Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

check_snmp_int.pl treats device reboot as octet counters overflow #62

Open
ntokos opened this issue Apr 9, 2019 · 0 comments
Open

check_snmp_int.pl treats device reboot as octet counters overflow #62

ntokos opened this issue Apr 9, 2019 · 0 comments

Comments

@ntokos
Copy link

ntokos commented Apr 9, 2019

In order to deal with overflown octet in/out counters, the plugin checks if the counters that were currently retrieved from the device have a value lower than the ones stored in the file from the previous run(s).
But the same thing will happen (i.e. retrieved counters are lower than previously stored ones) in case of a device reboot. So the plugin will assume a reset of the counters as an overflow and will report erroneous interface utilization (way over 100%). In case warning/critical thresholds have been specified, the plugin will also report warning/critical result.

Obviously the best way to solve this would be to introduce an extra check for the device uptime.
A good workaround though, that requires much less changes in the plugin code, is to check if both octet-in and -out counters have "overflown" at the same run.
It is extremely rare that a simultaneous in/out counter overflown would have happened in real world interface traffic conditions, so I think this workaround is a pretty safe to assume.

If you agree I can create a pull request that implements this workaround.

Thank you.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants