{"id":1718,"date":"2018-12-15T11:43:38","date_gmt":"2018-12-15T08:43:38","guid":{"rendered":"http:\/\/kifarunix.com\/?p=1718"},"modified":"2024-03-11T21:43:39","modified_gmt":"2024-03-11T18:43:39","slug":"install-and-configure-snmp-ubuntu-18-04-and-centos-7","status":"publish","type":"post","link":"https:\/\/kifarunix.com\/install-and-configure-snmp-ubuntu-18-04-and-centos-7\/","title":{"rendered":"Install and Configure SNMP on Ubuntu 18.04 and CentOS 7"},"content":{"rendered":"\n<p>In this guide, we are going to learn how to install and configure SNMP on Ubuntu 18.04 and CentOS 7. SNMP is an acronym for Simple Network Management Protocol. It provides an agentless method of managing and monitoring of network devices and servers for health information, system metrics such as CPU load, Physical Memory usage, number of running processes, service state e.t.c that support polling over the <code class=\"systemitem\">SNMP<\/code> protocol.. With this method, you don&#8217;t need to install the usual Nagios NRPE agent on your hosts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Installing SNMP on Ubuntu 18.04 and CentOS 7<\/h2>\n\n\n\n<p>Before you can monitor Linux hosts with Nagios using SNMP, you first need to install the necessary packages. The SNMP packages are available on default repositories.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Install SNMP on Ubuntu 18.04 and CentOS 7<\/h4>\n\n\n\n<p>Run the commands below to install the SNMP packages;<\/p>\n\n\n\n<p>On CentOS 7<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>yum update\nyum install net-snmp <code>net-snmp-utils<\/code><\/pre>\n\n\n\n<p>On Ubuntu 18.04<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>apt update\napt install snmpd snmp libsnmp-dev<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">Configure SNMP on Ubuntu 18.04 and CentOS 7<\/h3>\n\n\n\n<p>Once the installation is done, proceed to configure SNMP as follows. The default configuration file for SNMP is <code class=\"filename\">\/etc\/snmp\/snmpd.conf<\/code>. The file is higly commented and thus, we will only make a few changes. As a result, make a copy of the original file before you can proceed.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>cp \/etc\/snmp\/snmpd.conf \/etc\/snmp\/snmpd.conf.bak<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">Configuring Authentication<\/h3>\n\n\n\n<p>SNMP supports three versions of SNMP protocol; <code class=\"filename\">version 1, 2c and 3<\/code>. Both version 1 and 2c provides authentication using <code class=\"filename\"><em class=\"firstterm\">community string<\/em><\/code>, a shared secret between the agent and the client that is passed in clear text over the network while version 3 supports user authentication and message encryption using a variety of protocols and is thus a bit more secure.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"brid-System_Monitoring_Tools-Net-SNMP-Configuring_Authentication-2c_community\">Configuring SNMP Version 2c Community<\/h3>\n\n\n\n<p>As stated above, SNMP v2 provides access using a permission directive, a community string and the source Address. The source address can be IP of the Nagios Server (SNMP server). This directive should be set in the format;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code><em class=\"replaceable\">directive<\/em> <em