Not sure I understand your question exactly, I presume It is not related to the NAT - trapx topic below, but you want to know how you can verify handling of traps by SS ?
I am not aware of any SS log, which is standard enabled for trap handling. There is however a procedure which can be used to debug alertmap / eventdisp behavior. It should be documented in the event configuration manual. I have used it in rare situation in the past. I presume you know how you can verify traps, which are not certified, eg mapped on any event id in vendor / custom mib definitions , via Event view, or even put them in global collections, or export out of the DDM ? For debug of connectivity incoming traps, verify eth/agent source, OID's, varbinds, etc, I have my trapx logs, and for direct to SS traps, my SS server have a continuous SPAN to my wildpackets sniffer infrastructure in the DC, to getting deeper. Not sure it answers your question, if not explain more what you need. Regards, Erwin From: Robert Borowicz [mailto:[email protected]] Sent: vrijdag 9 december 2011 13:24 To: De Munter, Erwin Subject: Re: [spectrum] Spectrum handling traps using IP header source address not Trap PDU Agent address? Erwin, I am going to have to start parsing through the devices that send my SS traps. (a variety of Network devices but also some servers and apps as well). Is there a basic log file or technique you use to see what was parsed correctly and what was not? Or do you simply look for the Event and how it was constructed to understand how well SS parsed the trap? Thanks -Rob Borowicz Austin, Texas On 12/5/2011 12:13 PM, De Munter, Erwin wrote: Hi Dan, 1) Of course, I just listed the filter lines. I have also some "breaks" on oid or type at the start of the line, to drop some traps which are useless, and can not be disabled at the device. Then the others filter * * * * * * file /path/trapsReceived2_beforeNAT.log filter lines... filter * * * * * * file /path/trapsReceived2.log filter * * * * * * forward Spectrum_1 filter * * * * * * forward Spectrum_HA filter * * * * * * forward Spectrum_test 2) Never thought about that. But I presume trapx will always get through the whole list. Based on the trapx manual, the "break" action is not clear. Break -> and to effectively drop and suspend filter processing for them. I presume it will not stop parsing the list. For performance reasons it is really focus on the fine tuning of your configurations, eg which type of traps you enable on your devices, to decrease the number of traps/sec. As I said, I notice almost no delay in handling, or used resources when I have a trapx config with 10000 lines, and in trapx memory. If you have a very large amount of traps/se, you can increase the receive buffer in trapx (so_rcvbuf -> manual). Never changed it myself, but we limit the traps. ( No authentication traps, no link down traps from all Edge(access) switches...., disabled useless trap features,..). For 4000 hosts, I have a continuous trap rate of 1 to 5 traps per second. I know most of them coming from ESX phy hosts. Regards, Erwin From: White Dan [mailto:[email protected]] Sent: maandag 5 december 2011 16:38 To: spectrum Subject: RE:[spectrum] Spectrum handling traps using IP header source address not Trap PDU Agent address? Hi Erwin, and Everyone, Many thanks, Erwin, for your helpful and detailed answer (and also for kindly sharing your CLI mechanism for automatically generating a trapx config file from the Spectrum SSdb - looks great!). I was pleased to hear your experience that your TrapExploders can cope with possibly 1000s of filter lines in their .cf config file. I do have a couple of extra questions - (This thread is turning into a TrapExploder topic!...) (1) I believed that a 'filter.... nat xxxx' would need to be supplemented with another filter...action line to actually forward the trap, as the nat action just does the NAT'ing change and nothing else. (A comment that's in the default trapexploder.cf file says "Note that this action only does the address conversion."). So do you have a line like: filter * * * * * * forward spectroserveraddress near the end of your .cf to make sure the NAT'ed traps actually do get sent on to your Spectrum server(s)! ? (2) For performance reasons, is it not a good idea to prevent TrapExploder from needing to work its way down through the whole list of possible source addresses?... so maybe something like the following entries for each device?... filter * "207\.209\.133\.62$" * * * * nat 207.209.133.62 filter * "207\.209\.133\.62$" * * * * forward spectroserveraddress filter * "207\.209\.133\.62$" * * * * break ...Although I now realise this would actually make the file 3 times as long, too!. Had no answer yet (nor from Support) re handling of SNMPv3 informrequests. Anyone know? Many thanks again, Cheers Dan. Dan White Senior Consultant Service Assurance [Devoteam] Tel. : +44 (0)20 7288 2822 [email protected]<mailto:[email protected]> [http://www.devoteam.com/images/environment.gif]Please consider the environment - do you really need to print this email ? * --To unsubscribe from spectrum, send email to [email protected]<mailto:[email protected]> with the body: unsubscribe spectrum [email protected]<mailto:[email protected]> * --To unsubscribe from spectrum, send email to [email protected]<mailto:[email protected]> with the body: unsubscribe spectrum [email protected]<mailto:[email protected]> --- To unsubscribe from spectrum, send email to [email protected] with the body: unsubscribe spectrum [email protected]
<<inline: image001.png>>
<<inline: image002.gif>>
