Forge Home

simp_snmpd

Configures snmpd agent using v3 USM on the client

11,297 downloads

73 latest version

5.0 quality score

We run a couple of automated
scans to help you access a
module's quality. Each module is
given a score based on how well
the author has formatted their
code and documentation and
modules are also checked for
malware using VirusTotal.

Please note, the information below
is for guidance only and neither of
these methods should be considered
an endorsement by Puppet.

Version information

  • 1.7.0 (latest)
  • 1.6.0
  • 1.4.0
  • 1.2.0
  • 1.1.1
  • 1.1.0
  • 1.0.1
  • 1.0.0
  • 0.2.1
  • 0.2.0
  • 0.1.2
  • 0.1.1
  • 0.0.3
  • 0.0.2
released Sep 16th 2024
This version is compatible with:
  • Puppet Enterprise 2023.8.x, 2023.7.x, 2023.6.x, 2023.5.x, 2023.4.x, 2023.3.x, 2023.2.x, 2023.1.x, 2023.0.x, 2021.7.x, 2021.6.x, 2021.5.x, 2021.4.x, 2021.3.x, 2021.2.x, 2021.1.x, 2021.0.x
  • Puppet >= 7.0.0 < 9.0.0
  • , , , ,

Start using this module

  • r10k or Code Manager
  • Bolt
  • Manual installation
  • Direct download

Add this module to your Puppetfile:

mod 'simp-simp_snmpd', '1.7.0'
Learn more about managing modules with a Puppetfile

Add this module to your Bolt project:

bolt module add simp-simp_snmpd
Learn more about using this module with an existing project

Manually install this module globally with Puppet module tool:

puppet module install simp-simp_snmpd --version 1.7.0

Direct download is not typically how you would use a Puppet module to manage your infrastructure, but you may want to download the module in order to inspect the code.

Download
Tags: snmp, simp, mib

Documentation

simp/simp_snmpd — version 1.7.0 Sep 16th 2024

License CII Best Practices Puppet Forge Puppet Forge Downloads Build Status

Table of Contents

  1. Description
  2. Setup - The basics of getting started with simp_snmp
  3. Usage - Configuration options and additional functionality
  4. Reference - An under-the-hood peek at what the module is doing and how
  5. Limitations - OS compatibility, etc.
  6. Development - Guide for contributing to the module

Description

This module is a SIMP Puppet profile for setting up SNMP v3, and USM configuration.

This is a SIMP module

This module is a component of the System Integrity Management Platform, a compliance-management framework built on Puppet.

If you find any issues, they should be submitted to our bug tracker.

This module is designed for use within a SIMP ecosystem, but it can be used independently.

  • When included within a SIMP ecosystem, security compliance settings will be managed from the Puppet server.

  • If used independently, all SIMP-managed security subsystems are disabled by default and must be explicitly opted into by administrators. Please review the parameters in simp/simp_options for details.

This module is a simp profile module and configures snmp using version 3 with usm authentication. To configure snmp in a different way use puppet-snmp directly.

#TODO add tsm and configure snmp to use encryption

Setup

What simp_snmp Affects

This profile wraps around the puppet-snmp module. It is designed to:

  • Install the net-snmpd package
  • Configure and manage the snmpd service
  • Optionally install the net-snmp-utils package and manage clients

NOTE: This module does not configure snmptrapd. This module will, default, ensure snmptrapd is stopped and disabled. If you decide to enable snmptrapd, you must configure it manually.

Beginning With simp_snmp

Install the puppet-snmp and pupmod-simp-simp_snmpd modules. The net-snmp and net-snmp-utils packages and their dependencies must be available through the package manager.

Usage

Simp_snmpd configures the snmpd daemon to listen only on the local interface by default. Set the following in hieradata to configure snmpd to Listen on UDP port 161 on the local interface and tcp on the interface with the ipaddress associated with the hostname. For more information, see the LISTENING ADDRESS section of the snmpd man page.

---
simp_snmpd::agentaddress:
- udp:localhost:161
- tcp:%{facts.fqdn}:161

classes:
  - simp_snmpd

Or, via instantiation:

class { simp_snmpd:
   agentaddress => ["udp:${facts['fqdn']}:161",'udp:localhost:161']
}

See the "Access" section for details on how the access is configured.

There are a few snmp options that can be configured directly from this module via hiera. Other changes to the configuration can be done by adding configuration files to the user snmpd dir. Set simp_snmpd::include_userdir to true in hiera, and add configuration files to the directory defined by simp_snmpd::user_snmpd_dir, by default /etc/snmp/snmpd.d.

Access

simp_snmpd configures access using the User-based Security Module (USM) and View-based Access Control Model (VACM). By default, it will create two users:

  • snmp_ro: A user with readonly access to the system information only

  • snmp_rw: A user with read/write access to all SNMP variables

    • Both users and access are configurable via hiera. See the SIMP user guide, How To Configure SNMPD for more information.
    • User passwords are automatically generated using SIMP's passgen from the simplib module. The SIMP user guide General Administration section gives information on where these passwords are stored.
    • The passwords for the users are configured when SNMP is configured the first time. If you need to change them, you will need to use the snmpusm command, or remove /var/lib/net-snmp and run puppet again to regenerate all of them.

Logging

simp_snmpd is configured to send logs to the system daemon. If simp_options syslog and logrotate are enabled, it will configure rsyslog rules to send logging to /var/log/snmpd.log.

This is configured via the simp_snmpd::snmpd_options setting. These are the options sent to the snmpd daemon on start up. By default it is logging to facility 6 which will be forwarded to the server if log forwarding is enabled.

For more information on these options see the man page for snmpcmd, the Logging section. Snmpcmd and its man pages are installed with the net-snmp-utils package.

Firewall

If simp_options firewall is enabled, it will parse the simp_snmpd::agentaddress list and configure iptables rules to open those ports to the trusted nets. If you want only the SNMP manager to be able to access the system, set simp_snmpd::trusted_nets to include only the manager systems addresses.

SNMP System Information

simp_snmpd configures some basic system information: contact, location system name, and services, in the snmpd configuration directory. These settings can be changed via hiera, instantiation, by creating a configuration file in the user directory.

NOTE: If the system variables are set in a configuration file then net-snmp marks them as not writable and will not allow them to be changed via snmpset or other client utilities. To be able to set information via a client, set simp_snmpd::system_info to false and the defaults will not be set in the configuration file.

SNMP Client

By default, the snmpd utilities (snmpget, snmpset, etc.) are not included. To include them, set simp_snmp::manage_client to true.

Reference

More information is included in the SIMP User Guide under SIMP HOWTO Guides: Configure SNMP. It includes information on copying additional MIBS and modules to the system.

Limitations

This is a SIMP Profile. It will not expose all options of the underlying modules, only the ones that are conducive to a supported SIMP infrastructure. If you need to do things that this module does not cover, you may need to create your own profile or inherit this profile and extend it to meet your needs.

SIMP Puppet modules are generally intended for use on Red Hat Enterprise Linux and compatible distributions, such as CentOS. Please see the metadata.json file for the most up-to-date list of supported operating systems, Puppet versions, and module dependencies.

Development

Please read our Contribution Guide.

Acceptance tests

This module includes Beaker acceptance tests using the SIMP Beaker Helpers. By default the tests use Vagrant with VirtualBox as a back-end; Vagrant and VirtualBox must both be installed to run these tests without modification. To execute the tests run the following:

bundle install
bundle exec rake beaker:suites

Please refer to the SIMP Beaker Helpers documentation for more information.