class=\"replaceable\">community<\/em> [<span class=\"optional\"><em class=\"replaceable\">source<\/em> [<em class=\"replaceable\">OID<\/em>]<\/span>]<\/code><\/pre>\n\n\n\n<p>where directive can be <code class=\"option\">rocommunity<\/code> (provides read-only access) or <code class=\"option\">rwcommunity<\/code> (provides read-write access), OID is the optional SNMP tree to provide access to. To configure SNMP v2c;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">On Ubuntu 18.04 proceed as follows;<\/h4>\n\n\n\n<p>Edit the <code class=\"systemitem\">snmpd<\/code> configuration file and configure it to listen on both a localhost and an interface IP. By default, SNMP agent on is set to allow connections originating from the localhost only. <code>agentAddress udp:127.0.0.1:161,udp:192.168.43.154:161<\/code>.<\/p>\n\n\n\n<p>Also, configure it to allow the monitoring server (Nagios server in my case, with IP, 192.168.43.101) only to connect using the community string (<code>Ex@mPL3<\/code>).<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>vim \/etc\/snmp\/snmpd.conf<\/code><\/pre>\n\n\n\n<pre class=\"scroll-box\"><code>\n...\n#  AGENT BEHAVIOUR\n#\n\n#  Listen for connections from the local system only\n<strong>agentAddress udp:127.0.0.1:161,udp:192.168.43.154:161<\/strong>\n#  Listen for connections on all interfaces (both IPv4 *and* IPv6)\n#agentAddress udp:161,udp6:[::1]:161\n...\n###############################################################################\n#\n#  ACCESS CONTROL\n#\n...\n<strong>rocommunity Ex@mPL3 192.168.43.101<\/strong>\n\n###############################################################################\n#\n# SYSTEM INFORMATION\n<\/code><\/pre>\n\n\n\n<p>Note that for any changes to the configuration file to take effect, force the <code class=\"systemitem\">snmpd<\/code> service to re-read the configuration by running the following command:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>systemctl reload snmpd<\/code><\/pre>\n\n\n\n<p>If you can check, SNMP is now listening on two interfaces;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>netstat -nlpu|grep snmp<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>udp    16128      0 <strong>192.168.43.154:161<\/strong>      0.0.0.0:*                           10057\/snmpd         \nudp     3072      0 <strong>127.0.0.1:161<\/strong>           0.0.0.0:*                           10057\/snmpd<\/code><\/pre>\n\n\n\n<p>If firewall is running, allow connection from the Nagios server.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>ufw allow from 192.168.43.101 to any port 161 proto udp\nufw reload<\/code><\/pre>\n\n\n\n<p>Next, run the command below from the Nagios Server to verify access to the host;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>snmpwalk -v2c -c Ex@mPL3 192.168.43.154<\/code><\/pre>\n\n\n\n<pre class=\"scroll-box\"><code>\niso.3.6.1.2.1.1.1.0 = STRING: \"Linux u18svr 4.15.0-46-generic #49-Ubuntu SMP Wed Feb 6 09:33:07 UTC 2019 x86_64\"\niso.3.6.1.2.1.1.2.0 = OID: iso.3.6.1.4.1.8072.3.2.10\niso.3.6.1.2.1.1.3.0 = Timeticks: (1082) 0:00:10.82\niso.3.6.1.2.1.1.4.0 = STRING: \"Me &lt;me@example.org&gt;\"\niso.3.6.1.2.1.1.5.0 = STRING: \"ubuntu18svr\"\niso.3.6.1.2.1.1.6.0 = STRING: \"Sitting on the Dock of the Bay\"\niso.3.6.1.2.1.1.7.0 = INTEGER: 72\niso.3.6.1.2.1.1.8.0 = Timeticks: (2) 0:00:00.02\niso.3.6.1.2.1.1.9.1.2.1 = OID: iso.3.6.1.6.3.11.3.1.1\niso.3.6.1.2.1.1.9.1.2.2 = OID: iso.3.6.1.6.3.15.2.1.1\n<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\">On CentOS 7, proceed as follows;<\/h4>\n\n\n\n<p>Set the community string and allow access from the Nagios server.