Professional Documents
Culture Documents
FusionSphere PCS 6.5.1.1 Operation Guide (Virtualization Xen To KVM)
FusionSphere PCS 6.5.1.1 Operation Guide (Virtualization Xen To KVM)
6.5.1.1
Operation Guide (Virtualization
Xen to KVM)PCS(Platform
Cross Service)工具操作指南
(FusionCompute - KVM)
Issue 01
Date 2019-08-30
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei
and the customer. All or part of the products, services and features described in this document may
not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all
statements, information, and recommendations in this document are provided "AS IS" without
warranties, guarantees or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in
the preparation of this document to ensure accuracy of the contents, but all statements, information,
and recommendations in this document do not constitute a warranty of any kind, express or implied.
Purpose
This document describes how to obtain, install, operate, and uninstall the Platform Cross
Service (PCS) tool and provides related precautions.
Intended Audience
This document is intended for:
Switchover planning engineers
Switchover implementation engineers
Switchover technical support engineers
Switchover development engineers
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Change History
Changes between document issues are cumulative. The latest document issue contains all the
changes made in earlier issues.
Issue 01 (2019-08-30)
This issue is the first official release.
FusionSphere PCS
Operation Guide (Virtualization Xen to KVM) Contents
Contents
2 Technical Support.........................................................................................................................3
3 Switchover Service and Risk Precautions................................................................................4
3.1 Introduction to the Switchover Service..........................................................................................................................4
3.1.1 Information Collection and Feasibility Analysis.........................................................................................................4
3.1.2 Switchover Plan and Solution Design.........................................................................................................................4
3.1.3 Core Service Switchover Test......................................................................................................................................5
3.2 Switchover Risk..............................................................................................................................................................5
4 Switchover Restrictions................................................................................................................6
4.1 Networking.....................................................................................................................................................................6
4.2 Switchover Network Restrictions...................................................................................................................................6
4.3 Switchover Pre-implementation Requirements..............................................................................................................7
4.4 Switchover Implementation Requirements....................................................................................................................7
4.5 Impact on Services.........................................................................................................................................................7
4.6 Function Restrictions......................................................................................................................................................9
5 Compatibility List.......................................................................................................................12
5.1 Platform Compatibility.................................................................................................................................................12
5.2 Guest OS Support Policies...........................................................................................................................................12
7 System Configuration.................................................................................................................25
7.1 Managing Switchover Obstacle Items..........................................................................................................................25
7.2 Configuring Password Policy.......................................................................................................................................25
7.3 Configuring the Login Timeout Period........................................................................................................................26
7.4 Viewing System Tasks..................................................................................................................................................27
11 Appendix 2 Troubleshooting..................................................................................................81
11.1 Failure to Access the System After a UEFI VM Is Switched.....................................................................................81
11.2 Message "Failed to create a VM on the cloud platform" Is Displayed During VM Drill and Switchover Tasks......81
11.3 Initial Configuration for a Template VM on the KVM Platform Before Confirmation Is Performed.......................83
11.3.1 Linux Template VM.................................................................................................................................................83
11.3.2 Windows Template VM...........................................................................................................................................83
11.4 Agent status display for Abnormal.............................................................................................................................87
11.5 Failed to Execute the Disk Configuration Injection Task During the Drill and Switchover......................................87
11.6 Faulty OS During the Deployment of Controller VM................................................................................................88
1 Overview
1.1 Introduction
PCS allows you to switch over VMs that use VIMS, FC SAN virtualization, NAS, and
RDM from FusionCompute V100R006C10SPH108 standard version to the FusionCompute
6.5.0 virtualization platform.
No
End t he drill.
Delet e t he resources.
System switchover, covering system service data, is a high-risk activity and affected by
multiple factors, and therefore the switchover may fail.
You are advised to follow a professional service process to implement the switchover and thus
identify potential risks in advance.
4.1 Networking
Figure 4.1.1.1.1.1.1.1 Networking
Ensure that the Xen platform, source host, KVM platform, target host, and PC
communicate with each other.
The target KVM platform can access and reuse resources in the existing storage pool of
Xen.
For details about ports to be opened for switchover, see the FusionSphere PCS 6.5.0
Communication Matrix.
Ensure that the ports listed in the communication matrix are enabled on the system and
network firewalls. You are advised to disable the firewall on the source system and enable it
after the switchover. You are advised to set the security group policy of the target platform to
ensure that the source platform, target platform, and PC communicate with each other after
successful switchover.
4.2 Switchover Network Restrictions
Only LAN supports switchover. WAN and NAT networks do not support switchover.
Switchover implementation requires no packet loss, no jitter, latency less than 2 ms, and
bandwidth greater than 100 Mbit/s. If such QoS requirements are not met, a switchover
failure is highly possible.
The executor can access management plane networks of the source and target
FusionCompute platforms.
For details about the guest OS support policies, contact Huawei technical support.
For a guest OS no longer supported by the Huawei cloud platform, the support team is not obligated
to provide assistance in any switchover problems related to this OS.
For guest OSs that support switchover, see 10.2"Guest OSs that Support Switchover."
6 Installation and Deployment
The Xen platform must be upgraded to V100R006C10SPC101 or a later version before being
upgraded to V100R006C10SPH108.
The Lock Type of the SAN storage must be Hardware-assisted Locking. If the hardware does not
support hardware-assisted locking, the switchover cannot be completed. If the SAN storage uses the
distributed locking mode, switch to hardware-assisted locking following operations provided in
"Switching to Hardware-Assisted Locking for the Virtualized SAN Storage" in the FusionSphere
V100R006C10 Product Documentation (Server Virtualization). During the switching process, the
services are interrupted for about 30 to 90 seconds.
Step 2 Upgrade GuestOS Compatibility Plug-In based on FusionSphere SIA 6.5.7 FusionSphere 6.1
GuestOS Compatibility Plug-In Installation Guide 01.
Step 3 (Optional)Upgrade GuestOS Tools based on FusionSphere SIA 6.5.7 PV Driver Installation
and Upgrade Guide 01.
Step 4 On the FusionCompute web client, choose System > System Configuration > License
Management and click Load License File. On the Load License File page, click Obtain
ESN and record the ESN.
Step 5 Use PuTTY to log in to the CNA host as the gandalf user and run the su - root command to
switch to the root user,
Step 6 Run the TMOUT=0 command and then run the rpm -qa |grep GalaX-CNA-Update
command to obtain the version number after GalaX-CNA-Update- in the command output,
for example GalaX-CNA-Update-100.5.0-XXX.
If the second number is 5 or 6, no action is required.
If the second number is 3, upgrade the environment to V100R006C10SPH108, add a
virtualized SAN storage device by following "Adding a Data Store" in FusionSphere
V100R006C10 Product Documentation (Server Virtualization), and migrate the VM to
the new storage device by following "Migrating Disks of a VM." After the migration is
successful, switch the VM.
If capacity expansion has been performed in the environment, obtain the original version number of the
host during initial installation and that of the host to be expanded.
----End
6.3.3 Configuring the MAC Address Segment
During switchover, Xen and KVM environments use the same layer 2 network. In this case,
you need to plan the MAC address segment in each environment to avoid MAC address
conflict.
Perform the following operation to modify the MAC address segment.
Step 1 On the FusionCompute 6.5.0 web client, click to go to the Resource Pools page. On the
displayed page, choose Configure > MAC Address Pool, and click Modify in the
Operation column in the row that contains the default MAC address pool. In the displayed
dialog box, modify the MAC address segment.
Step 2 On the FusionCompute V100R006C10SPH108 web client, choose site > MAC Address Pool
and click Modify in the Operation column in the row that contains the default MAC address
pool. In the displayed dialog box, modify the MAC address segment.
Do not use the reserved address segment, multicast address segment, and broadcast address segment.
Reserved address segment: from 44456477242017 (this value included) to 44456477247017 in
decimal notation; from 28:6e:d4:88:b2:a1 (this value included) to 28:6e:d4:88:c6:29 in hexadecimal
notation
Multicast address segment and broadcast address segment: The MAC address consists of 48 bits,
usually represented as a string of 12 hexadecimal digits. It consists of 6 pairs where each pair has
two hexadecimal digits. The value ranges from 00-00-00-00-00-00 (this value included) to FF-FF-
FF-FF-FF-FF (this value included). The first pair has two hexadecimal digits corresponding to odd
numbers from 0 to 255 (this value included), indicating the multicast address and broadcast address.
For example, hexadecimal digits 0d correspond to the odd number 13, and the multicast address is
0d-xx-xx-xx-xx-xx.
----End
----End
In FusionCompute V100R006C10SPH108
Step 1 Use PuTTY to log in to the active VRM node as user gandalf, run the su - root command to
switch to user root, and run the TMOUT=0 command to disable user logout upon system
timeout.
Step 2 Run the sh /opt/galax/gms/common/ha/modifyVimsMultisiteSwitch.sh open command to
enable dual-site configurations.
Step 3 Perform the preceding operations on the standby VRM node.
----End
In the Peer VRM Information area, configure the IP address, port number, protocol,
version, and new username and password of FusionCompute V100R006C10SPH108.
In the Local VRM Information area, set the IP address, port number, protocol, version,
and new username and password of FusionCompute 6.5.0.
Step 3 After all information is configured, click Save.
The admin account is not allowed for "Dual-site Management".
Step 1 On the FusionCompute 6.5.0 web client, choose Resource Pools > Storage > Storage Device
and click Scan. In the displayed Scan Storage Device dialog box, select all hosts and click
Confirm.
Step 2 Choose Resource Pools > Storage > Data Store and click Add Data Store. In the displayed
Storage Device dialog box, select the first LUN in the VIMS cluster of the Xen version and
click Next.
Step 3 Enter the storage name, set Format to No, select hosts for which the VIMS cluster is to be
configured on the Associate Host tab page, and click Next. In the displayed dialog box, click
Confirm.
Xen hosts and KVM hosts must be added to the same host group during the storage configuration.
Otherwise, VIMS cluster dual-site management cannot be achieved.
----End
Before the change, switch over or stop all VMs using virtualized SAN storage on the host.
1. Click the name of the controller or agent VM, choose Configuration, and click Settings
next to Permissions.
2. On the displayed page, select Create snapshot, Modify snapshot, Delete snapshot,
Resume snapshot, Back up and restore VM, Delete VM, Hibernate VM, Pause VM, and
Resume VM.
3. Click Confirm.
----End
Configure a third-party File Transfer Protocol (FTP) server to back up important data on the controller
node. After the FTP server is configured, the controller node automatically sends important data to the
FTP server at 02:00:00 every day. If a system exception occurs, the backup data can be used to restore
the system.
