Lab 1.2: Configuring SNMP for sending traps/alerts to Splunk


Estimated time to complete: 5 minutes

This feature provides the ability for the customer to specify a message to be displayed on the BIG-IQ login page.

Lab environment access

If you have not yet visited the page Getting Started, please do so.


Prerequisites Splunk

  1. Connect via SSH or Web Shell to the system Ubuntu Lamp Server. (if you use the Web Shell, login as f5student first: su - f5student).

  2. Execute the following commands to start the SNMP trap Listener:

  3. Open BIG-IQ, go to System > This Device > SNMP Configuration > SNMP Traps. Click Create.

  • Name: snmptrad
  • Version: V2C
  • Community: public
  • Destination:
  • Port: 162
  1. The Devices and System alerts are located under Monitoring > Alerts & Notifications. It will display all triggered alerts.
  1. Click on Settings to see the type of alerts available.
  1. From you lab deployment, look for device, click on Details and stop the device.

Wait for few seconds, you should coming a new alert showing the device unavailable in the Alerts list.

  1. Now, let’s have a look at the Applications Alerts. Go to Applications > Applications, click on the IT_apps Application, then on Application Service.

On the top right of the application dashboard, click on the Health button.

  1. Change the Server Site RTT warning and critical thresholds to 1ms and 2ms. Under Actions, enable SNMP Trap.
  1. Back on the Application Service dashboard, notice some new alerts are being created about Server Site RTT.
  1. Now, let’s open Splunk to see if any SNMP traps were received. From you lab deployment, click on the SPLUNK button on the system Ubuntu Lamp Server. Use admin/purple123 to authenticate.