123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714 |
- // SPDX-License-Identifier: GPL-3.0-or-later
- #include "ebpf.h"
- #include "ebpf_functions.h"
- /*****************************************************************
- * EBPF FUNCTION COMMON
- *****************************************************************/
- /**
- * Function Start thread
- *
- * Start a specific thread after user request.
- *
- * @param em The structure with thread information
- * @param period
- * @return
- */
- static int ebpf_function_start_thread(ebpf_module_t *em, int period)
- {
- struct netdata_static_thread *st = em->thread;
- // another request for thread that already ran, cleanup and restart
- if (st->thread)
- freez(st->thread);
- if (period <= 0)
- period = EBPF_DEFAULT_LIFETIME;
- st->thread = mallocz(sizeof(netdata_thread_t));
- em->enabled = NETDATA_THREAD_EBPF_FUNCTION_RUNNING;
- em->lifetime = period;
- #ifdef NETDATA_INTERNAL_CHECKS
- netdata_log_info("Starting thread %s with lifetime = %d", em->info.thread_name, period);
- #endif
- return netdata_thread_create(st->thread, st->name, NETDATA_THREAD_OPTION_DEFAULT, st->start_routine, em);
- }
- /*****************************************************************
- * EBPF ERROR FUNCTIONS
- *****************************************************************/
- /**
- * Function error
- *
- * Show error when a wrong function is given
- *
- * @param transaction the transaction id that Netdata sent for this function execution
- * @param code the error code to show with the message.
- * @param msg the error message
- */
- static inline void ebpf_function_error(const char *transaction, int code, const char *msg) {
- pluginsd_function_json_error_to_stdout(transaction, code, msg);
- }
- /**
- * Thread Help
- *
- * Shows help with all options accepted by thread function.
- *
- * @param transaction the transaction id that Netdata sent for this function execution
- */
- static inline void ebpf_function_help(const char *transaction, const char *message) {
- pluginsd_function_result_begin_to_stdout(transaction, HTTP_RESP_OK, "text/plain", now_realtime_sec() + 3600);
- fprintf(stdout, "%s", message);
- pluginsd_function_result_end_to_stdout();
- fflush(stdout);
- }
- /*****************************************************************
- * EBPF SOCKET FUNCTION
- *****************************************************************/
- /**
- * Fill Fake socket
- *
- * Fill socket with an invalid request.
- *
- * @param fake_values is the structure where we are storing the value.
- */
- static inline void ebpf_socket_fill_fake_socket(netdata_socket_plus_t *fake_values)
- {
- snprintfz(fake_values->socket_string.src_ip, INET6_ADDRSTRLEN, "%s", "127.0.0.1");
- snprintfz(fake_values->socket_string.dst_ip, INET6_ADDRSTRLEN, "%s", "127.0.0.1");
- fake_values->pid = getpid();
- //fake_values->socket_string.src_port = 0;
- fake_values->socket_string.dst_port[0] = 0;
- snprintfz(fake_values->socket_string.dst_ip, NI_MAXSERV, "%s", "none");
- fake_values->data.family = AF_INET;
- fake_values->data.protocol = AF_UNSPEC;
- }
- static NETDATA_DOUBLE bytes_to_mb(uint64_t bytes) {
- return (NETDATA_DOUBLE)bytes / (1024 * 1024);
- }
- /**
- * Fill function buffer
- *
- * Fill buffer with data to be shown on cloud.
- *
- * @param wb buffer where we store data.
- * @param values data read from hash table
- * @param name the process name
- */
- static void ebpf_fill_function_buffer(BUFFER *wb, netdata_socket_plus_t *values, char *name)
- {
- buffer_json_add_array_item_array(wb);
- // IMPORTANT!
- // THE ORDER SHOULD BE THE SAME WITH THE FIELDS!
