Rietveld Code Review Tool
Help | Bug tracker | Discussion group | Source code

Delta Between Two Patch Sets: modules/nagios/files/check_bandwidth

Issue 12375002: Implement more detailed bandwidth monitoring (Closed)
Left Patch Set: Created Oct. 1, 2013, 5:30 p.m.
Right Patch Set: Fixed comments Created Oct. 10, 2013, 9:36 a.m.
Left:
Right:
Use n/p to move between diff chunks; N/P to move between comments.
Jump to:
Left: Side by side diff | Download
Right: Side by side diff | Download
« no previous file with change/comment | « manifests/monitoringserver.pp ('k') | modules/nagios/files/sudoers » ('j') | no next file with change/comment »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
LEFTRIGHT
1 #!/usr/bin/env python 1 #!/usr/bin/env python
2 2
3 import os, re, subprocess, sys, socket, struct, fcntl 3 import os, re, subprocess, sys, socket, struct, fcntl
4 4
5 INTERVAL = 5 5 INTERVAL = 5
6 6
7 def format_bandwidth(bits): 7 def format_bandwidth(bits):
8 if bits >= 1000000: 8 if bits >= 1000000:
9 return "%.2f Mbit/s" % (bits / 1000000) 9 return "%.2f Mbit/s" % (bits / 1000000)
10 elif bits >= 1000: 10 elif bits >= 1000:
11 return "%.2f kbit/s" % (bits / 1000) 11 return "%.2f kbit/s" % (bits / 1000)
12 else: 12 else:
13 return "%.2f bit/s" % bits 13 return "%.2f bit/s" % bits
14 14
15 def getmacaddress(): 15 def getmacaddress():
16 # We are calling SIOCGIFHWADDR (0x8927 according to man ioctl_list) here. See 16 # See man netdevice for the request structure: it has to start with 16 bytes
17 # man netdevice for the request structure: it has to start with 16 bytes
18 # containing the interface name, the OS will write 8 bytes after that (2 bytes 17 # containing the interface name, the OS will write 8 bytes after that (2 bytes
19 # family name and 6 bytes actual MAC address). 18 # family name and 6 bytes actual MAC address).
20 s = socket.socket() 19 s = socket.socket()
21 return fcntl.ioctl(s.fileno(), 0x8927, struct.pack("24s", "eth0"))[18:24] 20 SIOCGIFHWADDR = 0x8927 # see man ioctl_list
22 21 return fcntl.ioctl(s.fileno(), SIOCGIFHWADDR, struct.pack("24s", "eth0"))[18:2 4]
23 def splitport(hostport):
24 match = re.search(r"\.(d+)$", hostport)
25 if match:
26 return hostport[:match.start()], match.group(1)
27 else:
28 return hostport, "0"
29
30 def readtime(time):
31 hour, minute, second = time.split(":")
32 return int(hour) * 3600 + int(minute) * 60 + float(second)
33 22
34 if __name__ == "__main__": 23 if __name__ == "__main__":
35 if len(sys.argv) != 3: 24 if len(sys.argv) != 3:
36 script_name = os.path.basename(sys.argv[0]) 25 script_name = os.path.basename(sys.argv[0])
37 print "Usage: %s WARN CRIT" % script_name 26 print "Usage: %s WARN CRIT" % script_name
38 sys.exit(0) 27 sys.exit(0)
39 28
40 (warn, crit) = sys.argv[1:3] 29 (warn, crit) = sys.argv[1:3]
41 warn = int(sys.argv[1]) 30 warn = int(sys.argv[1])
42 crit = int(sys.argv[2]) 31 crit = int(sys.argv[2])
43 32
44 process = subprocess.Popen(["tcpdump", "-q", "-n", "-s", "64", "-w", "-"], std out=subprocess.PIPE, stderr=subprocess.PIPE) 33 process = subprocess.Popen(
45 starttime = None 34 ["sudo", "tcpdump", "-q", "-s", "64", "-G", str(INTERVAL), "-W", "1", "-w", "-"],
35 stdout=subprocess.PIPE, stderr=subprocess.PIPE)
46 mac = getmacaddress() 36 mac = getmacaddress()
47 37
48 total = {"rx": 0, "tx": 0} 38 total = {"rx": 0, "tx": 0}
49 http = {"rx": 0, "tx": 0} 39 http = {"rx": 0, "tx": 0}
50 https = {"rx": 0, "tx": 0} 40 https = {"rx": 0, "tx": 0}
51 ssh = {"rx": 0, "tx": 0} 41 ssh = {"rx": 0, "tx": 0}
52 dns = {"rx": 0, "tx": 0} 42 dns = {"rx": 0, "tx": 0}
