2019-11-12 13:35:19 +08:00
|
|
|
#include <stdio.h>
|
|
|
|
|
#include <string.h>
|
|
|
|
|
#include <stdlib.h>
|
|
|
|
|
#include <assert.h>
|
2019-12-09 18:58:05 +08:00
|
|
|
#include <time.h>
|
2019-11-12 13:35:19 +08:00
|
|
|
#include <sys/socket.h>
|
|
|
|
|
#include <netinet/in.h>
|
|
|
|
|
#include <arpa/inet.h>
|
|
|
|
|
#include <net/if.h>
|
|
|
|
|
#include <sys/types.h>
|
|
|
|
|
#include <sys/ioctl.h>
|
|
|
|
|
#include <unistd.h>
|
2020-09-01 11:35:49 +08:00
|
|
|
#include <pthread.h>
|
2021-04-07 02:36:51 +00:00
|
|
|
#include <arpa/inet.h>
|
2019-11-12 13:35:19 +08:00
|
|
|
|
|
|
|
|
#include <MESA/stream.h>
|
|
|
|
|
#include <MESA/MESA_prof_load.h>
|
|
|
|
|
#include <MESA/MESA_handle_logger.h>
|
|
|
|
|
|
2020-11-14 15:50:44 +06:00
|
|
|
#include "app_label.h"
|
2019-12-09 18:58:05 +08:00
|
|
|
#include "tsg_entry.h"
|
2019-11-12 13:35:19 +08:00
|
|
|
#include "tsg_send_log.h"
|
|
|
|
|
#include "tsg_send_log_internal.h"
|
|
|
|
|
|
2021-08-13 19:45:18 +08:00
|
|
|
#include "rapidjson/document.h" // rapidjson's DOM-style API
|
|
|
|
|
#include "rapidjson/prettywriter.h" // for stringify JSON
|
|
|
|
|
#include "rapidjson/stringbuffer.h"
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
using namespace rapidjson;
|
|
|
|
|
using namespace std;
|
|
|
|
|
|
|
|
|
|
|
2020-07-29 18:51:58 +08:00
|
|
|
char TSG_SEND_LOG_VERSION_20200729=0;
|
2019-12-09 18:58:05 +08:00
|
|
|
struct tsg_log_instance_t *g_tsg_log_instance;
|
2019-11-12 13:35:19 +08:00
|
|
|
|
2021-08-13 19:45:18 +08:00
|
|
|
struct TLD_handle_t
|
|
|
|
|
{
|
|
|
|
|
int thread_id;
|
2021-11-13 13:27:59 +03:00
|
|
|
MemoryPoolAllocator<> *valueAllocator;
|
2021-08-13 19:45:18 +08:00
|
|
|
Document *document;
|
|
|
|
|
};
|
|
|
|
|
|
2019-12-09 18:58:05 +08:00
|
|
|
const id2field_t tld_type[TLD_TYPE_MAX]={{TLD_TYPE_UNKNOWN, TLD_TYPE_UNKNOWN, "UNKOWN"},
|
|
|
|
|
{TLD_TYPE_LONG, TLD_TYPE_LONG, "LONG"},
|
|
|
|
|
{TLD_TYPE_STRING, TLD_TYPE_STRING, "STRING"},
|
2020-05-18 19:04:26 +08:00
|
|
|
{TLD_TYPE_FILE, TLD_TYPE_FILE, "FILE"},
|
|
|
|
|
{TLD_TYPE_TOPIC, TLD_TYPE_TOPIC, "TOPIC"}
|
2019-12-09 18:58:05 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
extern "C" int MESA_get_dev_ipv4(const char *device, int *ip_add);
|
|
|
|
|
|
2021-08-07 17:27:55 +08:00
|
|
|
static int string_cat(char *dst, int dst_len, char *src)
|
|
|
|
|
{
|
|
|
|
|
if(dst==NULL || dst_len<=0 || src==NULL)
|
|
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return snprintf(dst, dst_len, "%s", src);
|
|
|
|
|
}
|
|
|
|
|
|
2021-08-13 10:23:05 +00:00
|
|
|
#define add_number_member add_member
|
|
|
|
|
#define add_object_member add_member
|
|
|
|
|
|
|
|
|
|
#define add_member(handle, object, key, val) \
|
|
|
|
|
{ \
|
|
|
|
|
Value temp_key; \
|
|
|
|
|
temp_key.SetString((key), (handle)->document->GetAllocator()); \
|
|
|
|
|
(object)->AddMember(temp_key, (val), (handle)->document->GetAllocator()); \
|
|
|
|
|
}
|
|
|
|
|
|
2021-08-14 10:41:25 +08:00
|
|
|
static int copy_rapidjson(struct TLD_handle_t *_handle, char *field_name, const char *json_string)
|
2021-08-13 10:23:05 +00:00
|
|
|
{
|
|
|
|
|
Document nest_document;
|
|
|
|
|
nest_document.Parse(json_string);
|
|
|
|
|
|
|
|
|
|
Value p_object(kObjectType);
|
|
|
|
|
p_object.CopyFrom(nest_document, _handle->document->GetAllocator());
|
|
|
|
|
|
|
|
|
|
TLD_append(_handle, field_name, (void *)&p_object, TLD_TYPE_OBJECT);
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void add_str_member(struct TLD_handle_t *_handle, Value *object, const char *key, const char *val)
|
|
|
|
|
{
|
|
|
|
|
Value temp_key;
|
|
|
|
|
Value temp_val;
|
|
|
|
|
temp_key.SetString(key, _handle->document->GetAllocator());
|
|
|
|
|
temp_val.SetString(val, _handle->document->GetAllocator());
|
|
|
|
|
object->AddMember(temp_key, temp_val, _handle->document->GetAllocator());
|
|
|
|
|
}
|
|
|
|
|
|
2021-04-07 02:36:51 +00:00
|
|
|
static int is_tunnels(struct streaminfo *a_stream)
|
|
|
|
|
{
|
2021-04-20 14:37:00 +08:00
|
|
|
const struct streaminfo *ptmp = a_stream;
|
|
|
|
|
const struct streaminfo *pfather=NULL;
|
|
|
|
|
int is_tunnel=0;
|
|
|
|
|
|
|
|
|
|
while(ptmp)
|
2021-04-07 02:36:51 +00:00
|
|
|
{
|
2021-04-20 14:37:00 +08:00
|
|
|
pfather = ptmp->pfather;
|
|
|
|
|
switch(ptmp->addr.addrtype)
|
|
|
|
|
{
|
|
|
|
|
case ADDR_TYPE_GRE:
|
|
|
|
|
case ADDR_TYPE_VLAN:
|
|
|
|
|
case ADDR_TYPE_L2TP:
|
|
|
|
|
case ADDR_TYPE_PPTP:
|
|
|
|
|
case ADDR_TYPE_VXLAN:
|
|
|
|
|
case ADDR_TYPE_GPRS_TUNNEL:
|
|
|
|
|
case __ADDR_TYPE_IP_PAIR_V4:
|
|
|
|
|
case __ADDR_TYPE_IP_PAIR_V6:
|
|
|
|
|
is_tunnel=1;
|
|
|
|
|
break;
|
|
|
|
|
case ADDR_TYPE_MPLS:
|
|
|
|
|
if(ptmp->addr.mpls->s2c_layer_num==0 && ptmp->addr.mpls->c2s_layer_num==0)
|
|
|
|
|
{
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
is_tunnel=1;
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
ptmp = pfather;
|
2021-04-07 02:36:51 +00:00
|
|
|
}
|
|
|
|
|
|
2021-04-20 14:37:00 +08:00
|
|
|
return is_tunnel;
|
2021-04-07 02:36:51 +00:00
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
static int set_isn(struct TLD_handle_t *_handle, struct streaminfo *a_stream, char *field_name, enum MESA_stream_opt type)
|
2021-04-07 02:36:51 +00:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
int ret=0;
|
|
|
|
|
unsigned int isn=0;
|
|
|
|
|
int size=sizeof(unsigned long long);
|
|
|
|
|
|
|
|
|
|
size=sizeof(unsigned int);
|
|
|
|
|
ret=MESA_get_stream_opt(a_stream, type, &isn, &size);
|
|
|
|
|
if(ret==0)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, field_name, (void *)(long)isn, TLD_TYPE_LONG);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static int set_tcp_isn(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct streaminfo *a_stream)
|
|
|
|
|
{
|
|
|
|
|
if(a_stream->type==STREAM_TYPE_TCP)
|
|
|
|
|
{
|
|
|
|
|
switch(a_stream->dir)
|
|
|
|
|
{
|
|
|
|
|
case DIR_C2S:
|
|
|
|
|
set_isn(_handle, a_stream, _instance->id2field[LOG_COMMON_TCP_CLIENT_ISN].name, MSO_TCP_ISN_C2S);
|
|
|
|
|
break;
|
|
|
|
|
case DIR_S2C:
|
|
|
|
|
set_isn(_handle, a_stream, _instance->id2field[LOG_COMMON_TCP_SERVER_ISN].name, MSO_TCP_ISN_S2C);
|
|
|
|
|
break;
|
|
|
|
|
case DIR_DOUBLE:
|
|
|
|
|
set_isn(_handle, a_stream, _instance->id2field[LOG_COMMON_TCP_CLIENT_ISN].name, MSO_TCP_ISN_C2S);
|
|
|
|
|
set_isn(_handle, a_stream, _instance->id2field[LOG_COMMON_TCP_SERVER_ISN].name, MSO_TCP_ISN_S2C);
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
2021-04-20 14:37:00 +08:00
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
return 1;
|
|
|
|
|
}
|
2021-04-28 09:23:05 +00:00
|
|
|
|
2021-07-05 14:22:24 +08:00
|
|
|
static int set_linkinfo(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct streaminfo *a_stream)
|
|
|
|
|
{
|
2021-10-06 15:31:38 +08:00
|
|
|
const char *linkinfo=(const char *)stream_bridge_async_data_get(a_stream, _instance->mac_linkinfo_project_id);
|
2021-07-05 14:22:24 +08:00
|
|
|
if(linkinfo==NULL)
|
|
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
cJSON *item=NULL;
|
|
|
|
|
cJSON *object=cJSON_Parse(linkinfo);
|
|
|
|
|
if(object)
|
|
|
|
|
{
|
|
|
|
|
item=cJSON_GetObjectItem(object, "common_direction");
|
|
|
|
|
if(item!=NULL)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, (char *)"common_direction", (void *)(long)(item->valueint), TLD_TYPE_LONG);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
item=cJSON_GetObjectItem(object, "common_egress_link_id");
|
|
|
|
|
if(item!=NULL)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, (char *)"common_egress_link_id", (void *)(long)(item->valueint), TLD_TYPE_LONG);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
item=cJSON_GetObjectItem(object, "common_ingress_link_id");
|
|
|
|
|
if(item!=NULL)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, (char *)"common_ingress_link_id", (void *)(long)(item->valueint), TLD_TYPE_LONG);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
cJSON_Delete(object);
|
|
|
|
|
object=NULL;
|
|
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2021-08-07 17:27:55 +08:00
|
|
|
static int set_asn(struct TLD_handle_t *_handle, struct streaminfo *a_stream, char *field_name, struct asn_info *asn_info)
|
2021-04-28 09:23:05 +00:00
|
|
|
{
|
2021-08-07 17:27:55 +08:00
|
|
|
int len=0;
|
2021-04-28 09:23:05 +00:00
|
|
|
char buff[1024]={0};
|
2021-08-07 17:27:55 +08:00
|
|
|
int buff_len=sizeof(buff);
|
2021-04-28 09:23:05 +00:00
|
|
|
|
|
|
|
|
if(asn_info!=NULL)
|
|
|
|
|
{
|
2021-09-02 19:30:15 +08:00
|
|
|
len+=string_cat(buff+len, buff_len-len, asn_info->asn_id);
|
2021-08-07 17:27:55 +08:00
|
|
|
buff[len++]='(';
|
2021-09-02 19:30:15 +08:00
|
|
|
len+=string_cat(buff+len, buff_len-len, asn_info->organization);
|
2021-08-07 17:27:55 +08:00
|
|
|
buff[len++]=')';
|
2021-04-28 09:23:05 +00:00
|
|
|
TLD_append(_handle, field_name, (void *)buff, TLD_TYPE_STRING);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
2021-08-07 17:27:55 +08:00
|
|
|
static int set_location(struct TLD_handle_t *_handle, struct streaminfo *a_stream, char *field_name, struct location_info *location_info)
|
2021-04-28 09:23:05 +00:00
|
|
|
{
|
2021-08-07 17:27:55 +08:00
|
|
|
int len=0;
|
2021-04-28 09:23:05 +00:00
|
|
|
char buff[1024]={0};
|
2021-08-07 17:27:55 +08:00
|
|
|
int buff_len=sizeof(buff);
|
2021-04-28 09:23:05 +00:00
|
|
|
|
2022-02-10 02:46:49 +00:00
|
|
|
if(location_info==NULL)
|
2021-04-28 09:23:05 +00:00
|
|
|
{
|
2022-02-10 02:46:49 +00:00
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
len+=string_cat(buff+len, buff_len-len, location_info->country_full);
|
|
|
|
|
buff[len++]='.';
|
|
|
|
|
len+=string_cat(buff+len, buff_len-len, location_info->province_full);
|
|
|
|
|
buff[len++]='.';
|
|
|
|
|
len+=string_cat(buff+len, buff_len-len, location_info->city_full);
|
|
|
|
|
|
|
|
|
|
if(location_info->subdivision_addr!=NULL)
|
|
|
|
|
{
|
|
|
|
|
buff[len++]='.';
|
|
|
|
|
len+=string_cat(buff+len, buff_len-len, location_info->subdivision_addr);
|
2021-04-28 09:23:05 +00:00
|
|
|
}
|
2022-02-10 02:46:49 +00:00
|
|
|
|
|
|
|
|
TLD_append(_handle, field_name, (void *)buff, TLD_TYPE_STRING);
|
2021-04-28 09:23:05 +00:00
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
static int set_direction(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct streaminfo *a_stream)
|
|
|
|
|
{
|
|
|
|
|
int direction=0,i_or_e=0;
|
|
|
|
|
|
|
|
|
|
i_or_e=MESA_dir_link_to_human(a_stream->routedir);
|
|
|
|
|
switch(a_stream->curdir)
|
2021-04-07 02:36:51 +00:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
case DIR_C2S:
|
|
|
|
|
if(i_or_e=='E' || i_or_e=='e')
|
|
|
|
|
{
|
|
|
|
|
direction='E';
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
direction='I';
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
case DIR_S2C:
|
|
|
|
|
if(i_or_e=='E' || i_or_e=='e')
|
|
|
|
|
{
|
|
|
|
|
direction='I';
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
direction='E';
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
break;
|
2021-04-07 02:36:51 +00:00
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_DIRECTION].name, (void *)(long)direction, TLD_TYPE_LONG);
|
2021-04-07 02:36:51 +00:00
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
return 1;
|
2021-04-07 02:36:51 +00:00
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
static int set_address_list(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct streaminfo *a_stream)
|
2020-11-16 12:30:44 +06:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
int ret=0;
|
|
|
|
|
unsigned short tunnel_type=0;
|
|
|
|
|
char nest_addr_buf[1024];
|
|
|
|
|
int tunnel_type_size=sizeof(tunnel_type);
|
|
|
|
|
|
|
|
|
|
ret=MESA_get_stream_opt(a_stream, MSO_STREAM_TUNNEL_TYPE, &tunnel_type, &tunnel_type_size);
|
|
|
|
|
assert(ret==0);
|
|
|
|
|
if(tunnel_type==STREAM_TUNNLE_NON)
|
|
|
|
|
{
|
|
|
|
|
layer_addr_ntop_r(a_stream,nest_addr_buf, sizeof(nest_addr_buf));
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
stream_addr_list_ntop(a_stream,nest_addr_buf, sizeof(nest_addr_buf));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_ADDRESS_LIST].name, (void *)nest_addr_buf, TLD_TYPE_STRING);
|
|
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static int set_tuple4(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct streaminfo *a_stream)
|
|
|
|
|
{
|
|
|
|
|
int addr_type=0;
|
|
|
|
|
unsigned short c_port=0, s_port=0;
|
|
|
|
|
struct layer_addr_ipv4 *ipv4=NULL;
|
|
|
|
|
struct layer_addr_ipv6 *ipv6=NULL;
|
|
|
|
|
char server_ip[MAX_IPV4_LEN*8]={0};
|
|
|
|
|
char client_ip[MAX_IPV4_LEN*8]={0};
|
|
|
|
|
|
|
|
|
|
switch(a_stream->addr.addrtype)
|
2020-11-16 12:30:44 +06:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
case ADDR_TYPE_IPV4:
|
|
|
|
|
case __ADDR_TYPE_IP_PAIR_V4:
|
|
|
|
|
ipv4=a_stream->addr.ipv4;
|
|
|
|
|
addr_type=4;
|
|
|
|
|
c_port=ntohs(ipv4->source);
|
|
|
|
|
s_port=ntohs(ipv4->dest);
|
|
|
|
|
|
|
|
|
|
inet_ntop(AF_INET, (void *)&ipv4->saddr, client_ip, sizeof(client_ip));
|
|
|
|
|
inet_ntop(AF_INET, (void *)&ipv4->daddr, server_ip, sizeof(server_ip));
|
2020-11-16 12:30:44 +06:00
|
|
|
break;
|
2021-04-27 09:49:15 +00:00
|
|
|
case ADDR_TYPE_IPV6:
|
|
|
|
|
case __ADDR_TYPE_IP_PAIR_V6:
|
|
|
|
|
ipv6=a_stream->addr.ipv6;
|
|
|
|
|
addr_type=6;
|
|
|
|
|
c_port=ntohs(ipv6->source);
|
|
|
|
|
s_port=ntohs(ipv6->dest);
|
|
|
|
|
|
|
|
|
|
inet_ntop(AF_INET6, (void *)ipv6->saddr, client_ip, sizeof(client_ip));
|
|
|
|
|
inet_ntop(AF_INET6, (void *)ipv6->daddr, server_ip, sizeof(server_ip));
|
2020-11-16 12:30:44 +06:00
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_SERVER_IP].name, (void *)server_ip, TLD_TYPE_STRING);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_CLIENT_IP].name, (void *)client_ip, TLD_TYPE_STRING);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_SERVER_PORT].name, (void *)(long)s_port, TLD_TYPE_LONG);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_CLIENT_PORT].name, (void *)(long)c_port, TLD_TYPE_LONG);
