Hi To take care of trap burst (1000 traps in a second), I tried to configure snmptrapd 5.2.2 parameter serverRecvbuf in a config file "snmptrapd.cfg". % cat /usr/nc/Solutions/ConnectSNMP/conf/snmptrapd.cfg # execute 'snmptrapd -H' to get a list of all parameters understood by snmptrapd. serverSendBuf 2097152 serverRecvBuf 2097152
And passed it's path as a parameter while starting up snmptrapd as "-C -c /usr/nc/Solutions/ConnectSNMP/conf/snmptrapd.cfg" System upd buffer size is set to 2097152 (This is a Solaris 10 box) % ndd /dev/udp udp_max_buf 2097152 But the snmptrapd still drops about 70% to 50% traps. Need urgent help/advice on: 1. what can be done to validate the snmptrapd's receive buffer size at runtime. 2. Any insights on possible reasons for the traps getting dropped (apart from the reason that "it's the udp design" i.e. not guarantied to be received. 3. tips/steps on how to make snmptrapd handle/receive this trap-load (~1000/sec) Please feel free to revert back if you need any more (specific) information. Thanks in advance! Regards, >prane2006 Prashant Rane ------------------------------------------------------- This SF.net email is sponsored by: Splunk Inc. Do you grep through log files for problems? Stop! Download the new AJAX search engine that makes searching your log files as easy as surfing the web. DOWNLOAD SPLUNK! http://sel.as-us.falkag.net/sel?cmd=lnk&kid3432&bid#0486&dat1642 _______________________________________________ Net-snmp-users mailing list Net-snmp-users@lists.sourceforge.net Please see the following page to unsubscribe or change other options: https://lists.sourceforge.net/lists/listinfo/net-snmp-users