ubuntu snmpd 配置

简介:

###############################################################################

#

# EXAMPLE.conf:

# An example configuration file for configuring the Net-SNMP agent ('snmpd')

# See the 'snmpd.conf(5)' man page for details

#

# Some entries are deliberately commented out, and will need to be explicitly activated

#

###############################################################################

#

# AGENT BEHAVIOUR

#


# Listen for connections from the local system only

agentAddress udp:*.*.*.*:161

# Listen for connections on all interfaces (both IPv4 *and* IPv6)

#agentAddress udp:161,udp6:[::1]:161




###############################################################################

#

# SNMPv3 AUTHENTICATION

#

# Note that these particular settings don't actually belong here.

# They should be copied to the file /var/lib/snmp/snmpd.conf

# and the passwords changed, before being uncommented in that file *only*.

# Then restart the agent


# createUser authOnlyUser MD5 "remember to change this password"

# createUser authPrivUser SHA "remember to change this one too" DES

# createUser internalUser MD5 "this is only ever used internally, but still change the password"


# If you also change the usernames (which might be sensible),

# then remember to update the other occurances in this example config file to match.




###############################################################################

#

# ACCESS CONTROL

#


# system + hrSystem groups only

view systemonly included .1.3.6.1.2.1.1

view systemonly included .1.3.6.1.2.1.25.1


# Full access from the local host

#rocommunity public localhost

# Default access to basic system info

# rocommunity public default -V systemonly

rocommunity public default


# Full access from an example network

# Adjust this network address to match your local

# settings, change the community string,

# and check the 'agentAddress' setting above

#rocommunity secret 10.0.0.0/16


# Full read-only access for SNMPv3

rouser authOnlyUser

# Full write access for encrypted requests

# Remember to activate the 'createUser' lines above

#rwuser authPrivUser priv


# It's no longer typically necessary to use the full 'com2sec/group/access' configuration

# r[ou]user and r[ow]community, together with suitable views, should cover most requirements




###############################################################################

#

# SYSTEM INFORMATION

#


# Note that setting these values here, results in the corresponding MIB objects being 'read-only'

# See snmpd.conf(5) for more details

sysLocation Sitting on the Dock of the Bay

sysContact Me <me@example.org>

# Application + End-to-End layers

sysServices 72



#

# Process Monitoring

#

# At least one 'mountd' process

proc mountd

# No more than 4 'ntalkd' processes - 0 is OK

proc ntalkd 4

# At least one 'sendmail' process, but no more than 10

proc sendmail 10 1


# Walk the UCD-SNMP-MIB::prTable to see the resulting output

# Note that this table will be empty if there are no "proc" entries in the snmpd.conf file



#

# Disk Monitoring

#

# 10MBs required on root disk, 5% free on /var, 10% free on all other disks

disk / 10000

disk /var 5%

includeAllDisks 10%


# Walk the UCD-SNMP-MIB::dskTable to see the resulting output

# Note that this table will be empty if there are no "disk" entries in the snmpd.conf file



#

# System Load

#

# Unacceptable 1-, 5-, and 15-minute load averages

load 12 10 5


# Walk the UCD-SNMP-MIB::laTable to see the resulting output

# Note that this table *will* be populated, even without a "load" entry in the snmpd.conf file




###############################################################################

#

# ACTIVE MONITORING

#


# send SNMPv1 traps

# trapsink localhost public

informsink localhost public

# send SNMPv2c traps

#trap2sink localhost public

# send SNMPv2c INFORMs

#informsink localhost public


# Note that you typically only want *one* of these three lines

# Uncommenting two (or all three) will result in multiple copies of each notification.



#

# Event MIB - automatically generate alerts

#

# Remember to activate the 'createUser' lines above

iquerySecName internalUser

rouser internalUser

# generate traps on UCD error conditions

defaultMonitors yes

# generate traps on linkUp/Down

linkUpDownNotifications yes




###############################################################################

#

# EXTENDING THE AGENT

#


#

# Arbitrary extension commands

#

extend test1 /bin/echo Hello, world!