53 other = {"rx": 0, "tx": 0} 43 other = {"rx": 0, "tx": 0}
54 other_detailed = {} 44 other_detailed = {}
55 45
56 # See http://wiki.wireshark.org/Development/LibpcapFileFormat for libpcap form at description 46 # See http://wiki.wireshark.org/Development/LibpcapFileFormat for libpcap form at description
57 magic_number, _, _, _, _, _, _ = struct.unpack("IHHiIII", process.stdout.read( 24)) 47 global_header = process.stdout.read(24)
48 magic_number, _, _, _, _, _, _ = struct.unpack("IHHiIII", global_header)
58 if magic_number != 0xa1b2c3d4: 49 if magic_number != 0xa1b2c3d4:
59 raise Exception("Unexpected format") 50 raise Exception("Unexpected format")
60 while True: 51 while True:
61 sec, usec, incl_len, orig_len = struct.unpack("IIII", process.stdout.read(16 )) 52 record_header = process.stdout.read(16)
62 length = orig_len + 24 # 24 bytes Ethernet overhead not captured by tcpdum p 53 if record_header == "":
54 break;
55 _, _, incl_len, orig_len = struct.unpack("IIII", record_header)
63 56
64 time = sec + float(usec) / 1000000 57 # Convert bytes to bits and normalize to seconds
65 if starttime == None: 58 bps = float(orig_len * 8) / INTERVAL
66 starttime = time
67 if time - starttime > INTERVAL:
68 break
69 59
70 def add_other(description): 60 def add_other(description):
71 other[direction] += length 61 other[direction] += bps
72 other_detailed[description] = other_detailed.get(description, 0) + length 62 other_detailed[description] = other_detailed.get(description, 0) + bps
73 63
74 payload = process.stdout.read(incl_len) 64 payload = process.stdout.read(incl_len)
75 65
76 # Unpack Ethernet frame, http://en.wikipedia.org/wiki/Ethernet_frame#Structu re 66 # Unpack Ethernet frame, http://en.wikipedia.org/wiki/Ethernet_frame#Structu re
67 # Note that tcpdump doesn't capture the preamble, start of frame delimiter
68 # and the interframe gap, these are handled internally by the network card.
77 destination, source, protocol = struct.unpack("!6s6sH", payload[:14]) 69 destination, source, protocol = struct.unpack("!6s6sH", payload[:14])
78 payload = payload[14:] 70 payload = payload[14:]
79 direction = "rx" if destination == mac else "tx" 71 direction = "rx" if destination == mac else "tx"
80 total[direction] += length 72 total[direction] += bps
81 73
82 # Check Level 3 protocol 74 # Check Level 3 protocol
83 if protocol == 0x0800: # IPv4, http://en.wikipedia.org/wiki/Internet_Pro tocol_version_4#Header 75 if protocol == 0x0800: # IPv4, http://en.wikipedia.org/wiki/Internet_Pro tocol_version_4#Header
84 ihl = ord(payload[0]) & 0xF 76 ihl = ord(payload[0]) & 0xF
85 protocol = ord(payload[9]) 77 protocol = ord(payload[9])
86 payload = payload[ihl * 4:] 78 payload = payload[ihl * 4:]
87 elif protocol == 0x86DD: # IPv6, http://en.wikipedia.org/wiki/IPv6_packet# Fixed_header 79 elif protocol == 0x86DD: # IPv6, http://en.wikipedia.org/wiki/IPv6_packet# Fixed_header
88 protocol = ord(payload[6]) 80 protocol = ord(payload[6])
89 payload = payload[40:] 81 payload = payload[40:]
90 else: 82 else:
91 add_other("L3 0x%04X" % protocol) 83 add_other("L3 0x%04X" % protocol)
92 continue 84 continue
93 85
94 # Check Level 4 protocol 86 # Check Level 4 protocol
95 if protocol in (0x06, 0x11): # TCP, UDP 87 if protocol in (0x06, 0x11): # TCP, UDP
88 source_port, destination_port = struct.unpack('!HH', payload[:4])
89 protocol = "TCP" if protocol == 0x06 else "UDP"
90
96 # The lower port number should be the real port, the other one will be 91 # The lower port number should be the real port, the other one will be
97 # the ephemeral port. 92 # the ephemeral port.
