티스토리 뷰

TIL/Server

리눅스 SNMP OID 등록 방법

DandyU 2017. 3. 9. 10:35

리눅스에 SNMP OID를 등록하려고 했던 이유는 톰캣 프로세스가 실행되고 있는지 SNMP로 확인이 필요했음

SNMP 사용을 위해 OS에는 net-snmp를 설치했고 OID를 아래와 같이 등록함

 

OID 등록은 아래의 순서로 진행함

 

@ /etc/snmp 디렉토리에 scripts 디렉토리를 생성함

mkdir /etc/snmp/scripts

 

@ 스크립트 파일을 생성함

vi /etc/snmp/scripts/checkTomcatProcess.sh

 

@ 스크립트의 내용은 아래와 같음

#!/bin/bash

ps -ef | grep -v grep | grep "/svc/java/bin/java" | grep -c "/svc/cms/was/tomcat-7.0.27"

 

위 스크립트를 설명하면

1. 프로세스를 체크

2. "grep" 문자열에 들어간 내용을 제외

3. "/svc/java/bin/java"가 포함된 내용을 다시 grep

4. "/svc/cms/was/tomcat-7.0.27" 포함된 내용을 Count 함

 

위 스크립트는 tomcat-7.0.27 텍스트를 포함하고 있는 프로세스를 검색하여 카운트하는 스크립트

 

@ 스크립트를 실행하려면 권한을 변경해야함

chmod +x /etc/snmp/scripts/checkTomcatProcess.sh

 

@ 스크립트를 테스트함: 실행되고 있는 프로세스가 없는 경우 결과는 0, 실행되고 있는 프로세스가 있는 경우 1(중복 실행되고 있는 경우 1 이상의 값이 나오는데 이 때는 에러로 봐야 함)

sh /etc/snmp/scripts/checkTomcatProcess.sh

 

만약 "Exec format error" 같은 에러가 발생한다면 "#!/bin/bash"가 존재하지 않거나 개행한 후 스크립트를 작성하지 않은 경우임

 

@ 이제 /etc/snmp/snmpd.conf를 수정하여 작성한 스크립트를 등록함

vi /etc/snmp/snmpd.conf

아래 더보기에 빨간색으로 표시한 텍스트를 추가하고 저장, 참고로 SNMP Community는 server_comm으로 설정함

 

더보기

###############################################################################

#

# snmpd.conf:

#   An example configuration file for configuring the ucd-snmp snmpd agent.

#

###############################################################################

#

# This file is intended to only be as a starting point.  Many more

# configuration directives exist than are mentioned in this file.  For 

# full details, see the snmpd.conf(5) manual page.

#

# All lines beginning with a '#' are comments and are intended for you

# to read.  All other lines are configuration commands for the agent.

 

###############################################################################

# Access Control

###############################################################################

 

# As shipped, the snmpd demon will only respond to queries on the

# system mib group until this file is replaced or modified for

# security purposes.  Examples are shown below about how to increase the

# level of access.

 

# By far, the most common question I get about the agent is "why won't

# it work?", when really it should be "how do I configure the agent to

# allow me to access it?"

#

# By default, the agent responds to the "public" community for read

# only access, if run out of the box without any configuration file in 

# place.  The following examples show you other ways of configuring

# the agent so that you can change the community names, and give

# yourself write access to the mib tree as well.

#

# For more information, read the FAQ as well as the snmpd.conf(5)

# manual page.

 

####

# First, map the community name "public" into a "security name"

 

#       sec.name  source          community

com2sec readonly  127.0.0.1       public

 

####

# Second, map the security name into a group name:

 

#       groupName      securityModel securityName

group   notConfigGroup v1           notConfigUser

group   notConfigGroup v2c           notConfigUser

 

####

# Third, create a view for us to let the group have rights to:

 

# Make at least  snmpwalk -v 1 localhost -c public system fast again.

#       name           incl/excl     subtree         mask(optional)

view    systemview    included   .1.3.6.1.2.1.1

view    systemview    included   .1.3.6.1.2.1.25.1.1

 