Step 1 Use PuTTY to log in to the controller node as user gandalf, run the su - root command enter
the password of user root to switch to user root, and run the TMOUT=0 command to disable
user logout upon system timeout.
Step 2 Run setConfig to configure data backup and enter yes.
You are advised to select FTPS to enhance file transmission security. If the FTP server does
not support the FTPS protocol, select FTP.
Please input the upload network protocol[ ftp,ftps ], press enter and default value
[ftp] :
Enter the relative path in which the backup files are stored.
Please input the ftp upload root directory, press enter and default value [/] :
The configuration information is displayed. If the information is correct, enter yes. Otherwise,
enter no and run the setConfig command again.
Backup configure :
----End
On the home page, you can view the overall PCS system status.
Common Operation: provides functions, including Add Cloud Platform, Add Agent,
Register VMs, and Create Switchover Plan.
Resource statistics: View Cloud platforms, Agents, VMs, and Switchover plans.
VM Statistics: View the switchover result and drill result to know the VM drill and
switch status.
Agent Statistics: View the agent information to know the agent status.
Recent Tasks: View tasks generated in the latest 30 minutes to know the task status.
Step 3 Set the source platform information.
On the PCS management page, click Add Cloud Platform. On the displayed page, set Name
to FC_XEN, Category to FusionSphere Virtualization Suite, Version to V100R006C10,
IP Address to the IP address of the source platform, Port to the one created in the Xen
platform, Username to the one created in the Xen platform, and Password. Then, click
Confirm.
Step 4 Set the target platform information.
On the PCS management page, click Add Cloud Platform. On the displayed page, set Name
to FC_KVM, Category to FusionSphere Virtualization Suite, Version to 6.5, IP Address
to the IP address of the target platform, Port to the one created in the KVM platform,
Username to the one created in the KVM platform, and Password. Then, click Confirm.
After the cloud platform is successfully registered, its VM list, storage resource list, and network
resource list can be automatically displayed.
After the cloud platform is added, the user roles cannot be modified.
To change the passwords of interconnection accounts during the switchover, see Changing
Passwords of Interconnection Accounts During the Switchover.
When Category is set to FusionSphere Virtualization Suite, select Enable certificate. In this case,
identity authentication can be performed on the FusionSphere virtualization suite to prevent the suite
against forgery when PCS communicates with the FusionSphere virtualization suite.
For details about how to obtain the FusionSphere virtualization suite certificate and password, see
Operation and Maintenance > Maintenance Management in Single-Hypervisor Scenarios >
Security Management > FusionCompute Certificate Management > Exporting the VRM Root
Certificate.
After the source and target platforms are added successfully, the following is displayed.
To modify information, click Modify in the Operation column to modify the information, or
click Delete and add the information again.
----End
If multiple VMs need to be switched over and there are sufficient idle resources in the target
environment, multiple agent nodes can be deployed to improve switchover efficiency.
An agent supports a maximum of eight VMs to be concurrently switched. To support more VMs to be
concurrently, deploy multiple agents on different hosts and then perform the drill and switchover
operations.
Step 1 On the PCS management page, choose Cloud Platform Management > FC_KVM and click
Register VMs. On the Register VMs page, select an agent VM and click Register.
Step 2 On the PCS management page, choose Cloud Platform Management > FC_KVM >
Agents, and click Add Agent. On the Add Agent page, specify Name, set Type to Injection
driver, and select the name of the VM to be registered for VM. Then, click Confirm.
After an agent VM is added, the information about the registered agent VM is displayed on
the Agents page. You can click Modify to change the agent name and type. If an error occurs,
click Delete and add the agent again.
----End
7 System Configuration
Step 2 On the Service Configuration page, you can set Check critical items only or Check all
items for VM Switchover Pre-check Configuration and then click Confirm.
----End
----End
When the idle time exceeds the value, user logout occurs, and the user needs to log in to the system
again.
Step 3 In the displayed dialog box, click Confirm to complete the configuration.
----End
The Cloud Platform VM List page can be customized by site, cluster, and host.
A pre-check is performed automatically when the VM to be switched over is registered.
Step 2 If Major is displayed for Switchover Pre-check Result, click the VM name to go to the VM
details page. Then, click Switchover Pre-check to view the cause and rectify the fault based
on information in the Obstacle area. After the processing is complete, click Recheck.
If the obstacle items do not affect the drill or switchover, set Ignore to them on the System page.
----End
Step 3 Set the mapping between the source and target resources of the VM to be switched over.
Target Network: Select the network used by the VM to be switched on the target
platform.
Drill Network: Select the network used by the VM to be switched on the target platform
during the drill.
The information about the VM to be switched over, target compute resources, target network,
and drill network is displayed.
To modify the target resource of a VM, locate the row that contains the VM and click
Modify Target Resource.
To modify target resources of multiple VMs, select multiple VMs and click Batch
Modify Target Resources.
Step 6 After confirming that the switchover task information is correct, click Confirm to create the
switchover task.
Step 7 For risk VMs, you need to eliminate the risks on the source platform and then perform a
check again.
Alternatively, choose System > System Configuration > Switchover Obstacle
Management, select Ignore for Handling Action (Drill) and Handling Action (Switchover)
for the risk item and then click Confirm.
Step 8 In the switchover task, click the VM name. Under Basic Information, click Switchover Pre-
check and then click Recheck to check the VM again. If the message "the check result is
normal" is displayed, the operation is successful.
----End
Step 3 Click Drill in the Operation column. On the displayed page, select the VM to be drilled and
click Confirm. On the displayed page, click Confirm to start the drill.
Step 4 Click the arrow next to the task plan to view the drill progress and result of each VM.
Step 5 Choose VM Switchover > Switchover Task to view the execution result of each task.
If Succeeded is displayed in the Status column, the VM can be running on the target platform. You can
perform service check for the VM.
An agent supports a maximum of eight VMs to be concurrently. To support more VMs to be
concurrently switched, deploy multiple agents on different hosts and then perform the drill and
switchover operations.
Step 6 Click the arrow next to the task plan to expand the plan. Locate the row that contains the drill
VM whose status is Succeeded, click Drill. On the displayed Drill page, select End Drill,
select the VM for which drill has been completed, and click Confirm.
The data generated during VM drill is deleted.
Step 7 Choose VM Switchover > Switchover Plan to view the end drill status.
----End
Step 3 Choose VM Switchover > Switchover Task to view the execution result of each task.
----End
If an exception occurs on the VM that is switched to the target platform, roll back the VM.
Step 1 Locate the row that contains the VM to be rolled back, click More in the Operation column,
and select Rollback. Then, click Confirm in the dialog box that is displayed to start the
rollback operation.
Step 2 Choose VM Switchover > Switchover Task to view the execution result of the rollback task.
----End
When removing the last host from a data store, you can select only Thoroughly Delete. If dual-site
management is configured, data in the data store is not affected. If the VRM is deployed on a VM,
switch over all service VMs on the host where the VRM is located and the host is not processed. If
the KVM resources are insufficient, stop some service VMs and then switch over the service VMs.
If the VRM is deployed on physical servers, switch over all service VMs on all hosts, and the VRM
nodes are not processed. If the KVM resources are insufficient, stop some service VMs and then
switch over them.
Step 2 Install the FusionCompute 6.5.0 system in the host removed from the Xen platform by
following "Installing Hosts Using an ISO Image" in FusionSphere Virtualization Suite 6.5.0
Product Documentation, and add the host to the target platform by following "Adding Hosts"
----End
9 Operations After Finish Confirmation
To stop or delete PCS controller and agent nodes, ensure that all switchover tasks are carried out
successfully.
After the stop or deleting operations, rollback cannot be performed for VMs that are subjected to the
switchover.
For details, see "Disassociating a Storage Resource from a Host" in Batches in the
FusionSphere V100R006C10 Product Documentation xx (Server Virtualization).
If the data store is FC SAN, log in to the FC SAN management page and remove the initiator associated
with the host.
Step 3 On the FusionCompute web client of the Xen platform, choose Resource Pools > Storage. In
the Storage Device tab, click Scan, and select the host from which the storage device is
disassociated to perform the scan, and click OK.
In the dialog box that is displayed, click OK. After the scan is complete, no shared storage
device is available on the host.
----End
----End
----End
9.3.1 Conversion By VM
Step 1 Log in to the FusionCompute 6.5.0 web client, choose Resource Pools > VM, and then click
Advanced Search, select VHD for Disk Format, and click Search.
VMs that have VHD disks are displayed.
Step 2 Locate the target VM, click More in the Operation column, and choose Convert Format.
Alternately, select multiple VMs, click Convert Format in the Operation column.
----End
----End
----End
Step 2 Download the software digital signature validation tool (PGP Verify) from the following link:
http://support.huawei.com/enterprise/toolsinfo?idAbsPath=0602_ROOT|
8221819&pid=8221819&show=showServiceDetail&versionid=TV1000000014
Step 3 Verify the software package integrity by referring to the OpenPGP Signature Verification
Guide.
----End
PCS login account Username: admin Has the rights of the Change the default
Password: system administrator. password upon
IaaS@PORTAL- the first login.
CLOUD9! If you enter
incorrect
passwords for
three consecutive
times, the
account will be
locked for five
minutes.
OS account Username: gandalf Has the rights of a If you enter
Password: common OS user. incorrect passwords
IaaS@OS- for three consecutive
CLOUD9! times, the account
will be locked for
five minutes.
OS account Username: root Has the OS If you enter
Template import: administrator rights. incorrect passwords
IaaS@OS- for three consecutive
CLOUD8! times, the account
will be locked for
five minutes.
Common user Username: pcsuser Has the permission to If the password is
account of the Password: log in to and operate entered incorrectly
controller node SingleLOUD!1 the Gauss database. for five consecutive
database Database: pcs times, the account
When you connect will be locked for
to the database by five minutes.
running the psql
command, enter the
database password
in interactive mode.
Otherwise, the
database password
theft may be caused.
Controller node Username: postgres This account is the The account will not
database Password: super administrator in be locked if an
administrator cloudos@123 the database and can incorrect password
account be used to create a is entered.
database and user
account, and back up
data.
Prerequisites
Conditions
An application, such as PuTTY, which can be used for remote access on various
platforms is available.
You have obtained the management IP address of the node.
You have obtained the passwords of user root and user gandalf for logging in to the
node.
The default password of user gandalf is IaaS@OS-CLOUD9!, and the default password of user root is
IaaS@OS-CLOUD8!.
