zoukankan      html  css  js  c++  java
  • nagios插件之登陆防火墙实现session监控

    ssh_firewall_session.sh -- 登陆防火墙并运行dis session statistics

    firewall_check_sessions.c -- 调用上面脚本。过滤出sessioin的数值

    运行:./firewall_check_sessions ssh_firewall_session.sh 192.168.0.1

    vi ssh_firewall_session.sh

    #!/usr/bin/expect -f
    
    #set port 22
    set user xxxxxx
    set host [lindex $argv 0 0]
    set password xxxxxx
    set timeout 30
    
    expect "*assword:*"
    send "$password
    "
    
    expect "*FW*"
    send "display session statistics
    "
    
    expect "*FW*"
    send "quit"


    vi firewall_check_sessions.c 

    #include <stdio.h>
    #include <stdlib.h>
    #include <sys/types.h>
    #include <regex.h>
    #include <string.h>
    
    #define OK       0
    #define WARNING  1
    #define CRITICAL 2
    #define UNKNOWN  3
    
    #define LEN 1000L
    #define MIN_LEN 32L
    
    //#define TCL_CMD "/home/weihu/tcl/"
    #define TCL_CMD "/usr/local/nagios/libexec/"
    
    int exitstatus=OK;
    char *exit_status[4]={"OK","WARNING","CRITICAL","UNKNOWN"};
    
    char status_information[LEN];
    char performance_data[LEN];
    
    //current session
    char cur_session[MIN_LEN]={0};
    char tcp_session[MIN_LEN]={0};
    char half_open[MIN_LEN]={0};
    char half_close[MIN_LEN]={0};
    char udp_session[MIN_LEN]={0};
    char icmp_session[MIN_LEN]={0};
    char rawip_session[MIN_LEN]={0};
    
    //new create session per second
    char cur_new_session[MIN_LEN]={0};
    char tcp_new_session[MIN_LEN]={0};
    char udp_new_session[MIN_LEN]={0};
    char icmp_new_session[MIN_LEN]={0};
    char rawip_new_session[MIN_LEN]={0};
    
    int parse_status(char *sh_cmd,char *active_status,char *active_ip_addr) {
    	int ret;
            FILE *fp;
            char readbuf[LEN];
    
            char *p,*str;
    
    	int line=0;
    	int mark1=0;
    	int mark2=0;
    
    /*
            char tmp1[LEN];
            char tmp2[LEN];
            char tmp3[LEN];
            char tmp4[LEN];
    */
    
            int mark=0;
    	char tmp1[MIN_LEN];
    	char tmp2[MIN_LEN];
    
            regex_t reg;
            int cflags=REG_EXTENDED;
            const char *pattern="^Session establishment rate";
            regmatch_t pmatch[1];
    	int nmatch=1;
    
            ret=regcomp(&reg,pattern,cflags);
    	if(ret!=0) {
    		fprintf(stderr,"regcomp() error.
    ");
    	}
    	
    
    //	fp=popen("/home/neo/check_log/tcl/auto_ssh.sh","r");
            fp=popen(sh_cmd,"r");
            if(fp==NULL) {
                    fprintf(stderr,"popen() error. ");
                    exitstatus=CRITICAL;
                    printf("%s: - %s | %s
    ",exit_status[exitstatus],status_information,performance_data);
                    exit(exitstatus);
            }
    
            while(fgets(readbuf,LEN,fp)!=NULL) {
    		line++;
    	//	printf("line=%d,readbuf=%s",line,readbuf);
    		if(strstr(readbuf,"Current session")) {
    			sscanf(readbuf,"Current session(s):%s",cur_session);
    		//	printf("cur_session=%s
    ",cur_session);
    		}
    
    		if(strstr(readbuf,"TCP session")) {
    			sscanf(readbuf," Current     TCP session(s): %s",tcp_session);
    		//	printf("tcp_session=%s
    ",tcp_session);
    		}
    
    		if(strstr(readbuf,"Half-Open")) {
    			sscanf(readbuf," Half-Open: %s           Half-Close: %s",half_open,half_close);
    		//	printf("half_open=%s,half_close=%s
    ",half_open,half_close);
    		}
    
    		if(strstr(readbuf,"UDP session")) {
    			sscanf(readbuf," Current     UDP session(s): %s",udp_session);
    		//	printf("udp_session=%s
    ",udp_session);
    		}
    
    		if(strstr(readbuf,"ICMP session")) {
    			sscanf(readbuf," Current    ICMP session(s): %s",icmp_session);
    		//	printf("icmp_session=%s
    ",icmp_session);
    		}
    
