On 4 October 2011 15:20, Kaushal Shriyan <kaushalshri...@gmail.com> wrote:
>> Have you tried just ssh-ing in to the hosts and running dmidecode to find
>> the RAM information, and hdparm -i to find the drive's serial number?
>
> Thanks for the reply,I have got that information using dmidecode and
> various other tools, but is there a way to use snmp protocol to find
> out this specific information.

It's not built into the Net-SNMP agent,
but you could always configure an "extend" directive to report this information.

Something like

    extend   dmi   /usr/bin/dmidecode

and then query the tables nsExtendOutput1Table and/or nsExtendOutput2Table

There looks to be a lot of useful information there,
so it's probably something we could sensibly make use of!

Dave

------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure contains a
definitive record of customers, application performance, security
threats, fraudulent activity and more. Splunk takes this data and makes
sense of it. Business sense. IT sense. Common sense.
http://p.sf.net/sfu/splunk-d2dcopy1
_______________________________________________
Net-snmp-users mailing list
Net-snmp-users@lists.sourceforge.net
Please see the following page to unsubscribe or change other options:
https://lists.sourceforge.net/lists/listinfo/net-snmp-users

Reply via email to