SNMP Trap and InfluxDB Integration

Powerful performance with an easy integration, powered by Telegraf, the open source data connector built by InfluxData.

5B+

Telegraf downloads

#1

Time series database
Source: DB Engines

1B+

Downloads of InfluxDB

2,800+

Contributors

Table of Contents

Powerful Performance, Limitless Scale

Collect, organize, and act on massive volumes of high-velocity data. Any data is more valuable when you think of it as time series data. with InfluxDB, the #1 time series platform built to scale with Telegraf.

See Ways to Get Started

Input and output integration overview

The SNMP Trap Telegraf plugin enables the receipt of SNMP notifications, facilitating comprehensive network monitoring by capturing important events from network devices.

The InfluxDB plugin writes metrics to the InfluxDB HTTP service, allowing for efficient storage and retrieval of time series data.

Integration details

SNMP Trap

The SNMP Trap plugin serves as a receiving endpoint for SNMP notifications, known as traps and inform requests. Operating over UDP, it listens for incoming notifications, which can be configured to arrive on a specific port. This plugin is integral to network monitoring and management, allowing systems to collect and respond to SNMP traps sent from various devices across the network, including routers, switches, and servers. The plugin supports secure transmission options through SNMPv3, enabling authentication and encryption parameters to protect sensitive data. Additionally, it gives users the flexibility to configure multiple aspects of SNMP like MIB file locations, making it adaptable for various environments and use cases. Transitioning from the deprecated netsnmp backend to the more current gosmi backend is recommended to leverage its enhanced features and support. Users implementing this plugin can effectively monitor network events, automate responses to traps, and maintain a robust network monitoring infrastructure.

InfluxDB

The InfluxDB Telegraf plugin serves to send metrics to the InfluxDB HTTP API, facilitating the storage and query of time series data in a structured manner. Integrating seamlessly with InfluxDB, this plugin provides essential features such as token-based authentication and support for multiple InfluxDB cluster nodes, ensuring reliable and scalable data ingestion. Through its configurability, users can specify options like organization, destination buckets, and HTTP-specific settings, providing flexibility to tailor how data is sent and stored. The plugin also supports secret management for sensitive data, which enhances security in production environments. This plugin is particularly beneficial in modern observability stacks where real-time analytics and storage of time series data are crucial.

Configuration

SNMP Trap

[[inputs.snmp_trap]]
  ## Transport, local address, and port to listen on.  Transport must
  ## be "udp://".  Omit local address to listen on all interfaces.
  ##   example: "udp://127.0.0.1:1234"
  ##
  ## Special permissions may be required to listen on a port less than
  ## 1024.  See README.md for details
  ##
  # service_address = "udp://:162"
  ##
  ## Path to mib files
  ## Used by the gosmi translator.
  ## To add paths when translating with netsnmp, use the MIBDIRS environment variable
  # path = ["/usr/share/snmp/mibs"]
  ##
  ## Deprecated in 1.20.0; no longer running snmptranslate
  ## Timeout running snmptranslate command
  # timeout = "5s"
  ## Snmp version; one of "1", "2c" or "3".
  # version = "2c"
  ## SNMPv3 authentication and encryption options.
  ##
  ## Security Name.
  # sec_name = "myuser"
  ## Authentication protocol; one of "MD5", "SHA", "SHA224", "SHA256", "SHA384", "SHA512" or "".
  # auth_protocol = "MD5"
  ## Authentication password.
  # auth_password = "pass"
  ## Security Level; one of "noAuthNoPriv", "authNoPriv", or "authPriv".
  # sec_level = "authNoPriv"
  ## Privacy protocol used for encrypted messages; one of "DES", "AES", "AES192", "AES192C", "AES256", "AES256C" or "".
  # priv_protocol = ""
  ## Privacy password used for encrypted messages.
  # priv_password = ""

InfluxDB

[[outputs.influxdb]]
  ## The full HTTP or UDP URL for your InfluxDB instance.
  ##
  ## Multiple URLs can be specified for a single cluster, only ONE of the
  ## urls will be written to each interval.
  # urls = ["unix:///var/run/influxdb.sock"]
  # urls = ["udp://127.0.0.1:8089"]
  # urls = ["http://127.0.0.1:8086"]

  ## Local address to bind when connecting to the server
  ## If empty or not set, the local address is automatically chosen.
  # local_address = ""

  ## The target database for metrics; will be created as needed.
  ## For UDP url endpoint database needs to be configured on server side.
  # database = "telegraf"

  ## The value of this tag will be used to determine the database.  If this
  ## tag is not set the 'database' option is used as the default.
  # database_tag = ""

  ## If true, the 'database_tag' will not be included in the written metric.
  # exclude_database_tag = false

  ## If true, no CREATE DATABASE queries will be sent.  Set to true when using
  ## Telegraf with a user without permissions to create databases or when the
  ## database already exists.
  # skip_database_creation = false

  ## Name of existing retention policy to write to.  Empty string writes to
  ## the default retention policy.  Only takes effect when using HTTP.
  # retention_policy = ""

  ## The value of this tag will be used to determine the retention policy.  If this
  ## tag is not set the 'retention_policy' option is used as the default.
  # retention_policy_tag = ""

  ## If true, the 'retention_policy_tag' will not be included in the written metric.
  # exclude_retention_policy_tag = false

  ## Write consistency (clusters only), can be: "any", "one", "quorum", "all".
  ## Only takes effect when using HTTP.
  # write_consistency = "any"