Procedure
Step 1 Use PuTTY to log in to the OS of the node.
Ensure that the management IP address and username gandalf are used to establish the
connection.
The system supports the login authentication using a password or private-public key pair. If
you use a private-public key pair to authenticate the login, see section 10.9"Using PuTTY to
Log In to a Node in Key Pair Authentication Mode."
Step 2 Run the following command and enter the password of user root to switch to user root:
su - root
Step 3 Run the following command to disable user logout upon system timeout:
TMOUT=0
Step 4 Run the following command to change the password of user root:
passwd
The following information is displayed:
Changing password for user root.
Changing password for root.
(current) UNIX password:
If the following information is displayed, this password cannot be used and you must enter
another one:
BAD PASSWORD: ...
----End
Prerequisites
Conditions
You have obtained the management IP address of the node and the password of user
gandalf.
An application, such as PuTTY, which can be used for remote access on various
platforms is available.
Procedure
Step 1 Use PuTTY to log in to the OS of the node as user gandalf.
passwd
The following information is displayed:
Changing password for user gandalf.
Changing password for gandalf.
(current) UNIX password:
If the following information is displayed, this password cannot be used and you must enter
another one:
BAD PASSWORD: ...
Step 5 Enter the new password again and press Enter.
----End
Prerequisites
Conditions
You have logged in to PCS using the account to be changed.
Procedure
Step 1 In the upper right corner of PCS, click the name of the current login user.
The new password must meet the requirements in the following table.
Prerequisites
You have obtained the private key certificate matching the public key certificate.
You have obtained the password of the private key certificate if the private key certificate is
an encrypted certificate.
To obtain the default private key certificate, visit the following websites:
For enterprises: Visit http://support.huawei.com/enterprise and choose Support >
Software Download > Cloud Computing > FusionSphere Virtualization Suite >
FusionCompute > FusionCompute 6.5.0.
For carriers: Visit http://support.huawei.com and choose Support > Software > Carrier
IT > Cloud Computing > FusionCloud > FusionSphere > FusionCompute >
FusionCompute 6.5.0.
Procedure
Step 1 Check whether PuTTY on the local PC has been used to log in to a node in key pair
authentication mode.
If yes, go to Step 7.
If no or you cannot confirm, go to Step 2.
Step 2 Run PuTTY and enter the IP address of the target node and the SSH port number (default
value: 22).
Step 3 In the Category area in the left pane, choose Connection > SSH > Auth.
The SSH authentication configuration page is displayed.
Step 4 Click Browse, select the prepared private key certificate in the displayed window, and click
Open.
The file name extension of the private key certificate is *.ppk. Contact the administrator to
obtain the private key certificate.
The following figure shows the SSH authentication configuration page.
Step 9 Enter the username for logging in to the target node as prompted.
If the private key certificate is an encrypted certificate, enter the password of the private key
certificate as prompted.
The default private key certificate delivered with the version release is an encrypted
certificate, and its default password is Huawei@CLOUD8!.
----End
If the controller node is installed again due to a fault, restore the data by performing operations
starting from Step 9.
Prerequisites
Conditions
The required backup file is available on the controller node or a third-party backup
server.
A local PC is available to access the controller node.
You have obtained the IP addresses and the root user password of controller nodes .
The system is running properly.
The following conditions are met if the files backed up on the third-party server are used
to restore data:
− The local PC communicates with the third-party backup server properly.
− You have obtained the IP address of the third-party backup server.
− If the third-party backup server uses a Windows operating system (OS), you have
obtained the OS login username and password. If the backup server uses a Linux OS,
you have obtained the password of user root.
− The FTPS Server application is installed on the third-party backup server.
Procedure
Back up the data on the abnormal controller node.
Step 1 Use PuTTY to log in to the controller node.
Ensure that the management plane IP address and username gandalf are used to establish the
connection.
The system supports the login authentication using a password or private-public key pair. If
you use a private-public key pair to authenticate the login, see section 10.9"Using PuTTY to
Log In to a Node in Key Pair Authentication Mode."
Step 2 Run the following command and enter the password of user root to switch to user root:
su - root
Step 3 Run the following command to disable user logout upon system timeout:
TMOUT=0
Step 4 Run the following command to back up the data:
cronBackupUpload
The backup path is /var/backup/.
Copy the required backup file to the controller node.
Step 5 Run the following command to check whether any directory containing backup files is
available on the controller node:
ll Directory containing backup files
The directory is:
/var/backup/ for automatic backup files
/var/backup/month/ for automatic monthly backup files
The data automatically backed up each month is stored only in the /var/backup/month directory.
No directory containing backup files is available on the controller node if the following
information is displayed:
ls: cannot access /var/backup/: No such file or directory
The directory containing backup files is available on the controller node and this directory
contains backup data if information similar to the following is displayed:
total 4
drwx------ 4 root root 4096 May 27 17:56 2013-05-27_0000000001
Step 6 Based on the command output in Step 5, check whether any directory containing backup files
is available on the controller node and the directory contains required backup data.
If yes, go to Step 7.
If no, go to Error: Reference source not found.
Step 7 Run the following command to switch to the directory containing backup files on the
controller node:
cd Directory containing backup files
The directory is:
/var/backup/ for automatic backup files
/var/backup/month/ for automatic monthly backup files
Step 8 Run the following command to copy the required backup file to the /home/GalaX8800
directory on the controller node:
cp -r YYYY-MM-DD_sn /home/GalaX8800
YYYY-MM-DD indicates the date when backup is performed, and sn indicates the serial
number of the backup file.
Go to Step 14 after this step.
Step 9 Check the type of the OS used by the third-party backup server.
If the third-party backup server runs the Windows OS, go to Step 10.
If the third-party backup server runs the Linux OS, go to Step 12.
Contact the backup server administrator to perform operations on the third-party server if required.
Step 10 Log in to the third-party backup server over a remote desktop connection.
Step 11 Copy the required backup file from the third-party backup server to the local PC.
Ensure that the management IP address of the controller node is used for logging in to the controller
node.
Step 14 Use PuTTY to log in to the controller node and switch to user root.
Ensure that username gandalf and the management IP address of the controller node are used
to establish the connection.
The system supports the login authentication using a password or private-public key pair. If
you use a private-public key pair to authenticate the login, see section 10.9"Using PuTTY to
Log In to a Node in Key Pair Authentication Mode."
Step 15 Run the following command to restore configuration data of the controller node:
Step 16 Run the following command to restore data in the database of the controller node:
Step 17 Use PuTTY to log in to the controller node and run the following command to check the
software monitoring process status until the process stays in the running state:
service had query
The software monitoring process is in the running state if the following information is
displayed:
NODE ROLE PHASE RESS VER START
-------------------------------------------------------------------------------------------
-------------
----End
Procedure
Principles and Preparations
VM
VM
PortGroup:PG200
PortGroup:TestSubnetPG
VLAN:200
VLAN:200 PCS migration
subnet:192.168.20.0/24
subnet:192.168.20.0/24
after switch:192.168.20.3
Dynamic IP:192.168.20.3
after restart:192.168.20.3
On the Xen platform, if a port group of the subnet type is selected during VM deployment, the
VM can obtain the dynamic IP address from the DHCP service provided by VRM. However,
VRM on the KVM platform does not provide the DHCP service and the platform does not
support the port group of the subnet type. To use the original IP address and avoid a failure of
binding to the IP address after the switch, perform the following operation while the network
resource allocation as shown in the preceding figure is used as an example:
Ensure that the source and destination port groups use the same VLAN.
Create a DHCP server on the KVM platform.
Obtain the password of the switch where the gateway corresponding to VLAN 200
(switch network VLAN) locates.
Allow packets carrying VLANs for VMs and DHCP servers to pass the KVM platform.
Configure the new DHCP server on the Xen platform based on configuration files on the
original VRM.
− DHCP server configuration file: /etc/galax/dhcp_conf/nrm-dhcp.conf
− DHCP lease file: /etc/galax/dhcp/nrm-dhcp.leases
As the DHCP servers on the two platforms are different in the version, only configuration file
copy may cause abnormal DHCP service. You need to configure the new DHCP server as
required.
Assume that in the nrm-dhcp.conf file, the following configuration is set and the information
in green indicates the subnet on which the ports to be switched over locate.
shared-network nrm {
subnet 192.168.20.0 netmask 255.255.255.0{
option subnet-mask 255.255.255.0;
option routers 192.168.20.1;
}
}
Use DHCP 4.2.5 server running CentOS 7 is used as an example. Configure
etc/dhcp/dhcp.conf based on the preceding information in green.
subnet 192.168.20.0 netmask 255.255.255.0{
range 192.168.20.100 192.168.20.110;
#option subnet-mask 255.255.255.0;
option routers 192.168.20.1;
}
As the configuration files have different formats, the configuration file for the new DHCP server does
not contain the shared-network nrm field, but has the range field added. If you just copy the original
configuration file, an error message "no free leases" is reported. For details about the configuration file
format, see the DHCP server specification configuration requirements.
If the leases configuration file of the new DHCP server has the fixed address corresponding to the MAC
address, ignore the NIC. Before the switch, ensure that there is no NIC whose MAC address is the same
as that on the source platform, thus avoiding a switch failure.
Procedure
Step 1 Switch the VM with the IP address of 192.168.20.3 using PCS and confirm that the switch is
successful.
Step 2 Start the VM on the target platform.
As VLAN 200 is still used, you can obtain the old IP address through the DHCP service of the
original VRM. If the IP address cannot be obtained, check the DHCP status in the
/var/log/message file on the VRM (Xen).
If a message "no free lease" is displayed, add the range field to the config file.
If the DHCP service is normal, the VM IP address is still 192.168.20.3.
Step 2 After all VMs using port groups in TestSubnetPG are switched on the Xen platform, the
original DHCP server is to be deleted. Before the deletion, configure the DHCP relay on the
switch where the gateway corresponding to the VLAN locates.
The following uses Huawei switch as an example.
[~Kernel_IDF]display this
#
interface Vlanif2304
ip address 192.168.20.1 255.255.255.0
dhcp select relay
dhcp relay binding server ip 192.168.30.100
#
Return
Step 3 Start the DHCP service on the KVM platform based on the prepared configuration and lease
files.
Step 4 Restart the NIC and check whether its dynamic IP address can be obtained.
----End
----End
Performing the Switchover of eBackup Management VMs
Switch OceanStor BCManager eBackup management VMs from FusionCompute
V100R006C10SPH108 to the FusionSphere virtualization suite 6.5.0 platform by performing
the operations provided in section 8"VM Drill and Switchover."