|
|
|
|
|
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_STREAM_DIR].name, (void *)(long)a_stream->dir, TLD_TYPE_LONG);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_ADDRESS_TYPE].name, (void *)(long)addr_type, TLD_TYPE_LONG);
|
|
|
|
|
|
|
|
|
|
return 1;
|
2020-11-16 12:30:44 +06:00
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
static int set_duraction(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct streaminfo *a_stream)
|
2020-07-20 15:59:15 +08:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
int ret=0;
|
|
|
|
|
struct timespec tv;
|
|
|
|
|
long common_con_duration_ms=0;
|
|
|
|
|
unsigned long long create_time=0;
|
|
|
|
|
int size=sizeof(unsigned long long);
|
|
|
|
|
|
|
|
|
|
if(a_stream->ptcpdetail!=NULL)
|
2020-07-20 15:59:15 +08:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_START_TIME].name, (void *)(a_stream->ptcpdetail->createtime), TLD_TYPE_LONG);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_END_TIME].name, (void *)(a_stream->ptcpdetail->lastmtime), TLD_TYPE_LONG);
|
|
|
|
|
|
|
|
|
|
ret=MESA_get_stream_opt(a_stream, MSO_STREAM_CREATE_TIMESTAMP_MS, (void *)&create_time, &size);
|
|
|
|
|
if(ret>=0)
|
2020-07-20 15:59:15 +08:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
clock_gettime(CLOCK_REALTIME, &tv);
|
|
|
|
|
common_con_duration_ms=tv.tv_sec*1000+tv.tv_nsec/1000/1000 - create_time;
|
2020-07-20 15:59:15 +08:00
|
|
|
}
|
2021-04-27 09:49:15 +00:00
|
|
|
|
|
|
|
|
if(common_con_duration_ms>0)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_CON_DURATION_MS].name, (void *)(common_con_duration_ms), TLD_TYPE_LONG);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
time_t cur_time=time(NULL);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_START_TIME].name, (void *)cur_time, TLD_TYPE_LONG);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_END_TIME].name, (void *)cur_time, TLD_TYPE_LONG);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_CON_DURATION_MS].name, (void *)(common_con_duration_ms), TLD_TYPE_LONG);
|
2020-07-20 15:59:15 +08:00
|
|
|
}
|
2021-04-27 09:49:15 +00:00
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
2020-07-20 15:59:15 +08:00
|
|
|
|
2021-08-07 17:27:55 +08:00
|
|
|
static int set_subscriber_id(struct TLD_handle_t *_handle, char *field_name, struct subscribe_id_info *subscriber)
|
|
|
|
|
{
|
|
|
|
|
if(subscriber!=NULL && subscriber->subscribe_id!=NULL)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, field_name, (void *)subscriber->subscribe_id, TLD_TYPE_STRING);
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2021-04-28 09:23:05 +00:00
|
|
|
static int set_fqdn_category(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct streaminfo *a_stream, unsigned int *category_id, int category_id_num)
|
|
|
|
|
{
|
2021-06-03 13:49:12 +08:00
|
|
|
int i=0;
|
|
|
|
|
if(category_id_num<=0 || category_id==NULL)
|
2021-04-28 09:23:05 +00:00
|
|
|
{
|
2021-06-03 13:49:12 +08:00
|
|
|
return 0;
|
2021-04-28 09:23:05 +00:00
|
|
|
}
|
2021-06-03 13:49:12 +08:00
|
|
|
|
2021-08-13 10:23:05 +00:00
|
|
|
Value array(kArrayType);
|
2021-06-03 13:49:12 +08:00
|
|
|
for(i=0; i<category_id_num; i++)
|
2021-04-28 09:23:05 +00:00
|
|
|
{
|
2021-08-13 10:23:05 +00:00
|
|
|
array.PushBack(category_id[i], _handle->document->GetAllocator());
|
2021-04-28 09:23:05 +00:00
|
|
|
}
|
|
|
|
|
|
2021-08-13 10:23:05 +00:00
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_FQDN_CATEGORY].name, &array, TLD_TYPE_OBJECT);
|
2021-06-03 13:49:12 +08:00
|
|
|
|
2021-04-28 09:23:05 +00:00
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
2021-05-19 07:10:25 +00:00
|
|
|
static int set_umts_user_info(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct streaminfo *a_stream, struct umts_user_info *user_info)
|
|
|
|
|
{
|
|
|
|
|
if(user_info==NULL)
|
|
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if(user_info->apn!=NULL)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_GTP_APN].name, (void *)user_info->apn, TLD_TYPE_STRING);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if(user_info->imsi!=NULL)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_GTP_IMSI].name, (void *)user_info->imsi, TLD_TYPE_STRING);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if(user_info->imei!=NULL)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_GTP_IMEI].name, (void *)user_info->imei, TLD_TYPE_STRING);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if(user_info->msisdn!=NULL)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_GTP_MSISDN].name, (void *)user_info->msisdn, TLD_TYPE_STRING); //phone number
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
2019-12-09 18:58:05 +08:00
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
static int set_packet_bytes(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct streaminfo *a_stream)
|
2019-11-12 13:35:19 +08:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
struct tcp_flow_stat *tflow_project=NULL;
|
|
|
|
|
struct udp_flow_stat *uflow_project=NULL;
|
|
|
|
|
|
|
|
|
|
switch(a_stream->type)
|
2019-12-09 18:58:05 +08:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
case STREAM_TYPE_TCP:
|
|
|
|
|
tflow_project=(struct tcp_flow_stat *)project_req_get_struct(a_stream, _instance->tcp_flow_project_id);
|
|
|
|
|
if(tflow_project!=NULL)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_S2C_PKT_NUM].name, (void *)(long)tflow_project->S2C_all_pkt, TLD_TYPE_LONG);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_S2C_BYTE_NUM].name, (void *)(long)tflow_project->S2C_all_byte_raw, TLD_TYPE_LONG);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_C2S_PKT_NUM].name, (void *)(long)tflow_project->C2S_all_pkt, TLD_TYPE_LONG);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_C2S_BYTE_NUM].name, (void *)(long)tflow_project->C2S_all_byte_raw, TLD_TYPE_LONG);
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
case STREAM_TYPE_UDP:
|
|
|
|
|
uflow_project=(struct udp_flow_stat *)project_req_get_struct(a_stream, _instance->udp_flow_project_id);
|
|
|
|
|
if(uflow_project!=NULL)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_S2C_PKT_NUM].name, (void *)(long)uflow_project->S2C_pkt, TLD_TYPE_LONG);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_S2C_BYTE_NUM].name, (void *)(long)uflow_project->S2C_all_byte_raw, TLD_TYPE_LONG);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_C2S_PKT_NUM].name, (void *)(long)uflow_project->C2S_pkt, TLD_TYPE_LONG);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_C2S_BYTE_NUM].name, (void *)(long)uflow_project->C2S_all_byte_raw, TLD_TYPE_LONG);
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
break;
|
2019-12-09 18:58:05 +08:00
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
return 1;
|
2019-11-12 13:35:19 +08:00
|
|
|
}
|
|
|
|
|
|
2021-07-05 14:22:24 +08:00
|
|
|