extend-sh test2 echo Hello, world! ; echo Hi there ; exit 35

#extend-sh test3 /bin/sh /tmp/shtest


# Note that this last entry requires the script '/tmp/shtest' to be created first,

# containing the same three shell commands, before the line is uncommented


# Walk the NET-SNMP-EXTEND-MIB tables (nsExtendConfigTable, nsExtendOutput1Table

# and nsExtendOutput2Table) to see the resulting output


# Note that the "extend" directive supercedes the previous "exec" and "sh" directives

# However, walking the UCD-SNMP-MIB::extTable should still returns the same output,

# as well as the fuller results in the above tables.



#

# "Pass-through" MIB extension command

#

#pass .1.3.6.1.4.1.8072.2.255 /bin/sh PREFIX/local/passtest

#pass .1.3.6.1.4.1.8072.2.255 /usr/bin/perl PREFIX/local/passtest.pl


# Note that this requires one of the two 'passtest' scripts to be installed first,

# before the appropriate line is uncommented.

# These scripts can be found in the 'local' directory of the source distribution,

# and are not installed automatically.


# Walk the NET-SNMP-PASS-MIB::netSnmpPassExamples subtree to see the resulting output



#

# AgentX Sub-agents

#

# Run as an AgentX master agent

master agentx

# Listen for network connections (from localhost)

# rather than the default named socket /var/agentx/master

#agentXSocket tcp:localhost:705


snmpDOPTS = '-Lsd -Lf /dev/null -u snmp -I -smux -p /var/run/snmpd.pid'

view mib2 included .iso.org.dod.internet.mgmt.mib-2 fc

access MyROSystem "" any noauth exact all none none


本文转自 swq499809608 51CTO博客,原文链接:http://blog.51cto.com/swq499809608/1309624

相关文章
|
3月前
|
Ubuntu
Ubuntu配置Udev规则固定设备口
本文介绍了如何在Ubuntu系统中通过配置udev规则来固定设备的端口,详细说明了如何查看设备信息、创建udev规则文件、设置设备权限,并加载及重启udev规则以应用更改。
228 0
Ubuntu配置Udev规则固定设备口
|
26天前
|
网络协议 Ubuntu 网络安全
|
1月前
|
消息中间件 监控 Ubuntu
大数据-54 Kafka 安装配置 环境变量配置 启动服务 Ubuntu配置 ZooKeeper
大数据-54 Kafka 安装配置 环境变量配置 启动服务 Ubuntu配置 ZooKeeper
65 3
大数据-54 Kafka 安装配置 环境变量配置 启动服务 Ubuntu配置 ZooKeeper
|
1月前
|
资源调度
Ubuntu22.04静态ip配置+yarn build后显示内存超限,变异失败
Ubuntu22.04静态ip配置+yarn build后显示内存超限,变异失败
34 2
Ubuntu22.04静态ip配置+yarn build后显示内存超限,变异失败
|
27天前
|
Ubuntu Linux 编译器
Linux/Ubuntu下使用VS Code配置C/C++项目环境调用OpenCV
通过以上步骤,您已经成功在Ubuntu系统下的VS Code中配置了C/C++项目环境,并能够调用OpenCV库进行开发。请确保每一步都按照您的系统实际情况进行适当调整。
219 3
|
2月前
|
Ubuntu 网络安全 开发工具
Ubuntu19.04的安装过程详解以及操作系统初始化配置
本文详细介绍了Ubuntu 19.04操作系统的安装过程、初始化配置、网络设置、软件源配置、SSH远程登录以及终端显示设置。
86 1
Ubuntu19.04的安装过程详解以及操作系统初始化配置
|
2月前
|
存储 Prometheus 监控
在Ubuntu系统上安装与配置Prometheus的步骤
通过以上步骤,您应该已经成功在Ubuntu系统上安装并配置了Prometheus。您现在可以开始使用Prometheus收集和分析您的系统和应用程序的指标数据了。
138 1
|
1月前
|
Ubuntu 网络协议 Linux
liunx各大发行版(centos,rocky,ubuntu,国产麒麟kylinos)网卡配置和包管理方面的区别
liunx各大发行版(centos,rocky,ubuntu,国产麒麟kylinos)网卡配置和包管理方面的区别
104 0
|
2月前
|
Ubuntu Oracle 关系型数据库
Oracle VM VirtualBox之Ubuntu 22.04LTS双网卡网络模式配置
这篇文章是关于如何在Oracle VM VirtualBox中配置Ubuntu 22.04LTS虚拟机双网卡网络模式的详细指南,包括VirtualBox网络概述、双网卡网络模式的配置步骤以及Ubuntu系统网络配置。
185 3
|
2月前
|
Ubuntu 开发工具 虚拟化
MacOS系统基于VMware Fusion配置Ubuntu 22.04LTS环境
这篇文章介绍了如何在MacOS系统上使用VMware Fusion虚拟化软件配置Ubuntu 22.04 LTS环境,包括自定义VMware Fusion网段、Ubuntu系统安装、配置root用户登录、设置静态IP地址、修改默认网卡名称、配置PS1变量、设置登录界面为字符界面、修改软件源和进行vim基础优化等步骤。
280 2