on
30 Jul 2025
11:46 AM
- edited on
07 Aug 2025
10:13 AM
by
jonghpark
This troubleshooting article will help you resolve some common issues faced while installing and setting up SNMP trap-based extensions.
SNMP Traps (com.dynatrace.extension.snmp-traps-generic) is a special extension that generates Log Events based on the captured traps in the network. It also produces single metric com.dynatrace.extension.snmp-traps-generic.traps.count that is number of captured traps in the interval.
SNMP Traps extensions use datasource that binds to and listens on the configured UDP port. Incoming packets are filtered by the configured IP address and mask. Finally, the packets are verified against provided credentials (v1, v2c, or v3). If there were no errors along the way, the Log Events should be visible in the Logs screen.
Specific symptoms mentioned in this article can be seen in the Extensions app/Extension page in the Dynatrace Hub and file logs. Here is how you can find them.
SFM logs
SFM logs are available in the health tab on the Extension page in the Extensions app or on Extension page in the Dynatrace Hub.
Log files can be found in the paths:
There can be multiple reasons that can cause metrics and trap LogEvents to not show up. Listed below are some common causes -
Verify the result of metric dsfm:server.metrics.rejections. Common cause of issue are exhausted DDUs.
For SNMP Traps extension, due to the "reverse" function of the data source listening rather than making requests, the EEC status for the extension is not set by using a fastcheck.
The monitoring configuration will stay pending until an ActiveGate in the configured AG group has received the configuration, which can take a few minutes.
If the monitoring configuration is still in pending state after approximately 10 minutes or so, the issue may be related to the Extension Execution Controller (EEC) or something on the ActiveGate blocking the extension from running properly.
Generate a support archive from the relevant ActiveGate and review the EEC and SNMP Traps-based extension logs.
First, verify that there is network connectivity from the device that is sending the SNMP Traps to the ActiveGate that is running the SNMP Traps extension using curl with the telnet protocol. The default port for receiving SNMP Traps is port 162, however, different ports can be used.
curl telnet://<AG ip-address/hostname>:162
If the curl from the SNMP-enabled device fails, there may be an intermediate network device, such as a firewall, blocking the traffic between the SNMP-enabled device and the AG, or potentially a missing network route between subnets.
This error occurs when a monitoring configuration has been set with an IP address that does not follow CIDR Notation, if targeting traps from a single host, /32 must be added to meet the requirements. i.e. 10.126.240.38/32.
[ds:snmptraps] [severe] [INVALID_CONFIG_ERROR] Wrong ip net address 10.126.240.38 [status code=32]
Use a correct IP address/Mask.
Each monitoring configuration for an SNMP Traps extension has a field that configures the IP address space in CIDR Notation that expected SNMP Traps will be received from, sometimes it may be a /32 listing for a single host up to /8 for an entire class A private network full of IP addresses.
If you are unfamiliar with the process of calculating subnets and determining the IP addresses that would be contained in the address space, a subnetting calculator tool can be utilized to determine the valid IP range. For example, this subnet calculator that takes the input of the subnet mask and an IP address and provides the network address and usable IP range among additional details.
Input
Output
Notice: The IP address/Mask used in the extension monitoring configuration must match the source IP address of the packet that the datasource 'sees' - therefore, if a proxy is used, the extension monitoring configuration must be configured with the IP address/Mask that includes the proxying service IP address.
If an SNMP trap listener is already running on the same host and using port 162, the SNMP Traps extension will not be able to bind to that port, preventing it from receiving SNMP traps properly.
Utilize the command below to output the ports that the host is listening on and review the output to determine if port 162 or the port in the monitoring configuration is actively being listened on by a process other than the ActiveGate/EEC.
The below commands aim to filter the listening processes to target the specific process of the SNMP Traps datasource.
sudo lsof -a -u dtuserag -nP -iUDP
----
COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME
dynatrace 1904 dtuserag 7u IPv6 23455 0t0 UDP *:162
netstat -abon -p UDP
Active Connections
Proto Local Address Foreign Address State PID
UDP 0.0.0.0:123 *:* 2916
W32Time
[svchost.exe]
UDP 0.0.0.0:162 *:* 6800
[dynatracesourcesnmptraps.exe]
Notice: Depending on the OS, datasource might not report any issue with port binding even if it's already used by another program. Effectively it will bind to the port, but traps would reach the other program that had bound to port in the first place.
Check the correctness of the authentication parameters and try to manually enter them in the extension monitoring configuration. Compare the authentication parameters from the extension monitoring configuration with the trap sender authentication settings (they should be the same). Avoid using special characters (@ $ # % etc.). Pay attention to smallest details e.g. usage of AES256C instead of AES256. Verify that environment is configured according to documentation.
tcpdump -i eth0 -w output.pcap
Even if the packets reach the host running extension, firewall or similar tools might still block datasource from getting the traps. This is very common issue and it is being frequently overlooked by a customer.
If the SNMP trap provider doesn't produces ones all the time. Use snmptrap tool or any of your choice. It is worth collecting network packets when sending SNMP traps. This can help investigate the issue and confirm that the trap has reached the desired host.
tcpdump -i eth0 -w output.pcap
Verify resolving the raw IP to the DNS name from the host where the extension monitoring configuration works.
nslookup <IP>
Notice: The SNMP traps datasource needs at least two traps with the same address to send the resolved IP. Resolving raw IP to DNS name is running in parallel to avoid blocking the sending of traps and improve performance.
The SNMP traps data source uses a default set of MIB files. You can also extend the default set with your own files. There are often issues with loading MIBs and translating OIDs based on the MIB files https://docs.dynatrace.com/docs/ingest-from/extensions20/data-sources/snmp-extensions/snmptraps-exte....
netapp0 OBJECT IDENTIFIER ::= { netapp 0 }
::= { netapp 0 1131 }
Potential solution:
Try to manually updating mib file to change ::= { netapp 0 x} to ::= { netapp0 x} or remove all '0' in all objects (expect for netapp0).
Check MIB files defines the names from the ROOT, otherwise OIDs are not resolved correctly.
If none of the solutions above has worked for you and you are still experiencing issues with the SNMP Traps extension you are trying to configure there's always a chance that there is a problem with the extension itself or the underlying data source.
In that case feel free to open a support ticket specifying:
If this article has helped you and provided you with valuable insight, please give it a thumbs-up (kudos).
Congratulations for this excellent article! I'm a heavy user of traps, in several clients, and wasn't expecting to learn anything, but I did! Some notes:
tcpdump -i eth0 -w output.pcap udp port 162