458 lines
13 KiB
PHP
458 lines
13 KiB
PHP
<?php
|
|
|
|
// Pandora FMS - http://pandorafms.com
|
|
// ==================================================
|
|
// Copyright (c) 2005-2010 Artica Soluciones Tecnologicas
|
|
// Please see http://pandorafms.org for full contribution list
|
|
|
|
// This program is free software; you can redistribute it and/or
|
|
// modify it under the terms of the GNU Lesser General Public License
|
|
// as published by the Free Software Foundation; version 2
|
|
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
|
|
/**
|
|
* @package Include
|
|
* @subpackage Events
|
|
*/
|
|
|
|
/**
|
|
* Get all rows of events from the database, that
|
|
* pass the filter, and can get only some fields.
|
|
*
|
|
* @param mixed Filters elements. It can be an indexed array
|
|
* (keys would be the field name and value the expected value, and would be
|
|
* joined with an AND operator) or a string, including any SQL clause (without
|
|
* the WHERE keyword). Example:
|
|
* <code>
|
|
* Both are similars:
|
|
* get_db_all_rows_filter ('table', array ('disabled', 0));
|
|
* get_db_all_rows_filter ('table', 'disabled = 0');
|
|
*
|
|
* Both are similars:
|
|
* get_db_all_rows_filter ('table', array ('disabled' => 0, 'history_data' => 0), 'name', 'OR');
|
|
* get_db_all_rows_filter ('table', 'disabled = 0 OR history_data = 0', 'name');
|
|
* </code>
|
|
* @param mixed Fields of the table to retrieve. Can be an array or a coma
|
|
* separated string. All fields are retrieved by default
|
|
*
|
|
*
|
|
* @return mixed False in case of error or invalid values passed. Affected rows otherwise
|
|
*/
|
|
function get_events ($filter = false, $fields = false) {
|
|
return get_db_all_rows_filter ('tevento', $filter, $fields);
|
|
}
|
|
|
|
function get_event ($id, $fields = false) {
|
|
if (empty ($id))
|
|
return false;
|
|
global $config;
|
|
|
|
if (is_array ($fields)) {
|
|
if (! in_array ('id_grupo', $fields))
|
|
$fields[] = 'id_grupo';
|
|
}
|
|
|
|
$event = get_db_row ('tevento', 'id_evento', $id, $fields);
|
|
if (! give_acl ($config['id_user'], $event['id_grupo'], 'IR'))
|
|
return false;
|
|
return $event;
|
|
}
|
|
|
|
/**
|
|
* Get all the events ids similar to a given event id.
|
|
*
|
|
* An event is similar then the event text (evento) and the id_agentmodule are
|
|
* the same.
|
|
*
|
|
* @param int Event id to get similar events.
|
|
*
|
|
* @return array A list of events ids.
|
|
*/
|
|
function get_similar_events_ids ($id) {
|
|
$ids = array ();
|
|
$event = get_event ($id, array ('evento', 'id_agentmodule'));
|
|
if ($event === false)
|
|
return $ids;
|
|
|
|
$events = get_db_all_rows_filter ('tevento',
|
|
array ('evento' => $event['evento'],
|
|
'id_agentmodule' => $event['id_agentmodule']),
|
|
array ('id_evento'));
|
|
if ($events === false)
|
|
return $ids;
|
|
|
|
foreach ($events as $event)
|
|
$ids[] = $event['id_evento'];
|
|
|
|
return $ids;
|
|
}
|
|
|
|
/**
|
|
* Delete events in a transaction
|
|
*
|
|
* @param mixed Event ID or array of events
|
|
* @param bool Whether to delete similar events too.
