ALM-12041 Incorrect Permission on Key Files
Alarm Description
The system checks whether the permission, user, and user group information about critical directories or files is normal every 5 minutes. This alarm is generated when the information is abnormal.
This alarm is cleared when the information becomes normal.
Alarm Attributes
Alarm ID |
Alarm Severity |
Alarm Type |
Service Type |
Auto Cleared |
---|---|---|---|---|
12041 |
Major |
Quality of service |
FusionInsight Manager |
Yes |
Alarm Parameters
Type |
Parameter |
Description |
---|---|---|
Location Information |
Source |
Specifies the cluster or system for which the alarm is generated. |
ServiceName |
Specifies the service name for which the alarm is generated. |
|
RoleName |
Specifies the role name for which the alarm is generated. |
|
HostName |
Specifies the object (host ID) for which the alarm is generated. |
|
PathName |
Specifies the path or name of the abnormal file. |
|
Additional Information |
Detail |
Specifies the details for which the alarm is generated. |
Impact on the System
System functions are unavailable.
- If the permission on the okerberos and oldap key files is abnormal, authentication fails and jobs may fail.
- If the permission on the controller and pms key files is abnormal, the process may be faulty, which may affect the elastic scaling performance.
- If the permission on key Tomcat files is abnormal, the login and viewing functions of FusionInsight Manager are affected.
Possible Causes
The file permission is abnormal or the file is lost due to a user manually modified information such as the file permission, user, and user group, or the system is powered off unexpectedly.
Handling Procedure
Check whether the abnormal file exists and whether the permission on the abnormal file is correct.
- On the FusionInsight Manager portal, choose O&M > Alarm > Alarms.
- Check the value of HostName to obtain the host name involved in this alarm. Check the value of PathName to obtain the path or name of the abnormal file.
- Log in to the node for which the alarm is generated as user root.
- Run the ll pathName command, where pathName indicates the name of the abnormal file to obtain the user, permission, and user group information about the file or directory.
- Go to ${BIGDATA_HOME}/om-agent/nodeagent/etc/agent/autocheck directory. Then run the vi keyfile command and search for the name of the abnormal file and check the due permission of the file.
To ensure proper configuration synchronization between the active and standby OMS servers, files, directories, and files and sub-directories in the directories configured in $OMS_RUN_PATH/workspace/ha/module/hasync/plugin/conf/filesync.xml will also be monitored except files and directories in keyfile. User omm must have read and write permissions of files and read and execute permissions of directories.
- Compare the real-world permission of the file with the due permission obtained in 5 and correct the permission, user, and user group information for the file.
- Wait a hour and check whether the alarm is cleared.
- If yes, no further action is required.
- If no, go to 8.
If the disk partition where the cluster installation directory resides is used up, some temporary files will be generated in the program installation directory when running the sed command fails. Users do not have the read, write, and execute permissions of these temporary files. The system reports an alarm indicating that permissions of temporary files are abnormal if these files are within the monitoring range of the alarm. Perform the preceding alarm handling processes to clear the alarm. Alternatively, you can directly delete the temporary files after confirming that files with abnormal permissions are temporary. The temporary file generated after a sed command execution failure is similar to the following.
Collect fault information.
- On the FusionInsight Manager portal, choose O&M > Log > Download.
- Select NodeAgent from the Service and click OK.
- Click in the upper right corner, and set Start Date and End Date for log collection to 10 minutes ahead of and after the alarm generation time, respectively. Then, click Download.
- Contact the O&M engineers and send the collected log information.
Alarm Clearance
After the fault is rectified, the system automatically clears this alarm.
Related Information
None.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot