Revert "Automation adds dcaegen2-offeredapis.rst"
This reverts commit 86b1ec13b32ccdcfdab5deb6218b855639fcfdbe.
The file change should have been 1 label addition
Issue-ID: CIMAN-376
Change-Id: Ib98f7eb9b11b96ef96ac233f7f2aac34dfded72f
Signed-off-by: Jessica Wagantall <jwagantall@linuxfoundation.org>
diff --git a/docs/sections/offeredapis.rst b/docs/sections/offeredapis.rst
index 33a2c82..98cd41a 100644
--- a/docs/sections/offeredapis.rst
+++ b/docs/sections/offeredapis.rst
@@ -1,83 +1,20 @@
-.. This work is licensed under a Creative Commons Attribution 4.0 International License.
-.. http://creativecommons.org/licenses/by/4.0
.. _offeredapis:
Offered APIs
============
-**trapd** supports the Simple Network Management Protocol (SNMP)
-standard. It is a well documented and pervasive protocol,
-used in all networks worldwide.
+.. toctree::
+ :maxdepth: 1
+ :titlesonly:
-As an API offering, the only way to interact with **trapd** is
-to send traps that conform to the industry standard specification
-(RFC1215 - available at https://tools.ietf.org/html/rfc1215 ) to a
-running instance. To accomplish this, you may:
-
-1. Configure SNMP agents to send native traps to a SNMPTRAP instance.
- In SNMP agent configurations, this is usually accomplished by
- setting the "trap target" or "snmp manager" to the IP address
- of the running VM/container hosting SNMPTRAP.
-
-2. Simulate a SNMP trap using various freely available utilities. Two
- examples are provided below, *be sure to change the target
- ("localhost") and port ("162") to applicable values in your
- environment.*
-
-NetSNMP snmptrap
-----------------
-
-One way to simulate an arriving SNMP trap is to use the Net-SNMP utility/command snmptrap.
-This command can send V1, V2c or V3 traps to a manager based on the parameters provided.
-
-The example below sends a SNMP V1 trap to the specified host. Prior to running this command, export
-the values of *to_ip_address* (set it to the IP of the VM hosting the ONAP trapd container) and *to_port* (typically
-set to "162"):
-
- ``export to_ip_address=192.168.1.1``
-
- ``export to_port=162``
-
-Then run the Net-SNMP command/utility:
-
- ``snmptrap -d -v 1 -c not_public ${to_ip_address}:${to_portt} .1.3.6.1.4.1.99999 localhost 6 1 '55' .1.11.12.13.14.15 s "test trap"``
-
-.. note::
-
- This will display some "read_config_store open failure" errors;
- they can be ignored, the trap has successfully been sent to the
- specified destination.
-
-python using pysnmp
--------------------
-
-Another way to simulate an arriving SNMP trap is to send one with the python *pysnmp* module. (Note that this
-is the same module that ONAP trapd is based on).
-
-To do this, create a python script called "send_trap.py" with the following contents. You'll need to change the
-target (from "localhost" to whatever the destination IP/hostname of the trap receiver is) before saving:
-
-.. code-block:: python
-
- from pysnmp.hlapi import *
- from pysnmp import debug
-
- # debug.setLogger(debug.Debug('msgproc'))
-
- errorIndication, errorStatus, errorIndex, varbinds = next(sendNotification(SnmpEngine(),
- CommunityData('not_public'),
- UdpTransportTarget(('localhost', 162)),
- ContextData(),
- 'trap',
- [ObjectType(ObjectIdentity('.1.3.6.1.4.1.999.1'), OctetString('test trap - ignore')),
- ObjectType(ObjectIdentity('.1.3.6.1.4.1.999.2'), OctetString('ONAP pytest trap'))])
- )
-
- if errorIndication:
- print(errorIndication)
- else:
- print("successfully sent trap")
-
-To run the pysnmp example:
-
- ``python ./send_trap.py``
+ apis/configbinding.rst
+ apis/deployment-handler.rst
+ apis/inventory.rst
+ apis/ves.rst
+ apis/ves-hv/index.rst
+ apis/PRH.rst
+ apis/DFC.rst
+ apis/PNDA.rst
+ apis/pmmapper.rst
+ apis/SDK.rst
+ apis/mod-onboardingapi.rst