1
我正在使用datastax opscenter 6.0進行DSE Cassandra Monitoring。配置完成以發送SNMP陷阱,但陷阱接收器(本例中爲HP Openview)未收到此警報。 我在opscenter日誌文件中看不到任何SNMP已發生的錯誤。我如何追蹤確切的錯誤?Datastax Opscenter 6.0不發送SNMP陷阱
這裏是我的snmp.conf文件:
[snmp]
# set to 1 to enable SNMP trap sending
enabled=1
# Levels can be a comma-delimited list of any of the following:
# DEBUG,INFO,WARN,ERROR,CRITICAL,ALERT
# If the left is empty, OpsCenter will listen for all levels.
levels=ALERT
# Comma-delimited list of cluster names for which
# this alert config will be eligible to run.
# If left empty, this alert will be called for events on all clusters.
clusters=
# SNMP engine ID, specified by rfc3411 and rfc5343.
# See http://tools.ietf.org/html/rfc3411#section-5
# SnmpEngineID definition for more information.
#
# 32 octet (max length) unique hex engine ID. Must not be all zeroes or all
# 255's. The first four octets specify the enterprise ID, left filled
# with zeroes and starting with an 8. The fifth octet specifies a format scheme
# that specifies the nature of the remaining octets. The remaining octets
# are given in accordance with the specified format.
#
# Format Schemes:
# 1 -- IPv4 Address scheme
# 2 -- IPv6 Address scheme
# 3 -- MAC Address scheme
# 4 -- Text Address scheme
# 5 -- Octets scheme
#
# Default scheme is octets scheme; if nothing else, you should change
# 01020304 to a unique octet string.
#engine_id=80:00:00:00:05:01:02:03:04
# IPv4 address of the SNMP target.
target_ip=*.*.*.* (commented due to security urpose)
# Port to direct traps to on the SNMP target.
target_port=162
# Set to 1 to use SNMPv3 and the user/privacy key/auth key model. Set to 0 to
# use SNMPv1/community model.
use_snmpv3=0
# SNMPv1/2 community name (for community security model)
community_name=public
# SNMPv3 username
#user=opscusername
# SNMPv3 authentication protocol
# Options:
# MD5 -- MD5-based authentication protocol
# SHA -- SHA-based authentication protocol
# NoAuth -- no authentication to use
#auth_protocol=SHA
# SNMPv3 authentication key
#auth_key=authkey1
# SNMPv3 privacy protocol
# Options:
# DES -- DES-based encryption protocol
# AES -- AES128-based encryption protocol (RFC3826)
# 3DES -- triple DES-based encryption protocol (Extended Security Options)
# AES192 -- AES192-based encryption protocol (Extended Security Options)
# AES256 -- AES256-based encryption protocol (Extended Security Options)
# NoPriv-- no encryption to use
#privacy_protocol=AES
# SNMPv3 privacy key
#privacy_key=privkey1
以下跟蹤轉儲已生成07:57:05.158852 IP ukxxxxx.uk.xxxx-intl.com.58993> snvxxxx.uk.xxx-intl.com.snmptrap:V2Trap(433)S:1.1.4.1.0 = E:46272.1.0.3 system.sysDescr.0 =「系統描述」E:46272.1.0.2.1.2 = 2:46272.1.0.2.1.3 =「WARN」:46272.1.0.2.1.4 =「節點正在關閉:xx.xx. xx.xx「E:46272.1.0.2.1.5 = 13:46272.1.0.2.1.6 =」FICCBTD1「:46272.1.0.2.1.7 =」OpsCenter「:46272.1.0.2.1.10 =」1472194625155000「:46272.1.0.2.1.11 = 「2016年8月26日06:57:05 GMT」E:46272.1.0.2.1.8 =「10.60.16.88」E:46272.1.0.2.1.9 =「無」E:46272.1.0.2.1.12 =「無」E:46272.1 .0.2.1.13 =「None」 –
它從上面看起來跟蹤轉儲snmp陷阱將進入HP Openview陷阱接收器,但HP Openivew無法獲取它們。增強的跟蹤已啓用,但沒有從Opscenter服務器收到陷阱。 –