    		if(strstr(readbuf,"RAWIP session")) {
    			sscanf(readbuf," Current   RAWIP session(s): %s",rawip_session);
    		//	printf("rawip_session=%s
    ",rawip_session);
    		//	break;
    		}
    
    		if(strstr(readbuf,"Session establishment rate")) {
    			mark++;
    		}
    		if(mark==1) {
    			ret=regexec(&reg,readbuf,nmatch,pmatch,0);
    			if(ret==0) {
                    //              printf("-----------readbuf=%s",readbuf);
    
    				sscanf(readbuf,"Session establishment rate: %[^/s]",cur_new_session);
    			//	printf("cur_new_session=%s
    ",cur_new_session);
    			}
    		}
    
    		if(strstr(readbuf,"TCP     Session establishment rate")) {
    			sscanf(readbuf," TCP     Session establishment rate: %[^/s]",tcp_new_session);
    		//	printf("tcp_new_session=%s
    ",tcp_new_session);
    		}
    
    		if(strstr(readbuf,"UDP     Session establishment rate")) {
    			sscanf(readbuf," UDP     Session establishment rate: %[^/s]",udp_new_session);
    		//	printf("udp_new_session=%s
    ",udp_new_session);
    		}
    
    		if(strstr(readbuf,"ICMP    Session establishment rate")) {
    			sscanf(readbuf," ICMP    Session establishment rate: %[^/s]",icmp_new_session);
    		//	printf("icmp_new_session=%s
    ",icmp_new_session);
    		}
    
    		if(strstr(readbuf,"RAWIP   Session establishment rate")) {
    			sscanf(readbuf," RAWIP   Session establishment rate: %[^/s]",rawip_new_session);
    		//	printf("rawip_new_session=%s
    ",rawip_new_session);
    		}
    /*
    		if(line==3) {
    			for(p=strtok(readbuf," ");p;p=strtok(NULL," ")) {
    				//      str=p;
    
    				//Sun
    				mark1++;
    
    				if(mark1==2) {
    				//	printf("p=%s
    ",p);
    
    					strcpy(active_status,p);
    				//	printf("active_status=%s
    ",active_status);
    				}
    			}
    		}
    
    		if(line==4) {
    			for(p=strtok(readbuf," ");p;p=strtok(NULL," /")) {
    				mark2++;
    
    				if(mark2==2) {
    				//	printf("p=%s
    ",p);
    
    					strcpy(active_ip_addr,p);
    				//	printf("active_ip_addr=%s
    ",active_ip_addr);
    				}
    			}
    
    			break;
    		}
    */
            }
    
    //	printf("line=%d
    ",line);
    
            ret=pclose(fp);
            if(ret==-1) {
                    fprintf(stderr,"popen() error.
    ");
                    return -1;
            }
    
    	return 0;
    }
    
    int main(int argc, char *argv[]) {
            int ret;
    	char sh_cmd[LEN];
    
    	char active_status[LEN];
    	char active_ip_addr[LEN];
    
    	if(argc<=1) {
    		printf("%s %s
    ",argv[0],"auto_ssh_firewall_dis_session.sh + ip");
    		exit(-1);
    	}
    
    	sprintf(sh_cmd,"%s%s %s",TCL_CMD,argv[1],argv[2]);
    //	printf("sh_cmd=%s
    ",sh_cmd);
    
    	ret=parse_status(sh_cmd,active_status,active_ip_addr);
    	if(ret!=0) {
    		fprintf(stderr,"parse_status() error.
    ");
    
    		sprintf(status_information,"cur_all_session=%s, cur_all_session_new=%s, tcp_all_session=%s, tcp_all_session_new=%s, tcp_half_open=%s, tcp_half_close=%s, udp_session=%s, udp_session_new=%s, icmp_session=%s, icmp_session_new=%s, rawip_session=%s, rawip_session_new=%s", cur_session, cur_new_session, tcp_session, tcp_new_session, half_open, half_close, udp_session, udp_new_session, icmp_session, icmp_new_session, rawip_session, rawip_new_session);
    
    	sprintf(performance_data,"cur_all_session=%s;;;; cur_all_session_new=%s;;;; tcp_all_session=%s;;;; tcp_all_session_new=%s;;;; tcp_half_open=%s;;;; tcp_half_close=%s;;;; udp_session=%s;;;; udp_session_new=%s;;;; icmp_session=%s;;;; icmp_session_new=%s;;;; rawip_session=%s;;;; rawip_session_new=%s;;;;", cur_session, cur_new_session, tcp_session, tcp_new_session, half_open, half_close, udp_session, udp_new_session, icmp_session, icmp_new_session, rawip_session, rawip_new_session);
    
    		exitstatus=CRITICAL;
    		printf("%s - %s | %s
    ", exit_status[exitstatus], status_information, performance_data);
    
    		return exitstatus;
    	}
    
    	/*
    //	printf("active_status=%s
    ",active_status);
    //	printf("active_ip_addr=%s
    ",active_ip_addr);
    
