$name) { if ($i == 0) { $str_user_groups .= $id; } else { $str_user_groups .= ','.$id; } $i++; } $url = "index.php?sec=estado&" . "sec2=operation/snmpconsole/snmp_view&" . "filter_severity=" . $filter_severity . "&" . "filter_fired=" . $filter_fired . "&" . "free_search_string=" . $free_search_string . "&" . "pagination=" . $pagination . "&" . "offset=" . $offset . "&" . "trap_type=" . $trap_type . "&" . "group_by=" .$group_by; if ($config["pure"]) { $link['text'] = '' . html_print_image("images/normal_screen.png", true, array("title" => __('Normal screen'))) . ''; } else { // Fullscreen $link['text'] = '' . html_print_image("images/full_screen.png", true, array("title" => __('Full screen'))) . ''; } // Header ui_print_page_header(__("SNMP Console"), "images/op_snmp.png", false, "", false, array($link)); // OPERATIONS // Delete SNMP Trap entry Event (only incident management access). if (isset ($_GET["delete"])) { $id_trap = (int) get_parameter_get ("delete", 0); if ($id_trap > 0 && check_acl ($config['id_user'], 0, "IM")) { $result = db_process_sql_delete('ttrap', array('id_trap' => $id_trap)); ui_print_result_message ($result, __('Successfully deleted'), __('Could not be deleted')); } else { db_pandora_audit("ACL Violation", "Trying to delete SNMP event ID #".$id_trap); } } // Check Event (only incident write access). if (isset ($_GET["check"])) { $id_trap = (int) get_parameter_get ("check", 0); if (check_acl ($config['id_user'], 0, "IW")) { $values = array( 'status' => 1, 'id_usuario' => $config["id_user"]); $result = db_process_sql_update('ttrap', $values, array('id_trap' => $id_trap)); ui_print_result_message ($result, __('Successfully updated'), __('Could not be updated')); } else { db_pandora_audit("ACL Violation", "Trying to checkout SNMP Trap ID".$id_trap); } } // Mass-process DELETE if (isset ($_POST["deletebt"])) { $trap_ids = get_parameter_post ("snmptrapid", array ()); if (is_array ($trap_ids) && check_acl ($config['id_user'], 0, "IW")) { foreach ($trap_ids as $id_trap) { db_process_sql_delete('ttrap', array('id_trap' => $id_trap)); } } else { db_pandora_audit("ACL Violation", "Trying to mass-delete SNMP Trap ID"); } } // Mass-process UPDATE if (isset ($_POST["updatebt"])) { $trap_ids = get_parameter_post ("snmptrapid", array ()); if (is_array ($trap_ids) && check_acl ($config['id_user'], 0, "IW")) { foreach ($trap_ids as $id_trap) { $sql = sprintf ("UPDATE ttrap SET status = 1, id_usuario = '%s' WHERE id_trap = %d", $config["id_user"], $id_trap); db_process_sql ($sql); } } else { db_pandora_audit("ACL Violation", "Trying to mass-delete SNMP Trap ID"); } } $table->width = '90%'; $table->size = array (); $table->size[0] = '120px'; $table->data = array (); // Set filters $agents = array (); $oids = array (); $severities = get_priorities (); $alerted = array (__('Not fired'), __('Fired')); foreach ($all_traps as $trap) { $agent = agents_get_agent_with_ip ($trap['source']); $agents[$trap["source"]] = $agent !== false ? $agent["nombre"] : $trap["source"]; $oid = enterprise_hook ('get_oid', array ($trap)); if ($oid === ENTERPRISE_NOT_HOOK) { $oid = $trap["oid"]; } $oids[$oid] = $oid; } //Make query to extract traps of DB. switch ($config["dbtype"]) { case "mysql": $sql = "SELECT * FROM ttrap WHERE (`source` IN ( SELECT direccion FROM tagente WHERE id_grupo IN ($str_user_groups) ) OR `source`='') %s ORDER BY timestamp DESC LIMIT %d,%d"; break; case "postgresql": $sql = "SELECT * FROM ttrap WHERE (source IN ( SELECT direccion FROM tagente WHERE id_grupo IN ($str_user_groups) ) OR source='') %s ORDER BY timestamp DESC LIMIT %d OFFSET %d"; break; case "oracle": $sql = "SELECT * FROM ttrap WHERE (source IN ( SELECT direccion FROM tagente WHERE id_grupo IN ($str_user_groups) ) OR source='') %s ORDER BY timestamp DESC LIMIT %d OFFSET %d"; break; } //$whereSubquery = 'WHERE 1=1'; $whereSubquery = ''; if ($filter_fired != -1) $whereSubquery .= ' AND alerted = ' . $filter_fired; if ($free_search_string != '') { switch ($config["dbtype"]) { case "mysql": $whereSubquery .= ' AND (source LIKE "%' . $free_search_string . '%" OR oid LIKE "%' . $free_search_string . '%" OR oid_custom LIKE "%' . $free_search_string . '%" OR type_custom LIKE "%' . $free_search_string . '%" OR value LIKE "%' . $free_search_string . '%" OR value_custom LIKE "%' . $free_search_string . '%" OR id_usuario LIKE "%' . $free_search_string . '%" OR text LIKE "%' . $free_search_string . '%" OR description LIKE "%' . $free_search_string . '%")'; break; case "postgresql": case "oracle": $whereSubquery .= ' AND (source LIKE \'%' . $free_search_string . '%\' OR oid LIKE \'%' . $free_search_string . '%\' OR oid_custom LIKE \'%' . $free_search_string . '%\' OR type_custom LIKE \'%' . $free_search_string . '%\' OR value LIKE \'%' . $free_search_string . '%\' OR value_custom LIKE \'%' . $free_search_string . '%\' OR id_usuario LIKE \'%' . $free_search_string . '%\' OR text LIKE \'%' . $free_search_string . '%\' OR description LIKE \'%' . $free_search_string . '%\')'; break; } } if ($filter_severity != -1) { //Test if install the enterprise to search oid in text or oid field in ttrap. if ($config['enterprise_installed']) $whereSubquery .= ' AND ( (alerted = 0 AND severity = ' . $filter_severity . ') OR (alerted = 1 AND priority = ' . $filter_severity . '))'; else $whereSubquery .= ' AND ( (alerted = 0 AND 1 = ' . $filter_severity . ') OR (alerted = 1 AND priority = ' . $filter_severity . '))'; } if ($filter_status != -1) $whereSubquery .= ' AND status = ' . $filter_status; if ($trap_type == 5) { $whereSubquery .= ' AND type NOT IN (0, 1, 2, 3, 4)'; } else if ($trap_type != -1){ $whereSubquery .= ' AND type = ' . $trap_type; } if ($group_by) { $where_without_group = $whereSubquery; $whereSubquery .= ' GROUP BY source,oid'; } switch ($config["dbtype"]) { case "mysql": $sql = sprintf($sql, $whereSubquery, $offset, $pagination); break; case "postgresql": $sql = sprintf($sql, $whereSubquery, $pagination, $offset); break; case "oracle": $set = array(); $set['limit'] = $pagination; $set['offset'] = $offset; $sql = oracle_recode_query ($sql, $set); break; } $traps = db_get_all_rows_sql($sql); // No traps if (empty ($traps)) { echo '