- // PID
- buffer_json_add_array_item_uint64(wb, (uint64_t)values->pid);
- // NAME
- buffer_json_add_array_item_string(wb, (name) ? name : "unknown");
- // Origin
- buffer_json_add_array_item_string(wb, (values->data.external_origin) ? "in" : "out");
- // Source IP
- buffer_json_add_array_item_string(wb, values->socket_string.src_ip);
- // SRC Port
- //buffer_json_add_array_item_uint64(wb, (uint64_t) values->socket_string.src_port);
- // Destination IP
- buffer_json_add_array_item_string(wb, values->socket_string.dst_ip);
- // DST Port
- buffer_json_add_array_item_string(wb, values->socket_string.dst_port);
- uint64_t connections;
- if (values->data.protocol == IPPROTO_TCP) {
- buffer_json_add_array_item_string(wb, "TCP");
- buffer_json_add_array_item_double(wb, bytes_to_mb(values->data.tcp.tcp_bytes_received));
- buffer_json_add_array_item_double(wb, bytes_to_mb(values->data.tcp.tcp_bytes_sent));
- connections = values->data.tcp.ipv4_connect + values->data.tcp.ipv6_connect;
- } else if (values->data.protocol == IPPROTO_UDP) {
- buffer_json_add_array_item_string(wb, "UDP");
- buffer_json_add_array_item_double(wb, bytes_to_mb(values->data.udp.udp_bytes_received));
- buffer_json_add_array_item_double(wb, bytes_to_mb(values->data.udp.udp_bytes_sent));
- connections = values->data.udp.call_udp_sent + values->data.udp.call_udp_received;
- } else {
- buffer_json_add_array_item_string(wb, "UNSPEC");
- buffer_json_add_array_item_double(wb, 0);
- buffer_json_add_array_item_double(wb, 0);
- connections = 1;
- }
- // Connections
- if (values->flags & NETDATA_SOCKET_FLAGS_ALREADY_OPEN) {
- connections++;
- } else if (!connections) {
- // If no connections, this means that we lost when connection was opened
- values->flags |= NETDATA_SOCKET_FLAGS_ALREADY_OPEN;
- connections++;
- }
- buffer_json_add_array_item_uint64(wb, connections);
- buffer_json_array_close(wb);
- }
- /**
- * Clean Judy array unsafe
- *
- * Clean all Judy Array allocated to show table when a function is called.
- * Before to call this function it is necessary to lock `ebpf_judy_pid.index.rw_spinlock`.
- **/
- static void ebpf_socket_clean_judy_array_unsafe()
- {
- if (!ebpf_judy_pid.index.JudyLArray)
- return;
- Pvoid_t *pid_value, *socket_value;
- Word_t local_pid = 0, local_socket = 0;
- bool first_pid = true, first_socket = true;
- while ((pid_value = JudyLFirstThenNext(ebpf_judy_pid.index.JudyLArray, &local_pid, &first_pid))) {
- netdata_ebpf_judy_pid_stats_t *pid_ptr = (netdata_ebpf_judy_pid_stats_t *)*pid_value;
- rw_spinlock_write_lock(&pid_ptr->socket_stats.rw_spinlock);
- if (pid_ptr->socket_stats.JudyLArray) {
- while ((socket_value = JudyLFirstThenNext(pid_ptr->socket_stats.JudyLArray, &local_socket, &first_socket))) {
- netdata_socket_plus_t *socket_clean = *socket_value;
- aral_freez(aral_socket_table, socket_clean);
- }
- JudyLFreeArray(&pid_ptr->socket_stats.JudyLArray, PJE0);
- pid_ptr->socket_stats.JudyLArray = NULL;
- }
- rw_spinlock_write_unlock(&pid_ptr->socket_stats.rw_spinlock);
- }
- }
- /**
- * Fill function buffer unsafe
- *
- * Fill the function buffer with socket information. Before to call this function it is necessary to lock
- * ebpf_judy_pid.index.rw_spinlock
- *
- * @param buf buffer used to store data to be shown by function.
- *
- * @return it returns 0 on success and -1 otherwise.
