, minimum, sum,or variance value based on sample raw data reported by each cloud service in specific periods.The calculation period is called rollup period. Currently, Cloud Eye supports five rollupperiods: 5 minutes, 20 minutes, 1 hour, 4 hours, and 24 hours.
Monitoring Panels
Monitoring panels allow you to view monitoring data of custom metrics of different servicesand dimensions. It displays metrics of key services in a centralized way, so that you can get anoverview of the service running status and check monitoring details when troubleshooting.
Topics
Topics are specified event for message publishing or notification subscription in SMN. Topicsprovide you with one-to-many publish subscription and message notification functions. Youcan send messages to different types of endpoints with only one message request. With SMN,Cloud Eye uses various methods to notify you of cloud service resource changes, helping youtrack running status of cloud services in a timely manner.
Cloud EyeUser Guide 1 Product Introduction
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
5
Alarm RulesIn an alarm rule, you can set the threshold for a cloud service metric. When the status (such asAlarm, OK, Insufficient data, and Disabled) of the alarm rule changes, Cloud Eye notifiesyou by sending emails, text messages, or by sending HTTP/HTTPS requests, avoiding serviceloss due to resource problems.
Alarm TemplatesAn alarm template contains one or more alarm rules for a specific service. It can help youquickly create alarm rules for multiple cloud services. This also improves the workingefficiency of the O&M personnel.
1.7 User Quota RestrictionsThe following are user quota restrictions on Cloud Eye.
Table 1-1 User quotas
Quota Type Default Limit
Number of alarm rules that can be created 1000
Number of custom alarm templates that can be created 50
Number of alarm rules that can be added to an alarmtemplate
20
Number of monitoring panels that can be created 10
Number of monitoring items that can be created on amonitoring panel
24
Time that the alarm history can be kept 30 days
Number of topics that can be selected 5
Number of resource groups that can be created 10
Number of monitors that can be created 20
Cloud EyeUser Guide 1 Product Introduction
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
6
2 Getting Started
2.1 Monitoring OverviewThe Monitoring Overview page provides the following modules, helping you track theresource usage and alarms in real time.
Resource Overview
Displays the total number of monitored cloud service resources and alarms generated for theseresources in the current account.
Alarm Statistics
Displays the alarm trend for the last seven days and the number of alarms of each severity.
After you click an alarm severity, the Alarm Rules page is displayed, showing all alarm rulesof the corresponding severity.
Server Monitoring
Displays the CPU usage distribution chart of all monitored ECSs and a list of the top 5 ECSs,ranked by their CPU usage over the last 5 minutes.
Clicking on an ECS takes you to the corresponding Basic Monitoring page.
NOTE
To view ECS monitoring data, you need to purchase ECSs. For details, see section Purchasing andLogging In to a Windows ECS and Purchasing and Logging In to a Linux ECS.
Network Monitoring
Displays information about the network speed of the current VPC, displaying the upstreamand downstream bandwidth for the last 5 minutes.
NOTE
To view network monitoring data, you need to apply for a VPC and bind an EIP or bandwidth. Fordetails, see section Creating a VPC.
Cloud EyeUser Guide 2 Getting Started
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
7
Storage MonitoringDisplays information about disk usage for the last five minutes by displaying the disk readand write rates in addition to the disk read and write requests.
NOTE
To view storage monitoring data, you need to purchase an EVS disk. For details, see section Purchasingan EVS Disk.
Website MonitoringDisplays website status data, such as availability and connectivity.
Based on data from the last 1 hour, a list of the five slowest websites, ranked by responsetime, is displayed. This helps you better understand the overall website performance andhandle exceptions promptly.
2.2 Server MonitoringServer Monitoring includes Basic Monitoring, OS Monitoring, and Process Monitoring.
l Basic Monitoring automatically reports ECS or BMS metrics to Cloud Eye.l By installing the Agent on an ECS or BMS, OS Monitoring provides server monitoring
that is system-wide, active, and fine-grained.l Process Monitoring is used to monitor active processes on a host.
Functionsl Various Metrics
Server Monitoring covers more than 40 metrics, such as metrics for CPU, memory,disk, and network, to meet the basic monitoring and O&M requirements for servers.
l Fine-grained MonitoringAfter the Agent is installed, data of all metrics is reported once every 10 seconds.
l Process MonitoringCPU usage, memory usage, and number of opened files used by active processes aremonitored to facilitate your understanding of the resource usages on ECSs or BMSs.
Using Server Monitoring1. Log in to the management console.2. Under Management & Deployment, click Cloud Eye.3. In the navigation pane, choose Server Monitoring.4. Select the target ECS or BMS and install the Agent on it. For details, see section
Installing and Configuring the Agent.
Cloud EyeUser Guide 2 Getting Started
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
8
Figure 2-1 Selecting an ECS
5. 1 or 5 minutes later, click View Graph in the Operation column on the right of the ECSto view the monitoring data.
2.3 Using Website Monitoring
ScenariosWebsite monitoring is used to simulate real users' access to remote servers to detect theavailability and connectivity of remote servers.
Website monitoring can detect the availabilities of domain names and IP addresses, accessresponse time, and packet loss rate, and generate alarms for monitoring results.
Creating Monitors1. Log in to the management console.2. Under Management & Deployment, click Cloud Eye.3. In the navigation pane, choose Website Monitoring.4. On the Website Monitoring page, click Create Monitor in the upper right corner.
For details about parameters for creating a monitor, see section Creating Monitors.
Viewing Website Monitoring1. Log in to the management console.2. Under Management & Deployment, click Cloud Eye.3. In the navigation pane, choose Website Monitoring.4. On the Website Monitoring page, information of all monitors is displayed, including
name, monitoring frequency, status, and response time.5. On the Website Monitoring page, locate the row that contains the target website and
click View Graph in the Operation column.For details about how to view website monitoring details, see section Viewing WebsiteMonitoring.
Cloud EyeUser Guide 2 Getting Started
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
9
Figure 2-2 View Graph
Figure 2-3 Website Monitoring
2.4 Resource Groups
Scenariosl Managing Resources from the Business Perspective
Resource groups are used to classify resources of cloud accounts by business and querymonitoring and alarm information from the business perspective.
l Routine Inspection and Quick Fault LocatingWith Resource Groups, you can see resource overview, list of unhealthy resources,alarm rules, and alarm history. This feature helps you view cloud resource usage andquickly locate fault resources and causes after receiving notifications.
Functionsl Cross-product resource groups enable you to manage your cloud resources from the
business perspective.l The list of unhealthy resources enables you to quickly locate faults.l The alarm history list helps you track the overall business running status.
Using Resource Groups1. Log in to the management console.2. Under Management & Deployment, click Cloud Eye.
Cloud EyeUser Guide 2 Getting Started
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
10
3. In the navigation pane, choose Resource Groups.4. In the upper right corner, click Create Resource Group and enter the group name as
prompted.5. Select the target cloud service resources.6. Click Create.
For details about how to create and manage resource groups, see section ResourceGroups.
2.5 Basic MonitoringCloud Eye monitors metrics of services running on the cloud, helping users fully understandthe resource usages on the cloud platform and to deal with possible problems to avoid servicelosses.
ECSs are the basis of cloud service running. Therefore, tiny changes of ECSs performancemay cause service flapping or even shutdowns. Therefore, Cloud Eye provides ECSs withbasic monitoring and OS monitoring of two different monitoring granularities. For detailsabout the differences between the two types of monitoring, see Table 2-1.
NOTE
Currently, Server Monitoring is available only in CN North-Beijing1 (cn-north-1), CN South-Guangzhou (cn-south-1), and CN East-Shanghai2 (cn-east-2). For other regions, this function will beavailable soon.
Table 2-1 Differences between ECS basic monitoring and OS monitoring
MonitoringType
Monitoring Interval
Metric ApplicationScenarios
Prerequisite
Basicmonitoring
5 minutes Ten metrics such asCPU usage, memoryusage, disk usage,and disk read rate
Routinemonitoring
Automaticmonitoring
OS monitoring 10 seconds 40 metrics such asCPU usage, memoryusage, and diskusage
Service peaks You need toinstall theAgent first.
For other cloud services, Cloud Eye provides detailed and comprehensive metrics based onthe attribute of each cloud service. For example, Cloud Eye monitors upstream bandwidth,downstream bandwidth, upstream traffic, and downstream traffic for VPC.
2.5.1 Querying ECS Basic MetricsCloud Eye automatically associates with and monitors ECSs you purchased. Currently, CloudEye supports ECS basic monitoring and OS monitoring.
l Basic Monitoring is enabled upon the ECS purchase.l OS Monitoring provides system-wide, active, and fine-grained monitoring for ECSs. It
requires an open source plug-in to be installed on the ECSs that will be monitored.
Cloud EyeUser Guide 2 Getting Started
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
11
This section describes how to view ECS basic metrics on Cloud Eye.
Using ECS Basic Monitoring1. Log in to the management console.
2. Under Management & Deployment, click Cloud Eye.
3. In the navigation pane on the left, choose Server Monitoring. Locate the target ECS andclick View Monitoring Graph in the Operation column.
4. Click Basic Monitoring.
On the displayed Basic Monitoring page, you can view ECS graphs based on rawmonitoring data collected in the 1h, 3h, or 12h. In the upper right corner of the graph,the maximum and minimum values of the metric in the corresponding time periods aredynamically displayed.
Figure 2-4 Basic Monitoring
NOTE
By default, a maximum of nine graphs can be displayed on one page. If the number of metrics of aservice resource is more than nine, you can click Load more to view more graphs.
Metric units can be changed between byte or byte/s and GB or GB/s on graphs. When you arechanging the unit, if the maximum value of a metric is smaller than 10^ (-5), both the maximumvalue and the minimum value of this metric are 0. In addition, all data displayed on the graph is 0.
5. On the Basic Monitoring page, click Configure Metric.
On the displayed Configure Metric window, select at least one metric. Drag and dropthe selected metrics at desired locations to sort them. This helps you customize metricsto be viewed.
6. If you want to view metric details, click in the upper right corner of the graph.
In the upper left corner, you can see six default monitoring periods: 1h, 3h, 12h, 1d, 7d,and 30d. You can also view the alarm history for any period during the last six monthsby customizing the monitoring period.
In the upper left of the graph, you can click Settings to configure the rollup method.
Cloud EyeUser Guide 2 Getting Started
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
12
NOTE
l If 1h, 3h, 12h, or 1d is selected, raw monitoring data is displayed by default.
l If 7d, or 30d is selected, aggregated monitoring data is displayed by default.
Figure 2-5 CPU Usage
2.5.2 Querying Metrics of Other Cloud ServicesCloud Eye provides multiple built-in metrics based on the attribute of each service. After youenabled one cloud service on the cloud platform, the system automatically associates itsmetrics based on the service type. Monitoring of these metrics helps you accurately grasp theservice running status.
This section describes how to view monitoring data of a cloud service resource.
Querying Metrics of Other Cloud Services1. Log in to the management console.2. Under Management & Deployment, click Cloud Eye.3. In the navigation pane on the left, choose Cloud Service Monitoring. Locate the target
resource and click View Monitoring Graph in the Operation column.On the displayed page, you can view ECS graphs based on raw monitoring data collectedin the 1h, 3h, or 12h. In the upper right corner of the graph, the maximum and minimumvalues of the metric in the corresponding time periods are dynamically displayed.
Cloud EyeUser Guide 2 Getting Started
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
13
Figure 2-6 Viewing graphs
NOTE
By default, a maximum of nine graphs can be displayed on one page. If the number of metrics of aservice resource is more than nine, you can click Load more to view more graphs.
Metric units can be changed between byte or byte/s and GB or GB/s on graphs. When you arechanging the unit, if the maximum value of a metric is smaller than 10^ (-5), both the maximumvalue and the minimum value of this metric are 0. In addition, all data displayed on the graph is 0.
4. On the Basic Monitoring page, click Configure Metric.On the displayed Configure Metric window, select at least one metric. Drag and dropthe selected metrics at desired locations to sort them. This helps you customize metricsto be viewed.
NOTE
AIS and API Gateway do not support the display of custom metrics.
5. If you want to view metric details, click in the upper right corner of the graph.In the upper left corner, you can see six default monitoring periods: 1h, 3h, 12h, 1d, 7d,and 30d. You can also view the alarm history for any period during the last six monthsby customizing the monitoring period.In the upper left of the graph, you can click Settings to configure the rollup method.
NOTE
l If 1h, 3h, 12h, or 1d is selected, raw monitoring data is displayed by default.
l If 7d or 30d is selected, aggregated monitoring data is displayed by default.
Cloud EyeUser Guide 2 Getting Started
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
14
Figure 2-7 Outbound Bandwidth
Cloud EyeUser Guide 2 Getting Started
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
15
3 Moitoring Panels
Panels, severing as custom monitoring platforms, allow you to view core metrics and comparethe performance data of different services.
3.1 Creating PanelsYou must create a panel before adding graphs. At present, Cloud Eye supports the creation of10 panels.
Creating Panels1. Log in to the management console.2. Under Management & Deployment, click Cloud Eye.3. In the navigation pane on the left, choose Dashboard > Monitoring Panel and click
Create Panel.The Create Panel page is displayed.
4. Configure Name.Name indicates the panel name, which cannot exceed 128 characters. Only letters, digits,hyphens (-), and underscores (_) are allowed.
3.2 Adding GraphsAfter a panel is created, you can add graphs to the panel to monitor cloud services. Currently,each panel supports a maximum of 24 graphs.
You can add a maximum of 20 metrics to one graph. Monitoring comparison betweendifferent services, dimensions, and metrics is supported.
Procedure1. Log in to the management console.2. Under Management & Deployment, click Cloud Eye.
3. Choose Dashboard > Monitoring Panel, switch to the desired panel, and click orAdd Graph.
Cloud EyeUser Guide 3 Moitoring Panels
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
16
The Add Graph window is displayed.
Figure 3-1 Add Graph
4. Set parameters based on Table 3-1.
NOTE
When adding graphs, you must specify Resource Type, Dimension, Monitored Object, andMetric one by one from left to right.
Table 3-1 Parameters
Parameter Description Example Value
Title Specifies the title of the customizedmetric you followed. Only letters,digits, underscores (_), and hyphens(-).
The value is specifiedby the user.
Resource Type Specifies the service to be monitored. Elastic Cloud Server
Dimension Specifies the metric dimension. ECS
Monitored Object Specifies the object to be monitored.You can select multiple monitoringobjects at a time.
N/A
Metric Specifies the metric name. CPU Usage
5. Click OK.
On the panel, you can view the trends of the new graph. If you click , you can viewdetailed metric data comparison.
3.3 Viewing GraphsOn the graph you have added, you can view trends from last 3 hours. The system providesyou both default and customizable time ranges to view trends from last month. This sectiondescribes how to view trends from a longer time range.
Cloud EyeUser Guide 3 Moitoring Panels
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
17
Procedure1. Log in to the management console.2. Under Management & Deployment, click Cloud Eye.3. Choose Dashboard > Monitoring Panels. On the page displayed, you can view all
graphs on the current monitoring panel.
NOTE
You can sort graphs by dragging them based on service requirements.
4. In the upper right corner of the graph, click to view monitoring details on an enlargedgraph. You can select from the provided time durations or customize a time range toview the metric trend in a specific monitoring interval.If you select 1h, the system displays raw data from the last hour by default; if you selectany of other provided time durations, the system displays rollup data.
Figure 3-2 Viewing graphs
NOTE
Custom time ranges can cover up to one week.
In the lower part of the graph, metrics with brief descriptions are displayed in a list by default.You can click a metric to hide its trend; clicking the metric again displays its trend.
NOTE
Trends on the graph are automatically refreshed every 60 seconds. You need to enable the automaticrefresh function on the Monitoring Panel page.
3.4 Configuring GraphsThis section describes how to add, modify, and delete metrics on graphs.
Procedure1. Log in to the management console.
2. Click in the upper left to select a region and a project.
Cloud EyeUser Guide 3 Moitoring Panels
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
18
3. Under Management & Deployment, click Cloud Eye.4. In the navigation pane on the left, choose Dashboard > Monitoring Panel, select the
target panel, and click .
On the displayed Configure Graph dialog box, you can edit the title and add new metrics.You can also delete or modify the current metrics.
Figure 3-3 Configure Graph
NOTE
You can add a maximum of 5 metrics to one graph.
3.5 Delete Graph1. Log in to the management console.2. Under Management & Deployment, click Cloud Eye.3. In the navigation pane on the left, choose Dashboard > Monitoring Panel. Select the
target panel, click in the upper right corner, and click OK.
3.6 Deleting PanelsIf you need to re-plan graphs on a panel, you can delete the existing panel and create a newmonitoring plan. When you delete a panel, all monitoring graph associated with it will bedeleted.
Deleting Panels1. Log in to the management console.2. Under Management & Deployment, click Cloud Eye.3. In the navigation pane on the left, choose Dashboard > Monitoring Panel. Select the
target panel, click Delete in the upper right corner, and click OK.
Cloud EyeUser Guide 3 Moitoring Panels
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
19
4 Resource Groups
Resource groups enable service-based resource management, including management of ECSs,EVS disks, elastic IP addresses, bandwidths, and databases. Resources of different types,alarm rules, and alarm history are managed based on service, which helps to improve O&Mefficiency.
4.1 Creating Resource Groups
Scenarios
Users who use multiple cloud products can use the resource group function to add allresources, such as ECSs, BMSs, EVS disks, elastic IP addresses, bandwidths, and databasesfor one business to the same resource group. Then, you can manage resources and alarm rulesbased on group to greatly reduce O&M complexity and increase O&M efficiency.
Restrictionsl Each user can create a maximum of 10 resource groups.l A resource group can contain a maximum of 200 resources.l The resource group has the following restrictions on different types of resources:
– ECS: 200– BMS: 100– EVS disk: 200– VPC: 50 each for Elastic IP addresses and bandwidth– RDS: 50 for each type of database
Procedure1. Log in to the management console.
2. Click in the upper left to select a region and a project.3. Under Management & Deployment, click Cloud Eye.4. In the navigation pane on the left, choose Resource Groups.
Cloud EyeUser Guide 4 Resource Groups
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
20
5. In the upper right corner, click Create Resource Group.
Figure 4-1 Create Resource Group
6. Specify a name for the group.7. Select the target cloud service resources.
Figure 4-2 Selecting cloud service resources
NOTE
For ECS or BMS, search by name or ID is supported. Other cloud services can be searched onlyby ID.
8. Click Create.
4.2 Viewing Resource Groups
4.2.1 Resource Group ListThe resource group list displays all resource groups you have on Cloud Eye as well as theresources contained in and health status of each group.
Procedure1. Log in to the management console.
Cloud EyeUser Guide 4 Resource Groups
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
21
2. Click in the upper left to select a region and a project.3. Under Management & Deployment, click Cloud Eye.4. In the navigation pane on the left, choose Resource Groups.
On the Resource Groups page, you can view all the resource groups that have beencreated.
Table 4-1 Parameters of the resource group list
Parameter Description
Name/ID Specifies the resource group name.NOTE
The group name can contain a maximum of 128 characters. Only letters,digits, hyphens (-), and underscores (_) are allowed.
Health Status l If no alarm has been triggered for any resources in thegroup, Health Status of this group is Healthy.
l If an alarm is triggered for a resource in the group, HealthStatus of this group is Unhealthy.
l If no alarm rule is set for any resources in the group, HealthStatus of this group is No alarm rule.
UnhealthyResources
Specifies the number of resources in a group whose alarms havebeen triggered. For example, if you have two ECSs and oneEVS disk that are in the Alarm state, the value of UnhealthyResources is 3.
Total Resources Specifies the number of resources in a group. For example, ifthere are four resources, namely, two ECSs, an EVS disk, andan elastic IP address, the value of Total Resources is 4.
Resource Types Specifies the number of different resource types in a group. Forexample, if there are two ECSs and one EVS disk in the group,then there are two types of resources, so the value of ResourceTypes is 2.
Creation Time Specifies the time when the resource group was created.
Operation Lists the operations that can be performed on a resource group.Currently, you can only modify or delete a resource group.
4.2.2 Resource OverviewThe Resource Overview page displays the resource types contained in the current group, thetotal number of resources of each resource type, and graphs of all resources.
Procedure1. Log in to the management console.
2. Click in the upper left to select a region and project.
Cloud EyeUser Guide 4 Resource Groups
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
22
3. Under Management & Deployment, click Cloud Eye.4. In the navigation pane on the left, choose Resource Groups.5. Click a group name in the resource group list to go to the Resource Overview page.
4.2.3 Unhealthy ResourcesUnhealthy Resources includes all resources in the Alarm state in a group. This featureenables you to quickly view all unhealthy resources and promptly handle faults.
Procedure1. Log in to the management console.
2. Click in the upper left to select a region and a project.3. Under Management & Deployment, click Cloud Eye.4. In the navigation pane on the left, choose Resource Groups.5. Click a group name in the resource group list to go to the Resource Overview page.6. In the navigation pane on the left, click Unhealthy Resources to view all resources in
the resource group whose alarms have been triggered.
4.2.4 Alarm RulesAlarm Rules displays all alarm rules in the resource group. You can enable, disable, modify,or delete specified alarm rules in the alarm rule list.
Procedure1. Log in to the management console.
2. Click in the upper left to select a region and project.3. Under Management & Deployment, click Cloud Eye.4. In the navigation pane on the left, choose Resource Groups.5. Click a group name in the resource group list to go to the corresponding Resource
Overview page.6. In the navigation pane on the left, click Alarm Rules to view all alarm rules for the
resource group.
4.2.5 Alarm HistoryAlarm History displays the alarm history of all alarm rules in a resource group.
Procedure1. Log in to the management console.
2. Click in the upper left to select a region and project.3. Under Management & Deployment, click Cloud Eye.4. In the navigation pane on the left, choose Resource Groups.5. Click a group name in the resource group list to go to the Resource Overview page.
Cloud EyeUser Guide 4 Resource Groups
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
23
6. In the navigation pane on the left, click Alarm History to view the alarm history for allresources in the resource group.
4.3 Managing Resource GroupsIf your cloud service requirements change as your business develops, you may need to modifythe resources in a resource group.
This section describes how to modify or delete resource groups.
4.3.1 Modifying Resource Groups
Procedure1. Log in to the management console.
2. Click in the upper left to select a region and a project.3. Under Management & Deployment, click Cloud Eye.4. In the navigation pane on the left, choose Resource Groups.5. Locate the row containing the target resource group and click Modify in the Operation
column.
Figure 4-3 Modifying a resource group
6. Follow the prompts to modify the group.7. Click Modify.
4.3.2 Deleting Resource Groups
Procedure1. Log in to the management console.
2. Click in the upper left to select a region and a project.3. Under Management & Deployment, click Cloud Eye.4. In the navigation pane on the left, choose Resource Groups.5. Locate the row containing the target resource group and click Delete in the Operation
column.
Figure 4-4 Deleting a resource group
Cloud EyeUser Guide 4 Resource Groups
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
24
6. Click OK.
Cloud EyeUser Guide 4 Resource Groups
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
25
5 Server Monitoring
Server Monitoring includes Basic Monitoring and OS Monitoring. Basic Monitoringmonitors those metrics automatically reported by ECSs. By installing the Agent on an ECS orBMS, OS Monitoring provides server monitoring that is system-wide, active, and fine-grained. In this document, "fine-grained" indicates that data is collected at 10-secondintervals.
NOTE
l Both Windows and Linux OSs are supported. For details, see What System Does the AgentSupport?
l Only CN North-Beijing1 (cn-north-1), CN South-Guangzhou (cn-south-1), and CN East-Shanghai2(cn-east-2) are supported now.
l For the ECS specifications, you are recommended to use the 2-core and 2-GB ECS or ECS withhigher specifications.
l The Agent will occupy system ports. For details, see descriptions of ClientPort and PortNum insection 5.2.2.3 Manually Configuring the Agent. If the Agent port is in conflict with a service port,check What Should I do If the Service Port Is Used by the Agent?
Application Scenarios
Whether you are using ECSs or BMSs, you can use server monitoring to track various OSmetrics. You can also use this function to monitor server resource usage and query monitoringdata when faults occur.
Monitoring Capabilities
Server monitoring provides more than 40 metrics, such as metrics for CPU, memory, disk,and network, to meet the basic monitoring and O&M requirements of servers.
5.1 Agent Features Across VersionsMetrics or functions supported by different versions of Agents provided by Cloud Eye aredifferent.
Version 1.0.11l The Agent can be installed to a specified directory.
Cloud EyeUser Guide 5 Server Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
26
l Ports can be specified for the Agent.l OS Monitoring can monitor the read and write status of files systems. For details, see
What Metrics Can Be Monitored by OS Monitoring?
Version 1.0.8BMS OS Monitoring metrics are added.
Version 1.0.7The Agent supports CTS to collect OS logs.
Version 1.0.6l The Agent support the Windows OS. For details, see What OS Does the Agent
Support?l The function of restoring configurations of plug-ins in batches is added.l Metrics for Process Monitoring are added.
Version 1.0.5l The ECS Monitoring page is replaced by the Server Monitoring page.l Fine-grained monitoring for BMS is added.l OS Monitoring can monitor CPU load metrics. For details, see What Metrics Can Be
Monitored by OS Monitoring?
Version 1.0.4OS Monitoring can monitor GPU and disk metrics. For details, see What Metrics Can BeMonitored by OS Monitoring?
NOTE
To view GPU metrics, you need to install the plug-in for collecting GPU metrics. For details, see section5.5 Installing the GPU and RAID Metric Collection Plug-in.
Version 1.0.3OS Monitoring can monitor CPU load metrics. For details, see What Metrics Can BeMonitored by OS Monitoring?
Version 1.0.2l OS Monitoring can monitor NIC metrics. For details, see What Metrics Can Be
Monitored by OS Monitoring?l The process monitoring function is added. For details, see section 3.6 Process
Monitoring.
5.2 Installing and Configuring the AgentYou need to use Cloud-Init to install and configure the Agent for the newly purchased serversand manually install the Agent for the existing servers.
Cloud EyeUser Guide 5 Server Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
27
l For details about the automatic installation of the Agent, see section 5.2.1 Using Cloud-Init to Automatically Install and Configure the Agent (Linux).
l For servers running the Linux OS, see section 5.2.2 Installing and Configuring theAgent (Linux).
l For servers running the Windows OS, see section 5.2.3 Installing and Configuring theAgent (Windows).
5.2.1 Using Cloud-Init to Automatically Install and Configure theAgent (Linux)
ScenariosThis section describes how to use Cloud-Init to install the Agent on an ECS.
NOTE
Currently, the Agent cannot be automatically installed on BMSs.
Prerequisitesl The DNS address of the VPC subnet has been changed and the security group has been
configured. The DNS server address has been added for the purchased ECS. For details,see section 5.2.2.1 Adding a DNS Server Address.
l You have downloaded cloudinit_conf_template.txt from http://obs.myhwclouds.com/telescope/agent/.
Procedure1. Log in to the management console.2. Under Computing, click Elastic Cloud Server.3. In the upper corner of the displayed page, click Buy ECS.4. On the displayed page, configure ECS parameters.
– Image: See What System Does the Agent Support?– VPC: Select a VPC that has already been configured with a DNS.
Cloud EyeUser Guide 5 Server Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
28
Figure 5-1 Parameters
5. Login Mode: Select Key pair.6. Expand Advanced Settings. In the User Data Injection area, enter the configured
cloud-config information. The purpose is to use Cloud-Init to fully automate the Agentinstallation and configuration after the ECS is created.For values of the ProjectId, AccessKey, SecretKey, and RegionId parameters, seeTable 5-3. For details about the Agent download address, see Table 5-2.#cloud-configwrite_files: - path: /home/linux/userInfo.txt content: | { "ProjectId": "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx", "AccessKey": "XXXXXXXXXXXXXXXXXXXX", "SecretKey": "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX", "RegionId": "cn-north-1" }
runcmd: - cd /usr/local/ && wget http://obs.myhwclouds.com/telescope/agent/telescope_linux_amd64.tar.gz && tar -zxvf telescope_linux_amd64.tar.gz - chmod 755 /usr/local/telescope_linux_amd64/install.sh && /usr/local/telescope_linux_amd64/install.sh - mv /home/linux/userInfo.txt /usr/local/telescope/bin/conf.json - cd /usr/local/ && wget http://169.254.169.254/openstack/latest/meta_data.json - cat meta_data.json | python -c 'import json,sys;uuid=json.load(sys.stdin)["uuid"];print (uuid)' > instanceId - if [ ! -s instanceId ]; then cat meta_data.json | python3 -c 'import json,sys;uuid=json.load(sys.stdin)["uuid"];print (uuid)' > instanceId;fi - sed -i "2i \ \"InstanceId\":\"$(cat instanceId)\"," /usr/local/telescope/bin/conf.json - rm /usr/local/meta_data.json /usr/local/instanceId
Cloud EyeUser Guide 5 Server Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
29
Figure 5-2 User Data Injection
7. Click Buy Now.8. After the ECS is created, wait for ten minutes, during which you may need to perform
some initialization configuration. On the Cloud Eye console, choose Server Monitoringin the navigation pane on the left. You should see that the ECS Plug-in Status isRunning. Enable the Monitoring Status switch, and the Agent begins to collect fine-grained monitoring data.
