Hi

To take care of trap burst (1000 traps in a second), I tried to
configure snmptrapd 5.2.2 parameter serverRecvbuf in a config file
"snmptrapd.cfg".
% cat /usr/nc/Solutions/ConnectSNMP/conf/snmptrapd.cfg
# execute 'snmptrapd -H' to get a list of all parameters understood by
snmptrapd.
    serverSendBuf           2097152 
    serverRecvBuf           2097152 

And passed it's path as a parameter while starting up snmptrapd as "-C
-c /usr/nc/Solutions/ConnectSNMP/conf/snmptrapd.cfg"

System upd buffer size is set to 2097152 (This is a Solaris 10 box)
% ndd /dev/udp udp_max_buf 
2097152

But the snmptrapd still drops about 70% to 50% traps.

Need urgent help/advice on:
1. what can be done to validate the snmptrapd's receive buffer size at
runtime.
2. Any insights on possible reasons for the traps getting dropped (apart
from the reason that "it's the udp design" i.e. not guarantied to be
received.
3. tips/steps on how to make snmptrapd handle/receive this trap-load
(~1000/sec)

Please feel free to revert back if you need any more (specific)
information.

Thanks in advance!

Regards,
>prane2006
Prashant Rane



-------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc. Do you grep through log files
for problems?  Stop!  Download the new AJAX search engine that makes
searching your log files as easy as surfing the  web.  DOWNLOAD SPLUNK!
http://sel.as-us.falkag.net/sel?cmd=lnk&kid3432&bid#0486&dat1642
_______________________________________________
Net-snmp-users mailing list
Net-snmp-users@lists.sourceforge.net
Please see the following page to unsubscribe or change other options:
https://lists.sourceforge.net/lists/listinfo/net-snmp-users

Reply via email to