static int set_userdefine_app(struct TLD_handle_t *_handle, char *field_name, struct app_identify_result *result, TLD_TYPE type)
|
|
|
|
|
{
|
|
|
|
|
if(result==NULL || result->app_id_num<=0)
|
|
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int i=0;
|
|
|
|
|
char app_name[256]={0};
|
|
|
|
|
|
2021-08-13 10:23:05 +00:00
|
|
|
Value array(kArrayType);
|
2021-07-05 14:22:24 +08:00
|
|
|
for(i=0; i<result->app_id_num; i++)
|
|
|
|
|
{
|
|
|
|
|
memset(app_name, 0, sizeof(app_name));
|
|
|
|
|
tsg_app_id2name(result->app_id[i], app_name, sizeof(app_name), 1);
|
|
|
|
|
if(strnlen(app_name, sizeof(app_name)) > 0)
|
|
|
|
|
{
|
2021-08-13 10:23:05 +00:00
|
|
|
Value app_name_str;
|
|
|
|
|
app_name_str.SetString(app_name, _handle->document->GetAllocator());
|
|
|
|
|
array.PushBack(app_name_str, _handle->document->GetAllocator());
|
2021-07-05 14:22:24 +08:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2021-08-13 10:23:05 +00:00
|
|
|
TLD_append(_handle, field_name, &array, TLD_TYPE_OBJECT);
|
2021-07-05 14:22:24 +08:00
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
static int get_l7_protocol(struct app_identify_result *result, char *protocol_list, int protocol_list_len, int *flag)
|
2019-11-12 13:35:19 +08:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
int i=0,offset=0;
|
|
|
|
|
char *name=NULL;
|
|
|
|
|
|
|
|
|
|
if((*flag)==1)
|
|
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
2019-12-09 18:58:05 +08:00
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
for(i=0; i<result->app_id_num; i++)
|
2019-12-09 18:58:05 +08:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
(*flag)=1;
|
|
|
|
|
name=tsg_l7_protocol_id2name(result->app_id[i]);
|
|
|
|
|
if(name!=NULL)
|
2019-12-09 18:58:05 +08:00
|
|
|
{
|
2021-05-12 16:34:00 +08:00
|
|
|
if(i>0 && offset>0 && (protocol_list_len-offset)>0)
|
|
|
|
|
{
|
|
|
|
|
protocol_list[offset]='.';
|
|
|
|
|
offset++;
|
|
|
|
|
}
|
2021-04-27 09:49:15 +00:00
|
|
|
offset+=snprintf(protocol_list+offset, protocol_list_len-offset, "%s", name);
|
2019-12-09 18:58:05 +08:00
|
|
|
}
|
|
|
|
|
}
|
2021-04-27 09:49:15 +00:00
|
|
|
|
|
|
|
|
return 1;
|
2019-11-12 13:35:19 +08:00
|
|
|
}
|
|
|
|
|
|
2021-07-05 14:22:24 +08:00
|
|
|
static unsigned int get_max_app_id(unsigned int *app_id_array, int app_id_num)
|
|
|
|
|
{
|
2021-07-22 11:53:48 +08:00
|
|
|
if(app_id_num<=0)
|
|
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2021-07-05 14:22:24 +08:00
|
|
|
int i=0;
|
|
|
|
|
unsigned int max_app_id=app_id_array[0];
|
|
|
|
|
|
|
|
|
|
for(i=1; i< app_id_num; i++)
|
|
|
|
|
{
|
|
|
|
|
if(max_app_id<app_id_array[i])
|
|
|
|
|
{
|
|
|
|
|
max_app_id=app_id_array[i];
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
return max_app_id;
|
|
|
|
|
}
|
|
|
|
|
|
2021-06-03 11:48:36 +08:00
|
|
|
static int get_app_id(struct app_identify_result *result, unsigned int *app_id, unsigned int *surrogate_id, int *flag)
|
|
|
|
|
{
|
|
|
|
|
if(result->app_id_num>0 && (*flag)==0)
|
|
|
|
|
{
|
|
|
|
|
(*flag)=1;
|
|
|
|
|
(*app_id)=result->app_id[result->app_id_num-1];
|
|
|
|
|
(*surrogate_id)=result->surrogate_id[result->app_id_num-1];
|
|
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2021-08-13 10:23:05 +00:00
|
|
|
static int get_app_id_list(Value *app_id_object, struct TLD_handle_t *_handle, const char *field_name, struct app_identify_result *result)
|
2019-11-12 13:35:19 +08:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
int i=0;
|
2021-07-05 14:22:24 +08:00
|
|
|
|
|
|
|
|
if(result->app_id_num==0)
|
|
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
2021-05-11 17:19:41 +08:00
|
|
|
|
2021-08-13 10:23:05 +00:00
|
|
|
Value array(kArrayType);
|
2021-05-11 17:19:41 +08:00
|
|
|
for(i=0; i<result->app_id_num; i++)
|
|
|
|
|
{
|
2021-08-13 10:23:05 +00:00
|
|
|
Value object(kObjectType);
|
|
|
|
|
object.AddMember("app_id", result->app_id[i], _handle->document->GetAllocator());
|
|
|
|
|
object.AddMember("surrogate_id", result->surrogate_id[i], _handle->document->GetAllocator());
|
|
|
|
|
array.PushBack(object, _handle->document->GetAllocator());
|
2021-05-11 17:19:41 +08:00
|
|
|
}
|
2021-08-13 10:23:05 +00:00
|
|
|
add_object_member(_handle, app_id_object, field_name, array);
|
2021-07-05 14:22:24 +08:00
|
|
|
|
2021-05-11 17:19:41 +08:00
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
2021-07-05 14:22:24 +08:00
|
|
|
static int get_app_name_list(unsigned int *app_id_array, int app_id_num, char *app_name, int app_name_len, int *flag, int is_joint_parent)
|
2021-05-11 17:19:41 +08:00
|
|
|
{
|
|
|
|
|
int i=0;
|
|
|
|
|
int offset=0;
|
2021-04-27 09:49:15 +00:00
|
|
|
|
2021-07-22 11:53:48 +08:00
|
|
|
if((*flag)==1 || app_id_num<=0)
|
2021-04-27 09:49:15 +00:00
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
2019-11-12 13:35:19 +08:00
|
|
|
|
2021-07-22 11:53:48 +08:00
|
|
|
//for(i=0; i<app_id_num; i++)
|
|
|
|
|
for(i=app_id_num-1; i<app_id_num; i++)
|
2019-12-09 18:58:05 +08:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
(*flag)=1;
|
2021-05-11 17:19:41 +08:00
|
|
|
|
|
|
|
|
if(i>0 && offset>0 && (app_name_len-offset)>0)
|
|
|
|
|
{
|
|
|
|
|
app_name[offset]='.';
|
|
|
|
|
offset++;
|
|
|
|
|
}
|
|
|
|
|
|
2021-07-05 14:22:24 +08:00
|
|
|
offset+=tsg_app_id2name(app_id_array[i], app_name+offset, app_name_len-offset, is_joint_parent);
|
2019-12-09 18:58:05 +08:00
|
|
|
}
|
2019-11-12 13:35:19 +08:00
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
return 1;
|
2019-12-09 18:58:05 +08:00
|
|
|
}
|
2019-11-12 13:35:19 +08:00
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
static int set_app_id(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct streaminfo *a_stream)
|
2019-12-09 18:58:05 +08:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
int app_id_flag=0;
|
|
|
|
|
int l7_protocol_flag=0;
|
2021-05-11 17:19:41 +08:00
|
|
|
char app_name[512]={0};
|
2021-07-05 14:22:24 +08:00
|
|
|
unsigned int max_app_id=0;
|
2021-04-27 09:49:15 +00:00
|
|
|
char protocol_list[256]={0};
|
2021-07-05 14:22:24 +08:00
|
|
|
|
2021-06-03 11:48:36 +08:00
|
|
|
unsigned int one_app_id=0;
|
|
|
|
|
unsigned int one_surrogate_id=0;
|
2021-04-27 09:49:15 +00:00
|
|
|
struct gather_app_result *label=NULL;
|
2019-12-09 18:58:05 +08:00
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
label=(struct gather_app_result *)project_req_get_struct(a_stream, g_tsg_para.gather_app_project_id);
|
2021-05-11 17:19:41 +08:00
|
|
|
if(label==NULL)
|
2021-05-13 18:14:07 +08:00
|
|
|
{
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_L7_PROTOCOL].name, (void *)_instance->l7_unknown_name, TLD_TYPE_STRING);
|
2021-05-11 17:19:41 +08:00
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
get_l7_protocol(&(label->result[ORIGIN_BASIC_PROTOCOL]), protocol_list, sizeof(protocol_list), &l7_protocol_flag);
|
|
|
|
|
if(l7_protocol_flag==1)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_L7_PROTOCOL].name, (void *)protocol_list, TLD_TYPE_STRING);