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>echo -e \"# SNMP version 2c community\\nrocommunity Ex@mPL3 192.168.43.101\" &gt;&gt; \/etc\/snmp\/snmpd.conf<\/code><\/pre>\n\n\n\n<p>Configure <code class=\"systemitem\">snmpd<\/code> to listens for incoming SNMP requests on UDP port 161 on loopback and other interfaces. This involves modifying snmpd start up script. Run the command below to effect this change. You first need to backup the original service config.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>cp \/lib\/systemd\/system\/snmpd.service \/lib\/systemd\/system\/snmpd.service.bak<\/code><\/pre>\n\n\n\n<p>Edit the snmpd service configuration file and replace the line <code class=\"systemitem\">ExecStart=\/usr\/sbin\/snmpd $OPTIONS -f<\/code> with;&nbsp; <code class=\"systemitem\">ExecStart=\/usr\/sbin\/snmpd $OPTIONS -f udp:127.0.0.1:161 udp:192.168.43.23.161<\/code> such that you configuration looks like;<\/p>\n\n\n\n<pre class=\"scroll-box\"><code>\n[Unit]\nDescription=Simple Network Management Protocol (SNMP) Daemon.\nAfter=syslog.target network.target\n\n[Service]\nType=notify\nEnvironment=OPTIONS=\"-LS0-6d\"\nEnvironmentFile=-\/etc\/sysconfig\/snmpd\n<strong>ExecStart=\/usr\/sbin\/snmpd $OPTIONS -f udp:127.0.0.1:161 udp:192.168.43.23:161<\/strong>\nExecReload=\/bin\/kill -HUP $MAINPID\n\n[Install]\nWantedBy=multi-user.target\n<\/code><\/pre>\n\n\n\n<p>Reload the system units and restart snmpd service;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>systemctl daemon-reload\nsystemctl restart snmpd<\/code><\/pre>\n\n\n\n<p>Verify that both interfaces are listening;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ss -nlpu|grep snmp<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>UNCONN     0     0     <strong>192.168.43.23:161<\/strong>              *:*                   users:((\"snmpd\",pid=4931,fd=7))\nUNCONN     0     0     <strong>127.0.0.1:161<\/strong>              *:*                   users:((\"snmpd\",pid=4931,fd=6))<\/code><\/pre>\n\n\n\n<p>If firewalld is running, create a new zone and allow access to snmp agent only from the Nagios server;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>firewall-cmd --new-zone=snmp --permanent<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>firewall-cmd --zone=snmp --add-interface=eth1 --permanent<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>firewall-cmd --zone=snmp --add-source=192.168.43.101 --permanent<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>firewall-cmd --zone=snmp --add-port=161\/udp --permanent<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>firewall-cmd --reload<\/code><\/pre>\n\n\n\n<p>Verify active zones;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>firewall-cmd --get-active-zones<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>snmp\n  sources: 192.168.43.101\npublic\n  interfaces: eth0 eth1<\/code><\/pre>\n\n\n\n<p>However, you can simply run the commands below open snmpd port<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>firewall-cmd --add-port=161\/udp --permanent\nfirewall-cmd --reload<\/code><\/pre>\n\n\n\n<p>Test