9. 3 or 5 minutes later, check the fine-grained monitoring data.
5.2.2 Installing and Configuring the Agent (Linux)
5.2.2.1 Adding a DNS Server Address
ScenariosThis section describes how to add a DNS server address to an ECS or BMS.
NOTE
DNS resolution and security group configuration are intended for the primary NIC.
Procedure1. Log in to the ECS or BMS as user root.2. Add the DNS server address to the resolv.conf file.
a. Run the vi /etc/resolv.conf command to open the file.b. Add the DNS server address, for example, nameserver 100.125.1.250 to the file
and save the setting.
Figure 5-3 Adding the DNS server address
Cloud EyeUser Guide 5 Server Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
30
NOTE
The value of nameserver varies depending on the region.
CN North-Beijing1: 100.125.1.250 and 100.125.21.250
CN East-Shanghai2: 100.125.17.29 and 100.125.135.29
CN South-Guangzhou: 100.125.1.250 and 100.125.136.29
3. On the management console, modify the DNS server address used by the subnet of theECS.
a. Click in the upper left to select a region and a project.b. Under Service List, choose Computing > Elastic Cloud Server.
On the ECS console, click the name of the target ECS to view its details.c. Click vpc-ces next to VPC to go to the VPC console.
Figure 5-4 VPC
d. In the VPC list, click vpc-ces.e. In the Subnets list, locate the row that contains subnet-3e3b and click Modify in
the Operation column.On the displayed Modify Subnet dialog box, change the value of DNS ServerAddress 1 to 100.125.1.250.
NOTE
subnet-3e3b is the ECS subnet.
The IP address of the DNS server must be the same as the value of nameserver in step 2.
Cloud EyeUser Guide 5 Server Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
31
Figure 5-5 Changing the DNS server address 1
f. Click OK.
NOTE
The DNS modification on the console takes effect after the ECS or BMS is restarted.
4. In the navigation pane of the Network Console page, select Security Group. Click AddRule on the right of Sys-default.
NOTE
Sys-default is the ECS security group.
Table 5-1 Security group rule
Direction
Protocol
Port Description
Inbound TCP 80 Used by wget to download the Agentinstallation packet.
Outbound
TCP 80
Inbound UDP 53 Used by the DNS service to resolve domainnames of OBS, Cloud Eye, and LTS.
Outbound
UDP 53
Inbound TCP 443 Used to send metric data and collect logs. CloudEye and LTS APIs are requested over HTTPS.
Outbound
TCP 443
Cloud EyeUser Guide 5 Server Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
32
5.2.2.2 Installing the Agent
ScenariosThis section describes how to manually install the Agent on an ECS or BMS.
Prerequisitesl You have modified the DNS server address on a subnet and configured a security group.
For details, see section 5.2.2.1 Adding a DNS Server Address.l Ensure that the installation directories in Procedure have the read and write permissions,
and that the Telescope process is not stopped by other software after the installation.
Procedure1. Log in to the ECS or BMS as user root.2. Select and switch to the download path of the Agent installation package. Take /usr/local
as an example and run the following command:cd /usr/local
3. Take the Linux 64-bit installation package as an example and run the followingcommand to download the Agent:wget http://obs.myhwclouds.com/telescope/agent/telescope_linux_amd64.tar.gz
Table 5-2 Installation package path
Name Format
How to Obtain
Linux 64-bitinstallation package
tar.gz Download pathsCN North-Beijing1: http://obs.myhwclouds.com/telescope/agent/telescope_linux_amd64.tar.gzCN South-Guangzhou: http://telescope-cn-south-1.obs.myhwclouds.com/agent/telescope_linux_amd64.tar.gzCN East-Shanghai2: http://telescope-cn-east-2.obs.myhwclouds.com/agent/telescope_linux_amd64.tar.gz
4. Run the following command to decompress the installation package:
tar -zxvf telescope_linux_amd64.tar.gzThe decompression is successful if the system displays the following information.
Cloud EyeUser Guide 5 Server Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
33
Figure 5-6 Successful decompression
5. Run the following command to go to directory where the installation package isdecompressed:cd telescope_linux_amd64
6. Run the following command to install the Agent:chmod 755 install.sh; ./install.shThe installation is successful if the system displays the following information.
Figure 5-7 Successful installation
NOTE
l The default installation path of the Agent is /usr/local/telescope. After the ./install.shcommand is executed successfully, the Agent is automatically installed in this path. To specifythe installation path, run the following command: chmod 755 install.sh; ./install.sh XXX
l If no command output is displayed after the installation, you need to manually start the Agent.For details, see Starting the Agent.
l On ECSs running CentOS, OpenSUSE, Ubuntu, Debian, or Euler OSs, the Agent can be set torun automatically at startup. For ECSs running other OSs, after successfully installing theAgent, you need to manually start the Agent. For details, see Starting the Agent.
l After the Agent is configured, its status is still displayed as Uninstalled because themonitoring data is not reported. Wait 3 to 5 minutes and refresh the page.
7. After the installation is complete, go to the Server Monitoring page. Locate the targetECSs and click Restore Agent Configurations. On the displayed page, click One-ClickRestore to complete the configuration.If you need to manually configure the Agent, see section 5.2.2.3 Manually Configuringthe Agent.
Cloud EyeUser Guide 5 Server Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
34
Figure 5-8 Restore Agent Configurations
NOTE
Restore Agent Configurations is applicable to Agent 1.0.5 or later. If the Agent version is earlierthan 1.0.5, upgrade the Agent first and then restore the Agent configurations or manuallyconfigure the Agents based on section 5.2.2.3 Manually Configuring the Agent.
Restore Agent Configurations does not support BMSs.
5.2.2.3 Manually Configuring the Agent
Scenarios
After successfully installing the Agent, you need to modify related configuration files toreport monitoring data and heartbeat data.
Prerequisites
The Agent has been installed.
Procedure1. Log in to an ECS as user root.
2. Run the following command to go to the bin directory of the Agent installation package:
cd /usr/local/telescope/bin
3. Modify the configuration file conf.json.
a. Run the following command to open conf.json:
vi conf.json
b. Modify the parameters in the file. For details, see Table 5-3.{ "InstanceId":"xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx", "ProjectId": "b5b92ee0xxxxxxxxxxxxxxxxcab92396", "AccessKey": "QZ0XGJXFxxxxxxxxT65R", "SecretKey": "lEv2aXAGwxxxxxxxxxxxxxxxxxxxxF8t0Bf18Tn2", "RegionId": "cn-north-1", "ClientPort": 5000, "PortNum": 200}
Cloud EyeUser Guide 5 Server Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
35
Table 5-3 Public parameters
Parameter Description
InstanceId Specifies the ECS ID. You can log in to the management consoleand view the ECS ID in the ECS list.NOTE
l You do not need to configure InstanceId. Retain "InstanceId":"". Ifyou choose to configure InstanceId, see the following instructions:
l The ECS ID must be unique in all sites, that is, in the same region,InstanceId used by the Agent cannot be the same. Otherwise, errorsmay occur.
l The InstanceId value must be consistent with the actual ECS ID.Otherwise, you cannot see the OS Monitoring data on Cloud Eye.
ProjectId Specifies the project ID. You do not need to configure ProjectId.Retain "ProjectId": "". If you do wish to configure it, a projectID can be obtained by performing the following steps:1. Log in to the Cloud Eye console, click the username in the
upper right corner, and select My Credential.2. Under Project List, view the ECS project ID in the
corresponding region.
AccessKey/SecretKey
Specifies the Access Keys, which can be obtained by performingthe following operations:Log in to the Cloud Eye console, click the username in the upperright corner, select My Credential, and click Access Keys.l If you have obtained the access key, obtain the AccessKey
value and the SecretKey value in the credentials.csv file savedwhen you create Access Keys.
l If Access Keys is not available, you can click Add Access Keyto create one. Save the credentials.csv file and obtain theAccessKey value and the SecretKey value in it.NOTICE
l For the security purpose, you are advised to use an IAM usernamewith the CES Administrator and LTS Administrator permissions.For details, see section Creating and Authorizing a User Groupand section Creating an IAM User and Adding It to a UserGroup.
l The configured access key must be within the Access Keys list onthe My Credential page. Otherwise its authentication will fail andyou cannot view OS Monitoring data on Cloud Eye.
RegionId Specifies the region ID. For example, if the ECS is in the CNNorth-Beijing1 region, the value of RegionId is cn-north-1. Forregion IDs of other regions, log in at https://developer.huaweicloud.com/endpoint.html.
ClientPort Start port number used by the AgentNOTE
The default value is 0, indicating that the Agent will randomly use any port.Ports 1 to 1023 are reserved. You are advised not to specify a port in thisrange for the Agent.
Cloud EyeUser Guide 5 Server Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
36
Parameter Description
PortNum Number of ports configured for the AgentNOTE
The default value is 200. If the value of ClientPort is 5000, the port rangewill be 5000 to 5199.
4. Modify configuration file conf_ces.json for the Cloud Eye metric collection module.
a. Run the following command to open public configuration file conf_ces.json:vi conf_ces.json
b. Modify the parameter in the file. For details, see Table 5-4.{ "Endpoint": "https://ces.cn-north-1.myhuaweicloud.com"}
Table 5-4 Parameter setting of the metric collection module
Parameter Description
Endpoint Specifies the Cloud Eye endpoint URL in the region of theECS. For example, if the ECS is in the CN North-Beijing1region, the URL is ces.cn-north-1.myhuaweicloud.com. Forthe endpoint values of other regions, log in at https://developer.huaweicloud.com/endpoint.html.
NOTE
After the Agent is configured, its status is still displayed as Uninstalled because themonitoring data is not reported. Wait 3 to 5 minutes and refresh the page.
5.2.3 Installing and Configuring the Agent (Windows)
Prerequisitesl You have added the DNS address and configured the security group. For details, see step
3.l Ensure that the installation directories in Procedure have the read and write permissions,
and that the Telescope process is not stopped by other software after the installation.l You have obtained the Agent installation package (Windows).
CN North-Beijing1: http://obs.myhwclouds.com/telescope/agent/telescope_windows_amd64.zipCN South-Guangzhou1: http://telescope-cn-south-1.obs.myhwclouds.com/agent/telescope_windows_amd64.zipCN East-Shanghai2: http://telescope-cn-east-2.obs.myhwclouds.com/agent/telescope_windows_amd64.zip
Procedure1. Use VNC to log in to the ECS running the Windows OS.
Cloud EyeUser Guide 5 Server Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
37
2. Use WinSCP to upload the Agent installation package telescope_windows_amd64.zipto the ECS.
3. Create a directory for storing the installation package(for example, D:\Agent) anddecompress telescope_windows_amd64.zip to this directory.
4. Double-click the install.bat script to install and start the Agent.If "Install service success." is displayed, the Agent is successfully installed and started.
Figure 5-9 Installing the Agent
NOTE
After the Agent is configured, its status is still displayed as Uninstalled because the monitoringdata is not reported. Wait 3 to 5 minutes and refresh the page.
5. After the installation is complete, go to the Server Monitoring page. Locate the targetECSs and click Restore Agent Configurations. On the displayed page, click One-ClickRestore to complete the configuration.
Figure 5-10 Restore Agent Configurations
If you need to manually configure the Agent, open the conf.json file under directorytelescope_windows_amd64\bin and set Agent parameters. For details, see Table 5-3.Double-click install.bat to run the script.{ "InstanceId":"", "ProjectId": "", "AccessKey": "", "SecretKey": "", "RegionId": "cn-north-1"}
5.3 Installing Agents in Batches on ECSs Running LinuxOSs
ScenariosThis section describes how to install Agents in batches on a large number of ECSs runningLinux OSs.
Cloud EyeUser Guide 5 Server Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
38
OperationAfter binding an elastic IP address to an ECS, install the Agent and configure it based onsection 5.2.2 Installing and Configuring the Agent (Linux) to ensure that data collection isnormal. Use the ECS as a jump server and run scripts in batches to copy, decompress, andinstall the Agent package and configuration file to other ECSs.
NOTICEl The ECSs must belong to the same VPC and the same network segment.l If AK/SK is manually configured for the first ECS, the subsequent ECSs do not need to be
configured again. If the agency for the first ECS is created by performing the RestoreAgent Configurations on the Server Monitoring page, you need to perform the sameoperation to create agencies for the subsequent ECSs.
l For servers running Windows OSs, the Agent cannot be installed in batches.
Prerequisitesl The IP addresses, IDs, and passwords of all ECSs for which the Agent is to be installed
have been collected, sorted in the iplist.txt format, and uploaded to the /usr/localdirectory on the first ECS.
NOTE
The following is an example of the iplist.txt format. The IDs and passwords are separated byspaces.192.168.1.1:bdf784cb-xxxx-xxxx-xxxx-bf0a99d8d486 passwdxxx192.168.1.2:cgvfa4e4-xxxx-xxxx-xxxx-b32231553926 passwdxxxl If the passwords of all ECSs are the same, you do not need to set the password in iplist.txt.
Enter the passwords when performing step 9.
l If the passwords of all ECSs are different, you do not need to configure the same password,but you need to add a password to the end of each line.
Procedure1. Use PuTTY to log in to the first ECS as user root.2. Run the following command to switch to the /usr/local directory:
cd /usr/local3. Run the following command to download batchInstallAgent.tar.gz and
batchInstallAgent.tar.gz.sha256 to the /usr/local directory:wget http://telescopebatch.obs.cn-north-1.myhwclouds.com/batchInstallAgent.tar.gzwget http://telescopebatch.obs.cn-north-1.myhwclouds.com/batchInstallAgent.tar.gz.sha256
Cloud EyeUser Guide 5 Server Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
39
Table 5-5 Downloaded address of scripts
File Name Download Address
batchInstallAgent.tar.gz
http://telescopebatch.obs.cn-north-1.myhwclouds.com/batchInstallAgent.tar.gz
batchInstallAgent.tar.gz.sha256
http://telescopebatch.obs.cn-north-1.myhwclouds.com/batchInstallAgent.tar.gz.sha256
4. Run the following command to check the integrity of batchInstallAgent.tar.gz. If OK is
displayed, the file is integral.sha256sum -c <(grep batchInstallAgent.tar.gz batchInstallAgent.tar.gz.sha256)
5. Run the following command to decompress the script package:tar -zxvf batchInstallAgent.tar.gz
6. Run the following command to gran execution permissions to batchInstall.sh:chmod 700 batchInstall.sh
7. Run the following command to gran execution permissions to installPyPackage.sh:chmod 700 installPyPackage.sh
8. (Optional) Run the following command to install the Python module:./installPyPackage.sh
NOTE
(Skip this step if Pexpect has been installed.)
9. Run the following command to execute the script:./batchInstall.sh $password
NOTICEl If all passwords of ECS are inconsistent, run the ./batchInstall.sh command.l Ensure that the ECSs are properly started during script execution.
10. After the installation is complete, log in to the Cloud Eye console. In the navigation paneon the left, click Server Monitoring to view the list of ECSs that have installed theAgent.
NOTE
After the Agent is configured, its status is still displayed as Uninstalled because the monitoringdata is not reported. Wait 3 to 5 minutes and refresh the page.
11. (Optional) If Pexpect is not required after the installation, run the following commandsto delete Pexpect and Ptyprocess from the Python installation directory:cd /usr/lib/python2.7/site-packagesrm pexpect-3.2-py2.7.egg-info -frm ptyprocess-0.5.2-py2.7.egg-info -frm pexpect -rfrm ptyprocess -rf
Cloud EyeUser Guide 5 Server Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
40
5.4 Managing the AgentThis section describes how to manage the Agent, including how to view, start, stop, anduninstall the Agent.
5.4.1 Managing the Agent (Linux)
Checking the Agent Status
Log in to an ECS and run the following command to check the Agent status:
service telescoped status
The following message indicates that the Agent is running properly:
"Telescope process is running well."
NOTE
To view, start, stop, and uninstall the Agent, you must log in as user root.
Starting the Agent
Run the following command to start the Agent:
/usr/local/telescope/telescoped start
Restarting the Agent
Run the following command to restart the Agent:
/usr/local/telescope/telescoped restart
Stopping the Agent
Log in to an ECS and run the following command to stop the Agent:
service telescoped stop
NOTE
If the Agent installation fails, it may not be possible to stop the Agent normally, in which case you canrun the following command to stop the Agent:
/usr/local/telescope/telescoped stop
Uninstalling the Agent
You can manually uninstall the Agent. After the uninstallation, Cloud Eye does not activelycollect the ECS monitoring data at second-level granularity. If you need to use the Agentagain, reinstall it. For details, see section 5.2.2 Installing and Configuring the Agent(Linux).
Run the following command to uninstall the Agent:
/usr/local/telescope/uninstall.sh
Cloud EyeUser Guide 5 Server Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
41
5.4.2 Managing the Agent (Windows)
Checking the Agent Status
In the task manager, check the status of the process named telsescope.
Starting the Agent
In the directory where the Agent installation package is stored, double-click the start.batscript to start the Agent.
Stopping the Agent
In the directory where the Agent installation package is stored, double-click theshutdown.bat script to stop the Agent.
Uninstalling the Agent
In the directory where the Agent installation package is stored, double-click the uninstall.batscript to uninstall the Agent.
5.5 Installing the GPU and RAID Metric Collection Plug-in
Scenarios
This section describes how to install the plug-in to collect GPU and BMS RAID metrics.
NOTE
l ECSs support GPU metrics while BMSs not.
l BMS supports RAID metrics while ECS not.
l If the Agent is upgraded to 1.0.5 or later, the corresponding plug-in must use the latest version.Otherwise, the metric collection will fail.
Prerequisitesl You have installed the Agent.l GPU metric collection requires ECSs to support GPU.
Procedure1. Log in to an ECS as user root.
NOTE
l To monitor the BMS software RAID metrics, log in to a BMS.
l The examples in the following procedure are based on the GPU plug-in installation. Theinstallation for the software RAID plug-in is similar.
2. To go to the Agent installation path /usr/local/telescope, run the following command:cd /usr/local/telescope
Cloud EyeUser Guide 5 Server Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
42
3. To create the plugins folder, run the following command:mkdir plugins
4. To enter the plugins folder, run the following command:cd plugins
5. To download the script of the metric collection plug-in, run the following command:wget http://obs.myhwclouds.com/telescope/gpu_collector
Table 5-6 Obtaining the plug-in installation package
Name How to Obtain
Linux 64-bit GPUplug-in installationpackage
CN North-Beijing1: http://obs.myhwclouds.com/telescope/gpu_collectorCN South-Guangzhou: http://telescope-cn-south-1.obs.myhwclouds.com/gpu_collectorCN East-Shanghai2: http://telescope-cn-east-2.obs.myhwclouds.com/gpu_collector
Linux 64-bit RAIDplug-in installationpackage
CN North-Beijing1: http://obs.myhwclouds.com/telescope/raid_monitor.shCN South-Guangzhou: http://telescope-cn-south-1.obs.myhwclouds.com/raid_monitor.shCN East-Shanghai2: http://telescope-cn-east-2.obs.myhwclouds.com/raid_monitor.sh
6. To add script execution permissions, run the following command:
chmod 755 gpu_collector7. Run the following command to create the conf.json file, add the configuration content,
and configure the plug-in path and metric collection period crontime, which is measuredin seconds:vi conf.json{ "plugins": [ { "path": "/usr/local/telescope/plugins/gpu_collector", "crontime": 10 } ] }
NOTE
l The parameters gpu_collector and raid_monitor.sh indicate the GPU and RAID plug-inconfiguration, respectively.
l The metric collection period must be an integer greater than or equal to 10. If a collectionperiod of less than 10s is entered, the default value 10 is used. If the collection period is not aninteger, GPU metric collection will not be executed properly.
l Do not change the plug-in path without permission. Otherwise, the GPU metric collection isabnormal.
8. Open the conf_ces.json file in the /usr/local/telescope/bin directory. Add"EnablePlugin": true to the file to enable the metric collection function of the plug-in.{ "Endpoint": "https://ces.cn-north-1.myhuaweicloud.com",
Cloud EyeUser Guide 5 Server Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
43
"EnablePlugin": true}
9. To restart the Agent, run the following command:/usr/local/telescope/telescoped restart
5.6 Viewing Graphs
ScenariosThis section describes how to view Server Monitoring metrics, including fine-grainedmetrics collected by the Agent and metrics provided by ECSs.
For details about metrics collected by the Agent, see OS monitoring metrics. For detailsabout metrics provided by ECSs, see ECS metrics.
PrerequisitesYou have installed the Agent. For details, see section 5.2.2 Installing and Configuring theAgent (Linux) and 5.2.3 Installing and Configuring the Agent (Windows).
Procedure1. Log in to the management console.2. Under Management & Deployment, click Cloud Eye.3. On the Server Monitoring page, locate the Monitoring Status column and enable the
OS Monitoring function.4. Locate the row containing the target cloud service resource and click View Graph to go
the OS Monitoring page.To view the ECS metrics, click Basic Monitoring.
5. In the upper part of the OS Monitoring page, different metric types, such as CPU, CPULoad, Memory, Disk, Disk I/O, NIC, and GPU are displayed.You can view metric graphs based on raw monitoring data from the last 1 hour, last 3hours, or last 12 hours. Cloud Eye provides an Auto Refresh function. If you enable thisfunction, there are three automatic refresh periods to choose from: 10 seconds, 30seconds, and 1 minute.
Cloud EyeUser Guide 5 Server Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
44
Figure 5-11 OS Monitoring
Figure 5-12 Basic Monitoring
6. In the upper right corner of the graph, click to enlarge the graph for viewingdetailed data.In the upper left corner, you can see six default monitoring periods: 1h, 3h, 12h, 1d, 7d,and 30d. You can also view the alarm history for any period during the last six monthsby customizing the monitoring period.In the upper left of the graph, you can click Settings to configure the rollup method.
Cloud EyeUser Guide 5 Server Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
45
Figure 5-13 AGT. Memory Usage
NOTE
l If 1h, 3h, 12h, or 1d is selected, raw monitoring data is displayed by default.
l If 7d or 30d is selected, aggregated monitoring data is displayed by default.
l The GPU metric data in the 1h, 3h, 12h, and 1d is the raw monitoring data collected in thecollection period set in section 6.4.
5.7 Creating Alarm Rules
ScenariosThis section describes how to create alarm rule based on fine-grained monitoring of ECSs andBMSs.
Procedure1. Log in to the management console.
2. Click in the upper left to select a region and a project.3. Under Management & Deployment, click Cloud Eye.4. In the navigation pane on the left, choose Server Monitoring.5. Locate the target ECS. In the Operation column, click More, and select Create Alarm
Rule.6. On the Create Alarm Rule page, follow the prompts to set the parameters.
a. You do not need to set the monitored object because it is the current ECS.b. In the Select Metric step, select Manually create and configure parameters based
on Table 5-7.
Cloud EyeUser Guide 5 Server Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
46
Table 5-7 Parameters
Parameter Description Example Value
Source Specifies the means by which you create an alarm rule. Manuallycreate
Metric For details about basic metrics, see section 15.1.1 ECSMetrics.For details about fine-grained metrics, see WhatMetrics Can Be Monitored by OS Monitoring?
N/A
MountPoint
This parameter is mandatory when the metric is a fine-grained disk metric.
N/A
Threshold Specifies the condition for triggering the alarm. Thethreshold consists of a data type (raw data, averagevalue, maximum value, minimum value, sum, orvariance), an operator (>, ≥, <, ≤, or =), and a criticalvalue. For example, an average value greater than 80could be set as a condition for triggering an alarm.
80
Occurrences
Specifies the number of sampling points when an alarm is triggered. Its value ranges from 1 to 5.For example, if Occurrences is set to n, the number of sampling points of the alarm rule is the sampling points in n consecutive monitoring intervals. Only if all the sampling points meet the threshold configured for the alarm rule, will the alarm rule status be refreshed as the Alarm status.
3
MonitoringInterval
Specifies the interval at which the alarm status isupdated based on the alarm rule.NOTE
If the metric is a fine-grained metric and Threshold is set toRaw Data, the monitoring interval is 1 minute.
N/A
AlarmSeverity
Specifies the severity of the alarm. Valid values areCritical, Major, Minor, and Informational.
Major
SendNotification
Specifies whether to notify users when alarms aretriggered. Notifications can be sent as emails or textmessages, or HTTP/HTTPS requests sent to theservers.l Select Yes (recommended).l Select No.
Yes
Cloud EyeUser Guide 5 Server Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
47
Parameter Description Example Value
TopicName
Specifies the name of the topic to which the alarmnotification is sent.If you enable this function, you need to select a topic.If no desired topics are available, you need to createone first, whereupon the SMN service is invoked. Fordetails about how to create a topic, see the SimpleMessage Notification User Guide.
N/A
TriggerCondition
Specifies the condition for triggering the alarm. Youcan select one or more from the following: Generatedalarm, Cleared alarm, and Insufficient data.For example, if you select Insufficient data, then inthe event that metric monitoring data is not reportedwithin three consecutive hours, the alarm rule statusbecomes Insufficient data. Cloud Eye will theninvoke the SMN service to inform you of this alarmstatus.
N/A
c. On the Specify Rule Name page, set the parameters as prompted. Click Finish.
Table 5-8 Parameters
Parameter
Description Example Value
Name Specifies the alarm rule name.The system generates a name randomly but you canchange it.
alarm-b6al
Description
Provides supplementary information about the alarmrule. This parameter is optional.
N/A
After the alarm rule is created, if the specified metric data reaches the set threshold, CloudEye will immediately inform you that an error has occurred.
5.8 Process MonitoringProcess monitoring is used to monitor active processes on a host. By default, the systemcollects active process information such as CPU usage, memory usage, and the number offiles opened.
Viewing the Consumption of Active Processes
The Agent collects data on process CPU usage once every minute and displays the top 5processes, ranked by CPU usage over the last 24 hours.
Cloud EyeUser Guide 5 Server Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
48
PrerequisitesYou have installed the Agent.
Procedure1. Log in to the management console.2. Under Management & Deployment, click Cloud Eye.3. In the navigation pane on the left, choose Server Monitoring.4. On the Server Monitoring page, locate the Monitoring Status column and enable the
OS Monitoring function.5. On the Server Monitoring page, locate the row that contains the target ECS and click
View Monitoring Graph to go to the OS Monitoring page.6. Click Process Monitoring.
7. Click in the upper right corner of the monitored process list to view Top 5Processes with Highest CPU Usage.
8. In the displayed TOP 5 Processes with Highest CPU Usage window, enable ProcessMonitoring for target processes, and click OK.
9. In the process list of the Process Monitoring area, the system selects processes in theRunning state by default. The monitoring graph displays CPU usage curves of thoseprocesses in the 1h. The displayed data is raw data.You can also select the process to be displayed and view its CPU usage curve in the 1h.You can click CPU Usage, Memory usage, or Open Files above the graph to view thedata curves of different metrics of the currently displayed process. Table 5-9 listsProcess Monitoring metrics.
Figure 5-14 Process Monitoring
Cloud EyeUser Guide 5 Server Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
49
Table 5-9 Process Monitoring metrics
Metric
Description ValueRange
Collection Mode(Linux)
Collection Mode(Windows)
CPUUsage
Indicates the CPUconsumption of aprocess. pHashIdis the hashID ofthe process nameand process ID.
0–100%
Monitored object: ECSor BMSNOTE
Check the metric valuechanges in file /proc/pid/stat.
Monitored object:ECS or BMSNOTE
Invoke Windows APIGetProcessTimes toobtain the CPU usageof the process.
MemoryUsage
Indicates thememory consumedby a process.pHashId is thehashID of theprocess name andprocess ID.
0–100%
Monitored object: ECSor BMSMemory Usage =RSS*PAGESIZE/MemTotalNOTE
Memory Usage =RSS*PAGESIZE/MemTotalRSS: Obtain its value bychecking the secondcolumn of file /proc/pid/statm.
PAGESIZE: Obtain itsvalue by running thegetconf PAGESIZEcommand.
MemTotal: Obtain itsvalue by checking file /proc/meminfo.
Monitored object:ECS or BMSNOTE
Invoke Windows APIprocGlobalMemoryS-tatusEx to obtain thetotal memory size.InvokeGetProcessMemor-yInfo and to obtainthe used memory size.Use the used memorysize to divide the totalmemory size to getthe memory usage.
OpenFiles
Indicates thenumber of filesopened by aprocess. pHashIdis the hashID ofthe process nameand process ID.
≥ 0 Monitored object: ECSor BMSNOTE
You can run the ls -l /proc/pid/fd command toview the number.
Not supported
RunningProcesses
Indicates thenumber ofprocesses that arerunning.
≥ 0 Monitored object: ECSor BMSNOTE
You can obtain the statusof each process bychecking the value ofStatus in the /proc/pid/status file, and thencollect the total numberof processes in eachstatus.
IdleProcesses
Indicates thenumber ofprocesses that areidle.
≥ 0
Cloud EyeUser Guide 5 Server Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
50
Metric
Description ValueRange
Collection Mode(Linux)
Collection Mode(Windows)
ZombieProcesses
Indicates thenumber of zombieprocesses.
