Professional Documents
Culture Documents
V100R005C10
Quick Start
Issue 01
Date 2015-11-11
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or
representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: http://e.huawei.com
Purpose
This document describes the basic concepts, architecture, and functions of the
FusionCompute.
Intended Audience
This document is intended for:
Symbol Conventions
The symbols that may be found in this document are defined as follows:
Symbol Description
Symbol Description
Change History
Changes between document issues are cumulative. The latest document issue contains all the
changes made in earlier issues.
Issue 01 (2015-11-11)
This is the first official release.
Contents
3 Function Description.................................................................................................................. 11
3.1 Computing Pool............................................................................................................................................................ 12
3.2 VM and Template......................................................................................................................................................... 14
3.3 Storage Pool.................................................................................................................................................................17
3.4 Network Pool............................................................................................................................................................... 20
3.5 Monitoring.................................................................................................................................................................... 22
3.5.1 Alarm......................................................................................................................................................................... 22
3.5.2 Events........................................................................................................................................................................ 30
3.5.3 Performance...............................................................................................................................................................31
3.6 System Management.....................................................................................................................................................35
3.6.1 Rights Management................................................................................................................................................... 35
3.6.2 Tasks and Logs.......................................................................................................................................................... 37
3.6.3 Service Configuration................................................................................................................................................39
4 Technical Support....................................................................................................................... 42
5 Feedback........................................................................................................................................43
1 About FusionCompute
FusionCompute
O&M engineers can use a web user interface (WebUI) to access the FusionCompute to
maintain the entire system by performing O&M operations, such as resource monitoring and
management and system management.
NOTE
If the security certificate has not been installed during Internet Explorer configuration, the browser may
prompt users with a web page display exception message when they log in to FusionCompute for the
first time or log in to VMs using Virtual Network Computing (VNC). In this case, press F5 to refresh the
web page.
Prerequisites
Conditions
l The Internet Explorer browser used for logging in to FusionCompute is an official
release from Internet Explorer 9 to Internet Explorer 11.
l You have obtained the IP address of the VRM node.
Data
Data preparation is not required for this operation.
Procedure
Enter the login page.
1 Open Internet Explorer.
2 Enter http://IP address of the VRM node and press Enter.
NOTE
– If a firewall is deployed between the local PC and FusionCompute, open ports 80, 8080, 43,
and 8443 on the firewall. If ports 80 and 8080 cannot be opened on the firewall, enter
https://IP address of the VRM node:8443 in the address box.
– If the local PC uses the Windows Server 2003 or Windows XP operating system (OS),
connection to FusionCompute from the PC using the Hypertext Transfer Protocol Secure
(HTTPS) protocol may file. In such cases, if the connection is triggered through an Internet
Explorer browser, the PC prompts the user to choose a digital certificate. If the connection is
triggered through a Google Chrome browser, the PC displays a message indicating that the
server certificate is invalid. To address this issue, see http://support.microsoft.com/kb/
968730/zh-cn.
– The HTTPS protocol used by FusionCompute supports only TLS 1.0. If SSL 2.0, SSL 3.0,
TLS 1.1, or TLS 1.2 is used, the FusionCompute system cannot be accessed. You must open
the browser, choose Internet Options > Advanced > Security, and select only Use TLS 1.0
among the protocols.
– If Internet Explorer slows down after running for a period of time and no data is required to be
saved, press F6 on the current page to move the cursor to the address bar of the browser. Then,
press F5 to refresh the page and increase the browser running speed.
7 Select Place all certificates in the following store and click Browse.
The Select Certificate Store dialog box is displayed.
8 Select Trusted Root Certification Authorities and click OK.
The Certificate Store dialog box is displayed.
9 Click Next.
The Completing the Certificate Import Wizard dialog box is displayed.
10 Click Finish.
The Security Warning dialog box is displayed.
11 Click Yes.
The system displays "The import was successful."
12 Click OK.
13 Click OK in the Certificate dialog box.
The browser page is displayed.
Delete historical data.
14 Press Ctrl+Shift+Delete.
The Delete Browsing History dialog box is displayed.
15 Select the following options:
– Preserve Favorites website data
– Temporary Internet files
– Cookies
– History
16 Click Delete.
Historical data is deleted.
Configure compatibility view settings.
17 Press Alt to show the menu bar and choose Tools > Compatibility View Settings on the
menu bar.
The Compatibility View Settings dialog box is displayed.
18 Click Add.
The address for logging in to the current system is added to the compatibility view.
19 Click Close.
20 Close Internet Explorer, open it again, and log in to the FusionCompute.
The settings take effect after the browser is restarted.