----End
----End
Creating a Protected Set and Backup Plan for the Target Protected Environment
If the backup VM that is switched to the FusionSphere virtualization suite 6.5.0 platform
is the first VM in the protected set, perform Step 1.
If the backup VM that is switched to the FusionSphere virtualization suite 6.5.0 platform
is not the first VM in the protected set, perform Step 3.
Step 1 Create a protected set for the protected environments on the FusionSphere virtualization suite
6.5.0 platform based on the procedure for creating that on FusionCompute
V100R006C10SPH108. Add the VMs switched to the target platform to the created protected
set. For details, see section "User Guide" > "Virtual Backup" > "Backup" > "Creating a
Protected Set" in OceanStor BCManager eBackup Product Documentation.
Step 2 Use the created protected set and backup policies in the original backup plan to create the
backup plan for the protected environments on the FusionSphere virtualization suite 6.5.0
platform based on the procedure for creating that on FusionCompute V100R006C10SPH108.
For details, see section "User Guide" > "Virtual Backup" > "Backup" > "Creating a Backup
Plan" in OceanStor BCManager eBackup Product Documentation.
After this step is performed, no further action is required.
Step 3 Scan the protected environments on the target platform to detect VMs switched to the
FusionSphere virtualization suite 6.5.0 platform. For details, see section "User Guide" >
"Virtual Backup" > "Backup" > "Configuring Production Storage" > "Adding a FusionSphere
Protected Environment" in OceanStor BCManager eBackup Product Documentation.
Step 4 Modify the protected set and add VMs switched to the FusionSphere virtualization suite 6.5.0
platform to the protected set. For details, see section "User Guide" > "Managing Backup and
Restore" > "Protected Set Management" in OceanStor BCManager eBackup Product
Documentation.
----End
To avoid account conflict, you need to create an account for dual-site management
configuration. In the separation of roles scenarios:
Log in to the system as user sysadmin and choose System > Rights Management > User Management
to create an interconnection account.
Log in to the system as user secadmin, and choose System > Rights Management > User
Management. Locate the target user, click More in the Operation column, and select Activate User.
In the displayed page, select System administrator for User Type and sysadmin for Subrole and then
click Confirm.
Prerequisites
Conditions
You have obtained the root certificate, certificate file, and private key file from the third-
party Certificate Authority (CA).
You have obtained PuTTY.
You have obtained WinSCP.
You have obtained the management IP address of the controller node and agent node of
the certificate to be replaced and the passwords of the gandalf user and root user.
Procedure
Check certificate files on the agent nodes.
Step 1 Use PuTTY to log in to the Agent nodes one by one.
Ensure that the management IP address and username gandalf are used to establish the
connection.
Step 2 Run the following command and enter the password of user root to switch to user root:
su – root
Step 3 Run the following command to disable user logout upon system timeout:
TMOUT=0
Step 4 Run the following commands to switch to the directory that contains the certificates:
cd /opt/cloudos/pcs/agent/certs/
ll
Information similar to the following is displayed:
total 12
In the preceding command output, ca.crt indicates the root certificate, and agent.crt indicates
the server's certificate file, and agent.key indicates the server's private key file.
The new certificate files should be placed in the directory the same as that containing original ones. If
the newly replaced certificate has the same name as the original certificate, you need to back up the
original certificate.
If you have changed the certificate filename, accordingly change it in the configuration file by following
steps provided in (Optional) Modify the configuration file of the agent node.
The default password is FusionSphere123. If you have changed the password of private key file,
accordingly change it in the configuration file by following steps provided in (Optional) Modify the
configuration file of the agent node.
Ensure that the management IP address and username gandalf are used to establish the
connection.
Step 9 Run the following command and enter the password of user root to switch to user root:
su - root
Step 10 Run the following command to disable user logout upon system timeout:
TMOUT=0
Step 11 Run the following commands to switch to the directory that contains the certificates:
cd /opt/cloudos/pcs/controller/conf
ll
Information similar to the following is displayed:
total 208
In the preceding command output, PcsTrustKeyStore.jks indicates the root certificate, and
PcsClientKeyStore.p12 indicates the certificate file.
The new certificate files should be placed in the directory the same as that containing original ones. If
the newly replaced certificate has the same name as the original certificate, you need to back up the
original certificate.
If you have changed the certificate filename, accordingly change it in the configuration file by following
steps provided in (Optional) Modify the configuration file of the controller node.
cd /home/Galax8800
Step 14 Run the following command to generate client's certificate files (.pkcs12):
openssl pkcs12 –export –in Client's certificate file name –inkey Client's private key file
name –passin pass: Obtained client's certificate encryption password –out Name of the
client's certificate file (.pkcs12) to be generated –passout pass: Password of the client's
certificate file (.pkcs12) to be generated
For example, if the client's certificate file is agent.crt, client's private key file is agent.key,
the client's certificate encryption password and the password of the client's certificate file
(.pkcs12) to be generated are all FusionSphere123, and the client's certificate file (.pkcs12) to
be generated is PcsClientKeyStore.p12, run the following command:
openssl pkcs12 –export –in agent.crt –inkey agent.key –passin pass:FusionSphere123 –out
PcsClientKeyStore.p12 –passout pass:FusionSphere123
Step 15 Run the following command to generate the truststore certificate (.jks):
keytool –import –alias rootCA –file Root certificate file name –keystore Name of the
trustkeystore file(.jks) to be generated
For example, if the root certificate file is ca.crt, and the truststore certificate file (.jks) to be
generated is PcsTrustKeyStore.jks, run the following command:
keytool –import –alias rootCA –file ca.crt –keystore PcsTrustKeyStore.jks
Step 16 As prompted, enter the user-defined client's truststore password.
The default password is FusionSphere123. If you have changed the truststore password, accordingly
change it in the configuration file by following steps provided in (Optional) Modify the configuration
file of the controller node.
The passwords of client's keystore and client's truststore must be the same.
Step 19 The truststore certificate (.jks) has been generated if the following information is displayed:
cd /opt/cloudos/pcs/controller/conf
rm PcsClientKeyStore.p12 PcsTrustKeyStore.jks
Step 21 Run the following commands to import certificate file.
su – root
Step 25 Run the following command to disable user logout upon system timeout:
TMOUT=0
Step 26 If you need to modify the private key password, go to Step 27. Otherwise, go to Step 31.
kmctool –e
Step 28 As prompted, enter the plaintext to be encrypted and press Enter to generate the encrypted
information.
please input password:
The encrypted information has been generated if the following information is displayed.
Where cipherLen indicates the ciphertext length and cipher indicates the encrypted
ciphertext.
FS_KMC_Encrypt success.
cipherLen=[216]
cipher=[AAAAAQAAAAEAAAAAAAAABQAAAAEAAAABEoKhjHVc/5+WP2Mij7mO
FLVN4HB4bBZbBW+5q4+0J/wAAAAQAAAAAAAAAACsxdxm4hxDymyfhnF7TxH4AA
AAAQAAAAAAAAgEAAAAAQAAAAEgZKuX79jh3HOKCu+WhRLUAAAAAAAAAA
BU32Iet4WHptpa3MZoLkP5D0u72/80I1yioVLk9uf8Yg==]
Step 29 Run the following command to open the agent.conf configuration file using the vi editor:
vi /opt/cloudos/pcs/agent/conf/agent.conf
Press i to enter the editing mode.
Change the ssl.agent.key.passwd value in the configuration file.
Change the ssl.agent.key.passwd value to the ciphertext noted down in Step 28. The changed
configuration file is as follows:
ssl.agent.key.passwd=AAAAAQAAAAEAAAAAAAAABQAAAAEAAAABEoKhjHVc/5+
WP2Mij7mOFLVN4HB4bBZbBW+5q4+0J/wAAAAQAAAAAAAAAACsxdxm4hxDymyfh
nF7TxH4AAAAAQAAAAAAAAgEAAAAAQAAAAEgZKuX79jh3HOKCu+WhRLUAAA
AAAAAAABU32Iet4WHptpa3MZoLkP5D0u72/80I1yioVLk9uf8Yg==
Step 30 Press Esc and enter :wq to save the configuration and exit the vi editor.
Step 31 If you need to modify root certificate filename or file path, go to step Step 32. Otherwise, go
to Step 34.
Step 32 Run the following command to open the agent.conf configuration file using the vi editor:
vi /opt/cloudos/pcs/agent/conf/agent.conf
Press i to enter the editing mode.
Change the ssl.ca.cert.path value to the latest root certificate path and file name.
Step 33 Press Esc and enter :wq to save the configuration and exit the vi editor.
Step 34 If you need to modify certificate filename or file path, go to Step 35. Otherwise, go to Step
37.
Step 35 Run the following command to open the agent.conf configuration file using the vi editor:
vi /opt/cloudos/pcs/agent/conf/agent.conf
Press i to enter the editing mode.
Change the ssl.agent.cert.path value to the latest server certificate path and file name.
Step 36 Press Esc and enter :wq to save the configuration and exit the vi editor.
Step 37 If you need to modify certificate filename or file path, go to Step 38. Otherwise, go to Step
40.
Step 38 Run the following command to open the agent.conf configuration file using the vi editor:
vi /opt/cloudos/pcs/agent/conf/agent.conf
Press i to enter the editing mode.
Change the ssl.agent.key.path value to the latest root certificate path and file name.
Step 39 Press Esc and enter :wq to save the configuration and exit the vi editor.
Ensure that the management IP address and username gandalf are used to establish the
connection.
Step 42 Run the following command and enter the password of user root to switch to user root:
su – root
Step 43 Run the following command to disable user logout upon system timeout:
TMOUT=0
Step 44 If you need to modify the certificate access password, go to Step 45. Otherwise, go to Step 49.
kmctool –e
Step 46 As prompted, enter the plaintext to be encrypted and press Enter to generate the encrypted
information.
please input password:
The encrypted information has been generated if the following information is displayed.
Where cipherLen indicates the ciphertext length and cipher indicates the encrypted
ciphertext.
FS_KMC_Encrypt success.
cipherLen=[216]
cipher=[AAAAAQAAAAEAAAAAAAAABQAAAAEAAAABEoKhjHVc/5+WP2Mij7mO
FLVN4HB4bBZbBW+5q4+0J/wAAAAQAAAAAAAAAACsxdxm4hxDymyfhnF7TxH4AA
AAAQAAAAAAAAgEAAAAAQAAAAEgZKuX79jh3HOKCu+WhRLUAAAAAAAAAA
BU32Iet4WHptpa3MZoLkP5D0u72/80I1yioVLk9uf8Yg==]
Step 47 Run the following command to open the PcsAgentConfig.conf configuration file using the vi
editor:
vi /opt/cloudos/pcs/controller/apps/pcs-website/WEB-
INF/classes/conf/PcsAgentConfig.conf
Press i to enter the editing mode.
