2016-08-23 76 views
1

我正在使用datastax opscenter 6.0进行DSE Cassandra Monitoring。配置完成以发送SNMP陷阱,但陷阱接收器(本例中为HP Openview)未收到此警报。 我在opscenter日志文件中看不到任何SNMP已发生的错误。我如何追踪确切的错误?Datastax Opscenter 6.0不发送SNMP陷阱

这里是我的snmp.conf文件:

[snmp] 
# set to 1 to enable SNMP trap sending 
enabled=1 

# Levels can be a comma-delimited list of any of the following: 
# DEBUG,INFO,WARN,ERROR,CRITICAL,ALERT 
# If the left is empty, OpsCenter will listen for all levels. 
levels=ALERT 

# Comma-delimited list of cluster names for which 
# this alert config will be eligible to run. 
# If left empty, this alert will be called for events on all clusters. 
clusters= 

# SNMP engine ID, specified by rfc3411 and rfc5343. 
# See http://tools.ietf.org/html/rfc3411#section-5 
# SnmpEngineID definition for more information. 
# 
# 32 octet (max length) unique hex engine ID. Must not be all zeroes or all 
# 255's. The first four octets specify the enterprise ID, left filled 
# with zeroes and starting with an 8. The fifth octet specifies a format scheme 
# that specifies the nature of the remaining octets. The remaining octets 
# are given in accordance with the specified format. 
# 
# Format Schemes: 
# 1 -- IPv4 Address scheme 
# 2 -- IPv6 Address scheme 
# 3 -- MAC Address scheme 
# 4 -- Text Address scheme 
# 5 -- Octets scheme 
# 
# Default scheme is octets scheme; if nothing else, you should change 
# 01020304 to a unique octet string. 
#engine_id=80:00:00:00:05:01:02:03:04 

# IPv4 address of the SNMP target. 
target_ip=*.*.*.*   (commented due to security urpose) 

# Port to direct traps to on the SNMP target. 
target_port=162 

# Set to 1 to use SNMPv3 and the user/privacy key/auth key model. Set to 0 to 
# use SNMPv1/community model. 
use_snmpv3=0 

# SNMPv1/2 community name (for community security model) 
community_name=public 

# SNMPv3 username 
#user=opscusername 

# SNMPv3 authentication protocol 
# Options: 
# MD5 -- MD5-based authentication protocol 
# SHA -- SHA-based authentication protocol 
# NoAuth -- no authentication to use 
#auth_protocol=SHA 

# SNMPv3 authentication key 
#auth_key=authkey1 

# SNMPv3 privacy protocol 
# Options: 
# DES -- DES-based encryption protocol 
# AES -- AES128-based encryption protocol (RFC3826) 
# 3DES -- triple DES-based encryption protocol (Extended Security Options) 
# AES192 -- AES192-based encryption protocol (Extended Security Options) 
# AES256 -- AES256-based encryption protocol (Extended Security Options) 
# NoPriv-- no encryption to use 
#privacy_protocol=AES 

# SNMPv3 privacy key 
#privacy_key=privkey1 

回答

1

尝试设置levels=ALERTlevels=,并确保它不只是你过滤你想找的第一事件(可以把它找回曾经有工作像你想要更容易看到更多的东西)。

可以使用Wireshark或tcpdump的检查,如果陷阱正在用类似发:

tcpdump -i eth1 -T snmp "(port 161 or 162)" 

(注:eth1的可能需要您的接口名称来代替)。 SNMP客户端在安装正确的时候可能会有一点点偏差,所以很好检查它们是否正在发送,未处理与未发送。

+0

以下跟踪转储已生成07:57:05.158852 IP ukxxxxx.uk.xxxx-intl.com.58993> snvxxxx.uk.xxx-intl.com.snmptrap:V2Trap(433)S:1.1.4.1.0 = E:46272.1.0.3 system.sysDescr.0 =“系统描述”E:46272.1.0.2.1.2 = 2:46272.1.0.2.1.3 =“WARN”:46272.1.0.2.1.4 =“节点正在关闭:xx.xx. xx.xx“E:46272.1.0.2.1.5 = 13:46272.1.0.2.1.6 =”FICCBTD1“:46272.1.0.2.1.7 =”OpsCenter“:46272.1.0.2.1.10 =”1472194625155000“:46272.1.0.2.1.11 = “2016年8月26日06:57:05 GMT”E:46272.1.0.2.1.8 =“10.60.16.88”E:46272.1.0.2.1.9 =“无”E:46272.1.0.2.1.12 =“无”E:46272.1 .0.2.1.13 =“None” –

+0

它从上面看起来跟踪转储snmp陷阱将进入HP Openview陷阱接收器,但HP Openivew无法获取它们。增强的跟踪已启用,但没有从Opscenter服务器收到陷阱。 –