proc_net_stat_synproxy.c 6.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156
  1. // SPDX-License-Identifier: GPL-3.0-or-later
  2. #include "plugin_proc.h"
  3. #define PLUGIN_PROC_MODULE_SYNPROXY_NAME "/proc/net/stat/synproxy"
  4. #define RRD_TYPE_NET_STAT_NETFILTER "netfilter"
  5. #define RRD_TYPE_NET_STAT_SYNPROXY "synproxy"
  6. int do_proc_net_stat_synproxy(int update_every, usec_t dt) {
  7. (void)dt;
  8. static int do_cookies = -1, do_syns = -1, do_reopened = -1;
  9. static procfile *ff = NULL;
  10. if(unlikely(do_cookies == -1)) {
  11. do_cookies = config_get_boolean_ondemand("plugin:proc:/proc/net/stat/synproxy", "SYNPROXY cookies", CONFIG_BOOLEAN_AUTO);
  12. do_syns = config_get_boolean_ondemand("plugin:proc:/proc/net/stat/synproxy", "SYNPROXY SYN received", CONFIG_BOOLEAN_AUTO);
  13. do_reopened = config_get_boolean_ondemand("plugin:proc:/proc/net/stat/synproxy", "SYNPROXY connections reopened", CONFIG_BOOLEAN_AUTO);
  14. }
  15. if(unlikely(!ff)) {
  16. char filename[FILENAME_MAX + 1];
  17. snprintfz(filename, FILENAME_MAX, "%s%s", netdata_configured_host_prefix, "/proc/net/stat/synproxy");
  18. ff = procfile_open(config_get("plugin:proc:/proc/net/stat/synproxy", "filename to monitor", filename), " \t,:|", PROCFILE_FLAG_DEFAULT);
  19. if(unlikely(!ff))
  20. return 1;
  21. }
  22. ff = procfile_readall(ff);
  23. if(unlikely(!ff))
  24. return 0; // we return 0, so that we will retry to open it next time
  25. // make sure we have 3 lines
  26. size_t lines = procfile_lines(ff), l;
  27. if(unlikely(lines < 2)) {
  28. error("/proc/net/stat/synproxy has %zu lines, expected no less than 2. Disabling it.", lines);
  29. return 1;
  30. }
  31. unsigned long long syn_received = 0, cookie_invalid = 0, cookie_valid = 0, cookie_retrans = 0, conn_reopened = 0;
  32. // synproxy gives its values per CPU
  33. for(l = 1; l < lines ;l++) {
  34. size_t words = procfile_linewords(ff, l);
  35. if(unlikely(words < 6))
  36. continue;
  37. syn_received += strtoull(procfile_lineword(ff, l, 1), NULL, 16);
  38. cookie_invalid += strtoull(procfile_lineword(ff, l, 2), NULL, 16);
  39. cookie_valid += strtoull(procfile_lineword(ff, l, 3), NULL, 16);
  40. cookie_retrans += strtoull(procfile_lineword(ff, l, 4), NULL, 16);
  41. conn_reopened += strtoull(procfile_lineword(ff, l, 5), NULL, 16);
  42. }
  43. unsigned long long events = syn_received + cookie_invalid + cookie_valid + cookie_retrans + conn_reopened;
  44. // --------------------------------------------------------------------
  45. if(do_syns == CONFIG_BOOLEAN_YES || (do_syns == CONFIG_BOOLEAN_AUTO &&
  46. (events || netdata_zero_metrics_enabled == CONFIG_BOOLEAN_YES))) {
  47. do_syns = CONFIG_BOOLEAN_YES;
  48. static RRDSET *st = NULL;
