1 Introduction
This document describes the fault management for host OS of DL380 Gen9 on top of which IPWorks VNF is deployed.
Target Groups
This document is intended for personnel working with Ericsson IPWorks. The following prior knowledge is required:
- Intermediate Linux and UNIX skills
- Concepts, terminologies, and telecommunication abbreviations, such as TCP/IP, Packet Data Networks, and Protocol Servers
1.1 Related Information
Trademark information, typographic conventions, and definition and explanation of abbreviations and terminology can be found in the following documents:
- Trademark Information, Reference [1]
- Typographic Conventions, Reference [2]
- Glossary of Terms and Acronyms, Reference [3]
2 Overview
DL380 Gen9 host OS Fault Management is achieved through Net-SNMP. All alarms are forwarded to the SNMP Manager on the Network Management System (NMS) such as OSS-RC through the SNMP agents.
2.1 SNMP
2.1.1 SNMP Versions Supported by IPWorks
DL380 Gen9 host OS Fault Management supports all SNMP versions: SNMPv1, SNMPv2, and SNMPv3. Enabling SNMP services between the DL380 Gen9 nodes and the SNMP client requires the configuration of the Gen9 nodes. The configuration varies for different SNMP versions.
SNMPv1 and SNMPv2c:
SNMP Management uses community-based access control for SNMPv1 and SNMPv2c. User can specify multiple community strings for read and write operations through the “rocommunity” and “rwcommunity” directives in the /etc/ipworks/common/snmp/snmpd.conf file.
These community strings only apply to SNMPv1 and SNMPv2c.
SNMPv3 provides much more sophisticated security mechanisms compared with SNMPv1 and SNMPv2c, implementing a User-based Security Model (USM) and a View-based Access Control Model (VACM). Section 3.1 describes how to implement these security mechanisms in the SNMP configuration file /etc/ipworks/common/snmp/snmpd.conf.
IPWorks SNMPv3 supports:
- The MD5 and SHA protocols for authentication.
- Enhanced security features such as encryption with DES and AES privacy protocols. However, Statistics Collection supports only DES for encryption and does not support AES.
2.1.2 SNMP Master Agent
By default, the SNMP Master Agent listens on port 161 and the SNMP Master Agent is configurable according to either of the following ways:
- Listening on a different port by editing the defaultport 161 directive in the /etc/ipworks/common/snmp/snmp.conf file.
- Listening on any domain, such as TCP and UDP, on any port of any address by editing the agentaddress... directive in the /etc/ipworks/common/snmp/snmpd.conf file.
By default, all the user configuration files for the SNMP Master Agent are stored in /etc/ipworks/common/snmp and all the configuration files for the SNMP system are stored in /var/net-snmp.
The SNMP Master Agent sends traps to any destination. To be able to send traps, user must configure it through directives “trapsink, trap2sink and trapsess” to send v1, v2c, and v3 version respectively in the file /etc/ipworks/common/snmp/snmpd.conf. For the detailed examples and descriptions about how to use those directives, refer to the /etc/ipworks/common/snmp/snmpd.conf file.
2.2 Alarms and Traps
The SNMP Master Agent supports the alternative methods of notifying events to an SNMP manager:
- Alarms defined in ERICSSON-ALARM-IRP-MIB
For more information on the traps and alarms, refer to IPWorks Alarm List for DL380 Gen9 Host Management, Reference [4].
2.2.1 Alarms According to Ericsson Alarm IRP MIB
The SNMP Master Agent supports generation of alarms according to ERICSSON-ALARM-IRP-MIB to maintain active alarm information.
When the SNMP Master Agent is configured to generate alarms according to ERICSSON-ALARM-IRP-MIB, it performs the following operations:
- Maintains the state of all alarms in a table called alarmTable. This enables OSS node to obtain active alarm information from all IPWorks nodes and to synchronize the alarm states at any time.
- Supports alarm synchronization (see Section 4.1), automatic alarm clearing, and manual alarm clearing (see Section 4.2) for the generated alarms.
The SNMP Master Agent sends an alarmNew notification when an alarm is raised and an alarmCleared notification when an alarm is cleared. For example,
- If a network interface link downs, the SNMP Agent sends a notification with an SNMP_TRAP_OID of alarmNew(.1.3.6.1.4.1.3881.2.2.0.1).
- If a network interface link ups, the SNMP Agent sends a notification with an SNMP_TRAP_OID of alarmClear(.1.3.6.1.4.1.3881.2.2.0.3).
For all automatically cleared alarms, the same alarm is not sent with snmpTrapOID of alarmNew twice. That means, if a specific alarm is already in the active alarm table, the same alarm is ignored when it is raised again. The same alarm is not sent to the trap receiver before it is cleared.
The SNMP Master Agent supports the following alarm attributes, which are defined in ERICSSON-ALARM-IRP-MIB.txt:
- notificationId
- alarmId
- alarmManagedObjectClass
- alarmManagedObjectInstance
- alarmEventTime
- alarmEventType
- alarmProbableCause
- alarmPerceivedSeverity
- alarmSpecificProblem
- alarmAdditionalText
The SNMP Master Agent does not support the following alarm attributes defined in ERICSSON-ALARM-IRP-MIB.txt:
- alarmAckUser
- alarmAckTime
- alarmCommentUser
- alarmCommentText
To enable SNMP alarms, configure the appropriate trap destination or destinations as described in Section 3.2.
- Note:
2.3 Supported MIBs
Standard MIB Files:
- ERICSSON-ALARM-IRP-MIB.txt
- HOST-RESOURCES-MIB.txt
- IANAifType-MIB.txt
- IF-MIB.txt
- INET-ADDRESS-MIB.txt
- LM-SENSORS-MIB.txt
- SNMP-FRAMEWORK-MIB.txt
- SNMP-NOTIFICATION-MIB.txt
- SNMP-TARGET-MIB.txt
- SNMPv2-CONF.txt
- SNMPv2-MIB.txt
- SNMPv2-SMI.txt
- SNMPv2-TC.txt
- SNMPv2-TM.txt
- UCD-SNMP-MIB.txt
- NET-SNMP-AGENT-MIB.txt
For all the above MIB files except NET-SNMP-AGENT-MIB.txt, refer to the /opt/ipworks/IPWcommon/mibs directory. For the NET-SNMP-AGENT-MIB.txt file, refer to the /usr/share/snmp/mibs directory.
The SNMP Master Agent supports alarm synchronization, alarm clearing, and alarm standard alignment according to ITU standards.
For alarms, which cannot be cleared automatically, IPWorks supports manual alarm clearing.
OSS-RC can, at any time, read the active alarm information from all IPWorks nodes to synchronize the alarm state. IPWorks nodes provide this information by accessing it from the Alarm Table.
