Merge pull request #49 from M0r13n/support-ipv6

Support ipv6
This commit is contained in:
Arseniy Kuznetsov
2022-11-14 19:49:06 +01:00
committed by GitHub
8 changed files with 155 additions and 35 deletions

View File

@@ -50,6 +50,7 @@ class MKTXPConfigKeys:
FE_CAPSMAN_CLIENTS_KEY = 'capsman_clients' FE_CAPSMAN_CLIENTS_KEY = 'capsman_clients'
FE_POE_KEY = 'poe' FE_POE_KEY = 'poe'
FE_PUBLIC_IP_KEY = 'public_ip' FE_PUBLIC_IP_KEY = 'public_ip'
FE_IPV6_NEIGHBOR_KEY = 'ipv6_neighbor'
FE_NETWATCH_KEY = 'netwatch' FE_NETWATCH_KEY = 'netwatch'
MKTXP_SOCKET_TIMEOUT = 'socket_timeout' MKTXP_SOCKET_TIMEOUT = 'socket_timeout'
@@ -86,7 +87,7 @@ class MKTXPConfigKeys:
BOOLEAN_KEYS_YES = {FE_DHCP_KEY, FE_DHCP_LEASE_KEY, FE_DHCP_POOL_KEY, FE_IP_CONNECTIONS_KEY, FE_INTERFACE_KEY, FE_FIREWALL_KEY, BOOLEAN_KEYS_YES = {FE_DHCP_KEY, FE_DHCP_LEASE_KEY, FE_DHCP_POOL_KEY, FE_IP_CONNECTIONS_KEY, FE_INTERFACE_KEY, FE_FIREWALL_KEY,
FE_MONITOR_KEY, FE_ROUTE_KEY, MKTXP_USE_COMMENTS_OVER_NAMES, FE_MONITOR_KEY, FE_ROUTE_KEY, MKTXP_USE_COMMENTS_OVER_NAMES,
FE_WIRELESS_KEY, FE_WIRELESS_CLIENTS_KEY, FE_CAPSMAN_KEY, FE_CAPSMAN_CLIENTS_KEY, FE_POE_KEY, FE_WIRELESS_KEY, FE_WIRELESS_CLIENTS_KEY, FE_CAPSMAN_KEY, FE_CAPSMAN_CLIENTS_KEY, FE_POE_KEY,
FE_NETWATCH_KEY, FE_PUBLIC_IP_KEY} FE_NETWATCH_KEY, FE_PUBLIC_IP_KEY, FE_IPV6_NEIGHBOR_KEY}
SYSTEM_BOOLEAN_KEYS_YES = {MKTXP_BANDWIDTH_KEY} SYSTEM_BOOLEAN_KEYS_YES = {MKTXP_BANDWIDTH_KEY}
SYSTEM_BOOLEAN_KEYS_NO = {MKTXP_VERBOSE_MODE} SYSTEM_BOOLEAN_KEYS_NO = {MKTXP_VERBOSE_MODE}
@@ -106,7 +107,7 @@ class ConfigEntry:
MKTXPConfigKeys.FE_DHCP_KEY, MKTXPConfigKeys.FE_DHCP_LEASE_KEY, MKTXPConfigKeys.FE_DHCP_POOL_KEY, MKTXPConfigKeys.FE_INTERFACE_KEY, MKTXPConfigKeys.FE_FIREWALL_KEY, MKTXPConfigKeys.FE_DHCP_KEY, MKTXPConfigKeys.FE_DHCP_LEASE_KEY, MKTXPConfigKeys.FE_DHCP_POOL_KEY, MKTXPConfigKeys.FE_INTERFACE_KEY, MKTXPConfigKeys.FE_FIREWALL_KEY,
MKTXPConfigKeys.FE_MONITOR_KEY, MKTXPConfigKeys.FE_ROUTE_KEY, MKTXPConfigKeys.FE_WIRELESS_KEY, MKTXPConfigKeys.FE_WIRELESS_CLIENTS_KEY, MKTXPConfigKeys.FE_IP_CONNECTIONS_KEY, MKTXPConfigKeys.FE_MONITOR_KEY, MKTXPConfigKeys.FE_ROUTE_KEY, MKTXPConfigKeys.FE_WIRELESS_KEY, MKTXPConfigKeys.FE_WIRELESS_CLIENTS_KEY, MKTXPConfigKeys.FE_IP_CONNECTIONS_KEY,
MKTXPConfigKeys.FE_CAPSMAN_KEY, MKTXPConfigKeys.FE_CAPSMAN_CLIENTS_KEY, MKTXPConfigKeys.FE_POE_KEY, MKTXPConfigKeys.FE_NETWATCH_KEY, MKTXPConfigKeys.MKTXP_USE_COMMENTS_OVER_NAMES, MKTXPConfigKeys.FE_CAPSMAN_KEY, MKTXPConfigKeys.FE_CAPSMAN_CLIENTS_KEY, MKTXPConfigKeys.FE_POE_KEY, MKTXPConfigKeys.FE_NETWATCH_KEY, MKTXPConfigKeys.MKTXP_USE_COMMENTS_OVER_NAMES,
MKTXPConfigKeys.FE_PUBLIC_IP_KEY, MKTXPConfigKeys.FE_PUBLIC_IP_KEY, MKTXPConfigKeys.FE_IPV6_NEIGHBOR_KEY
]) ])
MKTXPSystemEntry = namedtuple('MKTXPSystemEntry', [MKTXPConfigKeys.PORT_KEY, MKTXPConfigKeys.MKTXP_SOCKET_TIMEOUT, MKTXPSystemEntry = namedtuple('MKTXPSystemEntry', [MKTXPConfigKeys.PORT_KEY, MKTXPConfigKeys.MKTXP_SOCKET_TIMEOUT,
MKTXPConfigKeys.MKTXP_INITIAL_DELAY, MKTXPConfigKeys.MKTXP_MAX_DELAY, MKTXPConfigKeys.MKTXP_INITIAL_DELAY, MKTXPConfigKeys.MKTXP_MAX_DELAY,