Change the keystorepassword value in the configuration file.
Change the keystorepassword value to the ciphertext noted down in Step 46. The changed
configuration file is as follows:
keystorepassword=AAAAAQAAAAEAAAAAAAAABQAAAAEAAAABEoKhjHVc/5+W
P2Mij7mOFLVN4HB4bBZbBW+5q4+0J/wAAAAQAAAAAAAAAACsxdxm4hxDymyfhn
F7TxH4AAAAAQAAAAAAAAgEAAAAAQAAAAEgZKuX79jh3HOKCu+WhRLUAAA
AAAAAAABU32Iet4WHptpa3MZoLkP5D0u72/80I1yioVLk9uf8Yg==
Step 48 Press Esc and enter :wq to save the configuration and exit the vi editor.
Step 49 If you need to modify truststore certificate file (.jks) filename or file path, go to Step 50.
Otherwise, go to Step 52.
Step 50 Run the following command to open the PcsAgentConfig.conf configuration file using the vi
editor:
vi /opt/cloudos/pcs/controller/apps/pcs-website/WEB-
INF/classes/conf/PcsAgentConfig.conf
Press i to enter the editing mode.
Change the trustkeystore value in the configuration file.
Change the trustkeystore value to the latest truststore certificate file (.jks) path and filename.
Step 51 Press Esc and enter :wq to save the configuration and exit the vi editor.
Step 52 If you need to modify keystore certificate file (.p12) filename or file path, go to Step 53.
Otherwise, go to Step 55.
Step 53 Run the following command to open the PcsAgentConfig.conf configuration file using the vi
editor:
vi /opt/cloudos/pcs/controller/apps/pcs-website/WEB-
INF/classes/conf/PcsAgentConfig.conf
Press i to enter the editing mode.
Change the clientkeystore value in the configuration file.
Change the clientkeystore value to the latest keystore certificate file (.p12) path and filename.
Step 54 Press Esc and enter :wq to save the configuration and exit the vi editor.
Prerequisites
Conditions
An application, such as PuTTY, which can be used for remote access on various
platforms is available.
You have obtained the management IP address of the controller node.
You have obtained the login passwords of user gandalf and user root.
You have obtained the current password of the Gauss database on the controller node.
The default passwords of users gandalf and root are IaaS@OS-CLOUD9! and IaaS@OS-CLOUD8!,
respectively.
Procedure
Step 1 Use PuTTY to log in to the controller node.
Ensure that the management IP address and username gandalf are used to establish the
connection.
The system supports the login authentication using a password or private-public key pair. If
you use a private-public key pair to authenticate the login, see section 10.9"Using PuTTY to
Log In to a Node in Key Pair Authentication Mode."
Step 2 Run the following command and enter the password of user root to switch to user root:
su - root
Step 3 Run the following command to disable logout on timeout:
TMOUT=0
Run the following command to change the Gauss database password:
sh /opt/galax/gms/common/modsysinfo/modifyPostgresPwd.sh
Step 4 Enter the old password and press Enter.
----End
Prerequisites
Conditions
An application, such as PuTTY, which can be used for remote access on various
platforms is available.
You have obtained the management and IP addresses of the controller node.
You have obtained the login passwords of user gandalf and user root.
You have obtained the current database password of the controller node.
The default passwords of users gandalf and root are IaaS@OS-CLOUD9! and IaaS@OS-CLOUD8!,
respectively.
Procedure
CAUTION
Do not attempt to interrupt the password change process by pressing Ctrl+C or Ctrl+Z.
Otherwise, service processes may fail to access the database, and service exceptions may
occur. If such an exception occurs, reset the password by performing the operations provided
in section 10.18"Resetting the Password for Accessing Common Services in GaussDB on the
Controller Node."
Ensure that the management plane floating IP address and username gandalf are used to
establish the connection.
Step 2 Run the following command and enter the password of user root to switch to user root:
su - root
Step 3 Run the following command to disable logout on timeout:
TMOUT=0
Step 4 Run the following command to change the database password of the Controller:
sh /opt/galax/gms/common/modsysinfo/modifyPcsDbPwd.sh
Step 5 Enter the old database password as prompted and press Enter.
Step 6 Enter a new database password based on requirements in the following table and press Enter.
Table 10.17.1.1.1.6.1.1.1 Password description
Parameter Description Example Value
The database password for the Controller node is changed if the following information is
displayed:
Result:Success
----End
Prerequisites
Conditions
An application, such as PuTTY, which can be used for remote access on various
platforms is available.
You have obtained the management and floating IP addresses of the controller node.
You have obtained the login passwords of user gandalf and user root.
You have obtained the current database password of the controller node.
The default passwords of users gandalf and root are IaaS@OS-CLOUD9! and IaaS@OS-
CLOUD8!, respectively.
Procedure
CAUTION
Do not attempt to interrupt the password change process by pressing Ctrl+C or Ctrl+Z.
Otherwise, service processes may fail to access the database, and service exceptions may
occur. If such an exception occurs, reset the password by performing the following operations.
If the exception persists after several retries, contact technical support.
Ensure that the management plane floating IP address and username gandalf are used to
establish the connection.
Step 2 Run the following command and enter the password of user root to switch to user root:
su - root
Step 3 Run the following command to disable user logout upon system timeout:
TMOUT=0
Step 4 Run the following command to reset the database password of the Controller node:
sh /opt/galax/gms/common/modsysinfo/modifyPcsDbPwd.sh reset
Step 5 Enter the administrator password as prompted and press Enter.
The default username of the administrator is postgres, and its default password is
cloudos@123.
Step 6 Enter a new database password based on requirements in the following table and press Enter.
Table 10.18.1.1.1.6.1.1.1 Password description
Parameter Description Example Value
The database password for the Controller node is reset if the following information is
displayed:
Result:success.
----End
11 Appendix 2 Troubleshooting
The physical CPU The CPU upper limit Delete the setting of the CPU
frequency of the configured for the source upper limit of the source VM
compute resource VM is greater than the and then perform a drill or
(cluster or host) number of CPUs of the switchover. After the switchover
selected by the target source VM multiplied by is complete, set a proper CPU
platform cannot meet the physical CPU frequency upper limit for the VM based on
the CPU upper limit of the target compute the physical CPU frequency of
configured for the resource (cluster or host). the target compute resource.
source VM.
The physical CPU The CPU reservation Delete the setting of the CPU
frequency of the configured for the source reservation of the source VM
compute resource VM is greater than the and then perform a drill or
(cluster or host) number of CPUs of the switchover. After the
selected by the target source VM multiplied by switchover is complete, set a
platform cannot meet the physical CPU frequency proper CPU reservation value
the requirements of of the target compute for the VM based on the
the CPU reservation resource (cluster or host). physical CPU frequency of the
configured for the target compute resource.
source VM.
Advanced Settings
The Windows OS has restrictions on the identification mechanism of NIC devices and NICs.
For details, see https://support.microsoft.com/en-gb/help/269155/error-message-when-you-
try-to-set-an-ip-address-on-a-network-adapter.
If the Windows template VM of the Xen type has a NIC before the switchover, VMs
provisioned by the template may have the following problems after the switchover:
The NIC name is Local Area Connection N, rather than Local Area Connection, where
N is a number.
When you rename the NIC Local Area Connection, a message similar to "Cannot
rename this connection. A connection with the name you specified already exists.
Specify a different name." is displayed on the Windows OS.
If a static IP address has been configured for a NIC on the Windows template VM on the
Xen platform, an error message "The IP address XXX.XXX.XXX.XXX you have
entered for this network adapter is already assigned to another adapter Name of adapter.
Name of adapter is hidden from the network and Dial-up Connections folder because it is
not physically in the computer or is a legacy adapter that is not working. If the same
address is assigned to both adapters and they become active, only one of them will use
this address. This may result in incorrect system configuration. Do you want to enter a
different IP address for this adapter in the list of IP addresses in the advanced dialog
box? "is displayed when you set the same static IP address for the VMs provisioned from
the template after the switchover. XX.XX.XX.XX indicates the IP address, and #N may be
empty or a number.
To avoid the preceding problems, perform the following steps:
Step 1 Go to the Windows CLI.
Step 4 In the Device Manager window, click View and then select Show hidden devices.
Step 5 Click Network adapters, and check whether network adapters Realtek RTL8139C+ Fast
Ethernet NIC and Xen Net Device Driver #N in the red boxes are displayed in the following
figure.
#N may be empty or a number, that is, multiple network adapters of Xen Net Device Driver
may exist.
Step 6 Right-click Realtek RTL8139C+ Fast Ethernet NIC and all network adapters of Xen Net
Device Driver, and then click Uninstall. In the displayed Confirm Device Uninstall dialog
box, click OK.
After the uninstallation is complete, the two types of devices are not displayed under
Network adapters in the Device Manager window.
Then, you can change the VM NIC name and network configuration as required. For example,
you can change Local Area Connection 3 to Local Area Connection and set the static IP
address that has been configured in the template for the network adapter.
----End
11.4 Agent status display for Abnormal
If the agent is registered before IP address of the controller node is modified, perform the
following operation on the agent node:
Step 1 Use PuTTY to log in to the active agent node as user gandalf, run the su - root command to
switch to user root, and run the TMOUT=0 command to disable user logout upon system
timeout.
Step 2 Run the sed -i 's/^controller-ip=.*/controller-ip=controller Floating IP address/g'
/opt/cloudos/pcs/agent/conf/controller.conf command to change the controller-ip to
controller Floating IP address.
Step 3 Run the service pcs-agent restart command on the agent node to restart the pcs-agent
process.
Step 4 Wait for 3 minutes and check whether the agent node is normal.
Procedure
Step 1 On PCS, choose VM Switchover > Switchover Task and check whether causes for the
injection task failure are as follows:
The Linux disk fails to be attached to the agent.
Failed to detach the disk from the agent, try to perform the operation again.
The injection tool fails to find the system root partition.
The injection tool fails to decompress the kernel file. The possible cause is that there is
not enough space in the partition where the kernel file is located.
Step 2 Execute the task again.
If the fault persists, go to Step 3.
If the task execution succeeds, no further action is required.
Step 3 On the Cloud Platform Management page of PCS, choose the target platform, view agent
information, and check whether the agent VM is in the normal status.