≥ 0
BlockedProcesses
Indicates thenumber ofprocesses that areblocked.
≥ 0
SleepingProcesses
Indicates thenumber ofprocesses that aresleeping.
≥ 0
TotalProcesses
Indicates the totalnumber ofprocesses.
≥ 0 Monitored object:ECS or BMSNOTE
Obtain the totalnumber of processesby using the third-party libraryPsapi.dll.
10. In the upper right corner of the graph, click to enlarge the graph for viewingdetailed data.In the upper left corner, you can see six default monitoring periods: 1h, 3h, 12h, 1d, 7d,and 30d. You can also view the alarm history for any period during the last six monthsby customizing the monitoring period.In the upper left of the graph, you can click Settings to configure the rollup method.
NOTE
l In the query time range, the top 5 processes are not fixed. The top 5 processes for a specifictime period are displayed in the process list. The time in the list indicates the time when theprocess was created.
l Monitoring data of CPU Usage, Memory Usage, and Open Files of a process is collectedonly when the process monitoring function is enabled for the process.
l For details about CPU Usage and Memory Usage of the current process, run command Linuxtop.
For details about Open Files of the current process, run command Linux ls /proc/pid/fd |wc -l.
l If the system time on the client browser end is different from that of the monitored ECS, thegraph may have no metric data. If this occurs, synchronize the local time with the ECS time.
Cloud EyeUser Guide 5 Server Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
51
6 Custom Monitoring
The Custom Monitoring page displays all custom metrics published by users. You can usesimple API requests to publish collected monitoring data of those metrics to Cloud Eye forprocessing and display.
Viewing Custom Monitoring1. Log in to the management console.
2. Under Management & Deployment, click Cloud Eye.
3. In the navigation pane on the left, choose Custom Monitoring.
4. On the Custom Monitoring page, you can view the data published by the current userthrough API requests, including custom services and metrics.
NOTE
l Only after you add monitoring data through APIs, will the Custom Monitoring page bedisplayed on the Cloud Eye console.
l For details about how to add monitoring data, see Adding Monitoring Data (RESTful APIs),Adding Monitoring Data (Java SDK), and Adding Monitoring Data (Python SDK).
5. Locate the row that contains the target resource and click View Monitoring Graph inthe Operation column.
On the displayed page, you can view ECS graphs based on raw monitoring data collectedin the 1h, 3h, or 12h. In the upper right corner of the graph, the maximum and minimumvalues of the metric in the corresponding time periods are dynamically displayed.
Creating Alarm Rules1. Log in to the management console.
2. Under Management & Deployment, click Cloud Eye.
3. In the navigation pane on the left, choose Custom Monitoring.
4. On the Custom Monitoring page, locate the target resource and click Create AlarmRule in the Operation column.
5. On the Create Alarm Rule page, follow the prompts to set the parameters. For details,see Table 11-6 and Table 11-7.
6. Click Create.
Cloud EyeUser Guide 6 Custom Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
52
7 Website Monitoring
Application Scenarios
Website monitoring is used to simulate real users' access to remote servers to detect theavailability and connectivity of remote servers.
Currently, three checkpoints: CN North-Beijing1, CN East-Shanghai2, and CN South-Guangzhou3 support real-time website monitoring. More checkpoints will be available soon.
NOTE
Currently, the website monitoring is free of charge.
Advantagesl You can create, modify, disable, enable, and delete monitors.
l Simple configuration is added, saving the resources and energy to configure complexopen source products.
l Website exceptions are timely notified, eliminating the worry that the website exceptionsoccur but no one knows.
Metric
Table 7-1 Website monitoring metrics
Metric Description
Response Time Indicates the time a website takes to respond to a user request,which is measured in millisecond
Availability Availability data is collected hourly. The availability metric isavailable an hour after the creation of a monitor.Availability = (Normal status responses per hour + Slow statusresponses per hour)/Total monitoring queries per hour x 100%
Packet Loss Ratio Indicates the ratio of the number of lost packets to the totalnumber of packets transmitted.
HTTP response code Indicates the response status reported by the server.
Cloud EyeUser Guide 7 Website Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
53
Metric Description
Available MonitoringLocations
Indicates the number of available monitoring locations.
Available MonitoringLocation Percentage
Indicates the percentage of monitoring locations that areavailable.
NOTE
l Response Time, Availability, Available Monitoring Locations, and Available MonitoringLocation Percentage are applicable to the HTTP, Transmission Control Protocol (TCP), User dataprotocol (UDP), and PING. Packet Loss Rate applies only to PING. HTTP response code appliesonly to HTTP.
l The Internet service availability of standard network protocols such as Post Office Protocol-Version3 (POP3), Simple Mail Transfer Protocol (SMTP), Domain Name System (DNS), and File TransferProtocol (FTP) will be supported later.
Protocol Supported
Table 7-2 Protocol description
Protocol Description
HTTP HTTP detection is performed on the specified URL or IPaddress.Advanced settings support GET, POST, or HEAD requestmode, cookie, and header information.
Packet Internet Groper(PING)
PING detection is performed on the specified URL.
Transmission ControlProtocol (TCP)
TCP server detection is performed on a specified port.In advanced settings, TCP request content can be configuredand its response content can be matched.
User datagram protocol(UDP)
UDP server detection is performed on a specified port.In advanced settings, UDP request content can be configuredand its response content can be matched.
7.1 Creating Monitors
Scenarios
This section describes how to create monitors.
NOTE
A maximum of 20 monitors can be created using an account.
Cloud EyeUser Guide 7 Website Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
54
Procedure1. Log in to the management console.
2. Under Management & Deployment, click Cloud Eye.
3. On the Website Monitoring page, click Create Monitor in the upper right corner.
4. In the displayed Create Monitor dialog box, set parameters as prompted.
Figure 7-1 Create Monitor
Table 7-3 Parameters
Parameter Description Example Value
MonitorName
Specifies the website monitoring name. stationMonitor-tuq0
MonitorType
Currently, the following protocols can bemonitored: HTTP, PING, TCP, and UDP.More monitor types are being deployed.
HTTP
URL Specifies the address to be monitored. www.example.com
MonitoringFrequency
Specifies the interval for the websitemonitoring detection engine to detect once.NOTE
Monitoring Frequency can be set to 1 minute,5 minutes, or 20 minutes.
5 minutes
CheckpointLocation
Currently, website monitoring supportsthree checkpoint locations: CN North-Beijng1, CN East-Shanghai2, and CNSouth-Guangzhou3.
CN North-Beijng1
Cloud EyeUser Guide 7 Website Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
55
Parameter Description Example Value
RequestMethod
This parameter is available when MonitorType is set to HTTP.Standard HTTP request methods includeGET, POST, and HEAD. The POSTmethod can be used to submit content.
GET
PortNumber
This parameter is available when MonitorType is set to TCP or UDP.
8080
AdvancedSettings
Different monitor types have differentadvanced settings.l If Monitor Type is HTTP, see Table
7-4.l If Monitor Type is TCP, see Table 7-5.l If Monitor Type is UDP, see Table
7-6.
N/A
Table 7-4 HTTP advanced parameters
Parameter Description Example Value
PostMessageContent
This parameter is mandatory when theRequest Method is POST.
N/A
Cookie Specifies the cookie required by the targetwebsite. Multiple pieces of informationare separated by line breaks.
key1=value1
HTTPRequestHeader
Specifies the HTTP header required bythe target website. Multiple pieces ofinformation are separated by line breaks.
key1=value1
ResponseContent toBe Matched
Specifies the expected HTTP responsecontent.
N/A
Table 7-5 TCP advanced parameters
Parameter Description Example Value
RequestContentFormat
The value can be in hexadecimal or textformat.
Hexadecimal
TCPRequestContent
Specifies the preset TCP request content. 0xcf
Cloud EyeUser Guide 7 Website Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
56
Parameter Description Example Value
MatchedResponseContentFormat
The value can be in hexadecimal or textformat.
Hexadecimal
MatchedResponseContent
Specifies the expected TCP responsecontent.
N/A
Table 7-6 UDP advanced parameters
Parameter Description Example Value
RequestContentFormat
The value can be in hexadecimal or textformat.
Hexadecimal
UDPRequestContent
Specifies the preset UDP request content. 0xcf
MatchedResponseContentFormat
The value can be in hexadecimal or textformat.
Hexadecimal
MatchedResponseContent
Specifies the expected UDP responsecontent.
N/A
5. Click OK.
7.2 Creating Alarm Rules
ScenariosThis section describes how to create alarm rules for created websites.
PrerequisitesA monitor has been created.
Procedure1. Log in to the management console.2. Under Management & Deployment, click Cloud Eye.3. On the Website Monitoring page, locate the row that contains the target website. In the
Operation column, click Create Alarm Rule.
Cloud EyeUser Guide 7 Website Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
57
4. On the Create Alarm Rule page, set parameters as prompted.
Table 7-7 Selecting the object to be monitored
Parameter Description Example Value
ResourceType
Retain the default value. N/A
MonitoredObject
Retain the default value. N/A
5. Click Next. In step Select Metric, set parameters as prompted.
Figure 7-2 Create Alarm Rule
Table 7-8 Parameters
Parameter Description Example Value
Metric Set the collection granularity based on themonitoring frequency set when creating amonitor.NOTE
l Availability data is collected hourly. Theavailability metric is available an hour afterthe creation of a monitor.
l If the site type is HTTP, the HTTPresponse code can be selected as themetric.
Response Time
Cloud EyeUser Guide 7 Website Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
58
Parameter Description Example Value
Threshold Specifies the condition for triggering thealarm. It consists of a data type, anoperator (>, >=, <, <=, =), and a criticalvalue. For example, Raw data >100 cloudbe set as a condition for triggering analarm.
100
Occurrences Specifies the number of sampling pointswhen an alarm is triggered. Its valueranges from 1 to 5.If Occurrences is set to n, the number ofsampling points of the alarm rule is thesampling points in n consecutive samplingperiods. Only if all the sampling pointsmeet the threshold configured for thealarm rule, will the alarm rule status berefreshed as the Alarm status.
3
AlarmSeverity
Specifies the severity of the alarm. Validvalues are Critical, Major, Minor, andInformational.
Major
SendNotification
Specifies whether to notify users whenalarms are triggered. Notifications can besent as emails or text messages, or HTTP/HTTPS requests sent to the servers.l Select Yes (recommended).l Select No.
Yes
Topic Name Specifies the name of the topic to whichthe alarm notification is sent.If you enable this function, you need toselect a topic. If no desired topics areavailable, you need to create one first,whereupon the SMN service is invoked.For details about how to create a topic, seethe Simple Message Notification UserGuide.
N/A
TriggerCondition
Specifies the condition for triggering thealarm. You can select one or more fromthe following: Generated alarm, Clearedalarm, and Insufficient data.
N/A
6. Click Next. In step Specify Rule Name, set parameters as prompted.
Cloud EyeUser Guide 7 Website Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
59
Table 7-9 Alarm rule name and description
Parameter Description Example Value
Name Specifies the alarm rule name. The systemgenerates a name randomly but you canchange it.
alarm-b6al
Description Provides supplementary information aboutthe alarm rule. This parameter is optional.
N/A
7. Click Finish.
7.3 Viewing Website Monitoring
Procedure1. Log in to the management console.
2. Under Management & Deployment, click Cloud Eye.
3. On the Website Monitoring page, information of all websites is displayed, Including thename, URL, type, monitoring frequency, available monitoring location percentage, andaverage response time.
4. On the Website Monitoring page, locate the row that contains the target website andclick View Monitoring Graph in the Operation column.
You can select a time range to check monitoring statistics graphs during the last 3, 12, or24 hours.
Figure 7-3 Response Time
NOTE
l If the metric is an availability metric, the average value in an hour is displayed in themonitoring graph.
l If the rollup period is longer than 1 hour, availability metrics are displayed by rollup period.
7.4 Managing Website Monitoring
Cloud EyeUser Guide 7 Website Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
60
7.4.1 Modifying Monitors
ScenariosThis section describes how to modify monitors when services change or the configured alarmrule for the website monitoring do not meet your service requirements.
Procedure1. Log in to the management console.2. Under Management & Deployment, click Cloud Eye.3. On the Website Monitoring page, locate the row that contains the target monitor name.
In the Operation column, click Modify Monitor under More.4. On the Modify Monitor page, set parameters as prompted.
NOTE
Values of Monitor Type and URL cannot be changed. Data may be lost after the change becauseadvanced settings of different monitor types are different.
7.4.2 Disabling MonitorsOn the Website Monitoring page, locate the row that contains the target monitor name. In theOperation column, click Disable under More. In the displayed Disable dialog box, clickOK.
7.4.3 Enabling MonitorsOn the Website Monitoring page, locate the row that contains the target monitor name. In theOperation column, click Enable under More. In the displayed Enable dialog box, click OK.
7.4.4 Deleting MonitorsOn the Website Monitoring page, locate the row that contains the target monitor name. In theOperation column, click Delete under More. In the displayed Delete Monitor dialog box,click OK.
Cloud EyeUser Guide 7 Website Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
61
8 Log Monitoring
The log monitoring function enables you to monitor log content in real time. You can use bothCloud Eye and Log Tank Service (LTS) to collect log content monitoring statistics, set alarmrules for logs, and perform other log-related operations.
8.1 Specifying a Custom Metric FilterLTS extracts your specified keywords from logs, so that you can use Cloud Eye to monitorkey metrics in logs and trigger alarms.
Prerequisitesl LTS has been used, a filter has been created in LTS, and the log monitoring data can be
viewed.l A log group and a log topic have been created. For details, see the Log Tank Service User
Guide.
Procedure1. Log in to the management console and choose Management & Deployment > Log
Tank Service.2. In the navigation pane on the left, choose Log Management.3. On the Log Management page, click the name of the log group to which the log to be
monitored belongs.4. Click Configure in the log theme line. On the page displayed, set the parameters listed
in Table 8-1.
Table 8-1 Custom metric filter parameters
Parameter Description ExampleValue
Filter Name Specifies the name of the filter you set. N/A
Cloud EyeUser Guide 8 Log Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
62
Parameter Description ExampleValue
FilterKeyword
Specifies the specified keywords extracted from thelog.NOTE
l Only filtering by a single keyword is supported.
l Filtering is case-sensitive and only logs meeting acertain condition can be filtered, such as Error orWarning.
Error
Example Log You are advised to paste a complete log to match thefilter keywords.
N/A
Metric Name You are advised to specify the metric name for eachfilter keyword.
Error_metric
5. Click OK.
8.2 Viewing Graphs
Procedure1. Log in to the management console.2. Under Management & Deployment, click Cloud Eye.3. In the navigation pane on the left, choose Log Monitoring.4. Locate the row that contains the target log group and click View Monitoring Graph in
the Operation column.
Figure 8-1 Viewing graphs
5. On the displayed page, you can view ECS graphs based on raw monitoring data collectedin the 1h, 3h, or 12h. In the upper right corner of the graph, the maximum and minimumvalues of the metric in the corresponding time periods are dynamically displayed.
Cloud EyeUser Guide 8 Log Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
63
9 Event Monitoring
Event monitoring provides reporting, query, and alarm functions for event data. It allows youto collect and report various important service events and cloud resource operational events toCloud Eye and receive alarms when exceptions occur.
Events are key operations of cloud service resources that are stored and monitored by CloudEye. You can view events to see operations performed by specific users on specific resources.
Event monitoring is enabled by default and allows you to view monitoring details of systemevents and custom events. For operations supported by event monitoring, see section 16Operations Supported by Event Monitoring.
Event monitoring provides an API for reporting custom events, which helps you collect andreport abnormal events or important change events generated by services to Cloud Eye. Fordetails about how to report custom events, see Reporting Events.
9.1 Viewing Graphs
ScenariosThis section describes how to view the event monitoring data.
Procedure1. Log in to the management console.2. Under Management & Deployment, click Cloud Eye.3. In the navigation pane on the left, click Event Monitoring, and all system events of the
last 24 hours are displayed by default.You can also click 1h, 3h, 12h, 7d, or 30d to view events in different periods.
Cloud EyeUser Guide 9 Event Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
64
Figure 9-1 Event Monitoring
4. Click View Event in the Operation column to view the content of a specific event.
Figure 9-2 View Event
9.2 Creating Alarm Rules
Scenarios
This section describes how to create alarm rules for event monitoring.
Procedure1. Log in to the management console.2. Under Management & Deployment, click Cloud Eye.3. In the navigation pane on the left, click Event Monitoring. Select an event and click
Create Alarm Rule in the Operation column.
Cloud EyeUser Guide 9 Event Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
65
4. Follow the prompts to configure the parameters.
Figure 9-3 Create Alarm Rule
Table 9-1 Parameters
Parameter Description Example Value
Source Specifies the means by which you createan alarm rule.
Manually create
EventSource
Specifies the service for which the event isgenerated.
ECS
Event Name Specifies the operations on the operatingsystem resources performed by users, suchas login and logout.For operations supported by eventmonitoring, see section 16 OperationsSupported by Event Monitoring.
deleteServer
MonitoringScope
Specifies the resource range for eventmonitoring.
All resources
MonitoredObject
Specifies the object to be monitored. Thisparameter is mandatory if you setMonitoring Scope to Specifiedresources.
N/A
TriggerMode
You can select immediate trigger oraccumulative trigger based on the severityof the operation.
Immediate Trigger
Cloud EyeUser Guide 9 Event Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
66
Parameter Description Example Value
Threshold Specifies the number of times that theoperation is performed within amonitoring interval.
5
MonitoringInterval
Specifies the interval at which the alarmstatus is updated based on the alarm rule.
5 minutes
AlarmSeverity
Specifies the severity of the alarm. Validvalues are Critical, Major, Minor, andInformational.
Major
SendNotification
Specifies whether to notify users whenalarms are triggered. Notifications can besent as emails or text messages, or HTTP/HTTPS requests sent to the servers.l Select Yes (recommended).l Select No.
Yes
Topic Name Specifies the name of the topic to whichthe alarm notification is sent.If you enable this function, you need toselect a topic. If no desired topics areavailable, you need to create one first,whereupon the SMN service is invoked.For details about how to create a topic, seethe Simple Message Notification UserGuide.
N/A
TriggerCondition
If you select Send Notification,Generated alarm is mandatory forTrigger Condition.
Generated alarm
5. On the Specify Rule Name page, set the parameters as prompted. Click Finish.
Table 9-2 Alarm rule name and description
Parameter Description Example Value
Name Specifies the alarm rule name. The systemgenerates a name randomly but you canchange it.
alarm-b6al
Description Provides supplementary information aboutthe alarm rule. This parameter is optional.
N/A
Cloud EyeUser Guide 9 Event Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
67
10 Viewing Alarm History
10.1 Configuring Data Storage
Scenarios
On Cloud Eye, the raw data retention period for each metric is two days. Raw data with aretention period of more than two days will not be saved. After enabling Object StorageService (OBS), you can save raw data for a longer period of time by synchronizing them toOBS.
This section describes how to configure data storage.
NOTE
Currently, configuring data storage applies only to North China 1 (cn-north-1). This feature will beavailable in other regions soon.
Prerequisitesl A cloud service is enabled.l OBS has been enabled.
Procedure1. Log in to the management console.2. Under Management & Deployment, click Cloud Eye.3. In the navigation pane on the left, choose Cloud Service Monitoring. Locate the target
resource and click Configure Data Storage in the Operation column.Alternatively, in the navigation pane on the left, choose Server Monitoring. Locate thetarget resource and choose Operation > Configure Data Storage.
4. (Optional) Configure data storage in batches.On the Cloud Service Monitoring page, select the target cloud service resources andclick Configure Data Storage.Alternatively, on the Server Monitoring page, select the target ECSs and clickConfigure Data Storage.
Cloud EyeUser Guide 10 Viewing Alarm History
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
68
5. In the displayed Configure Data Storage window, set parameters based on Table 10-1:
Table 10-1 Parameters for Configure Data Storage
Parameter Description Example Value
TransferTrace toOBS
Specifies whether to transfer trace toOBS. Its value can be Configure orNot required.
Configure
Create OBSBucket
If an OBS bucket exists, you do notneed to create another buckets.
Yes
OBS Bucketfor StoringTraces
If there is no OBS bucket, enter thename of the OBS bucket to becreated.If there are OBS buckets, select one.
ecs-0615
File Prefix The metric data file prefix enablesyou to distinguish Cloud Eye datafiles from other files in the OBSbucket.
ecs-0615
NOTE
l OBS will grant read and write permissions to Cloud Eye for the selected bucket. Exercisecaution when modifying the bucket policy to prevent data transfer failures.
l For security purposes, set Storage Class to Standard and Bucket Policy to Private.
l If the configured dump policy is disabled for more than 7 days, it will be cleared by default. Ifyou need to use the dump policy, reconfigure it.
l If the user account is frozen for more than two hours, the function of transferring data to OBSis disabled. If you want to use this function, unfreeze the account and enable the functionagain.
6. Click OK.
10.2 Viewing Raw Data
Scenarios
This section describes how to view the monitoring data saved in the OBS bucket bydownloading metric data files.
Prerequisitesl You have successfully configured data storage on Cloud Eye. For details, see section
10.1 Configuring Data Storage.l You have installed Java and configured environment variables.l You have downloaded the format conversion tool metric-transfer-merge.jar from the
download address https://metric-json-trans-csv.obs.myhwclouds.com/metric-transfer-merge.jar.
Cloud EyeUser Guide 10 Viewing Alarm History
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
69
Procedure1. Log in to the management console.2. Under Management & Deployment, click Cloud Eye.3. In the navigation pane on the left, choose Cloud Service Monitoring. Locate the target
resource and select the specified OBS bucket in the Permanent Data Storage column.Alternatively, in the navigation pane on the left, choose Server Monitoring. Locate thetarget ECS, and select the specified OBS bucket in the Permanent Data Storagecolumn.
4. Select the metric data file you want to view in the OBS bucket. Based on the storage pathof the metric data file, select OBS bucket name > CloudEye > Region > Year > Month >Day > Service type directory > Resource type directory. Click Download in theOperation column to download the file to the default path. To download the metric datafile to a customized path, click Download As.The metric data file is named in the following format:Metric data file prefix_CloudEye_Region_Time when the log was uploaded to the OBS:year-month-dayThour-minute-secondZ_Randomly generated character.json.gzFor example: FilePrefix_CloudEye_region_2016-05-30T16-20-56Z_21d36ced8c8af71e.json
NOTE
l The OBS bucket name and trace file prefix are user-defined, and other parameters areautomatically generated.
l Original metric data files are segment files of time granularity. The files include all metric dataof a resource under the time segment. The metric data is stored in the JSON format.
l To facilitate your operations, Cloud Eye provides the format conversion and contentcombination tool. Using this tool, you can combine the files of several time slices in a specificresource into a time-staged file in the chronological order in the .csv format. In addition, youcan use the tool to generate an independent time splice file for every metric of the resource inthe .csv format.
5. Access the cmd tool in the Windows system. Go to the folder where metric-transfer-merge.jar is located, run the java-jar metric-transfer-merge.jar j2c inputDirectoryoutputDirectory mergFileName command.In the Linux system, run the java-jar metric-transfer-merge.jar inputDirectoryoutputDirectory mergFileName command in the shell command line.
NOTE
l j2c is the command to convert JSON into CSV.
l inputDirectory is the directory to store the downloaded JSON files.
l outputDirectory is the directory to store the generated files.
l mergFileName is the name of the specified combined file for users. This parameter can beignored because the tool will name the combined file as mergeResult.csv by default.
After running the java command, you can view the converted files in theoutputDirectory directory. Each file corresponds to the data of one metric at all timepoints. mergeResult.csv is a large file generated by combining the data of all metrics.Figure 10-1 shows the content of the converted file.
Cloud EyeUser Guide 10 Viewing Alarm History
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
70
Figure 10-1 Metric data
Cloud EyeUser Guide 10 Viewing Alarm History
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
71
11 Using the Alarm Function
The alarm function is based on collected metrics. You can set alarm rules for key metrics ofcloud services. When the metric monitoring data triggers the conditions set in the alarm rule,Cloud Eye sends emails, text messages, or HTTP/HTTPS requests to you. In this way, you areimmediately informed of cloud service exceptions and can quickly handle the faults to avoidservice losses caused by resource problems.
Cloud Eye uses the SMN service to notify users. This requires you to create a topic and addrelevant subscribers for this topic on the SMN console first. Then when you create alarmrules, you can enable the Send Notification function and select the created topic. When anerror occurs, Cloud Eye can broadcast alarm information to those subscribers in real time.
11.1 Creating Alarm Notification TopicsThanks to the SMN real-time notification feature, Cloud Eye is able to notify you of resourcechanges by email, text messages, or by sending HTTP/HTTPS requests.
Therefore, before creating an alarm rule, you must create a topic on SMN first and addrelevant subscribers for this topic.
NOTE
If you have already created the topic you want to use with the new alarm rule, skip this section.
11.1.1 Creating Topics
Scenarios
A topic is a specific type of event in which messages are published and to which end userssubscribe for notifications. It serves as a message sending channel, where publishers andsubscribers can interact with each other.
In this section, you can create a topic that belongs to you.
Creating a Topic1. Log in to the management console.
2. Click in the upper left to select a region and a project.
Cloud EyeUser Guide 11 Using the Alarm Function
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
72
3. In the Application category, click Simple Message Notification.
The SMN console is displayed.
4. In the navigation pane, choose Topic Management > Topic.
The Topic page is displayed.
5. Click Create Topic.
The Create Topic box is displayed.
Figure 11-1 Create Topic
6. Enter a topic name and display name (topic description).
Table 11-1 Parameters required for creating a topic
Parameter Description
Topic Name Specifies the topic name, which:l Contains only upper or lower case letters, digits, hyphens (-),
and underscores (_) and must start with a letter or a number.l Must contain 1 to 256 characters.l Must be unique and cannot be modified once the topic is
created.
Display Name Specifies the message sender name, which must be less than 192bytes.NOTE
After you specify a display name, the sender in email messages will bepresented as Display name<[email protected]>. Otherwise, thesender will be [email protected].
7. Click OK.
The topic you created is displayed in the topic list.
After a topic is created, the system generates a topic URN, which uniquely identifies thetopic and cannot be changed. The topic you created is displayed in the topic list.
8. Click a topic name to view the topic details and the total number of topic subscriptions.
Cloud EyeUser Guide 11 Using the Alarm Function
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
73
11.1.2 Adding SubscriptionsA topic is a channel used by SMN to send broadcasts. Therefore, after the topic is created,you need to add related subscriptions. In this way, when the metric triggers an alarm, CloudEye is able to send the alarm information to subscriptions of this topic.
Adding Subscriptions1. Log in to the management console.2. In the Application category, click Simple Message Notification.
The SMN console is displayed.3. In the navigation pane, choose Topic Management > Topic.
The Topic page is displayed.4. Locate the topic to which you want to add subscriptions, click More under Operation,
and select Add Subscription.The Add Subscription box is displayed.
Figure 11-2 Add Subscription
5. Specify the subscription protocol and endpoints.6. Click OK.
The subscriptions you added are displayed in the subscription list.
11.2 Creating Alarm RulesYou can flexibly create alarm rules on the Cloud Eye console. You can create an alarm rulefor a specific metric or use the alarm template to create alarm rules in batch for multiple cloudservice resources.
Based on years of development and maintenance experience, Cloud Eye provides you withalarm templates tailored to the attributes of each service by default. In addition, Cloud Eyeprovides you with the function of adding custom templates. You can modify the defaultrecommended metrics, or add metrics as needed to create custom templates.
Cloud EyeUser Guide 11 Using the Alarm Function
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
74
11.2.1 Using Alarm Templates to Create Alarm RulesCloud Eye enables you to use alarm templates to create alarm rules, making it easy andconvenient to add or modify alarm rules for resources or cloud services, especially for a largenumber of resources and cloud services.
This section describes how to use the default alarm template to create an alarm rule for acloud service resource.
Creating Alarm Rules1. Log in to the management console.
2. Under Management & Deployment, click Cloud Eye.
3. Choose Alarm Management > Alarm Rules and click Create Alarm Rule.
4. On the Create Alarm Rule page, follow the prompts to set the parameters.
a. Select an object and configure parameters listed in Table 11-2. Click Next.
Figure 11-3 Create Alarm Rule
NOTE
If the monitored object is an ECS or BMS, search by name or ID is supported. Other cloudservices can be searched only by ID.
Table 11-2 Parameters
Parameter Description Example Value
Dimension Specifies the metric dimension of thealarm rule.
ECS
MonitoredObject
Specifies the resource for which the alarmrule is set. You can specify one or moreresources.
N/A
b. In the Select Metric step, select Import from template and configure parametersbased on Table 11-3.
Cloud EyeUser Guide 11 Using the Alarm Function
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
75
Figure 11-4 Import from Template
Table 11-3 Parameters
Parameter
Description ExampleValue
Source Specifies the means by which you create an alarmrule.
Import fromTemplate
Template Specifies the template to be imported. N/A
SendNotification
Specifies whether to notify users when alarms aretriggered. Notifications can be sent as emails ortext messages, or HTTP/HTTPS requests sent tothe servers.l Select Yes (recommended).l Select No.