- */
- static void ebpf_socket_fill_function_buffer_unsafe(BUFFER *buf)
- {
- int counter = 0;
- Pvoid_t *pid_value, *socket_value;
- Word_t local_pid = 0;
- bool first_pid = true;
- while ((pid_value = JudyLFirstThenNext(ebpf_judy_pid.index.JudyLArray, &local_pid, &first_pid))) {
- netdata_ebpf_judy_pid_stats_t *pid_ptr = (netdata_ebpf_judy_pid_stats_t *)*pid_value;
- bool first_socket = true;
- Word_t local_timestamp = 0;
- rw_spinlock_read_lock(&pid_ptr->socket_stats.rw_spinlock);
- if (pid_ptr->socket_stats.JudyLArray) {
- while ((socket_value = JudyLFirstThenNext(pid_ptr->socket_stats.JudyLArray, &local_timestamp, &first_socket))) {
- netdata_socket_plus_t *values = (netdata_socket_plus_t *)*socket_value;
- ebpf_fill_function_buffer(buf, values, pid_ptr->cmdline);
- }
- counter++;
- }
- rw_spinlock_read_unlock(&pid_ptr->socket_stats.rw_spinlock);
- }
- if (!counter) {
- netdata_socket_plus_t fake_values = { };
- ebpf_socket_fill_fake_socket(&fake_values);
- ebpf_fill_function_buffer(buf, &fake_values, NULL);
- }
- }
- /**
- * Socket read hash
- *
- * This is the thread callback.
- * This thread is necessary, because we cannot freeze the whole plugin to read the data on very busy socket.
- *
- * @param buf the buffer to store data;
- * @param em the module main structure.
- *
- * @return It always returns NULL.
- */
- void ebpf_socket_read_open_connections(BUFFER *buf, struct ebpf_module *em)
- {
- // thread was not initialized or Array was reset
- rw_spinlock_read_lock(&ebpf_judy_pid.index.rw_spinlock);
- if (!em->maps || (em->maps[NETDATA_SOCKET_OPEN_SOCKET].map_fd == ND_EBPF_MAP_FD_NOT_INITIALIZED) ||
- !ebpf_judy_pid.index.JudyLArray){
- netdata_socket_plus_t fake_values = { };
- ebpf_socket_fill_fake_socket(&fake_values);
- ebpf_fill_function_buffer(buf, &fake_values, NULL);
- rw_spinlock_read_unlock(&ebpf_judy_pid.index.rw_spinlock);
- return;
- }
- rw_spinlock_read_lock(&network_viewer_opt.rw_spinlock);
- ebpf_socket_fill_function_buffer_unsafe(buf);
- rw_spinlock_read_unlock(&network_viewer_opt.rw_spinlock);
- rw_spinlock_read_unlock(&ebpf_judy_pid.index.rw_spinlock);
- }
- /**
- * Function: Socket
- *
- * Show information for sockets stored in hash tables.
- *
- * @param transaction the transaction id that Netdata sent for this function execution
- * @param function function name and arguments given to thread.
- * @param timeout The function timeout
- * @param cancelled Variable used to store function status.
- */
- static void ebpf_function_socket_manipulation(const char *transaction,
- char *function __maybe_unused,
- usec_t *stop_monotonic_ut __maybe_unused,
- bool *cancelled __maybe_unused,
- BUFFER *payload __maybe_unused,
- const char *source __maybe_unused,
- void *data __maybe_unused)
- {
- ebpf_module_t *em = &ebpf_modules[EBPF_MODULE_SOCKET_IDX];
- char *words[PLUGINSD_MAX_WORDS] = {NULL};
- size_t num_words = quoted_strings_splitter_pluginsd(function, words, PLUGINSD_MAX_WORDS);
- const char *name;
- int period = -1;
- rw_spinlock_write_lock(&ebpf_judy_pid.index.rw_spinlock);
- network_viewer_opt.enabled = CONFIG_BOOLEAN_YES;
- uint32_t previous;
- static const char *socket_help = {
- "ebpf.plugin / socket\n"
- "\n"
- "Function `socket` display information for all open sockets during ebpf.plugin runtime.\n"