Table 1, Table 2, and Table 3 show which objects defined in IF-MIB, HOST-RESOURCES-MIB and UCD-SNMP-MIB are supported by the SNMP Master Agent.
|
Object |
OID |
Supported |
|---|---|---|
|
ifNumber.0 |
.1.3.6.1.2.1.2.1 |
Yes |
|
ifTableLastChange |
.1.3.6.1.2.1.31.1.5 |
No |
|
ifTable |
.1.3.6.1.2.1.2.2 |
Yes |
|
ifXTable |
.1.3.6.1.2.1.31.1.1 |
Yes |
|
ifStackLastChange |
.1.3.6.1.2.1.31.1.6 |
No |
|
ifStackTable |
.1.3.6.1.2.1.31.1.2 |
No |
|
ifTestTable |
.1.3.6.1.2.1.31.1.3 |
No |
|
ifRcvAddressTable |
.1.3.6.1.2.1.31.1.4 |
|
Object |
OID |
Supported |
|---|---|---|
|
hrSystem |
.1.3.6.1.2.1.25.1 |
Yes |
|
hrMemorySize |
.1.3.6.1.2.1.25.2.2 |
Yes |
|
hrStorageTable |
.1.3.6.1.2.1.25.2.3 |
Yes |
|
hrDeviceTable |
.1.3.6.1.2.1.25.3.2 |
Yes |
|
hrProcessorTable |
.1.3.6.1.2.1.25.3.3 |
Yes |
|
hrNetworkTable |
.1.3.6.1.2.1.25.3.4 |
Yes |
|
hrPrinterTable |
.1.3.6.1.2.1.25.3.5 |
Yes |
|
hrDiskStorageTable |
.1.3.6.1.2.1.25.3.6 |
Yes |
|
hrPartitionTable |
.1.3.6.1.2.1.25.3.7 |
Yes |
|
hrFSTable |
.1.3.6.1.2.1.25.3.8 |
Yes |
|
hrSWOSIndex.0 |
.1.3.6.1.2.1.25.4.1 |
No |
|
hrSWRunTable |
.1.3.6.1.2.1.25.4.2 |
Yes |
|
hrSWRunPerfTable |
.1.3.6.1.2.1.25.5.1 |
Yes |
|
hrSWInstalled.*.0 |
.1.3.6.1.2.1.25.6 |
Yes |
|
hrSWInstalledTable |
.1.3.6.1.2.1.25.6.3 |
|
Object |
OID |
Supported |
|---|---|---|
|
prTable |
.1.3.6.1.4.1.2021.2 |
No |
|
Memory.* |
.1.3.6.1.4.1.2021.4 |
Yes |
|
extTable |
.1.3.6.1.4.1.2021.8 |
No |
|
dskTable |
.1.3.6.1.4.1.2021.9 |
Yes |
|
fileTable |
.1.3.6.1.4.1.2021.15 |
Yes |
|
laTable |
.1.3.6.1.4.1.2021.10 |
Yes |
|
systemStats.*.0 |
.1.3.6.1.4.1.2021.11 |
Yes |
|
ucdDemoMIBObjects |
.1.3.6.1.4.1.2021.2 |
Yes |
|
logMatch |
.1.3.6.1.4.1.2021.16 |
Yes |
|
version.*.0 |
.1.3.6.1.4.1.2021.100 |
Yes |
|
snmperrs.*.0 |
.1.3.6.1.4.1.2021.101 |
Yes |
|
mrTable (D) |
.1.3.6.1.4.1.2021.102 |
No |
For more information on the mentioned objects, refer to:
- IF-MIBIF-MIB, Reference [8].
- HOST-RESOURCES-MIBHOST-RESOURCES-MIB, Reference [9].
- UCD-SNMP-MIBUCD-SNMP-MIB, Reference [10].
3 Enabling Fault Management
To enable the fault management for host OS, trap destinations must be configured for all SNMP versions. For SNMPv3, an SNMPv3 user must be created first.
|
SNMP Version |
SNMPv1 |
SNMPv2 |
SNMPv3 |
|---|---|---|---|
|
Configuring Users |
No |
No |
Yes |
|
Configuring Trap Destinations |
Yes |
Yes |
Yes |
3.1 Configuring Users - SNMPv3
This section describes the user access configuration and testing of SNMPv3 interfaces in IPWorks. If SNMPv3 is used, SNMPv3 must be configured before enabling SNMP alarms and traps.
For SNMPv3 user configuration, the SNMP Master Agent uses two configuration files:
- The normal /etc/ipworks/common/snmp/snmpd.conf file
- Note:
- This file does not exist until the SNMP Master Agent is started at least once.
- The persistent /var/net-snmp/snmpd.conf file
SNMPv3 has two types of users: read-write users (rwuser) and read-only users (rouser).
There are various ways to configure SNMPv3 users. Two methods are presented as follows:
- By modifying the Net-SNMP configuration files as described in Section 3.1.1.
- By using the net-snmp-config tool as described in Section 3.1.2.
Users can configure multiple users for SNMPv3 access using the procedures outlined earlier. Users can also create multiple users using the snmpusm utility as described in Section 3.1.3.
- Note:
- To use the DES privacy, users must install the OpenSSL library first.
3.1.1 Creating SNMPv3 Users Using SNMP Configuration Files
3.1.1.1 Creating a User
- Stop the SNMP Master Agent.
- Create a user named ipworks who has read-write access to the SNMP statistics.
# vi /etc/ipworks/common/snmp/snmpd.conf
Add the following line to the file:
rwuser <username> <authentication type>
For example,
rwuser ipworks authNoPriv
- Note:
-
- The authNoPriv requests secure authentication, but not privacy. The SNMP packets themselves are not encrypted.
- The other possibilities are noauthnopriv (no authentication and no privacy) and authpriv (authentication and privacy).
- To create a user with read-only access, use the command rouser instead of rwuser. The rest of the procedure and parameters are the same as for rwuser.
Save the file and exit.
- Create an MD5 password.
# vi /var/net-snmp/snmpd.conf
Add the following file to the file:
createUser <username> MD5 <password>
For example,
createUser ipworks MD5 mysecretpass
This creates an MD5 password (mysecretpass) for personnel using the username ipworks.
Save the file and exit.
- Create a user with a DES passphrase in addition to an
MD5 password.
# vi /var/net-snmp/snmpd.conf
Add the following line to the file:
createUser <username> MD5 <password> DES <passphrase>
For example,
createUser ipworks MD5 mysecretpass DES mypassphrase
- Note:
-
- If users omit the DES mypassphrase, the Net-SNMP sets the DES passphrase to be the same as the MD5 password.
- The Net-SNMP requires the password and passphrase to be at least 8 characters long.
- When the SNMP Master Agent is started, it reads the configuration file, computes secret keys for the added users, and deletes the createUser commands from the file. It then places the secret key in the configuration file.
- This behavior has different consequences. The secret key is based on the engine ID, which for Net-SNMP is based on the IP address. Therefore, do not copy configuration files from one machine to another.
- Start the SNMP Master Agent.
3.1.1.2 Reconfiguring Net-SNMP
If users change a machine’s IP address, users must reconfigure Net-SNMP as follows:
- Stop the SNMP Master Agent
- Edit the /var/net-snmp/snmpd.conf file.
- Delete any entries Net-SNMP has added for users.
- Add createUser commands to create the users again.
- Restart the SNMP Master Agent.
When the SNMP Master Agent is started, it reads the configuration file, computes secret keys for the added users, and deletes the createUser commands from the file. It then places the secret key in the configuration file.