Yes
TopicName
Specifies the name of the topic to which thealarm notification is sent.If you enable this function, you need to select atopic. If no desired topics are available, you needto create one first, whereupon the SMN service isinvoked. For details about how to create a topic,see the Simple Message Notification User Guide.
N/A
TriggerCondition
Specifies the condition for triggering the alarm.You can select one or more from the following:Generated alarm, Cleared alarm, andInsufficient data.
N/A
c. On the Specify Rule Name page, set the parameters as prompted. Click Finish.
Cloud EyeUser Guide 11 Using the Alarm Function
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
76
Table 11-4 Parameters
Parameter
Description ExampleValue
Name Specifies the alarm rule name. The systemgenerates a name randomly but you can change it.
alarm-b6al
Description
Provides supplementary information about thealarm rule. This parameter is optional.
N/A
After the alarm rule is created, if the specified metric data reaches the set threshold, CloudEye will immediately inform you that an error has occurred.
11.2.2 Creating a Custom Alarm Rule for a Specific MetricCloud Eye enables you to create alarm rules for a specific metric of a single or multiple cloudservices, making it convenient for you uniformly monitor a specific metric of such a service.
Adding Custom Alarm Rules1. Log in to the management console.2. Under Management & Deployment, click Cloud Eye.3. Choose Alarm Management > Alarm Rules and click Create Alarm Rule.4. On the Create Alarm Rule page, follow the prompts to set the parameters.
a. Select an object and configure parameters listed in Table 11-5. Click Next.
Figure 11-5 Create Alarm Rule
Table 11-5 Parameters
Parameter
Description Example Value
ResourceType
Specifies the name of the service for whichthe alarm rule is configured.
Elastic CloudServer
Cloud EyeUser Guide 11 Using the Alarm Function
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
77
Parameter
Description Example Value
Dimension Specifies the metric dimension of the alarmrule.
ECS
MonitoredObject
Specifies the resource for which the alarmrule is set. You can specify one or moreresources.
N/A
b. In the Select Metric step, select Manually create and configure parameters basedon Table 11-6.
Figure 11-6 Manually create
Table 11-6 Parameters
Parameter
Description Example Value
Source Specifies the means by which you create analarm rule.
Manually create
Metric For example:l CPU Usage
Indicates the CPU usage (%) of themonitored object.
l Memory UsageIndicates the percentage of memorycurrently in use. The unit is percent.
CPU Usage
Cloud EyeUser Guide 11 Using the Alarm Function
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
78
Parameter
Description Example Value
Threshold Specifies the condition for triggering the alarm.The threshold consists of a data type (raw data,average value, maximum value, minimumvalue, sum, or variance), an operator (>, ≥, <,≤, or =), and a critical value. For example, anaverage value greater than 80 could be set as acondition for triggering an alarm.
80
Occurrences
Specifies the number of sampling points when an alarm is triggered. Its value ranges from 1 to 5.For example, if Occurrences is set to n, the number of sampling points of the alarm rule is the sampling points in n consecutive monitoring intervals. Only if all the sampling points meet the threshold configured for the alarm rule, will the alarm rule status be refreshed as the Alarm status.
3
MonitoringInterval
Specifies the interval at which the alarm statusis updated based on the alarm rule.
5 minutes
AlarmSeverity
Specifies the severity of the alarm. Validvalues are Critical, Major, Minor, andInformational.
Major
SendNotification
Specifies whether to notify users when alarmsare triggered. Notifications can be sent asemails or text messages, or HTTP/HTTPSrequests sent to the servers.l Select Yes (recommended).l Select No.
Yes
TopicName
Specifies the name of the topic to which thealarm notification is sent.If you enable this function, you need to select atopic. If no desired topics are available, youneed to create one first, whereupon the SMNservice is invoked. For details about how tocreate a topic, see the Simple MessageNotification User Guide.
N/A
Cloud EyeUser Guide 11 Using the Alarm Function
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
79
Parameter
Description Example Value
TriggerCondition
Specifies the condition for triggering the alarm.You can select one or more from the following:Generated alarm, Cleared alarm, andInsufficient data.For example, if you select Insufficient data,then in the event that metric monitoring data isnot reported within three consecutive hours,the alarm rule status becomes Insufficientdata. Cloud Eye will then invoke the SMNservice to inform you of this alarm status.
N/A
c. On the Specify Rule Name page, set the parameters as prompted. Click Finish.
Table 11-7 Parameters
Parameter
Description Example Value
Name Specifies the alarm rule name. The systemgenerates a name randomly but you can changeit.
alarm-b6al
Description
Provides supplementary information about thealarm rule. This parameter is optional.
N/A
11.3 Example: Creating an Alarm Rule to Monitor ECSCPU Usage
This section describes how to create an alarm rule to monitor ECS CPU usage, in whichThreshold is set to > 80%.
Procedure1. Log in to the management console.
2. Click in the upper left to select a region and a project.3. Under Management & Deployment, click Cloud Eye.4. In the navigation pane on the left, choose Server Monitoring.
The list of ECSs on the public cloud platform is displayed.5. Locate the target ECS. In the Operation column, click More, and select Create Alarm
Rule.The Create Alarm Rule dialog box is displayed.
6. Configure the following parameters one by one:
a. Source: Select Manually create.
Cloud EyeUser Guide 11 Using the Alarm Function
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
80
b. Metric: Select CPU Usage from the drop-down list.c. Threshold: Select Raw data, ≥, and 80% successively.d. Occurrences: Select 3 from the drop-down list.e. Monitoring Interval: Set it to 5 minutes.f. Alarm Severity: Set it to Major.g. Send Notification: Select to enable this function.h. Topic Name: Select the topic created in section 11.1 Creating Alarm Notification
Topics.i. Trigger Condition: Select Generated alarm, Cleared alarm, and Insufficient
data.
Click Next.7. Specify Name and Description of the alarm rule. Click Finish.
11.4 Viewing the Alarm HistoryThe alarm history displays the status changes of all alarm rules in the last 30 days. You cantrace and view alarm records in a unified and convenient manner.
Procedure1. Log in to the management console.2. Under Management & Deployment, click Cloud Eye.3. Choose Alarm Management > Alarm History.
On the Alarm History page, you can view the status changes of all alarm rules from thelast 30 days.
NOTE
In the upper right corner of the Alarm History area is a calendar, in which you can view the alarmhistory of any desired time range within 30 days.
In the top right of the calendar, you can click All severities, All statuses, or All Resource Typesand choose from the drop-down menu to view different alarms in different statuses.
4. Click the target alarm rule to go to the Alarm Rules page. In the lower part of theAlarm History area, you can view the history of the selected alarm rule from the last 30days.
Cloud EyeUser Guide 11 Using the Alarm Function
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
81
Figure 11-7 Alarm History
NOTE
l In normal cases, alarms need to be triggered by calculation. Therefore, the alarm generationtime may be a few seconds later than the latest data triggering time.
l If monitoring data has been obtained, you have created or modified an alarm, and an alarm istriggered, the alarm generation time is dependent on the time when the alarm is triggered bythe alarm rule creation or modification.
Cloud EyeUser Guide 11 Using the Alarm Function
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
82
12 Alarm Rule Management
This section provides various procedures for adjusting alarm rules.
12.1 Modifying Alarm Rules
Procedure1. Log in to the management console.2. Under Management & Deployment, click Cloud Eye.3. Choose Alarm Management > Alarm Rules and click Create Alarm Rule.4. You can choose either of the following two methods to access the page for modifying
alarm rules:– On the Alarm Rules page, locate the row containing the target alarm rule and click
Modify.– On the Alarm Rules page, click the name of the target alarm rule. On the displayed
page, click Modify in the upper right corner.5. In the Modify Alarm Rule dialog box, modify parameters of the alarm rule, as listed in
Table 12-1.
Cloud EyeUser Guide 12 Alarm Rule Management
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
83
Figure 12-1 Modify Alarm Rule
Table 12-1 Parameters
Parameter Description ExampleValue
Name Specifies the alarm rule name. The systemgenerates a name randomly but you can changeit.
alarm-b6al
Description Provides supplementary information about thealarm rule. This parameter is optional.
N/A
Resource Type Specifies the name of the service for which thealarm rule is configured.
Elastic CloudServer
Dimension Specifies the metric dimension of the alarmrule.
ECS
Monitored Object Specifies the resource for which the alarm ruleis set. You can specify one or more resources.
N/A
Monitored Instance ID Specifies the resource ID. N/A
Metric For example:l CPU Usage
Indicates the CPU usage (%) of themonitored object.
l Memory UsageIndicates the percentage of memorycurrently in use. The unit is percent.
CPU Usage
Cloud EyeUser Guide 12 Alarm Rule Management
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
84
Parameter Description ExampleValue
Threshold Specifies the condition for triggering the alarm.The threshold consists of a data type (raw data,average value, maximum value, minimumvalue, sum, or variance), an operator (>, ≥, <, ≤,or =), and a critical value. For example, anaverage value greater than 80 could be set as acondition for triggering an alarm.
80
Occurrences Specifies the number of sampling points when an alarm is triggered. For example, if Occurrences is set to n, the number of sampling points of the alarm rule is the sampling points in n consecutive monitoring intervals. Only if all the sampling points meet the threshold configured for the alarm rule, will the alarm rule status be refreshed as the Alarm status.
3
Monitoring Interval Specifies the interval at which the alarm statusis updated based on the alarm rule.
5 minutes
Alarm Severity Specifies the severity of the alarm. Valid valuesare Critical, Major, Minor, andInformational.
Major
Send Notification Specifies whether to notify users by sendingemails or text messages, or by sending HTTP/HTTPS requests to the servers.
N/A
6. Click OK.
12.2 Disabling Alarm RulesOn the Alarm Rules page, locate the row that contains the target alarm rule, click Disable inthe Operation column, and click OK on the displayed Disable Alarm Rule dialog box.
If you want to delete multiple alarm rules, on the Alarm Rules page, select multiple alarmrules, click Disable under Add Alarm Rule, and click OK on the displayed Disable AlarmRule dialog box.
12.3 Enabling Alarm RulesOn the Alarm Rules page, locate the row that contains the target alarm rule, click Enable inthe Operation column, and click OK on the displayed Enable Alarm Rule dialog box.
If you want to enable multiple alarm rules, on the Alarm Rules page, select multiple alarmrules, click Enable under Add Alarm Rule, and click OK on the displayed Enable AlarmRule dialog box.
Cloud EyeUser Guide 12 Alarm Rule Management
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
85
12.4 Deleting Alarm RulesOn the Alarm Rules page, locate the row that contains the target alarm rule, click Delete inthe Operation column, and click OK on the displayed Delete Alarm Rule dialog box.
If you want to delete multiple alarm rules, on the Alarm Rules page, select multiple alarmrules, click Disable under Add Alarm Rule, and click OK on the displayed Delete AlarmRule dialog box.
Cloud EyeUser Guide 12 Alarm Rule Management
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
86
13 Alarm Templates
An alarm template is a group of alarm rules based on services. It helps you quickly createalarm rules for multiple resources of a cloud service in batch. Cloud Eye recommends alarmtemplates based on the attribute of each cloud service. Cloud Eye also allows you to choosemetrics and create custom templates as needed.
13.1 Viewing Alarm TemplatesIf this is not your first time logging in to Cloud Eye, perform the following steps to go to theAlarm Templates page:
1. Log in to the management console.2. Under Management & Deployment, click Cloud Eye.3. Choose Alarm Management > Alarm Templates.
On the Alarm Templates page, you can view, modify, or delete created templates. You canalso create custom templates.
13.2 Creating Custom Templates1. On the Alarm Templates page, click Create Custom Template.2. In the Select Template step, configure parameters based on Table 13-1.
Cloud EyeUser Guide 13 Alarm Templates
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
87
Figure 13-1 Create Custom Template
Table 13-1 Parameters
Parameter Description Example Value
Resource Type Specifies the name of the service forwhich the alarm rule is configured.
Elastic Cloud Server
Dimension Specifies the metric dimension of thealarm rule.
ECS
Import fromTemplate
l Yes– Select an existing template.
l No
N/A
3. Click Next. In the Add Alarm Rule step, configure parameters based on Table 13-2.
Figure 13-2 Add Alarm Rule
Cloud EyeUser Guide 13 Alarm Templates
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
88
Table 13-2 Parameters
Parameter Description ExampleValue
Metric For example:l CPU Usage
Indicates the CPU usage (%) of the monitoredobject.
l Memory UsageIndicates the percentage of memory currentlyin use. The unit is percent.
N/A
Rollup Valid values are Raw data, Avg., Max., Min.,Sum, and Variance.
N/A
Threshold Specifies the operator, which can be >, ≥, <, ≤, or=.
N/A
AlarmThreshold
Specifies the critical value that will trigger thealarm rule.
80
MonitoringInterval
Specifies the interval at which the alarm status isupdated based on the alarm rule.
5 minutes
Occurrences Specifies the number of sampling points when an alarm is triggered. For example, if Occurrences is set to n, the number of sampling points of the alarm rule is the sampling points in n consecutive monitoring intervals. Only if all the sampling points meet the threshold configured for the alarm rule, will the alarm rule status be refreshed as the Alarm status.
N/A
AlarmSeverity
Specifies the severity of the alarm. Valid valuesare Critical, Major, Minor, and Informational.
Major
Operation When the number of the custom metrics is two ormore than two, you can delete custom metrics.
N/A
4. Click Next. In the Specify Details step, configure parameters based on Table 13-3.
Table 13-3 Parameters
Parameter Description ExampleValue
Name Specifies the alarm rule name. The systemgenerates a name randomly but you can changeit.
alarmTemplate-ku0x
Description Provides supplementary information about thealarm template. This parameter is optional.
N/A
Cloud EyeUser Guide 13 Alarm Templates
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
89
5. Click Create.
13.3 Modifying Custom Templates1. In the navigation pane on the left, choose Alarm Management > Alarm Templates and
click Custom Templates. Locate the target template and click Modify in the Operationcolumn.
2. In the displayed Modify Custom Alarm Template dialog box, reconfigure parametersbased on Table 13-2.
Figure 13-3 Modify Custom Alarm Template
3. Click Next. In the Specify Details step, configure parameters based on Table 13-3.
13.4 Deleting Custom TemplatesIn the navigation pane on the left, choose Alarm Management > Alarm Templates and clickCustom Templates. Locate the target template and click Delete in the Operation column.
Figure 13-4 Deleting a custom template
Cloud EyeUser Guide 13 Alarm Templates
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
90
14 Auditing Operation Records on Cloud
Eye
Cloud Trace Service (CTS) records Cloud Eye operation requests initiated from the publiccloud management console or open APIs and responses to the requests. You can query, audit,and trace back the operation records.
14.1 Key Cloud Eye Operations
Table 14-1 Cloud Eye operations that can be recorded by CTS
Operation Resource Type Trace Name
Adding an alarm rule alarm_rule createAlarmRule
Deleting an alarm rule alarm_rule deleteAlarmRule
Disabling an alarm rule alarm_rule disableAlarmRule
Enabling an alarm rule alarm_rule enableAlarmRule
Modifying an alarm rule alarm_rule updateAlarmRule
Updating the alarm status toalarm
alarm_rule alarmStatusChangeToAlarm
Updating the alarm status toinsufficient data
alarm_rule alarmStatusChangeToInsuffi-cientData
Updating the alarm status tonormal
alarm_rule alarmStatusChangeToOk
Creating a custom alarmtemplate
alarm_template createAlarmTemplate
Deleting a custom alarmtemplate
alarm_template deleteAlarmTemplate
Modifying a custom alarmtemplate
alarm_template updateAlarmTemplate
Cloud EyeUser Guide 14 Auditing Operation Records on Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
91
Operation Resource Type Trace Name
Creating a monitoring panel dashboard createDashboard
Deleting a monitoring panel dashboard deleteDashboard
Modifying a monitoring panel dashboard updateDashboard
Adding monitoring data metric addMetricData
Exporting monitoring data metric downloadMetricsReport
Configuring OBS transfer obs_transfer createObsTransfer
Modifying OBS transfer obs_transfer updateObsTransfer
Adding remote monitoringrules
remote_check createRemoteMonitoringRules
Deleting remote monitoringrules
remote_check deleteRemoteMonitoringRules
Modifying remote monitoringrules
remote_check updateRemoteMonitoringRule
14.2 Viewing Cloud Eye Logs
ScenariosAfter CTS is enabled, CTS starts recording operations on cloud resources. The CTSmanagement console stores the operation records of the last 7 days.
This section describes how to query the last seven days of operation records on the CTSconsole.
Procedure1. Log in to the management console.
2. Click in the upper left corner and select a region and project.3. Click Service List and choose Management & Deployment > Cloud Trace Service.4. In the left navigation pane, choose Trace List.5. Click Filter and specify filters as needed.
You can query traces using a combination of the following dimensions:– Trace Source, Resource Type, and Search By
Select a filter from the drop-down list.When you select Trace name for Search By, you also need to select a trace name.When you select Resource ID for Search By, you also need to select or enter aresource ID.When you select Resource name for Search By, you also need to select or enter aresource name.
Cloud EyeUser Guide 14 Auditing Operation Records on Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
92
– Operator: Select an operator.– Trace Status: Select one of All trace statuses, normal, warning, and incident.– Time Range: Select a start and end date and time within the last seven days.
6. Click on the left of a trace to expand its details.
Figure 14-1 Expanding trace details
7. Click View Trace in the Operation column. On the displayed View Trace dialog box,view details of the trace.
Figure 14-2 View Trace
Cloud EyeUser Guide 14 Auditing Operation Records on Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
93
15 Services Supported by Cloud Eye
15.1 Computing
15.1.1 ECS Metrics
Table 15-1 ECS metrics
Metric Windows ECS Linux ECS
CPU Usage √ √
Memory Usage √ ×
Disk Usage √ ×
Disks Read Rate √ √
Disks Write Rate √ √
Disks Read Requests √ √
Disks Write Requests √ √
Inband Incoming Rate √ ×
Inband Outcoming Rate √ ×
Outband Incoming Rate √ √
Outband Outcoming Rate √ √
Table 15-2 describes these ECS metrics.
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
94
Table 15-2 ECS monitoring metrics
Metric Description Formula Remarks
CPU Usage Indicates the CPU usage (%)of an ECS.
CPU usage of an ECS/Number of CPU coresin the ECS
N/A
Memory Usage Indicates the memory usage(%) of an ECS.
Used memory of anECS/Total memory ofthe ECS
This metric isunavailable ifthe image hasno vmtoolsinstalled.
Disk Usage Indicates the disk usage (%)of an ECS.
Used capacity of anECS disk/Totalcapacity of the ECSdisk
This metric isunavailable ifthe image hasno vmtoolsinstalled.
Disks ReadRate
Indicates the number ofbytes read from an ECS persecond.
Total number of bytesread from an ECSdisk/Monitoringperiod
byte_out =(rd_bytes -last_rd_bytes) /Time difference
Disks WriteRate
Indicates the number ofbytes written to an ECS persecond.
Total number of byteswritten to an ECSdisk/Monitoringperiod
N/A
Disks ReadRequests
Indicates the number of readrequests sent to an ECS persecond.
Total number of readrequests sent to anECS disk/Monitoringperiod
req_out =(rd_req -last_rd_req)/Time difference
Disks WriteRequests
Indicates the number ofwrite requests sent to anECS per second.
Total number of writerequests sent to anECS disk/Monitoringperiod
req_in =(wr_req -last_wr_req)/Time difference
InbandIncoming Rate
Indicates the number ofincoming bytes on an ECSper second.
Total number ofinband incoming byteson an ECS/Monitoringperiod
N/A
InbandOutgoing Rate
Indicates the number ofoutgoing bytes on an ECSper second.
Total number ofinband outgoing byteson an ECS/Monitoringperiod
N/A
OutbandIncoming Rate
Indicates the number ofincoming bytes on an ECSper second at thevirtualization layer.
Total number ofoutband incomingbytes on an ECS/Monitoring period
This metric isunavailable ifSR-IOV isenabled.
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
95
Metric Description Formula Remarks
OutbandOutgoing Rate
Indicates the number ofoutgoing bytes on an ECSper second at thevirtualization layer.
Total number ofoutband outgoingbytes on an ECS/Monitoring period
This metric isunavailable ifSR-IOV isenabled.
15.1.2 BMS Metrics
15.1.2.1 Metrics Under Basic Monitoring
Table 15-3 OS Monitoring metrics
Metric Description ValueRange
MonitoredObject
Overall CPUHealth Status
Overall CPU health status of themonitored objectThe possible values are:1 (ok)2 (minor)3 (major)4 (critical)5 (absence)6 (unknown)
1,2,3,4,5,6 BMS
Overall PowerHealth Status
Overall power health status of themonitored objectThe possible values are:1 (ok)2 (minor)3 (major)4 (critical)5 (absence)6 (unknown)
1,2,3,4,5,6 BMS
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
96
Metric Description ValueRange
MonitoredObject
Power HealthStatus
Power health status of the monitoredobjectThe possible values are:1 (ok)2 (minor)3 (major)4 (critical)5 (absence)6 (unknown)
1,2,3,4,5,6 BMS
OverallMemory HealthStatus
Overall memory health status of themonitored objectThe possible values are:1 (ok)2 (minor)3 (major)4 (critical)5 (absence6 (unknown)
1,2,3,4,5,6 BMS
Overall HardDisk HealthStatus
Overall hard disk health status of themonitored objectThe possible values are:1 (ok)2 (minor)3 (major)4 (critical)5 (absence)6 (unknown)
1,2,3,4,5,6 BMS
Hard DiskHealth Status
Hard disk health status of themonitored objectThe possible values are:1 (ok)2 (minor)3 (major)4 (critical)5 (absence)6 (unknown)
1,2,3,4,5,6 BMS
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
97
Metric Description ValueRange
MonitoredObject
RAIDControllerHealth Status
RAID controller health status of themonitored objectThe possible values are:1 (ok)2 (warning)3 (critical)4 (null)
1,2,3,4 BMS
EthernetInterfaces LinkStatus
Ethernet interface link status of themonitored objectThe possible values are:1 (LinkUp)2 (NoLink)3 (LinkDown)
1,2,3 BMS
15.1.2.2 OS Monitoring MetricsSupported BMS OS Monitoring metrics include CPU metrics listed in Table 15-4, CPU loadmetrics listed in Table 15-5, memory metrics listed in Table 15-6, disk metrics listed in Table15-7, disk I/O metrics listed in Table 15-8, file system metrics listed in Table 15-9, NICmetrics listed in Table 15-10, and software RAID metrics listed in Table 15-11.
NOTE
l To monitor BMS, the Agent is required.
l To monitor software RAID metrics, Agent 1.0.5 or later is required.
l Currently, BMSs running the Windows OS cannot be monitored.
Table 15-4 CPU metrics
Metric Description ValueRange
MonitoredObject
Collection Mode
Idle CPU Usage Percentage oftime that CPUis idleUnit: Percent
0–100% BMS Check file /proc/statin 10-second intervals.Run the top commandto check the %Cpu(s)id value.
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
98
Metric Description ValueRange
MonitoredObject
Collection Mode
Other ProcessCPU Usage
Percentage oftime that theCPU is used byother processesUnit: Percent
0–100% BMS The formulas are asfollows:Other Process CPUUsage = 1- Idle CPUUsage - Kernel SpaceCPU Usage - UserSpace CPU Usage
Kernel SpaceCPU Usage
Percentage oftime that theCPU is used bykernel spaceUnit: Percent
0–100% BMS Check file /proc/statin 10-second intervals.Run the top commandto check the %Cpu(s)sy value.
User SpaceCPU Usage
Percentage oftime that theCPU is used byuser spaceUnit: Percent
0–100% BMS Check file /proc/statin 10-second intervals.Run the top commandto check the %Cpu(s)us value.
Nice ProcessCPU Usage
Percentage oftime that theCPU is in usermode with low-priorityprocesses whichcan easily beinterrupted byhigher-priorityprocessesUnit: Percent
0–100% BMS Check file /proc/statin 10-second intervals.Run the top commandto check the %Cpu(s)ni value.
iowait ProcessCPU Usage
Percentage oftime that theCPU is waitingfor I/Ooperations tocompleteUnit: Percent
0–100% BMS Check file /proc/statin 10-second intervals.Run the top commandto check the %Cpu(s)wa value.
CPU InterruptTime
Percentage oftime that theCPU isservicinginterruptsUnit: Percent
0–100% BMS Check file /proc/statin 10-second intervals.Run the top commandto check the %Cpu(s)hi value.
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
99
Metric Description ValueRange
MonitoredObject
Collection Mode
CPU SoftwareInterrupt Time
Percentage oftime that theCPU isservicingsoftwareinterruptsUnit: Percent
0–100% BMS Check file /proc/statin 10-second intervals.Run the top commandto check the %Cpu(s)si value.
Table 15-5 CPU load metrics
Metric Description ValueRange
Monitored Object
Collection Mode
1-Minute LoadAverage
CPU loadaveraged fromthe last 1minuteUnit: task/CPU
≥ 0 BMS Obtain its value byusing the load1/ valueto divide the number oflogical CPUs.Run the top commandto check the load1value in the /proc/loadavg file.
5-Minute LoadAverage
CPU loadaveraged fromthe last 5minutesUnit: task/CPU
≥ 0 BMS Obtain its value byusing the load5/ valueto divide the number oflogical CPUs.Run the top commandto check the load5value in the /proc/loadavg file.
15-Minute LoadAverage
CPU loadaveraged fromthe last 15minutesUnit: task/CPU
≥ 0 BMS Obtain its value byusing the load15/ valueto divide the number oflogical CPUs.Run the top commandto check the load15value in the /proc/loadavg file.
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
100
Table 15-6 Memory metrics
Metric Description ValueRange
Monitored Object
Collection Mode
AvailableMemory
Amount ofmemory that isavailable andcan be giveninstantly toprocessesUnit: GB
≥ 0 GB BMS Obtain theMemAvailable valueby checking file /proc/meminfo. If it is notdisplayed in the file,MemAvailable =MemFree + Buffers+Cached
MemoryUsage
Percentage ofmemorycurrently in useUnit: Percent.
0–100% BMS Check file /proc/meminfo. MemoryUsage = (MemTotal-MemAvailable)/MemTotal
Idle Memory The amount ofmemory that isnot being usedUnit: GB
≥ 0 GB BMS Obtain its value bychecking file /proc/meminfo.
Buffer The amount ofmemory that isbeing used forbuffersUnit: GB
≥ 0 GB BMS Obtain its value bychecking file /proc/meminfo.Run the top commandto check the KiBMem:buffers value.
Cache The amount ofmemory that isbeing used forfile cachesUnit: GB
≥ 0 GB BMS Obtain its value bychecking file /proc/meminfo.Run the top commandto check the KiBSwap:cached Memvalue.
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
101
Table 15-7 Disk metrics
Metric Description ValueRange
MonitoredObject
Collection Mode
Available DiskSpace
Sace that is notused on thedisksUnit: GB
≥ 0 GB BMS Run the df -hcommand to check thedata in the Availcolumn.The path of the mountpoint prefix cannotexceed 64 characters. Itmust start with a letter,and contain only digits,lowercase letters,uppercase letters,hyphens (-), dots (.),and swung dashes (~).
Disk StorageCapacity
Total space onthe disks,including usedand freeUnit: GB
≥ 0 GB BMS Run the df -hcommand to check thedata in the Sizecolumn.The path of the mountpoint prefix cannotexceed 64 characters. Itmust start with a letter,and contain only digits,lowercase letters,uppercase letters,hyphens (-), dots (.),and swung dashes (~).
Used DiskSpace
Used space onthe disksUnit: GB
≥ 0 GB BMS Run the df -hcommand to check thedata in the Usedcolumn.The path of the mountpoint prefix cannotexceed 64 characters. Itmust start with a letter,and contain only digits,lowercase letters,uppercase letters,hyphens (-), dots (.),and swung dashes (~).
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
102
Metric Description ValueRange
MonitoredObject
Collection Mode
Disk Usage Percentage oftotal disk spacethat is usedUnit: PercentIt is calculatedas follows: DiskUsage = UsedDisk Space/Disk StorageCapacity
0–100% BMS Used/SizeThe path of the mountpoint prefix cannotexceed 64 characters. Itmust start with a letter,and contain only digits,lowercase letters,uppercase letters,hyphens (-), dots (.),and swung dashes (~).
Table 15-8 Disk I/O metrics
Metric Description ValueRange
MonitoredObject
Collection Mode
Disks ReadRate
Number of bytesread from themonitored diskper secondUnit: Byte/s
≥ 0 bytes/s BMS The disks read rate iscalculated bycalculating the datachanges in the sixthcolumn of thecorresponding devicein file /proc/diskstatsin 10-second intervals.The path of the mountpoint prefix cannotexceed 64 characters. Itmust start with a letter,and contain only digits,lowercase letters,uppercase letters,hyphens (-), dots (.),and swung dashes (~).
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
103
Metric Description ValueRange
MonitoredObject
Collection Mode
Disks ReadRequests
Number of readrequests sent tothe monitoreddisk per secondUnit: Request/s
≥ 0requests/s
BMS The disks read requestsare calculated bycalculating the datachanges in the fourthcolumn of thecorresponding devicein file /proc/diskstatsin 10-second intervals.The path of the mountpoint prefix cannotexceed 64 characters. Itmust start with a letter,and contain only digits,lowercase letters,uppercase letters,hyphens (-), dots (.),and swung dashes (~).
