Rietveld Code Review Tool
Help | Bug tracker | Discussion group | Source code

Side by Side Diff: modules/nagios/files/check_bandwidth

Issue 12375002: Implement more detailed bandwidth monitoring (Closed)
Patch Set: Fixed comments Created Oct. 10, 2013, 9:36 a.m.
Left:
Right:
Use n/p to move between diff chunks; N/P to move between comments.
Jump to:
View unified diff | Download patch
« no previous file with comments | « manifests/monitoringserver.pp ('k') | modules/nagios/files/sudoers » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 #!/usr/bin/env python 1 #!/usr/bin/env python
2 2
3 import os, re, subprocess, sys 3 import os, re, subprocess, sys, socket, struct, fcntl
4
5 INTERVAL = 5
4 6
5 def format_bandwidth(bits): 7 def format_bandwidth(bits):
6 if bits >= 1000000: 8 if bits >= 1000000:
7 return "%.2f Mbit/s" % (bits / 1000000) 9 return "%.2f Mbit/s" % (bits / 1000000)
8 elif bits >= 1000: 10 elif bits >= 1000:
9 return "%.2f kbit/s" % (bits / 1000) 11 return "%.2f kbit/s" % (bits / 1000)
10 else: 12 else:
11 return "%.2f bit/s" % bits 13 return "%.2f bit/s" % bits
12 14
15 def getmacaddress():
16 # See man netdevice for the request structure: it has to start with 16 bytes
17 # containing the interface name, the OS will write 8 bytes after that (2 bytes
18 # family name and 6 bytes actual MAC address).
19 s = socket.socket()
20 SIOCGIFHWADDR = 0x8927 # see man ioctl_list
21 return fcntl.ioctl(s.fileno(), SIOCGIFHWADDR, struct.pack("24s", "eth0"))[18:2 4]
22
13 if __name__ == "__main__": 23 if __name__ == "__main__":
14 if len(sys.argv) != 3: 24 if len(sys.argv) != 3:
15 script_name = os.path.basename(sys.argv[0]) 25 script_name = os.path.basename(sys.argv[0])
16 print "Usage: %s WARN CRIT" % script_name 26 print "Usage: %s WARN CRIT" % script_name
17 sys.exit(0) 27 sys.exit(0)
18 28
19 (warn, crit) = sys.argv[1:3] 29 (warn, crit) = sys.argv[1:3]
20 warn = int(sys.argv[1]) 30 warn = int(sys.argv[1])
21 crit = int(sys.argv[2]) 31 crit = int(sys.argv[2])
22 32
23 process_output = subprocess.check_output(["bwm-ng", "-I", "eth0", "-t", "5000" , "-c", "1", "-o", "csv"]) 33 process = subprocess.Popen(
24 data = process_output.splitlines()[0].split(";") 34 ["sudo", "tcpdump", "-q", "-s", "64", "-G", str(INTERVAL), "-W", "1", "-w", "-"],
25 tx = float(data[2]) * 8 35 stdout=subprocess.PIPE, stderr=subprocess.PIPE)
26 rx = float(data[3]) * 8 36 mac = getmacaddress()
27 status = "rx %s tx %s" % (format_bandwidth(rx), format_bandwidth(tx))
28 37
29 perfdata = "rx=%i;%i;%i tx=%i;%i;%i" % (rx, warn, crit, tx, warn, crit) 38 total = {"rx": 0, "tx": 0}
39 http = {"rx": 0, "tx": 0}
40 https = {"rx": 0, "tx": 0}
41 ssh = {"rx": 0, "tx": 0}
42 dns = {"rx": 0, "tx": 0}
43 other = {"rx": 0, "tx": 0}
44 other_detailed = {}
30 45
31 output = "%s|%s" % (status, perfdata) 46 # See http://wiki.wireshark.org/Development/LibpcapFileFormat for libpcap form at description
47 global_header = process.stdout.read(24)
48 magic_number, _, _, _, _, _, _ = struct.unpack("IHHiIII", global_header)
49 if magic_number != 0xa1b2c3d4:
50 raise Exception("Unexpected format")
51 while True:
52 record_header = process.stdout.read(16)
53 if record_header == "":
54 break;
55 _, _, incl_len, orig_len = struct.unpack("IIII", record_header)
32 56
33 if rx >= crit or tx >= crit: 57 # Convert bytes to bits and normalize to seconds
58 bps = float(orig_len * 8) / INTERVAL
59
60 def add_other(description):
61 other[direction] += bps
62 other_detailed[description] = other_detailed.get(description, 0) + bps
63
64 payload = process.stdout.read(incl_len)
65
66 # Unpack Ethernet frame, http://en.wikipedia.org/wiki/Ethernet_frame#Structu re
67 # Note that tcpdump doesn't capture the preamble, start of frame delimiter
68 # and the interframe gap, these are handled internally by the network card.