3.1.2 Creating SNMPv3 Users Using net-snmp-config
To create a user using net-snmp-config:
- Stop the SNMP Master Agent.
- Use the net-snmp-config tool
to create the user using either of the following commands:
# net-snmp-config --create-snmpv3-user -a <password> <username>
or:
# net-snmp-config --create-snmpv3-user
For example:
# net-snmp-config --create-snmpv3-user -a "admin1234" admin
If users use the second version of the command above, the net-snmp-config tool prompts users to enter the username, the authentication passphrase, and the encryption passphrase, one by one.
- Note:
- The password must be at least eight characters long. The example creates the user admin with the password admin1234 (and uses MD5 and DES for protection)
The net-snmp-config command adds the information for the created user to the /var/net-snmp/snmpd.conf file in encrypted form, and the information on users’ read-write permissions to the /etc/ipworks/common/snmp/snmpd.conf file.
For example, the above command adds the line createUser admin MD5 "admin1234" DES in the encrypted form to the file /var/net-snmp/snmpd.conf and rwuser admin to file /etc/ipworks/common/snmp/snmpd.conf. This means that the created user has read-write permission. Users can change the user permissions by editing the file snmpd.conf.
- Restart the SNMP Master Agent to let the changes take effect.
To create a user with read-only permissions, use the net-snmp-config command as follows:
# net-snmp-config --create-snmpv3-user -ro -A <authpass> -X <privpass> -a MD5 -x DES <username>
For example:
# net-snmp-config --create-snmpv3-user -ro -A admin1234 -X admin1234 -a MD5 -x DES admin
For more information on creating SNMPv3 users using net-snmp-config, enter net-snmp-config /help.
3.1.3 Creating Multiple SNMPv3 Users Using snmpusm
Users can use the snmpusm utility to configure multiple users based on the configuration of an existing user. It is achieved by modifying the user database using the SNMP protocol when the SNMP Master Agent is running. The snmpusm utility cannot create users from scratch.
To create the first user:
- Stop the SNMP Master Agent.
- Create a SNMPv3 user with read and write permissions. This is described in Section 3.1.1.
- Restart the SNMP Master Agent and test the setup.
# snmpget -v 3 -u ipworks -l authNoPriv -a MD5 -A my_password localhost sysUpTime.0
To create a second user:
- Start the SNMP Master Agent if it is not running.
- Clone a second user from the first user using the following
command:
# snmpusm -v 3 -u ipworks -l authNoPriv -a MD5 -A my_password localhost create ipworks2 ipworks
The above command creates user ipworks2 with the same parameters as the user ipworks.
- Change the second user's password using the following
command:
# snmpusm -v 3 -u ipworks2 -x DES -X my_passphrase -a MD5 -A my_password localhost passwd my_password new_password
Where:
new_password is the new password assigned to the second user ipworks2. However, one configuration line must be added into the file /etc/ipworks/common/snmp/snmpd.conf to allow the user to access SNMPv3 and restart the SNMP Master Agent after editing the snmpd.conf file.
For more information on snmpusm usage, refer to Net-SNMP WebsiteNet-SNMP Website, Reference [13].
3.1.4 Changing User Properties and Removing Users
- To change SNMP v3 security level for a user:
- First find the directive "rwuser" (or rouser) in /etc/ipworks/common/snmp/snmpd.conf, for example, rwuser ipworks authNoPriv.
- Change the security level authNoPriv (authentication and no Privacy) for the user "ipworks" to noauthnopriv (no authentication and no privacy) or authpriv (authentication and privacy). If no security level is specified, the default is authNoPriv.
- To change read-write access for a user:
- Find the directive "rwuser" (read-write user) or "rouser" (read-only user) in /etc/ipworks/common/snmp/snmpd.conf and make the change accordingly.
- To change user authentication and privacy password:
- For authentication password, use the following command:
# snmpusm -v 3 -l authPriv -u test1 -a MD5 -A admin1234 -x DES -X admin1235 -Ca localhost passwd admin1234 admin1111 <user> - For privacy password, use the following command:
# snmpusm -v 3 -l authPriv -u test1 -a MD5 -A admin1234 -x DES -X admin1235 -Cx localhost passwd admin1235 admin2222 <user>The user "ipworks" is one of the SNMP v3 users that has already been correctly configured and has the write access.
If the <user> is omitted, by default it changes the password of the user specified by the option "-u".
- For authentication password, use the following command:
- To remove user "test":
- Use the following command to remove the user "test".
# snmpusm -v 3 -u ipworks -l \
authNoPriv -a MD5 -A my_password localhost delete test
The user "ipworks" is one of the SNMP v3 users that has already been correctly configured and has the write access.
- Use the following command to remove the user "test".
- Note:
-
- When the snmpusm command is used, users must start the SNMP Master Agent first.
- If users want to create a user and change the password through an existing user, the SNMP Master Agent only need to be restarted once. If users want to create a user and change the password through the new user, the SNMP Master Agent needs to be restarted twice because the new user will only be activated after the SNMP Master Agent is restarted.
3.1.5 Testing SNMPv3 Configuration
Users can test the SNMPv3 configuration to verify that the user has obtained results with the specified username and authentication parameters.
Use the following command to verify SNMPv3 configuration.
# snmpget -v <version> -u <user> -l <seclevel> -a <authProtocol> -A <authPassword> -x <privProtocol> -X <privPassword> <hostname> <objectOid or objectname>
For example,
# snmpget -v 3 -u ipworks -l authNoPriv -a MD5 -A mysecretpass localhost sysUpTime.0
To give a user privacy (encryption) in addition to authentication, use the following command:
# snmpget -v 3 -u ipworks -l authPriv -a MD5 -A mysecretpass -x DES -X mypassphrase localhost sysUpTime.0
3.2 Configuring Trap Destinations
This section describes how to configure the destinations for traps and alarms using one or more directives in the /etc/ipworks/common/snmp/snmpd.conf file. For more information on SNMP configuration, refer to the Net-SNMP documents in Net-SNMP README filesNet-SNMP README files, Reference [14].
- Note:
-
- After editing the /etc/ipworks/common/snmp/snmpd.conf file, users must restart the SNMP Master Agent.
# /etc/init.d/ipworks.snmpd stop
#/etc/init.d/ipworks.snmpd start
- After editing the /etc/ipworks/common/snmp/snmpd.conf file, users must restart the SNMP Master Agent.
3.2.1 Sending SNMPv1 Traps
Use the trapsink directive to send SNMPv1 traps to the SNMP Manager.
The following entry in the /etc/ipworks/common/snmp/snmpd.conf file defines the hosts that are to receive SNMPv1 traps or alarms:
trapsink <HOST> [<COMMUNITY> [<PORT>]]
Where:
<HOST> is either the IP address or the hostname of the machine to which the traps or alarms are to be sent.
Users can specify multiple trapsink lines to specify multiple destinations. If users do not specify the <COMMUNITY>, the SNMP Master Agent uses the community string from a preceding trap directive. If users do not specify the <PORT>, the SNMP Master Agent sends traps to the default SNMP trap port (162). The default destination is localhost.
