On Thu, Mar 02, 2006 at 05:25:30PM +0000, Dave Shield wrote:
> On Thu, 2006-03-02 at 08:10 -0500, Jean-Sebastien Morisset wrote:
>> I seem to have a little problem. I have several Net-SNMP v5.3.0.1
>> clients on various Solaris servers, and I get the following trap from
>> several of them:
>>
>> mteTriggerFired trap received from xxxxxxxxxxxxxxxxx: procTable
>> .1.3.6.1.4.1.2021.2.1.100.2 1 cron
>>
>> This does NOT appear to be an error.
>
> What does walking the procTable show?
Dave,
Everything appears normal:
# snmpwalk -c ******** -O s -v 2c devunix4 prTable|grep '\.2 '
prIndex.2 = INTEGER: 2
prNames.2 = STRING: cron
prMin.2 = INTEGER: 1
prMax.2 = INTEGER: 1
prCount.2 = INTEGER: 1
prErrorFlag.2 = INTEGER: 0
prErrMessage.2 = STRING:
prErrFix.2 = INTEGER: 0
prErrFixCmd.2 = STRING:
And on the server itself:
# ps -ef|grep cron
root 7841 1 0 Feb 26 ? 0:02 /usr/sbin/cron
A trap was sent at 8:36:01 this morning. Cron was certainly active since
it's log file shows:
[snip!]
> sys 19320 c Thu Mar 2 08:35:00 2006
< sys 19320 c Thu Mar 2 08:35:00 2006
> CMD: /usr/lib/sa/sa1
> sys 19349 c Thu Mar 2 08:36:00 2006
< sys 19349 c Thu Mar 2 08:36:01 2006
> CMD: /usr/lib/sa/sa1
> sys 19376 c Thu Mar 2 08:37:00 2006
< sys 19376 c Thu Mar 2 08:37:00 2006
> CMD: /usr/lib/sa/sa1
[snip!]
Although I'm monitoring many single instances of a process on this and
other servers, "cron" is the only one generating traps on occasion. And
not just on this server -- on a few others as well. I haven't found a
pattern to these traps yet -- they just happen once in a while (maybe a
total of 3-4 traps / day from 20 servers or so).
Thanks,
js.
--
Jean-Sebastien Morisset, Sr. UNIX Administrator <[EMAIL PROTECTED]>
Personal Home Page <http://jsmoriss.mvlan.net/>
Underwater and Travel Photographs <http://www.mvpix.com/>
-------------------------------------------------------
This SF.Net email is sponsored by xPML, a groundbreaking scripting language
that extends applications into web and mobile media. Attend the live webcast
and join the prime developer group breaking into this new coding territory!
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=110944&bid=241720&dat=121642
_______________________________________________
Net-snmp-users mailing list
[email protected]
Please see the following page to unsubscribe or change other options:
https://lists.sourceforge.net/lists/listinfo/net-snmp-users