| Index: modules/nagios/files/check_bandwidth |
| =================================================================== |
| --- a/modules/nagios/files/check_bandwidth |
| +++ b/modules/nagios/files/check_bandwidth |
| @@ -1,40 +1,148 @@ |
| #!/usr/bin/env python |
| -import os, re, subprocess, sys |
| +import os, re, subprocess, sys, socket, struct, fcntl |
| + |
| +INTERVAL = 5 |
| def format_bandwidth(bits): |
| if bits >= 1000000: |
| return "%.2f Mbit/s" % (bits / 1000000) |
| elif bits >= 1000: |
| return "%.2f kbit/s" % (bits / 1000) |
| else: |
| return "%.2f bit/s" % bits |
| +def getmacaddress(): |
| + # We are calling SIOCGIFHWADDR (0x8927 according to man ioctl_list) here. See |
| + # man netdevice for the request structure: it has to start with 16 bytes |
| + # containing the interface name, the OS will write 8 bytes after that (2 bytes |
| + # family name and 6 bytes actual MAC address). |
| + s = socket.socket() |
| + return fcntl.ioctl(s.fileno(), 0x8927, struct.pack("24s", "eth0"))[18:24] |
| + |
| +def splitport(hostport): |
| + match = re.search(r"\.(d+)$", hostport) |
| + if match: |
| + return hostport[:match.start()], match.group(1) |
| + else: |
| + return hostport, "0" |
| + |
| +def readtime(time): |
| + hour, minute, second = time.split(":") |
| + return int(hour) * 3600 + int(minute) * 60 + float(second) |
| + |
| if __name__ == "__main__": |
| if len(sys.argv) != 3: |
| script_name = os.path.basename(sys.argv[0]) |
| print "Usage: %s WARN CRIT" % script_name |
| sys.exit(0) |
| (warn, crit) = sys.argv[1:3] |
| warn = int(sys.argv[1]) |
| crit = int(sys.argv[2]) |
| - process_output = subprocess.check_output(["bwm-ng", "-I", "eth0", "-t", "5000", "-c", "1", "-o", "csv"]) |
| - data = process_output.splitlines()[0].split(";") |
| - tx = float(data[2]) * 8 |
| - rx = float(data[3]) * 8 |
| - status = "rx %s tx %s" % (format_bandwidth(rx), format_bandwidth(tx)) |
| + process = subprocess.Popen(["tcpdump", "-q", "-n", "-s", "64", "-w", "-"], stdout=subprocess.PIPE, stderr=subprocess.PIPE) |
| + starttime = None |
| + mac = getmacaddress() |
| - perfdata = "rx=%i;%i;%i tx=%i;%i;%i" % (rx, warn, crit, tx, warn, crit) |
| + total = {"rx": 0, "tx": 0} |
| + http = {"rx": 0, "tx": 0} |
| + https = {"rx": 0, "tx": 0} |
| + ssh = {"rx": 0, "tx": 0} |
| + dns = {"rx": 0, "tx": 0} |
| + other = {"rx": 0, "tx": 0} |
| + other_detailed = {} |
| - output = "%s|%s" % (status, perfdata) |
| + # See http://wiki.wireshark.org/Development/LibpcapFileFormat for libpcap format description |
| + magic_number, _, _, _, _, _, _ = struct.unpack("IHHiIII", process.stdout.read(24)) |
| + if magic_number != 0xa1b2c3d4: |
| + raise Exception("Unexpected format") |
| + while True: |
| + sec, usec, incl_len, orig_len = struct.unpack("IIII", process.stdout.read(16)) |
| + length = orig_len + 24 # 24 bytes Ethernet overhead not captured by tcpdump |
| + time = sec + float(usec) / 1000000 |
| + if starttime == None: |
| + starttime = time |
| + if time - starttime > INTERVAL: |
| + break |
| + |
| + def add_other(description): |
| + other[direction] += length |
| + other_detailed[description] = other_detailed.get(description, 0) + length |
| + |
| + payload = process.stdout.read(incl_len) |
| + |
| + # Unpack Ethernet frame, http://en.wikipedia.org/wiki/Ethernet_frame#Structure |
| + destination, source, protocol = struct.unpack("!6s6sH", payload[:14]) |
| + payload = payload[14:] |
| + direction = "rx" if destination == mac else "tx" |
| + total[direction] += length |
| + |
| + # Check Level 3 protocol |
| + if protocol == 0x0800: # IPv4, http://en.wikipedia.org/wiki/Internet_Protocol_version_4#Header |
| + ihl = ord(payload[0]) & 0xF |
| + protocol = ord(payload[9]) |
| + payload = payload[ihl * 4:] |
| + elif protocol == 0x86DD: # IPv6, http://en.wikipedia.org/wiki/IPv6_packet#Fixed_header |
| + protocol = ord(payload[6]) |
| + payload = payload[40:] |
| + else: |
| + add_other("L3 0x%04X" % protocol) |
| + continue |
| + |
| + # Check Level 4 protocol |
| + if protocol in (0x06, 0x11): # TCP, UDP |
| + # The lower port number should be the real port, the other one will be |
| + # the ephemeral port. |
| + source_port, destination_port = struct.unpack('!HH', payload[:4]) |
| + protocol = "TCP" if protocol == 0x06 else "UDP" |
| + port = min(source_port, destination_port) |
| + else: |
| + add_other("L4 0x%02X" % protocol) |
| + continue |
| + |
| + if protocol == "TCP" and port == 80: |
| + http[direction] += length |
| + elif protocol == "TCP" and port == 443: |
| + https[direction] += length |
| + elif protocol == "TCP" and port == 22: |
| + ssh[direction] += length |
| + elif port == 53: |
| + dns[direction] += length |
| + else: |
| + add_other("Port %i" % port) |
| + continue |
| + |
| + status = [] |
| + perfdata = [] |
| + def add_status(id, values): |
| + rx = float(values["rx"]) * 8 / INTERVAL |
| + tx = float(values["tx"]) * 8 / INTERVAL |
| + status.append("%srx %s %stx %s" % (id, format_bandwidth(rx), id, format_bandwidth(tx))) |
| + if id == "": |
| + perfdata.append("rx=%i;%i;%i tx=%i;%i;%i" % (rx, warn, crit, tx, warn, crit)) |
| + else: |
| + perfdata.append("%srx=%i %stx=%i" % (id, rx, id, tx)) |
| + |
| + add_status("", total) |
| + add_status("http_", http) |
| + add_status("https_", https) |
| + add_status("ssh_", ssh) |
| + add_status("dns_", dns) |
| + add_status("other_", other) |
| + for key in sorted(other_detailed.iterkeys(), key=lambda k: other_detailed[k], reverse=True): |
| + status.append("%s %s" % (key, format_bandwidth(float(other_detailed[key]) / INTERVAL))) |
| + |
| + output = "%s|%s" % (", ".join(status), " ".join(perfdata)) |
| + |
| + rx = float(total["rx"]) * 8 / INTERVAL |
| + tx = float(total["tx"]) * 8 / INTERVAL |
| if rx >= crit or tx >= crit: |
| print "CRITICAL - " + output |
| sys.exit(2) |
| if rx >= warn or tx >= warn: |
| print "WARNING - " + output |
| sys.exit(1) |