----End
Prerequisites
Conditions
l The Firefox browser used for logging in to FusionCompute is an official release from
Mozilla Firefox 21 to Mozilla Firefox 33.
l You have obtained the floating IP address of the VRM.
Data
Data preparation is not required for this operation.
Procedure
Scenarios
Log in to FusionCompute to manage virtual, service, and user resources in a centralized
manner.
Prerequisites
Conditions
l The browser for logging in to FusionCompute is available.
l The Internet Explorer or Mozilla Firefox is set properly. For details, see Setting Internet
Explorer Browser in the FusionCompute V100R005C10 Software Install Guide or
FusionCompute V100R005C10 Software Install Guide.
l The browser resolution is set to 1280 x 1024 or higher based on the service requirement
to ensure the optimum display effect on the FusionCompute.
NOTE
If the security certificate has not been installed during Internet Explorer configuration, the browser may
prompt users with a web page display exception message when they log in to FusionCompute for the
first time or log in to VMs using Virtual Network Computing (VNC). In this case, press F5 to refresh the
web page.
The system supports the following browsers:
l Internet Explorer 9 to Internet Explorer 11
l Mozilla Firefox 21 to Mozilla Firefox 33
l Google Chrome 21 to Google Chrome 39
Data
Table 2-1 lists the data required for performing this operation.
Procedure
– If a firewall is deployed between the local PC and FusionCompute, open ports 80, 8080, 43,
and 8443 on the firewall. If ports 80 and 8080 cannot be opened on the firewall, enter
https://IP address of the VRM node:8443 in the address box.
– If Internet Explorer slows down after running for a period of time and no data is required to be
saved, press F6 on the current page to move the cursor to the address bar of the browser. Then,
press F5 to refresh the page and increase the browser running speed.
The login page is displayed.
After the SSO is configured, if you open the login page of the FusionCompute, the
system switches to the login page of the FusionManager. However, multiple users cannot
log in to the FusionCompute using the same account.
3 Perform the required operation based on the login page.
– If the FusionCompute login page shown in Figure 2-3 is displayed, single sign-on
(SSO) is not configured. Go to 4.
– If the FusionManager login page shown in Figure 2-4 is displayed, SSO has been
configured. Go to 5.
4 Set the Username and Password, select the required User type and Login type, and
click Login. If you attempt to log in to the system again after the initial login fails, you
also need to set the Verification code.
Enter the username and password based on the rights management mode configured
during VRM installation.
– Common login mode: The initial login username is admin and the password is
Huawei@CLOUD8!.
– Rights separation login mode: The username and password of the system
administrator is sysadmin/Sysadmin#, the username and password of the security
administrator is secadmin/Secadmin#, and the username and password of the
security auditor is secauditor/Secauditor#.
NOTE
– If it is your first login using the admin username, the system asks you to change the password
of the admin username.
– The new password must meet the following requirements:
n It contains a minimum of eight characters and a maximum of 32 characters.
n It contains at least one space or one of the following special characters: `~!@#$%^&*()-
_=+\|[{}];:'",<.>/?.
n It contains at least two of the following character types:
○ Uppercase letters
○ Lowercase letters
○ Digits
The FusionCompute operation page is displayed after you log in to the system.
The login operation is complete.
5 Set the Username and Password, If you attempt to log in to the system again after the
initial login fails, you also need to set the Verification code.
– Common login mode: Log in to the system using the FusionManager system
account. After the login, you can only perform query-related operations.
– Rights separation login mode: The username and password of the system
administrator is sysadmin/Sysadmin#, the username and password of the security
administrator is secadmin/Secadmin#, and the username and password of the
security auditor is secauditor/Secauditor#.
6 Click Login to log in to the FusionCompute management system.
NOTE
The user is automatically logged out of the FusionCompute management system if one of the
following conditions is met:
– The current user's session times out.
– The system administrator deletes the current user.
– The system administrator manually locks the current user out.
After you log in to FusionCompute, you can learn the system and its functions from the online
help, product tutorial, and alarm help. If you save the URLs of the documents, you can access
them even when you are logged out of the FusionCompute system.
----End
3 Function Description
Cluster Management
Function Description Path Reference
Host Management
Function Description Path Reference
Querying host You can query host monitoring Computing Pool FusionCompute
monitoring information to learn the running > Site > Cluster > V100R005C10
information status of a host within the Host Monitoring Guide
specified time period.