|
|
|
|
|
}
|
2021-05-13 18:14:07 +08:00
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_L7_PROTOCOL].name, (void *)_instance->l7_unknown_name, TLD_TYPE_STRING);
|
|
|
|
|
}
|
2021-04-27 09:49:15 +00:00
|
|
|
|
2021-06-03 11:48:36 +08:00
|
|
|
if(_instance->app_id_type==0) // int
|
|
|
|
|
{
|
|
|
|
|
get_app_id(&(label->result[ORIGIN_USER_DEFINE]), &one_app_id, &one_surrogate_id, &app_id_flag);
|
|
|
|
|
get_app_id(&(label->result[ORIGIN_DKPT]), &one_app_id, &one_surrogate_id, &app_id_flag);
|
|
|
|
|
get_app_id(&(label->result[ORIGIN_QM_ENGINE]), &one_app_id, &one_surrogate_id, &app_id_flag);
|
|
|
|
|
|
|
|
|
|
if(app_id_flag==1)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_APP_ID].name, (void *)(long)one_app_id, TLD_TYPE_LONG);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_APP_SURROGATE_ID].name, (void *)(long)one_surrogate_id, TLD_TYPE_LONG);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
else //string
|
|
|
|
|
{
|
2021-07-05 14:22:24 +08:00
|
|
|
set_userdefine_app(_handle, _instance->id2field[LOG_COMMON_USERDEFINE_APP].name, &(label->result[ORIGIN_USER_DEFINE]), TLD_TYPE_LONG);
|
|
|
|
|
|
|
|
|
|
max_app_id=get_max_app_id(label->result[ORIGIN_USER_DEFINE].app_id, label->result[ORIGIN_USER_DEFINE].app_id_num);
|
|
|
|
|
if(max_app_id>0)
|
|
|
|
|
{
|
2021-07-22 11:53:48 +08:00
|
|
|
get_app_name_list(&max_app_id, 1, app_name, sizeof(app_name), &app_id_flag, 0);
|
2021-07-05 14:22:24 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if(app_id_flag!=1)
|
|
|
|
|
{
|
2021-07-22 11:53:48 +08:00
|
|
|
get_app_name_list(label->result[ORIGIN_BUILT_IN].app_id, label->result[ORIGIN_BUILT_IN].app_id_num, app_name, sizeof(app_name), &app_id_flag, 0);
|
2021-07-05 14:22:24 +08:00
|
|
|
}
|
2021-05-11 17:19:41 +08:00
|
|
|
|
2021-06-03 11:48:36 +08:00
|
|
|
if(app_id_flag!=1)
|
|
|
|
|
{
|
2021-07-05 14:22:24 +08:00
|
|
|
get_app_name_list(label->result[ORIGIN_DKPT].app_id, label->result[ORIGIN_DKPT].app_id_num, app_name, sizeof(app_name), &app_id_flag, 0);
|
2021-06-03 11:48:36 +08:00
|
|
|
}
|
2021-05-11 17:19:41 +08:00
|
|
|
|
2021-06-03 11:48:36 +08:00
|
|
|
if(app_id_flag!=1)
|
|
|
|
|
{
|
2021-07-05 14:22:24 +08:00
|
|
|
get_app_name_list(label->result[ORIGIN_QM_ENGINE].app_id, label->result[ORIGIN_QM_ENGINE].app_id_num, app_name, sizeof(app_name), &app_id_flag, 0);
|
2021-06-03 11:48:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if(app_id_flag==1)
|
|
|
|
|
{
|
2022-01-06 23:33:37 +03:00
|
|
|
if(!(TLD_search(_handle, _instance->id2field[LOG_COMMON_APP_LABEL].name)))
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_APP_LABEL].name, (void *)app_name, TLD_TYPE_STRING);
|
|
|
|
|
}
|
|
|
|
|
|
2021-11-24 21:40:10 +03:00
|
|
|
Value app_id_object(kObjectType);
|
|
|
|
|
get_app_id_list(&app_id_object, _handle, "USER_DEFINE", &(label->result[ORIGIN_USER_DEFINE]));
|
|
|
|
|
get_app_id_list(&app_id_object, _handle, "BUILT_IN", &(label->result[ORIGIN_BUILT_IN]));
|
|
|
|
|
get_app_id_list(&app_id_object, _handle, "DKPT", &(label->result[ORIGIN_DKPT]));
|
|
|
|
|
get_app_id_list(&app_id_object, _handle, "THIRD", &(label->result[ORIGIN_QM_ENGINE]));
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_APP_ID].name, &app_id_object, TLD_TYPE_OBJECT);
|
2021-06-03 11:48:36 +08:00
|
|
|
}
|
2021-05-11 17:19:41 +08:00
|
|
|
}
|
2021-06-22 07:01:46 +00:00
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
2021-08-13 10:23:05 +00:00
|
|
|
static int set_vlan(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct single_layer_vlan_addr *vlan_addr, int layer_num, Value *tunnel_object, tsg_log_field_id_t id)
|
2021-04-27 09:49:15 +00:00
|
|
|
{
|
|
|
|
|
if(layer_num==0)
|
2019-11-12 13:35:19 +08:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
return 0;
|
2019-11-12 13:35:19 +08:00
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
int i=0;
|
2021-08-13 10:23:05 +00:00
|
|
|
Value vlan_array(kArrayType);
|
2021-04-27 09:49:15 +00:00
|
|
|
for(i=0; i<layer_num; i++)
|
2019-12-09 18:58:05 +08:00
|
|
|
{
|
2021-08-13 10:23:05 +00:00
|
|
|
vlan_array.PushBack(ntohs(vlan_addr[i].VID), _handle->document->GetAllocator());
|
2019-12-09 18:58:05 +08:00
|
|
|
}
|
2021-08-13 10:23:05 +00:00
|
|
|
add_object_member(_handle, tunnel_object, _instance->id2field[id].name, vlan_array);
|
2021-04-27 09:49:15 +00:00
|
|
|
|
|
|
|
|
return 1;
|
2019-12-09 18:58:05 +08:00
|
|
|
}
|
2019-11-12 13:35:19 +08:00
|
|
|
|
2021-08-13 10:23:05 +00:00
|
|
|
static int set_mpls(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct single_layer_mpls_addr *mpls_addr, int layer_num, Value *tunnel_object, tsg_log_field_id_t id)
|
2019-12-09 18:58:05 +08:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
if(layer_num==0)
|
|
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int i=0;
|
2021-08-13 10:23:05 +00:00
|
|
|
Value mpls_array(kArrayType);
|
2021-04-27 09:49:15 +00:00
|
|
|
for(i=0; i<layer_num; i++)
|
|
|
|
|
{
|
2021-08-13 10:23:05 +00:00
|
|
|
mpls_array.PushBack(ntohl(mpls_addr[i].label), _handle->document->GetAllocator());
|
2021-04-27 09:49:15 +00:00
|
|
|
}
|
2021-08-13 10:23:05 +00:00
|
|
|
add_object_member(_handle, tunnel_object, _instance->id2field[id].name, mpls_array);
|
2021-04-27 09:49:15 +00:00
|
|
|
|
|
|
|
|
return 1;
|
2019-12-09 18:58:05 +08:00
|
|
|
}
|
|
|
|
|
|
2021-11-20 11:49:18 +03:00
|
|
|
static int set_l2tp(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct layer_addr_l2tp *l2tp_addr, Value *object)
|
|
|
|
|
{
|
|
|
|
|
if(l2tp_addr==NULL || object==NULL)
|
|
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
struct layer_addr_l2tp_v2_t *l2tp_v2=NULL;
|
|
|
|
|
|
|
|
|
|
switch(l2tp_addr->version)
|
|
|
|
|
{
|
|
|
|
|
case 2:
|
|
|
|
|
l2tp_v2=&(l2tp_addr->l2tpun.l2tp_addr_v2);
|
|
|
|
|
add_str_member(_handle, object, _instance->id2field[LOG_COMMON_L2TP_VERSION].name, "v2");
|
|
|
|
|
add_number_member(_handle, object, _instance->id2field[LOG_COMMON_L2TP_LAC2LNS_TUNNEL_ID].name, ntohs(l2tp_v2->tunnelid_C2S));
|
|
|
|
|
add_number_member(_handle, object, _instance->id2field[LOG_COMMON_L2TP_LNS2LAC_TUNNEL_ID].name, ntohs(l2tp_v2->tunnelid_S2C));
|
|
|
|
|
add_number_member(_handle, object, _instance->id2field[LOG_COMMON_L2TP_LAC2LNS_SESSION_ID].name, ntohs(l2tp_v2->sessionid_C2S));
|
|
|
|
|
add_number_member(_handle, object, _instance->id2field[LOG_COMMON_L2TP_LNS2LAC_SESSION_ID].name, ntohs(l2tp_v2->sessionid_S2C));
|
|
|
|
|
break;
|
|
|
|
|
case 3:
|
|
|
|
|
add_str_member(_handle, object, _instance->id2field[LOG_COMMON_L2TP_VERSION].name, "v3");
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
static int mac_to_string(unsigned char *mac, char *buff)
|
|
|
|
|
{
|
|
|
|
|
int i=0,len=0;
|
2020-11-15 11:18:28 +06:00
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
for(i=0; i<6; i++)
|
2020-11-15 11:18:28 +06:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
len+=sprintf(buff+len, "%02x:", mac[i]);
