Viewing file: networking.py (9.56 KB) -rw-r--r-- Select action/file-type: (+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
# This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 2 of the License, or # (at your option) any later version.
# This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details.
# You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
from sos.plugins import Plugin, RedHatPlugin, UbuntuPlugin, DebianPlugin import os import re
class Networking(Plugin): """network and device configuration """ plugin_name = "networking" profiles = ('network', 'hardware', 'system') trace_host = "www.example.com" option_list = [("traceroute", "collects a traceroute to %s" % trace_host, "slow", False)]
def get_bridge_name(self, brctl_file): """Return a list for which items are bridge name according to the output of brctl show stored in brctl_file. """ out = [] try: brctl_out = open(brctl_file).read() except: return out for line in brctl_out.splitlines(): if line.startswith("bridge name") \ or line.isspace() \ or line[:1].isspace(): continue br_name, br_rest = line.split(None, 1) out.append(br_name) return out
def get_eth_interfaces(self, ip_link_out): """Return a dictionary for which keys are ethernet interface names taken from the output of "ip -o link". """ out = {} for line in ip_link_out.splitlines(): match = re.match('.*link/ether', line) if match: iface = match.string.split(':')[1].lstrip() out[iface] = True return out
def collect_iptable(self, tablename): """ When running the iptables command, it unfortunately auto-loads the modules before trying to get output. Some people explicitly don't want this, so check if the modules are loaded before running the command. If they aren't loaded, there can't possibly be any relevant rules in that table """
modname = "iptable_"+tablename if self.check_ext_prog("grep -q %s /proc/modules" % modname): cmd = "iptables -t "+tablename+" -nvL" self.add_cmd_output(cmd)
def collect_ip6table(self, tablename): """ Same as function above, but for ipv6 """
modname = "ip6table_"+tablename if self.check_ext_prog("grep -q %s /proc/modules" % modname): cmd = "ip6tables -t "+tablename+" -nvL" self.add_cmd_output(cmd)
def setup(self): super(Networking, self).setup() self.add_copy_spec([ "/proc/net/", "/etc/nsswitch.conf", "/etc/yp.conf", "/etc/inetd.conf", "/etc/xinetd.conf", "/etc/xinetd.d", "/etc/host*", "/etc/resolv.conf", "/etc/network*", "/etc/NetworkManager/NetworkManager.conf", "/etc/NetworkManager/system-connections", "/etc/dnsmasq*", "/sys/class/net/*/flags", "/etc/iproute2" ]) self.add_forbidden_path("/proc/net/rpc/use-gss-proxy") self.add_forbidden_path("/proc/net/rpc/*/channel") self.add_forbidden_path("/proc/net/rpc/*/flush") # Cisco CDP self.add_forbidden_path("/proc/net/cdp") self.add_forbidden_path("/sys/net/cdp")
self.add_cmd_output("ip -o addr", root_symlink="ip_addr") self.add_cmd_output("route -n", root_symlink="route") self.collect_iptable("filter") self.collect_iptable("nat") self.collect_iptable("mangle") self.collect_ip6table("filter") self.collect_ip6table("nat") self.collect_ip6table("mangle") self.add_cmd_output("netstat -neopa", root_symlink="netstat") self.add_cmd_output([ "netstat -s", "netstat -agn", "ip route show table all", "ip -6 route show table all", "ip -4 rule", "ip -6 rule", "ip -s link", "ip address", "ifenslave -a", "ip mroute show", "ip maddr show", "ip neigh show", "ip neigh show nud noarp", "ip netns", "biosdevname -d", "tc -s qdisc show", ])
# When iptables is called it will load the modules # iptables and iptables_filter if they are not loaded. # The same goes for ipv6. if self.check_ext_prog("grep -q iptable_filter /proc/modules"): self.add_cmd_output("iptables -vnxL") if self.check_ext_prog("grep -q ip6table_filter /proc/modules"): self.add_cmd_output("ip6tables -vnxL")
# There are some incompatible changes in nmcli since # the release of NetworkManager >= 0.9.9. In addition, # NetworkManager >= 0.9.9 will use the long names of # "nmcli" objects.