  49. if(unlikely(!st)) {
  50. st = rrdset_create_localhost(
  51. RRD_TYPE_NET_STAT_NETFILTER
  52. , RRD_TYPE_NET_STAT_SYNPROXY "_syn_received"
  53. , NULL
  54. , RRD_TYPE_NET_STAT_SYNPROXY
  55. , NULL
  56. , "SYNPROXY SYN Packets received"
  57. , "packets/s"
  58. , PLUGIN_PROC_NAME
  59. , PLUGIN_PROC_MODULE_SYNPROXY_NAME
  60. , NETDATA_CHART_PRIO_SYNPROXY_SYN_RECEIVED
  61. , update_every
  62. , RRDSET_TYPE_LINE
  63. );
  64. rrddim_add(st, "received", NULL, 1, 1, RRD_ALGORITHM_INCREMENTAL);
  65. }
  66. else rrdset_next(st);
  67. rrddim_set(st, "received", syn_received);
  68. rrdset_done(st);
  69. }
  70. // --------------------------------------------------------------------
  71. if(do_reopened == CONFIG_BOOLEAN_YES || (do_reopened == CONFIG_BOOLEAN_AUTO &&
  72. (events || netdata_zero_metrics_enabled == CONFIG_BOOLEAN_YES))) {
  73. do_reopened = CONFIG_BOOLEAN_YES;
  74. static RRDSET *st = NULL;
  75. if(unlikely(!st)) {
  76. st = rrdset_create_localhost(
  77. RRD_TYPE_NET_STAT_NETFILTER
  78. , RRD_TYPE_NET_STAT_SYNPROXY "_conn_reopened"
  79. , NULL
  80. , RRD_TYPE_NET_STAT_SYNPROXY
  81. , NULL
  82. , "SYNPROXY Connections Reopened"
  83. , "connections/s"
  84. , PLUGIN_PROC_NAME
  85. , PLUGIN_PROC_MODULE_SYNPROXY_NAME
  86. , NETDATA_CHART_PRIO_SYNPROXY_CONN_OPEN
  87. , update_every
  88. , RRDSET_TYPE_LINE
  89. );
  90. rrddim_add(st, "reopened", NULL, 1, 1, RRD_ALGORITHM_INCREMENTAL);
  91. }
  92. else rrdset_next(st);
  93. rrddim_set(st, "reopened", conn_reopened);
  94. rrdset_done(st);
  95. }
  96. // --------------------------------------------------------------------
  97. if(do_cookies == CONFIG_BOOLEAN_YES || (do_cookies == CONFIG_BOOLEAN_AUTO &&
  98. (events || netdata_zero_metrics_enabled == CONFIG_BOOLEAN_YES))) {
  99. do_cookies = CONFIG_BOOLEAN_YES;
  100. static RRDSET *st = NULL;
  101. if(unlikely(!st)) {
  102. st = rrdset_create_localhost(
  103. RRD_TYPE_NET_STAT_NETFILTER
  104. , RRD_TYPE_NET_STAT_SYNPROXY "_cookies"
  105. , NULL
  106. , RRD_TYPE_NET_STAT_SYNPROXY
  107. , NULL
  108. , "SYNPROXY TCP Cookies"
  109. , "cookies/s"
  110. , PLUGIN_PROC_NAME
  111. , PLUGIN_PROC_MODULE_SYNPROXY_NAME
  112. , NETDATA_CHART_PRIO_SYNPROXY_COOKIES
  113. , update_every
  114. , RRDSET_TYPE_LINE
  115. );
  116. rrddim_add(st, "valid", NULL, 1, 1, RRD_ALGORITHM_INCREMENTAL);
  117. rrddim_add(st, "invalid", NULL, -1, 1, RRD_ALGORITHM_INCREMENTAL);
  118. rrddim_add(st, "retransmits", NULL, 1, 1, RRD_ALGORITHM_INCREMENTAL);
  119. }
  120. else rrdset_next(st);
  121. rrddim_set(st, "valid", cookie_valid);
  122. rrddim_set(st, "invalid", cookie_invalid);
  123. rrddim_set(st, "retransmits", cookie_retrans);
  124. rrdset_done(st);
  125. }
  126. return 0;
  127. }