- "During thread runtime the plugin is always collecting data, but when an option is modified, the plugin\n"
- "resets completely the previous table and can show a clean data for the first request before to bring the\n"
- "modified request.\n"
- "\n"
- "The following filters are supported:\n"
- "\n"
- " family:FAMILY\n"
- " Shows information for the FAMILY specified. Option accepts IPV4, IPV6 and all, that is the default.\n"
- "\n"
- " period:PERIOD\n"
- " Enable socket to run a specific PERIOD in seconds. When PERIOD is not\n"
- " specified plugin will use the default 300 seconds\n"
- "\n"
- " resolve:BOOL\n"
- " Resolve service name, default value is YES.\n"
- "\n"
- " range:CIDR\n"
- " Show sockets that have only a specific destination. Default all addresses.\n"
- "\n"
- " port:range\n"
- " Show sockets that have only a specific destination.\n"
- "\n"
- " reset\n"
- " Send a reset to collector. When a collector receives this command, it uses everything defined in configuration file.\n"
- "\n"
- " interfaces\n"
- " When the collector receives this command, it read all available interfaces on host.\n"
- "\n"
- "Filters can be combined. Each filter can be given only one time. Default all ports\n"
- };
- for (int i = 1; i < PLUGINSD_MAX_WORDS; i++) {
- const char *keyword = get_word(words, num_words, i);
- if (!keyword)
- break;
- if (strncmp(keyword, EBPF_FUNCTION_SOCKET_FAMILY, sizeof(EBPF_FUNCTION_SOCKET_FAMILY) - 1) == 0) {
- name = &keyword[sizeof(EBPF_FUNCTION_SOCKET_FAMILY) - 1];
- previous = network_viewer_opt.family;
- uint32_t family = AF_UNSPEC;
- if (!strcmp(name, "IPV4"))
- family = AF_INET;
- else if (!strcmp(name, "IPV6"))
- family = AF_INET6;
- if (family != previous) {
- rw_spinlock_write_lock(&network_viewer_opt.rw_spinlock);
- network_viewer_opt.family = family;
- rw_spinlock_write_unlock(&network_viewer_opt.rw_spinlock);
- ebpf_socket_clean_judy_array_unsafe();
- }
- } else if (strncmp(keyword, EBPF_FUNCTION_SOCKET_PERIOD, sizeof(EBPF_FUNCTION_SOCKET_PERIOD) - 1) == 0) {
- name = &keyword[sizeof(EBPF_FUNCTION_SOCKET_PERIOD) - 1];
- pthread_mutex_lock(&ebpf_exit_cleanup);
- period = str2i(name);
- if (period > 0) {
- em->lifetime = period;
- } else
- em->lifetime = EBPF_NON_FUNCTION_LIFE_TIME;
- #ifdef NETDATA_DEV_MODE
- collector_info("Lifetime modified for %u", em->lifetime);
- #endif
- pthread_mutex_unlock(&ebpf_exit_cleanup);
- } else if (strncmp(keyword, EBPF_FUNCTION_SOCKET_RESOLVE, sizeof(EBPF_FUNCTION_SOCKET_RESOLVE) - 1) == 0) {
- previous = network_viewer_opt.service_resolution_enabled;
- uint32_t resolution;
- name = &keyword[sizeof(EBPF_FUNCTION_SOCKET_RESOLVE) - 1];
- resolution = (!strcasecmp(name, "YES")) ? CONFIG_BOOLEAN_YES : CONFIG_BOOLEAN_NO;
- if (previous != resolution) {
- rw_spinlock_write_lock(&network_viewer_opt.rw_spinlock);
- network_viewer_opt.service_resolution_enabled = resolution;
- rw_spinlock_write_unlock(&network_viewer_opt.rw_spinlock);
- ebpf_socket_clean_judy_array_unsafe();
- }
- } else if (strncmp(keyword, EBPF_FUNCTION_SOCKET_RANGE, sizeof(EBPF_FUNCTION_SOCKET_RANGE) - 1) == 0) {
- name = &keyword[sizeof(EBPF_FUNCTION_SOCKET_RANGE) - 1];
- rw_spinlock_write_lock(&network_viewer_opt.rw_spinlock);
- ebpf_clean_ip_structure(&network_viewer_opt.included_ips);
- ebpf_clean_ip_structure(&network_viewer_opt.excluded_ips);