For example: Either of the following directives causes the SNMP Master Agent to send SNMPv1 traps to the host with IP address “100.0.0.2” and hostname “ipworks03”:
trapsink 100.0.0.2 public 162
or
trapsink ipworks03 public 162
3.2.2 Sending SNMPv2 Traps
Use the trap2sink directive to send SNMPv2 traps to the SNMP Manager.
The following entry in the /etc/ipworks/common/snmp/snmpd.conf file defines the hosts that are to receive SNMPv2 traps or alarms:
trap2sink <HOST> [<COMMUNITY> [<PORT>]]
Where:
<HOST> is either the IP address or the hostname of the machine to which the traps or alarms are to be sent.
Users can specify multiple trap2sink lines to specify multiple destinations. If users do not specify the <COMMUNITY>, the SNMP Master Agent uses the community string from a preceding trap directive. If users do not specify the <PORT>, the SNMP Master Agent sends traps to the default SNMP trap port (162). The default destination is localhost.
For example: Either of the following directives causes the SNMP Master Agent to send SNMPv2 traps to the host with IP address “100.0.0.2” and hostname “ipworks03”:
trap2sink 100.0.0.2 public 162
or
trap2sink ipworks03 public 162
3.2.3 Sending SNMPv3 Traps
Simply speaking, SNMPv3 traps are SNMPv2 traps with added authentication and privacy capabilities. Use the trapsess directive to send SNMPv3 traps to the SNMP Manager. It is a more generic trap configuration token that allows any type of trap destination to be specified with any version of SNMP.
The following entry in the /etc/ipworks/common/snmp/snmpd.conf file defines the hosts that are to receive SNMPv3 traps or alarms:
trapsess -v <version> -e <localengid> -u <user> -l <seclevel> -a <authProtocol> -A <authPassword> <hostname>:<port>
Where:
<localengid> is the authoritative engineId used for SNMPv3 Request messages.
Users can specify multiple trapsess lines to specify multiple destinations. If users do not specify the <port>, the SNMP Master Agent sends traps to the default SNMP trap port (162). The default trap destination is localhost.
For example:
trapsess -v 3 -e 0x0102030405 -u admin \
-l authNoPriv
-a MD5 -A admin123 localhost:162
The SNMP Master Agent sends a cold start trap when it starts up. If enabled, it also sends traps on authentication failures.
4 Fault Management Activities
Fault Management activities include alarm synchronization, manual alarm clearing, notification threshold configuration, platform alarm configuration, and trap handler configuration.
4.1 Alarm Synchronization
IPWorks SNMP supports alarm synchronization. The SNMP Master Agent maintains all active alarm information in an alarm table. If the SNMP Manager on the NMS is shut down and then restarted, it still can retrieve the alarm information from the alarm table.
When an alarm is raised, the SNMP Master Agent sends an alarmNew notification to an SNMP Manager and adds the alarm to the alarm table.
When an alarm is cleared, the SNMP Master Agent removes the alarm from the alarm table and thus the alarm is no longer accessible. Meanwhile the Master Agent sends an alarmCleared notification to the SNMP Manager with the same alarm id as the alarmNew notification in the var-bind list. Therefore the alarm table always contains the list of alarms active on an IPWorks node at any point.
The SNMP Master Agent generates every notification with a unique notificationId and maintains a unique alarmId for all new alarms raised. The SNMP Master Agent maintains the same alarmId for both the alarmNew and its corresponding alarmCleared notification.
For example, Table 4 shows an example of an active alarm table with interface down alarm.
|
notificationId |
1 |
|
alarmId |
1 |
|
alarmManagedObjectClass |
ipworksDisman |
|
alarmManagedObjectInstance |
DN_Prefix:DC=ipworks.com,g3SubNetwork=US,Node_Distinguished_Name=cluster3-b-1,interface=3 |
|
alarmEventTime |
2017-2-9,3:34:33.0,-5:0 |
|
alarmEventType |
communicationsAlarm(2) |
|
alarmProbableCause |
x733CommunicationsProtocolError(305) |
|
alarmPerceivedSeverity |
major(2) |
|
alarmSpecificProblem |
linkDown,communication link failure |
The alarm table is stored in a persistent file (on disk) to retain the alarm table between SNMP Agent reboots. The persistent file is named as /var/net-snmp/ipworks_snmpdata.conf.
To ensure that the persistent file is not deleted, use the noreset argument when executing the /etc/init.d/ipworks.snmpd script from the command-line prompt:
# /etc/init.d/ipworks.snmpd start noreset
The OS reboot always start the SNMP Master Agent without deleting the persistent files.
To start SNMP Master Agent without retaining the previous raised alarms, execute the /etc/init.d/ipworks.snmpd script from the command line without noreset parameter:
# /etc/init.d/ipworks.snmpd start
4.2 Manual Alarm Clearing
IPWorks SNMP provides the function to clear the alarms from the alarm table manually.
4.2.1 Prerequisites
To clear alarms manually, the snmpd and snmptrapd applications must be running.
The definitions for these applications are as follows:
| snmpd | snmpd is an SNMP Agent which binds to a port and awaits requests from SNMP management software. | |
| snmptrapd | snmptrapd is an SNMP application that receives traps (trap receiver) and forwards them to the SNMP Master Agent. | |
snmpd and snmptrapd in IPWorks are the SNMP Master Agent and Trap Handler respectively. Users can start the two by executing the command /etc/init.d/ipworks.snmpd start noreset and /etc/init.d/ipworks.snmptrapd start. For SNMPv3, additional configuration on Trap Handler is required. See Section 4.4 for more information.
4.2.2 Manual Alarms Clearing Using snmptrap
snmptrap is an SNMP application that forms and sends an SNMP TRAP message to a trap receiver.
4.2.2.1 Manual Alarms Clearing for SNMPv2c
For SNMPv2c, the syntax to clear an alarm entry manually is shown as follows:
# snmptrap -v 2c [<COMMON OPTIONS>] uptime <trap-oid> [<OID> <TYPE> <VALUE>]...
Where:
- <Common Options>: See Linux Man Page.
- uptime: a system command
to obtain the system time.
If the user uses two single quotes ‘ ‘ in place of the uptime string, snmptrap inserts the current system time into the trap.
- <trap-oid>: the SNMP_TRAP_OID of the alarmCleared notification defined in ERICSSON-ALARM-IRP-MIB.txt.
- <OID> <TYPE> <VALUE>:
- The object identifiers (OIDs) alarmId, alarmManagedObjectClass, and alarmPerceivedSeverity including their types and values must be specified as inputs to the snmptrap command.
- The alarmId value should be set as the alarmId value of the row to be removed from the alarmTable and managedObjectClass refers to the managedObjectClass of that particular alarm entry.
- The alarmPerceivedSeverity value is always 5 for manual alarm clearing.