View File

@@ -33,6 +33,7 @@
monitor = True # Interface monitor metrics monitor = True # Interface monitor metrics
poe = True # POE metrics poe = True # POE metrics
public_ip = True # Public IP metrics public_ip = True # Public IP metrics
ipv6_neighbor = False # Reachable IPv6 Neighbors
route = True # Routes metrics route = True # Routes metrics
wireless = True # WLAN general metrics wireless = True # WLAN general metrics
wireless_clients = True # WLAN clients metrics wireless_clients = True # WLAN clients metrics

View File

@@ -25,21 +25,36 @@ class FirewallCollector(BaseCollector):
if not router_entry.config_entry.firewall: if not router_entry.config_entry.firewall:
return return
# initialize all pool counts, including those currently not used # Initialize all pool counts, including those currently not used
# These are the same for both IPv4 and IPv6
firewall_labels = ['chain', 'action', 'bytes', 'comment', 'log'] firewall_labels = ['chain', 'action', 'bytes', 'comment', 'log']
firewall_filter_records = FirewallMetricsDataSource.metric_records(router_entry, metric_labels = firewall_labels) # ~*~*~*~*~*~ IPv4 ~*~*~*~*~*~
firewall_filter_records = FirewallMetricsDataSource.metric_records_ipv4(router_entry, metric_labels = firewall_labels)
if firewall_filter_records: if firewall_filter_records:
metris_records = [FirewallCollector.metric_record(router_entry, record) for record in firewall_filter_records] metrics_records = [FirewallCollector.metric_record(router_entry, record) for record in firewall_filter_records]
firewall_filter_metrics = BaseCollector.counter_collector('firewall_filter', 'Total amount of bytes matched by firewall rules', metris_records, 'bytes', ['name', 'log']) firewall_filter_metrics = BaseCollector.counter_collector('firewall_filter', 'Total amount of bytes matched by firewall rules', metrics_records, 'bytes', ['name', 'log'])
yield firewall_filter_metrics yield firewall_filter_metrics
firewall_raw_records = FirewallMetricsDataSource.metric_records(router_entry, metric_labels = firewall_labels, raw = True) firewall_raw_records = FirewallMetricsDataSource.metric_records_ipv4(router_entry, metric_labels = firewall_labels, raw = True)
if firewall_raw_records: if firewall_raw_records:
metris_records = [FirewallCollector.metric_record(router_entry, record) for record in firewall_raw_records] metrics_records = [FirewallCollector.metric_record(router_entry, record) for record in firewall_raw_records]
firewall_raw_metrics = BaseCollector.counter_collector('firewall_raw', 'Total amount of bytes matched by raw firewall rules', metris_records, 'bytes', ['name', 'log']) firewall_raw_metrics = BaseCollector.counter_collector('firewall_raw', 'Total amount of bytes matched by raw firewall rules', metrics_records, 'bytes', ['name', 'log'])
yield firewall_raw_metrics yield firewall_raw_metrics
# ~*~*~*~*~*~ IPv6 ~*~*~*~*~*~
firewall_filter_records_ipv6 = FirewallMetricsDataSource.metric_records_ipv6(router_entry, metric_labels = firewall_labels)
if firewall_filter_records_ipv6:
metrics_records_ipv6 = [FirewallCollector.metric_record(router_entry, record) for record in firewall_filter_records_ipv6]
firewall_filter_metrics_ipv6 = BaseCollector.counter_collector('firewall_filter_ipv6', 'Total amount of bytes matched by firewall rules (IPv6)', metrics_records_ipv6, 'bytes', ['name', 'log'])
yield firewall_filter_metrics_ipv6
firewall_raw_records_ipv6 = FirewallMetricsDataSource.metric_records_ipv6(router_entry, metric_labels = firewall_labels, raw = True)
if firewall_raw_records_ipv6:
metrics_records_ipv6 = [FirewallCollector.metric_record(router_entry, record) for record in firewall_raw_records_ipv6]
firewall_raw_metrics_ipv6 = BaseCollector.counter_collector('firewall_raw_ipv6', 'Total amount of bytes matched by raw firewall rules (IPv6)', metrics_records_ipv6, 'bytes', ['name', 'log'])
yield firewall_raw_metrics_ipv6
# Helpers # Helpers
@staticmethod @staticmethod
def metric_record(router_entry, firewall_record): def metric_record(router_entry, firewall_record):