####

# Finally, grant the group read-only access to the systemview view.

 

#       group          context sec.model sec.level prefix read   write  notif

access  notConfigGroup ""      any       noauth    exact  systemview none none

 

# -----------------------------------------------------------------------------

 

# Here is a commented out example configuration that allows less

# restrictive access.

 

# YOU SHOULD CHANGE THE "COMMUNITY" TOKEN BELOW TO A NEW KEYWORD ONLY

# KNOWN AT YOUR SITE.  YOU *MUST* CHANGE THE NETWORK TOKEN BELOW TO

# SOMETHING REFLECTING YOUR LOCAL NETWORK ADDRESS SPACE.

 

##       sec.name  source          community

#com2sec local     localhost       COMMUNITY

#com2sec mynetwork NETWORK/24      COMMUNITY

# server_comm라는 Community 추가

com2sec myServer  localhost       server_comm

 

##     group.name sec.model  sec.name

#group MyRWGroup  any        local

#group MyROGroup  any        mynetwork

#

#group MyRWGroup  any        otherv3user

#...

group MyGroup    any        myServer

 

##           incl/excl subtree                          mask

#view all    included  .1                               80

view all    included  .1                               80

 

## -or just the mib2 tree-

 

#view mib2   included  .iso.org.dod.internet.mgmt.mib-2 fc

 

 

##                context sec.model sec.level prefix read   write  notif

#access MyROGroup ""      any       noauth    0      all    none   none

#access MyRWGroup ""      any       noauth    0      all    all    all

# 읽기 권한만 설정

access MyGroup ""      any       noauth    0      all    none    none

 

###############################################################################

# Sample configuration to make net-snmpd RFC 1213.

# Unfortunately v1 and v2c don't allow any user based authentification, so

# opening up the default config is not an option from a security point.

#

# WARNING: If you uncomment the following lines you allow write access to your

# snmpd daemon from any source! To avoid this use different names for your

# community or split out the write access to a different community and 

# restrict it to your local network.

# Also remember to comment the syslocation and syscontact parameters later as

# otherwise they are still read only (see FAQ for net-snmp).

#

 

# First, map the community name "public" into a "security name"

#       sec.name        source          community

#com2sec notConfigUser   default         public

 

# Second, map the security name into a group name:

#       groupName       securityModel   securityName

#group   notConfigGroup  v1              notConfigUser

#group   notConfigGroup  v2c             notConfigUser

 

# Third, create a view for us to let the group have rights to:

# Open up the whole tree for ro, make the RFC 1213 required ones rw.

#       name            incl/excl       subtree mask(optional)

#view    roview          included        .1

#view    rwview          included        system.sysContact

#view    rwview          included        system.sysName

#view    rwview          included        system.sysLocation

#view    rwview          included        interfaces.ifTable.ifEntry.ifAdminStatus

#view    rwview          included        at.atTable.atEntry.atPhysAddress

#view    rwview          included        at.atTable.atEntry.atNetAddress

#view    rwview          included        ip.ipForwarding

#view    rwview          included        ip.ipDefaultTTL

#view    rwview          included        ip.ipRouteTable.ipRouteEntry.ipRouteDest

#view    rwview          included        ip.ipRouteTable.ipRouteEntry.ipRouteIfIndex

#view    rwview          included        ip.ipRouteTable.ipRouteEntry.ipRouteMetric1

#view    rwview          included        ip.ipRouteTable.ipRouteEntry.ipRouteMetric2

#view    rwview          included        ip.ipRouteTable.ipRouteEntry.ipRouteMetric3

#view    rwview          included        ip.ipRouteTable.ipRouteEntry.ipRouteMetric4

#view    rwview          included        ip.ipRouteTable.ipRouteEntry.ipRouteType

#view    rwview          included        ip.ipRouteTable.ipRouteEntry.ipRouteAge

#view    rwview          included        ip.ipRouteTable.ipRouteEntry.ipRouteMask

