nagios插件之登陆防火墙实现session监控
ssh_firewall_session.sh -- 登陆防火墙并运行dis session statistics
firewall_check_sessions.c -- 调用上面脚本。过滤出sessioin的数值
运行:./firewall_check_sessions ssh_firewall_session.sh 192.168.0.1
vi ssh_firewall_session.sh
#!/usr/bin/expect -f #set port 22
set user xxxxxx
set host [lindex $argv 0 0]
set password xxxxxx
set timeout 30 expect "*assword:*"
send "$password\r" expect "*FW*"
send "display session statistics\r" expect "*FW*"
send "quit"
vi firewall_check_sessions.c
#include <stdio.h>
#include <stdlib.h>
#include <sys/types.h>
#include <regex.h>
#include <string.h> #define OK 0
#define WARNING 1
#define CRITICAL 2
#define UNKNOWN 3 #define LEN 1000L
#define MIN_LEN 32L //#define TCL_CMD "/home/weihu/tcl/"
#define TCL_CMD "/usr/local/nagios/libexec/" int exitstatus=OK;
char *exit_status[4]={"OK","WARNING","CRITICAL","UNKNOWN"}; char status_information[LEN];
char performance_data[LEN]; //current session
char cur_session[MIN_LEN]={0};
char tcp_session[MIN_LEN]={0};
char half_open[MIN_LEN]={0};
char half_close[MIN_LEN]={0};
char udp_session[MIN_LEN]={0};
char icmp_session[MIN_LEN]={0};
char rawip_session[MIN_LEN]={0}; //new create session per second
char cur_new_session[MIN_LEN]={0};
char tcp_new_session[MIN_LEN]={0};
char udp_new_session[MIN_LEN]={0};
char icmp_new_session[MIN_LEN]={0};
char rawip_new_session[MIN_LEN]={0}; int parse_status(char *sh_cmd,char *active_status,char *active_ip_addr) {
int ret;
FILE *fp;
char readbuf[LEN]; char *p,*str; int line=0;
int mark1=0;
int mark2=0; /*
char tmp1[LEN];
char tmp2[LEN];
char tmp3[LEN];
char tmp4[LEN];
*/ int mark=0;
char tmp1[MIN_LEN];
char tmp2[MIN_LEN]; regex_t reg;
int cflags=REG_EXTENDED;
const char *pattern="^Session establishment rate";
regmatch_t pmatch[1];
int nmatch=1; ret=regcomp(®,pattern,cflags);
if(ret!=0) {
fprintf(stderr,"regcomp() error.\n");
} // fp=popen("/home/neo/check_log/tcl/auto_ssh.sh","r");
fp=popen(sh_cmd,"r");
if(fp==NULL) {
fprintf(stderr,"popen() error. ");
exitstatus=CRITICAL;
printf("%s: - %s | %s\n",exit_status[exitstatus],status_information,performance_data);
exit(exitstatus);
} while(fgets(readbuf,LEN,fp)!=NULL) {
line++;
// printf("line=%d,readbuf=%s",line,readbuf);
if(strstr(readbuf,"Current session")) {
sscanf(readbuf,"Current session(s):%s",cur_session);
// printf("cur_session=%s\n",cur_session);
} if(strstr(readbuf,"TCP session")) {
sscanf(readbuf," Current TCP session(s): %s",tcp_session);
// printf("tcp_session=%s\n",tcp_session);
} if(strstr(readbuf,"Half-Open")) {
sscanf(readbuf," Half-Open: %s Half-Close: %s",half_open,half_close);
// printf("half_open=%s,half_close=%s\n",half_open,half_close);
} if(strstr(readbuf,"UDP session")) {
sscanf(readbuf," Current UDP session(s): %s",udp_session);
// printf("udp_session=%s\n",udp_session);
} if(strstr(readbuf,"ICMP session")) {
sscanf(readbuf," Current ICMP session(s): %s",icmp_session);
// printf("icmp_session=%s\n",icmp_session);
} if(strstr(readbuf,"RAWIP session")) {
sscanf(readbuf," Current RAWIP session(s): %s",rawip_session);
