sqlite_aclk_alert.c 42 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145
  1. // SPDX-License-Identifier: GPL-3.0-or-later
  2. #include "sqlite_functions.h"
  3. #include "sqlite_aclk_alert.h"
  4. #ifdef ENABLE_ACLK
  5. #include "../../aclk/aclk_alarm_api.h"
  6. #endif
  7. #define SQL_GET_ALERT_REMOVE_TIME "SELECT when_key FROM health_log_%s WHERE alarm_id = %u " \
  8. "AND unique_id > %u AND unique_id < %u " \
  9. "AND new_status = -2;"
  10. time_t removed_when(uint32_t alarm_id, uint32_t before_unique_id, uint32_t after_unique_id, char *uuid_str) {
  11. sqlite3_stmt *res = NULL;
  12. time_t when = 0;
  13. char sql[ACLK_SYNC_QUERY_SIZE];
  14. snprintfz(sql,ACLK_SYNC_QUERY_SIZE-1, SQL_GET_ALERT_REMOVE_TIME, uuid_str, alarm_id, after_unique_id, before_unique_id);
  15. int rc = sqlite3_prepare_v2(db_meta, sql, -1, &res, 0);
  16. if (rc != SQLITE_OK) {
  17. error_report("Failed to prepare statement when trying to find removed gap.");
  18. return 0;
  19. }
  20. rc = sqlite3_step_monitored(res);
  21. if (likely(rc == SQLITE_ROW)) {
  22. when = (time_t) sqlite3_column_int64(res, 0);
  23. }
  24. rc = sqlite3_finalize(res);
  25. if (unlikely(rc != SQLITE_OK))
  26. error_report("Failed to finalize statement when trying to find removed gap, rc = %d", rc);
  27. return when;
  28. }
  29. #define SQL_UPDATE_FILTERED_ALERT "UPDATE aclk_alert_%s SET filtered_alert_unique_id = %u where filtered_alert_unique_id = %u"
  30. void update_filtered(ALARM_ENTRY *ae, uint32_t unique_id, char *uuid_str) {
  31. char sql[ACLK_SYNC_QUERY_SIZE];
  32. snprintfz(sql, ACLK_SYNC_QUERY_SIZE-1, SQL_UPDATE_FILTERED_ALERT, uuid_str, ae->unique_id, unique_id);
  33. sqlite3_exec_monitored(db_meta, sql, 0, 0, NULL);
  34. ae->flags |= HEALTH_ENTRY_FLAG_ACLK_QUEUED;
  35. }
  36. #define SQL_SELECT_ALERT_BY_UNIQUE_ID "SELECT hl.unique_id FROM health_log_%s hl, alert_hash ah WHERE hl.unique_id = %u " \
  37. "AND hl.config_hash_id = ah.hash_id " \
  38. "AND ah.warn IS NULL AND ah.crit IS NULL;"
  39. static inline bool is_event_from_alert_variable_config(uint32_t unique_id, char *uuid_str) {
  40. sqlite3_stmt *res = NULL;
  41. int rc = 0;
  42. bool ret = false;
  43. char sql[ACLK_SYNC_QUERY_SIZE];
  44. snprintfz(sql,ACLK_SYNC_QUERY_SIZE-1, SQL_SELECT_ALERT_BY_UNIQUE_ID, uuid_str, unique_id);
  45. rc = sqlite3_prepare_v2(db_meta, sql, -1, &res, 0);
  46. if (rc != SQLITE_OK) {
  47. error_report("Failed to prepare statement when trying to check for alert variables.");
  48. return false;
  49. }
  50. rc = sqlite3_step_monitored(res);
  51. if (likely(rc == SQLITE_ROW)) {
  52. ret = true;
  53. }
  54. rc = sqlite3_finalize(res);
  55. if (unlikely(rc != SQLITE_OK))
  56. error_report("Failed to finalize statement when trying to check for alert variables, rc = %d", rc);
  57. return ret;
  58. }
  59. #define MAX_REMOVED_PERIOD 604800 //a week
  60. //decide if some events should be sent or not
  61. #define SQL_SELECT_ALERT_BY_ID "SELECT hl.new_status, hl.config_hash_id, hl.unique_id FROM health_log_%s hl, aclk_alert_%s aa " \
  62. "WHERE hl.unique_id = aa.filtered_alert_unique_id " \
  63. "AND hl.alarm_id = %u " \
  64. "ORDER BY alarm_event_id DESC LIMIT 1;"
  65. int should_send_to_cloud(RRDHOST *host, ALARM_ENTRY *ae)
  66. {
  67. sqlite3_stmt *res = NULL;
  68. char uuid_str[UUID_STR_LEN];
  69. uuid_unparse_lower_fix(&host->host_uuid, uuid_str);
  70. int send = 1;
  71. if (ae->new_status == RRDCALC_STATUS_REMOVED || ae->new_status == RRDCALC_STATUS_UNINITIALIZED) {
  72. return 0;
  73. }
  74. if (unlikely(uuid_is_null(ae->config_hash_id)))
  75. return 0;
  76. char sql[ACLK_SYNC_QUERY_SIZE];
  77. uuid_t config_hash_id;
  78. RRDCALC_STATUS status;
  79. uint32_t unique_id;
  80. //get the previous sent event of this alarm_id
  81. //base the search on the last filtered event
  82. snprintfz(sql,ACLK_SYNC_QUERY_SIZE-1, SQL_SELECT_ALERT_BY_ID, uuid_str, uuid_str, ae->alarm_id);
  83. int rc = sqlite3_prepare_v2(db_meta, sql, -1, &res, 0);
  84. if (rc != SQLITE_OK) {
  85. error_report("Failed to prepare statement when trying to filter alert events.");
  86. send = 1;
  87. return send;
  88. }
  89. rc = sqlite3_step_monitored(res);
  90. if (likely(rc == SQLITE_ROW)) {
  91. status = (RRDCALC_STATUS) sqlite3_column_int(res, 0);
  92. if (sqlite3_column_type(res, 1) != SQLITE_NULL)
  93. uuid_copy(config_hash_id, *((uuid_t *) sqlite3_column_blob(res, 1)));
  94. unique_id = (uint32_t) sqlite3_column_int64(res, 2);
  95. } else {
  96. send = 1;
  97. goto done;
  98. }
  99. if (ae->new_status != (RRDCALC_STATUS)status) {
  100. send = 1;
  101. goto done;
  102. }
  103. if (uuid_memcmp(&ae->config_hash_id, &config_hash_id)) {
  104. send = 1;
  105. goto done;
  106. }
  107. //same status, same config
  108. if (ae->new_status == RRDCALC_STATUS_CLEAR || ae->new_status == RRDCALC_STATUS_UNDEFINED) {
  109. send = 0;
  110. update_filtered(ae, unique_id, uuid_str);
  111. goto done;
  112. }
  113. //detect a long off period of the agent, TODO make global
  114. if (ae->new_status == RRDCALC_STATUS_WARNING || ae->new_status == RRDCALC_STATUS_CRITICAL) {
  115. time_t when = removed_when(ae->alarm_id, ae->unique_id, unique_id, uuid_str);
  116. if (when && (when + (time_t)MAX_REMOVED_PERIOD) < ae->when) {
  117. send = 1;
  118. goto done;
  119. } else {
  120. send = 0;
  121. update_filtered(ae, unique_id, uuid_str);
  122. goto done;
  123. }
  124. }
  125. done:
  126. rc = sqlite3_finalize(res);
  127. if (unlikely(rc != SQLITE_OK))
  128. error_report("Failed to finalize statement when trying to filter alert events, rc = %d", rc);
  129. return send;
  130. }
  131. // will replace call to aclk_update_alarm in health/health_log.c
  132. // and handle both cases
  133. #define SQL_QUEUE_ALERT_TO_CLOUD "INSERT INTO aclk_alert_%s (alert_unique_id, date_created, filtered_alert_unique_id) " \
  134. "VALUES (@alert_unique_id, unixepoch(), @alert_unique_id) ON CONFLICT (alert_unique_id) do nothing;"
  135. int sql_queue_alarm_to_aclk(RRDHOST *host, ALARM_ENTRY *ae, int skip_filter)
  136. {
  137. if(!service_running(SERVICE_ACLK))
  138. return 0;
  139. if (!claimed())
  140. return 0;
  141. if (ae->flags & HEALTH_ENTRY_FLAG_ACLK_QUEUED) {
  142. return 0;
  143. }
  144. CHECK_SQLITE_CONNECTION(db_meta);
  145. if (!skip_filter) {
  146. if (!should_send_to_cloud(host, ae)) {
  147. return 0;
  148. }
  149. }
  150. char uuid_str[UUID_STR_LEN];
  151. uuid_unparse_lower_fix(&host->host_uuid, uuid_str);
  152. if (is_event_from_alert_variable_config(ae->unique_id, uuid_str))
  153. return 0;
  154. sqlite3_stmt *res_alert = NULL;
  155. char sql[ACLK_SYNC_QUERY_SIZE];
  156. snprintfz(sql, ACLK_SYNC_QUERY_SIZE - 1, SQL_QUEUE_ALERT_TO_CLOUD, uuid_str);
  157. int rc = sqlite3_prepare_v2(db_meta, sql, -1, &res_alert, 0);
  158. if (unlikely(rc != SQLITE_OK)) {
  159. error_report("Failed to prepare statement to store alert event");
  160. return 1;
  161. }
  162. rc = sqlite3_bind_int(res_alert, 1, (int) ae->unique_id);
  163. if (unlikely(rc != SQLITE_OK))
  164. goto bind_fail;
  165. rc = execute_insert(res_alert);
  166. if (unlikely(rc != SQLITE_DONE)) {
  167. error_report("Failed to store alert event %u, rc = %d", ae->unique_id, rc);
  168. goto bind_fail;
  169. }
  170. ae->flags |= HEALTH_ENTRY_FLAG_ACLK_QUEUED;
  171. rrdhost_flag_set(host, RRDHOST_FLAG_ACLK_STREAM_ALERTS);
  172. bind_fail:
  173. if (unlikely(sqlite3_finalize(res_alert) != SQLITE_OK))
  174. error_report("Failed to reset statement in store alert event, rc = %d", rc);
  175. return 0;
  176. }
  177. int rrdcalc_status_to_proto_enum(RRDCALC_STATUS status)
  178. {
  179. #ifdef ENABLE_ACLK
  180. switch(status) {
  181. case RRDCALC_STATUS_REMOVED:
  182. return ALARM_STATUS_REMOVED;
  183. case RRDCALC_STATUS_UNDEFINED:
  184. return ALARM_STATUS_NOT_A_NUMBER;
  185. case RRDCALC_STATUS_CLEAR:
  186. return ALARM_STATUS_CLEAR;
  187. case RRDCALC_STATUS_WARNING:
  188. return ALARM_STATUS_WARNING;
  189. case RRDCALC_STATUS_CRITICAL:
  190. return ALARM_STATUS_CRITICAL;
  191. default:
  192. return ALARM_STATUS_UNKNOWN;
  193. }
  194. #else
  195. UNUSED(status);
  196. return 1;
  197. #endif
  198. }
  199. static inline char *sqlite3_uuid_unparse_strdupz(sqlite3_stmt *res, int iCol) {
  200. char uuid_str[UUID_STR_LEN];
  201. if(sqlite3_column_type(res, iCol) == SQLITE_NULL)
  202. uuid_str[0] = '\0';
  203. else
  204. uuid_unparse_lower(*((uuid_t *) sqlite3_column_blob(res, iCol)), uuid_str);
  205. return strdupz(uuid_str);
  206. }
  207. static inline char *sqlite3_text_strdupz_empty(sqlite3_stmt *res, int iCol) {
  208. char *ret;
  209. if(sqlite3_column_type(res, iCol) == SQLITE_NULL)
  210. ret = "";
  211. else
  212. ret = (char *)sqlite3_column_text(res, iCol);
  213. return strdupz(ret);
  214. }
  215. void aclk_push_alert_event(struct aclk_sync_host_config *wc)
  216. {
  217. #ifndef ENABLE_ACLK
  218. UNUSED(wc);
  219. #else
  220. int rc;
  221. if (unlikely(!wc->alert_updates)) {
  222. log_access("ACLK STA [%s (%s)]: Ignoring alert push event, updates have been turned off for this node.", wc->node_id, wc->host ? rrdhost_hostname(wc->host) : "N/A");
  223. return;
  224. }
  225. char *claim_id = get_agent_claimid();
  226. if (unlikely(!claim_id))
  227. return;
  228. if (unlikely(!wc->host)) {
  229. freez(claim_id);
  230. return;
  231. }
  232. BUFFER *sql = buffer_create(1024, &netdata_buffers_statistics.buffers_sqlite);
  233. int limit = ACLK_MAX_ALERT_UPDATES;
  234. sqlite3_stmt *res = NULL;
  235. buffer_sprintf(sql, "select aa.sequence_id, hl.unique_id, hl.alarm_id, hl.config_hash_id, hl.updated_by_id, hl.when_key, " \
  236. " hl.duration, hl.non_clear_duration, hl.flags, hl.exec_run_timestamp, hl.delay_up_to_timestamp, hl.name, " \
  237. " hl.chart, hl.family, hl.exec, hl.recipient, hl.source, hl.units, hl.info, hl.exec_code, hl.new_status, " \
  238. " hl.old_status, hl.delay, hl.new_value, hl.old_value, hl.last_repeat, hl.chart_context, hl.transition_id, hl.alarm_event_id " \
  239. " from health_log_%s hl, aclk_alert_%s aa " \
  240. " where hl.unique_id = aa.alert_unique_id and aa.date_submitted is null " \
  241. " order by aa.sequence_id asc limit %d;", wc->uuid_str, wc->uuid_str, limit);
  242. rc = sqlite3_prepare_v2(db_meta, buffer_tostring(sql), -1, &res, 0);
  243. if (rc != SQLITE_OK) {
  244. // Try to create tables
  245. if (wc->host)
  246. sql_create_health_log_table(wc->host);
  247. BUFFER *sql_fix = buffer_create(1024, &netdata_buffers_statistics.buffers_sqlite);
  248. buffer_sprintf(sql_fix, TABLE_ACLK_ALERT, wc->uuid_str);
  249. rc = db_execute(db_meta, buffer_tostring(sql_fix));
  250. if (unlikely(rc))
  251. error_report("Failed to create ACLK alert table for host %s", rrdhost_hostname(wc->host));
  252. else {
  253. buffer_flush(sql_fix);
  254. buffer_sprintf(sql_fix, INDEX_ACLK_ALERT, wc->uuid_str, wc->uuid_str);
  255. if (unlikely(db_execute(db_meta, buffer_tostring(sql_fix))))
  256. error_report("Failed to create ACLK alert table for host %s", rrdhost_hostname(wc->host));
  257. }
  258. buffer_free(sql_fix);
  259. // Try again
  260. rc = sqlite3_prepare_v2(db_meta, buffer_tostring(sql), -1, &res, 0);
  261. if (rc != SQLITE_OK) {
  262. error_report("Failed to prepare statement when trying to send an alert update via ACLK");
  263. buffer_free(sql);
  264. freez(claim_id);
  265. return;
  266. }
  267. }
  268. uint64_t first_sequence_id = 0;
  269. uint64_t last_sequence_id = 0;
  270. static __thread uint64_t log_first_sequence_id = 0;
  271. static __thread uint64_t log_last_sequence_id = 0;
  272. while (sqlite3_step_monitored(res) == SQLITE_ROW) {
  273. struct alarm_log_entry alarm_log;
  274. char old_value_string[100 + 1];
  275. char new_value_string[100 + 1];
  276. alarm_log.node_id = wc->node_id;
  277. alarm_log.claim_id = claim_id;
  278. alarm_log.chart = strdupz((char *)sqlite3_column_text(res, 12));
  279. alarm_log.name = strdupz((char *)sqlite3_column_text(res, 11));
  280. alarm_log.family = sqlite3_column_bytes(res, 13) > 0 ? strdupz((char *)sqlite3_column_text(res, 13)) : NULL;
  281. //alarm_log.batch_id = wc->alerts_batch_id;
  282. //alarm_log.sequence_id = (uint64_t) sqlite3_column_int64(res, 0);
  283. alarm_log.when = (time_t) sqlite3_column_int64(res, 5);
  284. alarm_log.config_hash = sqlite3_uuid_unparse_strdupz(res, 3);
  285. alarm_log.utc_offset = wc->host->utc_offset;
  286. alarm_log.timezone = strdupz(rrdhost_abbrev_timezone(wc->host));
  287. alarm_log.exec_path = sqlite3_column_bytes(res, 14) > 0 ? strdupz((char *)sqlite3_column_text(res, 14)) :
  288. strdupz((char *)string2str(wc->host->health.health_default_exec));
  289. alarm_log.conf_source = strdupz((char *)sqlite3_column_text(res, 16));
  290. char *edit_command = sqlite3_column_bytes(res, 16) > 0 ?
  291. health_edit_command_from_source((char *)sqlite3_column_text(res, 16)) :
  292. strdupz("UNKNOWN=0=UNKNOWN");
  293. alarm_log.command = strdupz(edit_command);
  294. alarm_log.duration = (time_t) sqlite3_column_int64(res, 6);
  295. alarm_log.non_clear_duration = (time_t) sqlite3_column_int64(res, 7);
  296. alarm_log.status = rrdcalc_status_to_proto_enum((RRDCALC_STATUS) sqlite3_column_int(res, 20));
  297. alarm_log.old_status = rrdcalc_status_to_proto_enum((RRDCALC_STATUS) sqlite3_column_int(res, 21));
  298. alarm_log.delay = (int) sqlite3_column_int(res, 22);
  299. alarm_log.delay_up_to_timestamp = (time_t) sqlite3_column_int64(res, 10);
  300. alarm_log.last_repeat = (time_t) sqlite3_column_int64(res, 25);
  301. alarm_log.silenced = ((sqlite3_column_int64(res, 8) & HEALTH_ENTRY_FLAG_SILENCED) ||
  302. (sqlite3_column_type(res, 15) != SQLITE_NULL &&
  303. !strncmp((char *)sqlite3_column_text(res, 15), "silent", 6))) ?
  304. 1 :
  305. 0;
  306. alarm_log.value_string =
  307. sqlite3_column_type(res, 23) == SQLITE_NULL ?
  308. strdupz((char *)"-") :
  309. strdupz((char *)format_value_and_unit(
  310. new_value_string, 100, sqlite3_column_double(res, 23), (char *)sqlite3_column_text(res, 17), -1));
  311. alarm_log.old_value_string =
  312. sqlite3_column_type(res, 24) == SQLITE_NULL ?
  313. strdupz((char *)"-") :
  314. strdupz((char *)format_value_and_unit(
  315. old_value_string, 100, sqlite3_column_double(res, 24), (char *)sqlite3_column_text(res, 17), -1));
  316. alarm_log.value = (NETDATA_DOUBLE) sqlite3_column_double(res, 23);
  317. alarm_log.old_value = (NETDATA_DOUBLE) sqlite3_column_double(res, 24);
  318. alarm_log.updated = (sqlite3_column_int64(res, 8) & HEALTH_ENTRY_FLAG_UPDATED) ? 1 : 0;
  319. alarm_log.rendered_info = sqlite3_text_strdupz_empty(res, 18);
  320. alarm_log.chart_context = sqlite3_text_strdupz_empty(res, 26);
  321. alarm_log.transition_id = sqlite3_uuid_unparse_strdupz(res, 27);
  322. alarm_log.event_id = (time_t) sqlite3_column_int64(res, 28);
  323. aclk_send_alarm_log_entry(&alarm_log);
  324. if (first_sequence_id == 0)
  325. first_sequence_id = (uint64_t) sqlite3_column_int64(res, 0);
  326. if (log_first_sequence_id == 0)
  327. log_first_sequence_id = (uint64_t) sqlite3_column_int64(res, 0);
  328. last_sequence_id = (uint64_t) sqlite3_column_int64(res, 0);
  329. log_last_sequence_id = (uint64_t) sqlite3_column_int64(res, 0);
  330. destroy_alarm_log_entry(&alarm_log);
  331. freez(edit_command);
  332. }
  333. if (first_sequence_id) {
  334. buffer_flush(sql);
  335. buffer_sprintf(sql, "UPDATE aclk_alert_%s SET date_submitted=unixepoch() "
  336. "WHERE date_submitted IS NULL AND sequence_id BETWEEN %" PRIu64 " AND %" PRIu64 ";",
  337. wc->uuid_str, first_sequence_id, last_sequence_id);
  338. if (unlikely(db_execute(db_meta, buffer_tostring(sql))))
  339. error_report("Failed to mark ACLK alert entries as submitted for host %s", rrdhost_hostname(wc->host));
  340. // Mark to do one more check
  341. rrdhost_flag_set(wc->host, RRDHOST_FLAG_ACLK_STREAM_ALERTS);
  342. } else {
  343. if (log_first_sequence_id)
  344. log_access(
  345. "ACLK RES [%s (%s)]: ALERTS SENT from %" PRIu64 " to %" PRIu64 "",
  346. wc->node_id,
  347. wc->host ? rrdhost_hostname(wc->host) : "N/A",
  348. log_first_sequence_id,
  349. log_last_sequence_id);
  350. log_first_sequence_id = 0;
  351. log_last_sequence_id = 0;
  352. }
  353. rc = sqlite3_finalize(res);
  354. if (unlikely(rc != SQLITE_OK))
  355. error_report("Failed to finalize statement to send alert entries from the database, rc = %d", rc);
  356. freez(claim_id);
  357. buffer_free(sql);
  358. #endif
  359. }
  360. void aclk_push_alert_events_for_all_hosts(void)
  361. {
  362. RRDHOST *host;
  363. dfe_start_reentrant(rrdhost_root_index, host) {
  364. if (rrdhost_flag_check(host, RRDHOST_FLAG_ARCHIVED) || !rrdhost_flag_check(host, RRDHOST_FLAG_ACLK_STREAM_ALERTS))
  365. continue;
  366. internal_error(true, "ACLK SYNC: Scanning host %s", rrdhost_hostname(host));
  367. rrdhost_flag_clear(host, RRDHOST_FLAG_ACLK_STREAM_ALERTS);
  368. struct aclk_sync_host_config *wc = host->aclk_sync_host_config;
  369. if (likely(wc))
  370. aclk_push_alert_event(wc);
  371. }
  372. dfe_done(host);
  373. }
  374. void sql_queue_existing_alerts_to_aclk(RRDHOST *host)
  375. {
  376. char uuid_str[UUID_STR_LEN];
  377. uuid_unparse_lower_fix(&host->host_uuid, uuid_str);
  378. BUFFER *sql = buffer_create(1024, &netdata_buffers_statistics.buffers_sqlite);
  379. buffer_sprintf(sql,"delete from aclk_alert_%s; " \
  380. "insert into aclk_alert_%s (alert_unique_id, date_created, filtered_alert_unique_id) " \
  381. "select unique_id alert_unique_id, unixepoch(), unique_id alert_unique_id from health_log_%s " \
  382. "where new_status <> 0 and new_status <> -2 and config_hash_id is not null and updated_by_id = 0 " \
  383. "order by unique_id asc on conflict (alert_unique_id) do nothing;", uuid_str, uuid_str, uuid_str);
  384. netdata_rwlock_rdlock(&host->health_log.alarm_log_rwlock);
  385. if (unlikely(db_execute(db_meta, buffer_tostring(sql))))
  386. error_report("Failed to queue existing ACLK alert events for host %s", rrdhost_hostname(host));
  387. netdata_rwlock_unlock(&host->health_log.alarm_log_rwlock);
  388. buffer_free(sql);
  389. rrdhost_flag_set(host, RRDHOST_FLAG_ACLK_STREAM_ALERTS);
  390. }
  391. void aclk_send_alarm_configuration(char *config_hash)
  392. {
  393. if (unlikely(!config_hash))
  394. return;
  395. struct aclk_sync_host_config *wc = (struct aclk_sync_host_config *) localhost->aclk_sync_host_config;
  396. if (unlikely(!wc))
  397. return;
  398. log_access("ACLK REQ [%s (%s)]: Request to send alert config %s.", wc->node_id, wc->host ? rrdhost_hostname(wc->host) : "N/A", config_hash);
  399. aclk_push_alert_config(wc->node_id, config_hash);
  400. }
  401. #define SQL_SELECT_ALERT_CONFIG "SELECT alarm, template, on_key, class, type, component, os, hosts, plugin," \
  402. "module, charts, families, lookup, every, units, green, red, calc, warn, crit, to_key, exec, delay, repeat, info," \
  403. "options, host_labels, p_db_lookup_dimensions, p_db_lookup_method, p_db_lookup_options, p_db_lookup_after," \
  404. "p_db_lookup_before, p_update_every FROM alert_hash WHERE hash_id = @hash_id;"
  405. int aclk_push_alert_config_event(char *node_id __maybe_unused, char *config_hash __maybe_unused)
  406. {
  407. int rc = 0;
  408. #ifdef ENABLE_ACLK
  409. CHECK_SQLITE_CONNECTION(db_meta);
  410. sqlite3_stmt *res = NULL;
  411. struct aclk_sync_host_config *wc = NULL;
  412. RRDHOST *host = find_host_by_node_id(node_id);
  413. if (unlikely(!host)) {
  414. freez(config_hash);
  415. freez(node_id);
  416. return 1;
  417. }
  418. wc = (struct aclk_sync_host_config *)host->aclk_sync_host_config;
  419. if (unlikely(!wc)) {
  420. freez(config_hash);
  421. freez(node_id);
  422. return 1;
  423. }
  424. rc = sqlite3_prepare_v2(db_meta, SQL_SELECT_ALERT_CONFIG, -1, &res, 0);
  425. if (rc != SQLITE_OK) {
  426. error_report("Failed to prepare statement when trying to fetch an alarm hash configuration");
  427. return 1;
  428. }
  429. uuid_t hash_uuid;
  430. if (uuid_parse(config_hash, hash_uuid))
  431. return 1;
  432. rc = sqlite3_bind_blob(res, 1, &hash_uuid , sizeof(hash_uuid), SQLITE_STATIC);
  433. if (unlikely(rc != SQLITE_OK))
  434. goto bind_fail;
  435. struct aclk_alarm_configuration alarm_config;
  436. struct provide_alarm_configuration p_alarm_config;
  437. p_alarm_config.cfg_hash = NULL;
  438. if (sqlite3_step_monitored(res) == SQLITE_ROW) {
  439. alarm_config.alarm = sqlite3_column_bytes(res, 0) > 0 ? strdupz((char *)sqlite3_column_text(res, 0)) : NULL;
  440. alarm_config.tmpl = sqlite3_column_bytes(res, 1) > 0 ? strdupz((char *)sqlite3_column_text(res, 1)) : NULL;
  441. alarm_config.on_chart = sqlite3_column_bytes(res, 2) > 0 ? strdupz((char *)sqlite3_column_text(res, 2)) : NULL;
  442. alarm_config.classification = sqlite3_column_bytes(res, 3) > 0 ? strdupz((char *)sqlite3_column_text(res, 3)) : NULL;