For example,
To clear an alarm Entry for the Link Down with alarmId 5, follow the instructions as follows:
# snmptrap -v 2c -c public localhost 42 .1.3.6. 1.4.1.3881.2.2.0.3 .1.3.6.1.4.1.3881.2.1.8.1.1 i 5 .1.3.6.1.4.1.3881.2.1.8.1.2 s "ipworksDisman" .1.3.6.1.4.1.3881.2.1.8.1.7 i 5
Where:
- .1.3.6.1.4.1.3881.2.2.0.3 is the snmpTrapOID for alarmCleared notification.
- .1.3.6.1.4.1.3881.2.1.8.1.1 is the OID for the attribute alarmId.
- .1.3.6.1.4.1.3881.2.1.8.1.2 is the OID for the attribute managedObjectClass.
- .1.3.6.1.4.1.3881.2.1.8.1.7 is the OID for the attribute alarmPerceivedSeverity.
- i stands for integer type.
- s stands for string type.
4.2.2.2 Manual Alarms Clearing for SNMPv3
For SNMPv3, the syntax to clear an alarm entry manually is shown as follows:
# snmptrap -e <localengineID> -v 3 -u <user> -a <authentication-protocol> -A <pass-phrase> localhost <uptime> .1.3.6.1.4.1.3881.2.2.0.3 .1.3.6.1.4.1.3881.2.1.8.1.1 i <alarmId> .1.3.6.1.4.1.3881.2.1.8.1.2 s "<managedObjectClass>" .1.3.6.1.4.1.3881.2.1.8.1.7 i 5
For example:
To clear an alarm entry 4 using SNMPv3 for user ipworksuser:
# snmptrap -e 0x0102030405 -v 3 -u ipworksuser -a MD5 -A "ipworksuser123" localhost 42 .1.3.6.1.4.1.3881.2.2.0.3 .1.3.6.1.4.1.3881.2.1.8.1.1 i 4 .1.3.6.1.4.1.3881.2.1.8.1. 2 s "ipworksDisman" .1.3.6.1.4.1.3881.2.1.8.1.7 i 5
4.2.3 Using alarmviewer Tool to clear Alarms Manually
Compared with the snmptrap, the alarmviewer tool is more convenient for the users to clear alarms manually.
To clear alarms using the alarmviewer:
- List all the alarms.
# alarmviewer
registered debug token dump, 1 =========================================================all alarm====================================================== ID TIMESTAMP SEVERITY Description 1 2017-2-22 1:28:42.0 major An interface is down 2 2017-2-22 1:28:42.0 major An interface is down 3 2017-2-22 1:28:43.0 major lmFanSensorsValue.1 threshold limit exceeded ========================================================================================================================
- Follow the output instruction to enter the alarmID(s)
and proceed with Enter. For example,
Enter alarmID list you want to delete 0-----Exit a-----All alarmID list must delimits each alarmID using comma, sucha as '3,4,12' :2 Are you sure that related status of these alarm have been ok and clean these alarm:2 !! (no-cancel, yes-continue): yes
- Confirm that the alarm is cleared.
# alarmviewer
For example, the following output shows the alarmID 2 is deleted.
registered debug token dump, 1 =========================================================all alarm====================================================== ID TIMESTAMP SEVERITY Description 1 2017-2-22 1:28:42.0 major An interface is down 3 2017-2-22 1:28:43.0 major lmFanSensorsValue.1 threshold limit exceeded ======================================================================================================================== Enter alarmID list you want to delete 0-----Exit a-----All alarmID list must delimits each alarmID using comma, such as '3,4,12' :
Enter 0 to exit.
4.3 Platform Alarm Configuration
The SNMP Master Agent is able to generate a few traps itself. The Master Agent checks its own data at regular intervals and sends out traps when certain conditions occur, such as “disk is full”, or “CPU is overloaded” or “the selected process is not running”. It sends these traps to SNMP managers specified in the snmpd.conf file.
For example: when starting up, the SNMP Master Agent generates an SNMPv2-MIB::coldStart trap, and when shutting down, it generates a UCD-SNMP-MIB::ucdShutDown trap.
IPWorks SNMP supports the following general platform alarms.
- Disk usage is more than the configured threshold (Disk Space Utilization)
- System Load Monitoring is more than the configured value (CPU Utilization)
- Memory Utilization goes beyond the configured threshold
- Network Interface UP/DOWN conditions
- Network Traffic Load
- Environment variables (Temperature, Fan Status, Power Supply) exceed a certain limit or are not within the predefined scope.
The SNMP Master Agent sends the traps when it first detects these conditions and not during each evaluation.
4.3.1 Disk Usage Monitoring
The SNMP Master Agent can raise an alarm for a system on which IPWorks is installed when the available disk space falls below a certain percentage (threshold value). Currently, SNMP only monitors the Complete Physical Disk, not slices and partitions. This value can be configured by including directives of the following form in the SNMP Master Agent configuration file /etc/ipworks/common/snmp/snmpd.conf:
disk <PATH> [<MINPERCENT>%]
Where <PATH> is the pathname of any of the disk partitions and <MINPERCENT> is the percentage of available disk space below which the alarm is raised.
For example:
disk / 15%
The SNMP Master Agent checks the disk mounted at each <PATH> for available disk space. If the disk space available is less than the configured <MINPERCENT> (%), the SNMP Master Agent sends an alarm to the configured SNMP managers.
In the example above, the SNMP Master Agent raises an alarm if the free disk space left on any one of the listed partitions falls below 15%.
Use the following directive to specify all disks available on the system:
includeAllDisks <MINPERCENT>%
- Note:
- The includeAllDisks directive only includes the disks that are mounted when the snmpd daemon is started. It cannot include disks that are dynamically loadable, such as with automount. Mount all the disks that must be monitored before starting the snmpd daemon.
There can only be one includeAllDisks directive in the configuration file. This can be used with the disk directive. The threshold value given in a disk directive overrides the threshold value specified by the includeAllDisks directive, irrespective of the order in which the directives appear in the configuration file.
To send an alarm when the disk is full, the SNMP Master Agent uses /opt/ipworks/IPWcommon/mibs/UCD-SNMP-MIB.txt. For more information on these two MIB files, refer to UCD-SNMP-MIBUCD-SNMP-MIB, Reference [10]. These two files are installed with IPWorks by default. These alarms are always enabled by default. User can disable them by commenting out the line as follows in the file /etc/ipworks/common/snmp/snmpd.conf:
monitor -u cjslyxz -r 600 -o dskPath -o dskErrorMsg “dskTable” dskErrorFlag ! =0
Tip: When the occupied disk space is released and the available disk space is more than the configured threshold value, the raised alarm can be automatically cleared.
4.3.2 System Load Monitoring
The IPWorks SNMP Master Agent monitors the average load of the local system, specifying thresholds for the 1 minute, 5 minute and 15 minute averages. If any of these loads exceed the associated maximum value, the SNMP Master Agent sets the corresponding laErrorFlag instance to 1 and raises an alarm.
Tip: When the system average load drops below the configured threshold based on the specific period granularity, the raised alarm can be automatically cleared.
User can configure the value of load by including the following directive in the SNMP Master Agent configuration file /etc/ipworks/common/snmp/snmpd.conf:
load <MAX1> [<MAX5> [<MAX15>]]
- Configure the value as follows:
- For 1 minute, the average value: N*1.6
- For 5 minutes, the average value: N*0.9
- For 15 minutes, the average value: N*0.7
For easy use, round the average value to the nearest integer. N is the number of the CPUs, which can be checked using the following commands:
- Check CPU information.