|
2020-11-15 11:18:28 +06:00
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
buff[len-1]='\0';
|
|
|
|
|
|
2020-11-15 11:18:28 +06:00
|
|
|
return 0;
|
|
|
|
|
}
|
2019-12-09 18:58:05 +08:00
|
|
|
|
2021-08-13 10:23:05 +00:00
|
|
|
static int set_link_mac(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct layer_addr_mac *mac, Value *tunnel_object)
|
2021-04-07 02:36:51 +00:00
|
|
|
{
|
2021-05-08 15:32:39 +08:00
|
|
|
int flag=0;
|
2021-04-20 14:37:00 +08:00
|
|
|
char default_mac[6]={0,0,0,0,0,0};
|
2021-05-08 15:32:39 +08:00
|
|
|
char c2s_source_mac[128]={0};
|
|
|
|
|
char c2s_dest_mac[128]={0};
|
|
|
|
|
char s2c_source_mac[128]={0};
|
|
|
|
|
char s2c_dest_mac[128]={0};
|
2021-04-20 14:37:00 +08:00
|
|
|
|
|
|
|
|
if((memcmp(mac->src_addr.h_source, default_mac, 6)))
|
|
|
|
|
{
|
2021-05-08 15:32:39 +08:00
|
|
|
flag|=1;
|
|
|
|
|
mac_to_string(mac->src_addr.h_source, c2s_source_mac);
|
|
|
|
|
mac_to_string(mac->src_addr.h_dest, c2s_dest_mac);
|
2021-04-20 14:37:00 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if((memcmp(mac->dst_addr.h_source, default_mac, 6)))
|
|
|
|
|
{
|
2021-05-08 15:32:39 +08:00
|
|
|
flag|=2;
|
|
|
|
|
mac_to_string(mac->dst_addr.h_source, s2c_source_mac);
|
|
|
|
|
mac_to_string(mac->dst_addr.h_dest, s2c_dest_mac);
|
2021-04-20 14:37:00 +08:00
|
|
|
}
|
|
|
|
|
|
2021-05-08 15:32:39 +08:00
|
|
|
switch(flag)
|
|
|
|
|
{
|
2021-08-13 10:23:05 +00:00
|
|
|
case 1:
|
|
|
|
|
add_str_member(_handle, tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_SCHEMA_TYPE].name, "ETHERNET");
|
|
|
|
|
add_str_member(_handle, tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_MAC_SOURCE].name, c2s_source_mac);
|
|
|
|
|
add_str_member(_handle, tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_MAC_DEST].name, c2s_dest_mac);
|
2021-05-08 15:32:39 +08:00
|
|
|
break;
|
2021-08-13 10:23:05 +00:00
|
|
|
case 2:
|
|
|
|
|
add_str_member(_handle, tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_SCHEMA_TYPE].name, "ETHERNET");
|
|
|
|
|
add_str_member(_handle, tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_MAC_SOURCE].name, s2c_source_mac);
|
|
|
|
|
add_str_member(_handle, tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_MAC_DEST].name, s2c_dest_mac);
|
2021-05-08 15:32:39 +08:00
|
|
|
break;
|
2021-08-13 10:23:05 +00:00
|
|
|
case 3:
|
|
|
|
|
add_str_member(_handle, tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_SCHEMA_TYPE].name, "MULTIPATH_ETHERNET");
|
|
|
|
|
add_str_member(_handle, tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_C2S_MAC_SOURCE].name, c2s_source_mac);
|
|
|
|
|
add_str_member(_handle, tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_C2S_MAC_DEST].name, c2s_dest_mac);
|
|
|
|
|
add_str_member(_handle, tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_S2C_MAC_SOURCE].name, s2c_source_mac);
|
|
|
|
|
add_str_member(_handle, tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_S2C_MAC_DEST].name, s2c_dest_mac);
|
2021-05-08 15:32:39 +08:00
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
2021-04-20 14:37:00 +08:00
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
static int action2fs_id(int action)
|
|
|
|
|
{
|
|
|
|
|
switch(action)
|
|
|
|
|
{
|
|
|
|
|
case TSG_ACTION_DENY:
|
|
|
|
|
return TSG_FS2_ABORT_DENY;
|
|
|
|
|
break;
|
|
|
|
|
case TSG_ACTION_BYPASS:
|
|
|
|
|
return TSG_FS2_ABORT_ALLOW;
|
|
|
|
|
break;
|
|
|
|
|
case TSG_ACTION_MONITOR:
|
|
|
|
|
return TSG_FS2_ABORT_MONITOR;
|
|
|
|
|
break;
|
|
|
|
|
case TSG_ACTION_INTERCEPT:
|
|
|
|
|
return TSG_FS2_ABORT_INTERCEPT;
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
return TSG_FS2_ABORT_UNKNOWN;
|
|
|
|
|
break;
|
|
|
|
|
}
|
2021-04-20 14:37:00 +08:00
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
return TSG_FS2_ABORT_UNKNOWN;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int TLD_cancel(struct TLD_handle_t *handle)
|
2021-04-20 14:37:00 +08:00
|
|
|
{
|
2021-11-13 13:27:59 +03:00
|
|
|
long long length=0;
|
2021-08-13 10:23:05 +00:00
|
|
|
if (handle != NULL)
|
2021-04-20 14:37:00 +08:00
|
|
|
{
|
2021-08-13 10:23:05 +00:00
|
|
|
if (handle->document != NULL)
|
2021-04-27 09:49:15 +00:00
|
|
|
{
|
2021-11-13 13:27:59 +03:00
|
|
|
length=handle->document->GetAllocator().Size();
|
|
|
|
|
FS_operate(g_tsg_para.fs2_handle, g_tsg_para.fs2_field_id[TSG_FS2_FREE_RAPID_SIZE], 0, FS_OP_ADD, length);
|
|
|
|
|
|
|
|
|
|
length=handle->document->GetAllocator().Capacity();
|
|
|
|
|
FS_operate(g_tsg_para.fs2_handle, g_tsg_para.fs2_field_id[TSG_FS2_FREE_RAPID_CAPACITY], 0, FS_OP_ADD, length);
|
|
|
|
|
|
2021-08-13 10:23:05 +00:00
|
|
|
delete handle->document;
|
|
|
|
|
handle->document = NULL;
|
2021-11-13 13:27:59 +03:00
|
|
|
|
|
|
|
|
delete handle->valueAllocator;
|
|
|
|
|
handle->valueAllocator=NULL;
|
|
|
|
|
|
|
|
|
|
FS_operate(g_tsg_para.fs2_handle, g_tsg_para.fs2_field_id[TSG_FS2_FREE_LOG_HANDLE], 0, FS_OP_ADD, 1);
|
2021-04-27 09:49:15 +00:00
|
|
|
}
|
2021-11-13 13:27:59 +03:00
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
free(handle);
|
2021-11-13 13:27:59 +03:00
|
|
|
handle = NULL;
|
2021-04-20 14:37:00 +08:00
|
|
|
}
|
2021-04-07 02:36:51 +00:00
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2022-01-06 23:33:37 +03:00
|
|
|
int TLD_search(struct TLD_handle_t *handle, char *key)
|
|
|
|
|
{
|
|
|
|
|
if (handle != NULL && handle->document != NULL && key != NULL)
|
|
|
|
|
{
|
|
|
|
|
Value::ConstMemberIterator itr = handle->document->FindMember(key);
|
|
|
|
|
if (itr!=handle->document->MemberEnd())
|
|
|
|
|
{
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2021-08-13 10:23:05 +00:00
|
|
|
static void TLD_delete(struct TLD_handle_t *handle, char *key)
|
2021-04-27 09:49:15 +00:00
|
|
|
{
|
2021-08-13 10:23:05 +00:00
|
|
|
if (handle != NULL && handle->document != NULL && key != NULL)
|
2021-04-20 14:37:00 +08:00
|
|
|
{
|
2021-08-13 10:23:05 +00:00
|
|
|
handle->document->RemoveMember(key);
|
2021-04-20 14:37:00 +08:00
|
|
|
}
|
2021-04-07 02:36:51 +00:00
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
int TLD_append(struct TLD_handle_t *handle, char *key, void *value, TLD_TYPE type)
|
2021-04-20 14:37:00 +08:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
struct TLD_handle_t *_handle=handle;
|
|
|
|
|
|
|
|
|
|
if(_handle==NULL || key==NULL || (value==NULL && type!=TLD_TYPE_LONG))
|
2021-04-20 14:37:00 +08:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
return -1;
|
2021-04-20 14:37:00 +08:00
|
|
|
}
|
2021-04-27 09:49:15 +00:00
|
|
|
|
|
|
|
|
switch(type)
|
2021-04-20 14:37:00 +08:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
case TLD_TYPE_LONG:
|
2021-08-13 10:23:05 +00:00
|
|
|
add_number_member(_handle, _handle->document, key, (long)value);
|
2021-04-27 09:49:15 +00:00
|
|
|
break;
|
|
|
|
|
case TLD_TYPE_FILE:
|
|
|
|
|
break;
|
|
|
|
|
case TLD_TYPE_STRING:
|
2021-05-12 13:51:51 +08:00
|
|
|
if(strlen((char *)value)==0)