- ebpf_parse_ips_unsafe((char *)name);
- rw_spinlock_write_unlock(&network_viewer_opt.rw_spinlock);
- ebpf_socket_clean_judy_array_unsafe();
- } else if (strncmp(keyword, EBPF_FUNCTION_SOCKET_PORT, sizeof(EBPF_FUNCTION_SOCKET_PORT) - 1) == 0) {
- name = &keyword[sizeof(EBPF_FUNCTION_SOCKET_PORT) - 1];
- rw_spinlock_write_lock(&network_viewer_opt.rw_spinlock);
- ebpf_clean_port_structure(&network_viewer_opt.included_port);
- ebpf_clean_port_structure(&network_viewer_opt.excluded_port);
- ebpf_parse_ports((char *)name);
- rw_spinlock_write_unlock(&network_viewer_opt.rw_spinlock);
- ebpf_socket_clean_judy_array_unsafe();
- } else if (strncmp(keyword, EBPF_FUNCTION_SOCKET_RESET, sizeof(EBPF_FUNCTION_SOCKET_RESET) - 1) == 0) {
- rw_spinlock_write_lock(&network_viewer_opt.rw_spinlock);
- ebpf_clean_port_structure(&network_viewer_opt.included_port);
- ebpf_clean_port_structure(&network_viewer_opt.excluded_port);
- ebpf_clean_ip_structure(&network_viewer_opt.included_ips);
- ebpf_clean_ip_structure(&network_viewer_opt.excluded_ips);
- ebpf_clean_ip_structure(&network_viewer_opt.ipv4_local_ip);
- ebpf_clean_ip_structure(&network_viewer_opt.ipv6_local_ip);
- parse_network_viewer_section(&socket_config);
- ebpf_read_local_addresses_unsafe();
- network_viewer_opt.enabled = CONFIG_BOOLEAN_YES;
- rw_spinlock_write_unlock(&network_viewer_opt.rw_spinlock);
- } else if (strncmp(keyword, EBPF_FUNCTION_SOCKET_INTERFACES, sizeof(EBPF_FUNCTION_SOCKET_INTERFACES) - 1) == 0) {
- rw_spinlock_write_lock(&network_viewer_opt.rw_spinlock);
- ebpf_read_local_addresses_unsafe();
- rw_spinlock_write_unlock(&network_viewer_opt.rw_spinlock);
- } else if (strncmp(keyword, "help", 4) == 0) {
- ebpf_function_help(transaction, socket_help);
- rw_spinlock_write_unlock(&ebpf_judy_pid.index.rw_spinlock);
- return;
- }
- }
- rw_spinlock_write_unlock(&ebpf_judy_pid.index.rw_spinlock);
- if (em->enabled > NETDATA_THREAD_EBPF_FUNCTION_RUNNING) {
- // Cleanup when we already had a thread running
- rw_spinlock_write_lock(&ebpf_judy_pid.index.rw_spinlock);
- ebpf_socket_clean_judy_array_unsafe();
- rw_spinlock_write_unlock(&ebpf_judy_pid.index.rw_spinlock);
- pthread_mutex_lock(&ebpf_exit_cleanup);
- if (ebpf_function_start_thread(em, period)) {
- ebpf_function_error(transaction,
- HTTP_RESP_INTERNAL_SERVER_ERROR,
- "Cannot start thread.");
- pthread_mutex_unlock(&ebpf_exit_cleanup);
- return;
- }
- } else {
- pthread_mutex_lock(&ebpf_exit_cleanup);
- if (period < 0)
- em->lifetime = (em->enabled != NETDATA_THREAD_EBPF_FUNCTION_RUNNING) ? EBPF_NON_FUNCTION_LIFE_TIME : EBPF_DEFAULT_LIFETIME;
- }
- pthread_mutex_unlock(&ebpf_exit_cleanup);
- BUFFER *wb = buffer_create(4096, NULL);
- buffer_json_initialize(wb, "\"", "\"", 0, true, BUFFER_JSON_OPTIONS_NEWLINE_ON_ARRAY_ITEMS);
- buffer_json_member_add_uint64(wb, "status", HTTP_RESP_OK);
- buffer_json_member_add_string(wb, "type", "table");
- buffer_json_member_add_time_t(wb, "update_every", em->update_every);
- buffer_json_member_add_string(wb, "help", EBPF_PLUGIN_SOCKET_FUNCTION_DESCRIPTION);
- // Collect data
- buffer_json_member_add_array(wb, "data");
- ebpf_socket_read_open_connections(wb, em);
- buffer_json_array_close(wb); // data
- buffer_json_member_add_object(wb, "columns");
- {
- int fields_id = 0;
- // IMPORTANT!
- // THE ORDER SHOULD BE THE SAME WITH THE VALUES!
