package PandoraFMS::SNMPServer; ########################################################################## # Pandora FMS SNMP Console. # Pandora FMS. the Flexible Monitoring System. http://www.pandorafms.org ########################################################################## # Copyright (c) 2005-2009 Artica Soluciones Tecnologicas S.L # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU Lesser General Public License # as published by the Free Software Foundation; version 2 # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. ########################################################################## use strict; use warnings; use threads; use threads::shared; use Thread::Semaphore; use Time::Local; use XML::Simple; # Default lib dir for RPM and DEB packages use lib '/usr/lib/perl5'; use PandoraFMS::Tools; use PandoraFMS::DB; use PandoraFMS::Core; use PandoraFMS::Server; # Inherits from PandoraFMS::Server our @ISA = qw(PandoraFMS::Server); ######################################################################################## # SNMP Server class constructor. ######################################################################################## sub new ($$;$) { my ($class, $config, $dbh) = @_; return undef unless $config->{'snmpconsole'} == 1; # Start snmptrapd my $pid_file = '/var/run/pandora_snmptrapd.pid'; my $snmptrapd_running = 0; if ( -e $pid_file && open (PIDFILE, $pid_file)) { my $pid = + 0; close PIDFILE; # Check if snmptrapd is running if ($snmptrapd_running = kill (0, $pid)) { logger ($config, "snmptrapd (pid $pid) is already running, attempting to kill it...", 1); print_message ($config, "snmptrapd (pid $pid) is already running, attempting to kill it...", 1); kill (9, $pid); } } # Ignore auth failure traps my $snmp_ignore_authfailure = ($config->{'snmp_ignore_authfailure'} eq '1' ? ' -a' : ''); # Select agent-addr field of the PDU or PDU source address for V1 traps my $address_format = ($config->{'snmp_pdu_address'} eq '0' ? '%a' : '%b'); my $snmptrapd_args = ' -t -On -n' . $snmp_ignore_authfailure . ' -Lf ' . $config->{'snmp_logfile'} . ' -p ' . $pid_file; $snmptrapd_args .= ' --format1=SNMPv1[**]%4y-%02.2m-%l[**]%02.2h:%02.2j:%02.2k[**]' . $address_format . '[**]%N[**]%w[**]%W[**]%q[**]%v\\\n'; $snmptrapd_args .= ' --format2=SNMPv2[**]%4y-%02.2m-%l[**]%02.2h:%02.2j:%02.2k[**]%b[**]%v\\\n'; if (system ($config->{'snmp_trapd'} . $snmptrapd_args . ' >/dev/null 2>&1') != 0) { logger ($config, " [E] Could not start snmptrapd.", 1); print_message ($config, " [E] Could not start snmptrapd.", 1); return undef; } # Call the constructor of the parent class my $self = $class->SUPER::new($config, 2, $dbh); bless $self, $class; return $self; } ############################################################################### # Run. ############################################################################### sub run ($) { my $self = shift; my $pa_config = $self->getConfig (); print_message ($pa_config, " [*] Starting Pandora FMS SNMP Console.", 1); $self->SUPER::run (\&PandoraFMS::SNMPServer::pandora_snmptrapd); } ########################################################################## # Process SNMP log file. ########################################################################## sub pandora_snmptrapd { my $self = shift; my $pa_config = $self->getConfig (); eval { # Connect to the DB my $dbh = db_connect ($pa_config->{'dbengine'}, $pa_config->{'dbname'}, $pa_config->{'dbhost'}, $pa_config->{'dbport'}, $pa_config->{'dbuser'}, $pa_config->{'dbpass'}); $self->setDBH ($dbh); # Wait for the SNMP log file to be available my $log_file = $pa_config->{'snmp_logfile'}; sleep ($pa_config->{'server_threshold'}) while (! -e $log_file); open (SNMPLOGFILE, $log_file) or return; # Process index file, if available my ($idx_file, $last_line, $last_size) = ($log_file . '.index', 0, 0); if (-e $idx_file) { open (INDEXFILE, $idx_file) or return; my $idx_data = ; close INDEXFILE; ($last_line, $last_size) = split(/\s+/, $idx_data); } my $log_size = (stat ($log_file))[7]; # New SNMP log file found if ($log_size < $last_size) { unlink ($idx_file); ($last_line, $last_size) = (0, 0); } # Skip already processed lines readline SNMPLOGFILE for (1..