If you have landed on this page, you are lkely interested in setting up SNMP monitoring for System Center Operations Manager 2012 and have probably been frustrated with the lack of consolidated information or even outdated information found on the Internet. Prepare for a quick and accurate guide to get you trapping SNMP events in no time! I have labeled this Part-2, though there is no Part-1 just yet. I presume that you have taken steps to already discover devices in SNMP and now want to start seeing what type of traps are being generated from those systems. If you haven't been that far yet, let me know and I will post some resources.
First thing is first, despite what you may have read up until now, you still need to have the SNMP service running on the management server that is receiving the traps, do not disable the SNMP service. The TRAP service should be installed but turned off. This contradicts almost every other blog out there but we could not get traps coming in until we turned the service back on, period. Try the enclosed methods first and if you want to toy around, go from there, but I cannot guarantee that you'll be able to get traps if you disable both services. Additionally, to test traps, we setup a basic CentOS system running SNMP. We added the device to SCOM under networking devices. We did not install the LINUX agent.
- Open up the Windows Server Manager, then select Features and on right, select "Add Features"
- Select SNMP Service along with SNMP WMI Provider, you will have to expand to in order to select that additional component.
- Select "Install" and wait for the installation to complete.
- Open services.msc via the run prompt, or through the server manager. Scroll down until you see the SNMP services. Disable the SNMP Trap service as shown.
- Double-click the "SNMP Service" to open the property settings.
- In the SNMP Services Properties window, select the option to "Accept SNMP packets from any host" and then input a community name, such as "public".
- Open the Operations Managre console, select Authoring and then rules. Right-click on Rules in order to create a new rule
- In the initial Create Rule Wizard, expand "Collection rules"->"Event based" and select the "SNMP Trap (Event)".
- Select to view all targets, then look for node type.
- Your rule should look like this now, a rule name that you have provided, the category of "event collection" and a rule target of "Node".
- For now, you have to input an OID as the screen will not take a blank OID. The one below is generic and can be used for now (22.214.171.124.0).
- Go back to the authoring screen and change the scope to Node so that you can find the newly created rule more easily.
- Right-click and select properties or double-click the new rule you just created.
- Under the "Data sources" option, select "Edit".
- Now clear the previously entered OID and select OK.
- Now navigate to the "Monitoring" screen in the Operations Manager Console. Let's create a folder to group our SNMP alerts and collections to make them easy to find. Right-click the top tree labeled "Monitoring" and select "New -> Folder".
- Select the newly created folder and lets add a new event view to that folder.
- Narrow the scope to show data related to "Node" objects.
- For your "Select conditions" show information generated by rules and select the new rule that was created earlier.
- Now, generate a trap. In this case, we're using CentOS 6.2 to generate a simple version 2c SNMP trap to send to the SCOM server.
- If all is well, you should see those traps show up in the SNMP event window.
If you do not see SNMP events showing up, then it is likely your local SNMP service is not functioning correctly or needs to be reinstalled. I will add a couple of great troubleshooting blogs in a few days.