69 destination, source, protocol = struct.unpack("!6s6sH", payload[:14])
70 payload = payload[14:]
71 direction = "rx" if destination == mac else "tx"
72 total[direction] += bps
73
74 # Check Level 3 protocol
75 if protocol == 0x0800: # IPv4, http://en.wikipedia.org/wiki/Internet_Pro tocol_version_4#Header
76 ihl = ord(payload[0]) & 0xF
77 protocol = ord(payload[9])
78 payload = payload[ihl * 4:]
79 elif protocol == 0x86DD: # IPv6, http://en.wikipedia.org/wiki/IPv6_packet# Fixed_header
80 protocol = ord(payload[6])
81 payload = payload[40:]
82 else:
83 add_other("L3 0x%04X" % protocol)
84 continue
85
86 # Check Level 4 protocol
87 if protocol in (0x06, 0x11): # TCP, UDP
88 source_port, destination_port = struct.unpack('!HH', payload[:4])
89 protocol = "TCP" if protocol == 0x06 else "UDP"
90
91 # The lower port number should be the real port, the other one will be
92 # the ephemeral port.
93 port = min(source_port, destination_port)
94 else:
95 add_other("L4 0x%02X" % protocol)
96 continue
97
98 if protocol == "TCP" and port == 80:
99 http[direction] += bps
100 elif protocol == "TCP" and port == 443:
101 https[direction] += bps
102 elif protocol == "TCP" and port == 22:
103 ssh[direction] += bps
104 elif port == 53:
105 dns[direction] += bps
106 else:
107 add_other("Port %i" % port)
108 continue
109
110 status = []
111 perfdata = []
112 def add_status(id, values):
113 rx = values["rx"]
114 tx = values["tx"]
115 status.append("%srx %s %stx %s" % (id, format_bandwidth(rx), id, format_band width(tx)))
116 if id == "":
117 perfdata.append("rx=%i;%i;%i tx=%i;%i;%i" % (rx, warn, crit, tx, warn, cri t))
118 else:
119 perfdata.append("%srx=%i %stx=%i" % (id, rx, id, tx))
120
121 add_status("", total)
122 add_status("http_", http)
123 add_status("https_", https)
124 add_status("ssh_", ssh)
125 add_status("dns_", dns)
126 add_status("other_", other)
127 for key in sorted(other_detailed.iterkeys(), key=lambda k: other_detailed[k], reverse=True):
128 status.append("%s %s" % (key, format_bandwidth(float(other_detailed[key]) / INTERVAL)))
129
130 output = "%s|%s" % (", ".join(status), " ".join(perfdata))
131
132 if total["rx"] >= crit or total["tx"] >= crit:
34 print "CRITICAL - " + output 133 print "CRITICAL - " + output
35 sys.exit(2) 134 sys.exit(2)
36 135
37 if rx >= warn or tx >= warn: 136 if total["rx"] >= warn or total["tx"] >= warn:
38 print "WARNING - " + output 137 print "WARNING - " + output
39 sys.exit(1) 138 sys.exit(1)
40 139
41 print "OK - " + output 140 print "OK - " + output
OLDNEW
« no previous file with comments | « manifests/monitoringserver.pp ('k') | modules/nagios/files/sudoers » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld