# snmpd.conf # First, map the community name (COMMUNITY) into a security name # (local and mynetwork, depending on where the request is coming # from): # sec.name source community com2sec local localhost public com2sec mynetwork 172.16.0.0/12 public com2sec mynetwork 10.0.0.0/8 public com2sec mynetwork 192.168.0.0/16 public # Second, map the security names into group names: # sec.model sec.name group MyRWGroup v1 local group MyRWGroup v2c local group MyRWGroup usm local group MyROGroup v1 mynetwork group MyROGroup v2c mynetwork group MyROGroup usm mynetwork # Third, create a view for us to let the groups have rights to: # incl/excl subtree mask view all included .1 80 # Finally, grant the 2 groups access to the 1 view with different # write permissions: # context sec.model sec.level match read write notif access MyROGroup "" any noauth exact all none none access MyRWGroup "" any noauth exact all all none # System contact information sysLocation Somewhere in or near Leiden sysContact Stichting Wireless Leiden / +31 71 5139817 # Process checks. # name max min proc lvrouted.opt 1 1 proc sshd 8 1 proc syslogd 1 1 proc ntpd 1 1 proc snmpd 1 1 proc dhcpd 1 1 proc pen 1 1 proc cron 2 1 proc named 1 1 # disk checks # path min #disk / 90% #disk /var 80% #disk /usr 80% #disk /tmp 60% includeAllDisks 85% # load average checks # 1max 5max 15max load 12 14 14 # Pass through control # miboid exec-command pass .1.3.6.1.4.1.2021.50 /usr/local/nagios/bin/processor pass_persist .1.3.6.1.4.1.21695.1.2 /usr/local/sbin/dhcpd-snmp /usr/local/etc/dhcpd-snmp.conf extend .1.3.6.1.4.1.2021.61 nagios-www /usr/local/sbin/proxy-test.sh extend .1.3.6.1.4.1.2021.62 nagios-routing /usr/local/sbin/lvrouted-test.sh extend .1.3.6.1.4.1.2021.70 users /bin/sh /usr/local/bin/users.sh