98 source_port, destination_port = struct.unpack('!HH', payload[:4])
99 protocol = "TCP" if protocol == 0x06 else "UDP"
100 port = min(source_port, destination_port) 93 port = min(source_port, destination_port)
101 else: 94 else:
102 add_other("L4 0x%02X" % protocol) 95 add_other("L4 0x%02X" % protocol)
103 continue 96 continue
104 97
105 if protocol == "TCP" and port == 80: 98 if protocol == "TCP" and port == 80:
106 http[direction] += length 99 http[direction] += bps
107 elif protocol == "TCP" and port == 443: 100 elif protocol == "TCP" and port == 443:
108 https[direction] += length 101 https[direction] += bps
109 elif protocol == "TCP" and port == 22: 102 elif protocol == "TCP" and port == 22:
110 ssh[direction] += length 103 ssh[direction] += bps
111 elif port == 53: 104 elif port == 53:
112 dns[direction] += length 105 dns[direction] += bps
113 else: 106 else:
114 add_other("Port %i" % port) 107 add_other("Port %i" % port)
115 continue 108 continue
116 109
117 status = [] 110 status = []
118 perfdata = [] 111 perfdata = []
119 def add_status(id, values): 112 def add_status(id, values):
120 rx = float(values["rx"]) * 8 / INTERVAL 113 rx = values["rx"]
121 tx = float(values["tx"]) * 8 / INTERVAL 114 tx = values["tx"]
122 status.append("%srx %s %stx %s" % (id, format_bandwidth(rx), id, format_band width(tx))) 115 status.append("%srx %s %stx %s" % (id, format_bandwidth(rx), id, format_band width(tx)))
123 if id == "": 116 if id == "":
124 perfdata.append("rx=%i;%i;%i tx=%i;%i;%i" % (rx, warn, crit, tx, warn, cri t)) 117 perfdata.append("rx=%i;%i;%i tx=%i;%i;%i" % (rx, warn, crit, tx, warn, cri t))
125 else: 118 else:
126 perfdata.append("%srx=%i %stx=%i" % (id, rx, id, tx)) 119 perfdata.append("%srx=%i %stx=%i" % (id, rx, id, tx))
127 120
128 add_status("", total) 121 add_status("", total)
129 add_status("http_", http) 122 add_status("http_", http)
130 add_status("https_", https) 123 add_status("https_", https)
131 add_status("ssh_", ssh) 124 add_status("ssh_", ssh)
132 add_status("dns_", dns) 125 add_status("dns_", dns)
133 add_status("other_", other) 126 add_status("other_", other)
134 for key in sorted(other_detailed.iterkeys(), key=lambda k: other_detailed[k], reverse=True): 127 for key in sorted(other_detailed.iterkeys(), key=lambda k: other_detailed[k], reverse=True):
135 status.append("%s %s" % (key, format_bandwidth(float(other_detailed[key]) / INTERVAL))) 128 status.append("%s %s" % (key, format_bandwidth(float(other_detailed[key]) / INTERVAL)))
136 129
137 output = "%s|%s" % (", ".join(status), " ".join(perfdata)) 130 output = "%s|%s" % (", ".join(status), " ".join(perfdata))
138 131
139 rx = float(total["rx"]) * 8 / INTERVAL 132 if total["rx"] >= crit or total["tx"] >= crit:
140 tx = float(total["tx"]) * 8 / INTERVAL
141 if rx >= crit or tx >= crit:
142 print "CRITICAL - " + output 133 print "CRITICAL - " + output
143 sys.exit(2) 134 sys.exit(2)
144 135
145 if rx >= warn or tx >= warn: 136 if total["rx"] >= warn or total["tx"] >= warn:
146 print "WARNING - " + output 137 print "WARNING - " + output
147 sys.exit(1) 138 sys.exit(1)
148 139
149 print "OK - " + output 140 print "OK - " + output
LEFTRIGHT

Powered by Google App Engine
This is Rietveld