#cat /proc/cpuinfo
- Check the number of CPUs.
#grep -c 'model name' /proc/cpuinfo
For example, if N is 8, configure the value as follows:
load 13 7 6
If user omits <MAX15>, the SNMP Master Agent uses <MAX5> as both the 5-minute threshold and the 15-minute threshold. If user omits both <MAX5> and <MAX15>, the SNMP Master Agent uses <MAX1> as the value of all three thresholds.
The following directive is also configured to raise an alarm when the CPU average loads exceed the configured thresholds:
monitor -u cjslyxz -o laNames -o laErrMessage "laTable" laErrorFlag !=0
4.3.3 Swap Space Monitoring
The following directive instructs the SNMP Master Agent to monitor the amount of swap space available on the local system. If this falls below the specified threshold (MIN KB), the SNMP Master Agent sets the memErrorSwapobject to 1, and raises an alarm.
swap <MIN>
For example:
swap 512000
In this example, the SNMP Master Agent raises an alarm if the available swap space falls below 512 MB.
The following directive is also configured to raise an alarm when the available swap space falls below the configured threshold:
monitor -u cjslyxz -o memErrorName -o memSwapErrorMsg "memory" memSwapError !=0
Tip: When the available swap space increases and is more than the configured threshold value, the raised alarm can be automatically cleared.
4.3.4 Memory Usage Monitoring
User can monitor the memory usage of any process using Net-SNMP by adding the following command to the SNMP configuration file snmpd.conf:
monitor -u cjslyxz -o hrSWRunName \
"high process memory"
hrSWRunPerfMem > 40000000
If memory usage of any process exceeds the specified threshold (KB), the SNMP Master Agent raises an alarm.
Tip: When the memory usage drops below the configured threshold value, the raised alarm can be automatically cleared. However, a special case occurs that if you shut down the process related the raised alarm, when restarting the IPWorks server that raised the original alarm, even the memory usage is lower than the configured threshold, the original raised alarm cannot be automatically cleared.
4.3.5 Link up and Link down Notifications
The IPWorks SNMP Master Agent supports the linkup and linkdown notifications for network interfaces being taken up and down.
The SNMP Agent raises these notifications if the /etc/ipworks/common/snmp/snmpd.conf contains the following directive:
notificationEvent linkUpTrap linkUp ifIndex ifAdminStatus ifOperStatus
notificationEvent linkDownTrap linkDown ifIndex ifAdminStatus ifOperStatus
monitor -u cjslyxz -r 600 -e linkUpTrap "Generate linkUp" ifOperStatus !=2
monitor -u cjslyxz -r 600 -e linkDownTrap "Generate linkDown" ifOperStatus ==2
To suppress the notifications, comment out the above lines.
According to the default configuration, IPWorks SNMP monitors all Ethernet cards. If the user does not want the link down alarm to be generated from the unused Ethernet cards, apply one of the following methods:
Method 1
Assume that there are two Ethernet cards in the machine, and we only monitor eth0.
- Execute the following command to show all interface
names:
# snmpwalk -v 2c localhost ifDescr
registered debug token dump, 1
.1.3.6.1.2.1.31.1.1.1.1.1 = STRING: lo
.1.3.6.1.2.1.31.1.1.1.1.2 = STRING: eth0
.1.3.6.1.2.1.31.1.1.1.1.3 = STRING: eth1
- Edit the SNMP configuration file as follows:
notificationEvent eth0_linkUpTrap linkUp ifIndex.2 ifAdminStatus.2 ifOperStatus.2 ifName.2 ifDescr.2
notificationEvent eth0_linkDownTrap linkDown ifIndex.2 ifAdminStatus.2 ifOperStatus.2 ifName.2 ifDescr.2
monitor -u cjslyxz -t -r 600 -e eth0_linkUpTrap "eth0 linkUp" -I ifOperStatus.2 != 2
monitor -u cjslyxz -t -r 600 -e eth0_linkDownTrap "eth0 linkDown" -I ifOperStatus.2 == 2
Method 2
Example:
- Execute the following command to show all the interfaces
in driver.
# ls -l /sys/bus/pci/drivers/bnx2
total 0
lrwxrwxrwx 1 root root 0 Sep 24 11:34 0000:02:00.0 ->
../../../../devices/pci0000:00/0000:00:1c.0/0000:02:0 0.0lrwxrwxrwx 1 root root 0 Sep 24 11:34 0000:02:00.1 ->
../../../../devices/pci0000:00/0000:00:1c.0/0000:02:0 0.1 - Disable an unused interface, for example, eth1:
- Find the one to be disabled:
# ls -Ll /sys/bus/pci/drivers/bnx2/0000:02:00.1/net
total 0
drwxr-xr-x 4 root root 0 Sep 24 11:34 eth1
- Disable the eth1 interface:
# echo "0000:02:00.1" >/sys/bus/pci/drivers/bnx2/unbind
- Note:
- "0000:02:00.1" is the name of eth1 in driver.
To enable the interface, execute # echo "0000:02:00.1" >/sys/bus/pci/drivers/bnx2/bind or reboot OS.
- Find the one to be disabled:
4.3.6 Interface Traffic Monitoring
User can monitor the interface traffic usage of any interface using SNMP Master Agent by adding the following command to the SNMP configuration file snmpd.conf:
monitor -u cjslyxz -D -r 600 -o ifDescr "network traffic"
ifHCInOctets 10000000 2000000000
If the total number of octets received on any interface (delta differences between sample values) rises above the upper threshold (50000000), then the SNMP Master Agent raises an alarm. If the total number of octets received on any interface (delta differences between sample values) falls below the lower threshold (10000000), the raised alarm is automatically cleared.
- Note:
- Ensure that adjust the threshold value based on the actual network station.
4.3.7 Environment Variables Monitoring (LM-Sensors)
4.3.7.1 General
The Net-SNMP Master Agent monitors the environmental variables, such as Temperature, Fan Status and Power Supply, and raise alarms when they exceed the specified threshold or are not within the predefined scope.
Tip: When the temperature drops below the configured threshold value or the fan status returns to normal level, the raised alarm can be automatically cleared; When the power supply returns to the normal value that stays within the configured range, the raised alarm can be automatically cleared.
IPWorks uses the ipmitool API to get hardware Sensors names and values, and set them to the corresponding Net-SNMP LM-Sensors.
- Note:
- Remember that before running the ipmitool command, the users must start the ipmit utility first by running command /etc/init.d/ipmi start.
One SensorsEntry corresponds to one sensor. Each sensor has an index. For example,
- For the Temperature Sensors:
The Temperature sensors name is set to lmTempSensorsDevice.
The Temperature sensors value is set to lmTempSensorsValue.
The following screenshot is fetched from the NET-SNMP MIB File: LM-SENSORS-MIB.txt.
Use the snmp directive to check these values. For example,
# snmpwalk -v 2c localhost lmTempSensorsDevice
- For the Power Supply Sensors:
The Power Supply sensors name is set to lmPSSensorsDevice.