  443. alarm_config.type = sqlite3_column_bytes(res, 4) > 0 ? strdupz((char *)sqlite3_column_text(res, 4)) : NULL;
  444. alarm_config.component = sqlite3_column_bytes(res, 5) > 0 ? strdupz((char *)sqlite3_column_text(res, 5)) : NULL;
  445. alarm_config.os = sqlite3_column_bytes(res, 6) > 0 ? strdupz((char *)sqlite3_column_text(res, 6)) : NULL;
  446. alarm_config.hosts = sqlite3_column_bytes(res, 7) > 0 ? strdupz((char *)sqlite3_column_text(res, 7)) : NULL;
  447. alarm_config.plugin = sqlite3_column_bytes(res, 8) > 0 ? strdupz((char *)sqlite3_column_text(res, 8)) : NULL;
  448. alarm_config.module = sqlite3_column_bytes(res, 9) > 0 ? strdupz((char *)sqlite3_column_text(res, 9)) : NULL;
  449. alarm_config.charts = sqlite3_column_bytes(res, 10) > 0 ? strdupz((char *)sqlite3_column_text(res, 10)) : NULL;
  450. alarm_config.families = sqlite3_column_bytes(res, 11) > 0 ? strdupz((char *)sqlite3_column_text(res, 11)) : NULL;
  451. alarm_config.lookup = sqlite3_column_bytes(res, 12) > 0 ? strdupz((char *)sqlite3_column_text(res, 12)) : NULL;
  452. alarm_config.every = sqlite3_column_bytes(res, 13) > 0 ? strdupz((char *)sqlite3_column_text(res, 13)) : NULL;
  453. alarm_config.units = sqlite3_column_bytes(res, 14) > 0 ? strdupz((char *)sqlite3_column_text(res, 14)) : NULL;
  454. alarm_config.green = sqlite3_column_bytes(res, 15) > 0 ? strdupz((char *)sqlite3_column_text(res, 15)) : NULL;
  455. alarm_config.red = sqlite3_column_bytes(res, 16) > 0 ? strdupz((char *)sqlite3_column_text(res, 16)) : NULL;
  456. alarm_config.calculation_expr = sqlite3_column_bytes(res, 17) > 0 ? strdupz((char *)sqlite3_column_text(res, 17)) : NULL;
  457. alarm_config.warning_expr = sqlite3_column_bytes(res, 18) > 0 ? strdupz((char *)sqlite3_column_text(res, 18)) : NULL;
  458. alarm_config.critical_expr = sqlite3_column_bytes(res, 19) > 0 ? strdupz((char *)sqlite3_column_text(res, 19)) : NULL;
  459. alarm_config.recipient = sqlite3_column_bytes(res, 20) > 0 ? strdupz((char *)sqlite3_column_text(res, 20)) : NULL;
  460. alarm_config.exec = sqlite3_column_bytes(res, 21) > 0 ? strdupz((char *)sqlite3_column_text(res, 21)) : NULL;
  461. alarm_config.delay = sqlite3_column_bytes(res, 22) > 0 ? strdupz((char *)sqlite3_column_text(res, 22)) : NULL;
  462. alarm_config.repeat = sqlite3_column_bytes(res, 23) > 0 ? strdupz((char *)sqlite3_column_text(res, 23)) : NULL;
  463. alarm_config.info = sqlite3_column_bytes(res, 24) > 0 ? strdupz((char *)sqlite3_column_text(res, 24)) : NULL;
  464. alarm_config.options = sqlite3_column_bytes(res, 25) > 0 ? strdupz((char *)sqlite3_column_text(res, 25)) : NULL;
  465. alarm_config.host_labels = sqlite3_column_bytes(res, 26) > 0 ? strdupz((char *)sqlite3_column_text(res, 26)) : NULL;
  466. alarm_config.p_db_lookup_dimensions = NULL;
  467. alarm_config.p_db_lookup_method = NULL;
  468. alarm_config.p_db_lookup_options = NULL;
  469. alarm_config.p_db_lookup_after = 0;
  470. alarm_config.p_db_lookup_before = 0;
  471. if (sqlite3_column_bytes(res, 30) > 0) {
  472. alarm_config.p_db_lookup_dimensions = sqlite3_column_bytes(res, 27) > 0 ? strdupz((char *)sqlite3_column_text(res, 27)) : NULL;
  473. alarm_config.p_db_lookup_method = sqlite3_column_bytes(res, 28) > 0 ? strdupz((char *)sqlite3_column_text(res, 28)) : NULL;
  474. BUFFER *tmp_buf = buffer_create(1024, &netdata_buffers_statistics.buffers_sqlite);
  475. buffer_data_options2string(tmp_buf, sqlite3_column_int(res, 29));
  476. alarm_config.p_db_lookup_options = strdupz((char *)buffer_tostring(tmp_buf));
  477. buffer_free(tmp_buf);
  478. alarm_config.p_db_lookup_after = sqlite3_column_int(res, 30);
  479. alarm_config.p_db_lookup_before = sqlite3_column_int(res, 31);
  480. }
  481. alarm_config.p_update_every = sqlite3_column_int(res, 32);
  482. p_alarm_config.cfg_hash = strdupz((char *) config_hash);
  483. p_alarm_config.cfg = alarm_config;
  484. }
  485. if (likely(p_alarm_config.cfg_hash)) {
  486. log_access("ACLK RES [%s (%s)]: Sent alert config %s.", wc->node_id, wc->host ? rrdhost_hostname(wc->host) : "N/A", config_hash);
  487. aclk_send_provide_alarm_cfg(&p_alarm_config);
  488. freez(p_alarm_config.cfg_hash);
  489. destroy_aclk_alarm_configuration(&alarm_config);
  490. }
  491. else
  492. log_access("ACLK STA [%s (%s)]: Alert config for %s not found.", wc->node_id, wc->host ? rrdhost_hostname(wc->host) : "N/A", config_hash);
  493. bind_fail:
  494. rc = sqlite3_finalize(res);
  495. if (unlikely(rc != SQLITE_OK))
  496. error_report("Failed to reset statement when pushing alarm config hash, rc = %d", rc);
  497. freez(config_hash);
  498. freez(node_id);
  499. #endif
  500. return rc;
  501. }
  502. // Start streaming alerts
  503. void aclk_start_alert_streaming(char *node_id, bool resets)
  504. {
  505. if (unlikely(!node_id))
  506. return;
  507. uuid_t node_uuid;
  508. if (uuid_parse(node_id, node_uuid))
  509. return;
  510. RRDHOST *host = find_host_by_node_id(node_id);
  511. if (unlikely(!host))
  512. return;
  513. struct aclk_sync_host_config *wc = host->aclk_sync_host_config;
  514. if (unlikely(!wc))
  515. return;
  516. if (unlikely(!host->health.health_enabled)) {
  517. log_access("ACLK STA [%s (N/A)]: Ignoring request to stream alert state changes, health is disabled.", node_id);
