Solved

VM's shutting down after alarm "Virtual CPU Usage' and "Virtual Machine memory Usage"

Posted on 2012-04-12
6
3,994 Views
Last Modified: 2013-06-14
Our VMs are shutting down after these alarms appear in the logs.


Alarm 'Virtual machine total disk latency' on
LANWSRV03 changed from Green to Gray
info
4/9/2012 11:45:27 AM
Alarm 'Virtual machine memory usage' on
LANWSRV03 changed from Green to Gray
info
4/9/2012 11:45:27 AM
Alarm 'Virtual machine cpu usage' on
LANWSRV03 changed from Green to Gray
info
4/9/2012 11:45:27 AM
Changed resource allocation for LANWSRV03
info
4/9/2012 11:45:27 AM

The VM then powers off and need to manually turn it back on. Can not seem to isolate the cause as all the other VMs seem unaffected.
0
Comment
Question by:WohlsenIT
  • 3
  • 2
6 Comments
 
LVL 117

Expert Comment

by:Andrew Hancock (VMware vExpert / EE MVE)
Comment Utility
check the contents of the vmware.log in the virtual machine folder?

what is the guest, any snapshots, datastore out of space...
0
 

Author Comment

by:WohlsenIT
Comment Utility
Apr 09 11:38:38.812: vcpu-0| SymBacktrace[11] 0x1e271178 eip 0xa828fda in function (null) in object /usr/lib/vmware/bin/vmware-vmx loaded at 0xa759000
Apr 09 11:38:38.812: vcpu-0| SymBacktrace[12] 0x1e2b2218 eip 0xa977244 in function (null) in object /usr/lib/vmware/bin/vmware-vmx loaded at 0xa759000
Apr 09 11:38:38.812: vcpu-0| Unrecoverable memory allocation failure at bora/lib/user/msg.c:220
Apr 09 11:38:38.812: vcpu-0| Panic loop
Apr 09 11:38:38.812: vcpu-0| Backtrace:
Apr 09 11:38:38.812: vcpu-0| Backtrace[0] 0x1e270168 eip 0xabb98cd
Apr 09 11:38:38.812: vcpu-0| Backtrace[1] 0x1e2705a8 eip 0xa7b80e4
Apr 09 11:38:38.813: vcpu-0| Backtrace[2] 0x1e270678 eip 0xabb394a
Apr 09 11:38:38.813: vcpu-0| Backtrace[3] 0x1e270698 eip 0xabb3ef4
Apr 09 11:38:38.813: vcpu-0| Backtrace[4] 0x1e270ad8 eip 0xabbaee9
Apr 09 11:38:38.813: vcpu-0| Backtrace[5] 0x1e270f18 eip 0xa7b8073
Apr 09 11:38:38.813: vcpu-0| Backtrace[6] 0x1e270f68 eip 0xabb80f7
Apr 09 11:38:38.813: vcpu-0| Backtrace[7] 0x1e270f88 eip 0xa7b9b14
Apr 09 11:38:38.813: vcpu-0| Backtrace[8] 0x1e270fd8 eip 0xabb471f
Apr 09 11:38:38.813: vcpu-0| Backtrace[9] 0x1e271008 eip 0xa7b99cb
Apr 09 11:38:38.814: vcpu-0| Backtrace[10] 0x1e271038 eip 0xa7b9e6b
Apr 09 11:38:38.814: vcpu-0| Backtrace[11] 0x1e271078 eip 0xa7c8741
Apr 09 11:38:38.814: vcpu-0| Backtrace[12] 0x1e2710a8 eip 0xa7c5b9b
Apr 09 11:38:38.814: vcpu-0| Backtrace[13] 0x1e2710f8 eip 0xa7c4ec8
Apr 09 11:38:38.814: vcpu-0| Backtrace[14] 0x1e271148 eip 0xa7c82ed
Apr 09 11:38:38.814: vcpu-0| Backtrace[15] 0x1e271178 eip 0xa828fda
Apr 09 11:38:38.814: vcpu-0| Backtrace[16] 0x1e2b2218 eip 0xa977244
Apr 09 11:38:38.814: vcpu-0| SymBacktrace[0] 0x1e270168 eip 0xabb98cd in function (null) in object /usr/lib/vmware/bin/vmware-vmx loaded at 0xa759000
Apr 09 11:38:38.815: vcpu-0| SymBacktrace[1] 0x1e2705a8 eip 0xa7b80e4 in function Panic in object /usr/lib/vmware/bin/vmware-vmx loaded at 0xa759000
Apr 09 11:38:38.815: vcpu-0| SymBacktrace[2] 0x1e270678 eip 0xabb394a in function (null) in object /usr/lib/vmware/bin/vmware-vmx loaded at 0xa759000
Apr 09 11:38:38.815: vcpu-0| SymBacktrace[3] 0x1e270698 eip 0xabb3ef4 in function (null) in object /usr/lib/vmware/bin/vmware-vmx loaded at 0xa759000
Apr 09 11:38:38.815: vcpu-0| SymBacktrace[4] 0x1e270ad8 eip 0xabbaee9 in function (null) in object /usr/lib/vmware/bin/vmware-vmx loaded at 0xa759000
Apr 09 11:38:38.815: vcpu-0| SymBacktrace[5] 0x1e270f18 eip 0xa7b8073 in function Panic in object /usr/lib/vmware/bin/vmware-vmx loaded at 0xa759000
Apr 09 11:38:38.815: vcpu-0| SymBacktrace[6] 0x1e270f68 eip 0xabb80f7 in function (null) in object /usr/lib/vmware/bin/vmware-vmx loaded at 0xa759000
Apr 09 11:38:38.815: vcpu-0| SymBacktrace[7] 0x1e270f88 eip 0xa7b9b14 in function (null) in object /usr/lib/vmware/bin/vmware-vmx loaded at 0xa759000
Apr 09 11:38:38.815: vcpu-0| SymBacktrace[8] 0x1e270fd8 eip 0xabb471f in function (null) in object /usr/lib/vmware/bin/vmware-vmx loaded at 0xa759000
Apr 09 11:38:38.816: vcpu-0| SymBacktrace[9] 0x1e271008 eip 0xa7b99cb in function (null) in object /usr/lib/vmware/bin/vmware-vmx loaded at 0xa759000
Apr 09 11:38:38.816: vcpu-0| SymBacktrace[10] 0x1e271038 eip 0xa7b9e6b in function (null) in object /usr/lib/vmware/bin/vmware-vmx loaded at 0xa759000
Apr 09 11:38:38.816: vcpu-0| SymBacktrace[11] 0x1e271078 eip 0xa7c8741 in function (null) in object /usr/lib/vmware/bin/vmware-vmx loaded at 0xa759000
Apr 09 11:38:38.816: vcpu-0| SymBacktrace[12] 0x1e2710a8 eip 0xa7c5b9b in function (null) in object /usr/lib/vmware/bin/vmware-vmx loaded at 0xa759000
Apr 09 11:38:38.816: vcpu-0| SymBacktrace[13] 0x1e2710f8 eip 0xa7c4ec8 in function (null) in object /usr/lib/vmware/bin/vmware-vmx loaded at 0xa759000
Apr 09 11:38:38.816: vcpu-0| SymBacktrace[14] 0x1e271148 eip 0xa7c82ed in function (null) in object /usr/lib/vmware/bin/vmware-vmx loaded at 0xa759000
Apr 09 11:38:38.817: vcpu-0| SymBacktrace[15] 0x1e271178 eip 0xa828fda in function (null) in object /usr/lib/vmware/bin/vmware-vmx loaded at 0xa759000
Apr 09 11:38:38.817: vcpu-0| SymBacktrace[16] 0x1e2b2218 eip 0xa977244 in
0
 

