<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: snmp trap to CA spectrum in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/snmp-trap-to-CA-spectrum/m-p/448706#M77989</link>
    <description>&lt;P&gt;Thanks @solarboyz1&lt;/P&gt;

&lt;P&gt;But looks like the script is not doing anything for me although the scirpt is getting invoked. &lt;/P&gt;

&lt;P&gt;Can you help me with the sample script which is already modified. &lt;BR /&gt;
As i am not sure how to test it. &lt;/P&gt;</description>
    <pubDate>Wed, 21 Aug 2019 07:24:04 GMT</pubDate>
    <dc:creator>surekhasplunk</dc:creator>
    <dc:date>2019-08-21T07:24:04Z</dc:date>
    <item>
      <title>snmp trap to CA spectrum</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/snmp-trap-to-CA-spectrum/m-p/448704#M77987</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I have the following information captured in splunk&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;rule=epm-rogue-mac-ep-epmacrogue    subject=oper-state-change   prevSeverity=warning    created=2019-08-09T11:06:32.108+02:00   highestSeverity=warning lastTransition=2019-08-09T11:08:53.057+02:00    origSeverity=warning    lc=raised   domain=access   childAction=    ack=no  occur=1 delegated=no    type=operational    descr=EP MAC 00:50:56:AB:68:DE is rogue on interface eth1/4 of Node 219, Pod 1  cause=ep-mac-is-rogue   severity=warning    code=F3014  changeSet=addr:00:50:56:AB:68:DE, createTs:2019-08-09T04:06:50.402+02:00, flags:local,mac,rogue, ifId:eth1/4, pcTag:32790   status= dn=topology/pod-1/node-219/sys/ctx-[vxlan-2097152]/bd-[vxlan-15400874]/vlan-[vlan-515]/db-ep/rogueMacEP-00:50:56:AB:68:DE/fault-F3014   apic_host=196.50.128.32 component=faultInst
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Now for all the alerts for below query&lt;BR /&gt;
index="cisco-aci" "cause=ep-mac-is-rogue" &lt;/P&gt;

&lt;P&gt;I need to create an SNMP trap in spectrum . how can i achieve this ?&lt;/P&gt;</description>
      <pubDate>Fri, 16 Aug 2019 09:15:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/snmp-trap-to-CA-spectrum/m-p/448704#M77987</guid>
      <dc:creator>surekhasplunk</dc:creator>
      <dc:date>2019-08-16T09:15:08Z</dc:date>
    </item>
    <item>
      <title>Re: snmp trap to CA spectrum</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/snmp-trap-to-CA-spectrum/m-p/448705#M77988</link>
      <description>&lt;P&gt;Check out the app:&lt;/P&gt;

&lt;P&gt;&lt;A href="https://splunkbase.splunk.com/app/3291/#/details"&gt;https://splunkbase.splunk.com/app/3291/#/details&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;OR create your own script as described:&lt;/P&gt;

&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/6.2.1/alert/SendingSNMPtrapstoothersystems"&gt;https://docs.splunk.com/Documentation/Splunk/6.2.1/alert/SendingSNMPtrapstoothersystems&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Aug 2019 18:06:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/snmp-trap-to-CA-spectrum/m-p/448705#M77988</guid>
      <dc:creator>solarboyz1</dc:creator>
      <dc:date>2019-08-16T18:06:46Z</dc:date>
    </item>
    <item>
      <title>Re: snmp trap to CA spectrum</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/snmp-trap-to-CA-spectrum/m-p/448706#M77989</link>
      <description>&lt;P&gt;Thanks @solarboyz1&lt;/P&gt;

&lt;P&gt;But looks like the script is not doing anything for me although the scirpt is getting invoked. &lt;/P&gt;

&lt;P&gt;Can you help me with the sample script which is already modified. &lt;BR /&gt;
As i am not sure how to test it. &lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2019 07:24:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/snmp-trap-to-CA-spectrum/m-p/448706#M77989</guid>
      <dc:creator>surekhasplunk</dc:creator>
      <dc:date>2019-08-21T07:24:04Z</dc:date>
    </item>
    <item>
      <title>Re: snmp trap to CA spectrum</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/snmp-trap-to-CA-spectrum/m-p/448707#M77990</link>
      <description>&lt;P&gt;Ensure you did the following:&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;Create the script in the $SPLUNK_HOME/bin/scripts directory. Create the directory if it doesn't already exist. Copy the code listed below into sendsnmptrap.pl. &lt;/LI&gt;
&lt;LI&gt;Run chmod on sendsnmptrap.pl to make the script executable. &lt;/LI&gt;
&lt;LI&gt;In the scrpt, change the Host:Port of the SNMP trap handler, the paths to the external commands splunk and snmptrap, and the user/password if necessary.&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;If those are good, you can test the script by executing, it's expecting 9 arguments:&lt;/P&gt;