View File

@@ -0,0 +1,40 @@
# coding=utf8
# Copyright (c) 2020 Arseniy Kuznetsov
##
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
##
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
from mktxp.collector.base_collector import BaseCollector
from mktxp.datasource.ipv6_neighbor_ds import IPv6NeighborDataSource
class IPv6NeighborCollector(BaseCollector):
'''IPv6 Neighbor Collector'''
@staticmethod
def collect(router_entry):
if not router_entry.config_entry.ipv6_neighbor:
return
metric_labels = ['address', 'interface', 'mac_address', 'status']
records = IPv6NeighborDataSource.metric_records(
router_entry,
metric_labels=metric_labels
)
metrics = BaseCollector.gauge_collector(
'ipv6_neighbor_info',
'Reachable IPv6 neighbors',
records,
'ipv6_neighbor',
metric_labels=metric_labels
)
yield metrics

View File

@@ -1,43 +1,79 @@
# coding=utf8 # coding=utf8
## Copyright (c) 2020 Arseniy Kuznetsov # Copyright (c) 2020 Arseniy Kuznetsov
## #
## This program is free software; you can redistribute it and/or # This program is free software; you can redistribute it and/or
## modify it under the terms of the GNU General Public License # modify it under the terms of the GNU General Public License
## as published by the Free Software Foundation; either version 2 # as published by the Free Software Foundation; either version 2
## of the License, or (at your option) any later version. # of the License, or (at your option) any later version.
## #
## This program is distributed in the hope that it will be useful, # This program is distributed in the hope that it will be useful,
## but WITHOUT ANY WARRANTY; without even the implied warranty of # but WITHOUT ANY WARRANTY; without even the implied warranty of
## MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
## GNU General Public License for more details. # GNU General Public License for more details.
from mktxp.datasource.base_ds import BaseDSProcessor from mktxp.datasource.base_ds import BaseDSProcessor
from mktxp.flow.router_entry import RouterEntry
TRANSLATION_TABLE = {
'comment': lambda value: value if value else '',
'log': lambda value: '1' if value == 'true' else '0'
}
class FirewallMetricsDataSource: class FirewallMetricsDataSource:
''' Firewall Metrics data provider ''' Firewall Metrics data provider
This datasource supports both IPv4 and IPv6
''' '''
@staticmethod @staticmethod
def metric_records(router_entry, *, metric_labels = None, raw = False, matching_only = True): def _get_records(router_entry: RouterEntry, filter_path: str, args: dict, matching_only: bool = False):
"""
Get firewall records from a Mikrotik ROS device.
:param router_entry: The ROS API entry used to connect to the API
:param filter_path: The path to query the records for (e.g. /ip/firewall/filter)
:param args: A dictionary of arguments to pass to the print function used for export.
Looks like: '{'stats': '', 'all': ''}'
"""
firewall_records = router_entry.api_connection.router_api().get_resource(filter_path).call('print', args)
if matching_only:
firewall_records = [record for record in firewall_records if int(record.get('bytes', '0')) > 0]
return firewall_records
@staticmethod
def metric_records_ipv4(router_entry, *, metric_labels=None, raw=False, matching_only=True):
if metric_labels is None: if metric_labels is None:
metric_labels = [] metric_labels = []
try: try:
filter_path = '/ip/firewall/filter' if not raw else '/ip/firewall/raw' filter_path = '/ip/firewall/filter' if not raw else '/ip/firewall/raw'
firewall_records = router_entry.api_connection.router_api().get_resource(filter_path).call('print', {'stats':'', 'all':''}) firewall_records = FirewallMetricsDataSource._get_records(
if matching_only: router_entry,
firewall_records = [record for record in firewall_records if int(record.get('bytes', '0')) > 0] filter_path,
{'stats': '', 'all': ''},
matching_only=matching_only
)
# translation rules return BaseDSProcessor.trimmed_records(router_entry, router_records=firewall_records, metric_labels=metric_labels, translation_table=TRANSLATION_TABLE)
translation_table = {}
if 'comment' in metric_labels:
translation_table['comment'] = lambda value: value if value else ''
if 'log' in metric_labels:
translation_table['log'] = lambda value: '1' if value == 'true' else '0'
return BaseDSProcessor.trimmed_records(router_entry, router_records = firewall_records, metric_labels = metric_labels, translation_table = translation_table)
except Exception as exc: except Exception as exc:
print(f'Error getting firewall filters info from router{router_entry.router_name}@{router_entry.config_entry.hostname}: {exc}') print(
f'Error getting firewall filters info from router{router_entry.router_name}@{router_entry.config_entry.hostname}: {exc}'
)
return None return None
@staticmethod
def metric_records_ipv6(router_entry, metric_labels=None, raw=False, matching_only=True):
metric_labels = metric_labels or []
try:
filter_path = '/ipv6/firewall/filter' if not raw else '/ipv6/firewall/raw'
firewall_records = FirewallMetricsDataSource._get_records(
router_entry,
filter_path,
{'stats': ''},
matching_only=matching_only
)
return BaseDSProcessor.trimmed_records(router_entry, router_records=firewall_records, metric_labels=metric_labels, translation_table=TRANSLATION_TABLE)
except Exception as exc:
print(
f'Error getting IPv6 firewall filters info from router{router_entry.router_name}@{router_entry.config_entry.hostname}: {exc}'
)
return None

