Lenovo ThinkServer RD330 Software User's Manual page 243

Megaraid sas software user guide
Hide thumbs Also See for ThinkServer RD330:
Table of Contents

Advertisement

MegaRAID SAS Software User Guide
Chapter 6: MegaRAID Storage Manager Overview and Installation
RPM makes the necessary modification needed in the snmpd.conf file to run the
agent.
NOTE: Before installation, check whether there is any pass command that starts with
1.3.6.1.4.1.3582 OID in snmpd.conf. If so, delete all of the old pass commands that start
with 1.3.6.1.4.1.3582 OID. (This situation could occur if an earlier version of SNMP
Agent was installed in the system.)
The snmpd.conf file structure should be the same as lsi_mrdsnmpd.conf. For
reference, a sample conf file (lsi_mrdsnmpd.conf) is in the /etc/lsi_mrdsnmp
directory.
2. To run an SNMP query from a remote machine, add the IP address of that machine
in the snmpd.conf file, as in this example:
com2sec
snmpclient
Here, the IP address of the remote machine is 172.28.136.112.
3. To receive an SNMP trap to a particular machine, add the IP address of that machine
in the com2sec section of the snmpd.conf file.
For example, to get a trap in 10.0.0.144, add the following to snmpd.conf.
#
sec.name
com2sec
snmpclient
4. To run/stop the snmpd daemon, enter the following command:
/etc/init.d/snmpd start/stop
5. To start/stop the SAS SNMP Agent daemon before issuing a SNMP query, enter the
following command:
/etc/init.d/lsi_mrdsnmpd start/stop
You can check the status of the SAS SNMP Agent daemon by checked by issuing the
following command:
/etc/init.d/lsi_mrdsnmpd status
6. Issue an SNMP query in this format:
snmpwalk -v1 -c public localhost .1.3.6.1.4.1.3582
7. You can get the SNMP trap from local machine by issuing the following command:
snmptrapd -P -F "%02.2h:%02.2j TRAP%w.%q from %A %v\n"
NOTE: To receive a trap in a local machine with Net-SNMP version 5.3, you must modify
the snmptrapd.conf file (generally located at /var/net-snmp/snmptrapd.conf).
Add "disableAuthorization yes" in snmptrapd.conf and then execute "sudo
snmptrapd -P -F "%02.2h:%02.2j TRAP%w.%q from %A %v\n".
172.28.136.112
public
community
source
10.0.0.144
public
|
Installing and Configur-
ing an SNMP Agent
Page 243

Advertisement

Table of Contents
loading

Table of Contents