&lt;P&gt;$SPLUNK_HOME/bin/scripts/snmptrap.pl "9" "test" "test" "test" "test" "test" "test" "test" "tes"  &lt;/P&gt;

&lt;P&gt;The script should run, or output some sort of errors. &lt;/P&gt;

&lt;P&gt;If the script runs correctly and you don't see the events in CA:&lt;BR /&gt;
- tcpdump to verify you see trap being sent, if you don't see trap sent verify you have the snmptrap installed correctly&lt;BR /&gt;
- Verify CA knows how to handle the configured OID and its not filtered. &lt;BR /&gt;
- Verify the trap is not blocked between host -&amp;gt; CA&lt;/P&gt;

&lt;P&gt;If the trap makes it to CA in test mode, but not when configured as an alert action:&lt;BR /&gt;
- Verify the Splunk user has permissions to execute the script.&lt;BR /&gt;
- Checked the savedsearch logs to see if any suppressions are being applied. &lt;BR /&gt;
- Check internal logs for any errors related to the script or the search&lt;BR /&gt;
* Check the search logs for any errors&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2019 13:07:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/snmp-trap-to-CA-spectrum/m-p/448707#M77990</guid>
      <dc:creator>solarboyz1</dc:creator>
      <dc:date>2019-08-21T13:07:02Z</dc:date>
    </item>
    <item>
      <title>Re: snmp trap to CA spectrum</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/snmp-trap-to-CA-spectrum/m-p/448708#M77991</link>
      <description>&lt;P&gt;Thanks a lot &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/84762"&gt;@solarboyz1&lt;/a&gt; for such elaborate troubleshooting steps. &lt;/P&gt;

&lt;P&gt;But i am stuck when the snmptrap command itself runs. &lt;BR /&gt;
Looks like permission issue is with the permissions. Although it has execute permissions for all &lt;BR /&gt;
-rwxr-xr-x 1 root root 14680 Oct 10  2012 /usr/bin/snmptrap&lt;/P&gt;

&lt;P&gt;But its trying to do below which is failing as all are with root permissions and i am running it with splunk permissions. &lt;/P&gt;

&lt;P&gt;Cannot rename /var/lib/net-snmp/snmpapp.conf to /var/lib/net-snmp/snmpapp.0.conf&lt;BR /&gt;
Cannot unlink /var/lib/net-snmp/snmpapp.conf&lt;BR /&gt;
read_config_store open failure on /var/lib/net-snmp/snmpapp.conf&lt;BR /&gt;
read_config_store open failure on /var/lib/net-snmp/snmpapp.conf&lt;BR /&gt;
read_config_store open failure on /var/lib/net-snmp/snmpapp.conf&lt;BR /&gt;
sh: line 1: 1.3.6.1.4.1.27389.1.1.1: command not found&lt;/P&gt;

&lt;P&gt;Do you suggest to change the permissions of the snmp files or directory or run as root ?&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 01:51:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/snmp-trap-to-CA-spectrum/m-p/448708#M77991</guid>
      <dc:creator>surekhasplunk</dc:creator>
      <dc:date>2020-09-30T01:51:32Z</dc:date>
    </item>
    <item>
      <title>Re: snmp trap to CA spectrum</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/snmp-trap-to-CA-spectrum/m-p/448709#M77992</link>
      <description>&lt;P&gt;Agree, your issue now deals with a non-root user trying to send an snmptrap. &lt;/P&gt;

&lt;P&gt;Check out the following:&lt;BR /&gt;
&lt;A href="https://superuser.com/questions/795889/snmp-with-not-root-user"&gt;https://superuser.com/questions/795889/snmp-with-not-root-user&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2019 13:02:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/snmp-trap-to-CA-spectrum/m-p/448709#M77992</guid>
      <dc:creator>solarboyz1</dc:creator>
      <dc:date>2019-08-22T13:02:07Z</dc:date>
    </item>
  </channel>
</rss>

