On Mon, 5 Dec 2011 14:53:47 +0000 Todd A. wrote:
NTA> You're right, Robert. The agent is running as an unprivileged user. The
NTA> snmpd.conf file was initially only R/W by the "root" user, and no other
NTA> users or groups had any privileges.
NTA>
NTA> To start the agent, I run the following init script from the command line:
NTA> sudo /etc/init.d/snmpd start
NTA>
NTA> Even though I have to invoke the script itself as "root", the application
NTA> itself is not run as root. Thus, it did not have permission to read the
NTA> snmpd.conf file with permissions of rw------- owned by the root user.
I've created a bug tracker for this issue:
https://sourceforge.net/tracker/?group_id=12694&atid=112694
------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure
contains a definitive record of customers, application performance,
security threats, fraudulent activity, and more. Splunk takes this
data and makes sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-novd2d
_______________________________________________
Net-snmp-coders mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/net-snmp-coders