Overview

    In this case the information is sent from a SNMP-enabled device and is collected or “trapped” by Zabbix.

    Usually traps are sent upon some condition change and the agent connects to the server on port 162 (as opposed to port 161 on the agent side that is used for queries). Using traps may detect some short problems that occur amidst the query interval and may be missed by the query data.

    Receiving SNMP traps in Zabbix is designed to work with snmptrapd and one of the built-in mechanisms for passing the traps to Zabbix - either a perl script or SNMPTT.

    The workflow of receiving a trap:

    1. snmptrapd receives a trap

    2. snmptrapd passes the trap to SNMPTT or calls Perl trap receiver

    3. Zabbix SNMP trapper reads and parses the trap file

    4. For each trap Zabbix finds all “SNMP trapper” items with host interfaces matching the received trap address. Note that only the selected “IP” or “DNS” in host interface is used during the matching.

    5. For each found item, the trap is compared to regexp in “snmptrap[regexp]”. The trap is set as the value of all matched items. If no matching item is found and there is an “snmptrap.fallback” item, the trap is set as the value of that.

    6. If the trap was not set as the value of any item, Zabbix by default logs the unmatched trap. (This is configured by “Log unmatched SNMP traps” in Administration → General → Other.)

    1 Configuring SNMP traps

    Configuring the following fields in the frontend is specific for this item type:

    • Your host must have an SNMP interface

    In Configuration → Hosts, in the Host interface field set an SNMP interface with the correct IP or DNS address. The address from each received trap is compared to the IP and DNS addresses of all SNMP interfaces to find the corresponding hosts.

    • Configure the item

    In the Key field use one of the SNMP trap keys:

    Multi-line regexp matching is not supported at this time.

    Set the Type of information to be ‘Log’ for the timestamps to be parsed. Note that other formats such as ‘Numeric’ are also acceptable but might require a custom trap handler.

    For SNMP trap monitoring to work, it must first be correctly set up.

    2 Setting up SNMP trap monitoring

    Configuring Zabbix server/proxy

    To read the traps, Zabbix server or proxy must be configured to start the SNMP trapper process and point to the trap file that is being written by SNMPTT or a perl trap receiver. To do that, edit the configuration file ( or zabbix_proxy.conf):

    1. StartSNMPTrapper=1

    2. SNMPTrapperFile=[TRAP FILE]

    If systemd parameter is used, this file is unlikely to work in /tmp.

    Configuring SNMPTT

    For the best performance, SNMPTT should be configured as a daemon using snmptthandler-embedded to pass the traps to it. See instructions for configuring SNMPTT in its homepage:

    When SNMPTT is configured to receive the traps, configure :

    1. enable the use of the Perl module from the NET-SNMP package:
      net_snmp_perl_enable = 1

    2. log traps to the trap file which will be read by Zabbix:
      log_enable = 1
      log_file = [TRAP FILE]

    3. set the date-time format:
      date_time_format = %H:%M:%S %Y/%m/%d = [DATE TIME FORMAT]

    The “net-snmp-perl” package has been removed in RHEL/CentOS 8.0-8.2; re-added in RHEL 8.3. For more information, see the known issues.

    Now format the traps for Zabbix to recognize them (edit snmptt.conf):

    1. Each FORMAT statement should start with “ZBXTRAP [address]”, where [address] will be compared to IP and DNS addresses of SNMP interfaces on Zabbix. E.g.:
      EVENT coldStart .1.3.6.1.6.3.1.1.5.1 “Status Events” Normal
      FORMAT ZBXTRAP $aA Device reinitialized (coldStart)

    2. See more about SNMP trap format below.

    Do not use unknown traps - Zabbix will not be able to recognize them. Unknown traps can be handled by defining a general event in snmptt.conf:
    EVENT general .* “General event” Normal

    Configuring Perl trap receiver

    Requirements: Perl, Net-SNMP compiled with —enable-embedded-perl (done by default since Net-SNMP 5.4)