|
|
|
|
|
{
|
|
|
|
|
break;
|
|
|
|
|
}
|
2021-08-13 10:23:05 +00:00
|
|
|
add_str_member(_handle, _handle->document, key, (const char *)value);
|
2021-04-27 09:49:15 +00:00
|
|
|
break;
|
2021-08-13 10:23:05 +00:00
|
|
|
case TLD_TYPE_OBJECT:
|
|
|
|
|
add_object_member(handle, handle->document, key, ((Value &)(*(Value *)value)));
|
2021-04-27 09:49:15 +00:00
|
|
|
break;
|
2021-08-13 10:23:05 +00:00
|
|
|
case TLD_TYPE_CJSON:
|
|
|
|
|
printf("TLD_TYPE_CJSON is obsolete, please use TLD_TYPE_OBJECT !!!\n");
|
|
|
|
|
abort();
|
2021-04-27 09:49:15 +00:00
|
|
|
default:
|
|
|
|
|
return -1;
|
|
|
|
|
break;
|
2021-04-20 14:37:00 +08:00
|
|
|
}
|
2021-11-13 13:27:59 +03:00
|
|
|
|
|
|
|
|
FS_operate(g_tsg_para.fs2_handle, g_tsg_para.fs2_field_id[TSG_FS2_APPEND_LOG_HANDLE], 0, FS_OP_ADD, 1);
|
2021-04-27 09:49:15 +00:00
|
|
|
|
|
|
|
|
return 0;
|
2021-04-20 14:37:00 +08:00
|
|
|
}
|
|
|
|
|
|
2021-11-01 11:18:38 +08:00
|
|
|
struct TLD_handle_t *TLD_duplicate(struct TLD_handle_t *handle)
|
|
|
|
|
{
|
|
|
|
|
if (handle == NULL)
|
|
|
|
|
{
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
struct TLD_handle_t *_handle=(struct TLD_handle_t *)calloc(1, sizeof(struct TLD_handle_t));
|
|
|
|
|
_handle->thread_id = handle->thread_id;
|
|
|
|
|
_handle->document = new Document();
|
|
|
|
|
//_handle->document->SetObject();
|
|
|
|
|
|
|
|
|
|
_handle->document->CopyFrom(*handle->document, _handle->document->GetAllocator());
|
2021-11-13 13:27:59 +03:00
|
|
|
|
|
|
|
|
FS_operate(g_tsg_para.fs2_handle, g_tsg_para.fs2_field_id[TSG_FS2_DUP_LOG_HANDLE], 0, FS_OP_ADD, 1);
|
|
|
|
|
|
2021-11-01 11:18:38 +08:00
|
|
|
return _handle;
|
|
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
struct TLD_handle_t *TLD_create(int thread_id)
|
|
|
|
|
{
|
|
|
|
|
//struct _tld_handle *_handle=(struct _tld_handle *)dictator_malloc(thread_id, sizeof(struct _tld_handle));
|
|
|
|
|
|
|
|
|
|
struct TLD_handle_t *_handle=(struct TLD_handle_t *)calloc(1, sizeof(struct TLD_handle_t));
|
|
|
|
|
_handle->thread_id = thread_id;
|
2021-11-13 13:27:59 +03:00
|
|
|
|
|
|
|
|
_handle->valueAllocator =new MemoryPoolAllocator<>(g_tsg_log_instance->rapidjson_chunk_capacity);
|
|
|
|
|
_handle->document = new Document(_handle->valueAllocator);
|
2021-08-13 10:23:05 +00:00
|
|
|
_handle->document->SetObject();
|
2021-11-13 13:27:59 +03:00
|
|
|
|
|
|
|
|
FS_operate(g_tsg_para.fs2_handle, g_tsg_para.fs2_field_id[TSG_FS2_CREATE_LOG_HANDLE], 0, FS_OP_ADD, 1);
|
2021-08-13 10:23:05 +00:00
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
return _handle;
|
|
|
|
|
}
|
2021-04-20 14:37:00 +08:00
|
|
|
|
2021-08-07 17:27:55 +08:00
|
|
|
static int set_user_region(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct Maat_rule_t *p_result, int thread_seq)
|
|
|
|
|
{
|
|
|
|
|
int ret=0;
|
|
|
|
|
char *user_region=NULL;
|
|
|
|
|
|
|
|
|
|
if(p_result->action!=TSG_ACTION_NONE && p_result->serv_def_len>0)
|
|
|
|
|
{
|
|
|
|
|
user_region=(char *)dictator_malloc(thread_seq, p_result->serv_def_len+1);
|
|
|
|
|
ret=Maat_read_rule(g_tsg_maat_feather, p_result, MAAT_RULE_SERV_DEFINE, user_region, p_result->serv_def_len+1);
|
|
|
|
|
if(ret==p_result->serv_def_len)
|
|
|
|
|
{
|
|
|
|
|
user_region[p_result->serv_def_len]='\0';
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_USER_REGION].name, (void *)user_region, TLD_TYPE_STRING);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
dictator_free(thread_seq, user_region);
|
|
|
|
|
user_region=NULL;
|
|
|
|
|
}
|
2021-08-13 10:23:05 +00:00
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int set_nat_linkinfo(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct streaminfo *a_stream, char *field_name, int project_id)
|
|
|
|
|
{
|
2021-10-06 15:31:38 +08:00
|
|
|
const char *nat_linkinfo=(const char *)stream_bridge_async_data_get(a_stream, project_id);
|
2021-08-13 10:23:05 +00:00
|
|
|
if(nat_linkinfo==NULL)
|
|
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2021-08-14 10:41:25 +08:00
|
|
|
copy_rapidjson(_handle, field_name, nat_linkinfo);
|
2021-08-07 17:27:55 +08:00
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2021-11-20 11:49:18 +03:00
|
|
|
static int set_tunnel_ipv4v6_port(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct streaminfo *a_stream, Value *object, enum addr_type_t up_layer_type)
|
2021-04-07 02:36:51 +00:00
|
|
|
{
|
|
|
|
|
char ip_buff[64]={0};
|
2021-11-20 11:49:18 +03:00
|
|
|
if(a_stream==NULL)
|
|
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
tsg_log_field_id_t s_ip_idx, d_ip_idx, s_port_idx, d_port_idx;
|
|
|
|
|
|
|
|
|
|
switch(up_layer_type)
|
2021-04-07 02:36:51 +00:00
|
|
|
{
|
2021-11-20 11:49:18 +03:00
|
|
|
case ADDR_TYPE_L2TP:
|
|
|
|
|
s_ip_idx=LOG_COMMON_L2TP_ACCESS_CONCENTRATOR_IP;
|
|
|
|
|
d_ip_idx=LOG_COMMON_L2TP_NETWORK_SERVER_IP;
|
|
|
|
|
s_port_idx=LOG_COMMON_L2TP_ACCESS_CONCENTRATOR_PORT;
|
|
|
|
|
d_port_idx=LOG_COMMON_L2TP_NETWORK_SERVER_PORT;
|
|
|
|
|
break;
|
|
|
|
|
case ADDR_TYPE_GPRS_TUNNEL:
|
|
|
|
|
s_ip_idx=LOG_COMMON_TUNNELS_GTP_SGW_IP;
|
|
|
|
|
d_ip_idx=LOG_COMMON_TUNNELS_GTP_PGW_IP;
|
|
|
|
|
s_port_idx=LOG_COMMON_TUNNELS_GTP_SGW_PORT;
|
|
|
|
|
d_port_idx=LOG_COMMON_TUNNELS_GTP_PGW_PORT;
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
return 0;
|
|
|
|
|
break;
|
2021-04-07 02:36:51 +00:00
|
|
|
}
|
2021-11-20 11:49:18 +03:00
|
|
|
|
|
|
|
|
switch(a_stream->addr.addrtype)
|
|
|
|
|
{
|
|
|
|
|
case ADDR_TYPE_IPV4:
|
|
|
|
|
inet_ntop(AF_INET, (const void *)&(a_stream->addr.ipv4->saddr), ip_buff, sizeof(ip_buff));
|
|
|
|
|
add_str_member(_handle, object, _instance->id2field[s_ip_idx].name, ip_buff);
|
2021-04-07 02:36:51 +00:00
|
|
|
|
2021-11-20 11:49:18 +03:00
|
|
|
inet_ntop(AF_INET, (const void *)&(a_stream->addr.ipv4->daddr), ip_buff, sizeof(ip_buff));
|
|
|
|
|
add_str_member(_handle, object, _instance->id2field[d_ip_idx].name, ip_buff);
|
|
|
|
|
|
|
|
|
|
add_number_member(_handle, object, _instance->id2field[s_port_idx].name, ntohs(a_stream->addr.ipv4->source));
|
|
|
|
|
add_number_member(_handle, object, _instance->id2field[d_port_idx].name, ntohs(a_stream->addr.ipv4->dest));
|
|
|
|
|
return 1;
|
|
|
|
|
break;
|
|
|
|
|
case ADDR_TYPE_IPV6:
|
|
|
|
|
inet_ntop(AF_INET6, (const void *)(a_stream->addr.ipv6->saddr), ip_buff, sizeof(ip_buff));
|
|
|
|
|
add_str_member(_handle, object, _instance->id2field[s_ip_idx].name, ip_buff);
|
|
|
|
|
|
|
|
|
|
inet_ntop(AF_INET6, (const void *)(a_stream->addr.ipv6->daddr), ip_buff, sizeof(ip_buff));
|
|
|
|
|
add_str_member(_handle, object, _instance->id2field[d_ip_idx].name, ip_buff);
|
|
|
|
|
|
|
|
|
|
add_number_member(_handle, object, _instance->id2field[s_port_idx].name, ntohs(a_stream->addr.ipv6->source));
|
|
|
|
|
add_number_member(_handle, object, _instance->id2field[d_port_idx].name, ntohs(a_stream->addr.ipv6->dest));
|
|
|
|
|
return 1;
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
2021-04-07 02:36:51 +00:00