  518. return;
  519. }
  520. if (resets) {
  521. log_access("ACLK REQ [%s (%s)]: STREAM ALERTS ENABLED (RESET REQUESTED)", node_id, wc->host ? rrdhost_hostname(wc->host) : "N/A");
  522. sql_queue_existing_alerts_to_aclk(host);
  523. } else
  524. log_access("ACLK REQ [%s (%s)]: STREAM ALERTS ENABLED", node_id, wc->host ? rrdhost_hostname(wc->host) : "N/A");
  525. wc->alert_updates = 1;
  526. wc->alert_queue_removed = SEND_REMOVED_AFTER_HEALTH_LOOPS;
  527. }
  528. #define SQL_QUEUE_REMOVE_ALERTS "INSERT INTO aclk_alert_%s (alert_unique_id, date_created, filtered_alert_unique_id) " \
  529. "SELECT unique_id alert_unique_id, UNIXEPOCH(), unique_id alert_unique_id FROM health_log_%s " \
  530. "WHERE new_status = -2 AND updated_by_id = 0 AND unique_id NOT IN " \
  531. "(SELECT alert_unique_id FROM aclk_alert_%s) " \
  532. "AND config_hash_id NOT IN (select hash_id from alert_hash where warn is null and crit is null) " \
  533. "ORDER BY unique_id ASC " \
  534. "ON CONFLICT (alert_unique_id) DO NOTHING;"
  535. void sql_process_queue_removed_alerts_to_aclk(char *node_id)
  536. {
  537. struct aclk_sync_host_config *wc;
  538. RRDHOST *host = find_host_by_node_id(node_id);
  539. freez(node_id);
  540. if (unlikely(!host || !(wc = host->aclk_sync_host_config)))
  541. return;
  542. char sql[ACLK_SYNC_QUERY_SIZE * 2];
  543. snprintfz(sql,ACLK_SYNC_QUERY_SIZE * 2 - 1, SQL_QUEUE_REMOVE_ALERTS, wc->uuid_str, wc->uuid_str, wc->uuid_str);
  544. if (unlikely(db_execute(db_meta, sql))) {
  545. log_access("ACLK STA [%s (%s)]: QUEUED REMOVED ALERTS FAILED", wc->node_id, rrdhost_hostname(wc->host));
  546. error_report("Failed to queue ACLK alert removed entries for host %s", rrdhost_hostname(wc->host));
  547. }
  548. else
  549. log_access("ACLK STA [%s (%s)]: QUEUED REMOVED ALERTS", wc->node_id, rrdhost_hostname(wc->host));
  550. rrdhost_flag_set(wc->host, RRDHOST_FLAG_ACLK_STREAM_ALERTS);
  551. wc->alert_queue_removed = 0;
  552. }
  553. void sql_queue_removed_alerts_to_aclk(RRDHOST *host)
  554. {
  555. if (unlikely(!host->aclk_sync_host_config))
  556. return;
  557. if (!claimed() || !host->node_id)
  558. return;
  559. char node_id[UUID_STR_LEN];
  560. uuid_unparse_lower(*host->node_id, node_id);
  561. aclk_push_node_removed_alerts(node_id);
  562. }
  563. void aclk_process_send_alarm_snapshot(char *node_id, char *claim_id __maybe_unused, char *snapshot_uuid)
  564. {
  565. uuid_t node_uuid;
  566. if (unlikely(!node_id || uuid_parse(node_id, node_uuid)))
  567. return;
  568. RRDHOST *host = find_host_by_node_id(node_id);
  569. if (unlikely(!host)) {
  570. log_access("ACLK STA [%s (N/A)]: ACLK node id does not exist", node_id);
  571. return;
  572. }
  573. struct aclk_sync_host_config *wc = (struct aclk_sync_host_config *)host->aclk_sync_host_config;
  574. if (unlikely(!wc)) {
  575. log_access("ACLK STA [%s (N/A)]: ACLK node id does not exist", node_id);
  576. return;
  577. }
  578. log_access(
  579. "IN [%s (%s)]: Request to send alerts snapshot, snapshot_uuid %s",
  580. node_id,
  581. wc->host ? rrdhost_hostname(wc->host) : "N/A",
  582. snapshot_uuid);
  583. if (wc->alerts_snapshot_uuid && !strcmp(wc->alerts_snapshot_uuid,snapshot_uuid))
  584. return;
  585. __sync_synchronize();
  586. wc->alerts_snapshot_uuid = strdupz(snapshot_uuid);
  587. __sync_synchronize();
  588. aclk_push_node_alert_snapshot(node_id);
  589. }
  590. #ifdef ENABLE_ACLK
  591. void health_alarm_entry2proto_nolock(struct alarm_log_entry *alarm_log, ALARM_ENTRY *ae, RRDHOST *host)
  592. {
  593. char *edit_command = ae->source ? health_edit_command_from_source(ae_source(ae)) : strdupz("UNKNOWN=0=UNKNOWN");
  594. char config_hash_id[UUID_STR_LEN];
  595. uuid_unparse_lower(ae->config_hash_id, config_hash_id);
  596. char transition_id[UUID_STR_LEN];
  597. uuid_unparse_lower(ae->transition_id, transition_id);
  598. alarm_log->chart = strdupz(ae_chart_name(ae));
  599. alarm_log->name = strdupz(ae_name(ae));
  600. alarm_log->family = strdupz(ae_family(ae));
  601. alarm_log->batch_id = 0;
  602. alarm_log->sequence_id = 0;
  603. alarm_log->when = (time_t)ae->when;
  604. alarm_log->config_hash = strdupz((char *)config_hash_id);
  605. alarm_log->utc_offset = host->utc_offset;
  606. alarm_log->timezone = strdupz(rrdhost_abbrev_timezone(host));
  607. alarm_log->exec_path = ae->exec ? strdupz(ae_exec(ae)) : strdupz((char *)string2str(host->health.health_default_exec));
  608. alarm_log->conf_source = ae->source ? strdupz(ae_source(ae)) : strdupz((char *)"");
  609. alarm_log->command = strdupz((char *)edit_command);
  610. alarm_log->duration = (time_t)ae->duration;
  611. alarm_log->non_clear_duration = (time_t)ae->non_clear_duration;
  612. alarm_log->status = rrdcalc_status_to_proto_enum((RRDCALC_STATUS)ae->new_status);
  613. alarm_log->old_status = rrdcalc_status_to_proto_enum((RRDCALC_STATUS)ae->old_status);
  614. alarm_log->delay = (int)ae->delay;
  615. alarm_log->delay_up_to_timestamp = (time_t)ae->delay_up_to_timestamp;
  616. alarm_log->last_repeat = (time_t)ae->last_repeat;
  617. alarm_log->silenced =
  618. ((ae->flags & HEALTH_ENTRY_FLAG_SILENCED) || (ae->recipient && !strncmp(ae_recipient(ae), "silent", 6))) ?