connectivity from the Nagios server;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>snmpwalk -v2c -c Ex@mPL3 192.168.43.23<\/code><\/pre>\n\n\n\n<pre class=\"scroll-box\"><code>\niso.3.6.1.2.1.1.1.0 = STRING: \"Linux Cent7.example.com 3.10.0-957.5.1.el7.x86_64 #1 SMP Fri Feb 1 14:54:57 UTC 2019 x86_64\"\niso.3.6.1.2.1.1.2.0 = OID: iso.3.6.1.4.1.8072.3.2.10\niso.3.6.1.2.1.1.3.0 = Timeticks: (191101) 0:31:51.01\niso.3.6.1.2.1.1.4.0 = STRING: \"Root &lt;root@localhost&gt; (configure \/etc\/snmp\/snmp.local.conf)\"\niso.3.6.1.2.1.1.5.0 = STRING: \"Cent7.example.com\"\niso.3.6.1.2.1.1.6.0 = STRING: \"Unknown (edit \/etc\/snmp\/snmpd.conf)\"\niso.3.6.1.2.1.1.8.0 = Timeticks: (3) 0:00:00.03\niso.3.6.1.2.1.1.9.1.2.1 = OID: iso.3.6.1.6.3.11.3.1.1\niso.3.6.1.2.1.1.9.1.2.2 = OID: iso.3.6.1.6.3.15.2.1.1\niso.3.6.1.2.1.1.9.1.2.3 = OID: iso.3.6.1.6.3.10.3.1.1\n<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"brid-System_Monitoring_Tools-Net-SNMP-Configuring_Authentication-3_user\">Configuring SNMP Version 3<\/h3>\n\n\n\n<p>SNMP v3 uses a username, permission, security level, authentication and privacy passphrases to allow access. As a result, you need to create user for authenticating. When created, the user is added to the following configuration files; <code class=\"filename\">\/etc\/snmp\/snmpd.conf<\/code> and <code class=\"filename\">\/var\/lib\/net-snmp\/snmpd.conf<\/code>. Before you can proceed, make a copy of the original configuration file just like we did above.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>cp \/etc\/snmp\/snmpd.conf \/etc\/snmp\/snmpd.conf.bak<\/code><\/pre>\n\n\n\n<p>Stop SNMP daemon<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>systemctl stop snmpd<\/code><\/pre>\n\n\n\n<p>Create a read-only authentication user using the <code class=\"filename\">net-snmp-create-v3-user<\/code> command. The command syntax is;<\/p>\n\n\n\n<p><code class=\"filename\">net-snmp-create-v3-user [-ro] [-A authpass] [-a MD5|SHA] [-X privpass][-x DES|AES] [username]<\/code><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>net-snmp-create-v3-user -ro -A STrP@SSWRD -a SHA -X STr0ngP@SSWRD -x AES snmpadmin<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>adding the following line to \/var\/lib\/snmp\/snmpd.conf:\n   createUser snmpadmin SHA \"<strong>STrP@SSWRD<\/strong>\" AES <strong>STr0ngP@SSWRD<\/strong>\nadding the following line to \/usr\/share\/snmp\/snmpd.conf:\n   rouser snmpadmin<\/code><\/pre>\n\n\n\n<p>Start SNMP daemon and configure inbound Firewall rules to UDP port 161 as we did above.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>systemctl start snmpd<\/code><\/pre>\n\n\n\n<p>Enable SNMP daemon to run on system reboot.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>systemctl enable snmpd<\/code><\/pre>\n\n\n\n<p>Test to verify that everything is working as expected.