Disks WriteRate
Number of byteswritten to themonitored diskper secondUnit: Byte/s
≥ 0 bytes/s BMS The disks write rate iscalculated bycalculating the datachanges in the tenthcolumn of thecorresponding devicein file /proc/diskstatsin 10-second intervals.The path of the mountpoint prefix cannotexceed 64 characters. Itmust start with a letter,and contain only digits,lowercase letters,uppercase letters,hyphens (-), dots (.),and swung dashes (~).
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
104
Metric Description ValueRange
MonitoredObject
Collection Mode
Disks WriteRequests
Number of writerequests sent tothe monitoreddisk per secondUnit: Request/s
≥ 0requests/s
BMS The disks writerequests are calculatedby calculating the datachanges in the eighthcolumn of thecorresponding devicein file /proc/diskstatsin 10-second intervals.The path of the mountpoint prefix cannotexceed 64 characters. Itmust start with a letter,and contain only digits,lowercase letters,uppercase letters,hyphens (-), dots (.),and swung dashes (~).
Average ReadRequest Time
Average amountof time that readrequests havewaited on thedisksUnit: ms/count
≥ 0 BMS The average readrequest time iscalculated bycalculating the datachanges in the seventhcolumn of thecorresponding devicein file /proc/diskstatsin 10-second intervals.The path of the mountpoint prefix cannotexceed 64 characters. Itmust start with a letter,and contain only digits,lowercase letters,uppercase letters,hyphens (-), dots (.),and swung dashes (~).
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
105
Metric Description ValueRange
MonitoredObject
Collection Mode
Average WriteRequest Time
Average amountof time thatwrite requestshave waited onthe disksUnit: ms/count
≥ 0 BMS The average writerequest time iscalculated bycalculating the datachanges in the eleventhcolumn of thecorresponding devicein file /proc/diskstatsin 10-second intervals.The path of the mountpoint prefix cannotexceed 64 characters. Itmust start with a letter,and contain only digits,lowercase letters,uppercase letters,hyphens (-), dots (.),and swung dashes (~).
Disk I/OUsage
Percentage ofthe time that thedisk has had I/Orequests queuedto the total diskoperation timeUnit: Percent
≥ 0 BMS The disk I/O usage iscalculated bycalculating the datachanges in thethirteenth column ofthe correspondingdevice in file /proc/diskstats in 10-secondintervals.The path of the mountpoint prefix cannotexceed 64 characters. Itmust start with a letter,and contain only digits,lowercase letters,uppercase letters,hyphens (-), dots (.),and swung dashes (~).
File SystemRead/WriteStatus
Indicates theread and writestatus of themounted filesystem of themonitoredobject. Possiblevalues are 0(read and write)and 1 (readonly).
0,1 Monitoredobject: ECS
Check file systeminformation in thefourth column in file /proc/mounts.
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
106
Table 15-9 File system metrics
Metric Description ValueRange
Monitored Object
Collection Mode
Disk inodeTotal
Total number ofindex nodes onthe disk
≥ 0 BMS Run the df -i commandto check the data in theInodes column.The path of the mountpoint prefix cannotexceed 64 characters. Itmust start with a letter,and contain only digits,lowercase letters,uppercase letters,hyphens (-), dots (.),and swung dashes (~).
Total inodeUsed
Number of usedindex nodes onthe disk
≥ 0 BMS Run the df -i commandto check the data in theIUsed column.The path of the mountpoint prefix cannotexceed 64 characters. Itmust start with a letter,and contain only digits,lowercase letters,uppercase letters,hyphens (-), dots (.),and swung dashes (~).
Percentage ofTotal inodeUsed
Percentage ofused index nodesto the total indexnodes on the diskUnit: Percent
0-100% BMS Run the df -i commandto check the data in theIUse% column.The path of the mountpoint prefix cannotexceed 64 characters. Itmust start with a letter,and contain only digits,lowercase letters,uppercase letters,hyphens (-), dots (.),and swung dashes (~).
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
107
Table 15-10 NIC metrics
Metric Description ValueRange
MonitoredObject
Collection Mode
InboundBandwidth
Bits sent persecond of themonitored objectNICUnit: bit/s
≥ 0 bits/s BMS Check the metric valuechanges in file /proc/net/dev in a 10sinterval.
OutboundBandwidth
Bits received persecond of themonitored objectNICUnit: bit/s
≥ 0 bits/s BMS
NIC PacketReceive Rate
Number ofpackets receivedby this networkinterface persecondUnit: Count/s
≥ 0 counts/s BMS
NIC PacketSend Rate
Number ofpackets sent bythis networkinterface persecondUnit: Count/s
≥ 0 counts/s BMS
Receive ErrorRate
Percentage ofreceive errorsdetected by thisnetwork interfaceper secondUnit: Percent
0-100% BMS
TransmitError Rate
Percentage oftransmit errorsdetected by thisnetwork interfaceper secondUnit: Percent
0-100% BMS
ReceivedPacket DropRate
Percentage ofpackets receivedby this networkinterface whichwere dropped persecondUnit: Percent
0-100% BMS
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
108
Metric Description ValueRange
MonitoredObject
Collection Mode
TransmittedPacket DropRate
Percentage ofpacketstransmitted bythis networkinterface whichwere dropped persecondUnit: Percent
0-100% BMS
Table 15-11 Software RAID metrics
Metric Description Value Range MonitoredObject
Collection Mode
Status Status of thesoftware RAIDdevices of themonitored objectIf the RAID isabnormal, the valueis 0.
0 or 1NOTE
If the RAID isnormal, the valueis 1. If the RAIDis abnormal, thevalue is 0.
BMS Run the plug-inscript /usr/local/telescope/plugins/raid-monitor.sh in10-second intervals.Obtain its value bycalculating the datachanges in the /proc/mdstat file and runthe mdadm -D/dev/md0 (RAIDname) command.NOTE
In the precedingcommand, 10sindicates the metriccollection periodconfigured in the RAIDplug-in.
ActiveDisks
Number of activedisks of thesoftware RAID ofthe monitoredobjectThe parametervalue is -1 if theRAID is abnormal.
≥ 0 or -1NOTE
If the RAID isnormal, the valueis 0. If the RAIDis abnormal, thevalue is -1.
BMS
WorkingDisks
Number of workingdisks of thesoftware RAID ofthe monitoredobjectThe parametervalue is -1 if theRAID is abnormal.
≥ 0 or -1NOTE
If the RAID isnormal, the valueis 0. If the RAIDis abnormal, thevalue is -1.
BMS
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
109
Metric Description Value Range MonitoredObject
Collection Mode
FailedDisks
Number of faileddisks of thesoftware RAID ofthe monitoredobjectThe parametervalue is -1 if theRAID is abnormal.
≥ 0 or -1NOTE
If the RAID isnormal, the valueis 0. If the RAIDis abnormal, thevalue is -1.
BMS
Spare Disks Number of sparedisks of thesoftware RAID ofthe monitoredobjectThe parametervalue is -1 if theRAID is abnormal.
≥ 0 or -1NOTE
If the RAID isnormal, the valueis 0. If the RAIDis abnormal, thevalue is -1.
BMS
15.1.3 AS Metrics
Table 15-12 AS metrics
Metric Description Formula Description
CPU Usage Indicates the CPU usage(%) of an AS group.
CPU usage of all instancesin an AS group/Number ofvCPUs of all instances inthe AS group
N/A
Memory Usage Indicates the memoryusage (%) of an ASgroup.
Used memory of allinstances in an AS group/Total memory of allinstances in the AS group
This metric isunavailable ifthe in-serviceimage has noVM toolsinstalled.
Number ofInstances
Specifies the number ofavailable instances in anAS group.
Total number of functionalinstances in an AS group
N/A
InbandIncoming Rate
Indicates the number ofincoming bytes on theinstances in an ASgroup per second.
(Total number of inbandincoming bytes on allinstances in an AS group/Total number of instancesin the AS group)/Monitoring period
N/A
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
110
Metric Description Formula Description
InbandOutcoming Rate
Indicates the number ofoutgoing bytes on theinstances in an ASgroup per second.
(Total number of inbandoutgoing bytes on allinstances in an AS group/Total number of instancesin the AS group)/Monitoring period
N/A
Disks ReadRate
Indicates the number ofbytes read from allinstances in an ASgroup per second.
(Total number of bytes readfrom all instances in an ASgroup/Total number ofinstances in the AS group)/Monitoring period
N/A
Disks WriteRate
Indicates the number ofbytes written to allinstances in an ASgroup per second.
(Total number of byteswritten to all instances inan AS group/Total numberof instances in the ASgroup)/Monitoring period
N/A
Disks ReadRequests
Indicates the number ofread requests sent to allinstances in an ASgroup per second.
(Total number of readrequests sent to allinstances in an AS group/Total number of instancesin the AS group)/Monitoring period
N/A
Disks WriteRequests
Indicates the number ofwrite requests sent to allinstances in an ASgroup per second.
(Total number of writerequests sent to allinstances in an AS group/Total number of instancesin the AS group)/Monitoring period
N/A
NOTE
For details about whether your OS supports the Memory Usage, Inband Outgoing Rate, and InbandIncoming Rate metrics, see the Elastic Cloud Server User Guide.
15.2 Storage
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
111
15.2.1 EVS Metrics
Table 15-13 EVS metrics
Metric Definition MonitoredObject
Formula
Disk ReadRate
Number of bytes read fromthe monitored disk persecondUnit: Byte/s
EVS disk Total number of bytes readfrom an EVS disk attachedto the server/Monitoringperiod
Disk WriteRate
Number of bytes written tothe monitored disk persecondUnit: Byte/s
EVS disk Total number of byteswritten to an EVS diskattached to the server/Monitoring period
Disk ReadRequests
Number of read requestssent to the monitored diskper secondUnit: Request/s
EVS disk Total number of requestsfor reading data from anEVS disk attached to theserver/Monitoring period
Disk WriteRequests
Number of write requestssent to the monitored diskper secondUnit: Request/s
EVS disk Total number of requestsfor writing data into anEVS disk attached to theserver/Monitoring period
15.2.2 OBS Metrics
Table 15-14 OBS Metrics
Metric Description ValueRange
Monitored Object
BytesDownloaded
Response bytes of all download requestsmade to all buckets in a region, includingbytes in HTTP bodiesUnit: Byte
≥ 0 bytes OBS
BytesUploaded
Bytes in the message bodies of all uploadrequests made to all buckets in a region,including bytes in HTTP bodiesUnit: Byte
≥ 0 bytes OBS
GET Requests Number of GET, HEAD, or OPTIONSrequests made to all buckets and objects inthe buckets of a regionUnit: Count
≥ 0 counts OBS
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
112
Metric Description ValueRange
Monitored Object
PUT Requests Number of PUT, POST, or DELETErequests made to all buckets and objects inthe buckets of a regionUnit: Count
≥ 0 counts OBS
First ByteDownloadDelay
Average time that a system receives aGET, HEAD, or OPTIONS request to thetime that the system starts to respond to therequest in a measurement period
≥ 0 ms OBS
4xx Errors Number of times that the client responds torequests whose error codes are 4xxUnit: Count
≥ 0 counts OBS
5xx Errors Number of times that the client responds torequests whose error codes are 5xxUnit: Count
≥ 0 counts OBS
15.2.3 SFS Metrics
Table 15-15 SFS metrics
Metric Description ValueRange
MonitoredObject
ReadBandwidth
Specifies the read bandwidth (byte/s) ofthe monitored object within a monitoringperiod.
≥ 0 bytes/s File sharing
WriteBandwidth
Specifies the write bandwidth (byte/s) ofthe monitored object within a monitoringperiod.
≥ 0 bytes/s File sharing
Read/writeBandwidth
Specifies the read and write bandwidth(byte/s) of the monitored object within amonitoring period.
≥ 0 bytes/s File sharing
15.3 Network
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
113
15.3.1 VPC Metrics
Table 15-16 VPC metrics
Metric Description Value Range MonitoredObject
OutboundBandwidth(Deprecated)
Network rate of outbound traffic(The original metric name isUpstream Bandwidth.)
≥ 0 bytes/s Bandwidth orEIP
InboundBandwidth(Deprecated)
Network rate of inbound traffic(The original metric name isDownstream Bandwidth.)
≥ 0 bytes/s Bandwidth orEIP
OutboundBandwidth
Network rate of outbound traffic(The original metric name isUpstream Bandwidth.)
≥ 0 bits/s Bandwidth orEIP
InboundBandwidth
Network rate of inbound traffic(The original metric name isDownstream Bandwidth.)
≥ 0 bits/s Bandwidth orEIP
UpstreamBandwidthUsage
Usage of network rate ofoutbound trafficUnit: Percent.
1-100% Bandwidth orEIP
OutboundTraffic
Network traffic going out of thecloud platform(The original metric name isUpstream Traffic.)
≥ 0 bytes Bandwidth orEIP
InboundTraffic
Network traffic going into thecloud platform(The original metric name isDownstream Traffic.)
≥ 0 bytes Bandwidth orEIP
15.3.2 ELB Metrics
Table 15-17 Load balancer metrics
Metric Description
ConcurrentConnections
Total number of concurrent connections processed by the load balancer
ActiveConnections
Total number of active connections processed by the load balancer
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
114
Metric Description
InactiveConnections
Total number of inactive connections processed by the load balancer
NewConnections
Total number of new connections processed by the load balancer
IncomingPackets
Number of incoming packets received by the load balancer per secondUnit: Packet/s
OutgoingPackets
Number of outgoing packets send from the load balancer per secondUnit: Packet/s
Inbound Rate Number of incoming bytes received by the load balancer per secondUnit: Byte/s
Outbound Rate Number of outgoing bytes sent from the load balancer per secondUnit: Byte/s
AbnormalHosts
Number of backend servers considered unhealthy
Normal Hosts Number of backend servers considered healthy
Table 15-18 Enhanced load balancer listener metrics
Metric Description
ConcurrentConnections
Total number of concurrent connections processed by the listener
ActiveConnections
Total number of active connections processed by the listener
InactiveConnections
Total number of inactive connections processed by the listener
NewConnections
Total number of new connections processed by the listener
IncomingPackets
Number of incoming packets received by the listener per secondUnit: Packet/s
OutgoingPackets
Number of outgoing packets send from the listener per secondUnit: Packet/s
Inbound Rate Number of incoming bytes received by the listener per secondUnit: Byte/s
Outbound Rate Number of outgoing bytes send from the listener per secondUnit: Byte/s
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
115
15.3.3 NAT Gateway Metrics
Table 15-19 NAT Gateway Metrics
Metric Description ValueRange
MonitoredObject
SNATConnections
Number of SNAT connections initiatedby the current user
≥ 0 count Active node ofNAT gateway
15.4 Security
15.4.1 WAF Metrics
Table 15-20 WAF metrics
Metric Description Value Range Monitored Object
SQL InjectionAlarms
Collects the numberof SQL injectionalarms of amonitored object.
≥ 0 counts ECS
cross site script(XSS) VulnerabilityAlarms
Collects the numberof XSS vulnerabilityalarms of amonitored object.
≥ 0 counts ECS
Webshell UploadAlarms
Collects the numberof webshell uploadalarms of amonitored object.
≥ 0 counts ECS
Link Theft Alarms Collects the numberof link theft alarmsof a monitoredobject.
≥ 0 counts ECS
IP Address BlacklistAlarms
Collects the numberof IP addressblacklist alarms of amonitored object.
≥ 0 counts ECS
IP Address WhitelistAlarms
Collects the numberof IP addresswhitelist alarms of amonitored object.
≥ 0 counts ECS
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
116
15.5 Application
15.5.1 DMS Metrics
Table 15-21 DMS metrics
Metric Description ValueRange
MonitoredObject
QueuedMessages
Specifies the current number ofmessages in a queue.Messages older than 72 hours will bedeleted from a queue and deletedmessages are not counted into themetric. Dead letter messages Dead lettermessages are specific to consumergroups and stored in dead letter queues.Therefore, generation and expiry of deadletter messages do not affect the metric.
≥ 0 DMS queue
Message Size(byte)
Specifies the total size of messages sentto a queue during the past minute.This metric gives you an overview ofmessage load flowing into a queue.
≥ 0 DMS queue
Request Count Specifies the total number of requestssent to a queue during the past minute.
≥ 0 DMS queue
AccumulatedMessages
Specifies the current number ofmessages that are not retrieved by aconsumer group.Dead letter messages older than 72hours will be deleted from a queue.Once deleted, dead letter messages canno longer be retrieved by a consumergroup and therefore they are not countedinto the metric.Dead letter messages are flagged asretrieved messages and therefore notcounted into the metric.
≥ 0 DMS consumergroup
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
117
Metric Description ValueRange
MonitoredObject
ConsumedMessages
Specifies the accumulated number ofmessages retrieved by a consumer groupsince the consumer group is created.Dead letter messages are counted intothe metric because dead letter messagesare flagged as retrieved messages.The count of skipped messages isaccumulated since a consumer group iscreated.
≥ 0 DMS consumergroup
SkippedMessages
Specifies the accumulated number ofmessages that are deleted and neverretrieved.The count of skipped messages isaccumulated since a consumer group iscreated.Messages older than 72 hours will bedeleted from a queue. Deleted messagescan no longer be retrieved by aconsumer group.The count of skipped messages includesthe messages filtered out by messagelabels during message retrieval. Forexample, if only message 1 and message10 match the preset label, then only thetwo messages are retrieved this time andthe next retrieval starts from message11. This means that messages 2–9 areskipped.After the retrieval start position is reset,messages ahead of the retrieval startposition will be flagged as retrievedmessages and the number of skippedmessages will be reset to zero.
≥ 0 DMS consumergroup
AvailableDead LetterMessages
Specifies the current number of deadletter messages that are not retrieved bya consumer group.Dead letter messages older than 72hours will be deleted from a queue.Once deleted, dead letter messages canno longer be retrieved by a consumergroup and therefore they are not countedinto the metric.
≥ 0 DMS consumergroup
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
118
Metric Description ValueRange
MonitoredObject
HistoricalDead LetterMessages
Specifies the accumulated number ofdead letter messages that have beengenerated for a consumer group sincethe consumer group is created. Thecount of historical dead letter messagesincludes the retrieved dead lettermessages, remaining dead lettermessages, and expired dead lettermessages.
≥ 0 DMS consumergroup
15.5.2 FunctionGraph Metrics
Table 15-22 FunctionGraph metrics
Metric Description ValueRange
MonitoredObject
ExecutionsStarted
Specifies the number of instances thatstart to execute.
≥ 0 Workflow
ExecutionsSucceeded
Specifies the number of instances thatexecute successfully.
≥ 0 Workflow
ExecutionsFailed
Specifies the number of instances thatfailed to be executed.
≥ 0 Workflow
ExecutionsAborted
Specifies the number of instances that areaborted.
≥ 0 Workflow
ExecutionsTimedOut
Specifies the number of instances that runout of time.
≥ 0 Workflow
15.5.3 API Gateway Metrics
Table 15-23 API Gateway metrics
Metric Description ValueRange
Monitored Object
Api Calls Specifies the number of timesthat an API is called. Unit:time/min
≥ 0 times/min API
2xx Calls Specifies the number of timesthat 2xx is called. Unit:time/min
≥ 0 times/min API
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
119
Metric Description ValueRange
Monitored Object
4xx Errors Specifies the number of timesthat an API returns 4xx errors.Unit: time/min
≥ 0 times/min API
5xx Errors Specifies the number of timesthat an API returns 5xx errors.Unit: time/min
≥ 0 times/min API
Average DelayMilliseconds
Specifies the average responsedelay time of an API. Unit:millisecond
≥ 0 ms API
Max DelayMilliseconds
Specifies the maximumresponse delay time of an API.Unit: millisecond
≥ 0 ms API
OutputThroughput
Specifies the output throughputreturned by an API. Unit: byte
≥ 0 bytes API
InputThroughput
Specifies the input throughputrequested by an API. Unit: byte
≥ 0 bytes API
Total Numberof Errors
Specifies the total number oferrors of an API. Unit: time/min
≥ 0 times/min API
15.6 Database
15.6.1 RDS Metrics
Table 15-24 RDS metrics
Metric Description Value Range MonitoredObject
CPU Usage(deprecated)
Indicates the CPU usage of themonitored object. The unit is ratio.
0-1 ECS
CPU Usage Indicates the CPU usage of themonitored object. The unit ispercent.
0-100% Elastic CloudServer
MemoryUsage(deprecated)
Indicates the memory usage of themonitored object. The unit is ratio.
0-1 ECS
MemoryUsage
Indicates the memory usage of themonitored object. The unit ispercent.
0-100% Elastic CloudServer
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
120
Metric Description Value Range MonitoredObject
IOPS Indicates the number of I/Ooperations per second on themonitored object. The unit is count.
≥ 0 counts/s ECS
Network InputThroughput
Indicates all network adapterincoming traffic in bytes per second.The unit is byte/s.
≥ 0 bytes/s ECSMonitoredinstance type:MySQL,PostgreSQL,and MicrosoftSQL Serverinstances
NetworkOutputThroughput
Indicates all network adapteroutgoing traffic in bytes per second.The unit is byte/s.
≥ 0 bytes/s ECSMonitoredinstance type:MySQL,PostgreSQL,and MicrosoftSQL Serverinstances
TotalConnections
Indicates the total number ofconnection attempts to the MySQLserver. The unit is count.
≥ 0 counts Database
Current ActiveConnections
Indicates the number of currentactive connections. The unit iscount.
≥ 0 counts Database
QPS Indicates the number of SQLstatement queries (including thestorage process) per second.
≥ 0 queries/s Database
TPS Indicates the number of transactionexecutions (including transactionsubmitting and rollback) per second.
≥ 0transactions/s
Database
Buffer PoolUsage
Indicates the ratio of dirty data fromall data in the InnoDB buffer. Theunit is percent.
0-1 Database
Buffer PoolHit Rate
Indicates the ratio of read hits toread requests(Innodb_buffer_pool_readsindicates the number of times thatdisks are read). The unit is percent.
0-1 Database
Buffer PoolDirty BlockRate
Indicates the ratio of dirty pagesfrom all pages in the buffer pool.The unit is percent.
0-1 Database
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
121
Metric Description Value Range MonitoredObject
InnoDB ReadThroughput
Indicates the average number of readbytes per second for the InnoDBbuffer.
≥ 0 bytes/s Database
InnoDB WriteThroughput
Indicates the number of write bytesper second for the InnoDB buffer.
≥ 0 bytes/s Database
InnoDB FileReadFrequency
Indicates the average number oftimes that InnoDB reads files persecond.
≥ 0 counts/s Database
InnoDB FileWriteFrequency
Indicates the average number oftimes that InnoDB writes files persecond.
≥ 0 counts/s Database
InnoDB LogWrite RequestFrequency
Indicates the average number of logwrite requests per second.
≥ 0 counts/s Database
InnoDB LogPhysical WriteFrequency
Indicates the average number ofphysical writes for log files persecond.
≥ 0 counts/s Database
InnoDB Logfsync() WriteFrequency
Indicates the average number offsync write requests on log files persecond.
≥ 0 counts/s Database
TemporaryTables Qty
Indicates the number of temporarytables automatically created on harddisks when MySQL statements areexecuted.
≥ 0 tables Database
Key BufferUsage
Indicates the MyISAM key bufferusage. The unit is percent.
0-1 Database
Key BufferWrite Hit Rate
Indicates the key buffer write hitusage of MyISAM. The unit ispercent.
0-1 Database
Key BufferRead Hit Rate
Indicates the key buffer read hitusage of MyISAM. The unit ispercent.
0-1 Database
MyISAM DiskWrite Speed
Indicates the average number oftimes that indexes are written intodisks per second.
≥ 0 counts/s Database
MyISAM DiskRead Speed
Indicates the average number oftimes that indexes are read fromdisks per second.
≥ 0 counts/s Database
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
122
Metric Description Value Range MonitoredObject
MyISAMBuffer PoolWrite Speed
Indicates the average number ofrequests to write indexes into cacheper second.
≥ 0 counts/s Database
MyISAMBuffer PoolRead Speed
Indicates the average number ofrequests to read indexes from cacheper second.
≥ 0 counts/s Database
Delete ExecuteSpeed
Indicates the average number ofDelete executions per second.
≥ 0 queries/s Database
Insert ExecuteSpeed
Indicates the average number ofInsert executions per second.
≥ 0 queries/s Database
Insert_SelectExecute Speed
Indicates the average number ofInsert_Select executions per second.
≥ 0 queries/s Database
ReplaceExecute Speed
Indicates the average number ofReplace executions per second.
≥ 0 queries/s Database
Replace_Selection ExecuteSpeed
Indicates the average number ofReplace_Selection executions persecond.
≥ 0 queries/s Database
Select ExecuteSpeed
Indicates the average number ofSelect executions per second.
≥ 0 queries/s Database
UpdateExecute Speed
Indicates the average number ofUpdate executions per second.
≥ 0 queries/s Database
Row DeleteSpeed
Indicates the average number ofrows that are deleted from theInnoDB table per second.
≥ 0 rows/s Database
Row InsertSpeed
Indicates the average number ofrows that are inserted to the InnoDBtable per second.
≥ 0 rows/s Database
Row ReadSpeed
Indicates the average number ofrows that are read from the InnoDBtable per second.
≥ 0 rows/s Database
Row UpdateSpeed
Indicates the number of updatedrows in the InnoDB table persecond.
≥ 0 rows/s Database
DiskUtilization(deprecated)
Indicates the CPU usage of themonitored object. The unit is ratio.
0-1 ECS
DiskUtilization
Indicates the disk utilization of themonitored object. The unit ispercent.
0-100% Elastic CloudServer
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
123
Metric Description Value Range MonitoredObject
TransactionLogs Usage
Indicates the disk capacity used bytransaction logs.
≥ 0 MB Database
ReplicationSlot Usage
Indicates the disk capacity used byreplication slot files.
≥ 0 MB Database
DatabaseConnections
Indicates the number of databaseconnections in use.
≥ 0 counts Database
MaximumUsedTransactionIDs
Indicates the maximum transactionID that has been used.
≥ 0 counts Database
TransactionLogsGenerations
Indicates the size of transaction logsgenerated per second.
≥ 0 MB/s Database
OldestReplicationSlot Lag
Indicates the lagging size of themost lagging replica in terms ofWAL data received.
≥ 0 MB Database
ReplicationLag
Indicates the replication lag delay. ≥ 0 ms Database
Total DiskSize
Indicates the total disk size of themonitored object.
100–2000 GB ECS
Disk Usage Indicates the disk usage of themonitored object.
0–2000 GB ECS
Disk ReadThroughput
Indicates the number of bytes readfrom the disk per second.
≥ 0 bytes/s ECS
Disk ReadThroughput
Indicates the number of bytes writeto the disk per second.
≥ 0 bytes/s ECS
Average Timeper Disk Read
Indicates the average time per diskread operation.
> 0s ECS
Average Timeper Disk Write
Indicates the average time per diskwrite operation.
> 0s ECS
Average DiskQueue Length
Indicates the number of processes tobe written to the monitored object.
≥ 0 ECS
Number ofDatabaseConnectionsIn Use
Indicates the number of databaseconnections in use.
≥0 counts Database
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
124
Metric Description Value Range MonitoredObject
Number ofTransactionsper Second
Indicates the number of transactionsinitiated by the database per second.The unit is count/s.
≥ 0 counts/s DatabaseMonitoredinstance type:Microsoft SQLServer instance
Number ofBatches perSecond
Indicates the number of Transact-SQL command batches received persecond. The unit is count/s.
≥ 0 counts/s DatabaseMonitoredinstance type:Microsoft SQLServer instance
Number ofLogins perSecond
Indicates the total number of loginsstarted per second. The unit iscount/s.
≥ 0 counts/s DatabaseMonitoredinstance type:Microsoft SQLServer instance
Number ofLogouts perSecond
Indicates the total number of logoutsstarted per second. The unit iscount/s.
≥ 0 counts/s DatabaseMonitoredinstance type:Microsoft SQLServer instance
Cache HitRatio
Indicates the percentage of pagesfound in the buffer cache withouthaving to read from disks.
≥ 0 DatabaseMonitoredinstance type:Microsoft SQLServer instance
Number ofSQLCompilationsper Second
Indicates the number of SQLcompilations per second. The unit iscount/s.
≥ 0 counts/s DatabaseMonitoredinstance type:Microsoft SQLServer instance
Number ofSQL Re-Compilationsper Second
Indicates the number of statementrecompiles per second. The unit iscount/s.
≥ 0 counts/s DatabaseMonitoredinstance type:Microsoft SQLServer instance
Number ofFull Scans perSecond
Indicates the number of unrestrictedfull scans per second. The unit iscount/s.
≥0 Counts/Second
DatabaseMonitoredinstance type:Microsoft SQLServer instance
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
125
Metric Description Value Range MonitoredObject
Number ofErrors perSecond
Indicates the number of errors persecond. The unit is count/s.