#view    rwview          included        ip.ipRouteTable.ipRouteEntry.ipRouteMetric5

#view    rwview          included        ip.ipNetToMediaTable.ipNetToMediaEntry.ipNetToMediaIfIndex

#view    rwview          included        ip.ipNetToMediaTable.ipNetToMediaEntry.ipNetToMediaPhysAddress

#view    rwview          included        ip.ipNetToMediaTable.ipNetToMediaEntry.ipNetToMediaNetAddress

#view    rwview          included        ip.ipNetToMediaTable.ipNetToMediaEntry.ipNetToMediaType

#view    rwview          included        tcp.tcpConnTable.tcpConnEntry.tcpConnState

#view    rwview          included        egp.egpNeighTable.egpNeighEntry.egpNeighEventTrigger

#view    rwview          included        snmp.snmpEnableAuthenTraps

 

# Finally, grant the group read-only access to the systemview view.

#       group          context sec.model sec.level prefix read   write  notif

#access  notConfigGroup ""      any       noauth    exact  roview rwview none

 

 

 

###############################################################################

# System contact information

#

 

# It is also possible to set the sysContact and sysLocation system

# variables through the snmpd.conf file:

 

syslocation Unknown (edit /etc/snmp/snmpd.conf)

syscontact Root <root@localhost> (configure /etc/snmp/snmp.local.conf)

 

# Example output of snmpwalk:

#   % snmpwalk -v 1 localhost -c public system

#   system.sysDescr.0 = "SunOS name sun4c"

#   system.sysObjectID.0 = OID: enterprises.ucdavis.ucdSnmpAgent.sunos4

#   system.sysUpTime.0 = Timeticks: (595637548) 68 days, 22:32:55

#   system.sysContact.0 = "Me <me@somewhere.org>"

#   system.sysName.0 = "name"

#   system.sysLocation.0 = "Right here, right now."

#   system.sysServices.0 = 72

 

 

###############################################################################

# Logging

#

 

# We do not want annoying "Connection from UDP: " messages in syslog.

# If the following option is commented out, snmpd will print each incoming

# connection, which can be useful for debugging.

 

dontLogTCPWrappersConnects yes

 

# -----------------------------------------------------------------------------

 

 

###############################################################################

# Process checks.

#

#  The following are examples of how to use the agent to check for

#  processes running on the host.  The syntax looks something like:

#

#  proc NAME [MAX=0] [MIN=0]

#

#  NAME:  the name of the process to check for.  It must match

#         exactly (ie, http will not find httpd processes).

#  MAX:   the maximum number allowed to be running.  Defaults to 0.

#  MIN:   the minimum number to be running.  Defaults to 0.

 

#

#  Examples (commented out by default):

#

 

#  Make sure mountd is running

#proc mountd

 

#  Make sure there are no more than 4 ntalkds running, but 0 is ok too.

#proc ntalkd 4

 

#  Make sure at least one sendmail, but less than or equal to 10 are running.

#proc sendmail 10 1

 

