On 4 October 2011 15:20, Kaushal Shriyan <kaushalshri...@gmail.com> wrote: >> Have you tried just ssh-ing in to the hosts and running dmidecode to find >> the RAM information, and hdparm -i to find the drive's serial number? > > Thanks for the reply,I have got that information using dmidecode and > various other tools, but is there a way to use snmp protocol to find > out this specific information.
It's not built into the Net-SNMP agent, but you could always configure an "extend" directive to report this information. Something like extend dmi /usr/bin/dmidecode and then query the tables nsExtendOutput1Table and/or nsExtendOutput2Table There looks to be a lot of useful information there, so it's probably something we could sensibly make use of! Dave ------------------------------------------------------------------------------ All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity and more. Splunk takes this data and makes sense of it. Business sense. IT sense. Common sense. http://p.sf.net/sfu/splunk-d2dcopy1 _______________________________________________ Net-snmp-users mailing list Net-snmp-users@lists.sourceforge.net Please see the following page to unsubscribe or change other options: https://lists.sourceforge.net/lists/listinfo/net-snmp-users