Examples of commands to send syslog or trap messages to the SolarWinds Platform server
When you configure real-time change detection, you must configure devices to send either syslog or trap messages to the SolarWinds Platform server. The following sections provide examples of commands used for some device types. For more information, see your device documentation.
Syslog (IOS)
This example configures a Cisco router to send syslog events whose severity level is informational or greater (logging trap level 6) to the SolarWinds Platform server (IP address 10.199.3.43).
config terminal
logging 10.199.3.43
logging trap 6
end
Syslog (CatOS)
The example configures a Catalyst switch to send syslog events whose severity level is notification or greater to the SolarWinds Platform server (192.168.0.30).
set logging server 192.168.0.30
set logging server facility local4
set logging server severity 5
set logging server enable
The commands do the following:
set logging timestamp
adds timestamps to all syslog events.set logging server
adds the SolarWinds Platform server (192.168.0.30) as an export target.set logging server severity
limits syslog exports to events with a severity level of notification (level 5) or greater.set logging server
specifically enables the switch to export relevant syslog data to the logging server you have already specified (the SolarWinds Platform server).
Traps (IOS)
This example configures a device to send trap alerts to the SolarWinds Platform server when a config-related event occurs on the device.
snmp-server 10.110.68.33 public config
snmp-server enable traps config
Here are the commands with variable names instead of sample values:
snmp-server {host_name|IP_address} community_stringtrap_type
snmp-server enable traps trap_type
Traps (CatOS)
This example configures a device to send trap alerts to the SolarWinds Platform server when a config-related event occurs on the device.
set snmp trap 10.110.68.33 public config
set snmp trap enable config
Here are the commands with variable names instead of sample values:
set snmp trap {host_name|IP_address}community_stringtrap_type
set snmp trap {enable|disable} trap_type