  619. 1 :
  620. 0;
  621. alarm_log->value_string = strdupz(ae_new_value_string(ae));
  622. alarm_log->old_value_string = strdupz(ae_old_value_string(ae));
  623. alarm_log->value = (!isnan(ae->new_value)) ? (NETDATA_DOUBLE)ae->new_value : 0;
  624. alarm_log->old_value = (!isnan(ae->old_value)) ? (NETDATA_DOUBLE)ae->old_value : 0;
  625. alarm_log->updated = (ae->flags & HEALTH_ENTRY_FLAG_UPDATED) ? 1 : 0;
  626. alarm_log->rendered_info = strdupz(ae_info(ae));
  627. alarm_log->chart_context = strdupz(ae_chart_context(ae));
  628. alarm_log->transition_id = strdupz((char *)transition_id);
  629. alarm_log->event_id = (uint64_t) ae->alarm_event_id;
  630. freez(edit_command);
  631. }
  632. #endif
  633. #ifdef ENABLE_ACLK
  634. static int have_recent_alarm(RRDHOST *host, uint32_t alarm_id, uint32_t mark)
  635. {
  636. ALARM_ENTRY *ae = host->health_log.alarms;
  637. while (ae) {
  638. if (ae->alarm_id == alarm_id && ae->unique_id >mark &&
  639. (ae->new_status != RRDCALC_STATUS_WARNING && ae->new_status != RRDCALC_STATUS_CRITICAL))
  640. return 1;
  641. ae = ae->next;
  642. }
  643. return 0;
  644. }
  645. #endif
  646. #define ALARM_EVENTS_PER_CHUNK 10
  647. void aclk_push_alert_snapshot_event(char *node_id __maybe_unused)
  648. {
  649. #ifdef ENABLE_ACLK
  650. RRDHOST *host = find_host_by_node_id(node_id);
  651. if (unlikely(!host)) {
  652. log_access("AC [%s (N/A)]: Node id not found", node_id);
  653. freez(node_id);
  654. return;
  655. }
  656. freez(node_id);
  657. struct aclk_sync_host_config *wc = host->aclk_sync_host_config;
  658. // we perhaps we don't need this for snapshots
  659. if (unlikely(!wc->alert_updates)) {
  660. log_access(
  661. "ACLK STA [%s (%s)]: Ignoring alert snapshot event, updates have been turned off for this node.",
  662. wc->node_id,
  663. wc->host ? rrdhost_hostname(wc->host) : "N/A");
  664. return;
  665. }
  666. if (unlikely(!wc->alerts_snapshot_uuid))
  667. return;
  668. char *claim_id = get_agent_claimid();
  669. if (unlikely(!claim_id))
  670. return;
  671. log_access("ACLK REQ [%s (%s)]: Sending alerts snapshot, snapshot_uuid %s", wc->node_id, rrdhost_hostname(wc->host), wc->alerts_snapshot_uuid);
  672. uint32_t cnt = 0;
  673. char uuid_str[UUID_STR_LEN];
  674. uuid_unparse_lower_fix(&host->host_uuid, uuid_str);
  675. netdata_rwlock_rdlock(&host->health_log.alarm_log_rwlock);
  676. ALARM_ENTRY *ae = host->health_log.alarms;
  677. for (; ae; ae = ae->next) {
  678. if (likely(ae->updated_by_id))
  679. continue;
  680. if (unlikely(ae->new_status == RRDCALC_STATUS_UNINITIALIZED))
  681. continue;
  682. if (have_recent_alarm(host, ae->alarm_id, ae->unique_id))
  683. continue;
  684. if (is_event_from_alert_variable_config(ae->unique_id, uuid_str))
  685. continue;
  686. cnt++;
  687. }
  688. if (cnt) {
  689. uint32_t chunk = 1, chunks = 0;
  690. chunks = (cnt / ALARM_EVENTS_PER_CHUNK) + (cnt % ALARM_EVENTS_PER_CHUNK != 0);
  691. ae = host->health_log.alarms;
  692. cnt = 0;
  693. struct alarm_snapshot alarm_snap;
  694. alarm_snap.node_id = wc->node_id;
  695. alarm_snap.claim_id = claim_id;
  696. alarm_snap.snapshot_uuid = wc->alerts_snapshot_uuid;
  697. alarm_snap.chunks = chunks;
  698. alarm_snap.chunk = chunk;
  699. alarm_snapshot_proto_ptr_t snapshot_proto = NULL;
  700. for (; ae; ae = ae->next) {
  701. if (likely(ae->updated_by_id))
  702. continue;
  703. if (unlikely(ae->new_status == RRDCALC_STATUS_UNINITIALIZED))
  704. continue;
  705. if (have_recent_alarm(host, ae->alarm_id, ae->unique_id))
  706. continue;
  707. if (is_event_from_alert_variable_config(ae->unique_id, uuid_str))
  708. continue;
  709. cnt++;
  710. struct alarm_log_entry alarm_log;
  711. alarm_log.node_id = wc->node_id;
  712. alarm_log.claim_id = claim_id;
  713. if (!snapshot_proto)
  714. snapshot_proto = generate_alarm_snapshot_proto(&alarm_snap);
  715. health_alarm_entry2proto_nolock(&alarm_log, ae, host);
  716. add_alarm_log_entry2snapshot(snapshot_proto, &alarm_log);
  717. if (cnt == ALARM_EVENTS_PER_CHUNK) {
  718. aclk_send_alarm_snapshot(snapshot_proto);
  719. cnt = 0;
  720. if (chunk < chunks) {
  721. chunk++;
  722. struct alarm_snapshot alarm_snap;
  723. alarm_snap.node_id = wc->node_id;
  724. alarm_snap.claim_id = claim_id;
  725. alarm_snap.snapshot_uuid = wc->alerts_snapshot_uuid;
  726. alarm_snap.chunks = chunks;
  727. alarm_snap.chunk = chunk;
  728. snapshot_proto = generate_alarm_snapshot_proto(&alarm_snap);
  729. }
  730. }
  731. destroy_alarm_log_entry(&alarm_log);
  732. }
  733. if (cnt)
  734. aclk_send_alarm_snapshot(snapshot_proto);
  735. }
  736. netdata_rwlock_unlock(&host->health_log.alarm_log_rwlock);
  737. wc->alerts_snapshot_uuid = NULL;
  738. freez(claim_id);
  739. #endif
  740. }
  741. #define SQL_DELETE_ALERT_ENTRIES "DELETE FROM aclk_alert_%s WHERE filtered_alert_unique_id + %d < UNIXEPOCH();"
  742. void sql_aclk_alert_clean_dead_entries(RRDHOST *host)
  743. {
  744. char uuid_str[UUID_STR_LEN];
  745. uuid_unparse_lower_fix(&host->host_uuid, uuid_str);
  746. char sql[ACLK_SYNC_QUERY_SIZE];
  747. snprintfz(sql, ACLK_SYNC_QUERY_SIZE - 1, SQL_DELETE_ALERT_ENTRIES, uuid_str, MAX_REMOVED_PERIOD);
  748. char *err_msg = NULL;
  749. int rc = sqlite3_exec_monitored(db_meta, sql, NULL, NULL, &err_msg);
  750. if (rc != SQLITE_OK) {
  751. error_report("Failed when trying to clean stale ACLK alert entries from aclk_alert_%s, error message \"%s\"", uuid_str, err_msg);
  752. sqlite3_free(err_msg);
  753. }
  754. }
  755. #define SQL_GET_MIN_MAX_ALERT_SEQ "SELECT MIN(sequence_id), MAX(sequence_id), " \
  756. "(SELECT MAX(sequence_id) FROM aclk_alert_%s WHERE date_submitted IS NOT NULL) " \
  757. "FROM aclk_alert_%s WHERE date_submitted IS NULL;"