// printf("rawip_session=%s\n",rawip_session);
// break;
} if(strstr(readbuf,"Session establishment rate")) {
mark++;
}
if(mark==1) {
ret=regexec(®,readbuf,nmatch,pmatch,0);
if(ret==0) {
// printf("-----------readbuf=%s",readbuf); sscanf(readbuf,"Session establishment rate: %[^/s]",cur_new_session);
// printf("cur_new_session=%s\n",cur_new_session);
}
} if(strstr(readbuf,"TCP Session establishment rate")) {
sscanf(readbuf," TCP Session establishment rate: %[^/s]",tcp_new_session);
// printf("tcp_new_session=%s\n",tcp_new_session);
} if(strstr(readbuf,"UDP Session establishment rate")) {
sscanf(readbuf," UDP Session establishment rate: %[^/s]",udp_new_session);
// printf("udp_new_session=%s\n",udp_new_session);
} if(strstr(readbuf,"ICMP Session establishment rate")) {
sscanf(readbuf," ICMP Session establishment rate: %[^/s]",icmp_new_session);
// printf("icmp_new_session=%s\n",icmp_new_session);
} if(strstr(readbuf,"RAWIP Session establishment rate")) {
sscanf(readbuf," RAWIP Session establishment rate: %[^/s]",rawip_new_session);
// printf("rawip_new_session=%s\n",rawip_new_session);
}
/*
if(line==3) {
for(p=strtok(readbuf," ");p;p=strtok(NULL," ")) {
// str=p; //Sun
mark1++; if(mark1==2) {
// printf("p=%s\n",p); strcpy(active_status,p);
// printf("active_status=%s\n",active_status);
}
}
} if(line==4) {
for(p=strtok(readbuf," ");p;p=strtok(NULL," /")) {
mark2++; if(mark2==2) {
// printf("p=%s\n",p); strcpy(active_ip_addr,p);
// printf("active_ip_addr=%s\n",active_ip_addr);
}
} break;
}
*/
} // printf("line=%d\n",line); ret=pclose(fp);
if(ret==-1) {
fprintf(stderr,"popen() error.\n");
return -1;
} return 0;
} int main(int argc, char *argv[]) {
int ret;
char sh_cmd[LEN]; char active_status[LEN];
char active_ip_addr[LEN]; if(argc<=1) {
printf("%s %s\n",argv[0],"auto_ssh_firewall_dis_session.sh + ip");
exit(-1);
} sprintf(sh_cmd,"%s%s %s",TCL_CMD,argv[1],argv[2]);
// printf("sh_cmd=%s\n",sh_cmd); ret=parse_status(sh_cmd,active_status,active_ip_addr);
if(ret!=0) {
fprintf(stderr,"parse_status() error.\n"); sprintf(status_information,"cur_all_session=%s, cur_all_session_new=%s, tcp_all_session=%s, tcp_all_session_new=%s, tcp_half_open=%s, tcp_half_close=%s, udp_session=%s, udp_session_new=%s, icmp_session=%s, icmp_session_new=%s, rawip_session=%s, rawip_session_new=%s", cur_session, cur_new_session, tcp_session, tcp_new_session, half_open, half_close, udp_session, udp_new_session, icmp_session, icmp_new_session, rawip_session, rawip_new_session); sprintf(performance_data,"cur_all_session=%s;;;; cur_all_session_new=%s;;;; tcp_all_session=%s;;;; tcp_all_session_new=%s;;;; tcp_half_open=%s;;;; tcp_half_close=%s;;;; udp_session=%s;;;; udp_session_new=%s;;;; icmp_session=%s;;;; icmp_session_new=%s;;;; rawip_session=%s;;;; rawip_session_new=%s;;;;", cur_session, cur_new_session, tcp_session, tcp_new_session, half_open, half_close, udp_session, udp_new_session, icmp_session, icmp_new_session, rawip_session, rawip_new_session); exitstatus=CRITICAL;
printf("%s - %s | %s\n", exit_status[exitstatus], status_information, performance_data); return exitstatus;