    Perl trap receiver (look for misc/snmptrap/zabbix_trap_receiver.pl) can be used to pass traps to Zabbix server directly from snmptrapd. To configure it:

    • add the perl script to snmptrapd configuration file (snmptrapd.conf), e.g.:
      perl do “[FULL PATH TO PERL RECEIVER SCRIPT]“;

    • configure the receiver, e.g:
      $SNMPTrapperFile = ‘[TRAP FILE]‘;
      $DateTimeFormat = ‘[DATE TIME FORMAT]‘;

    If script name is not quoted, snmptrapd will refuse to start up with messages, similar to these:

    net-snmp agent does not support AES256 with SNMPv3/USM.

    SNMP trap format

    All customized perl trap receivers and SNMPTT trap configuration must format the trap in the following way: [timestamp] [the trap, part 1] ZBXTRAP [address] [the trap, part 2], where

    • ZBXTRAP - header that indicates that a new trap starts in this line

    • [address] - IP address used to find the host for this trap

    Note that “ZBXTRAP” and “[address]” will be cut out from the message during processing. If the trap is formatted otherwise, Zabbix might parse the traps unexpectedly.

    3 System requirements

    Large file support

    Zabbix has “Large file support” for SNMP trapper files. The maximum file size that Zabbix can read is 2^63 (8 EiB). Note that the filesystem may impose a lower limit on the file size.

    Log rotation

    Zabbix does not provide any log rotation system - that should be handled by the user. The log rotation should first rename the old file and only later delete it so that no traps are lost:

    1. Zabbix opens the trap file at the last known location and goes to step 3

    2. Zabbix checks if the currently opened file has been rotated by comparing the inode number to the define trap file’s inode number. If there is no opened file, Zabbix resets the last location and goes to step 1.

    3. Zabbix reads the data from the currently opened file and sets the new location.

    4. The new data are parsed. If this was the rotated file, the file is closed and goes back to step 2.

    5. If there was no new data, Zabbix sleeps for 1 second and goes back to step 2.

    File system

    Because of the trap file implementation, Zabbix needs the file system to support inodes to differentiate files (the information is acquired by a stat() call).

    4 Setup example

    This example uses snmptrapd + SNMPTT to pass traps to Zabbix server. Setup:

    1. zabbix_server.conf - configure Zabbix to start SNMP trapper and set the trap file:
      StartSNMPTrapper=1
      SNMPTrapperFile=/tmp/my_zabbix_traps.tmp

    2. snmptrapd.conf - add SNMPTT as the trap handler:
      traphandle default snmptt

    3. snmptt.ini -
      enable the use of the Perl module from the NET-SNMP package:
      net_snmp_perl_enable = 1
      configure output file and time format:
      log_file = /tmp/my_zabbix_traps.tmp
      date_time_format = %H:%M:%S %Y/%m/%d

    4. snmptt.conf - define a default trap format:
      EVENT general .* “General event” Normal
      FORMAT ZBXTRAP $aA $ar

    5. Create an SNMP item TEST:
      Host’s SNMP interface IP: 127.0.0.1
      Key: snmptrap[“General”]
      Log time format: hh:mm:ss yyyy/MM/dd

    This results in:

    1. Command used to send a trap:
      snmptrap -v 1 -c public 127.0.0.1 ‘.1.3.6.1.6.3.1.1.5.3’ ‘0.0.0.0’ 6 33 ‘55’ .1.3.6.1.6.3.1.1.5.3 s “teststring000”

    2. The received trap:
      15:48:18 2011/07/26 .1.3.6.1.6.3.1.1.5.3.0.33 Normal “General event” localhost - ZBXTRAP 127.0.0.1 127.0.0.1

    3. Value for item TEST:
      15:48:18 2011/07/26 .1.3.6.1.6.3.1.1.5.3.0.33 Normal “General event” localhost - 127.0.0.1

    This simple example uses SNMPTT as traphandle. For better performance on production systems, use embedded Perl to pass traps from snmptrapd to SNMPTT or directly to Zabbix.

    5 See also