|
|
*
|
|
* @return bool Whether or not it was successful
|
|
*/
|
|
function delete_event ($id_event, $similar = true) {
|
|
global $config;
|
|
|
|
//Cleans up the selection for all unwanted values also casts any single values as an array
|
|
$id_event = (array) safe_int ($id_event, 1);
|
|
|
|
/* We must delete all events like the selected */
|
|
if ($similar) {
|
|
foreach ($id_event as $id) {
|
|
$id_event = array_merge ($id_event, get_similar_events_ids ($id));
|
|
}
|
|
}
|
|
|
|
process_sql_begin ();
|
|
$errors = 0;
|
|
|
|
foreach ($id_event as $event) {
|
|
$sql = sprintf ("DELETE FROM tevento WHERE id_evento = %d", $event);
|
|
$ret = process_sql ($sql);
|
|
|
|
if (give_acl ($config["id_user"], get_event_group ($event), "IM") == 0) {
|
|
//Check ACL
|
|
audit_db ($config["id_user"], $config["remote_addr"], "ACL Violation", "Attempted deleting event #".$event);
|
|
} elseif ($ret !== false) {
|
|
audit_db ($config["id_user"], $config["remote_addr"], "Event deleted", "Deleted event #".$event);
|
|
//ACL didn't fail nor did return
|
|
continue;
|
|
|
|
}
|
|
|
|
$errors++;
|
|
break;
|
|
}
|
|
|
|
if ($errors > 1) {
|
|
process_sql_rollback ();
|
|
return false;
|
|
} else {
|
|
process_sql_commit ();
|
|
return true;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Validate events in a transaction
|
|
*
|
|
* @param mixed Event ID or array of events
|
|
* @param bool Whether to validate similar events or not.
|
|
*
|
|
* @return bool Whether or not it was successful
|
|
*/
|
|
function validate_event ($id_event, $similars = true) {
|
|
global $config;
|
|
|
|
//Cleans up the selection for all unwanted values also casts any single values as an array
|
|
$id_event = (array) safe_int ($id_event, 1);
|
|
|
|
/* We must validate all events like the selected */
|
|
if ($similars) {
|
|
foreach ($id_event as $id) {
|
|
$id_event = array_merge ($id_event, get_similar_events_ids ($id));
|
|
}
|
|
}
|
|
|
|
process_sql_begin ();
|
|
$errors = 0;
|
|
|
|
foreach ($id_event as $event) {
|
|
$sql = sprintf ("UPDATE tevento SET estado = 1, id_usuario = '%s' WHERE id_evento = %d", $config['id_user'], $event);
|
|
$ret = process_sql ($sql);
|
|
|
|
if (give_acl ($config["id_user"], get_event_group ($event), "IW") == 0) {
|
|
//Check ACL
|
|
audit_db ($config["id_user"], $config["remote_addr"], "ACL Violation", "Attempted updating event #".$event);
|
|
} elseif ($ret !== false) {
|
|
//ACL didn't fail nor did return
|
|
continue;
|
|
}
|
|
|
|
$errors++;
|
|
break;
|
|
}
|
|
|
|
if ($errors > 1) {
|
|
process_sql_rollback ();
|
|
return false;
|
|
} else {
|
|
foreach ($id_event as $event) {
|
|
audit_db ($config["id_user"], $config["remote_addr"], "Event validated", "Validated event #".$event);
|
|
}
|
|
process_sql_commit ();
|
|
return true;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Get group id of an event.
|
|
*
|
|
* @param int $id_event Event id
|
|
*
|
|
* @return int Group id of the given event.
|
|
*/
|
|
function get_event_group ($id_event) {
|
|
return (int) get_db_value ('id_grupo', 'tevento', 'id_evento', (int) $id_event);
|
|
}
|
|
|
|
/**
|
|
* Get description of an event.
|
|
*
|
|
* @param int $id_event Event id.
|
|
*
|
|
* @return string Description of the given event.
|
|
*/
|
|
function get_event_description ($id_event) {
|
|
return (string) get_db_value ('evento', 'tevento', 'id_evento', (int) $id_event);
|
|
}
|
|
|
|
/**
|
|
* Insert a event in the event log system.
