On Thu, Mar 02, 2006 at 05:25:30PM +0000, Dave Shield wrote: > On Thu, 2006-03-02 at 08:10 -0500, Jean-Sebastien Morisset wrote: >> I seem to have a little problem. I have several Net-SNMP v5.3.0.1 >> clients on various Solaris servers, and I get the following trap from >> several of them: >> >> mteTriggerFired trap received from xxxxxxxxxxxxxxxxx: procTable >> .1.3.6.1.4.1.2021.2.1.100.2 1 cron >> >> This does NOT appear to be an error. > > What does walking the procTable show?
Dave, Everything appears normal: # snmpwalk -c ******** -O s -v 2c devunix4 prTable|grep '\.2 ' prIndex.2 = INTEGER: 2 prNames.2 = STRING: cron prMin.2 = INTEGER: 1 prMax.2 = INTEGER: 1 prCount.2 = INTEGER: 1 prErrorFlag.2 = INTEGER: 0 prErrMessage.2 = STRING: prErrFix.2 = INTEGER: 0 prErrFixCmd.2 = STRING: And on the server itself: # ps -ef|grep cron root 7841 1 0 Feb 26 ? 0:02 /usr/sbin/cron A trap was sent at 8:36:01 this morning. Cron was certainly active since it's log file shows: [snip!] > sys 19320 c Thu Mar 2 08:35:00 2006 < sys 19320 c Thu Mar 2 08:35:00 2006 > CMD: /usr/lib/sa/sa1 > sys 19349 c Thu Mar 2 08:36:00 2006 < sys 19349 c Thu Mar 2 08:36:01 2006 > CMD: /usr/lib/sa/sa1 > sys 19376 c Thu Mar 2 08:37:00 2006 < sys 19376 c Thu Mar 2 08:37:00 2006 > CMD: /usr/lib/sa/sa1 [snip!] Although I'm monitoring many single instances of a process on this and other servers, "cron" is the only one generating traps on occasion. And not just on this server -- on a few others as well. I haven't found a pattern to these traps yet -- they just happen once in a while (maybe a total of 3-4 traps / day from 20 servers or so). Thanks, js. -- Jean-Sebastien Morisset, Sr. UNIX Administrator <[EMAIL PROTECTED]> Personal Home Page <http://jsmoriss.mvlan.net/> Underwater and Travel Photographs <http://www.mvpix.com/> ------------------------------------------------------- This SF.Net email is sponsored by xPML, a groundbreaking scripting language that extends applications into web and mobile media. Attend the live webcast and join the prime developer group breaking into this new coding territory! http://sel.as-us.falkag.net/sel?cmd=lnk&kid=110944&bid=241720&dat=121642 _______________________________________________ Net-snmp-users mailing list Net-snmp-users@lists.sourceforge.net Please see the following page to unsubscribe or change other options: https://lists.sourceforge.net/lists/listinfo/net-snmp-users