The Power Supply sensors value is set to lmPSSensorsValue.
The following screenshot is fetched from the NET-SNMP MIB File: LM-SENSORS-MIB.txt.
Use the snmp directive to check these values. For example,
# snmpwalk -v 2c localhost lmPSSensorsDevice
- For the Fan Sensors:
The Fan sensors name is set to lmFanSensorsDevice.
The Fan sensors value is set to lmFanSensorsValue.
The following screenshot is fetched from the NET-SNMP MIB File: LM-SENSORS-MIB.txt.
Use the snmp directive to check these values. For example,
# snmpwalk -v 2c localhost lmFanSensorsDevice
4.3.7.2 Temperature Sensors Example
4.3.7.2.1 Fetching the Current Values
Execute the following command to fetch the current temperature values:
# ipmitool -v sdr type Temperature
For example,
Sensor ID : Temp 1 (0xd) Entity ID : 39.1 (External Environment) Sensor Type (Analog) : Temperature Sensor Reading : 21 (+/- 0) degrees C Status : ok Positive Hysteresis : Unspecified Negative Hysteresis : Unspecified Minimum sensor range : -127.000 Maximum sensor range : Unspecified Event Message Control : Entire Sensor Only Readable Thresholds : ucr unr Settable Thresholds : Threshold Read Mask : ucr unr ...
4.3.7.2.2 Checking the Thresholds
Execute the following command to fetch the temperature thresholds:
# hplog -t
For example,
ID TYPE LOCATION STATUS CURRENT THRESHOLD 1 Basic Sensor Ambient Normal 69F/ 21C 105F/ 41C 2 Basic Sensor CPU (1) Normal 104F/ 40C 179F/ 82C 3 Basic Sensor CPU (2) Normal 104F/ 40C 179F/ 82C 4 Basic Sensor Memory Board Normal 82F/ 28C 188F/ 87C
4.3.7.2.3 Checking Alarm Details When an Alarm is Raised
If an alarm is raised, use the following command to check the alarm details:
# snmpwalk -v 2c localhost alarmtable
Follow the procedure to set the threshold and clear the alarm:
registered debug token dump, 1 .1.3.6.1.4.1.3881.2.1.8.1.1.2 = INTEGER: 2 .1.3.6.1.4.1.3881.2.1.8.1.2.2 = STRING: "ipworksDisman" .1.3.6.1.4.1.3881.2.1.8.1.3.2 = STRING: "DN_Prefix:DC=ipworks.com,g3SubNetwork=US,Node_Distinguished_Name=ipwm10ss-01" .1.3.6.1.4.1.3881.2.1.8.1.4.2 = STRING: 2013-8-6,21:8:29.0,+8:0 .1.3.6.1.4.1.3881.2.1.8.1.5.2 = INTEGER: environmentalAlarm(3) .1.3.6.1.4.1.3881.2.1.8.1.6.2 = INTEGER: x733ThresholdCrossed(351) .1.3.6.1.4.1.3881.2.1.8.1.7.2 = INTEGER: major(2) .1.3.6.1.4.1.3881.2.1.8.1.8.2 = STRING: "Temperature Level Threshold Reached" .1.3.6.1.4.1.3881.2.1.8.1.9.2 = "" .1.3.6.1.4.1.3881.2.1.8.1.10.2 = STRING: .1.3.6.1.4.1.3881.2.1.8.1.11.2 = "" .1.3.6.1.4.1.3881.2.1.8.1.12.2 = "" .1.3.6.1.4.1.3881.2.1.8.1.13.2 = STRING: "lmTempSensorsvalue.1 threshold limit exceeded " |
4.3.7.2.4 Configuring the Thresholds
- Modify the /etc/ipworks/common/snmp/snmpd.conf file according to your hardware.
# vi /etc/ipworks/common/snmp/snmpd.conf
For example,
monitor -u cjslyxz -o lmTempSensorsDevice.1 -I lmTempSensorsvalue.1 lmTempSensorsValue.1 >= 41000 ...
Where:
- 1 in lmTempSensorsDevice.1 is the value of corresponding lmTempSensorsIndex. The value of lmTempSensorsIndex corresponds to the Sensor ID displayed when using command ipmitool -v sdr type Temperature to fetch the current temperature value (see Section 4.3.7.2.1). During the process of configuring the threshold, you can skip the IDs of the disabled sensors. Read the output after executing the command ipmitool -v sdr type Temperature, if the Sensor Reading shows Disabled, it means the sensor is disabled.
- -u specifies a security name to be used for scanning the local host, instead of the default iquerySecName. The user must be explicitly created and given suitable access rights.
- -o defines the additional varbinds to be added to the notification payload when this monitor trigger fires.
- -I indicates that the monitored expression must be applied to the specified OID as a single instance. By default, the OID is treated as a wildcarded object, and the monitor expanded to cover all matching instances.
- Restart the SNMP service to let the configuration take
effect.
- Clear all alarms in the alarm table:
# /etc/init.d/ipworks.snmpd stop
# /etc/init.d/ipworks.snmpd start
- Keep all alarms in the alarm table:
# /etc/init.d/ipworks.snmpd stop
# /etc/init.d/ipworks.snmpd start noreset
- Clear all alarms in the alarm table:
4.3.7.3 Power Supply Sensors Example
4.3.7.3.1 Fetching the Current Values
Execute the following command to fetch the current power supply value:
# ipmitool -v sdr type 'Power Supply'
For example,
Sensor ID : Power Supply 1 (0x3) Entity ID : 10.1 (Power Supply) Sensor Type (Analog) : Power Supply Sensor Reading : 95 (+/- 0) Watts Status : Lower Non-Critical Positive Hysteresis : Unspecified Negative Hysteresis : Unspecified Minimum sensor range : Unspecified Maximum sensor range : Unspecified Event Message Control : Entire Sensor Only Readable Thresholds : No Thresholds Settable Thresholds : No Thresholds ...
4.3.7.3.2 Checking the Thresholds
Execute the following command to fetch the threshold of the power supply sensors predefined in the snmpd.conf file:
# vi /etc/ipworks/common/snmp/snmpd.conf
For example,
monitor -u cjslyxz -o lmPSSensorsValue.11 -I lmPSSensorsValue.11 lmPSSensorsValue.1 < 10000 monitor -u cjslyxz -o lmPSSensorsValue.12 -I lmPSSensorsValue.12 lmPSSensorsValue.1 > 150000 monitor -u cjslyxz -o lmPSSensorsValue.21 -I lmPSSensorsValue.21 lmPSSensorsValue.2 < 10000 monitor -u cjslyxz -o lmPSSensorsValue.22 -I lmPSSensorsValue.22 lmPSSensorsValue.2> 150000 |
- Note:
-
- The example shows that the current value -Sensor Reading 95*1000 is within the threshold range 10000(min)~150000(max). If the value is less than 10000 or greater than 150000, one alarm is raised.
- Noted that different hardware has different sensor IDs.
- On HP DL380 G8 server, sensor IDs of Power supply are lmPSSensorsValue.1 and lmPSSensorsValue.2 .