If no, go to Step 4.
If yes, contact technical support.
Step 4 Log in to FusionCompute where the agent VM resides, locate the agent VM, and restart the
VM, as shown in the following figure.
If the restart fails, go to Step 5.
If the restart succeeds, go to Step 6.
Step 5 Log in to FusionCompute where the agent VM resides, locate the agent VM, and forcibly
restart the VM, as shown in the following figure.
Step 6 On the Cloud Platform Management page of PCS, choose the target platform, view agent
information, and check whether the agent VM is in the normal status.
If yes, go to Step 7.
If no, contact technical support.
Step 7 Execute the task again.
If the task execution succeeds, no further action is required.
If the fault persists, contact technical support.
----End
Prerequisites
You have obtained the administrator account and password of the FusionCompute system.
You have obtained the IP address and name of the faulty controller node.
You have obtained the password of the admin user for logging in to the faulty PCS system.
Procedure
Step 1 Stop the faulty controller VMs by following the instructions provided in "Stopping a VM" in
FusionSphere Virtualization Suite 6.5.0 Product Documentation.
Step 2 Deploy a controller VM by following the instructions provided in "Creating a VM from a
Template" in FusionSphere Virtualization Suite 6.5.0 Product Documentation.
Before the installation, record the original IP address and node name of the faulty controller VM. During
the reinstallation, the information must be the same as the original IP address and node name.
Step 3 Restore the data of the third-party backup server on the controller node. For details, see
"10.10Restoring Data".
Step 4 After the restoration, log in to the PCS to check whether the services are normal and whether
the data is correct.
If yes, go to Step 5.
If no, contact technical support.
Step 5 Delete the faulty controller VM. For details, see section "Deleting a VM" in FusionSphere
Virtualization Suite 6.5.0 Product Documentation.
12 Appendix 3 Obstacle Item Description
This section describes all the obstacle items supported by PCS, impacts on the drill and
switchover, supported handling actions, and drill and operation suggestions.
Drill Suggestions
The drill aims to check whether the guest OS and services of the drill VM can be started
properly.
You are advised not to manually bind the drill VM to the physical CPU cores of the host. If
the drill VM must be bound to a core, you can set the binding on the KVM platform.
Switchover Suggestions
After a VM is switched to the KVM platform, if the VM must be bound to a core, you can set
the binding on the KVM platform.
12.2 VM Is Bound to Host
Obstacle Item Description
You can bind a VM to a host to run the VM on a specific host or use a specific peripheral on
the host. After a VM that is bound to a host on the Xen platform is switched over to the target
KVM platform, the VM is not automatically bound to the host.
Drill Suggestions
Switchover aims to check whether the guest OS and services of the drill VM can be properly
started.
You are advised not to manually bind the drill VM to the host. If the VM still needs to be
bound to a specific host, you can migrate the VM to the host through the KVM platform and
set the binding.
Switchover Suggestions
After a VM is switched to the KVM platform, if the VM still needs to be bound to a specific
host, you can migrate the VM to the host through the KVM platform and set the binding.
Drill Suggestions
The drill aims to check whether the guest OS and services of the VM can be properly started.
You are advised not to manually bind the drill VM to the host.
If the VM still needs to be bound to a specific host, you can migrate the VM to the host using
the KVM platform and bind the VM to the host. However, you cannot select Permanently
reserve resources for the VM for the VM.
Switchover Suggestions
After a VM is switched to the KVM platform, if the VM still needs to be bound to a specific
host, you can migrate the VM to the host using the KVM platform and bind the VM to the
host. However, you cannot select Permanently reserve resources for the VM for the VM.
12.4 VM Is a Template VM
Obstacle Item Description
A VM template can be used to implement quick VM deployment. PCS does not support VM
template drill because the VM template is in the shutdown state. You can switch over the VM
template directly. If the VM template is faulty after the switchover, you can perform rollback
on PCS.
Drill Suggestions
The drill aims to check whether the guest OS and services of the VM can be properly started.
You can switch over the VM template directly. If the VM template is faulty after the
switchover, you can perform rollback on PCS.
Switchover Suggestions
During the template VM switchover, the VM is a common VM on the KVM platform.
If the VM is normal, select Finish Confirmation to complete the switchover. PCS
automatically converts the VM to a template.
If the VM is abnormal, perform rollback on PCS to roll back the switchover process. PCS will
restore the Xen template VM to the state before the switchover.
Drill Suggestions
The drill aims to check whether the guest OS and services of the drill VM can be started
properly.
During the drill, PCS restricts the operation rights of the source VM, new snapshots cannot be
created for the source VM, and therefore, you are advised to ignore the obstacle item. During
the drill, PCS changes the Independent & persistent mode of the disk to the Dependent
mode temporarily.
Switchover Suggestions
During the switchover, PCS restricts the operation rights of the source VM, new snapshots
cannot be created for the source VM, and therefore, you are advised to ignore the obstacle
item. During the switchover, PCS changes the Independent & persistent mode of the disk to
the Dependent mode temporarily and restores the disk mode to the original mode after
confirmation.
Drill Suggestions
You are advised to perform the switchover by referring to the following "Switchover
Suggestions". If the VM is abnormal after the switchover, use the PCS rollback function.
Switchover Suggestions
The switchover is not supported.
First stop the VM, and change Independent & nonpersistent mode of the disk to Dependent
mode. Then perform the switchover. Once the switchover complete, change the disk mode
back on the target platform manually.
12.7 VMs that Use Shared Disks Are Not All Stopped
Obstacle Item Description
If a VM uses a shared disk, the VM cannot be subject to a drill, but can be subject to a
switchover. However, all VMs to which the shared disk is mounted must be shut down. In
addition, during the switchover, no snapshot is created for the shared disk, and data is directly
written to the shared disk. Therefore, after the rollback function of PCS is used to roll back
the VM using the shared disk, the data will be saved on the shared disk and cannot be rolled
back.
If the shared disk is on the RDM data store, that is, the shared disk is an RDM disk, the VM to
which the RDM shared disk is attached does not need to be shut down during the switchover.
However, data is written to the RDM disk during the switchover and cannot be rolled back.
If cluster services, such as Oracle RAC and MSCS, are running on a VM that uses a shared
disk, you are advised to use the capacity expansion capability at the service layer to perform
the switchover, thus avoiding the potential impact of disk controller changes on services after
the VM switchover.
Drill Suggestions
The drill is not supported.
Switchover Suggestions
If cluster services, such as Oracle RAC and MSCS, are running on a VM that uses a shared
disk, you are advised to use the capacity expansion capability at the service layer to perform
the switchover, thus avoiding the potential impact of disk controller changes on services after
the VM switchover.
If PCS is used for the switchover and the shared disk is an RDM disk, you can directly
perform the switchover. Otherwise, you need to shut down all the VMs to which the shared
disk is mounted and perform the switchover at the same time in a window.
Switchover Suggestions
Linked clone VMs cannot be directly switched.
Switch over a template that is used for provisioning linked clone VMs to the KVM platform
using PCS and then use the template to provision linked clone VMs after the template is
converted into the VHD format.
Drill Suggestions
The drill aims to check whether the guest OS and services of the drill VM can be started
properly.
You are advised to ignore the obstacle item. If the source DVD-ROM drive is required for the
drill, mount the DVD-ROM drive to the drill VM on the target KVM platform.
Switchover Suggestions
You are advised to ignore the obstacle item. If the source CD-ROM drive is required for the
switchover, mount the CD-ROM drive to the drill VM on the target KVM platform.
Drill Suggestions
The drill aims to check whether the guest OS and services of the drill VM can be started
properly. You are advised to ignore the obstacle item.
Switchover Suggestions
It is recommended that this item be ignored.
Drill Suggestions
The drill aims to check whether the guest OS and services of the drill VM can be started
properly.
You are advised to ignore the obstacle item. If the drill depends on the USB device but does
not strongly depend on the source USB device, you can bind the USB device of the target
KVM host to the drill VM.
If the drill VM is not on the target KVM host with USB devices, you can migrate the VM to
the target host.
Switchover Suggestions
It is recommended that this obstacle item be ignored. If a USB device is required for the
switchover, install the source USB device on the target KVM host where the VM to be
switched is located, or bind the USB device on the target KVM host to the VM to be
switched.
If the drill VM is not on the target KVM host with USB devices, you can migrate the VM to
the target host.
12.12 VM Is a DR VM
Obstacle Item Description
PCS does not support drill or switchover VMs whose DR feature was enabled.
Drill Suggestions
The drill is not supported.
Switchover Suggestions
The switchover is not supported.
Drill Suggestions
The drill is not supported.
Switchover Suggestions
Uninstall the GVM driver from the VM and perform the switchover. After the switchover is
complete, reconfigure the antivirus service by referring to FusionSphere product
documentation 6.5.0 (KVM).
Drill Suggestions
The drill is not supported.
Switchover Suggestions
The switchover is not supported.
Drill Suggestions
The drill is not supported.
Switchover Suggestions
After the switchover is complete, adjust the configuration by referring to the product
documentation 6.5.0 (KVM) and select a suitable vGPU or passthrough GPU device for the
VM.
Switchover Suggestions
Check whether VMs that are switched over to the KVM platform meet the requirements based
on the actual performance requirements of VM services. If the service requirements are met,
ignore the obstacle item and perform the switchover.
Drill Suggestions
On the source platform, change the storage mode used by the source VM to that supported by
PCS, namely, virtualized SAN storage, through storage migration. Then, you can perform the
drill.
Switchover Suggestions
On the source platform, change the storage mode used by the source VM to that supported by
PCS, namely, virtualized SAN storage, through storage migration. Then, you can perform the
switchover.
Drill Suggestions
On the source platform, change the storage mode used by the source VM to that supported by
PCS, namely, virtualized SAN storage, through storage migration. Then, you can perform the
drill.
Switchover Suggestions
On the source platform, change the storage mode used by the source VM to that supported by
PCS, namely, virtualized SAN storage, through storage migration. Then, you can perform the
switchover.
Drill Suggestions
The drill is not supported.
Switchover Suggestions
The switchover is not supported.
Drill Suggestions
On the source platform, change the storage mode used by the source VM to that supported by
PCS, namely, virtualized SAN storage, through storage migration. Then, you can perform the
drill.
Switchover Suggestions
On the source platform, change the storage mode used by the source VM to that supported by
PCS, namely, virtualized SAN storage, through storage migration. Then, you can perform the
switchover.
Drill Suggestions
Switch over the template used for provisioning the VM using the local RAM disk to the target
KVM platform and then provision VMs again on the KVM platform.
