* Use GitLab instead of Gitlab Only change text part, the Alert.Transport.Gitlab class left as is. * Fix href in document * Move section in document The agent list in this document is sorted by alphabetical order, "SDFS info" is the only exception. * Remove trailing spaces in document * Align code in document * Fix Markdown in document - Escape underline - Add syntax highlight - Add two space in the end of line to make it a newline - Add newline before list or code section * Update LibreNMS/Alert/Transport/Gitlab.php Co-authored-by: Jellyfrog <Jellyfrog@users.noreply.github.com>
6.5 KiB
source: Extensions/SNMP-Trap-Handler.md path: blob/master/doc/
SNMP trap handling
Currently, LibreNMS supports a lot of trap handlers. You can check them on GitHub here. To add more see Adding new SNMP Trap handlers. Traps are handled via snmptrapd.
snmptrapd is an SNMP application that receives and logs SNMP TRAP and INFORM messages.
The default is to listen on UDP port 162 on all IPv4 interfaces. Since 162 is a privileged port, snmptrapd must typically be run as root.
Configure snmptrapd
Install snmptrapd via your package manager.
For example (Debian based systems):
sudo apt install snmptrapd -y
In /etc/snmp/snmptrapd.conf
, add :
disableAuthorization yes
authCommunity log,execute,net COMMUNITYSTRING
traphandle default /opt/librenms/snmptrap.php
To enable snmptrapd to properly parse traps, we will need to add MIBs to service.
Option 1
Make the folder /etc/systemd/system/snmptrapd.service.d/
and edit
the file /etc/systemd/system/snmptrapd.service.d/mibs.conf
and add
the following content.
You may want to tweak to add vendor directories for devices you care about. In the example below, standard and cisco directories are defined, and only IF-MIB is loaded.
[Service]
Environment=MIBDIRS=+/opt/librenms/mibs:/opt/librenms/mibs/cisco
Environment=MIBS=+IF-MIB
For non-systemd systems, you can edit TRAPDOPTS in the init script in /etc/init.d/snmptrapd.
TRAPDOPTS="-Lsd -M /opt/librenms/mibs -m IF-MIB -f -p $TRAPD_PID"
Along with any necessary configuration to receive the traps from your devices (community, etc.)
Option 2
Tested on Ubuntu 18
Just set up your service like:
[Unit]
Description=Simple Network Management Protocol (SNMP) Trap Daemon.
After=network.target
ConditionPathExists=/etc/snmp/snmptrapd.conf
[Service]
Environment="MIBSDIR=/opt/librenms/mibs"
Type=simple
ExecStart=/usr/sbin/snmptrapd -f -m IF-MIB -M /opt/librenms/mibs
ExecReload=/bin/kill -HUP $MAINPID
[Install]
WantedBy=multi-user.target
In Ubuntu 18 is service located by default in
/etc/systemd/system/multi-user.target.wants/snmptrapd.service
Here is a list of snmptrapd options:
Option | Description |
---|---|
-a | Ignore authenticationFailure traps. [OPTIONAL] |
-f | Do not fork from the shell |
-n | Use numeric addresses instead of attempting hostname lookups (no DNS) [OPTIONAL] |
-m | MIBLIST: use MIBLIST (FILE1-MIB:FILE2-MIB ). ALL = Load all MIBS in DIRLIST. (usually fails) |
-M | DIRLIST: use DIRLIST as the list of locations to look for MIBs. Option is not recursive, so you need to specify each DIR individually, separated by : . (For example: /opt/librenms/mibs:/opt/librenms/mibs/cisco:/opt/librenms/mibs/edgecos) |
Good practice is to avoid -m ALL
because then it will try to load all the MIBs in DIRLIST, which
will typically fail (snmptrapd cannot load that many mibs). Better is to specify the
exact MIB files defining the traps you are interested in, for example for LinkDown and LinkUp
as well as BGP traps, use -m IF-MIB:BGP4-MIB
. Multiple files can be added, separated with :
.
If you want to test or store original TRAPS in log then:
Create a folder for storing traps for example in file traps.log
sudo mkdir /var/log/snmptrap
Add the following config to your snmptrapd.service after ExecStart=/usr/sbin/snmptrapd -f -m ALL -M /opt/librenms/mibs
-tLf /var/log/snmptrap/traps.log
After successfully configuring the service, reload service files, enable, and start the snmptrapd service:
sudo systemctl daemon-reload
sudo systemctl enable snmptrapd
sudo systemctl restart snmptrapd
Testing
The easiest test is to generate a trap from your device. Usually, changing the configuration on a network device, or
plugging/unplugging a network cable (LinkUp, LinkDown) will generate a trap. You can confirm it using a with tcpdump
, tshark
or wireshark
.
You can also generate a trap using the snmptrap
command from the LibreNMS server itself (if and only if the LibreNMS server is monitored).
How to send SNMP v2 Trap
The command below takes the form of:
snmptrap -v <snmp_version> -c <community> <destination_host> <uptime> <OID_or_MIB> <object> <value_type> <value>
Using OID's:
snmptrap -v 2c -c public localhost '' 1.3.6.1.4.1.8072.2.3.0.1 1.3.6.1.4.1.8072.2.3.2.1 i 123456
If you have configured logging of traps to /var/log/snmptrap/traps.log
then you will see in traps.log
new entry:
2020-03-09 16:22:59 localhost [UDP: [127.0.0.1]:58942->[127.0.0.1]:162]:
SNMPv2-MIB::sysUpTime.0 = Timeticks: (149721964) 17 days, 7:53:39.64 SNMPv2-MIB::snmpTrapOID.0 = OID: SNMPv2-SMI::enterprises.8072.2.3.0.1 SNMPv2-SMI::enterprises.8072.2.3.2.1 = INTEGER: 123456
and in LibreNMS your localhost device eventlog like:
2020-03-09 16:22:59 SNMP trap received: SNMPv2-SMI::enterprises.8072.2.3.0.1
Why we need Uptime
When you send a trap, it must of course conform to a set of standards. Every trap needs an uptime value. Uptime is how long the system has been running since boot. Sometimes this is the operating system, other devices might use the SNMP engine uptime. Regardless, a value will be sent.
So what value should you type in the commands below? Oddly enough, simply supplying no value by using two single quotes '' will instruct the command to obtain the value from the operating system you are executing this on.
Event logging
You can configure generic event logging for snmp traps. This will log an event of the type trap for received traps. These events can be used for alerting. By default, only the TrapOID is logged. But you can enable the "detailed" variant, and all the data received with the trap will be logged.
The parameter can be found in General Settings / External / SNMP Traps Integration.
It can also be configured in config.php
$config['snmptraps']['eventlog'] = 'unhandled'; //default value
$config['snmptraps']['eventlog_detailed'] = 'false'; //default value
Valid options are:
unhandled
only unhandled traps will be logged (default value)all
log all trapsnone
no traps will create a generic event log (handled traps may still log events)