Solved

Redhat snmp monitoring

Posted on 2006-11-16
4
1,952 Views
Last Modified: 2009-07-20
Does anyone have a sample SNMPD.CONF file handy? I am trying to configure a monitored HP RH4 sever to send snmp HPagent traps to our HP Sim server.
0
Comment
Question by:hotdiggetydawg
  • 3
4 Comments
 
LVL 10

Expert Comment

by:ssvl
ID: 17956414
0
 
LVL 10

Expert Comment

by:ssvl
ID: 17956476
/usr/local/share/examples/ucd-snmp/EXAMPLE.conf. This default configuration includes a variety of possible security holes, in addition to having default communities. You'll want to copy this to /usr/local/share/snmp/snmpd.conf, and edit to fit your particular needs.


and these are  use full to u

http://www.net-snmp.org/tutorial/tutorial-5/demon/snmpd.html

http://docs.hp.com/en/B9106-90011/snmpd.conf.4.html

http://www.unet.univie.ac.at/aix/files/aixfiles/snmpd.conf.htm
http://publib.boulder.ibm.com/infocenter/pseries/v5r3/index.jsp?topic=/com.ibm.aix.files/doc/aixfiles/snmpd.conf.htm
0
 

Author Comment

by:hotdiggetydawg
ID: 17957311
ssvl

The example you gave me is for a sun box. This is no good to me - I need an example of a (ucd) snmp.conf (RHES4 u3 on a  HP Proliant DL380 G4) that sneds traps to a HP sim agent server.

0
 
LVL 10

Accepted Solution

by:
ssvl earned 250 total points
ID: 18068183
I thik both are the same
0

Featured Post

Backup Your Microsoft Windows Server®

Backup all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Network Interface Card (NIC) bonding, also known as link aggregation, NIC teaming and trunking, is an important concept to understand and implement in any environment where high availability is of concern. Using this feature, a server administrator …
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

912 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now