Switchover Suggestions
Switch over the template used for provisioning the VM using the local RAM disk to the target
KVM platform and then provision VMs again on the KVM platform.
12.22 VM Uses Virtualized Local Hard Disks
Obstacle Item Description
VMs that use virtualized local hard disks cannot be subject to the drill and switchover.
Drill Suggestions
On the source platform, change the storage mode used by the source VM to that supported by
PCS, namely, virtualized SAN storage, through storage migration. Then, you can perform the
drill.
Switchover Suggestions
On the source platform, change the storage mode used by the source VM to that supported by
PCS, namely, virtualized SAN storage, through storage migration. Then, you can perform the
switchover.
Switchover Suggestions
Before the switchover, plan a cluster with the HA function enabled. Then, you can switch over
the VMs with the HA function to be enabled to the cluster.
If the HA function cannot be enabled for the target cluster but must be enabled for the VM,
you can enable the HA function for the VM by setting the HA substitute item on the KVM
platform after the VM is switched to the KVM.
12.24 A Fault Handling Policy Is Set for the VM, but Not
Set for the Target Cluster, or Different Policies Are Set for
the VM and Cluster
Obstacle Item Description
After the source VM configured with the fault handling policy is switched to the target KVM
platform, the fault handling policy depends on the configuration of the target cluster.
Therefore, after the Xen VM configured with the fault handling policy is switched to the
cluster with different VM fault handling policies, the VM fault handling policy changes.
Drill Suggestions
The drill aims to check whether the guest OS and services of the drill VM can be started
properly. You are advised to ignore the obstacle item.
Switchover Suggestions
Plan a target KVM cluster that has the same fault handling policy as the source VM before the
switchover. Then, you can perform VM switchover.
If the target cluster cannot be configured with the same fault handling policy as the source
VM but the VM must use the original fault handling policy, you can configure the original
fault handling policy by setting the substitute item of the VM fault handling policy on the
KVM platform.
12.25 VM Has a VM Snapshot or Volume Snapshot
Obstacle Item Description
After a source VM with a VM snapshot or volume snapshot is switched to the KVM platform,
these snapshot points are invisible on the KVM platform, and VMs cannot be restored to these
points.
Drill Suggestions
The drill aims to check whether the guest OS and services of the drill VM can be started
properly. You are advised to ignore the obstacle item.
Switchover Suggestions
VM snapshots or volume snapshots affect VM I/O performance. Therefore, you are advised to
retain only important VM snapshots and volume snapshots before the switchover. If a fault
occurs during the switchover, rollback can be performed and these snapshots can be used for
restoration.
After the switchover, you are advised to use the format conversion function of the VM on the
KVM platform to combine the snapshot points created on the Xen platform before the
switchover to avoid the impact of these snapshot points on the VM I/O performance.
Drill Suggestions
Install Tools on the VM and ensure that Tools is running properly.
Switchover Suggestions
Install Tools on the VM and ensure that the VM is running properly. Alternatively, log in to
the VM, shut down the VM in graceful mode, and then perform the VM switchover.
Drill Suggestions
If a VM is in the transient state (for example, switching or creating), perform the drill after the
VM is in the running or stopped state. If a VM is in the hibernated state, you can wake up or
shut down the VM, change the VM to the running or stopped state, and then perform the drill.
Switchover Suggestions
If a VM is in the transient state (for example, switching or creating), perform the switchover
after the VM is in the running or stopped state. If a VM is in the hibernated state, you can
wake up or shut down the VM, change the VM to the running or stopped state, and then
perform the switchover.
12.28 VM Does Not Support Snapshot Creation Because
the Number of CPUs Exceeds 64
Obstacle Item Description
If the number of CPUs of a VM exceeds 64, snapshots cannot be created for the VM.
Therefore, PCS does not support the online drill for such VMs.
Drill Suggestions
The drill is not supported.
Switchover Suggestions
This obstacle item has no impacts on the switchover. PCS can be used to perform switchover.
Drill Suggestions
The drill cannot be performed directly.
When planning the target KVM resource pool, change its MAC address range to the one not
used by the Xen VM or template resource pool. If a VM or template with the same MAC
address as the Xen resource pool exists in the KVM resource pool, you are advised to change
the MAC address of the VM or template in the Xen resource pool or KVM resource pool
based on the site requirements. Ensure that no MAC address conflict occurs and then perform
the drill.
Switchover Suggestions
The switchover is not supported.
When planning the target KVM resource pool, you are advised to adjust its MAC address
range to the one not used by the Xen VM or template resource pool. If a VM or template with
the same MAC address as the Xen resource pool exists in the KVM resource pool, you are
advised to change the MAC address of the VM or template in the Xen resource pool or KVM
resource pool based on the site requirements. Ensure that no MAC address conflict occurs and
then perform the switchover.
Drill Suggestions
The drill cannot be performed directly.
Modify the information of the switchover plan to which the source VM belongs, select the
target network and target drill network for each NIC of the source VM, and perform the drill
again.
Switchover Suggestions
The switchover is not supported.
Modify the information of the switchover plan to which the source VM belongs, select the
target network and target drill network for each NIC of the source VM, and perform the
switchover again.
Drill Suggestions
This obstacle item has no impacts on the drill. You can use PCS to perform the drill.
Switchover Suggestions
You are advised to ignore the obstacle item and perform the switchover directly if the source
and target port group types are different in the plan. Otherwise, set the default action of this
obstacle item to Adjust VM Later so that you can identify the error target network in
advance before the switchover.
Drill Suggestions
The drill is not affected. You can use PCS to perform the drill.
Switchover Suggestions
You are advised to ignore the obstacle item and perform the switchover directly if the VLAN
IDs for source and target port groups are different in the plan. Otherwise, set the action of this
obstacle item to Adjust VM Later so that you can identify the error target network in
advance before the switchover.
In addition, even if the VLAN IDs of the source and target port groups are the same, the
configuration of the physical network may cause network disconnection. Therefore, you need
to ensure that the physical network is correctly configured.
Drill Suggestions
The drill is not affected. You can use PCS to perform the drill.
Switchover Suggestions
You are advised to ignore the obstacle item and perform the switchover directly if the VLAN
ranges for source and target port groups are different in the plan. Otherwise, set the default
action of this obstacle item to Adjust VM Later so that you can identify the error target
network in advance before the switchover.
In addition, even if the VLAN ranges of the source and target port groups are the same, the
configuration of the physical network may cause network disconnection. Therefore, you need
to ensure that the physical network is correctly configured.
Drill Suggestions
This obstacle item has no impacts on the drill. You can use PCS to perform the drill.
Switchover Suggestions
If the internal services of the VM do not depend on the TCP checksum, you are advised to
ignore the obstacle item and perform the switchover directly. Otherwise, set the default action
of this item to Adjust VM Later to identify that difference.
Drill Suggestions
This obstacle item has no impacts on the drill. You can use PCS to perform the drill.
Switchover Suggestions
If the VM does not depend on the binding between IP addresses and MAC addresses, you are
advised to ignore the obstacle item and perform the switchover directly. Otherwise, set the
default action of this item to Adjust VM Later to identify the binding configuration
difference in advance.
Drill Suggestions
This obstacle item has no impacts on the drill. You can use PCS to perform the drill.
Switchover Suggestions
If the VM does not depend on the DHCP isolation configuration, you are advised to ignore the
obstacle item and perform the switchover directly. Otherwise, set the default action of this
item to Adjust VM Later to identify the configuration difference in advance.
Drill Suggestions
This obstacle item has no impacts on the drill. You can use PCS to perform the drill.
Switchover Suggestions
If the VM does not depend on the IP/ARP broadcast suppression configuration, ignore the
obstacle item and perform the switchover directly. Otherwise, set the default action of this
item to Adjust VM Later to identify the configuration difference in advance.
Drill Suggestions
This obstacle item has no impacts on the drill. You can use PCS to perform the drill.
Switchover Suggestions
If the VM does not depend on the QoS (outbound and inbound traffic shaping) configuration,
you are advised to ignore the obstacle item and perform the switchover directly. Otherwise,
set the default action of this item to Adjust VM Later to identify the QoS configuration
difference in advance.
Drill Suggestions
This obstacle item has no impacts on the drill. You can use PCS to perform the drill.
Switchover Suggestions
If the VM does not strongly depend on the binding between IP addresses and MAC addresses,
you are advised to ignore the obstacle item and perform the switchover directly. Otherwise,
set the default action of this item to Adjust VM Later to identify the binding configuration in
advance.
12.40 Source Port Group Is of the Subnet Type
Obstacle Item Description
The source VM supports a subnet port group, and VRM manages and allocates NIC IP
addresses of VMs that use the subnet port group. As FusionSphere virtualization suite 6.5.0
(KVM) does not support this type of port group, IP addresses may fail to be assigned after the
switchover.
Drill Suggestions
The drill aims to check whether the guest OS and services of the drill VM can be started
properly. You are advised to ignore the obstacle item.
Switchover Suggestions
Based on the physical network plan of the target KVM platform, configure the DHCP relay on
the switch connected to the KVM platform and ensure that VRM of the source Xen platform
can be used as the DHCP server to allocate IP addresses after the switchover.
You can ignore the obstacle item and switch the VMs that use the subnet port group to the VM
groups that use common port group on the target KVM platform.
When all VMs that use subnet port groups on the source Xen platform are switched to the
target KVM platform, to bring the VRM node on the source platform offline, you need to
create an external DHCP server and configure it based on the DHCP configuration file
(/etc/galax/dhcp_conf/nrm-dhcp.conf on the VRM node) and lease file
(/etc/galax/dhcp/nrm-dhcp.leases on the VRM node).
For details, see 10.11"Switching VMs that Use the Port Group of the Subnet Type."
Drill Suggestions
The drill is not supported.
Switchover Suggestions
The switchover is not supported.
Drill Suggestions
The drill is not supported.
Switchover Suggestions
The switchover is not supported.
If the VM does not use the RDM disk, change the number of IDE disks in the source VM to
less than 25 and ensure that there is no IDE disk whose slot ID exceeds 25. Then, you can
perform the switchover. If RDM disks must be used, the switchover is not supported.
Drill Suggestions
The drill is not supported.
Switchover Suggestions
The switchover is not supported.
Drill Suggestions
The drill is not supported. The data store used by the source VM must be mounted to the
target KVM platform before the drill.
Switchover Suggestions
The switchover is not supported. The data store used by the source VM must be mounted to
the target KVM platform before the switchover.