- On HP DL380 G9 server, sensor IDs of Power supply are lmPSSensorsValue.2 and lmPSSensorsValue.4.
It is recommended to run following commands to confirm the hardware before modifying:
snmpwalk -v 2c localhost -c public lmPSSensorsValue snmpwalk -v 2c localhost -c public lmPSSensorsDevice
4.3.7.3.3 Checking Alarm Details When an Alarm is Raised
If an alarm is raised, use the following command to check the alarm details:
# snmpwalk -v 2c localhost alarmtable
4.3.7.3.4 Configuring the Thresholds
- Modify the threshold to a higher level in the /etc/ipworks/common/snmp/snmpd.conf file.
# vi /etc/ipworks/common/snmp/snmpd.conf
For example, if the current value is 155*1000, modify the file as follows:
monitor -u cjslyxz -o lmPSSensorsValue.11 -I lmPSSensorsValue.11 lmPSSensorsValue.2 < 10000 monitor -u cjslyxz -o lmPSSensorsValue.12 -I lmPSSensorsValue.12 lmPSSensorsValue.2 > 160000 monitor -u cjslyxz -o lmPSSensorsValue.21 -I lmPSSensorsValue.21 lmPSSensorsValue.4 < 10000 monitor -u cjslyxz -o lmPSSensorsValue.22 -I lmPSSensorsValue.22 lmPSSensorsValue.4 > 160000
- Restart the SNMP service to let the configuration take
effect.
- Clear all alarms in the alarm table:
# /etc/init.d/ipworks.snmpd stop
# /etc/init.d/ipworks.snmpd start
- Keep all alarms in the alarm table:
# /etc/init.d/ipworks.snmpd stop
# /etc/init.d/ipworks.snmpd start noreset
- Clear all alarms in the alarm table:
4.3.7.4 Fan Sensors Example
For Fan sensors, the warning threshold levels are described by different levels with one specific number for each level, defined as follows:
- Lower_Non_Recoverable = 0
- Lower_Critical = 1
- Lower_Non_Critical = 2
- Upper_Non_Critical = 3
- Upper_Critical = 4
- Upper_Non_Recoverable = 5
4.3.7.4.1 Fetching the Current Values
# ipmitool -v sdr type Fan
For example,
Sensor ID : Fan 1 (0x6) Entity ID : 7.1 (System Board) Sensor Type (Analog) : Fan Sensor Reading : 13.720 (+/- 0) unspecified Status : Lower Non-Critical Positive Hysteresis : Unspecified Negative Hysteresis : Unspecified Minimum sensor range : Unspecified Maximum sensor range : Unspecified Event Message Control : Entire Sensor Only Readable Thresholds : No Thresholds Settable Thresholds : No Thresholds ...
- Note:
- Check the Status value displayed in the output of ipmitool command.
4.3.7.4.2
Check the threshold level of the fan sensors predefined in the snmpd.conf file:
# vi /etc/ipworks/common/snmp/snmpd.conf
For example,
monitor -u cjslyxz -o lmFanSensorsDevice.1 -I lmFanSensorsValue.1 lmFanSensorsValue.1 >= 3 |
- Note:
- The example shows that the current Status value (Lower Non-Critical=2)does not exceed the predefined
threshold level (3).
If the current Status value exceeds the predefined threshold or is not within the predefined scope, an alarm is raised.
4.3.7.4.3 Checking Alarm Details When an Alarm is Raised
If an alarm is raised, use the following command to check the alarm details:
# snmpwalk -v 2c localhost alarmtable
4.3.7.4.4 Configuring the Thresholds
- Modify the threshold to a higher level in the /etc/ipworks/common/snmp/snmpd.conf file.
# vi /etc/ipworks/common/snmp/snmpd.conf
For example,
monitor -u cjslyxz -o lmFanSensorsDevice.1 -I lmFanSensorsValue.1 lmFanSensorsValue.1 >= 4
- Restart the SNMP service to let the configuration take
effect:
- Clear all alarms in the alarm table:
# /etc/init.d/ipworks.snmpd stop
# /etc/init.d/ipworks.snmpd start
- Keep all alarms in the alarm table:
# /etc/init.d/ipworks.snmpd stop
# /etc/init.d/ipworks.snmpd start noreset
- Clear all alarms in the alarm table:
4.4 Trap Handler Configuration
Trap Handler is a tool used to intercept the SNMP Traps from the SNMP Master Agent. The configuration is flexible. It can be configured to forward the SNMP Traps to another Trap Handler, or to the SNMP Manager. It is usually used to troubleshoot the alarm or trap sending problems, or when the alarms or traps need to be cleared manually.
For SNMPv1 and SNMPv2, Trap Handler does not require the configuration. It can be enabled simply by using command /etc/init.d/ipworks.snmptrapd start . For SNMPv3, Trap Handler must be configured with SNMPv3 user information to receive SNMPv3 traps.
SNMPv3 users for the Trap handler can be created by adding a createUser entry to file /var/net-snmp/snmptrapd.conf. This file will not be present immediately after fresh installation. This file is created automatically by snmptrapd when it is started for the first time.
SNMPv3 users for snmptrapd can be created using the following steps:
- Stop any running snmptrapd.
- Edit /var/net-snmp/snmptrapd.conf to insert the following line:
createUser -e 0x0102030405 myuser \
MD5 mypassword DES myotherpasswordThis time we explicitly set the engineID of the user to 0x0102030405 (which technically is not a recommended value, but it really does not matter).
Where:
- myuser is the security name that is configured on snmpd to send SNMPv3 traps.
- mypassword is the authentication password.
- myotherpassword is the encryption password. It can be left blank if it is to be the same as the authentication password, or users do not want to use encryption.
- Restart the snmptrapd.
Use the snmptrap command to send the trap demon a coldStart v3 TRAP message:
# snmptrap -e 0x0102030405 -v 3 \
-u
myuser -a MD5 -A mypassword -l authNoPriv \
localhost 42 coldStart.0
- Note:
-
- snmptrapd will not log SNMPv3 TRAPs sent by a user which has not been configured using the createUser directives as above. They are silently dropped by the snmptrapd program.
- SNMPv3 user information on Trap Hander must match with SNMPv3 user information created on the SNMP Master Agent to send v3 Traps.
Reference List
| Ericsson Documents |
|---|
| [1] Trademark Information. |
| [2] Typographic Conventions. |
| [3] Glossary of Terms and Acronyms. |
| [4] IPWorks Alarm List for DL380 Gen9 Host Management. |
| Standards |
|---|
| [5] Agent Extensibility (AgentX) Protocol Version 1. |
| [6] A Simple Network Management Protocol (SNMP). |
| [7] Introduction to Community-based SNMPv2. |
| [8] IF-MIB. |
| [9] HOST-RESOURCES-MIB. |
| [10] UCD-SNMP-MIB. |
| [11] DISMAN-EVENT-MIB. |
| [12] LM-SENSORS-MIB. |
| Other References |
|---|
| [13] Net-SNMP Website. |
| [14] Net-SNMP README files. |

Contents