Maintain and You can bind ports on a host Computing Pool FusionCompute
manage host and associate storage device > Site > Cluster > V100R005C10
ports ports with host ports. Host > Host and Cluster
Configuration Management
Guide
Interface View
VM Management
Template Management
Function Description Path Reference
VM Attribute Management
Function Description Path Reference
Interface View
Add data store Add a data store to the hosts. Storage Pool > FusionCompute
Data Store V100R005C10
Storage
Management
Guide
Manage data You can query storage space Storage Pool > FusionCompute
store usage and modify data storage Data Store > V100R005C10
attributes. Data store > Storage
Summary Management
Guide
Disk Management
Function Description Path Reference
Manage disks You can create a disk, modify Storage Pool > FusionCompute
disk attributes, migrate a disk, Data Store > V100R005C10
bind a disk to a VM, and Data store > Storage
release storage space. Disks Management
Guide
Interface View
Manage a You can manage the IP address Network Pool > FusionCompute
subnet pool of a subnet to provide IP Subnet V100R005C10
address resources for a VM that Network
uses a subnet port group. Management
Guide
Manage a You can manage a VLAN pool Network Pool > FusionCompute
VLAN pool to provide VLAN resources for DVS > V100R005C10
a VLR that uses a VLAN port Distributed Network
group. Switch > VLAN Management
Pool Guide
Interface View
3.5 Monitoring
3.5.1 Alarm
The Alarm function allows you to view and clear real-time and historical alarms and query
alarm statistics.
Alarm: A report generated when the system detects a fault, which has adverse impact on the
system. You need to handle alarms.
Real-Time Alarms
Function Description Path Reference
History Alarms
Function Description Path Reference
Alarm Thresholds
Function Description Path Reference
Alarm Masking
Function Description Path Reference
Alarm Statistics
Function Description Path Reference
Alarm Dump
Function Description Path Reference
Alarm Subscription
Function Description Path Reference
Subscription Service
Function Description Path Reference
Interface View
3.5.2 Events
The Event function allows you to view and query events statistics.
Event: A report generated when the system detects an occurrence that needs to be reported to
users in during system running, exerting no adverse impact on the system. You do not need to
handle events.
Events
Function Description Path Reference
Interface View
3.5.3 Performance
The Performance function allows you to query and export historical key performance
indicator (KPI) statistics, and allows you to monitor multiple KPIs for one object or one KPI
for multiple objects and query top KPI statistics.
KPIs
Function Description Path Reference
Query You can query different KPIs for one Monitoring >
historical object or the same KPI for multiple Performance > FusionComput
KPI objects to obtain the historical running KPIs e
statistics status of the object as a statistical V100R005C10
reference for future maintenance. In Monitoring
addition, you can export the KPI Guide
statistics to a local directory.
TOP Statistics
Query top KPI You can query KPI Monitoring > FusionCompute
statistics statistics and sort Performance > Top V100R005C10
them in ascending or Statistics Monitoring Guide
descending order
based on the host
occupation rate.
Monitoring Settings
Interface View
User Management
Function Description Path Reference
Manage roles You can create and modify the System > Right
operation permissions of roles Management > FusionCompute
to meet different users' Role V100R005C10
environment control Management Security Guide
requirements.
Manage users You can create users, modify System > Right
user attributes, modify or reset Management >
user passwords, lock users, and User
assign different roles for Management
different users to meet their
environment control
requirements.
Configure You can manage user password System > Right FusionCompute
password configuration policies in a Management > V100R005C10
policies system. Password Policy Security Guide
Configure the Configure the domain server, so System > Right FusionCompute
domain that a domain user can be Management > V100R005C10
authentication authenticated by the domain Domain Configuration
server and then log in to the Authentication Management
FusionCompute. Guide
Interface View
Task Management
View the task You can view the progress and System > Tasks FusionCompute
progress result of a task. and Logs > Task V100R005C10
Center Configuration
Management
Guide
View You can view user operation System > Tasks FusionCompute
operation logs logs to trace historical and Logs > V100R005C10
operations performed by a user Operation Logs Security Guide
in the system.
Interface View
Service Configuration
Function Description Path Reference
Configure the You can configure the logo System > System FusionCompute
system logo displayed on the system page. Configuration V100R005C10
Configuration
Management
Guide
Interface View
4 Technical Support
Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and
service. For any assistance, please contact our local office or company headquarters.
l Call the service hotline of your local Huawei office.
l Give your feedback using the information provided on the Contact Us page at the
Huawei technical support websites:
– For enterprise users: http://support.huawei.com/enterprise
– For telecom carrier users: http://support.huawei.com
5 Feedback
Huawei welcomes your suggestions and comments. Please provide your feedback for us in
any of the following ways:
l Call the service hotline of your local Huawei office.
l Give your feedback using the information provided on the Contact Us page at the
Huawei technical support websites:
– For enterprise users: http://support.huawei.com/enterprise
– For telecom carrier users: http://support.huawei.com