source: Extensions/SNMP-Trap-Handler.md path: blob/master/doc/ # SNMP trap handling Currently, LibreNMS supports a lot of trap handlers. You can check them on GitHub [here](https://github.com/librenms/librenms/tree/master/LibreNMS/Snmptrap/Handlers). To add more see [Adding new SNMP Trap handlers](../Developing/SNMP-Traps.md). Traps are handled via snmptrapd. snmptrapd is an SNMP application that receives and logs SNMP TRAP and INFORM messages. > The default is to listen on UDP port 162 on all IPv4 interfaces. Since 162 is a privileged port, snmptrapd must typically be run as root. ## Configure snmptrapd Install snmptrapd via your package manager. For example (Debian based systems): ``` sudo apt install snmptrapd -y ``` In `/etc/snmp/snmptrapd.conf`, add : ```text disableAuthorization yes authCommunity log,execute,net COMMUNITYSTRING traphandle default /opt/librenms/snmptrap.php ``` To enable snmptrapd to properly parse traps, we will need to add MIBs to service. ### Option 1 Make the folder `/etc/systemd/system/snmptrapd.service.d/` and edit the file `/etc/systemd/system/snmptrapd.service.d/mibs.conf` and add the following content. You may want to tweak to add vendor directories for devices you care about. In the example below, standard and cisco directories are defined, and only IF-MIB is loaded. ```ini [Service] Environment=MIBDIRS=+/opt/librenms/mibs:/opt/librenms/mibs/cisco Environment=MIBS=+IF-MIB ``` For non-systemd systems, you can edit TRAPDOPTS in the init script in /etc/init.d/snmptrapd. `TRAPDOPTS="-Lsd -M /opt/librenms/mibs -m IF-MIB -f -p $TRAPD_PID"` Along with any necessary configuration to receive the traps from your devices (community, etc.) ### Option 2 > Tested on Ubuntu 18 Just set up your service like: ``` [Unit] Description=Simple Network Management Protocol (SNMP) Trap Daemon. After=network.target ConditionPathExists=/etc/snmp/snmptrapd.conf [Service] Environment="MIBSDIR=/opt/librenms/mibs" Type=simple ExecStart=/usr/sbin/snmptrapd -f -m IF-MIB -M /opt/librenms/mibs ExecReload=/bin/kill -HUP $MAINPID [Install] WantedBy=multi-user.target ``` > In Ubuntu 18 is service located by default in ```/etc/systemd/system/multi-user.target.wants/snmptrapd.service``` Here is a list of snmptrapd options: | Option | Description | | -------| ------------------------------------------------------------------------------------------------ | | -a | Ignore authenticationFailure traps. [OPTIONAL] | | -f | Do not fork from the shell | | -n | Use numeric addresses instead of attempting hostname lookups (no DNS) [OPTIONAL] | | -m | MIBLIST: use MIBLIST (`FILE1-MIB:FILE2-MIB`). `ALL` = Load all MIBS in DIRLIST. (usually fails) | | -M | DIRLIST: use DIRLIST as the list of locations to look for MIBs. Option is not recursive, so you need to specify each DIR individually, separated by `:`. (For example: /opt/librenms/mibs:/opt/librenms/mibs/cisco:/opt/librenms/mibs/edgecos)| Good practice is to avoid `-m ALL` because then it will try to load all the MIBs in DIRLIST, which will typically fail (snmptrapd cannot load that many mibs). Better is to specify the exact MIB files defining the traps you are interested in, for example for LinkDown and LinkUp as well as BGP traps, use `-m IF-MIB:BGP4-MIB`. Multiple files can be added, separated with `:`. If you want to test or store original TRAPS in log then: Create a folder for storing traps for example in file `traps.log` ``` sudo mkdir /var/log/snmptrap ``` Add the following config to your snmptrapd.service after `ExecStart=/usr/sbin/snmptrapd -f -m ALL -M /opt/librenms/mibs` ``` -tLf /var/log/snmptrap/traps.log ``` After successfully configuring the service, reload service files, enable, and start the snmptrapd service: ``` sudo systemctl daemon-reload sudo systemctl enable snmptrapd sudo systemctl restart snmptrapd ``` ## Testing The easiest test is to generate a trap from your device. Usually, changing the configuration on a network device, or plugging/unplugging a network cable (LinkUp, LinkDown) will generate a trap. You can confirm it using a with `tcpdump`, `tshark` or `wireshark`. You can also generate a trap using the `snmptrap` command from the LibreNMS server itself (if and only if the LibreNMS server is monitored). ### How to send SNMP v2 Trap The command below takes the form of: ``` snmptrap -v -c ``` Using OID's: ``` snmptrap -v 2c -c public localhost '' 1.3.6.1.4.1.8072.2.3.0.1 1.3.6.1.4.1.8072.2.3.2.1 i 123456 ``` If you have configured logging of traps to ```/var/log/snmptrap/traps.log``` then you will see in `traps.log` new entry: ``` 2020-03-09 16:22:59 localhost [UDP: [127.0.0.1]:58942->[127.0.0.1]:162]: SNMPv2-MIB::sysUpTime.0 = Timeticks: (149721964) 17 days, 7:53:39.64 SNMPv2-MIB::snmpTrapOID.0 = OID: SNMPv2-SMI::enterprises.8072.2.3.0.1 SNMPv2-SMI::enterprises.8072.2.3.2.1 = INTEGER: 123456 ``` and in LibreNMS your localhost device eventlog like: ``` 2020-03-09 16:22:59 SNMP trap received: SNMPv2-SMI::enterprises.8072.2.3.0.1 ``` ### Why we need Uptime When you send a trap, it must of course conform to a set of standards. Every trap needs an uptime value. Uptime is how long the system has been running since boot. Sometimes this is the operating system, other devices might use the SNMP engine uptime. Regardless, a value will be sent. So what value should you type in the commands below? Oddly enough, simply supplying no value by using two single quotes '' will instruct the command to obtain the value from the operating system you are executing this on. ### Event logging You can configure generic event logging for snmp traps. This will log an event of the type trap for received traps. These events can be used for alerting. By default, only the TrapOID is logged. But you can enable the "detailed" variant, and all the data received with the trap will be logged. The parameter can be found in General Settings / External / SNMP Traps Integration. It can also be configured in ```config.php``` ```php $config['snmptraps']['eventlog'] = 'unhandled'; //default value $config['snmptraps']['eventlog_detailed'] = 'false'; //default value ``` Valid options are: - `unhandled` only unhandled traps will be logged (default value) - `all` log all traps - `none` no traps will create a generic event log (handled traps may still log events)