|
|
*
|
|
* @param int $event
|
|
* @param int $id_group
|
|
* @param int $id_agent
|
|
* @param int $status
|
|
* @param string $id_user
|
|
* @param string $event_type
|
|
* @param int $priority
|
|
* @param int $id_agent_module
|
|
* @param int $id_aam
|
|
*
|
|
* @return int event id
|
|
*/
|
|
function create_event ($event, $id_group, $id_agent, $status = 0, $id_user = "", $event_type = "unknown", $priority = 0, $id_agent_module = 0, $id_aam = 0) {
|
|
$sql = sprintf ('INSERT INTO tevento (id_agente, id_grupo, evento, timestamp,
|
|
estado, utimestamp, id_usuario, event_type, criticity,
|
|
id_agentmodule, id_alert_am)
|
|
VALUES (%d, %d, "%s", NOW(), %d, UNIX_TIMESTAMP(NOW()), "%s", "%s", %d, %d, %d)',
|
|
$id_agent, $id_group, $event, $status, $id_user, $event_type,
|
|
$priority, $id_agent_module, $id_aam);
|
|
|
|
return (int) process_sql ($sql, "insert_id");
|
|
}
|
|
|
|
/**
|
|
* Prints a small event table
|
|
*
|
|
* @param string $filter SQL WHERE clause
|
|
* @param int $limit How many events to show
|
|
* @param int $width How wide the table should be
|
|
* @param bool $return Prints out HTML if false
|
|
*
|
|
* @return string HTML with table element
|
|
*/
|
|
function print_events_table ($filter = "", $limit = 10, $width = 440, $return = false) {
|
|
global $config;
|
|
|
|
$sql = sprintf ("SELECT * FROM tevento %s ORDER BY timestamp DESC LIMIT %d", $filter, $limit);
|
|
$result = get_db_all_rows_sql ($sql);
|
|
|
|
if ($result === false) {
|
|
$return = '<div class="nf">'.__('No events').'</div>';
|
|
if ($return === false) {
|
|
echo $return;
|
|
}
|
|
return $return;
|
|
} else {
|
|
$table->cellpadding = 4;
|
|
$table->cellspacing = 4;
|
|
$table->width = $width;
|
|
$table->class = "databox";
|
|
$table->title = __('Latest events');
|
|
$table->titlestyle = "background-color:#799E48;";
|
|
$table->headclass = array ();
|
|
$table->head = array ();
|
|
$table->rowclass = array ();
|
|
$table->data = array ();
|
|
$table->align = array ();
|
|
|
|
$table->head[0] = "<span title='" . __('Validate') . "'>" . __('V.') . "</span>";
|
|
$table->align[0] = 'center';
|
|
|
|
$table->head[1] = "<span title='" . __('Severity') . "'>" . __('S.') . "</span>";
|
|
$table->align[1] = 'center';
|
|
|
|
$table->head[2] = __('Type');
|
|
$table->headclass[2] = "datos3 f9";
|
|
$table->align[2] = "center";
|
|
|
|
$table->head[3] = __('Event name');
|
|
|
|
$table->head[4] = __('Agent name');
|
|
|
|
$table->head[5] = __('User ID');
|
|
$table->headclass[5] = "datos3 f9";
|
|
$table->align[5] = "center";
|
|
|
|
$table->head[6] = __('Timestamp');
|
|
$table->headclass[6] = "datos3 f9";
|
|
$table->align[6] = "right";
|
|
|
|
foreach ($result as $event) {
|
|
if (! give_acl ($config["id_user"], $event["id_grupo"], "AR")) {
|
|
continue;
|
|
}
|
|
$data = array ();
|
|
|
|
// Colored box
|
|
if ($event["estado"] == 0) {
|
|
$img = "images/tick_off.png";
|
|
$title = __('Event not validated');
|
|
}
|
|
else {
|
|
$img = "images/tick.png";
|
|
$title = __('Event validated (ACK)');
|
|
}
|
|
$data[0] = print_image ($img, true,
|
|
array ("class" => "image_status",
|
|
"width" => 16,
|
|
"height" => 16,
|
|
"title" => $title));
|
|
|
|
switch ($event["criticity"]) {
|
|
default:
|
|
case 0:
|
|
$img = "images/status_sets/default/severity_maintenance.png";
|
|
break;
|
|
case 1:
|
|
$img = "images/status_sets/default/severity_informational.png";
|
|
break;
|
|
case 2:
|
|
$img = "images/status_sets/default/severity_normal.png";
|
|
break;
|
|
case 3:
|
|
$img = "images/status_sets/default/severity_warning.png";
|
|
break;
|
|
case 4:
|
|
