Hi Guyverix,
For all I know the only traps I get from a Juniper are the BGP backwards
transition and an Established trap. You should be able to catch this with the
following code:
Code:
from socket import gethostbyaddr
for attr in dir(evt):
if attr.startswith('1.3.6.1.2.1.15.3.1.14.'):
evt.bgpPeerIp = attr.replace('1.3.6.1.2.1.15.3.1.14.', '')
try:
evt.bgpPeerName = gethostbyaddr(evt.bgpPeerIp)[0]
evt.summary = "bgpBackwardTransNotification from " +
evt.bgpPeerIp + " (" + evt.bgpPeerName + ")"
except Exception, ex:
evt.exceptionString = str(ex)
evt.summary = "bgpBackwardTransNotification from " +
evt.bgpPeerIp
There's also a hostlookup in the code but you can easily get rid of it.
-------------------- m2f --------------------
Read this topic online here:
http://forums.zenoss.com/viewtopic.php?p=38682#38682
-------------------- m2f --------------------
_______________________________________________
zenoss-users mailing list
[email protected]
http://lists.zenoss.org/mailman/listinfo/zenoss-users