Author Comment

by:WohlsenIT
Comment Utility
There are no snapshots currently and the datastore appears to be working fine.
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 

Author Comment

by:WohlsenIT
Comment Utility
Guest OS is 2003 R2
0
 
LVL 117

Accepted Solution

by:
Andrew Hancock (VMware vExpert / EE MVE) earned 500 total points
Comment Utility
is the host on the HCL, could be a hardware memory fault, check host memory.
0
 

Expert Comment

by:messaging_expert
Comment Utility
xxx
0

Featured Post

Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

Join & Write a Comment

This Tutorial covers a very basic and common question asked on Experts Exchange, "How Do I Clone or Copy a virtual machine in VMware vSphere Hypervisor ESX/ESXi 4.x, ESXi 5.0?" Using the following method, no third party tools are required or need…
This is an issue that we can get adding / removing permissions in the vCSA 6.0. We can also have issues searching for users / groups in the AD (using your identify sources). This is how one of the ways to handle this issues and fix it.
Teach the user how to rename, unmount, delete and upgrade VMFS datastores. Open vSphere Web Client: Rename VMFS and NFS datastores: Upgrade VMFS-3 volume to VMFS-5: Unmount VMFS datastore: Delete a VMFS datastore:
This Micro Tutorial walks you through using a remote console to access a server and install ESXi 5.1. This example is showing remote access and installation using a Dell server. The hypervisor is the very first component of your virtual infrastructu…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now