On Tuesday 21 February 2006 16:22, Dave Shield wrote:
> On Tue, 2006-02-21 at 09:37 +0100, H. McManus wrote:
> > I'm trying to get snmpd to do some sending of traps via defaultMonitors
> > and linkUpDownNotifications in snmpd.conf.
> >
> > It's not working though. All I'm getting is error messages saying "failed
> > to run mteTrigger query".
>
> What does snmpd.conf file look like?

$cat /etc/snmp/snmpd.conf
## COMMUNITY STRINGS / Auth Info ##

com2sec gclv    default         public
com2sec gcwa    default         private
com2sec gfro    default         privvyr
com2sec gfac    default         privvyw

group   gclv    v1      gclv
group   gcwa    v1      gcwa
group   gfro    v1      gfro
group   gfac    v1      gfac
group   gclv    v2c     gclv
group   gcwa    v2c     gcwa
group   gfro    v2c     gfro
group   gfac    v2c     gfac

# These first lines declare the stuff that the client should not
# see no matter what community string
#1 .iso.org.dod.internet.snmpV2
#2 .iso.org.dod.internet.private.enterprises.ucdavis.version
#3 .iso.org.dod.internet.mgmt.mib-2.host.hrSWRun
#4 .iso.org.dod.internet.mgmt.mib-2.host.hrSWRunPerf
#5 .iso.org.dod.internet.experimental
view    limited         included        .1.3.6.1
view    limited         excluded        .1.3.6.1.6
view    limited         excluded        .1.3.6.1.4.1.2021.100
view    limited         excluded        .1.3.6.1.2.1.25.4
view    limited         excluded        .1.3.6.1.2.1.25.5
view    limited         excluded        .1.3.6.1.3

# Now we create the list of things that can be client writeable
#1 .iso.org.dod.internet.mgmt.mib-2.system.sysContact.0
#2 .iso.org.dod.internet.mgmt.mib-2.system.sysLocation.0
#3 .iso.org.dod.internet.mgmt.mib-2.snmp.snmpEnableAuthenTraps.0
#4 .iso.org.dod.internet.mgmt.mib-2.host.hrSystem.hrSystemDate.0
#5 
.iso.org.dod.internet.private.enterprises.ucdavis.version.versionConfigureOptions.0
view    ltdwrite        included        .1.3.6.1.2.1.1.4
view    ltdwrite        included        .1.3.6.1.2.1.1.6
view    ltdwrite        included        .1.3.6.1.2.1.11.30
view    ltdwrite        included        .1.3.6.1.2.1.25.1.2
view    ltdwrite        included        .1.3.6.1.4.1.2021.100.6

view    full    included        .1

# access for the two read only groups to their individual views
access  gclv    ""      any     noauth  exact   limited none    none
access  gfro    ""      any     noauth  exact   full    none    none

# access for the two write groups to their views
access  gcwa    ""      any     noauth  exact   limited ltdwrite        none
access  gfac    ""      any     noauth  exact   full    full            full


## System Settings
sysdescr Genexis GAPS Server


## MONITORING ##

# Monitors root (/) and sets a flag when the percentage of
# free space falls below 85%
# Error is: .1.3.6.1.4.1.2021.9.1.100
disk / 85%

# Sets error if swap free falls below 1G (half full)
# Units is Kb
# Error is .1.3.6.1.4.1.2021.4.100
swap 1000000

# Proc
# The following must be present on every system
# proc MAX MIN
# With no min or max specified, it defaults to
# proc infinity 1
proc apache2
proc atftpd
proc gapsd.pl
proc mysqld

# This next lot is system dependent. Comment in/out as necessary
#proc dhcpd3
#proc ser


## TRAPS ##

trapcommunity gentrap
trap2sink 10.0.0.199

agentSecName gfro

# This can also be set via snmpEnableAuthenTraps.0
# (this value is RW), but setting it here changes
# that particular OID to be RO
#authtrapenable 1

# Built in traps
defaultMonitors yes
linkUpDownNotifications yes


-------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc. Do you grep through log files
for problems?  Stop!  Download the new AJAX search engine that makes
searching your log files as easy as surfing the  web.  DOWNLOAD SPLUNK!
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=103432&bid=230486&dat=121642
_______________________________________________
Net-snmp-users mailing list
[email protected]
Please see the following page to unsubscribe or change other options:
https://lists.sourceforge.net/lists/listinfo/net-snmp-users

Reply via email to