View File

@@ -0,0 +1,23 @@
# coding=utf8
# Copyright (c) 2020 Arseniy Kuznetsov
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
from mktxp.datasource.base_ds import BaseDSProcessor
class IPv6NeighborDataSource:
def metric_records(router_entry, metric_labels):
metric_labels = metric_labels or []
records = router_entry.api_connection.router_api().get_resource('/ipv6/neighbor').get(status='reachable')
return BaseDSProcessor.trimmed_records(router_entry, router_records=records, metric_labels=metric_labels, )

View File

@@ -19,6 +19,7 @@ from mktxp.collector.interface_collector import InterfaceCollector
from mktxp.collector.health_collector import HealthCollector from mktxp.collector.health_collector import HealthCollector
from mktxp.collector.identity_collector import IdentityCollector from mktxp.collector.identity_collector import IdentityCollector
from mktxp.collector.public_ip_collector import PublicIPAddressCollector from mktxp.collector.public_ip_collector import PublicIPAddressCollector
from mktxp.collector.ipv6_neighbor_collector import IPv6NeighborCollector
from mktxp.collector.monitor_collector import MonitorCollector from mktxp.collector.monitor_collector import MonitorCollector
from mktxp.collector.poe_collector import POECollector from mktxp.collector.poe_collector import POECollector
from mktxp.collector.netwatch_collector import NetwatchCollector from mktxp.collector.netwatch_collector import NetwatchCollector
@@ -46,6 +47,8 @@ class CollectorRegistry:
self.register('HealthCollector', HealthCollector.collect) self.register('HealthCollector', HealthCollector.collect)
self.register('PublicIPAddressCollector', PublicIPAddressCollector.collect) self.register('PublicIPAddressCollector', PublicIPAddressCollector.collect)
self.register('IPv6NeighborCollector', IPv6NeighborCollector.collect)
self.register('DHCPCollector', DHCPCollector.collect) self.register('DHCPCollector', DHCPCollector.collect)
self.register('IPConnectionCollector', IPConnectionCollector.collect) self.register('IPConnectionCollector', IPConnectionCollector.collect)
self.register('PoolCollector', PoolCollector.collect) self.register('PoolCollector', PoolCollector.collect)

View File

@@ -31,6 +31,7 @@ class RouterEntry:
'SystemResourceCollector': 0, 'SystemResourceCollector': 0,
'HealthCollector': 0, 'HealthCollector': 0,
'PublicIPAddressCollector': 0, 'PublicIPAddressCollector': 0,
'IPv6NeighborCollector': 0,
'DHCPCollector': 0, 'DHCPCollector': 0,
'PoolCollector': 0, 'PoolCollector': 0,
'IPConnectionCollector': 0, 'IPConnectionCollector': 0,