#  A snmpwalk of the process mib tree would look something like this:

# % snmpwalk -v 1 localhost -c public .1.3.6.1.4.1.2021.2

# enterprises.ucdavis.procTable.prEntry.prIndex.1 = 1

# enterprises.ucdavis.procTable.prEntry.prIndex.2 = 2

# enterprises.ucdavis.procTable.prEntry.prIndex.3 = 3

# enterprises.ucdavis.procTable.prEntry.prNames.1 = "mountd"

# enterprises.ucdavis.procTable.prEntry.prNames.2 = "ntalkd"

# enterprises.ucdavis.procTable.prEntry.prNames.3 = "sendmail"

# enterprises.ucdavis.procTable.prEntry.prMin.1 = 0

# enterprises.ucdavis.procTable.prEntry.prMin.2 = 0

# enterprises.ucdavis.procTable.prEntry.prMin.3 = 1

# enterprises.ucdavis.procTable.prEntry.prMax.1 = 0

# enterprises.ucdavis.procTable.prEntry.prMax.2 = 4

# enterprises.ucdavis.procTable.prEntry.prMax.3 = 10

# enterprises.ucdavis.procTable.prEntry.prCount.1 = 0

# enterprises.ucdavis.procTable.prEntry.prCount.2 = 0

# enterprises.ucdavis.procTable.prEntry.prCount.3 = 1

# enterprises.ucdavis.procTable.prEntry.prErrorFlag.1 = 1

# enterprises.ucdavis.procTable.prEntry.prErrorFlag.2 = 0

# enterprises.ucdavis.procTable.prEntry.prErrorFlag.3 = 0

# enterprises.ucdavis.procTable.prEntry.prErrMessage.1 = "No mountd process running."

# enterprises.ucdavis.procTable.prEntry.prErrMessage.2 = ""

# enterprises.ucdavis.procTable.prEntry.prErrMessage.3 = ""

# enterprises.ucdavis.procTable.prEntry.prErrFix.1 = 0

# enterprises.ucdavis.procTable.prEntry.prErrFix.2 = 0

# enterprises.ucdavis.procTable.prEntry.prErrFix.3 = 0

#

#  Note that the errorFlag for mountd is set to 1 because one is not

#  running (in this case an rpc.mountd is, but thats not good enough),

#  and the ErrMessage tells you what's wrong.  The configuration

#  imposed in the snmpd.conf file is also shown.  

#  Special Case:  When the min and max numbers are both 0, it assumes

#  you want a max of infinity and a min of 1.

#

 

 

# -----------------------------------------------------------------------------

 

 

###############################################################################

# Executables/scripts

#

 

#

#  You can also have programs run by the agent that return a single

#  line of output and an exit code.  Here are two examples.

#

#  exec NAME PROGRAM [ARGS ...]

#

#  NAME:     A generic name. The name must be unique for each exec statement.

#  PROGRAM:  The program to run.  Include the path!

#  ARGS:     optional arguments to be passed to the program

 

# a simple hello world

 

#exec echotest /bin/echo hello world

 

# Run a shell script containing:

#

# #!/bin/sh

# echo hello world

# echo hi there

# exit 35

#

# Note:  this has been specifically commented out to prevent

# accidental security holes due to someone else on your system writing

# a /tmp/shtest before you do.  Uncomment to use it.

#

#exec shelltest /bin/sh /tmp/shtest

 

# Then, 

# % snmpwalk -v 1 localhost -c public .1.3.6.1.4.1.2021.8

# enterprises.ucdavis.extTable.extEntry.extIndex.1 = 1

# enterprises.ucdavis.extTable.extEntry.extIndex.2 = 2

# enterprises.ucdavis.extTable.extEntry.extNames.1 = "echotest"

# enterprises.ucdavis.extTable.extEntry.extNames.2 = "shelltest"

# enterprises.ucdavis.extTable.extEntry.extCommand.1 = "/bin/echo hello world"

# enterprises.ucdavis.extTable.extEntry.extCommand.2 = "/bin/sh /tmp/shtest"

# enterprises.ucdavis.extTable.extEntry.extResult.1 = 0

# enterprises.ucdavis.extTable.extEntry.extResult.2 = 35

# enterprises.ucdavis.extTable.extEntry.extOutput.1 = "hello world."

# enterprises.ucdavis.extTable.extEntry.extOutput.2 = "hello world."

# enterprises.ucdavis.extTable.extEntry.extErrFix.1 = 0

# enterprises.ucdavis.extTable.extEntry.extErrFix.2 = 0

 

# Note that the second line of the /tmp/shtest shell script is cut

# off.  Also note that the exit status of 35 was returned.

 

# -----------------------------------------------------------------------------

 

 

###############################################################################

# disk checks

#

 

# The agent can check the amount of available disk space, and make

# sure it is above a set limit.  

 

# disk PATH [MIN=100000]

#

# PATH:  mount path to the disk in question.

# MIN:   Disks with space below this value will have the Mib's errorFlag set.

#        Default value = 100000.

 