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>snmpwalk -v3 -a SHA -A STrP@SSWRD -x AES -X STr0ngP@SSWRD -l authPriv -u snmpadmin localhost | head<\/code><\/pre>\n\n\n\n<p>CentOS 7:<\/p>\n\n\n\n<pre class=\"scroll-box\"><code>\nSNMPv2-MIB::sysDescr.0 = STRING: Linux Cent7.example.com 3.10.0-957.5.1.el7.x86_64 #1 SMP Fri Feb 1 14:54:57 UTC 2019 x86_64\nSNMPv2-MIB::sysObjectID.0 = OID: NET-SNMP-MIB::netSnmpAgentOIDs.10\nDISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (2095) 0:00:20.95\nSNMPv2-MIB::sysContact.0 = STRING: Root &lt;root@localhost&gt; (configure \/etc\/snmp\/snmp.local.conf)\nSNMPv2-MIB::sysName.0 = STRING: Cent7.example.com\nSNMPv2-MIB::sysLocation.0 = STRING: Unknown (edit \/etc\/snmp\/snmpd.conf)\nSNMPv2-MIB::sysORLastChange.0 = Timeticks: (6) 0:00:00.06\nSNMPv2-MIB::sysORID.1 = OID: SNMP-MPD-MIB::snmpMPDCompliance\nSNMPv2-MIB::sysORID.2 = OID: SNMP-USER-BASED-SM-MIB::usmMIBCompliance\nSNMPv2-MIB::sysORID.3 = OID: SNMP-FRAMEWORK-MIB::snmpFrameworkMIBCompliance\n<\/code><\/pre>\n\n\n\n<p>Ubuntu 18.04:<\/p>\n\n\n\n<pre class=\"scroll-box\"><code>\niso.3.6.1.2.1.1.1.0 = STRING: \"Linux u18svr 4.15.0-46-generic #49-Ubuntu SMP Wed Feb 6 09:33:07 UTC 2019 x86_64\"\niso.3.6.1.2.1.1.2.0 = OID: iso.3.6.1.4.1.8072.3.2.10\niso.3.6.1.2.1.1.3.0 = Timeticks: (59297) 0:09:52.97\niso.3.6.1.2.1.1.4.0 = STRING: \"Me &lt;me@example.org&gt;\"\niso.3.6.1.2.1.1.5.0 = STRING: \"u18svr\"\niso.3.6.1.2.1.1.6.0 = STRING: \"Sitting on the Dock of the Bay\"\niso.3.6.1.2.1.1.7.0 = INTEGER: 72\niso.3.6.1.2.1.1.8.0 = Timeticks: (1) 0:00:00.01\niso.3.6.1.2.1.1.9.1.2.1 = OID: iso.3.6.1.6.3.11.3.1.1\niso.3.6.1.2.1.1.9.1.2.2 = OID: iso.3.6.1.6.3.15.2.1.1\n<\/code><\/pre>\n\n\n\n<p>From a remote host;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>snmpwalk -v3 -a SHA -A STrP@SSWRD -x AES -X STr0ngP@SSWRD -l authPriv -u snmpadmin 192.168.43.23 | head<\/code><\/pre>\n\n\n\n<pre class=\"scroll-box\"><code>\niso.3.6.1.2.1.1.1.0 = STRING: \"Linux Cent7.example.com 3.10.0-957.5.1.el7.x86_64 #1 SMP Fri Feb 1 14:54:57 UTC 2019 x86_64\"\niso.3.6.1.2.1.1.2.0 = OID: iso.3.6.1.4.1.8072.3.2.10\niso.3.6.1.2.1.1.3.0 = Timeticks: (15002) 0:02:30.02\niso.3.6.1.2.1.1.4.0 = STRING: \"Root &lt;root@localhost&gt; (configure \/etc\/snmp\/snmp.local.conf)\"\niso.3.6.1.2.1.1.5.0 = STRING: \"Cent7.example.com\"\niso.3.6.1.2.1.1.6.0 = STRING: \"Unknown (edit \/etc\/snmp\/snmpd.conf)\"\niso.3.6.1.2.1.1.8.0 = Timeticks: (6) 0:00:00.06\niso.3.6.1.2.1.1.9.1.2.1 = OID: iso.3.6.1.6.3.11.3.1.1\niso.3.6.1.2.1.1.9.1.2.2 = OID: iso.3.6.1.6.3.15.2.1.1\niso.3.6.1.2.1.1.9.1.2.3 = OID: iso.3.6.1.6.3.10.3.1.1\n<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>snmpwalk -v3 -a SHA -A STrP@SSWRD -x AES -X STr0ngP@SSWRD -l authPriv -u snmpadmin 192.168.43.154 | head<\/code><\/pre>\n\n\n\n<pre class=\"scroll-box\"><code>\nSNMPv2-MIB::sysDescr.0 = STRING: Linux u18svr 4.15.0-46-generic #49-Ubuntu SMP Wed Feb 6 09:33:07 UTC 2019 x86_64\nSNMPv2-MIB::sysObjectID.0 = OID: NET-SNMP-MIB::netSnmpAgentOIDs.10\nDISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (114664) 0:19:06.64\nSNMPv2-MIB::sysContact.0 = STRING: Me &lt;me@example.org&gt;\nSNMPv2-MIB::sysName.0 = STRING: u18svr\nSNMPv2-MIB::sysLocation.0 = STRING: Sitting on the Dock of the Bay\nSNMPv2-MIB::sysServices.0 = INTEGER: 72\nSNMPv2-MIB::sysORLastChange.0 = Timeticks: (1) 0:00:00.01\nSNMPv2-MIB::sysORID.1 = OID: SNMP-MPD-MIB::snmpMPDCompliance\nSNMPv2-MIB::sysORID.2 = OID: SNMP-USER-BASED-SM-MIB::usmMIBCompliance\n<\/code><\/pre>\n\n\n\n<p>Great!! You have successfully installed and configured SNMP on Ubuntu 18.04 and CentOS 7. Your server is now ready for Nagios SNMP monitoring from your Nagios server or any other monitoring tool. You can also check our aritcle on <a title=\"Nagios SNMP Monitoring of Linux Hosts on AlienVault