$img = "images/status_sets/default/severity_critical.png";
|
|
break;
|
|
}
|
|
|
|
$data[1] = print_image ($img, true,
|
|
array ("class" => "image_status",
|
|
"width" => 12,
|
|
"height" => 12,
|
|
"title" => get_priority_name ($event["criticity"])));
|
|
|
|
/* Event type */
|
|
$data[2] = print_event_type_img ($event["event_type"], true);
|
|
|
|
// Event description wrap around by default at 44 or ~3 lines (10 seems to be a good ratio to wrap around for most sizes. Smaller number gets longer strings)
|
|
$wrap = floor ($width / 10);
|
|
|
|
|
|
|
|
$data[3] = '<span class="'.get_priority_class ($event["criticity"]).'f9">'. print_string_substr ($event["evento"],45,true). '</span>';
|
|
|
|
if ($event["id_agente"] > 0) {
|
|
// Agent name
|
|
$data[4] = print_agent_name ($event["id_agente"], true);
|
|
// for System or SNMP generated alerts
|
|
}
|
|
elseif ($event["event_type"] == "system") {
|
|
$data[4] = __('System');
|
|
}
|
|
else {
|
|
$data[4] = __('Alert')."SNMP";
|
|
}
|
|
|
|
// User who validated event
|
|
if ($event["estado"] != 0) {
|
|
$data[5] = print_username ($event["id_usuario"], true);
|
|
}
|
|
else {
|
|
$data[5] = '';
|
|
}
|
|
|
|
// Timestamp
|
|
$data[6] = print_timestamp ($event["timestamp"], true);
|
|
|
|
array_push ($table->rowclass, get_priority_class ($event["criticity"]));
|
|
array_push ($table->data, $data);
|
|
}
|
|
|
|
$return = print_table ($table, $return);
|
|
unset ($table);
|
|
return $return;
|
|
}
|
|
}
|
|
|
|
|
|
/**
|
|
* Prints the event type image
|
|
*
|
|
* @param string $type Event type from SQL
|
|
* @param bool $return Whether to return or print
|
|
*
|
|
* @return string HTML with img
|
|
*/
|
|
function print_event_type_img ($type, $return = false) {
|
|
$output = '';
|
|
|
|
switch ($type) {
|
|
case "alert_recovered":
|
|
$output .= print_image ("images/error.png", true,
|
|
array ("title" => __('Alert recovered')));
|
|
break;
|
|
case "alert_manual_validation":
|
|
$output .= print_image ("images/eye.png", true,
|
|
array ("title" => __('Alert manually validated')));
|
|
break;
|
|
case "going_up_warning":
|
|
$output .= print_image ("images/b_yellow.png", true,
|
|
array ("title" => __('Going from critical to warning')));
|
|
break;
|
|
case "going_down_critical":
|
|
case "going_up_critical": //This is to be backwards compatible
|
|
$output .= print_image ("images/b_red.png", true,
|
|
array ("title" => __('Going down to critical state')));
|
|
break;
|
|
case "going_up_normal":
|
|
case "going_down_normal": //This is to be backwards compatible
|
|
$output .= print_image ("images/b_green.png", true,
|
|
array ("title" => __('Going up to normal state')));
|
|
break;
|
|
case "going_down_warning":
|
|
$output .= print_image ("images/b_yellow.png", true,
|
|
array ("title" => __('Going down from normal to warning')));
|
|
break;
|
|
case "alert_fired":
|
|
$output .= print_image ("images/bell.png", true,
|
|
array ("title" => __('Alert fired')));
|
|
break;
|
|
case "system";
|
|
$output .= print_image ("images/cog.png", true,
|
|
array ("title" => __('SYSTEM')));
|
|
break;
|
|
case "recon_host_detected";
|
|
$output .= print_image ("images/network.png", true,
|
|
array ("title" => __('Recon server detected a new host')));
|
|
break;
|
|
case "new_agent";
|
|
$output .= print_image ("images/wand.png", true,
|
|
array ("title" => __('New agent created')));
|
|
break;
|
|
case "unknown":
|
|
default:
|
|
$output .= print_image ("images/err.png", true,
|
|
array ("title" => __('Unknown type:').': '.$type));
|
|
break;
|
|
}
|
|
|
|
if ($return)
|
|
return $output;
|
|
echo $output;
|
|
}
|
|
?>
|