- buffer_rrdf_table_add_field(wb, fields_id++, "PID", "Process ID", RRDF_FIELD_TYPE_INTEGER,
- RRDF_FIELD_VISUAL_VALUE, RRDF_FIELD_TRANSFORM_NUMBER, 0, NULL, NAN,
- RRDF_FIELD_SORT_ASCENDING, NULL, RRDF_FIELD_SUMMARY_COUNT,
- RRDF_FIELD_FILTER_MULTISELECT,
- RRDF_FIELD_OPTS_VISIBLE | RRDF_FIELD_OPTS_STICKY,
- NULL);
- buffer_rrdf_table_add_field(wb, fields_id++, "Name", "Process Name", RRDF_FIELD_TYPE_STRING,
- RRDF_FIELD_VISUAL_VALUE, RRDF_FIELD_TRANSFORM_NONE, 0, NULL, NAN,
- RRDF_FIELD_SORT_ASCENDING, NULL, RRDF_FIELD_SUMMARY_COUNT,
- RRDF_FIELD_FILTER_MULTISELECT,
- RRDF_FIELD_OPTS_VISIBLE | RRDF_FIELD_OPTS_UNIQUE_KEY | RRDF_FIELD_OPTS_STICKY | RRDF_FIELD_OPTS_FULL_WIDTH,
- NULL);
- buffer_rrdf_table_add_field(wb, fields_id++, "Origin", "Connection Origin", RRDF_FIELD_TYPE_STRING,
- RRDF_FIELD_VISUAL_VALUE, RRDF_FIELD_TRANSFORM_NONE, 0, NULL, NAN,
- RRDF_FIELD_SORT_ASCENDING, NULL, RRDF_FIELD_SUMMARY_COUNT,
- RRDF_FIELD_FILTER_MULTISELECT,
- RRDF_FIELD_OPTS_VISIBLE | RRDF_FIELD_OPTS_UNIQUE_KEY | RRDF_FIELD_OPTS_STICKY,
- NULL);
- buffer_rrdf_table_add_field(wb, fields_id++, "Src", "Source IP Address", RRDF_FIELD_TYPE_STRING,
- RRDF_FIELD_VISUAL_VALUE, RRDF_FIELD_TRANSFORM_NONE, 0, NULL, NAN,
- RRDF_FIELD_SORT_ASCENDING, NULL, RRDF_FIELD_SUMMARY_COUNT,
- RRDF_FIELD_FILTER_MULTISELECT,
- RRDF_FIELD_OPTS_VISIBLE | RRDF_FIELD_OPTS_UNIQUE_KEY | RRDF_FIELD_OPTS_STICKY,
- NULL);
- /*
- buffer_rrdf_table_add_field(wb, fields_id++, "SrcPort", "Source Port", RRDF_FIELD_TYPE_INTEGER,
- RRDF_FIELD_VISUAL_VALUE, RRDF_FIELD_TRANSFORM_NUMBER, 0, NULL, NAN,
- RRDF_FIELD_SORT_ASCENDING, NULL, RRDF_FIELD_SUMMARY_COUNT,
- RRDF_FIELD_FILTER_MULTISELECT,
- RRDF_FIELD_OPTS_VISIBLE | RRDF_FIELD_OPTS_STICKY,
- NULL);
- */
- buffer_rrdf_table_add_field(wb, fields_id++, "Dst", "Destination IP Address", RRDF_FIELD_TYPE_STRING,
- RRDF_FIELD_VISUAL_VALUE, RRDF_FIELD_TRANSFORM_NONE, 0, NULL, NAN,
- RRDF_FIELD_SORT_ASCENDING, NULL, RRDF_FIELD_SUMMARY_COUNT,
- RRDF_FIELD_FILTER_MULTISELECT,
- RRDF_FIELD_OPTS_VISIBLE | RRDF_FIELD_OPTS_UNIQUE_KEY | RRDF_FIELD_OPTS_STICKY,
- NULL);
- buffer_rrdf_table_add_field(wb, fields_id++, "DstPort", "Destination Port", RRDF_FIELD_TYPE_STRING,
- RRDF_FIELD_VISUAL_VALUE, RRDF_FIELD_TRANSFORM_NONE, 0, NULL, NAN,
- RRDF_FIELD_SORT_ASCENDING, NULL, RRDF_FIELD_SUMMARY_COUNT,
- RRDF_FIELD_FILTER_MULTISELECT,
- RRDF_FIELD_OPTS_VISIBLE | RRDF_FIELD_OPTS_UNIQUE_KEY | RRDF_FIELD_OPTS_STICKY,
- NULL);
- buffer_rrdf_table_add_field(wb, fields_id++, "Protocol", "Transport Layer Protocol", RRDF_FIELD_TYPE_STRING,
- RRDF_FIELD_VISUAL_VALUE, RRDF_FIELD_TRANSFORM_NONE, 0, NULL, NAN,
- RRDF_FIELD_SORT_ASCENDING, NULL, RRDF_FIELD_SUMMARY_COUNT,
- RRDF_FIELD_FILTER_MULTISELECT,
- RRDF_FIELD_OPTS_NONE | RRDF_FIELD_OPTS_UNIQUE_KEY | RRDF_FIELD_OPTS_STICKY,