≥0 Counts/Second
DatabaseMonitoredinstance type:Microsoft SQLServer instance
Number ofLatch Waitsper Second
Indicates the number of latchrequests that could not be grantedimmediately. The unit is count/s.
≥ 0 counts/s DatabaseMonitoredinstance type:Microsoft SQLServer instance
Number ofLock Waitsper Second
Indicates the number of lockrequests per second that required thecaller to wait. The unit is count/s.
≥0 Counts/Second
DatabaseMonitoredinstance type:Microsoft SQLServer instance
Number ofLock Requestsper Second
Indicates the number of new locksand lock conversions per secondrequested from the lock manager.The unit is count/s.
≥0 Counts/Second
DatabaseMonitoredinstance type:Microsoft SQLServer instance
Lock Timeoutsper Second
Indicates the number of lockrequests per second that timed out.The unit is count/s.
≥0 Counts/Second
DatabaseMonitoredinstance type:Microsoft SQLServer instance
Average LockWait Time
Indicates the average amount of waittime (ms) for each lock request thatresulted in a wait.
Millisecond DatabaseMonitoredinstance type:Microsoft SQLServer instance
Number ofDeadlocks perSecond
Indicates the number of lockrequests per second that resulted in adeadlock. The unit is count/s.
≥0 Counts/Second
DatabaseMonitoredinstance type:Microsoft SQLServer instance
Number ofCheckpointPages perSecond
Indicates the number of pagesflushed to disks per second by acheckpoint or other operations thatrequire all dirty pages to be flushed.The unit is count/s.
≥0 Counts/Second
DatabaseMonitoredinstance type:Microsoft SQLServer instance
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
126
Metric Description Value Range MonitoredObject
Number ofSlow Queries
Indicates the number of currentlyrunning slow queries. The unit iscount.
Counts DatabaseMonitoredinstance type:Microsoft SQLServer instance
15.6.2 DDS Metrics
Table 15-25 DDS Metrics
Metric Description ValueRange
Remarks
CommandOperations perSecond
Average number of the commandstatement execution times onMongoDB instances per second
≥ 0commands/s
Monitored object:databaseMonitored instancetype: MongoDBinstances
DeleteOperations perSecond
Average number of the deletestatement execution times onMongoDB instances per second
≥ 0executions/s
Monitored object:databaseMonitored instancetype: MongoDBinstances
InsertOperations perSecond
Average number of the insertstatement execution times onMongoDB instances per second
≥ 0executions/s
Monitored object:databaseMonitored instancetype: MongoDBinstances
QueryOperations perSecond
Average number of the querystatement execution times onMongoDB instances per second
≥ 0executions/s
Monitored object:databaseMonitored instancetype: MongoDBinstances
UpdateOperations perSecond
Average number of the updatestatement execution times onMongoDB instances per second
≥ 0executions/s
Monitored object:databaseMonitored instancetype: MongoDBinstances
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
127
Metric Description ValueRange
Remarks
GetmoreOperations perSecond
Average number of the getmorestatement execution times onMongoDB instances per second
≥ 0executions/s
Monitored object:databaseMonitored instancetype: MongoDBinstances
Number ofChunks ofShard 1
Number of chunks in shard 1 0–64 counts Monitored object:databaseMonitored instancetype: MongoDBinstances
Number ofChunks ofShard 2
Number of chunks in shard 2 0–64 counts Monitored object:databaseMonitored instancetype: MongoDBinstances
Number ofChunks ofShard 3
Number of chunks in shard 3 0–64 counts Monitored object:databaseMonitored instancetype: MongoDBinstances
Number ofChunks ofShard 4
Number of chunks in shard 4 0–64 counts Monitored object:databaseMonitored instancetype: MongoDBinstances
Number ofChunks ofShard 5
Number of chunks in shard 5 0–64 counts Monitored object:databaseMonitored instancetype: MongoDBinstances
Number ofChunks ofShard 6
Number of chunks in shard 6 0–64 counts Monitored object:databaseMonitored instancetype: MongoDBinstances
Number ofChunks ofShard 7
Number of chunks in shard 7 0–64 counts Monitored object:databaseMonitored instancetype: MongoDBinstances
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
128
Metric Description ValueRange
Remarks
Number ofChunks ofShard 8
Number of chunks in shard 8 0–64 counts Monitored object:databaseMonitored instancetype: MongoDBinstances
Number ofChunks ofShard 9
Number of chunks in shard 9 0–64 counts Monitored object:databaseMonitored instancetype: MongoDBinstances
Number ofChunks ofShard 10
Number of chunks in shard 10 0–64 counts Monitored object:databaseMonitored instancetype: MongoDBinstances
Number ofChunks ofShard 11
Number of chunks in shard 11 0–64 counts Monitored object:databaseMonitored instancetype: MongoDBinstances
Number ofChunks ofShard 12
Number of chunks in shard 12 0–64 counts Monitored object:databaseMonitored instancetype: MongoDBinstances
Current DBInstanceActiveConnections
Total number of connectionsattempting to connect toMongoDB instances
0–200counts
Monitored object:databaseMonitored instancetype: MongoDBinstances
ChunkMigrationFailures inLast 24 hrs
Number of chunk migrationfailures for the last 24 hours
≥ 0 counts Monitored object:databaseMonitored instancetype: MongoDBinstances
Current ActiveConnections
Total number of connectionsattempting to connect toMongoDB instances
0–200counts
Monitored object:databaseMonitored instancetype: mongos,primary, andsecondary nodes ofMongoDB instances
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
129
Metric Description ValueRange
Remarks
ResidentMemory
Size of resident memoryUnit: MB
≥ 0 MB Monitored object:databaseMonitored instancetype: mongos,primary, andsecondary nodes ofMongoDB instances
VirtualMemory
Size of virtual memoryUnit: MB
≥ 0 MB Monitored object:databaseMonitored instancetype: mongos,primary, andsecondary nodes ofMongoDB instances
RegularAsserts perSecond
Number of regular asserts persecond
≥ 0asserts/s
Monitored object:databaseMonitored instancetype: mongos,primary, andsecondary nodes ofMongoDB instances
WarningAsserts perSecond
Number of warning asserts persecond
≥ 0 asserts/s Monitored object:databaseMonitored instancetype: mongos,primary, andsecondary nodes ofMongoDB instances
MessageAsserts perSecond
Number of message asserts persecond
≥ 0 asserts/s Monitored object:databaseMonitored instancetype: mongos,primary, andsecondary nodes ofMongoDB instances
User Assertsper Second
Number of user asserts persecond
≥ 0 asserts/s Monitored object:databaseMonitored instancetype: mongos,primary, andsecondary nodes ofMongoDB instances
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
130
Metric Description ValueRange
Remarks
CPU Usage CPU usage of the monitoredobjectUnit: Percent
0–100% Monitored object:ECSMonitored instancetype: mongos,primary, andsecondary nodes ofMongoDB instances
MemoryUsage
Memory usage of the monitoredobjectUnit: Percent
0–100% Monitored object:databaseMonitored instancetype: mongos,primary, andsecondary nodes ofMongoDB instances
NetworkOutputThroughput
Outgoing traffic in bytes persecond
≥ 0 bytes/s Monitored object:databaseMonitored instancetype: mongos,primary, andsecondary nodes ofMongoDB instances
Network InputThroughput
Incoming traffic in bytes persecond
≥ 0 bytes/s Monitored object:databaseMonitored instancetype: mongos,primary, andsecondary nodes ofMongoDB instances
Number ofOperationsQueuedWaiting for theLock
Number of operations queuedwaiting for the lock
≥ 0 counts Monitored object:databaseMonitored instancetype: mongos,primary, andsecondary nodes ofMongoDB instances
Number ofOperationsQueuedWaiting for theRead Lock
Number of operations queuedwaiting for the read lock
≥ 0 counts Monitored object:databaseMonitored instancetype: mongos,primary, andsecondary nodes ofMongoDB instances
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
131
Metric Description ValueRange
Remarks
Number ofOperationsQueuedWaiting for theWrite Lock
Number of operations queuedwaiting for the write lock
≥ 0 counts Monitored object:databaseMonitored instancetype: mongos,primary, andsecondary nodes ofMongoDB instances
Number ofPage Faults
Number of page faults on themonitored nodes
≥ 0 counts Monitored object:databaseMonitored instancetype: mongos,primary, andsecondary nodes ofMongoDB instances
Number ofSlow Queries
Number of slow queries on themonitored nodes
≥ 0 counts Monitored object:databaseMonitored instancetype: mongos,primary, andsecondary nodes ofMongoDB instances
Number ofCurrentMaintainedCursors
Number of maintained cursorson the monitored nodes
≥ 0 counts Monitored object:databaseMonitored instancetype: mongos,primary, andsecondary nodes ofMongoDB instances
Number ofTimed OutCursors
Number of timed out cursors onthe monitored nodes
≥ 0 counts Monitored object:databaseMonitored instancetype: mongos,primary, andsecondary nodes ofMongoDB instances
Bytes in CacheWhen UsingWiredTiger
Size of data in cache in MBwhen WiredTiger is usedUnit: MB
≥ 0 MB Monitored object:databaseMonitored instancetype: mongos,primary, andsecondary nodes ofMongoDB instances
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
132
Metric Description ValueRange
Remarks
Tracked DirtyBytes in CacheWhen UsingWiredTiger
Size of dirty data in cache in MBwhen WiredTiger is usedUnit: MB
≥ 0 MB Monitored object:databaseMonitored instancetype: mongos,primary, andsecondary nodes ofMongoDB instances
Bytes WrittenintoWiredTigerCache perSecond
Bytes written into WiredTigercache per second
≥ 0 bytes/s Monitored object:databaseMonitored instancetype: mongos,primary, andsecondary nodes ofMongoDB instances
Bytes Writteninto DisksfromWiredTigerCache perSecond
Bytes written into disks fromWiredTiger cache per second
≥ 0 bytes/s Monitored object:databaseMonitored instancetype: mongos,primary, andsecondary nodes ofMongoDB instances
OplogAvailable Timeon PrimaryNode
Oplog available time in hours onthe monitored primary node
≥ 0 hours Monitored object:databaseMonitored instancetype: primary nodesof MongoDBinstances
OplogGenerationSpeed onPrimary Node
Speed in MB/hour at whichOplog is generated on themonitored primary node
≥ 0 MB/hour Monitored object:databaseMonitored instancetype: primary nodesof MongoDBinstances
DiskUtilization
Disk usage of the monitoredobject
0–100% Monitored object:databaseMonitored instancetype: primary andsecondary nodes ofMongoDB instances
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
133
Metric Description ValueRange
Remarks
IOPS Average number of I/O requestsprocessed by the system persecond
≥ 0 counts/s Monitored object:databaseMonitored instancetype: primary andsecondary nodes ofMongoDB instances
Disk ReadThroughput
Average number of read bytesper second for disks
≥ 0 bytes/s Monitored object:databaseMonitored instancetype: primary andsecondary nodes ofMongoDB instances
Disk ReadThroughput
Average number of write bytesper second for disks
≥ 0 bytes/s Monitored object:databaseMonitored instancetype: primary andsecondary nodes ofMongoDB instances
Average Timeper Disk Read
Average time per disk readoperation during a specifiedperiod
≥ 0 seconds Monitored object:databaseMonitored instancetype: primary andsecondary nodes ofMongoDB instances
Average Timeper Disk Write
Average time per disk writeoperation during a specifiedperiod
≥ 0 seconds Monitored object:databaseMonitored instancetype: primary andsecondary nodes ofMongoDB instances
Average DiskQueue Length
Number of processes waiting tobe written to the monitoredobject
≥ 0 counts Monitored object:databaseMonitored instancetype: primary andsecondary nodes ofMongoDB instances
Total Disk Size Total disk size of the monitoredobjectUnit: GB
0–1000 GB Monitored object:databaseMonitored instancetype: primary andsecondary nodes ofMongoDB instances
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
134
Metric Description ValueRange
Remarks
Disk Usage Total size of the disk usage ofthe monitored objectUnit: GB
0–1000 GB Monitored object:databaseMonitored instancetype: primary andsecondary nodes ofMongoDB instances
OplogOverlappingTime BetweenPrimary andSecondaryNodes
Oplog overlapping time betweenthe primary and secondary nodesUnit: Second
≥ 0 seconds Monitored object:databaseMonitored instancetype: MongoDBinstance secondarynode
Delay BetweenPrimary andSecondaryNodes
Replication delay between theprimary and secondary nodesUnit: Second
≥ 0 seconds Monitored object:databaseMonitored instancetype: MongoDBinstance secondarynode
CommandOperations perSecond forSecondaryNodeReplication
Average number of the commandstatement execution times forsecondary node replication persecond
≥ 0commands/s
Monitored object:databaseMonitored instancetype: MongoDBinstance secondarynode
UpdateOperations perSecond forSecondaryNodeReplication
Average number of the updatestatement execution times forsecondary node replication persecond
≥ 0executions/s
Monitored object:databaseMonitored instancetype: MongoDBinstance secondarynode
DeleteOperations perSecond forSecondaryNodeReplication
Average number of the deletestatement execution times forsecondary node replication persecond
≥ 0executions/s
Monitored object:databaseMonitored instancetype: MongoDBinstance secondarynode
InsertOperations perSecond forSecondaryNodeReplication
Average number of the insertstatement execution times forsecondary node replication persecond
≥ 0executions/s
Monitored object:databaseMonitored instancetype: MongoDBinstance secondarynode
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
135
15.6.3 DCS Metrics
Table 15-26 DCS metrics
Metric Description Value Range Monitored Object
CPU Usage Indicates the CPUusage of themonitored object.The unit is percent.
0-1 ECS
Memory Usage Indicates thememory usage of themonitored object.The unit is percent.
0-1 ECS
Network InputThroughput
Indicates theinbound throughputper second (byte/s)on the port.
≥ 0 bytes/s ECS
Network OutputThroughput
Indicates theoutbound throughputper second (byte/s)on the port.
≥ 0 bytes/s ECS
Connected Clients Indicates the numberof connected clients,excluding slavenodes.
≥ 0 DCS
Client LongestOutput List
Indicates the longestoutput list among allthe connections to aclient.
≥ 0 DCS
Client Biggest InputBuf
Indicates themaximum input datalength (bytes)among all theconnections to aclient.
≥ 0 bytes/s DCS
Blocked Clients Indicates the numberof clients that aresuspended by blockoperations, such asBLPOP, BRPOP,and BRPOPLPUSHoperations.
≥ 0 DCS
Used Memory Indicates thememory (bytes) thatRedis has used.
≥ 0 bytes/s DCS
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
136
Metric Description Value Range Monitored Object
Used Memory RSS Indicates the RSSmemory (bytes) thatRedis has used. Thatis, the memory thatactually resides inthe memory. Itincludes all stackand heap memorybut not swapped-outmemory.
≥ 0 bytes/s DCS
Used Memory Peak Indicates the peakvalue of the memoryusage (bytes) sincethe Redis serverstarts.
≥ 0 bytes/s DCS
Used Memory Lua Indicates thememory (bytes) thatthe Lua engine hasused.
≥ 0 bytes/s DCS
MemoryFragmentation Ratio
Indicates the currentmemoryfragmentation ratio.Its value is the sameas that ofused_memory_rssand used_memory.If the used memorypeak value is muchgreater than the usedmemory, thereference value ofthis parameterdecreases.
≥ 0 DCS
Total ConnectionsReceived
Indicates the totalnumber ofconnections that theRedis server hasreceived since itstarted.
≥ 0 DCS
Total CommandsProcessed
Indicates the totalnumber ofcommands that theRedis server hasprocessed since itstarted.
≥ 0 DCS
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
137
Metric Description Value Range Monitored Object
Instantaneous OpsPer Second
Indicates the numberof commandsprocessed persecond (ops/s).
≥ 0 DCS
Total Net InputBytes
Indicates the totalnumber of bytes thatthe Redis server hasreceived since itstarted.
≥ 0 bytes/s DCS
Total Net OutputBytes
Indicates the totalnumber of bytes thatthe Redis server hassent since it started.
≥ 0 bytes/s DCS
Instantaneous InputKbps
Indicates theinstantaneous inputtraffic (kbit/s).
≥ 0 kbits/s DCS
InstantaneousOutput Kbps
Indicates theinstantaneous outputtraffic (kbit/s).
≥ 0 kbits/s DCS
RejectedConnections
Indicates the numberof connections thathave exceededmaxclients and beenrejected by the Redisserver since itstarted.
≥ 0 DCS
Sync Full Indicates the totalnumber of fullsynchronizationssince the Redisserver started.
≥ 0 DCS
Sync Partial OK Indicates the totalnumber ofincrementalsynchronizationssince the Redisserver started.
≥ 0 DCS
Sync Partial Err Indicates the totalnumber of failedincrementalsynchronizationssince the Redisserver started.
≥ 0 DCS
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
138
Metric Description Value Range Monitored Object
Expired Keys Indicates the totalnumber of keys thathave expired sincethe Redis serverstarted.
≥ 0 DCS
Evicted Keys Indicates the numberof keys that havebeen evicted due toinsufficient memorysince the Redisserver started.
≥ 0 DCS
Keyspace Hits Indicates the totalnumber of query hitsin the masterdictionary since theRedis server started.
≥ 0 DCS
Keyspace Misses Indicates the totalnumber of querymisses in the masterdictionary since theRedis server started.
≥ 0 DCS
PubSub Channels Indicates the numberof Pub/Subchannels.
≥ 0 DCS
PubSub Patterns Indicates the numberof Pub/Sub patterns.
≥ 0 DCS
Aof Current Size Indicates the AOFfile size (bytes).
≥ 0 DCS
Latest Fork usec Indicates the latestfork time (ms).
≥ 0 ms DCS
Percentage ofKeyspace Hits
Indicates theKeyspace hit ratio(%).
0-1 DCS
Used MemoryDataset
Indicates the numberof bytes allocated byRedis to data sets.
≥ 0 bytes DCS
Percentage of UsedMemory Dataset
Indicates thepercentage of bytesused by data sets tototal bytes allocatedby Redis.
0-1 DCS
Keys Indicates the numberof keys in Redis.
≥ 0 DCS
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
139
Metric Description Value Range Monitored Object
Keys With anExpiration
Indicates the numberof keys with anexpiration in Redis.
≥ 0 DCS
Table 15-27 Metrics supported by the Memcached instances
Metric Description ValueRange
MonitoredObject
CPU Usage Measures the CPU usage (%) ofthe monitored object.
0–100% ECS
Memory Usage Measures the memory usage (%)of the monitored object.
0–100% ECS
Network InputThroughput
Measures the inboundthroughput per second (byte/s)on the port.
≥ 0 bytes/s ECS
Network OutputThroughput
Measures the outboundthroughput per second (byte/s)on the port.
≥ 0 bytes/s ECS
Connected Clients Measures the number ofconnected clients, excludingslave nodes.It includes the connected clientsused by the monitoring instanceof the DCS backgroundmanagement service.
≥ 0 Memcachedcache
Used Memory Measures the used memory(bytes).
≥ 0 bytes Memcachedcache
Used Memory RSS Measures the used RSS memory(bytes). That is, the memory thatactually resides in the memory.It includes all stack and heapmemory but not swapped-outmemory.
≥ 0 bytes Memcachedcache
Used Memory Peak Measures the peak value of thememory usage (bytes) since theserver starts.
≥ 0 bytes Memcachedcache
MemoryFragmentation Ratio
Measures the current memoryfragmentation ratio. Its value isthe same as that ofused_memory_rss andused_memory.
0–100% Memcachedcache
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
140
Metric Description ValueRange
MonitoredObject
Total ConnectionsReceived
Measures the number ofreceived connections. The valueis an integer.It includes the number ofmonitoring connections of theDCS background servicemanagement.
≥ 0 Memcachedcache
CommandsProcessed
Measures the number ofprocessed commands.It includes the number ofmonitoring commands of theDCS background servicemanagement.
≥ 0 Memcachedcache
Instantaneous OpsPer Second
Measures the number ofcommands processed per second(ops/s).
≥ 0 Memcachedcache
Net Input Bytes Measures the input bytes. ≥ 0 bytes Memcachedcache
Net Output Bytes Measures the network outputbytes.
≥ 0 bytes Memcachedcache
Instantaneous InputKbps
Measures the instantaneousinput traffic (kbit/s).
≥ 0 kbits/s Memcachedcache
InstantaneousOutput Kbps
Measures the instantaneousoutput traffic (kbit/s).
≥ 0 kbits/s Memcachedcache
RejectedConnections
Measures the number ofconnections that have exceededmaxclients and been rejected.
≥ 0 Memcachedcache
Sync Full Measures the number of fullsynchronization times.
≥ 0 Memcachedcache
Sync Partial OK Measures the number ofsuccessful partialsynchronization times.
≥ 0 Memcachedcache
Sync Partial Err Measures the number of partialsynchronization errors.
≥ 0 Memcachedcache
Expired Keys Measures the number of expiredkeys.
≥ 0 Memcachedcache
Evicted Keys Measures the number of keysthat have been deleted due toinsufficient memory.
≥ 0 Memcachedcache
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
141
Metric Description ValueRange
MonitoredObject
Aof Current Size Measures the AOF file size. ≥ 0 Memcachedcache
Number of RetrievalRequests
Measures the number of dataretrieval requests received by theservice.
≥ 0 Memcachedcache
Number of StorageRequests
Measures the number of datastorage requests received by theservice.
≥ 0 Memcachedcache
Number of FlushRequests
Measures the number of dataflush requests received by theservice.
≥ 0 Memcachedcache
Number of TouchRequests
Measures the number of datatouch requests received by theservice.
≥ 0 Memcachedcache
Number of RetrievalHits
Measures the times of successfuldata retrieval.
≥ 0 Memcachedcache
Number of RetrievalMisses
Measures the number of timesthat the data fails to be retrievedbecause keys do not exist.
≥ 0 Memcachedcache
Number of DeleteHits
Measures the times of successfuldata deletion.
≥ 0 Memcachedcache
Number of DeleteMisses
Measures the number of timesthat the data fails to be deletedbecause keys do not exist.
≥ 0 Memcachedcache
Number ofIncrement Hits
Measures the times ofincremental hits.
≥ 0 Memcachedcache
Number ofIncrement Misses
Measures the times ofincremental misses because keysdo not exist.
≥ 0 Memcachedcache
Number ofDecrement Hits
Measures the times ofdecremental hits.
≥ 0 Memcachedcache
Number ofDecrement Misses
Measures the times ofdecremental misses becausekeys do not exist.
≥ 0 Memcachedcache
Number of CASHits
Measures the times of successfulCAS operations.
≥ 0 Memcachedcache
Number of CASMisses
Measures the times of failedCAS operations because keys donot exist.
≥ 0 Memcachedcache
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
142
Metric Description ValueRange
MonitoredObject
Number ofUnmatched CASValues
Measures the times of failedCAS operations because CASvalues do not match.
≥ 0 Memcachedcache
Number of TouchHits
Measures the times of successfulmodifications of data validityperiods.
≥ 0 Memcachedcache
Number of TouchMisses
Measures the times that datavalidity periods fail to bemodified because keys do notexist.
≥ 0 Memcachedcache
Number ofAuthenticationCommands
Measures the number ofauthentication commands.
≥ 0 Memcachedcache
Number of FailedAuthentications
Measures the number of failedauthentications.
≥ 0 Memcachedcache
Number of ItemsStored
Measures the number of storeditems.
≥ 0 Memcachedcache
Table 15-28 IMDG Metrics
Metric Description Value Range Monitored Object
Average CPUUsage
Measures the averageCPU usage (%) of themonitored object.
0–100% DCS
Number of CPUs Measures the number ofCPUs available to theJava Virtual Machine byinstance.
≥ 0 DCS
Heap MemoryCommitted forJVM
Measures the amount ofheap memory (bytes)that is committed for theJVM to use.
≥ 0 bytes DCS
Heap MemoryUsed
Measures the currentheap size (bytes) that isused for objectallocation.
≥ 0 bytes DCS
Non-Heap MemoryCommitted forJVM
Measures the amount ofnon-heap memory(bytes) that iscommitted for the JVMto use.
≥ 0 bytes DCS
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
143
Metric Description Value Range Monitored Object
Non-Heap MemoryUsed
Measures the currentnon-heap memory size(bytes) that is used byJVM.
≥ 0 bytes DCS
Total Number ofCluster Nodes
Measure the totalnumber of nodes.
≥ 0 DCS
15.6.4 DDM Metrics
Table 15-29 DDM metrics
Metric Description ValueRange
Monitored Object
CPU Usage Specifies the CPU usage of the monitoredobject. The unit is percent.
0-1 ECS
Memory Usage Specifies the memory usage of themonitored object. The unit is percent.
0-1 ECS
Network InputThroughput
Specifies the input throughput per secondof the monitored object.
≥ 0 bytes/s ECS
NetworkOutputThroughput
Specifies the output throughput per secondof the monitored object.
≥ 0 bytes/s ECS
15.7 Migration
15.7.1 CDM Metrics
Table 15-30 CDM Metrics
Metric Description ValueRange
MonitoredObject
Bytes In Number of incoming bytes persecond on the monitored objectUnit: Byte/s
≥ 0 bytes/s Nodes in the CDMcluster
Bytes Out Number of outgoing bytes persecond on the monitored objectUnit: Byte/s
≥ 0 bytes/s Nodes in the CDMcluster
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
144
Metric Description ValueRange
MonitoredObject
CPU Usage CPU usage of the monitored objectUnit: Percent
0–100% Nodes in the CDMcluster
Memory Usage Percentage of memory currently inuseUnit: Percent
0–100% Nodes in the CDMcluster
15.8 Enterprise Intelligence
15.8.1 DWS Metrics
Table 15-31 DWS metrics
Metric Description ValueRange
Object
SharedMemory HitRatio
Indicates the percentage of data volumeobtained from memory. The unit is percent.
0–100% Datawarehouse clusters
In-memorySort Ratio
Indicates the percentage of data volume thatis sorted in memory. The unit is percent.
0–100%
File Reads Indicates the total number of database filereads.
> 0
File Writes Indicates the total number of database filewrites.
> 0
File Reads perSecond
Indicates the number of database file readsper second.
≥ 0
File Writes perSecond
Indicates the number of database file writesper second.
≥ 0
Data Volume Indicates the total data volume of thedatabase. The unit is MB.
0–36000MB
Active SQLCount
Indicates the number of active SQLs in thedatabase.
≥ 0
Session Count Indicates the number of sessions that accessthe database.
≥ 0
CPU Usage Indicates the CPU usages of each node in thecluster. The unit is percent.
0–100% Nodes inthecluster
MemoryUsage
Indicates the memory usages of each node inthe cluster. The unit is percent.
0–100%
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
145
Metric Description ValueRange
Object
IOPS Indicates the number of I/O requestsprocessed by each node in the cluster persecond.
≥ 0
Network InputThroughput
Indicates the data input to each node in thecluster per second over the network.
≥ 0 bytes/s
NetworkOutputThroughput
Indicates the data sent to the network persecond from each node in the cluster.
≥ 0 bytes/s
Disk Usage Indicates disk usages of each node in thecluster. The unit is percent.
0–100%
Total DiskSize
Indicates the total disk space of each clusternode. The unit is GB.
100–2000GB
Disk Usage Indicates the used disk space of each node inthe cluster. The unit is GB.
0–3600GB
Disk ReadThroughput
Indicates the data volume read by each diskin the cluster per second, expressed in byte/s.
≥ 0 bytes/s
Disk WriteThroughput
Indicates data volume written to each diskper second, expressed in byte/s.
≥ 0 bytes/s
Average Timeper Disk Read
Indicates the average time used each timewhen a disk reads data, expressed in second.
> 0s
Average Timeper Disk Write
Indicates the average time used each timewhen data is written to a disk, expressed insecond.
> 0s
Average DiskQueue Length
Indicates the average I/O queue length of adisk.
≥ 0
15.8.2 MLS Metrics
Table 15-32 MLS metrics
Metric Description ValueRange
MonitoredObject
CPU Usage Indicates the CPU usage of themonitored object. The unit is percent.
0-1 MLS instances
Disk Usage Indicates the disk usage of themonitored object. The unit is percent.
0-1 MLS instances
MemoryUsage
Specifies the memory usage of themonitored object. The unit is percent.
0-1 MLS instances
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
146
15.8.3 CloudTable Service Metrics
Table 15-33 CloudTable Service metrics
Metric Description ValueRange
MonitoredObject
CPU Number Indicates the number of CPUs ofthe monitored object.
> 0 CloudTableinstance
CPU Usage Indicates the CPU usage of themonitored object. The unit ispercent.
0-1 CloudTableinstance
Memory Size Indicates the total memory size ofthe monitored object. The unit isbyte.
> 0 bytes CloudTableinstance
Memory Usage Indicates the memory usage of themonitored object. The unit ispercent.
0-1 CloudTableinstance
Disks WriteRate
Indicates the number of byteswritten to the monitored object persecond (byte/s).
≥ 0 bytes/s CloudTableinstance
Disks ReadRate
Indicates the number of bytes readfrom the monitored object persecond (byte/s).
≥ 0 bytes/s CloudTableinstance
Used StorageSize
Indicates the used storage size(bytes) of the cluster in whichmonitored object is located.