    //	if(atoi(ping_avg)<200 && atoi(loss_packet)==0) {
    	if(atoi(ping_avg)<200 && atoi(loss_packet_int)==0) {
    		exitstatus=OK;	
    	}
    //	else if(atoi(ping_avg)>=200 && atoi(ping_avg)<500 || atoi(loss_packet)>=10 && atoi(loss_packet)<=50) {
    	else if(atoi(ping_avg)>=200 && atoi(ping_avg)<500 || atoi(loss_packet_int)>=10 && atoi(loss_packet_int)<=50) {
    		exitstatus=WARNING;	
    	}
    //	else if(atoi(ping_avg)>=500 || atoi(loss_packet)>50) {
    	else if(atoi(ping_avg)>=500 || atoi(loss_packet_int)>50) {
    		exitstatus=CRITICAL;	
    	}
    	else	{
    		exitstatus=CRITICAL;	
    	}
    
    
    //	sprintf(status_information,"rta %s%s, loss %s",ping_avg,ping_unit,loss_packet);
    	sprintf(status_information,"rta %s%s, loss %s%%",ping_avg,ping_unit,loss_packet_int);
    
    //	sprintf(performance_data,"rta=%s%s;200.000;500.000;0; pl=%s;40;80;; rtmax=%s%s;;;; rtmin=%s%s;;;;",ping_avg,ping_unit,loss_packet,ping_max,ping_unit,ping_min,ping_unit); 
    	sprintf(performance_data,"rta=%s%s;200.000;500.000;0; pl=%s%%;40;80;; rtmax=%s%s;;;; rtmin=%s%s;;;;",ping_avg,ping_unit,loss_packet_int,ping_max,ping_unit,ping_min,ping_unit); 
    
    	//|rta=0.056ms;200.000;500.000;0; pl=0%;40;80;; rtmax=0.084ms;;;; rtmin=0.029ms;;;; 
    
    	if(strstr(argv[1],"80_49")) {
            	printf("%s - 192.20.198.121: %s | %s
    ",exit_status[exitstatus],status_information,performance_data);
    	}
    
    	if(strstr(argv[1],"80_50")) {
            	printf("%s - 192.20.198.181: %s | %s
    ",exit_status[exitstatus],status_information,performance_data);
    	}
    
            return exitstatus;
    	*/
    
    
    	sprintf(status_information,"cur_all_session=%s, cur_all_session_new=%s, tcp_all_session=%s, tcp_all_session_new=%s, tcp_half_open=%s, tcp_half_close=%s, udp_session=%s, udp_session_new=%s, icmp_session=%s, icmp_session_new=%s, rawip_session=%s, rawip_session_new=%s", cur_session, cur_new_session, tcp_session, tcp_new_session, half_open, half_close, udp_session, udp_new_session, icmp_session, icmp_new_session, rawip_session, rawip_new_session);
    
    	sprintf(performance_data,"cur_all_session=%s;;;; cur_all_session_new=%s;;;; tcp_all_session=%s;;;; tcp_all_session_new=%s;;;; tcp_half_open=%s;;;; tcp_half_close=%s;;;; udp_session=%s;;;; udp_session_new=%s;;;; icmp_session=%s;;;; icmp_session_new=%s;;;; rawip_session=%s;;;; rawip_session_new=%s;;;;", cur_session, cur_new_session, tcp_session, tcp_new_session, half_open, half_close, udp_session, udp_new_session, icmp_session, icmp_new_session, rawip_session, rawip_new_session);
    
            printf("%s - %s | %s
    ", exit_status[exitstatus], status_information, performance_data);
    
    	return exitstatus;
    }
  • 相关阅读:
    数据结构:练习题
    Node.js尝鲜——留言功能
    html+JavaBean+jsp实现用户注册
    我的安全之路——Web安全篇
    Java模拟储蓄卡和信用卡
    AngularJS尝鲜——联动菜单
    AngularJS尝鲜——Ajax请求
    AngularJS尝鲜——增减商品购买量
    Knight Tournament (set)
    Anniversary party (树形DP)
  • 原文地址:https://www.cnblogs.com/claireyuancy/p/6950262.html
Copyright © 2011-2022 走看看