} /*
// printf("active_status=%s\n",active_status);
// printf("active_ip_addr=%s\n",active_ip_addr); // if(atoi(ping_avg)<200 && atoi(loss_packet)==0) {
if(atoi(ping_avg)<200 && atoi(loss_packet_int)==0) {
exitstatus=OK;
}
// else if(atoi(ping_avg)>=200 && atoi(ping_avg)<500 || atoi(loss_packet)>=10 && atoi(loss_packet)<=50) {
else if(atoi(ping_avg)>=200 && atoi(ping_avg)<500 || atoi(loss_packet_int)>=10 && atoi(loss_packet_int)<=50) {
exitstatus=WARNING;
}
// else if(atoi(ping_avg)>=500 || atoi(loss_packet)>50) {
else if(atoi(ping_avg)>=500 || atoi(loss_packet_int)>50) {
exitstatus=CRITICAL;
}
else {
exitstatus=CRITICAL;
} // sprintf(status_information,"rta %s%s, loss %s",ping_avg,ping_unit,loss_packet);
sprintf(status_information,"rta %s%s, loss %s%%",ping_avg,ping_unit,loss_packet_int); // sprintf(performance_data,"rta=%s%s;200.000;500.000;0; pl=%s;40;80;; rtmax=%s%s;;;; rtmin=%s%s;;;;",ping_avg,ping_unit,loss_packet,ping_max,ping_unit,ping_min,ping_unit);
sprintf(performance_data,"rta=%s%s;200.000;500.000;0; pl=%s%%;40;80;; rtmax=%s%s;;;; rtmin=%s%s;;;;",ping_avg,ping_unit,loss_packet_int,ping_max,ping_unit,ping_min,ping_unit); //|rta=0.056ms;200.000;500.000;0; pl=0%;40;80;; rtmax=0.084ms;;;; rtmin=0.029ms;;;; if(strstr(argv[1],"80_49")) {
printf("%s - 192.20.198.121: %s | %s\n",exit_status[exitstatus],status_information,performance_data);
} if(strstr(argv[1],"80_50")) {
printf("%s - 192.20.198.181: %s | %s\n",exit_status[exitstatus],status_information,performance_data);
} return exitstatus;
*/ sprintf(status_information,"cur_all_session=%s, cur_all_session_new=%s, tcp_all_session=%s, tcp_all_session_new=%s, tcp_half_open=%s, tcp_half_close=%s, udp_session=%s, udp_session_new=%s, icmp_session=%s, icmp_session_new=%s, rawip_session=%s, rawip_session_new=%s", cur_session, cur_new_session, tcp_session, tcp_new_session, half_open, half_close, udp_session, udp_new_session, icmp_session, icmp_new_session, rawip_session, rawip_new_session); sprintf(performance_data,"cur_all_session=%s;;;; cur_all_session_new=%s;;;; tcp_all_session=%s;;;; tcp_all_session_new=%s;;;; tcp_half_open=%s;;;; tcp_half_close=%s;;;; udp_session=%s;;;; udp_session_new=%s;;;; icmp_session=%s;;;; icmp_session_new=%s;;;; rawip_session=%s;;;; rawip_session_new=%s;;;;", cur_session, cur_new_session, tcp_session, tcp_new_session, half_open, half_close, udp_session, udp_new_session, icmp_session, icmp_new_session, rawip_session, rawip_new_session); printf("%s - %s | %s\n", exit_status[exitstatus], status_information, performance_data); return exitstatus;
}
nagios插件之登陆防火墙实现session监控的更多相关文章
- nagios插件之登陆SBC监控电话数
运行:sbc_calls_status_new auto_ssh_sbc_10_17.sh | auto_ssh_sbc_11_17.sh vi sbc_calls_status_new.c #inc ...
- 关于nagios系统下使用shell脚本自定义监控插件的编写以及没有实时监控图的问题
关于nagios系统下shell自定义监控插件的编写.脚本规范以及没有实时监控图的问题的解决办法 在自已编写监控插件之前我们首先需要对nagios监控原理有一定的了解 Nagios的功能是监控服务和主 ...
- 用python 写一个nagios插件 监控http内容(转载)
nagios自带的http-check插件主要是检测地址url是否可以访问,在web+中间件的架构中容易出现url能访问,但是后台中间件拓机的情况,因为最近在自学python,所以写了个脚本检测ur ...
