Solved

Redhat snmp monitoring

Posted on 2006-11-16
4
1,956 Views
Last Modified: 2009-07-20
Does anyone have a sample SNMPD.CONF file handy? I am trying to configure a monitored HP RH4 sever to send snmp HPagent traps to our HP Sim server.
0
Comment
Question by:hotdiggetydawg
  • 3
4 Comments
 
LVL 10

Expert Comment

by:ssvl
ID: 17956414
0
 
LVL 10

Expert Comment

by:ssvl
ID: 17956476
/usr/local/share/examples/ucd-snmp/EXAMPLE.conf. This default configuration includes a variety of possible security holes, in addition to having default communities. You'll want to copy this to /usr/local/share/snmp/snmpd.conf, and edit to fit your particular needs.


and these are  use full to u

http://www.net-snmp.org/tutorial/tutorial-5/demon/snmpd.html

http://docs.hp.com/en/B9106-90011/snmpd.conf.4.html

http://www.unet.univie.ac.at/aix/files/aixfiles/snmpd.conf.htm
http://publib.boulder.ibm.com/infocenter/pseries/v5r3/index.jsp?topic=/com.ibm.aix.files/doc/aixfiles/snmpd.conf.htm
0
 

Author Comment

by:hotdiggetydawg
ID: 17957311
ssvl

The example you gave me is for a sun box. This is no good to me - I need an example of a (ucd) snmp.conf (RHES4 u3 on a  HP Proliant DL380 G4) that sneds traps to a HP sim agent server.

0
 
LVL 10

Accepted Solution

by:
ssvl earned 250 total points
ID: 18068183
I thik both are the same
0

Featured Post

Master Your Team's Linux and Cloud Stack

Come see why top tech companies like Mailchimp and Media Temple use Linux Academy to build their employee training programs.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Daily system administration tasks often require administrators to connect remote systems. But allowing these remote systems to accept passwords makes these systems vulnerable to the risk of brute-force password guessing attacks. Furthermore there ar…
SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

791 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question