These are base docker images that include net-snmp.
base image with Net-SNMP binaries installed. By default the image starts a generic trap receiver (which dumps what it receives into /trap.log) for testing, but it willl accept any SNMP command.
Standard generic receiver:
docker run -d --name trap_sink weldpua2008/net-snmp docker-enter trap_sink cat trap.log
Sending a test trap
docker run --rm=true elcolio/net-snmp snmptrap -v 1 -c public $DESTINATION_IP .220.127.116.11.6.3 "" 0 0 coldStart.0
Can be combined with Samplicator for a local-logging trap proxy.
Obtaining these Images from DockerHub
This content on DockerHub lives at https://hub.docker.com/r/weldpua2008/net-snmp/
- This images on DockerHub will be updated periodically.
This is currently a work in progress, I am not responsible and shall not
be held responsible in any manner if this tool causes loss of data, hardware
faults, act of gods, invocation of old or ancient ones, elder gods and other
horrors from the depths.
If you'd like to talk about Ansible+Docker, stop by the .
Not working ,
docker run -d --name trap_sink weldpua2008/net-snmp
Error response from daemon: Cannot start container b97e3121ee9b91470c3914ddcab2080bec81a3a7214b78c4ef4879f d9b28ee93:  System error: exec: "snmptrapd": executable file not found in $PATH