USM\/OSSIM\" href=\"https:\/\/kifarunix.com\/nagios-snmp-monitoring-of-linux-hosts-on-alienvault-usm-ossim\/\" target=\"_blank\" rel=\"bookmark noopener noreferrer\">Nagios SNMP Monitoring of Linux Hosts on AlienVault USM\/OSSIM<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Related Tutorials:<\/h2>\n\n\n\n<p><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/kifarunix.com\/monitor-linux-system-metrics-with-prometheus-node-exporter\/\" target=\"_blank\">Monitor Linux System Metrics with Prometheus Node Exporter<\/a><\/p>\n\n\n\n<p><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/kifarunix.com\/monitor-squid-logs-with-grafana-and-graylog\/\" target=\"_blank\">Monitor Squid logs with Grafana and Graylog<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/kifarunix.com\/monitor-squid-access-logs-with-graylog-server\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Monitor Squid Access Logs with Graylog Server<\/a><\/p>\n\n\n\n<p><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/kifarunix.com\/how-to-install-nagios-plugins-and-nrpe-agents-on-centos-7-rhel-7-fedora-29\/\" target=\"_blank\">How to Install Nagios Plugins and NRPE agents on CentOS 7\/RHEL 7\/Fedora 29<\/a><\/p>\n\n\n\n<p><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/kifarunix.com\/monitor-linux-hosts-using-nagios-check_by_ssh-plugin\/\" target=\"_blank\">Monitor Linux Hosts using Nagios check_by_ssh Plugin<\/a><\/p>\n\n\n\n<p><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/kifarunix.com\/how-to-install-nagios-plugins-from-source-rhel-centos-oracle-linux\/\" target=\"_blank\">How to Install Nagios Plugins From Source RHEL\/CentOS\/Oracle Linux<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/kifarunix.com\/install-and-setup-tig-stack-on-fedora-30\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Install and Setup TIG Stack on Fedora 30<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this guide, we are going to learn how to install and configure SNMP on Ubuntu 18.04 and CentOS 7. SNMP is an acronym for<\/p>\n","protected":false},"author":1,"featured_media":9988,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"rank_math_lock_modified_date":false,"footnotes":""},"categories":[72,121],"tags":[5268,5267,5273,5270,5269,5271],"class_list":["post-1718","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-monitoring","category-howtos","tag-install-and-configure-snmp-on-centos-7","tag-install-and-configure-snmp-on-ubuntu-18-04","tag-snmp-v2c-ubuntu","tag-snmp-v3-centos-7","tag-snmp-v3-ubuntu-18-04","tag-snmpv-v2c-centos","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-50","resize-featured-image"],"_links":{"self":[{"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/posts\/1718"}],"collection":[{"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/comments?post=1718"}],"version-history":[{"count":14,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/posts\/1718\/revisions"}],"predecessor-version":[{"id":21078,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/posts\/1718\/revisions\/21078"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/media\/9988"}],"wp:attachment":[{"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/media?parent=1718"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/categories?post=1718"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/tags?post=1718"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}