≥ 0 bytes CloudTableinstance
Used StorageRate
Indicates the rate of used storageof the cluster to the total storagesize. The unit is percent.
0-1 CloudTableinstance
NormalRegionServers
Indicates the number of normalRegionServers in the cluster wherethe monitored object is running.
≥ 0 CloudTableinstance
FaultyRegionServers
Indicates the number of faultyRegionServers in the cluster wherethe monitored object is running.
≥ 0 CloudTableinstance
RIT CountOver Threshold
Indicates the number of regions inthe Region In Transaction (RIT)state and reach the threshold in thecluster where the monitored objectis running.
≥ 0 CloudTableinstance
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
147
Metric Description ValueRange
MonitoredObject
RIT Count Indicates the number of regions inthe Region In Transaction (RIT)state in the cluster where themonitored object is running.
≥ 0 CloudTableinstance
Requests PerSecond
Indicates the number ofRegionServer requests per secondof the monitored object. The unit isrequest/second.
≥ 0requests/s
CloudTableinstance
Regions Indicates the number of regions ofa RegionServer.
≥ 0 CloudTableinstance
Write Requests Indicates the number of writerequests of a RegionServer.
≥ 0 CloudTableinstance
Read Requests Indicates the number of readrequests of a RegionServer.
≥ 0 CloudTableinstance
Hit CacheBlock CachingRatio
Indicates the hit cache blockcaching ratio of the monitoredobject. The unit is percent.
0-1 CloudTableinstance
Hit CacheBlock Ratio
Indicates the hit cache block ratioof the monitored object. The unit ispercent.
0-1 CloudTableinstance
Get Delay(Avg)
Indicates the average Getoperation delay (ms) of theRegionServer per unit time of themonitored object.
≥ 0 ms CloudTableinstance
Put Delay(Avg)
Indicates the average Put operationdelay (ms) of the RegionServer perunit time of the monitored object.
≥ 0 ms CloudTableinstance
Delete Delay(Avg)
Indicates the average Deleteoperation delay (ms) of theRegionServer per unit time of themonitored object.
≥ 0 ms CloudTableinstance
Get Operations Indicates the number of Getoperations of the monitored object.
≥ 0 CloudTableinstance
Put Operations Indicates the number of Putoperations of the monitored object.
≥ 0 CloudTableinstance
DeleteOperations
Indicates the number of Deleteoperations of the monitored object.
≥ 0 CloudTableinstance
RPC QueueCall Time(Max)
Indicates the maximum call time(ms) of the RPC queue of themonitored object.
≥ 0 ms CloudTableinstance
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
148
Metric Description ValueRange
MonitoredObject
RPC QueueCall Time(Mean)
Indicates the average call time(ms) of the RPC queue of themonitored object.
≥ 0 ms CloudTableinstance
Average Flushoperationsduration
Indicates the average Flushoperation time (ms) of themonitored object.
≥ 0 ms CloudTableinstance
CompactionQueue Size
Indicates the Compaction queuesize in a RegionServer of themonitored object.
≥ 0 CloudTableinstance
Flush QueueSize
Indicates the Flush queue size in aRegionServer of the monitoredobject.
≥ 0 CloudTableinstance
CompactionCount
Indicates the Compaction countsof the monitored object.
≥ 0 CloudTableinstance
Flush OperationCount
Indicates the Flush operationcounts of the monitored object.
≥ 0 CloudTableinstance
DiscardedCache Blocks
Indicates the discarded cacheblocks of the monitored object.
≥ 0 CloudTableinstance
Sync WALTime (Max)
Indicates the maximum time (ms)of Hlog Sync of the monitoredobject.
≥ 0 ms CloudTableinstance
Sync WALTime (Mean)
Indicates the average time (ms) ofHlog Sync of the monitored object.
≥ 0 ms CloudTableinstance
15.8.4 AIS Metrics
Table 15-34 AIS metrics
Metric Description Value Range Monitored Object
Successful CallsForm RecognitionTimes
Counts the times that EnglishCustoms Form OCR issuccessfully invoked. The unit istimes.
≥ 0 times/minute
API
Failed Calls FormRecognition Times
Counts the times that EnglishCustoms Form OCR fails to beinvoked. The unit is times.
≥ 0 times/minute
API
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
149
Metric Description Value Range Monitored Object
Successful Calls ofBin Packing
Counts the times that Bin Packingis successfully invoked. The unit istimes.
≥ 0 times/minute
API
Failed Calls of BinPacking
Counts the times that Bin Packingfails to be invoked. The unit istimes.
≥ 0 times/minute
API
Successful Calls ofPath Program
Counts the times that PathProgram is successfully invoked.The unit is times.
≥ 0 times/minute
API
Failed Calls of PathProgram
Counts the times that PathProgram fails to be invoked. Theunit is times.
≥ 0 times/minute
API
Successful Calls ofTime Anomaly
Counts the times that TimeAnomaly is successfully invoked.The unit is times.
≥ 0 times/minute
API
Failed Calls of TimeAnomaly
Counts the times that TimeAnomaly fails to be invoked. Theunit is times.
≥ 0 times/minute
API
Successful Calls ofDark Enhance
Counts the times that DarkEnhance is successfully invoked.The unit is times.
≥ 0 times/minute
API
Failed Calls of DarkEnhance
Counts the times that DarkEnhance fails to be invoked. Theunit is times.
≥ 0 times/minute
API
Successful Calls ofImage Defog
Counts the times that Defog issuccessfully invoked. The unit istimes.
≥ 0 times/minute
API
Failed Calls ofImage Defog
Counts the times that Defog failsto be invoked. The unit is times.
≥ 0 times/minute
API
Successful Calls ofSuper Resolution
Counts the times that SuperResolution is successfully invoked.The unit is times.
≥ 0 times/minute
API
Failed Calls ofSuper Resolution
Counts the times that SuperResolution fails to be invoked. Theunit is times.
≥ 0 times/minute
API
Successful Calls ofImage Tagging
Counts the times that ImageRecognition is successfullyinvoked. The unit is times.
≥ 0 times/minute
API
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
150
Metric Description Value Range Monitored Object
Failed Calls ofImages Tagging
Counts the times that ImageRecognition fails to be invoked.The unit is times.
≥ 0 times/minute
API
Successful Calls ofImage Moderation
Counts the times that ImageModeration is successfullyinvoked. The unit is times.
≥ 0 times/minute
API
Failed Calls ofImage Moderation
Counts the times that ImageModeration fails to be invoked.The unit is times.
≥ 0 times/minute
API
Successful CalledForm RecognitionTimes
Counts the successful called ofcustom form recognition times ofusers. The unit is times.
≥ 0 times/minute
API
Failed Called ofCustom FormRecognition Times
Counts the failed called of customform recognition times of users.The unit is times.
≥ 0 times/minute
API
Successful Calls ofVat InvoiceRecognition
Counts the times that VAT InvoiceOCR is successfully invoked. Theunit is times.
≥ 0 times/minute
API
Failed Calls of VatInvoice Recognition
Counts the times that VAT InvoiceOCR fails to be invoked. The unitis times.
≥ 0 times/minute
API
Successful Calls ofId Card Recognition
Counts the times that Id Card issuccessfully invoked. The unit istimes.
≥ 0 times/minute
API
Failed Calls of IdCard Recognition
Counts the times that Id Card failsto be invoked. The unit is times.
≥ 0 times/minute
API
Successful Calls ofImage RecaptureDetect
Counts the times that RecaptureDetect is successfully invoked.The unit is times.
≥ 0 times/minute
API
Failed Calls ofImage RecaptureDetect
Counts the times that RecaptureDetect fails to be invoked. The unitis times.
≥ 0 times/minute
API
Successful Calls ofDispatch Planning
Counts the times that DispatchPlanning is successfully invoked.The unit is times.
≥ 0 times/minute
API
Failed Calls ofDispatch Planning
Counts the times that DispatchPlanning fails to be invoked. Theunit is times.
≥ 0 times/minute
API
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
151
Metric Description Value Range Monitored Object
Successful Calls ofPickup Planning
Counts the times that PickupPlanning is successfully invoked.The unit is times.
≥ 0 times/minute
API
Failed Calls ofPickup Planning
Counts the times that PickupPlanning fails to be invoked. Theunit is times.
≥ 0 times/minute
API
Successful Calls ofVehicle Recognition
Counts the times that VehicleLicense OCR is successfullyinvoked. The unit is times.
≥ 0 times/minute
API
Failed Calls ofVehicle Recognition
Counts the times that VehicleLicense OCR fails to be invoked.The unit is times.
≥ 0 times/minute
API
Successful Calls ofDriver LicenseRecognition
Counts the times that DrivingLicense OCR is successfullyinvoked. The unit is times.
≥ 0 times/minute
API
Failed Calls ofDriver LicenseRecognition
Counts the times that DrivingLicense OCR fails to be invoked.The unit is times.
≥ 0 times/minute
API
Successful Calls ofHandwritingRecognition
Counts the times that HandwritingLetters & Digits OCR issuccessfully invoked. The unit istimes.
≥ 0 times/minute
API
Failed Calls ofHandwritingRecognition
Counts the times that HandwritingLetters & Digits OCR fails to beinvoked. The unit is times.
≥ 0 times/minute
API
Successful Calls ofGeneral TableRecognition
Counts the times that GeneralTable OCR is successfullyinvoked. The unit is times.
≥ 0 times/minute
API
Failed Calls ofGeneral TableRecognition
Counts the times that GeneralTable OCR fails to be invoked.The unit is times.
≥ 0 times/minute
API
Successful Calls ofSentenceRecognition
Counts the times that sentencerecognition is successfullyinvoked. The unit is times.
≥ 0 times/minute
API
Failed Calls ofSentenceRecognition
Counts the times that sentencerecognition fails to be invoked.The unit is times.
≥ 0 times/minute
API
Successful Calls ofBank CardRecognition
Specifies the times that bank cardrecognition is successfullyinvoked. The unit is times.
≥ 0 times/minute
API
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
152
Metric Description Value Range Monitored Object
Failed Calls of BankCard Recognition
Specifies the times that bank cardrecognition fails to be invoked.The unit is times.
≥ 0 times/minute
API
Successful Calls ofText to SpeechRecognition
Specifies the times that Text toSpeech Recognition is successfullyinvoked. The unit is times.
≥ 0 times/minute
API
Failed Calls of Textto SpeechRecognition
Specifies the times that Text toSpeech Recognition fails to beinvoked. The unit is times.
≥ 0 times/minute
API
Successful Calls ofImage Clarity Detect
Specifies the times that ImageClarity Detect is successfullyinvoked. The unit is times.
≥ 0 times/minute
API
Failed Calls ofImage Clarity Detect
Specifies the times that ImageClarity Detect fails to be invoked.The unit is times.
≥ 0 times/minute
API
15.8.5 Prediction Service Metrics
Table 15-35 Prediction Service Metrics
Metric Description Value Range Monitored Object
Number ofSuccessful Calls
Number of times that the predictioninterface of Prediction Service issuccessfully invokedUnit: time/min
≥ 0 times/min API
Number ofFailed Calls
Number of times failed to invoke theprediction interface of PredictionServiceUnit: time/min
≥ 0 times/min API
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
153
15.8.6 Elasticsearch Metrics
Table 15-36 Elasticsearch Metrics
Metric Description ValueRange
Monitored Object
Cluster Status Status of the monitored object 0, 1, 20 indicatesnormal. 1indicatesthat thereplica shardis lost. 2indicatesthat theprimaryshard is lost.
Elasticsearch Service
Disk Usage Percentage of total disk space that is used Unit:Percent
0–100% Elasticsearch Service
15.9 Enterprise Applications
15.9.1 Workspace Metrics
Table 15-37 Workspace metrics
Metric Description Value Range Monitored Object
CPU Usage Indicates the CPU usage of themonitored object. The unit ispercent.
0-1 IaaS
Memory Usage Indicates the memory usage ofthe monitored object. The unitis percent.
0-1 IaaS
Disk Usage Indicates the disk usage of themonitored object. The unit ispercent.
0-1 IaaS
IOPS Indicates the number of I/Ooperations per second on themonitored object. It ismeasured in count.
≥ 0 counts IaaS
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
154
Metric Description Value Range Monitored Object
Network InputThroughput
Indicates the number ofincoming bytes per second onthe monitored object. The unitis byte/s.
≥ 0 bytes/s IaaS
NetworkOutputThroughput
Indicates the number ofoutgoing bytes per second onthe monitored object. The unitis byte/s.
≥ 0 bytes/s IaaS
Cloud EyeUser Guide 15 Services Supported by Cloud Eye
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
155
16 Operations Supported by Event
Monitoring
Table 16-1 ECS
EventSource
Operation Name Event Name Event Severity
ECS Deleting an ECS deleteServer Major
Restarting an ECS rebootServer Minor
Stopping an ECS stopServer Minor
Deleting a NIC deleteNic Major
Modifying ECSspecifications
resizeServer Minor
Deleting a securitygroup rule
deleteSgRule Major
Starting automaticrecovery
startAutoRecovery
Major
Ending automaticrecovery
endAutoRecovery Major
NOTE
Once a physical host accommodating ECSs breaks down, the ECSs automatically migrate to a functionalphysical host. The ECSs will restart during the migration.
Table 16-2 VPC
EventSource
Operation Name Event Name Event Severity
VPC Deleting a VPC deleteVpc Major
Cloud EyeUser Guide 16 Operations Supported by Event Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
156
EventSource
Operation Name Event Name Event Severity
Modifying a VPC modifyVpc Minor
Deleting a subnet deleteSubnet Minor
Modifying a subnet modifySubnet Minor
Releasing an EIP deleteEip Minor
Modify thebandwidth
modifyBandwidth Minor
Deleting a VPN deleteVpn Major
Modifying a VPN modifyVpn Minor
Table 16-3 EVS disks
EventSource
Operation Name Event Name Event Severity
EVS Updating a volume updateVolume Minor
Expanding volumecapacity
extendVolume Minor
Deleting a volume deleteVolume Major
Table 16-4 RDS
EventSource
Operation Name Event Name Event Severity
RDS Resetting thedatabaseadministratorpassword
resetPassword Major
Performing a clusteroperation
instanceAction Major
Deleting an instancefrom a cluster
deleteInstance Minor
Modifying a backuppolicy
setBackupPolicy Minor
Modifying aparameter group
updateParameterGroup
Minor
Cloud EyeUser Guide 16 Operations Supported by Event Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
157
EventSource
Operation Name Event Name Event Severity
Deleting a parametergroup
deleteParameterGroup
Minor
Resetting aparameter group
resetParameterGroup
Minor
Modifying adatabase port
changeInstancePort
Major
Table 16-5 IAM
EventSource
Operation Name Event Name Event Severity
IAM User login login Minor
User logout logout Minor
Resetting the loginpassword
changePassword Major
Creating a user createUser Minor
Deleting a user deleteUser Major
Modifying a user updateUser Minor
Creating a usergroup
createUserGroup Minor
Deleting a usergroup
deleteUserGroup Major
Modifying a usergroup
updateUserGroup
Minor
Creating an identityprovider (IDP)
createIdentityProvider
Minor
Deleting an IDP deleteIdentityProvider
Major
Modifying an IDP updateIdentityProvider
Minor
Updating metadata updateMetadata Minor
Updating the loginpolicy
updateSecurityPolicies
Major
Creating an AK/SK addCredential Major
Deleting an AK/SK deleteCredential Major
Cloud EyeUser Guide 16 Operations Supported by Event Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
158
EventSource
Operation Name Event Name Event Severity
Creating a project createProject Minor
Updating a project updateProject Minor
Freezing a project suspendProject Major
Table 16-6 KMS
EventSource
Operation Name Event Name Event Severity
KMS Disabling a key disableKey Major
Scheduling thedeletion of a key
scheduleKeyDeletion
Minor
Grant retiring retireGrant Major
Grant revoking revokeGrant Major
Table 16-7 OBS
EventSource
Operation Name Event Name Event Severity
OBS Deleting a bucket deleteBucket Major
Deleting the bucketpolicy configuration
deleteBucketPolicy
Major
Deleting bucketdata
deleteBucketdata Major
Setting the bucketACL
setBucketAcl Minor
Setting the bucketpolicy
setBucketPolicy Minor
Table 16-8 Cloud Eye
EventSource
Operation Name Event Name Event Severity
CES Agent heartbeatdata interruption
agentHeartbeatIn-terrupted
Major
Cloud EyeUser Guide 16 Operations Supported by Event Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
159
Table 16-9 EIP
EventSource
Operation Name Event Name Event Severity
EIP EIP bandwidth outof range
EIPBandwidthOverflow
Major
Cloud EyeUser Guide 16 Operations Supported by Event Monitoring
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
160
17 FAQs
17.1 Concepts
17.1.1 What Is Cloud Eye?Cloud Eye is a multi-dimensional monitoring platform. With Cloud Eye, you can understandthe resource usage and running status of services running on the cloud platform, receive alarmnotifications in a timely manner, and react to changes to keep your services running smoothly.
17.1.2 What Alarm Status Does Cloud Eye Support?Cloud Eye supports three alarm status: Alarm, OK, and Insufficient data.
l If an alarm rule is disabled, its alarm status is considered as invalid, and Disabled isdisplayed.
l Insufficient data indicates that no data has been generated within the latest monitoringperiod. Usually, it is caused by the deletion or abnormal status of service instances.
17.1.3 What Is Rollup?Rollup is the process in which Cloud Eye calculates sample raw data collected in differentperiods by using different rollup methods, including Avg., Max., Min., Sum, and Variance.The calculation period is called a rollup period.
Rollup is a smooth calculation process. The longer the rollup interval, the more smoothlyprocessing will be implemented, and the more accurate these generated data will reflect thereal situation. However, the shorter the rollup interval is, the more effective alarm reportingwill be.
The rollup period can be 5 minutes, 20 minutes, 1 hour, 4 hours, or 1 day.
The methods Cloud Eye uses to process collected data vary depending on data type:
l If the data is an integer, the data will be rounded.l If the data is a decimal fraction, two decimal places will be retained. Any further decimal
places will be rounded.
Cloud EyeUser Guide 17 FAQs
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
161
For example, the instance quantity in AS is an integer. If the rollup period is 5 minutes, thevalues of collected metric data are 1 and 4, while the average value is 2 instead of 2.5.
You can choose the Cloud Eye mode based on the characteristics of the rollup to meet yourservice requirements.
17.1.4 How Long Is the Metric Data Retained?Metric data includes original and rollup metric data.
l Original metric data is sampled raw data and are retained for two days.
l Rollup metric data is data aggregated based on raw metric data. Retention durations forrollup metric data depend on the rollup period.
– Metric data whose rollup period is 5 minutes are retained for 10 days.
– Metric data whose rollup period is 20 minutes are retained for 20 days.
– Metric data whose rollup period is 1 hour are retained for 155 days.
– Metric data whose rollup period is 4 hours are retained for 300 days.
– Metric data whose rollup period is 1 day are retained for 5 years.
If a resource instance is stopped, closed, or deleted, an original metric will be deleted onehour after its original data is not reported. After the metric data report resumes, the historicaldata of that metric is available.
17.1.5 How Many Rollup Methods Does Cloud Eye Support?Cloud Eye supports the following rollup methods:
l Average
If Avg. is selected for Statistic, Cloud Eye calculates the average value of metric datawithin a rollup period.
l Maximum
If Max. is selected for Statistic, Cloud Eye calculates the maximum value of metric datawithin a rollup period.
l Minimum
If Min. is selected for Statistic, Cloud Eye calculates the minimum value of metric datawithin a rollup period.
l Sum
If Sum is selected for Statistic, Cloud Eye calculates the sum of metric data within arollup period.
l Variance
If Variance is selected for Statistic, Cloud Eye calculates the variance value of metricdata within a rollup period.
NOTE
Rollup uses a rollup method to aggregate raw data generated within a specific period. Take the 5-minute period as an example. If it is 10:35 now, the raw data generated between 10:30 and 10:35will be aggregated to 10:30.
Cloud EyeUser Guide 17 FAQs
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
162
17.1.6 What Is Server Monitoring?By installing an open-source plug-in on an ECS or BMS, Cloud Eye provides you withsystem-wide, active, and fine-grained monitoring. Currently, only Linux 64-bit OSs andWindows OSs are supported.
Server Monitoring supports Huawei ECSs as well as that of other private clouds or hybridclouds. This function addresses the basic O&M problem of monitoring resources on the cloudand off the cloud in a centralized way.
17.1.7 What OSs Does the Agent Support?The following table lists OSs compatible with Telescope. OSs not included in the table arebeing tested.
NOTICEUsing OSs or versions that have not been verified may adversely affect your services.Exercise caution when using them.
Table 17-1 and Table 17-2 list the available OSs.
Table 17-1 System version (ECS)
Available OS(64 bit)
Version
CentOS 6.3, 6.5, 6.8, 6.9, 7.1, 7.2, 7.3, 7.4
OpenSUSE 13.2, 42.2
Debian 7.5.0, 8.2.0, 8.8.0, 9.0.0
Ubuntu 14.04 server, 16.04 server
EulerOS 2.2
SUSE Enterprise11 SP4, Enterprise12 SP1, Enterprise12 SP2
Fedora 24, 25
Oracle Linux 6.9, 7.4
CoreOS 10.10.5NOTE
Cloud-Init cannot be automatically installed. The manual installation directory is /.To query the Agent status, run the following command: systemctl telescopedstatus.
Other Gentoo Linux 13.0, Gentoo Linux 17.0NOTE
To query the Agent status, run the following command: rc-service telescopedstatus.
Cloud EyeUser Guide 17 FAQs
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
163
Available OS(64 bit)
Version
Windows Windows Server 2008 R2 Standard, Windows Server 2008 R2 StandardEnglishWindows Server 2008 R2 Enterprise, Windows Server 2008 R2Enterprise EnglishWindows Server 2012 R2 Standard, Windows Server 2012 R2 StandardEnglishWindows Server 2012 R2 Datacenter, Windows Server 2012 R2Datacenter EnglishWindows Server 2016 R2 Standard, Windows Server 2016 R2 StandardEnglishWindows Server 2016 R2 Datacenter, Windows Server 2016 R2Datacenter English
Table 17-2 System version (BMS)
Available OS (64 bit) Version
SUSE Enterprise11 SP4, Enterprise12 SP1
CentOS 6.9, 7.2, and 7.3
EulerOS 2.2
NOTE
The GPU plug-in supports only the EulerOS 2.2, Ubuntu 14.04 server, and CentOS 7.3.
17.1.8 What ECS Metrics Can Be Monitored by OS Monitoring?Currently, CPU, CPU load, memory, disk, disk I/O, file system, NIC, and GPU metrics can bemonitored.
Cloud EyeUser Guide 17 FAQs
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
164
Table 17-3 CPU metrics
Metric Description ValueRange
Collection Mode(Linux)
Collection Mode(Windows)
AGT.CPUUsage inIdle State
Indicates thepercentage oftime that theCPU is idle.The unit ispercent.
0-100%
Monitored object:cloud serverNOTE
Check file /proc/stat ina 10s interval.
Run the top commandto check the %Cpu(s)id value.
Monitored object: cloudserverNOTE
The value is obtained byinvoking WindowsAPIGetSystemTimes.
AGT.OtherProcessCPUUsage
Indicates thepercentage oftime that theCPU is used byother processes.The unit ispercent.
0-100%
Monitored object:cloud serverNOTE
It is calculated asfollows: AGT. OtherProcess CPU Usage =1- CPU Idle - KernelSpace CPU Usage -User Space CPUUsage
Monitored object: cloudserverNOTE
It is calculated as follows:AGT. Other Process CPUUsage = 1- CPU Idle -Kernel Space CPU Usage -User Space CPU Usage
AGT.KernelSpaceCPUUsage
Indicates thepercentage oftime that theCPU is used bykernel space.The unit ispercent.
0-100%
Monitored object:cloud serverNOTE
Check file /proc/stat in10-second intervals.
Run the top commandto check the %Cpu(s)sy value.
Monitored object: cloudserverNOTE
The value is obtained byinvoking WindowsAPIGetSystemTimes.
AGT.UserSpaceCPUUsage
Indicates thepercentage oftime that theCPU is used byuser space. Theunit is percent.
0-100%
Monitored object:cloud serverNOTE
Check file /proc/stat in10-second intervals.
Run the top commandto check the %Cpu(s)us value.
Monitored object: cloudserverNOTE
The value is obtained byinvoking WindowsAPIGetSystemTimes.
AGT.NiceProcessCPUUsage
Indicates thepercentage oftime that theCPU is in usermode with low-priorityprocesses whichcan easily beinterrupted byhigher-priorityprocesses.
0-100%
Monitored object:cloud serverNOTE
Check file /proc/stat in10-second intervals.
Run the top commandto check the %Cpu(s)ni value.
Not supported
Cloud EyeUser Guide 17 FAQs
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
165
Metric Description ValueRange
Collection Mode(Linux)
Collection Mode(Windows)
AGT.iowaitProcessCPUUsage
Indicates thepercentage oftime that theCPU is waitingfor I/Ooperations tocomplete. Theunit is percent.
0-100%
Monitored object:cloud serverNOTE
Check file /proc/stat in10-second intervals.
Run the top commandto check the %Cpu(s)wa value.
AGT.CPUInterruptRatio
Indicates thepercentage oftime that theCPU isservicinginterrupts. Theunit is percent.
0-100%
Monitored object:cloud serverNOTE
Check file /proc/stat in10-second intervals.
Run the top commandto check the %Cpu(s)hi value.
AGT.CPUSoft-interruptRatio
Indicates thepercentage oftime that theCPU isservicingsoftwareinterrupts. Theunit is percent.
0-100%
Monitored object:cloud serverNOTE
Check file /proc/stat in10-second intervals.
Run the top commandto check the %Cpu(s)si value.
Table 17-4 CPU load metrics
Metric Description ValueRange
MonitoredObject
Collection Mode(Linux)
AGT. 1-MinuteLoadAverage
Indicates the averageCPU load of themonitored object in thelast 1 minute.
≥ 0 Cloudserver
Obtain its value by usingthe load1/ value to dividethe number of logicalCPUs.Run the top command tocheck the load1 value inthe /proc/loadavg file.
Cloud EyeUser Guide 17 FAQs
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
166
Metric Description ValueRange
MonitoredObject
Collection Mode(Linux)
AGT. 5-MinuteLoadAverage
Indicates the averageCPU load of themonitored object in thelast 5 minutes.
≥ 0 Cloudserver
Obtain its value by usingthe load5/ value to dividethe number of logicalCPUs.Run the top command tocheck the load5 value inthe /proc/loadavg file.
AGT. 15-MinuteLoadAverage
Indicates the averageCPU load of themonitored object in thelast 15 minutes.
≥ 0 Cloudserver
Obtain its value by usingthe load15/ value todivide the number oflogical CPUs.Run the top command tocheck the load15 value inthe /proc/loadavg file.
NOTE
The Windows OS does not support the CPU load metrics.
Table 17-5 Memory metrics
Metric Description ValueRange
Collection Mode(Linux)
Collection Mode(Windows)
AGT.AvailableMemory
Indicates theamount ofmemory that isavailable and canbe given instantlyto processes. Theunit is GB.
≥ 0GB
Monitored object: cloudserverNOTE
Check file /proc/meminfo. Ifthe MemAvailable value isnot displayed in the file,obtain its value by adding thevalues of MemFree, Buffers,and Cached.
Monitored object:cloud serverNOTE
It is calculated byavailable memoryminuses used memory.The value is obtainedby invokingWindowsAPIGlobalMemoryStatu-sEx.
AGT.MemoryUsage
Indicates thepercentage ofmemory currentlyin use. The unit ispercent.
0-100%
Monitored object: cloudserverNOTE
Check file /proc/meminfo.AGT. Memory Usage =(MemTotal-MemAvailable)/MemTotal
Monitored object:cloud serverNOTE
The calculationformula is as follows:(Used memory size/Total memorysize*100%)
Cloud EyeUser Guide 17 FAQs
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
167
Metric Description ValueRange
Collection Mode(Linux)
Collection Mode(Windows)
AGT.IdleMemory
Indicates theamount ofmemory that isnot being used.The unit is GB.
≥ 0GB
Monitored object: cloudserverNOTE
Obtain its value by checkingfile /proc/meminfo.
Not supported
AGT.Buffer
Indicates thememory that isbeing used forbuffers. The unitis GB.
≥ 0GB
Monitored object: cloudserverNOTE
Obtain its value by checkingfile /proc/meminfo.
Run the top command tocheck the KiB Mem:buffersvalue.
AGT.Cache
Indicates thememory that isbeing used for filecaches. The unitis GB.
≥ 0GB
Monitored object: cloudserverNOTE
Obtain its value by checkingfile /proc/meminfo.
Run the top command tocheck the KiB Swap:cachedMem value.
Table 17-6 Disk metrics
Metric Description ValueRange
Collection Mode(Linux)
Collection Mode(Windows)
AGT.AvailableDisk Space
Indicates the spacethat is not used onthe disks. The unitis GB.
≥ 0GB
Monitored object:cloud serverNOTE
Run the df -h commandto check the data in theAvail column.