# NetworkManager >= 0.9.9 (Use long names of objects for nmcli) nmcli_con_details_cmd = "" nmcli_dev_details_cmd = "" nmcli_status_cmd_v1 = "nmcli --terse --fields RUNNING general status" nmcli_status_cmd_v0 = "nmcli --terse --fields RUNNING nm status" if self.call_ext_prog( nmcli_status_cmd_v1)['output'].lower().startswith("running"): self.add_cmd_output([ "nmcli general status", "nmcli con", "nmcli con show --active", "nmcli dev"]) nmcli_con_details_cmd = "nmcli con show id" nmcli_dev_details_cmd = "nmcli dev show" # NetworkManager < 0.9.9 (Use short name of objects for nmcli) elif self.call_ext_prog( nmcli_status_cmd_v0)['output'].lower().startswith("running"): self.add_cmd_output([ "nmcli nm status", "nmcli con", "nmcli con status", "nmcli dev"]) nmcli_con_details_cmd = "nmcli con list id" nmcli_dev_details_cmd = "nmcli dev list iface"
if len(nmcli_con_details_cmd) > 0: nmcli_con_show_result = self.call_ext_prog( "nmcli --terse --fields NAME con") if nmcli_con_show_result['status'] == 0: for con in nmcli_con_show_result['output'].splitlines(): self.add_cmd_output("%s '%s'" % (nmcli_con_details_cmd, con))
nmcli_dev_status_result = self.call_ext_prog( "nmcli --terse --fields DEVICE dev") if nmcli_dev_status_result['status'] == 0: for dev in nmcli_dev_status_result['output'].splitlines(): self.add_cmd_output("%s '%s'" % (nmcli_dev_details_cmd, dev))
ip_link_result = self.call_ext_prog("ip -o link") if ip_link_result['status'] == 0: for eth in self.get_eth_interfaces(ip_link_result['output']): self.add_cmd_output([ "ethtool "+eth, "ethtool -d "+eth, "ethtool -i "+eth, "ethtool -k "+eth, "ethtool -S "+eth, "ethtool -a "+eth, "ethtool -c "+eth, "ethtool -g "+eth ])
# brctl command will load bridge and related kernel modules # if those modules are not loaded at the time of brctl command running # This behaviour causes an unexpected configuration change for system. # sosreport should aovid such situation. if self.is_module_loaded("bridge"): brctl_file = self.get_cmd_output_now("brctl show") if brctl_file: for br_name in self.get_bridge_name(brctl_file): self.add_cmd_output([ "brctl showstp "+br_name, "brctl showmacs "+br_name ])
if self.get_option("traceroute"): self.add_cmd_output("/bin/traceroute -n %s" % self.trace_host)
return
def postproc(self): for root, dirs, files in os.walk( "/etc/NetworkManager/system-connections"): for net_conf in files: self.do_file_sub( "/etc/NetworkManager/system-connections/"+net_conf, r"psk=(.*)", r"psk=***")
class RedHatNetworking(Networking, RedHatPlugin): trace_host = "repo.cloudlinux.com"
def setup(self): super(RedHatNetworking, self).setup()
class UbuntuNetworking(Networking, UbuntuPlugin, DebianPlugin): trace_host = "archive.ubuntu.com"
def setup(self): super(UbuntuNetworking, self).setup()
self.add_copy_spec([ "/etc/resolvconf", "/etc/network/interfaces", "/etc/network/interfaces.d", "/etc/ufw", "/var/log/ufw.Log", "/etc/resolv.conf" ]) self.add_cmd_output([ "/usr/sbin/ufw status", "/usr/sbin/ufw app list" ]) if self.get_option("traceroute"): self.add_cmd_output("/usr/sbin/traceroute -n %s" % self.trace_host)
# vim: et ts=4 sw=4
|