$last_line); # Main loop while (1) { while (my $line = ) { $last_line++; $last_size = (stat ($log_file))[7]; chomp ($line); # Update index file open INDEXFILE, '>' . $idx_file; print INDEXFILE $last_line . ' ' . $last_size; close INDEXFILE; # Skip lines other than SNMP Trap logs next unless ($line =~ m/^SNMPv[12]\[\*\*\]/); (my $trap_ver, $line) = split(/\[\*\*\]/, $line, 2); # Process SNMP filter next if (matches_filter ($dbh, $pa_config, $line) == 1); logger($pa_config, "Reading trap '$line'", 10); my ($date, $time, $source, $oid, $type, $type_desc, $value, $data) = ('', '', '', '', '', '', '', ''); if ($trap_ver eq "SNMPv1") { ($date, $time, $source, $oid, $type, $type_desc, $value, $data) = split(/\[\*\*\]/, $line, 8); $value = limpia_cadena ($value); # Try to save as much information as possible if the trap could not be parsed $oid = $type_desc if ($oid eq '' || $oid eq '.'); } elsif ($trap_ver eq "SNMPv2") { ($date, $time, $source, $data) = split(/\[\*\*\]/, $line, 4); my @data = split(/\t/, $data); shift @data; # Drop unused 1st data. $oid = shift @data; if (!defined($oid)) { logger($pa_config, "[W] snmpTrapOID not found (Illegal SNMPv2 trap?)", 1); next; } $oid =~ s/.* = OID: //; $data = join("\t", @data); } if ($trap_ver eq "SNMPv2" || $pa_config->{'snmp_pdu_address'} eq '1' ) { # extract IP address from %b part: # * destination part (->[dest_ip]:dest_port) appears in Net-SNMP > 5.3 # * protocol name (TCP: or UDP:) and bracketted IP addr w/ port number appear in # Net-SNMP > 5.1 (Net-SNMP 5.1 has IP addr only). # * port number is signed (often negative) in Net-SNMP 5.2 $source =~ s/(?:(?:TCP|UDP):\s*)?\[?([^] ]+)\]?(?::-?\d+)?(?:\s*->.*)?$/$1/; } my $timestamp = $date . ' ' . $time; my ($custom_oid, $custom_type, $custom_value) = ('', '', ''); # custom_type, custom_value is not used since 4.0 version, all custom data goes on custom_oid $custom_oid = $data; # Insert the trap into the DB if (! defined(enterprise_hook ('snmp_insert_trap', [$pa_config, $source, $oid, $type, $value, $custom_oid, $custom_value, $custom_type, $timestamp, $self->getServerID (), $dbh]))) { my $trap_id = db_insert ($dbh, 'id_trap', 'INSERT INTO ttrap (timestamp, source, oid, type, value, oid_custom, value_custom, type_custom) VALUES (?, ?, ?, ?, ?, ?, ?, ?)', $timestamp, $source, $oid, $type, $value, $custom_oid, $custom_value, $custom_type); logger ($pa_config, "Received SNMP Trap from $source", 4); # Evaluate alerts for this trap pandora_evaluate_snmp_alerts ($pa_config, $trap_id, $source, $oid, $type, $oid, $value, $custom_oid, $dbh); } } sleep ($pa_config->{'server_threshold'}); } }; if ($@) { $self->setErrStr ($@); } } ######################################################################################## # Stop the server, killing snmptrapd before. ######################################################################################## sub stop () { my $self = shift; system ('kill -9 `cat /var/run/pandora_snmptrapd.pid 2> /dev/null`'); unlink ('/var/run/pandora_snmptrapd.pid'); $self->SUPER::stop (); } ######################################################################################## # Returns 1 if the given string matches any SNMP filter, 0 otherwise. ######################################################################################## sub matches_filter ($$$) { my ($dbh, $pa_config, $string) = @_; # Get filters my @filters = get_db_rows ($dbh, 'SELECT filter FROM tsnmp_filter'); foreach my $filter (@filters) { my $regexp = safe_output($filter->{'filter'}) ; my $eval_result; # eval protects against server down (by invalid regular expressions) $eval_result = eval { $string =~ m/$regexp/i ; }; if ($eval_result) { logger($pa_config, "Trap '$string' matches filter '$regexp'. Discarding...", 10); return 1; } } return 0; } 1; __END__