# Check the / partition and make sure it contains at least 10 megs.

 

#disk / 10000

 

# % snmpwalk -v 1 localhost -c public .1.3.6.1.4.1.2021.9

# enterprises.ucdavis.diskTable.dskEntry.diskIndex.1 = 0

# enterprises.ucdavis.diskTable.dskEntry.diskPath.1 = "/" Hex: 2F 

# enterprises.ucdavis.diskTable.dskEntry.diskDevice.1 = "/dev/dsk/c201d6s0"

# enterprises.ucdavis.diskTable.dskEntry.diskMinimum.1 = 10000

# enterprises.ucdavis.diskTable.dskEntry.diskTotal.1 = 837130

# enterprises.ucdavis.diskTable.dskEntry.diskAvail.1 = 316325

# enterprises.ucdavis.diskTable.dskEntry.diskUsed.1 = 437092

# enterprises.ucdavis.diskTable.dskEntry.diskPercent.1 = 58

# enterprises.ucdavis.diskTable.dskEntry.diskErrorFlag.1 = 0

# enterprises.ucdavis.diskTable.dskEntry.diskErrorMsg.1 = ""

 

# -----------------------------------------------------------------------------

 

 

###############################################################################

# load average checks

#

 

# load [1MAX=12.0] [5MAX=12.0] [15MAX=12.0]

#

# 1MAX:   If the 1 minute load average is above this limit at query

#         time, the errorFlag will be set.

# 5MAX:   Similar, but for 5 min average.

# 15MAX:  Similar, but for 15 min average.

 

# Check for loads:

#load 12 14 14

 

# % snmpwalk -v 1 localhost -c public .1.3.6.1.4.1.2021.10

# enterprises.ucdavis.loadTable.laEntry.loadaveIndex.1 = 1

# enterprises.ucdavis.loadTable.laEntry.loadaveIndex.2 = 2

# enterprises.ucdavis.loadTable.laEntry.loadaveIndex.3 = 3

# enterprises.ucdavis.loadTable.laEntry.loadaveNames.1 = "Load-1"

# enterprises.ucdavis.loadTable.laEntry.loadaveNames.2 = "Load-5"

# enterprises.ucdavis.loadTable.laEntry.loadaveNames.3 = "Load-15"

# enterprises.ucdavis.loadTable.laEntry.loadaveLoad.1 = "0.49" Hex: 30 2E 34 39 

# enterprises.ucdavis.loadTable.laEntry.loadaveLoad.2 = "0.31" Hex: 30 2E 33 31 

# enterprises.ucdavis.loadTable.laEntry.loadaveLoad.3 = "0.26" Hex: 30 2E 32 36 

# enterprises.ucdavis.loadTable.laEntry.loadaveConfig.1 = "12.00"

# enterprises.ucdavis.loadTable.laEntry.loadaveConfig.2 = "14.00"

# enterprises.ucdavis.loadTable.laEntry.loadaveConfig.3 = "14.00"

# enterprises.ucdavis.loadTable.laEntry.loadaveErrorFlag.1 = 0

# enterprises.ucdavis.loadTable.laEntry.loadaveErrorFlag.2 = 0

# enterprises.ucdavis.loadTable.laEntry.loadaveErrorFlag.3 = 0

# enterprises.ucdavis.loadTable.laEntry.loadaveErrMessage.1 = ""

# enterprises.ucdavis.loadTable.laEntry.loadaveErrMessage.2 = ""

# enterprises.ucdavis.loadTable.laEntry.loadaveErrMessage.3 = ""

 

# -----------------------------------------------------------------------------

 

 

###############################################################################

# Extensible sections.

 

# This alleviates the multiple line output problem found in the

# previous executable mib by placing each mib in its own mib table:

 

# Run a shell script containing:

#

# #!/bin/sh

# echo hello world

# echo hi there

# exit 35

#

# Note:  this has been specifically commented out to prevent

# accidental security holes due to someone else on your system writing

# a /tmp/shtest before you do.  Uncomment to use it.

#

# exec .1.3.6.1.4.1.2021.50 shelltest /bin/sh /tmp/shtest

 