  758. int get_proto_alert_status(RRDHOST *host, struct proto_alert_status *proto_alert_status)
  759. {
  760. int rc;
  761. struct aclk_sync_host_config *wc = NULL;
  762. wc = (struct aclk_sync_host_config *)host->aclk_sync_host_config;
  763. if (!wc)
  764. return 1;
  765. proto_alert_status->alert_updates = wc->alert_updates;
  766. char sql[ACLK_SYNC_QUERY_SIZE];
  767. sqlite3_stmt *res = NULL;
  768. snprintfz(sql, ACLK_SYNC_QUERY_SIZE - 1, SQL_GET_MIN_MAX_ALERT_SEQ, wc->uuid_str, wc->uuid_str);
  769. rc = sqlite3_prepare_v2(db_meta, sql, -1, &res, 0);
  770. if (rc != SQLITE_OK) {
  771. error_report("Failed to prepare statement to get alert log status from the database.");
  772. return 1;
  773. }
  774. while (sqlite3_step_monitored(res) == SQLITE_ROW) {
  775. proto_alert_status->pending_min_sequence_id = sqlite3_column_bytes(res, 0) > 0 ? (uint64_t) sqlite3_column_int64(res, 0) : 0;
  776. proto_alert_status->pending_max_sequence_id = sqlite3_column_bytes(res, 1) > 0 ? (uint64_t) sqlite3_column_int64(res, 1) : 0;
  777. proto_alert_status->last_submitted_sequence_id = sqlite3_column_bytes(res, 2) > 0 ? (uint64_t) sqlite3_column_int64(res, 2) : 0;
  778. }
  779. rc = sqlite3_finalize(res);
  780. if (unlikely(rc != SQLITE_OK))
  781. error_report("Failed to finalize statement to get alert log status from the database, rc = %d", rc);
  782. return 0;
  783. }
  784. void aclk_send_alarm_checkpoint(char *node_id, char *claim_id __maybe_unused)
  785. {
  786. if (unlikely(!node_id))
  787. return;
  788. struct aclk_sync_host_config *wc = NULL;
  789. RRDHOST *host = find_host_by_node_id(node_id);
  790. if (unlikely(!host))
  791. return;
  792. wc = (struct aclk_sync_host_config *)host->aclk_sync_host_config;
  793. if (unlikely(!wc)) {
  794. log_access("ACLK REQ [%s (N/A)]: ALERTS CHECKPOINT REQUEST RECEIVED FOR INVALID NODE", node_id);
  795. return;
  796. }
  797. log_access("ACLK REQ [%s (%s)]: ALERTS CHECKPOINT REQUEST RECEIVED", node_id, rrdhost_hostname(host));
  798. wc->alert_checkpoint_req = SEND_CHECKPOINT_AFTER_HEALTH_LOOPS;
  799. }
  800. typedef struct active_alerts {
  801. char *name;
  802. char *chart;
  803. RRDCALC_STATUS status;
  804. } active_alerts_t;
  805. static inline int compare_active_alerts(const void * a, const void * b) {
  806. active_alerts_t *active_alerts_a = (active_alerts_t *)a;
  807. active_alerts_t *active_alerts_b = (active_alerts_t *)b;
  808. if( !(strcmp(active_alerts_a->name, active_alerts_b->name)) )
  809. {
  810. return strcmp(active_alerts_a->chart, active_alerts_b->chart);
  811. }
  812. else
  813. return strcmp(active_alerts_a->name, active_alerts_b->name);
  814. }
  815. #define BATCH_ALLOCATED 10
  816. void aclk_push_alarm_checkpoint(RRDHOST *host __maybe_unused)
  817. {
  818. #ifdef ENABLE_ACLK
  819. struct aclk_sync_host_config *wc = host->aclk_sync_host_config;
  820. if (unlikely(!wc)) {
  821. log_access("ACLK REQ [%s (N/A)]: ALERTS CHECKPOINT REQUEST RECEIVED FOR INVALID NODE", rrdhost_hostname(host));
  822. return;
  823. }
  824. if (rrdhost_flag_check(host, RRDHOST_FLAG_ACLK_STREAM_ALERTS)) {
  825. //postpone checkpoint send
  826. wc->alert_checkpoint_req+=3;
  827. log_access("ACLK REQ [%s (N/A)]: ALERTS CHECKPOINT POSTPONED", rrdhost_hostname(host));
  828. return;
  829. }
  830. RRDCALC *rc;
  831. uint32_t cnt = 0;
  832. size_t len = 0;
  833. active_alerts_t *active_alerts = callocz(BATCH_ALLOCATED, sizeof(active_alerts_t));
  834. foreach_rrdcalc_in_rrdhost_read(host, rc) {
  835. if(unlikely(!rc->rrdset || !rc->rrdset->last_collected_time.tv_sec))
  836. continue;
  837. if (rc->status == RRDCALC_STATUS_WARNING ||
  838. rc->status == RRDCALC_STATUS_CRITICAL) {
  839. if (cnt && !(cnt % BATCH_ALLOCATED)) {
  840. active_alerts = reallocz(active_alerts, (BATCH_ALLOCATED * ((cnt / BATCH_ALLOCATED) + 1)) * sizeof(active_alerts_t));
  841. }
  842. active_alerts[cnt].name = (char *)rrdcalc_name(rc);
  843. len += string_strlen(rc->name);
  844. active_alerts[cnt].chart = (char *)rrdcalc_chart_name(rc);
  845. len += string_strlen(rc->chart);
  846. active_alerts[cnt].status = rc->status;
  847. len++;
  848. cnt++;
  849. }
  850. }
  851. foreach_rrdcalc_in_rrdhost_done(rc);
  852. BUFFER *alarms_to_hash;
  853. if (cnt) {
  854. qsort (active_alerts, cnt, sizeof(active_alerts_t), compare_active_alerts);
  855. alarms_to_hash = buffer_create(len, NULL);
  856. for (uint32_t i=0;i<cnt;i++) {
  857. buffer_strcat(alarms_to_hash, active_alerts[i].name);
  858. buffer_strcat(alarms_to_hash, active_alerts[i].chart);
  859. if (active_alerts[i].status == RRDCALC_STATUS_WARNING)
  860. buffer_strcat(alarms_to_hash, "W");
  861. else if (active_alerts[i].status == RRDCALC_STATUS_CRITICAL)
  862. buffer_strcat(alarms_to_hash, "C");
  863. }
  864. } else {
  865. alarms_to_hash = buffer_create(1, NULL);
  866. buffer_strcat(alarms_to_hash, "");
  867. len = 0;
  868. }
  869. freez(active_alerts);
  870. char hash[SHA256_DIGEST_LENGTH + 1];
  871. if (hash256_string((const unsigned char *)buffer_tostring(alarms_to_hash), len, hash)) {
  872. hash[SHA256_DIGEST_LENGTH] = 0;
  873. struct alarm_checkpoint alarm_checkpoint;
  874. char *claim_id = get_agent_claimid();
  875. alarm_checkpoint.claim_id = claim_id;
  876. alarm_checkpoint.node_id = wc->node_id;
  877. alarm_checkpoint.checksum = (char *)hash;
  878. aclk_send_provide_alarm_checkpoint(&alarm_checkpoint);
  879. freez(claim_id);
  880. log_access("ACLK RES [%s (%s)]: ALERTS CHECKPOINT SENT", wc->node_id, rrdhost_hostname(host));
  881. } else {
  882. log_access("ACLK RES [%s (%s)]: FAILED TO CREATE ALERTS CHECKPOINT HASH", wc->node_id, rrdhost_hostname(host));
  883. }
  884. wc->alert_checkpoint_req = 0;
  885. buffer_free(alarms_to_hash);
  886. #endif
  887. }