Skip to main content

Hello!

i’m using “network::cisco::standard::snmp::plugin” plugin to monitor various performance metrics of my cisco switches.

By default it checks all interfaces and i would like to filter out some of the less usefull interfaces, for example i would like to filter out all the interfaces that are in a down state (disconnetcted state, as the switch says).

From the --help command i’ve noticed a couple of options that could help me:

--check-metrics
            If the expression is true, metrics are checked (Default:
            '%{opstatus} eq "up"').

This seems to be the options that i’m looking for but it does not seem to work as i expected, it looks like all the perfomance data are still showing up and it is instead simply not triggering any thresholds for these interfaces.

--filter-perfdata-adv

This flter could work by filtering all the interfaces that have 0 as traffic, however in some cases some interfaces are not down and but still making 0 traffic and this could be a problem.

What do you think is the best way to implement this monitoring? Do you have any other ideas?

Best regards

Hi SottoMarine,

I use the Aruba plugin which is I think quite the same as the Cisco one and had the same problem.

You can administratively shutdown the unused ports or only monitor the most interesting ports of the switch.

You can do this manually adding each port you need to monitor using the model Net-Cisco-Standard-Interfaces-SNMP-custom and configure the macro INTERFACENAME with the name of the interface ^1/1$ for example, take a look at this link for the regex expressions:

or use the discovery method and add the ports you need by linking them to the model Net-Cisco-Standard-Interfaces-SNMP-custom.

Regards.


Hello DiamFred,

thank you for answer, unfortunately we are talking about roughly 90k interfaces over 10k devices of many different vendors 😥it’s impossibile to filter out those down state interfaces by name.

Best regards

 


Hello SottoMarine,

I think you can use the services discovery rules to accomplish this.

  • Navigate to Configuration > Services > Rules and search for Cisco.
  • Click on Net-Cisco-Standard-SNMP-Interface-Name.
  • Click on Inclusions / Exclusions & Macros, you can see that there is an exclusion on the status “down” of the interface, you can add more exclusions if needed.
  • Click on  Configuration  >  Services  >  Scan
  • Type the name of the host
  • Select the name of the rule and scan.
  • Centreon will request the switch and will display only up interfaces to add to monitoring.

You can then add a command to periodically execute this scan but I never used this…

Regards.


Hi @SottoMarine,

Your use case seems to be very specific.

As @DIAMFred said, you may discover only the interfaces that are in a certain state, but conditioning the monitoring of an interface on its traffic is not an available option.


Hi @SottoMarine,

Your use case seems to be very specific.

As @DIAMFred said, you may discover only the interfaces that are in a certain state, but conditioning the monitoring of an interface on its traffic is not an available option.

Hello @omercier , thank you for your answer, yeah i know it’s very specific, as for now i’m using  --filter-perfdata-adv, it was worth a try.

 

Best regards


Reply