- NULL);
- buffer_rrdf_table_add_field(wb, fields_id++, "Rcvd", "Traffic Received", RRDF_FIELD_TYPE_INTEGER,
- RRDF_FIELD_VISUAL_VALUE, RRDF_FIELD_TRANSFORM_NUMBER, 3, "MB", NAN,
- RRDF_FIELD_SORT_DESCENDING, NULL, RRDF_FIELD_SUMMARY_SUM,
- RRDF_FIELD_FILTER_NONE,
- RRDF_FIELD_OPTS_VISIBLE,
- NULL);
- buffer_rrdf_table_add_field(wb, fields_id++, "Sent", "Traffic Sent", RRDF_FIELD_TYPE_INTEGER,
- RRDF_FIELD_VISUAL_VALUE, RRDF_FIELD_TRANSFORM_NUMBER, 3, "MB", NAN,
- RRDF_FIELD_SORT_DESCENDING, NULL, RRDF_FIELD_SUMMARY_SUM,
- RRDF_FIELD_FILTER_NONE,
- RRDF_FIELD_OPTS_VISIBLE,
- NULL);
- buffer_rrdf_table_add_field(wb, fields_id, "Conns", "Connections", RRDF_FIELD_TYPE_INTEGER,
- RRDF_FIELD_VISUAL_VALUE, RRDF_FIELD_TRANSFORM_NUMBER, 0, "connections", NAN,
- RRDF_FIELD_SORT_DESCENDING, NULL, RRDF_FIELD_SUMMARY_SUM,
- RRDF_FIELD_FILTER_NONE,
- RRDF_FIELD_OPTS_VISIBLE,
- NULL);
- }
- buffer_json_object_close(wb); // columns
- buffer_json_member_add_string(wb, "default_sort_column", "Rcvd");
- buffer_json_member_add_object(wb, "charts");
- {
- buffer_json_member_add_object(wb, "Traffic");
- {
- buffer_json_member_add_string(wb, "name", "Traffic");
- buffer_json_member_add_string(wb, "type", "stacked-bar");
- buffer_json_member_add_array(wb, "columns");
- {
- buffer_json_add_array_item_string(wb, "Rcvd");
- buffer_json_add_array_item_string(wb, "Sent");
- }
- buffer_json_array_close(wb);
- }
- buffer_json_object_close(wb);
- buffer_json_member_add_object(wb, "Connections");
- {
- buffer_json_member_add_string(wb, "name", "Connections");
- buffer_json_member_add_string(wb, "type", "stacked-bar");
- buffer_json_member_add_array(wb, "columns");
- {
- buffer_json_add_array_item_string(wb, "Conns");
- }
- buffer_json_array_close(wb);
- }
- buffer_json_object_close(wb);
- }
- buffer_json_object_close(wb); // charts
- buffer_json_member_add_array(wb, "default_charts");
- {
- buffer_json_add_array_item_array(wb);
- buffer_json_add_array_item_string(wb, "Traffic");
- buffer_json_add_array_item_string(wb, "Name");
- buffer_json_array_close(wb);
- buffer_json_add_array_item_array(wb);
- buffer_json_add_array_item_string(wb, "Connections");
- buffer_json_add_array_item_string(wb, "Name");
- buffer_json_array_close(wb);
- }
- buffer_json_array_close(wb);
- buffer_json_member_add_object(wb, "group_by");
- {
- buffer_json_member_add_object(wb, "Name");
- {
- buffer_json_member_add_string(wb, "name", "Process Name");
- buffer_json_member_add_array(wb, "columns");
- {
- buffer_json_add_array_item_string(wb, "Name");
- }
- buffer_json_array_close(wb);
- }
- buffer_json_object_close(wb);
- buffer_json_member_add_object(wb, "Origin");
- {
- buffer_json_member_add_string(wb, "name", "Origin");
- buffer_json_member_add_array(wb, "columns");
- {
