What ever happened to the patch for this modification? I have the same needs as there is a ipmi query tool that remotely pulls stats out of a system and I would like to be able to shove those into ganglia as if they were coming from the remote system.
-----Original Message----- >From: Adeyemi Adesanya <[EMAIL PROTECTED]> >Sent: Dec 15, 2005 11:24 AM >To: [EMAIL PROTECTED] >Cc: ganglia-developers@lists.sourceforge.net >Subject: Re: [Ganglia-developers] Host spoofing for SNMP > > >Hi Martin. > >I will put in some testing time before submitting code along with >documentation. This is of great importance to me because I need to >monitor Network Appliance (NetApp) boxes. > >It is also worth considering security implications. Once the >recipient gmond has processed the spoof message, it is >indistinguishable from any other gmetric message. The Web frontend >has no clue! > >------ >Yemi > > >On Dec 15, 2005, at 3:18 AM, Martin Knoblauch wrote: > >> Yemi, >> >> please open a bugzilla entry, assign to me and attach your patch >> (diff >> -u format). >> >> The functionality sounds interesting to consider. I assume you are >> willing to provide the documantation for it :-) >> >> Another thing I always wanted is a way to fix up the host name in >> "gmond" reporting. I have one installation with machines having >> NICs in >> a high-availability setup. They actually change their DNS names when a >> switch occurs, screwing the statistics royally. >> >> Cheers >> Martin >> >> --- "Adesanya, Adeyemi" <[EMAIL PROTECTED]> wrote: >> >>> >>> >>> Hi There. >>> >>> I have been thinking about using Ganglia to monitor a broader range >>> of networked devices for a while. Many of these systems do not run >>> common OS platforms and communicate via the SNMP protocol. Last year >>> I came up with a Ganglia 2.5.x hack that enabled a host to send >>> gmetric updates on behalf of another device (I call it spoofing). I >>> have just added the same functionality on top of Ganglia 3.0.x and it >>> appears to be working OK. >>> >>> I modified lib/protocol.x and created a new message type that adds a >>> spoof IP address and host/device name to the existing gmetric data >>> struct. Here's an example of it in use: >>> >>> 'gmetric --help' now lists a new option: >>> >>> -S, --spoof=STRING IP address and name of host/device (colon >>> separated) we >>> are spoofing (default=`') >>> >>> you use it like this: >>> >>> 'gmetric -c cfile -n dataRateIn -v 1234231434 -t uint32 -u bytes -S >>> 123.456.789.012:[EMAIL PROTECTED] >>> >>> Add querying your target gmond shows the following: >>> >>> <HOST NAME="[EMAIL PROTECTED]" IP="123.456.789.012" >>> REPORTED="1134604773" TN="9" TMAX="20" DMAX="86400" >>> LOCATION="unspecified" GMOND_STARTED="0"> >>> <METRIC NAME="dataRateIn" VAL="1234231434" TYPE="uint32" >>> UNITS="bytes" TN="9" TMAX="60" DMAX="0" SLOPE="both" >>> SOURCE="gmetric"/> >>> </HOST> >>> >>> I'll be using this feature in production for sure and I'd like to get >>> the CVS maintainers to review my code and add it to CVS. >>> >>> ------ >>> Yemi