Managing ProLiant servers with Linux HOWTO

18
For Red Hat and SuSE systems:
# service hp-health stop
# service hp-snmp-agents stop
3-3 Parameters
This section lists parameters for various agents and services.
Table 10 includes the command line arguments that can be passed to the NIC agents (cmanicd) from
the /opt/hp/hp-snmp-agents/nic/etc/cmanicd script.
Table 10. Parameters for NIC agents
Parameter Description
-p poll_time This parameter specifies the number of seconds between data caching and poll intervals. NIC drivers are
only queried when a request comes in and the cached information is older than the specified poll interval.
The default value is 20 seconds. The minimum poll time is 10 seconds.
-s set_state This parameter specifies whether SNMP set commands are allowed for this agent. A set_state of OK
(default) means that SNMP set commands are allowed. A set_state of NOT_OK means that SNMP set
commands are not allowed.
-t trap_state This parameter specifies whether the NIC Agent is allowed to send traps or not. A trap_state of OK (default)
indicates the NIC Agent can send SNMP traps. A trap_state of NOT_OK means that the NIC Agent is not
allowed to send traps.
For example, to set the poll interval to 30 seconds and prevent traps, change PFLAGS= to PFLAGS="-
p30 -t NOT_OK" in the /opt/hp/hp-snmp-agents/nic/etc/cmanicd script.
Traps are configured using the standard SNMP configuration file (snmpd.conf). See the snmpd.conf
manual page for the most current configuration information. When the snmpd.conf or
snmpd.local.conf configuration files are changed or when the SNMPCONFPATH environment
variable is changed, the cmanic daemon must be restarted.
If your operating system has an active firewall configuration, external SNMP requests might be
rejected by the system, which prevents remote management operation. Your system must be
configured to allow udp connections on port 161 from any hosts that need to be able to send SNMP
requests. There are significant security implications to configuring a firewall. Consider the iptables,
ipchains, iptables-save, and iptables-restore man pages and the documentation for any firewall
configuration application in use as mandatory reading before making any change to the firewall
configuration.
The Rack Infrastructure Interface Service is contained in an executable called cpqriisd which resides in
the /sbin directory. It can be invoked by using the commands in Table 11.
Table 11. Command options for the Rack Infrastructure Service
Option Description
-F This option will "daemonize" the process and start the daemon in a production level environment. Usage is
recommended. An easier way to accomplish this task is to execute the hp-snmp-agents run-level script.
-D This option starts the service in a debug environment. stdin and stdout go to the console; typing "e" will stop the
daemon. Alerts are logged in to the same text console.
-V This option enables the verbosity of the output. The default behavior is to output to both /var/log/messages and
tty1 – tty10.
-? This option reports the version of the service and informs the user of the other options described above.