The path of the mountpoint prefix cannotexceed 64 characters. Itmust start with a letter,and contain only digits,lowercase letters,uppercase letters,hyphens (-), dots (.),and swung dashes (~).
Monitored object:cloud server
Cloud EyeUser Guide 17 FAQs
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
168
Metric Description ValueRange
Collection Mode(Linux)
Collection Mode(Windows)
AGT. DiskStorageCapacity
NOTEUse the WMIinterface to invokeGetDiskFreeSpaceExW to obtain diskspace data.The path of themount point prefixcannot exceed 64characters. It muststart with a letter,and contain onlydigits, lowercaseletters, uppercaseletters, hyphens (-),dots (.), and swungdashes (~).
Indicates the totalspace on the disks,including used andfree. The unit isGB.
≥ 0GB
Monitored object:cloud serverNOTE
Run the df -h commandto check the data in theSize column.
The path of the mountpoint prefix cannotexceed 64 characters. Itmust start with a letter,and contain only digits,lowercase letters,uppercase letters,hyphens (-), dots (.),and swung dashes (~).
AGT. UsedDisk Space
Indicates the usedspace on the disks.The unit is GB.
≥ 0GB
Monitored object:cloud serverNOTE
Run the df -h commandto check the data in theUsed column.
The path of the mountpoint prefix cannotexceed 64 characters. Itmust start with a letter,and contain only digits,lowercase letters,uppercase letters,hyphens (-), dots (.),and swung dashes (~).
AGT. DiskUsage
Indicates thepercentage of totaldisk space that isused. The unit ispercent. It iscalculated asfollows: DiskUsage = Used DiskSpace/DiskStorage Capacity
0-100%
Monitored object:cloud serverNOTE
Used/Size
The path of the mountpoint prefix cannotexceed 64 characters. Itmust start with a letter,and contain only digits,lowercase letters,uppercase letters,hyphens (-), dots (.),and swung dashes (~).
Cloud EyeUser Guide 17 FAQs
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
169
Table 17-7 Disk I/O metrics
Metric Description ValueRange
Collection Mode(Linux)
Collection Mode(Windows)
AGT.DisksReadRate
Indicates the numberof bytes read fromthe monitored diskper second (byte/s).
≥ 0bytes/s
Monitored object: cloudserverNOTE
The disk read rate iscalculated by calculating thedata changes in the sixthcolumn of thecorresponding device infile /proc/diskstats in 10-second intervals.
The path of the mount pointprefix cannot exceed 64characters. It must start witha letter, and contain onlydigits, lowercase letters,uppercase letters, hyphens(-), dots (.), and swungdashes (~).
Monitored object:cloud serverNOTE
UseWin32_PerfFormattedData_PerfDisk_LogicalDisk object inthe WMI to obtaindisk I/O data.
The path of themount point prefixcannot exceed 64characters. It muststart with a letter,and contain onlydigits, lowercaseletters, uppercaseletters, hyphens (-),dots (.), and swungdashes (~).AGT.
DisksReadRequests
Indicates the numberof read requests sentto the monitoreddisk per second(request/s).
≥ 0requests/s
Monitored object: cloudserverNOTE
The disk read requests arecalculated by calculating thedata changes in the fourthcolumn of thecorresponding device infile /proc/diskstats in 10-second intervals.
The path of the mount pointprefix cannot exceed 64characters. It must start witha letter, and contain onlydigits, lowercase letters,uppercase letters, hyphens(-), dots (.), and swungdashes (~).
Cloud EyeUser Guide 17 FAQs
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
170
Metric Description ValueRange
Collection Mode(Linux)
Collection Mode(Windows)
AGT.DisksReadRate
Indicates the numberof bytes written tothe monitored diskper second (byte/s).
≥ 0bytes/s
Monitored object: cloudserverNOTE
The disk write rate iscalculated by calculating thedata changes in the tenthcolumn of thecorresponding device infile /proc/diskstats in 10-second intervals.
The path of the mount pointprefix cannot exceed 64characters. It must start witha letter, and contain onlydigits, lowercase letters,uppercase letters, hyphens(-), dots (.), and swungdashes (~).
AGT.DisksWriteRequests
Indicates the numberof write requestssent to themonitored disk persecond (request/s).
≥ 0requests/s
Monitored object: cloudserverNOTE
The disk write requests arecalculated by calculating thedata changes in the eighthcolumn of thecorresponding device infile /proc/diskstats in 10-second intervals.
The path of the mount pointprefix cannot exceed 64characters. It must start witha letter, and contain onlydigits, lowercase letters,uppercase letters, hyphens(-), dots (.), and swungdashes (~).
Cloud EyeUser Guide 17 FAQs
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
171
Metric Description ValueRange
Collection Mode(Linux)
Collection Mode(Windows)
AGT.AverageReadRequestTime
Indicates theaverage amount oftime that readrequests have waitedon the disks. Theunit is ms/count.
≥ 0 Monitored object: cloudserverNOTE
The average read requesttime is calculated bycalculating the data changesin the seventh column of thecorresponding device infile /proc/diskstats in 10-second intervals.
The path of the mount pointprefix cannot exceed 64characters. It must start witha letter, and contain onlydigits, lowercase letters,uppercase letters, hyphens(-), dots (.), and swungdashes (~).
AGT.AverageWriteRequestTime
Indicates theaverage amount oftime that writerequests have waitedon the disks. Theunit is ms/count.
≥ 0 Monitored object: cloudserverNOTE
The average write requesttime is calculated bycalculating the data changesin the eleventh column ofthe corresponding device infile /proc/diskstats in 10-second intervals.
The path of the mount pointprefix cannot exceed 64characters. It must start witha letter, and contain onlydigits, lowercase letters,uppercase letters, hyphens(-), dots (.), and swungdashes (~).
Cloud EyeUser Guide 17 FAQs
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
172
Metric Description ValueRange
Collection Mode(Linux)
Collection Mode(Windows)
AGT.Disk I/OUsage
Indicates thepercentage of thetime that the diskhas had I/O requestsqueued to the totaldisk operation time.The unit is percent.
≥ 0 Monitored object: cloudserverNOTE
The disk I/O usage iscalculated by calculating thedata changes in thethirteenth column of thecorresponding device infile /proc/diskstats in 10-second intervals.
The path of the mount pointprefix cannot exceed 64characters. It must start witha letter, and contain onlydigits, lowercase letters,uppercase letters, hyphens(-), dots (.), and swungdashes (~).
AGT.FileSystemRead/WriteStatus
Indicates the readand write status ofthe mounted filesystem of themonitored object.Possible values are 0(read and write) and1 (read only).
0,1 Monitored object: ECSNOTE
Check file systeminformation in the fourthcolumn in file /proc/mounts.
Not supported
Table 17-8 File system metrics
Metric Description ValueRange
Collection Mode(Linux)
Collection Mode(Windows)
AGT.DiskinodeTotal
Indicates the totalnumber of indexnodes on the disk.
≥ 0 Monitored object:cloud serverNOTE
Run the df -i commandto check the data in theInodes column.
The path of the mountpoint prefix cannotexceed 64 characters. Itmust start with a letter,and contain only digits,lowercase letters,uppercase letters,hyphens (-), dots (.), andswung dashes (~).
Not supported
Cloud EyeUser Guide 17 FAQs
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
173
Metric Description ValueRange
Collection Mode(Linux)
Collection Mode(Windows)
AGT.TotalinodeUsed
Indicates thenumber of usedindex nodes on thedisk.
≥ 0 Monitored object:cloud serverNOTE
Run the df -i commandto check the data in theIUsed column.
The path of the mountpoint prefix cannotexceed 64 characters. Itmust start with a letter,and contain only digits,lowercase letters,uppercase letters,hyphens (-), dots (.), andswung dashes (~).
AGT.Percentage ofTotalinodeUsed
Indicates the ratioof used indexnodes to the totalindex nodes on thedisk. The unit ispercent.
0-100% Monitored object:cloud serverNOTE
Run the df -i commandto check the data in theIUse% column.
The path of the mountpoint prefix cannotexceed 64 characters. Itmust start with a letter,and contain only digits,lowercase letters,uppercase letters,hyphens (-), dots (.), andswung dashes (~).
Table 17-9 NIC metrics
Metric Description ValueRange
Collection Mode Collection Mode
ACT.OutboundBandwidth
Indicates the bits sentper second of themonitored objectNIC. The unit is bit/s.
≥ 0bits/s
Monitored object:cloud serverNOTE
Check the metricvalue changes in file /proc/net/dev in 10-second intervals.
Monitored object:cloud serverNOTE
Use the MibIfRowobject in the WMI toobtain networkmetric data.AGT.
InboundBandwidth
Indicates the bitsreceived per secondof the monitoredobject NIC. The unitis bit/s.
≥ 0bits/s
Cloud EyeUser Guide 17 FAQs
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
174
Metric Description ValueRange
Collection Mode Collection Mode
AGT.NICPacketReceiveRate
Indicates the numberof packets receivedby this networkinterface per second.The unit is count/s.
≥ 0counts/s
AGT.NICPacketSendRate
Indicates the numberof packets sent bythis network interfaceper second. The unitis count/s.
≥ 0counts/s
AGT.ReceiveErrorRate
Indicates the percentof receive errorsdetected by thisnetwork interface persecond.
0–100%
Not supported
AGT.Transmit ErrorRate
Indicates the percentof transmit errorsdetected by thisnetwork interface persecond.
0–100%
AGT.Received PacketDropRate
Indicates the percentof packets receivedby this networkinterface which weredropped per second.
0–100%
AGT.TransmittedPacketDropRate
Indicates the percentof packetstransmitted by thisnetwork interfacewhich were droppedper second.
0–100%
Cloud EyeUser Guide 17 FAQs
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
175
Table 17-10 GPU Metrics
Metric Description ValueRange
MonitoredObject
CollectionMode (Linux)
Performance Status
Indicates the GPUperformance status of themonitored object. Thismetric has no unit.
P0-P15,P32P0 indicatesthemaximumperformance status.P15indicatestheminimumperformance status.P32indicatestheunknownstatus.
ECSNOTE
ECSs thatsupportGPU
Run the nvidia-smi command tocheck the data inthe Perf column.
MemoryUsage
Indicates the percentage ofmemory currently in use.The unit is percent.
0–100% Run the nvidia-smi command tocheck the data inthe Memory-Usage column.
GPUUsage
Indicates the percentage oftime that GPU is used. Theunit is percent.
0–100% Run the nvidia-smi command tocheck the data inthe GPU-Utilcolumn.
NOTE
l The Windows OS does not support the GPU metrics.
17.1.9 How Do I Upgrade the Agent?Agents of different versions provided by Cloud Eye have different metrics or functions. Youcan manually or automatically upgrade the Agent. The differences between the two modes areas follows:l Manual upgrade: In manual mode, you need to uninstall the Agent and reinstall it.
Linux OS: Log in to the ECS as user root and run the /usr/local/telescope/uninstall.shcommand to uninstall the Agent. Install the new Agent based on Installing the Agent.Windows OS: In the directory where the Agent installation package of the earlier versionis stored, double-click the uninstall.bat script to uninstall the Agent. In the directorywhere the Agent installation package of the new version is stored, double-clickinstall.bat to install and start the Agent.
Cloud EyeUser Guide 17 FAQs
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
176
l Automatic upgrade: Complex steps involved in the manual upgrade are saved. After theAgent is updated, the automatic upgrade is automatically performed to enable you toexperience the new functions in the first time.
17.1.10 Why Is the Metric Collection Point Lost During CertainPeriod of Time?
Figure 17-1 shows that no monitoring data is available during certain period of time.
Figure 17-1 Viewing graphs
This phenomenon is not a function or design defect. The Agent collects metrics based on theserver time. When the server time changes (time change caused by time synchronization), theillusion of metric collection point loss is displayed, actually, the metric collection point is notlost.
17.2 Usages
17.2.1 What Is an Alarm Notification? How Many Types of AlarmNotifications Exist? How Can I Configure Them?
Alarm notifications are actions that the system takes when the alarm status of an alarm rule ischanged.
You can configure alarm notifications when creating or modifying an alarm rule. You can alsodisable alarm notifications.
Cloud Eye supports the following alarm notification types:
l Sends emails or text messages to users, or sends HTTP/HTTPS requests to servers.
l Triggers automatic capacity expansion and reduction by working with AS.
Cloud EyeUser Guide 17 FAQs
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
177
17.2.2 Why Are the Network Traffic Metrics in Cloud EyeDifferent from Those Detected in ECS?
The sample data collection interval in Cloud Eye is different from that used by the metricmonitoring tool in the ECS.
Cloud Eye collects ECS and EVS data at four-minute intervals. The data collection intervalfor ECS second generation is 5 minutes. However, the metric monitoring tool in the ECScollects data at one-second intervals.
As the data collection cycle gets longer, the distortion of short time data increases. Therefore,Cloud Eye is suitable for monitoring long-term websites and applications running on ECSs.
Furthermore, you can configure alarm thresholds to generate alarms in the event of resourceexceptions or insufficiency, improving resource reliability.
17.2.3 What Are the Effects on ECS Metrics If vmtools Is NotInstalled on ECSs?
If vmtools is not installed on ECSs, Cloud Eye can still monitor the outband incoming rateand outband outgoing rate. However, it cannot monitor memory usage, disk usage, inbandincoming rate, or inband outgoing rate, which reduces data accuracy of the CPU usage.
For details about ECS metrics supported by Cloud Eye, see ECS monitoring metrics.
17.2.4 How Can I Export Monitoring Data?On the Cloud Eye console, click Cloud Service Monitoring and click Export MonitoringData. On the Export Monitoring Data page, select a time range, a service, a monitoredinstance, and a metric, and click Export.
l The first row in the exported monitoring report displays the user name, region name,service name, instance name, instance ID, metric name, monitoring data, time, andtimestamp. This report enables users to view historical monitoring data.
l If you need to convert the time in Unix timestamp to the time of the target time zone,perform the following steps:
a. Use Excel to open a .csv file.
b. Use the following formula to convert the time:
Target time = (Unix timestamp/1000 + (Target time zone) x 3600)/86400 + 70 x 365+ 19
c. Set cell format to Date.
For example, the Unix timestamp is 1475918112000 and the target time is Beijingtime. Beijing is located in the UTC+8 time zone. Therefore, the target time iscalculated as follows:
Target time = (1475918112000/1000 + (+8) x 3600)/86400 + 70 x 365 + 19
Set the cell format to date and select a presentation format such as 2016/3/14 13:30.Then, the final time is obtained and presented as 2016/10/8 17:15.
Cloud EyeUser Guide 17 FAQs
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
178
17.2.5 Under What Circumstances Will an Alarm Rule Trigger"Insufficient data"?
When the monitoring data of a metric is not reported to Cloud Eye for three consecutivehours, the alarm rule status changes to Insufficient data. In this case, if you click Insufficientdata for Trigger condition when creating the alarm rule, the system will send an email to youin a timely manner, so that you can locate problems promptly. The system can also sendHTTP or HTTPS requests to the server.
In special cases, if the period for reporting monitoring data is greater than three hours and forthree consecutive periods the monitoring data is not reported, the alarm rule status changes toInsufficient data.
17.2.6 How do I Handle the Garbled CSV File If I Open It withExcel?
You can export the Cloud Eye monitoring data as a CSV file, but when you open this file withExcel, there may be garbled Chinese characters. This is because the exported CSV file isencoded in UTF-8 while Excel is opened in the ANSI format. To solve this problem, useeither of the following solutions:
l Use a text editor such as NotePad or use WPS to open the exported CSV file.l When you open the CSV file, set Excel as follows:
1. Open Excel.2. Choose Data > From Text.3. Select the exported CSV file.
Text Import Wizard is displayed.4. Select Separator and click Next.5. Deselect Tab, select Comma, click Next, and click Finish.6. In the Import data dialog box, click OK.
17.2.7 Why I Cannot See the Monitoring Data on the Cloud EyeConsole After Purchasing Cloud Service Resources?
We are working to interconnect Cloud Eye with more cloud services. Before theinterconnection is completed, you cannot view the resource monitoring data of the cloudservices that have not been interconnected with Cloud Eye. Therefore, if you want to checkthe resource monitoring data of the cloud services you purchased, you need to first checkwhether the cloud services have been interconnected with Cloud Eye.
If the services have been interconnected with Cloud Eye, wait for a period of time, becausethe frequencies of each service to collect and report data to Cloud Eye are different. You canview the resource monitoring graph after Cloud Eye collects the first piece of monitoring data.
Cloud EyeUser Guide 17 FAQs
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
179
17.2.8 How Can I Ensure the Newly Purchased ECS Has the OSMonitoring Function?
Scenarios
This section describes how to enable the newly purchased ECS coming with the OSMonitoring function.
Prerequisites
The ECS with the Agent installed is available.
Procedure1. Log in to the ECS console. On the instance list, locate the row containing the ECS with
the Agent installed, choose More > Stop in the Operation column.
Figure 17-2 Stopping the target ECS
2. Choose More > Make Image.
Figure 17-3 Making an image
3. Set the private image name to Image_with_agent and click Apply Now.
Cloud EyeUser Guide 17 FAQs
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
180
Figure 17-4 Apply Now
4. Purchase a new ECS and select the newly created private image Image_with_agent.
Figure 17-5 Selecting Image_with_agent for Name
5. After the new ECS is created, log in to the ECS. Change InstanceId in the Agentconfiguration file /usr/local/telescope/bin/conf.json to the ECS name to complete thereplication process.
Figure 17-6 Modifying the Agent configuration file
17.2.9 Why the Cloud Eye Console Does Not Display the OSMonitoring Data or the Data Display Is Lagged After Agent IsInstalled and Configured on ECS?
After installing the Agent successfully, you need to choose Server Monitoring, enable theECS Monitoring Status, wait for 2 minutes. Then the OS Monitoring data will be displayedon the Cloud Eye console.
Cloud EyeUser Guide 17 FAQs
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
181
If Plug-in Status is Running and Monitoring Status is enabled, but no OS Monitoring datais displayed on the Cloud Eye Console after you have waited for 5 minutes, you need to checkwhether the ECS time and the console client time are consistent.
When the Agent reports data, it takes the ECS or BMS local time. When the console deliversrequests, it takes the browser time of the user client. If the two times are inconsistent, no OSMonitoring data is displayed on the Cloud Eye console.
NOTE
Run the following command to change the BMS time to be the same as that of the monitoring server:timedatectl set-timezone 'Asia/Shanghai'
17.2.10 What Should I Do if Plug-in Status Is Faulty?OS Monitoring sends a heartbeat message to Cloud Eye every 1 minute. If Cloud Eye cannotreceive a heartbeat for 3 minutes, Plug-in Status is displayed as Faulty.
Possible causes are:
1. The Agent is incorrectly configured. For details, see section Configuring the Agent inthe Cloud Eye User Guide.
2. You may find the cause in log /usr/local/telescope/log/common.log.
17.2.11 Restoring the Plug-in ConfigurationAfter the Agent is installed, you can configure AK/SK, RegionID, and ProjectId in one-clickmode. This saves manual configuration and improves configuration efficiency.
Alternatively, on the Server Monitoring page, select the target ECS and click Restore AgentConfigurations.
NOTE
One-click restoration is applicable to Agent 1.0.5 or later. If the Agent version is earlier than 1.0.5,upgrade the Agent first and then perform the one-click restoration or manually configure the Agent.
One-click restoration does not support BMSs.
17.2.11.1 Servers Without Agency Configured
Scenarios
This section describes how to enable Telescope to automatically obtain the AK and SK to helpyou collect logs by creating an agency. This frees you from exposing the AK or SK in theconfiguration file.
Procedure1. Log in to the management console.
2. Click in the upper left to select a region and a project.3. Under Management & Deployment, click Identity and Access Management.4. Choose Agency > Create Agency.5. Configure the parameters required for creating an agency.
Cloud EyeUser Guide 17 FAQs
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
182
Table 17-11 Creating an agency
Name Description Example Value
AgencyName
Specifies the name of the agency. Telescope_agency_001
AgencyType
Select Cloud service. N/A
CloudService
Select ECS. N/A
ValidityPeriod
Select Permanent. N/A
Description Specifies the detailed information about theagency. This parameter is optional.
N/A
6. In the Permissions area, click Modify in the row where the current region is located.
The Policy page is displayed.7. In the Available Policies area on the left, enter CES. In the search result, select CES and
CES Administrator.
NOTE
In the Available Policies area on the left, enter LTS. In the search result, select LTS and LTSAdministrator.
Figure 17-7 Selecting policies
8. Click OK in the lower part of the page.
If no agency is configured for the host, perform the following operations toconfigure the agency:
1. Log in to the management console.2. Under Computing, click Elastic Cloud Server.
NOTE
If you purchase a BMS, click Bare Metal Server under Computing.
3. Click the name of the target ECS on which the Agent is installed.
Cloud EyeUser Guide 17 FAQs
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
183
4. For Agency Name, select the agency name created in 17.2.11.1 Servers WithoutAgency Configured and click the green icon to confirm your selection.
Figure 17-8 Selecting an agency name (ECS)
Figure 17-9 Selecting an agency name (BMS)
17.2.11.2 Current Agency Permission Being AbnormalIf the current agency permission is abnormal, perform the following operations:
1. Log in to the management console.
2. Click in the upper left to select a region and a project.3. Under Management & Deployment, click Identity and Access Management.4. Click the name of the target agency and check whether the agency policy is CES
Administrator.
Cloud EyeUser Guide 17 FAQs
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
184
Figure 17-10 Viewing the agency permission
17.2.11.3 Current Agency Being Expired
If the current agency expires, the entrusted time has expired and cannot be used. You canchange the entrusted time to permanent based on step 5.
17.2.12 Permission Being AbnormalA user in a user group must have the Security Administrator permission. If no, a messageindicating the permission is abnormal is displayed. Contact the administrator to change thepermission.
Figure 17-11 Checking the permission
17.2.13 Agencies Cannot Be CreatedIf the agency quota is full during plug-in configuration restoration, you cannot create anagency. You can delete invalid agencies or expand the agency quota to restore the plug-inconfiguration again.
Cloud EyeUser Guide 17 FAQs
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
185
17.2.14 Agencies Being UsedWhen the plug-in configuration is restored, an agency whose name isCESAgentAutoConfigAgency is automatically created. If you have created such an agencyand ECS BMS is not selected for Agency Type, the agency may be used by other cloudservices.
You can delete the agency and restore the plug-in configuration again, or manually configurethe agency based on section 17.2.11.1 Servers Without Agency Configured.
17.2.15 What Should I do If the Service Port Is Used by the Agent?Cloud Eye Agent uses HTTP requests to report data every 10 seconds. Dynamic ports arerandomly occupied during the reporting. The port range is obtained from the system file: /proc/sys/net/ipv4/ip_local_port_range. If the service port used conflicts with the port usedby the Agent, you can modify /proc/sys/net/ipv4/ip_local_port_range and restart the Agentto solve the problem.
Procedure1. Log in an ECS or BMS as user root.2. Run the following command to open the sysctl.conf file:
vim /etc/sysctl.conf3. (Permanent modification) Run the following command to add new port configurations to
the sysctl.conf file:net.ipv4.ip_local_port_range=49152 65536
4. Run the following command to make the change take effect:sysctl -p /etc/sysctl.conf
NOTE
l For permanent change, the change still takes effect after the ECS or BMS is restarted.
l For temporary change (the change expires after the ECS or BMS is restarted), run command #echo 49152 65536 > /proc/sys/net/ipv4/ip_local_port_range.
5. Run the following command to restart the Agent:/usr/local/telescope/telescoped restart
NOTE
/usr/local/telescope indicates the installation path of the Agent.
Cloud EyeUser Guide 17 FAQs
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
186
A Change History
Released On Description
2018-07-30 This issue is the twenty-fifth official release, which incorporates thefollowing changes:l Added ECS automatic recovery for Event Monitoring.l Resource groups support BMSs.l The Agent can be installed to a specified directory.l Added descriptions about specifying ports for the Agent.
2018-06-30 This issue is the twenty-fourth official release, which incorporates thefollowing changes:l Added the function of configuring data storage in bathes.l Added the function of restoring configurations of plug-ins in batches
for servers.l Added Elasticsearch metrics.l Added Relational Database Service (RDS) metrics.l Added Virtual Private Cloud (VPC) traffic metrics.
2018-05-30 This issue is the twenty-third official release, which incorporates thefollowing changes:l OS Monitoring supports process metrics.l OS Monitoring supports the Windows OSs.l Added the auto refresh button to the monitoring panels.
2018-04-30 This issue is the twenty-second official release, which incorporates thefollowing changes:l Interconnected with NAT Gateway.l Optimized the strings for alarm rule creation.l Added the Event Monitoring function.l Changed the ECS Monitoring page.
Cloud EyeUser Guide A Change History
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
187
Released On Description
2018-03-30 This issue is the twenty-first official release, which incorporates thefollowing changes:l Added Distributed Cache Service (DCS) metrics.l Interconnected with UPredict.l Interconnected with ElasticSearch.l OS Monitoring supports GPU metrics.l Added the Resource Groups function.l Added the Log Monitoring function.
2018-02-28 This issue is the twentieth official release, which incorporates thefollowing changes:l Added Artificial Intelligence Service (AIS) metrics.l Interconnected with Cloud Data Migration (CDM).l Added the Availability feature to the Website Monitoring function.l OS Monitoring supports load metrics.
2018-01-30 This issue is the nineteenth official release, which incorporates thefollowing changes:l Added the Custom Monitoring function.l Added Artificial Intelligence Service (AIS) metrics.l Added the Website Monitoring function.
2018-01-26 This issue is the eighteenth official release, which incorporates thefollowing changes:l Added the Process Monitoring function.l OS Monitoring supports NIC metrics.l Added the metric sorting function.l Interconnected with Object Storage Service (OBS).
2017-12-30 This issue is the seventeenth official release, which incorporates thefollowing changes:l Interconnected with API Gateway.l Interconnected with Document Database Service (DDS).l Interconnected with CloudTable.l Added Distributed Cache Service (DCS) metrics.l Added Artificial Intelligence Service (AIS) metrics.
Cloud EyeUser Guide A Change History
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
188
Released On Description
2017-11-30 This issue is the sixteenth official release, which incorporates thefollowing changes:l Interconnected with Distributed Database Middleware (DDM).l Added Artificial Intelligence Service (AIS) metrics.l Added Auto Scaling (AS) metrics.l Added the content of using Cloud-Init to automatically install and
configure the Agent.l Added the function of Metric Data Transfer to OBS.
2017-10-30 This issue is the fifteenth official release, which incorporates thefollowing changes:l The Advanced Monitoring function is added.l Optimized the descriptions of Distributed Message Service (DMS)
metrics.l When you create a topic, the page jumps from the Cloud Eye console
to the SMN console.
2017-09-30 This issue is the fourteenth official release, which incorporates thefollowing changes:l Added the Custom Alarm Templates function.l Add Monitoring Overview.l Added FunctionGraph metrics.l Added Scalable File Service (SFS) metrics.
2017-08-30 This issue is the thirteenth official release, which incorporates thefollowing changes:l Added the alarm template.l Updated the process of adding alarm rules.
2017-07-30 This issue is the twelfth official release, which incorporates thefollowing changes:l Added Artificial Intelligence Service (AIS) metrics.l Added section Under What Circumstances Will an Alarm Rule
Trigger "Insufficient data"?
2017-06-30 This issue is the eleventh official release, which incorporates thefollowing change:Optimized the Instance Monitoring page and supported tiled display ofmultiple metrics.
2017-05-26 This issue is the tenth official release, which incorporates the followingchanges:l Added Distributed Message Service (DMS) metrics.l Added Metric Quantity description.l Added Sum as a rollup method.
Cloud EyeUser Guide A Change History
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
189
Released On Description
2017-04-28 This issue is the ninth official release, which incorporates the followingchanges:l Added Machine Learning Service (MLS) metrics.l Added WEB Tamper Protection (WTP) metrics.l Added Data Warehouse Service (DWS) metrics.l Added Virtual Private Cloud (VPC) traffic metric.
2017-03-30 This issue is the eighth official release, which incorporates the followingchanges:l Added Workspace metrics.l Added Relational Database Service (RDS) metrics.l Added an Elastic Cloud Server (ECS) metric that can recover ECSs.
2017-02-27 This issue is the seventh official release, which incorporates thefollowing changes:l Added the operation of creating a monitoring panel.l Added the Cloud Eye data rollup mechanism.
2017-01-19 This issue is the sixth official release, which incorporates the followingchange:Added the rollup methods supported by Cloud Eye.
2016-12-30 This issue is the fifth official release, which incorporates the followingchange:Added the metric customization function.
2016-11-24 This issue is the fourth official release, which incorporates the followingchange:Added the alarm history viewing function.
2016-10-19 This issue is the third official release, which incorporates the followingchange:Deleted Resource Template Service (RTS) metrics.
2016-07-15 This issue is the second official release, which incorporates the followingchange:Added Relational Database Service (RDS) metrics.
2016-03-14 This issue is the first official release.
Cloud EyeUser Guide A Change History
Issue 25 (2018-07-30) Huawei Proprietary and ConfidentialCopyright © Huawei Technologies Co., Ltd.
190