# % snmpwalk -v 1 localhost -c public .1.3.6.1.4.1.2021.50

# enterprises.ucdavis.50.1.1 = 1

# enterprises.ucdavis.50.2.1 = "shelltest"

# enterprises.ucdavis.50.3.1 = "/bin/sh /tmp/shtest"

# enterprises.ucdavis.50.100.1 = 35

# enterprises.ucdavis.50.101.1 = "hello world."

# enterprises.ucdavis.50.101.2 = "hi there."

# enterprises.ucdavis.50.102.1 = 0

 

# Now the Output has grown to two lines, and we can see the 'hi

# there.' output as the second line from our shell script.

#

# Note that you must alter the mib.txt file to be correct if you want

# the .50.* outputs above to change to reasonable text descriptions.

 

# Other ideas:

# exec .1.3.6.1.4.1.2021.51 ps /bin/ps 

# exec .1.3.6.1.4.1.2021.52 top /usr/local/bin/top

# exec .1.3.6.1.4.1.2021.53 mailq /usr/bin/mailq

 

# -----------------------------------------------------------------------------

 

 

###############################################################################

# Pass through control.

 

# Usage:

#   pass MIBOID EXEC-COMMAND

#

# This will pass total control of the mib underneath the MIBOID

# portion of the mib to the EXEC-COMMAND.  

#

# Note:  You'll have to change the path of the passtest script to your

# source directory or install it in the given location.

# Example:  (see the script for details)

#           (commented out here since it requires that you place the

#           script in the right location. (its not installed by default))

 

# pass .1.3.6.1.4.1.2021.255 /bin/sh /usr/local/local/passtest

 

# % snmpwalk -v 1 localhost -c public .1.3.6.1.4.1.2021.255

# enterprises.ucdavis.255.1 = "life the universe and everything"

# enterprises.ucdavis.255.2.1 = 42

# enterprises.ucdavis.255.2.2 = OID: 42.42.42

# enterprises.ucdavis.255.3 = Timeticks: (363136200) 42 days, 0:42:42

# enterprises.ucdavis.255.4 = IpAddress: 127.0.0.1

# enterprises.ucdavis.255.5 = 42

# enterprises.ucdavis.255.6 = Gauge: 42

#

# % snmpget -v 1 localhost public .1.3.6.1.4.1.2021.255.5

# enterprises.ucdavis.255.5 = 42

#

# % snmpset -v 1 localhost public .1.3.6.1.4.1.2021.255.1 s "New string"

# enterprises.ucdavis.255.1 = "New string"

#

 

# For specific usage information, see the man/snmpd.conf.5 manual page

# as well as the local/passtest script used in the above example.

 

###############################################################################

# Further Information

#

#  See the snmpd.conf manual page, and the output of "snmpd -H".

 

extend checkTomcat /etc/snmp/scripts/checkTomcatProcess.sh

 

 

 

@ SNMP를 재시작함

/etc/init.d/snmpd restart

 

@ 등록이 잘됐는지 확인함

snmpwalk -v 2c -c server_comm localhost 'NET-SNMP-EXTEND-MIB::nsExtendOutLine."checkTomcat".1'

나는 아래와 같은 결과를 확인함

NET-SNMP-EXTEND-MIB::nsExtendOutLine."checkTomcat".1 = STRING: 1

 

@ 등록이 완료됐으니 OID가 뭔지 확인함

snmptranslate -On 'NET-SNMP-EXTEND-MIB::nsExtendOutLine."checkTomcat".1'

 

@ 확인된 OID로 SNMP에 톰캣 프로세스를 확인 할 수 있음

 

 

 

 

'TIL > Server' 카테고리의 다른 글

CentOS 기반 Fluentd와 HDFS(Hadoop) 연동하기  (0) 2018.09.12
공지사항
최근에 올라온 글
최근에 달린 댓글
Total
Today
Yesterday
링크
«   2024/11   »
1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30
글 보관함