- Nagios的安装配置与应用之五监控远程Linux服务器
本文出自 “曹坏水” 博客,请务必保留此出处http://cao2012.blog.51cto.com/366908/1132113 NRPE是Nagios的一个功能扩展,它可在远程Linux和UNI ...
- nagios 实现Mysql 主从同步状态的监控
一.系统环境 主机名 IP nagios 192.168.15.111 mysql_s 192.168.15.21 二.操作步骤 2.1 mysql_s端的配置 2.1.1 编写check_mysql ...
- 使用nagios插件 check_mysql_health 过程中遇到的error
使用nagios插件 check_mysql_health 过程中遇到的error 1.如果在运行监控mysql插件的时候遇到了error安装以下依赖包就可以解决: yum install perl- ...
- Eclipse下使用GDT插件无法登陆GAE & GDT无法上传JAVA代码
今天更新github主页的过程中,想使用GAE部署一个Java Web服务来更好的支持网站动态性(关键是利用了免费的GAE资源),结果遇到了2个大问题. 1.GDT插件无法登陆GAE账户 错误1:登陆 ...
- 开发人员福利!ChromeSnifferPlus 插件正式登陆 Chrome Web Store
今天(2014-10-30)下午,ChromeSnifferPlus 插件正式登陆 Chrome Web Store. 在线安装地址: https://chrome.google.com/websto ...
- nagios 插件ndoutils 安装配置
nagios 插件ndoutils 安装配置 原文地址:http://www.cnblogs.com/caoguo/p/5022645.html # Nagios install ndoutils # ...
随机推荐
- 13.MongoDB 连接命令格式
转自:https://www.linuxidc.com/Linux/2016-03/129456.htm 使用用户 admin 使用密码 123456 连接到本地的 MongoDB 服务上.输出结果如 ...
- BZOJ 3223 Splay区间翻转
思路: 区间翻转的裸题 终于tm理解splay了-- //By SiriusRen #include <cstdio> #include <cstring> #include ...
- linux中的挂载是什么意思?通俗点讲
mount /dev/sda1 /mnt解释:mount 就是挂载命令,/dev/sda1是要挂载的磁盘分区,/mnt是要绑定的目录挂载后就能到目录/mnt去访问磁盘分区/dev/sda1里面的资料了 ...
- Win32++:可替代MFC的Windows桌面应用开发框架
写在前面 有过Win32编程经验的朋友都知道,使用Windows提供的API开发桌面应用是相当繁琐的,创建一个功能简单能接收并处理消息的窗口至少也得几百行代码.创建一个可视化的窗口一般要以下几个步骤: ...
- Andoid 更好的Android多线程下载框架
概述 为什么是更好的Android多线程下载框架呢,原因你懂的,广告法嘛! 本篇我们我们就来聊聊多线程下载框架,先聊聊我们框架的特点: 多线程 多任务 断点续传 支持大文件 可以自定义下载数据库 高度 ...
- bzoj5085: 最大 暴力 二分
Code: #include<cstdio> #include<algorithm> #include<cstring> #include<iostream& ...
- 2019 前端面试题汇总(主要为 Vue)
原文链接:点我 由于我的技术栈主要为Vue,所以大部分题目都是Vue开发相关的. 1. 谈谈你对MVVM开发模式的理解 MVVM分为Model.View.ViewModel三者. Model:代表数据 ...
- javascript与DOM节点的结合使用
文档对象模型(Document Object Model,简称DOM),是W3C组织推荐的处理可扩展标志语言的标准编程接口.在网页上,组织页面(或文档)的对象被组织在一个树形结构中,用来表示文档中对象 ...
- 【Henu ACM Round#20 A】 Fancy Fence
[链接] 我是链接,点我呀:) [题意] 在这里输入题意 [题解] 看看有没有(n-2)*180/n等于输入的a就好. [代码] #include <bits/stdc++.h> usin ...
- 洛谷 P1096 Hanoi双塔问题
P1096 Hanoi双塔问题 题目描述 给定A.B.C三根足够长的细柱,在A柱上放有2n个中间有孔的圆盘,共有n个不同的尺寸,每个尺寸都有两个相同的圆盘,注意这两个圆盘是不加区分的(下图为n=3的情 ...