  ## Timeout for HTTP messages.
  # timeout = "5s"

  ## HTTP Basic Auth
  # username = "telegraf"
  # password = "metricsmetricsmetricsmetrics"

  ## HTTP User-Agent
  # user_agent = "telegraf"

  ## UDP payload size is the maximum packet size to send.
  # udp_payload = "512B"

  ## Optional TLS Config for use on HTTP connections.
  # tls_ca = "/etc/telegraf/ca.pem"
  # tls_cert = "/etc/telegraf/cert.pem"
  # tls_key = "/etc/telegraf/key.pem"
  ## Use TLS but skip chain & host verification
  # insecure_skip_verify = false

  ## HTTP Proxy override, if unset values the standard proxy environment
  ## variables are consulted to determine which proxy, if any, should be used.
  # http_proxy = "http://corporate.proxy:3128"

  ## Additional HTTP headers
  # http_headers = {"X-Special-Header" = "Special-Value"}

  ## HTTP Content-Encoding for write request body, can be set to "gzip" to
  ## compress body or "identity" to apply no encoding.
  # content_encoding = "gzip"

  ## When true, Telegraf will output unsigned integers as unsigned values,
  ## i.e.: "42u".  You will need a version of InfluxDB supporting unsigned
  ## integer values.  Enabling this option will result in field type errors if
  ## existing data has been written.
  # influx_uint_support = false

  ## When true, Telegraf will omit the timestamp on data to allow InfluxDB
  ## to set the timestamp of the data during ingestion. This is generally NOT
  ## what you want as it can lead to data points captured at different times
  ## getting omitted due to similar data.
  # influx_omit_timestamp = false

Input and output integration examples

SNMP Trap

  1. Centralized Network Monitoring: Integrate the SNMP Trap plugin into a centralized monitoring solution to receive alerts about network devices in real-time. By configuring the plugin to listen for traps from various routers and switches, network administrators can swiftly react to issues, such as device outages or critical thresholds being surpassed. This setup enables proactive management and quick resolutions to network problems, ensuring minimal downtime.

  2. Automated Incident Response: Use the SNMP Trap plugin to trigger automated incident response workflows whenever specific traps are received. For instance, if a trap indicating a hardware failure is detected, an automated script could be initiated to gather diagnostics, notify support personnel, or even attempt a remediation action. This approach enhances the efficiency of IT operations by reducing manual interference and speeding up response times.

  3. Network Performance Analytics: Deploy the SNMP Trap plugin to collect performance metrics along with traps for a comprehensive view of network health. By aggregating this data into analytics platforms, network teams can analyze trends, identify bottlenecks, and optimize performance based on historical data. This allows for informed decision-making and strategic planning around network upgrades or changes.

  4. Integrating with Alerting Systems: Connect the SNMP Trap plugin to third-party alerting systems like PagerDuty or Slack. Upon receiving predefined traps, the plugin can send alerts to these systems, enabling teams to be instantly notified of important network events. This integration ensures that the right people are informed at the right time, helping maintain high service levels and quick issue resolution.

InfluxDB

  1. Real-Time System Monitoring: Utilize the InfluxDB plugin to capture and store metrics from a range of system components, such as CPU usage, memory consumption, and disk I/O. By pushing these metrics into InfluxDB, you can create a live dashboard that visualizes system performance in real time. This setup not only helps in identifying performance bottlenecks but also assists in proactive capacity planning by analyzing trends over time.

  2. Performance Tracking for Web Applications: Automatically gather and push metrics related to web application performance, such as request durations, error rates, and user interactions, to InfluxDB. By employing this plugin in your monitoring stack, you can use the stored metrics to generate reports and analyses that help understand user behavior and application efficiency, thus guiding development and optimization efforts.

  3. IoT Data Aggregation: Leverage the InfluxDB Telegraf plugin to collect sensor data from various IoT devices and store it in a centralized InfluxDB instance. This use case enables you to analyze trends and patterns in environmental or machine data over time, facilitating smarter decisions and predictive maintenance strategies. By integrating IoT data into InfluxDB, organizations can harness the power of historical data analysis to drive innovation and operational efficiency.

  4. Analyzing Historical Metrics for Forecasting: Set up the InfluxDB plugin to send historical metric data into InfluxDB and use it to drive forecasting models. By analyzing past performance metrics, you can create predictive models that forecast future trends and demands. This application is particularly useful for business intelligence purposes, helping organizations prepare for fluctuations in resource needs based on historical usage patterns.

Feedback

Thank you for being part of our community! If you have any general feedback or found any bugs on these pages, we welcome and encourage your input. Please submit your feedback in the InfluxDB community Slack.

Powerful Performance, Limitless Scale

Collect, organize, and act on massive volumes of high-velocity data. Any data is more valuable when you think of it as time series data. with InfluxDB, the #1 time series platform built to scale with Telegraf.

See Ways to Get Started

Related Integrations

HTTP and InfluxDB Integration

The HTTP plugin collects metrics from one or more HTTP(S) endpoints. It supports various authentication methods and configuration options for data formats.

View Integration

Kafka and InfluxDB Integration

This plugin reads messages from Kafka and allows the creation of metrics based on those messages. It supports various configurations including different Kafka settings and message processing options.

View Integration

Kinesis and InfluxDB Integration

The Kinesis plugin allows for reading metrics from AWS Kinesis streams. It supports multiple input data formats and offers checkpointing features with DynamoDB for reliable message processing.

View Integration