- buffer_json_add_array_item_string(wb, "Origin");
- }
- buffer_json_array_close(wb);
- }
- buffer_json_object_close(wb);
- buffer_json_member_add_object(wb, "Src");
- {
- buffer_json_member_add_string(wb, "name", "Source IP");
- buffer_json_member_add_array(wb, "columns");
- {
- buffer_json_add_array_item_string(wb, "Src");
- }
- buffer_json_array_close(wb);
- }
- buffer_json_object_close(wb);
- buffer_json_member_add_object(wb, "Dst");
- {
- buffer_json_member_add_string(wb, "name", "Destination IP");
- buffer_json_member_add_array(wb, "columns");
- {
- buffer_json_add_array_item_string(wb, "Dst");
- }
- buffer_json_array_close(wb);
- }
- buffer_json_object_close(wb);
- buffer_json_member_add_object(wb, "DstPort");
- {
- buffer_json_member_add_string(wb, "name", "Destination Port");
- buffer_json_member_add_array(wb, "columns");
- {
- buffer_json_add_array_item_string(wb, "DstPort");
- }
- buffer_json_array_close(wb);
- }
- buffer_json_object_close(wb);
- buffer_json_member_add_object(wb, "Protocol");
- {
- buffer_json_member_add_string(wb, "name", "Protocol");
- buffer_json_member_add_array(wb, "columns");
- {
- buffer_json_add_array_item_string(wb, "Protocol");
- }
- buffer_json_array_close(wb);
- }
- buffer_json_object_close(wb);
- }
- buffer_json_object_close(wb); // group_by
- time_t expires = now_realtime_sec() + em->update_every;
- buffer_json_member_add_time_t(wb, "expires", expires);
- buffer_json_finalize(wb);
- // Lock necessary to avoid race condition
- pluginsd_function_result_begin_to_stdout(transaction, HTTP_RESP_OK, "application/json", expires);
- fwrite(buffer_tostring(wb), buffer_strlen(wb), 1, stdout);
- pluginsd_function_result_end_to_stdout();
- fflush(stdout);
- buffer_free(wb);
- }
- /*****************************************************************
- * EBPF FUNCTION THREAD
- *****************************************************************/
- /**
- * FUNCTION thread.
- *
- * @param ptr a `ebpf_module_t *`.
- *
- * @return always NULL.
- */
- void *ebpf_function_thread(void *ptr)
- {
- (void)ptr;
- struct functions_evloop_globals *wg = functions_evloop_init(1,
- "EBPF",
- &lock,
- &ebpf_plugin_exit);
- functions_evloop_add_function(
- wg, EBPF_FUNCTION_SOCKET, ebpf_function_socket_manipulation, PLUGINS_FUNCTIONS_TIMEOUT_DEFAULT, NULL);
- pthread_mutex_lock(&lock);
- int i;
- for (i = 0; i < EBPF_MODULE_FUNCTION_IDX; i++) {
- ebpf_module_t *em = &ebpf_modules[i];
- if (!em->functions.fnct_routine)
- continue;
- EBPF_PLUGIN_FUNCTIONS(em->functions.fcnt_name, em->functions.fcnt_desc, em->update_every);
- }
- pthread_mutex_unlock(&lock);
- heartbeat_t hb;
- heartbeat_init(&hb);
- while(!ebpf_plugin_exit) {
- (void)heartbeat_next(&hb, USEC_PER_SEC);
- if (ebpf_plugin_exit) {
- break;
- }
- }
- return NULL;
- }
|