on
22 Apr 2025
02:36 PM
- edited on
07 Aug 2025
10:14 AM
by
jonghpark
This troubleshooting article will help resolve some common issues faced while installing and setting up SNMP-based extensions.
Specific symptoms mentioned in this article can be seen in the Extensions app and file logs. Here is how you can find them.
SFM logs are available in the health tab on the Extension page in the Extensions app
TCPdump collection steps
tcpdump -i \<interface\> -w \<output file\>Example: tcpdump -i eth0 -w output.cap
./dynatracesourcesnmp --snmpwalk --ip $DEVICE_IP --oid $OID -v SNMPv2c -c $COMMUNITY_STRING -t 10 --unconnected-udpThis command runs a performance health check, which runs a one-round query with all selected feature sets as separate queries. The result prints many useful pieces of information per single request. Such as response time, oids queried, oids returned and oids fetched.
This behavior can mean 2 things:
The defined interval needs to be changed. This can be done in 2 ways.
code 38 - DEVICE_CONNECTION_ERROR always with the same OID.
The error should be visible in SFM logs and file logs.
Decrease the advanced options parameter MaxRepetitions (size of response from f5), and if needed MaxOidsPerQuery (size of request)
Note:
AUTHENTICATION_ERROR with one of the messages: wrong digest for user, unsupported security level, unknown username
Device logs are showing DEVICE_CONNECTION_ERROR, but the SNMP object of the call works
DEVICE_CONNECTION_ERROR - Timeout
Select the correct Privacy Protocol (AES, DES, ...) in the Extension configuration
Invalid values reported for Interface incoming traffic / Octets received / ifInOctets / 1.3.6.1.2.1.2.2.1.10 or Interface outgoing traffic / Octets transmitted / ifOutOctets / 1.3.6.1.2.1.2.2.1.16
Use high 64-bit capacity counters - enable Interfaces 64-bit feature set (disable Interfaces 32-bit)
Standard 32-bit capacity traffic counters or high 64-bit capacity traffic counters are not supported in the device
Timeout always seen on 1.3.6.1.2.1.2.2.1.10 or 1.3.6.1.2.1.2.2.1.16 or 1.3.6.1.2.1.31.1.1.1.6 or 1.3.6.1.2.1.31.1.1.1.10
Query the device using SNMPwalk for problematic OID to confirm that the OID is not available, then disable Interfaces 32-bit or Interfaces 64-bit accordingly, or reconfigure your device so OID is available
Please reach out to support if this article does not help. In the support ticket, please provide:
If this article has helped you and provided you with valuable insight, please give it a thumbs-up (kudos).
Hello, there,
I'm currently configuring network devices like F5, Fortigate, and Datapower to have visibility of them. I'd like to know if it's possible (and I recall seeing this somewhere) to see the network device through which the trace passed. For example, if it was an F5, it would appear in the trace as part of the communication. Is that possible?
regards.
Carlos Carrasco
If talking about trace/spans, than if those requests are intercepted by those devices, and they can insert HTTP headers, than it can happen. They would have to insert the trace-id headers and forward them to Dynatrace with OTEL. Have only seen one case (not out of the box) where this was done.
But you may also be talking about the proxy meta information available at the trace level. If the devices act like proxies, and forward the corresponding proxy headers, than that info will also be available.