Drill Suggestions
The drill is not supported. To perform the drill, change the CPU quota of the source VM to a
value supported by the target KVM platform.
Switchover Suggestions
The switchover is not supported. To perform the switchover, change the CPU quota of the
source VM to a value supported by the target KVM platform.
12.46 Maximum Number of Read or Write Bytes
Configured for the Source VM Disks Exceeds the Value
Range Supported by the Target Cloud Platform
Obstacle Item Description
The maximum number of read or write bytes configured for the source VM disk exceeds that
supported by FusionSphere virtualization suite 6.5.0 (KVM). If that happens, the drill and
switchover cannot be performed.
Drill Suggestions
The drill is not supported. To perform the drill, change the number of read or write bytes of
the source VM disk to a value supported by the target KVM platform.
Switchover Suggestions
The switchover is not supported. To perform the switchover, change the number of read or
write bytes of the source VM disk to a value supported by the target KVM platform.
Drill Suggestions
The drill aims to check whether the guest OS and services of the drill VM can be started
properly. You are advised to ignore the obstacle item.
Switchover Suggestions
You are advised to ignore the obstacle item.
On the target KVM platform, set a cluster with the same configuration about whether the
memory overcommitment is enabled as that of the Xen platform. For VMs whose the
configuration about whether memory overcommitment is enabled must be retained, switch
over them to the cluster that you set. For other VMs, switch over them to other clusters.
Drill Suggestions
The drill aims to check whether the guest OS and services of the drill VM can be started
properly. You are advised to ignore the obstacle item.
Switchover Suggestions
You are advised to ignore the obstacle item.
On the target KVM platform, set a cluster with the same configuration about whether HA is
enabled as that of the Xen platform. For VMs whose the configuration about whether HA is
enabled must be retained, switch over them to the cluster that you set. For other VMs, switch
over them to other clusters.
12.49 Configurations of Whether IMC Is Enabled Are
Different for the Source and Target Clusters
Obstacle Item Description
If the configurations about whether IMC is enabled are different for the source cluster and the
target cluster selected in the switchover plan, the CPU model may change after the
switchover.
Drill Suggestions
The drill aims to check whether the guest OS and services of the drill VM can be started
properly. You are advised to ignore the obstacle item.
Switchover Suggestions
If the VM internal services strongly depend on the specific CPU model, on the target KVM
platform, create a cluster with the same configuration about whether IMC is enabled as that of
the Xen platform and select the target cluster with the same configuration about whether IMC
is enabled for the VM.
Retain the default impact of the item so that you can identify the impact before the switchover
to avoid selecting an incorrect target cluster.
If VM internal services do not have strong dependency on specific CPU models, you are
advised to ignore the obstacle item and perform a switchover directly.
Drill Suggestions
The drill aims to check whether the guest OS and services of the drill VM can be started
properly. You are advised to ignore the obstacle item.
Switchover Suggestions
If the VM internal services strongly depend on the specific CPU model, create a cluster with
the same IMC configuration as the Xen platform on the target KVM platform and select the
target cluster with the same IMC configuration for the VM.
Retain the default impact of the item so that you can identify the impact before the switchover
to avoid selecting an incorrect target cluster.
If VM internal services do not have strong dependency on specific CPU models, you are
advised to ignore the obstacle item and perform a switchover directly.
Drill Suggestions
The drill is not supported. You need to use the target DVS of the same type as the source
DVS.
Switchover Suggestions
The switchover is not supported. You need to use the target DVS of the same type as the
source DVS.
Drill Suggestions
The drill aims to check whether the guest OS and services of the drill VM can be started
properly. You are advised to ignore the obstacle item.
Switchover Suggestions
You are advised to check whether services that strongly depend on the internal NUMA
topology exist in the guest NUMA VM. If the service cannot be modified, you are not advised
to perform VM switchover. Otherwise, you are advised to ignore the obstacle item and
perform VM switchover.
Drill Suggestions
The drill aims to check whether the guest OS and services of the drill VM can be started
properly. You are advised to ignore the obstacle item.
Switchover Suggestions
You are advised to ignore the obstacle item.
After the VM is switched to the KVM platform, reconfigure affinity and anti-affinity rules
based on the actual situation of hosts in the target KVM cluster.
Drill Suggestions
During the drill, you need to perform operations, such as creating and deleting a VM
snapshot, on the source VM. Before the drill, ensure that the operation permissions are not
disabled.
The drill aims to check whether the guest OS and services of the drill VM can be started
properly. You are advised to ignore the obstacle item.
Switchover Suggestions
During the switchover, you need to perform operations, such as powering off and powering
on, on the source VM. Before the switchover, ensure that the operation permissions are not
disabled.
You are advised to ignore the obstacle item. Before the switchover, record the operation
permissions that need to be disabled on the VM. After the VM is switched to the KVM
platform, reconfigure the object permissions of the VM.
Drill Suggestions
The drill is not supported.
Switchover Suggestions
The switchover is not supported.
Drill Suggestions
The drill is not supported.
Switchover Suggestions
The switchover is not supported.
Drill Suggestions
Before the drill, cancel the IOPS upper limit of the disk.
Switchover Suggestions
Before the switchover, cancel the IOPS upper limit of the disk.
Drill Suggestions
Delete the unimportant snapshots of the source VM and perform the drill.
Switchover Suggestions
Delete the unimportant snapshots of the source VM and then perform the switchover.
You can also perform the switchover directly.
Drill Suggestions
If cluster applications, such as Oracle RAC and MSCS, are running in the VM, you are
advised to perform the switchover by application. No drill or switchover is involved.
If PCS must be used for the drill, check the dependency of the service on the drive letter
or RDM disk slot ID in advance, set the handling action of the item to Ignore, and then
perform the drill.
Switchover Suggestions
If cluster applications, such as Oracle RAC and MSCS, are running in the VM, you are
advised to perform the switchover by application. No drill or switchover is involved.
If PCS must be used for the drill, check the dependency of the service on the drive letter
or RDM disk slot ID in advance, set the handling action of the item to Ignore, and then
perform the switchover.
Drill Suggestions
If the internal time of the VM depends on the periodic synchronization of the third-party
NTP server, ignore the obstacle item and perform the drill.
If the internal time of the VM is manually configured and is different from the host time,
check the impact of the time change on services. If the impact is acceptable, ignore the
obstacle item and perform the drill.
Switchover Suggestions
If the internal time of the VM depends on the periodic synchronization of the third-party
NTP server, ignore the obstacle item and perform the switchover.
If the internal time of the VM is manually configured and is different from the host time,
check the impact of the time change on services. If the impact is acceptable, ignore the
obstacle item and perform the switchover.
12.61 Network Configurations of the Drill Port Group
and Source Port Group May Conflict
Obstacle Item Description
During the drill of the source VM, the MAC address of the drill VM is the same as that of the
source VM. To avoid the impact of the drill VM on the source VM, the NIC of the drill VM is
added to the specified drill port group. If the VLAN ranges configured for the drill port group
and source port group overlap, the drill VM may affect the network of the source VM.
Drill Suggestions
If the VLAN ranges configured for the drill port group and source port group overlap and this
has no impacts on the source VM, ignore the obstacle item and perform the drill.
In addition, even if the VLAN ranges configured for the drill port group and source port group
do not overlap, the drill port group and source port group may belong to the same Layer 2
physical network due to the physical network configuration, and as a result, the source VM is
affected during the drill. For example, VLAN 0 is configured for the source port group and
VLAN 100 for the drill port group. However, the physical switch connected to the host where
the source VM is located incorrectly sets VLAN 100 of the drill port group to untagged.
Therefore, you need to ensure that the physical network is correctly configured, rather than
completely depending on the pre-check of the item.
Switchover Suggestions
This obstacle item has no impact on the switchover, and the switchover can be performed.
Drill Suggestions
Online drill cannot be performed.
Switchover Suggestions
This obstacle item has no impacts on the switchover. You can perform the switchover.
Drill Suggestions
The source VM has been deleted and no drill is required. You are advised to delete the VM
from PCS.
Switchover Suggestions
The source VM has been deleted and no switchover is required. You are advised to delete the
VM from PCS.
Drill Suggestions
Modify the switchover plan to which the VM is added, select target compute resources for the
VM, and perform the drill.
Switchover Suggestions
Modify the switchover plan to which the VM is added, select target compute resources for the
VM, and perform the switchover.
Drill Suggestions
The drill cannot be performed.
Switchover Suggestions
This obstacle item has no impacts on the switchover. For details, see "VMs that Use Shared
Disks Are Not All Stopped". To perform the switchover, stop all VMs that use the shared
disks.
Drill Suggestions
The drill cannot be performed.
Switchover Suggestions
The switchover cannot be performed.
Drill Suggestions
The drill cannot be performed.
Switchover Suggestions
The switchover can be performed directly. During the switchover, the independent persistent
disk is temporarily changed to the dependent disk. For details, see 12.5"VM Uses an
Independent Persistent Disk."
Drill Suggestions
The drill can be performed after safe shutdown.
Switchover Suggestions
The switchover can be performed.
12.69 The Hardware Configuration of Source VM
Exceeds the Specifications Supported by Guest OS
Obstacle Item Description
The FusionSphere Virtualization Suite V100R006C10 (Xen) can create VM with hardware
configurations that exceed the guest OS support specifications. For example, the 32-bit guest
OS memory configuration can be larger than 4G. This hardware configuration causes a waste
of the entire system resources. FusionSphere Virtualization Suite 6.5 (KVM) manages the
hardware configuration of different guest OS in more detail. If the VM hardware
configuration does not meet the KVM virtual machine creation conditions, the VM of the
same specification fails to be created on the KVM platform. Therefore, switchover is not
possible.
Drill Suggestions
The drill cannot be performed.
Based on the OS requirements, modify the source VM hardware parameters and then perform
the drill. For details about the OS requirements, see the FusionSphere SIA Huawei Guest OS
Compatibility Guide (KVM Enterprise Virtualization).
Switchover Suggestions
The switchover cannot be performed.
Based on the OS requirements, modify the source VM hardware parameters and then perform
the switchover. For details about the OS requirements, see the FusionSphere SIA Huawei
Guest OS Compatibility Guide (KVM Enterprise Virtualization).
For carrier users: Visit http://support.huawei.com and search for the document name.
Drill Suggestions
The drill cannot be performed.
The drill aims to check whether the guest OS and services of the VM can be properly started.
You can switch over the VM template. If the VM template is faulty after the switchover, you
can perform rollback on PCS.
Switchover Suggestions
Perform the switchover after the iCache is deleted from the source VM.