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
static int set_common_tunnels(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct streaminfo *a_stream)
|
2021-04-07 02:36:51 +00:00
|
|
|
{
|
2021-04-20 14:37:00 +08:00
|
|
|
int ret=0;
|
2021-04-07 02:36:51 +00:00
|
|
|
char ip_buff[64]={0};
|
|
|
|
|
const struct streaminfo *ptmp = a_stream;
|
|
|
|
|
const struct streaminfo *pfather=NULL;
|
2021-08-13 10:23:05 +00:00
|
|
|
Value tunnel_array(kArrayType);
|
2021-04-20 14:37:00 +08:00
|
|
|
|
2021-04-07 02:36:51 +00:00
|
|
|
while(ptmp)
|
|
|
|
|
{
|
2021-08-13 10:23:05 +00:00
|
|
|
Value tunnel_object(kObjectType);
|
2021-04-07 02:36:51 +00:00
|
|
|
pfather = ptmp->pfather;
|
|
|
|
|
switch(ptmp->addr.addrtype)
|
|
|
|
|
{
|
|
|
|
|
case ADDR_TYPE_MAC:
|
2021-08-13 10:23:05 +00:00
|
|
|
set_link_mac(_instance, _handle, (ptmp->addr.mac), &tunnel_object);
|
2021-04-07 02:36:51 +00:00
|
|
|
break;
|
|
|
|
|
case ADDR_TYPE_VLAN:
|
2021-08-13 10:23:05 +00:00
|
|
|
add_str_member(_handle, &tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_SCHEMA_TYPE].name, "VLAN");
|
|
|
|
|
set_vlan(_instance, _handle, ptmp->addr.vlan->c2s_addr_array, ptmp->addr.vlan->c2s_layer_num, &tunnel_object, LOG_COMMON_TUNNELS_VLAN_SRC_ID);
|
|
|
|
|
set_vlan(_instance, _handle, ptmp->addr.vlan->s2c_addr_array, ptmp->addr.vlan->s2c_layer_num, &tunnel_object, LOG_COMMON_TUNNELS_VLAN_DST_ID);
|
2021-04-07 02:36:51 +00:00
|
|
|
break;
|
|
|
|
|
case ADDR_TYPE_GRE:
|
2021-08-13 10:23:05 +00:00
|
|
|
add_str_member(_handle, &tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_SCHEMA_TYPE].name, "GRE");
|
2021-04-07 02:36:51 +00:00
|
|
|
break;
|
|
|
|
|
case ADDR_TYPE_MPLS:
|
2021-04-20 14:37:00 +08:00
|
|
|
if(ptmp->addr.mpls->s2c_layer_num==0 && ptmp->addr.mpls->c2s_layer_num==0)
|
2021-04-07 02:36:51 +00:00
|
|
|
{
|
2021-04-20 14:37:00 +08:00
|
|
|
ptmp = pfather;
|
|
|
|
|
continue;
|
2021-04-07 02:36:51 +00:00
|
|
|
}
|
2021-08-13 10:23:05 +00:00
|
|
|
add_str_member(_handle, &tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_SCHEMA_TYPE].name, "MPLS");
|
|
|
|
|
set_mpls(_instance, _handle, ptmp->addr.mpls->c2s_addr_array, ptmp->addr.mpls->c2s_layer_num, &tunnel_object, LOG_COMMON_TUNNELS_MPLS_SRC_LABEL);
|
|
|
|
|
set_mpls(_instance, _handle, ptmp->addr.mpls->s2c_addr_array, ptmp->addr.mpls->s2c_layer_num, &tunnel_object, LOG_COMMON_TUNNELS_MPLS_DST_LABEL);
|
2021-04-07 02:36:51 +00:00
|
|
|
break;
|
|
|
|
|
case ADDR_TYPE_L2TP:
|
2021-08-13 10:23:05 +00:00
|
|
|
add_str_member(_handle, &tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_SCHEMA_TYPE].name, "L2TP");
|
2021-11-20 11:49:18 +03:00
|
|
|
set_l2tp(_instance, _handle, ptmp->addr.l2tp, &tunnel_object);
|
|
|
|
|
|
|
|
|
|
ret=set_tunnel_ipv4v6_port(_instance, _handle, ptmp->pfather, &tunnel_object, ADDR_TYPE_L2TP);
|
|
|
|
|
if(ret==1)
|
|
|
|
|
{
|
|
|
|
|
ptmp=pfather->pfather;
|
|
|
|
|
}
|
2021-04-07 02:36:51 +00:00
|
|
|
break;
|
|
|
|
|
case __ADDR_TYPE_IP_PAIR_V4:
|
2021-08-13 10:23:05 +00:00
|
|
|
add_str_member(_handle, &tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_SCHEMA_TYPE].name, "IPv4");
|
|
|
|
|
|
2021-04-07 02:36:51 +00:00
|
|
|
inet_ntop(AF_INET, (const void *)&(ptmp->addr.ipv4->saddr), ip_buff, sizeof(ip_buff));
|
2021-08-13 10:23:05 +00:00
|
|
|
add_str_member(_handle, &tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_CLIENT_IP].name, ip_buff);
|
|
|
|
|
|
|
|
|
|
inet_ntop(AF_INET, (const void *)&(ptmp->addr.ipv4->daddr), ip_buff, sizeof(ip_buff));
|
|
|
|
|
add_str_member(_handle, &tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_SERVER_IP].name, ip_buff);
|
2021-04-07 02:36:51 +00:00
|
|
|
break;
|
2021-08-13 10:23:05 +00:00
|
|
|
case __ADDR_TYPE_IP_PAIR_V6:
|
|
|
|
|
add_str_member(_handle, &tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_SCHEMA_TYPE].name, "IPv6");
|
|
|
|
|
|
2021-04-07 02:36:51 +00:00
|
|
|
inet_ntop(AF_INET6, (const void *)(ptmp->addr.ipv6->saddr), ip_buff, sizeof(ip_buff));
|
2021-08-13 10:23:05 +00:00
|
|
|
add_str_member(_handle, &tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_CLIENT_IP].name, ip_buff);
|
|
|
|
|
|
|
|
|
|
inet_ntop(AF_INET6, (const void *)(ptmp->addr.ipv6->daddr), ip_buff, sizeof(ip_buff));
|
|
|
|
|
add_str_member(_handle, &tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_SERVER_IP].name, ip_buff);
|
2021-04-07 02:36:51 +00:00
|
|
|
break;
|
|
|
|
|
case ADDR_TYPE_PPTP:
|
2021-08-13 10:23:05 +00:00
|
|
|
add_str_member(_handle, &tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_SCHEMA_TYPE].name, "PPTP");
|
|
|
|
|
add_number_member(_handle, &tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_PPTP_C2S_ID].name, ntohs(ptmp->addr.pptp->C2S_call_id));
|
|
|
|
|
add_number_member(_handle, &tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_PPTP_S2C_ID].name, ntohs(ptmp->addr.pptp->S2C_call_id));
|
2021-04-07 02:36:51 +00:00
|
|
|
break;
|
|
|
|
|
case ADDR_TYPE_GPRS_TUNNEL:
|
2021-08-13 10:23:05 +00:00
|
|
|
add_str_member(_handle, &tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_SCHEMA_TYPE].name, "GTP");
|
|
|
|
|
add_number_member(_handle, &tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_GTP_UPLINK_TEID].name, ntohl(ptmp->addr.gtp->teid_c2s));
|
|
|
|
|
add_number_member(_handle, &tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_GTP_DOWNLINK_TEID].name, ntohl(ptmp->addr.gtp->teid_s2c));
|
2021-04-07 02:36:51 +00:00
|
|
|
|
2021-11-20 11:49:18 +03:00
|
|
|
ret=set_tunnel_ipv4v6_port(_instance, _handle, ptmp->pfather, &tunnel_object, ADDR_TYPE_GPRS_TUNNEL);
|
2021-04-07 02:36:51 +00:00
|
|
|
if(ret==1)
|
|
|
|
|
{
|
|
|
|
|
ptmp=pfather->pfather;
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
case ADDR_TYPE_VXLAN:
|
2021-08-13 10:23:05 +00:00
|
|
|
add_str_member(_handle, &tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_SCHEMA_TYPE].name, "VXLAN");
|
2021-04-07 02:36:51 +00:00
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
ptmp = pfather;
|
|
|
|
|
continue;
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
2021-08-13 10:23:05 +00:00
|
|
|
ptmp = pfather;;
|
|
|
|
|
tunnel_array.PushBack(tunnel_object, _handle->document->GetAllocator());
|
2021-04-07 02:36:51 +00:00
|
|
|
}
|
|
|
|
|
|
2021-08-13 10:23:05 +00:00
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_TUNNELS].name, &tunnel_array, TLD_TYPE_OBJECT);
|
|
|
|
|
|
2021-04-07 02:36:51 +00:00
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2019-12-09 18:58:05 +08:00
|
|
|
char *log_field_id2name(struct tsg_log_instance_t *instance, tsg_log_field_id_t id)
|
|
|
|
|
{
|
|
|
|
|
struct tsg_log_instance_t *_instance=instance;
|
|
|
|
|
if(_instance!=NULL)
|
2019-11-12 13:35:19 +08:00
|
|
|
{
|
2019-12-09 18:58:05 +08:00
|
|
|
return _instance->id2field[id].name;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
unsigned long long tsg_get_stream_id(struct streaminfo * a_stream)
|
2020-11-14 15:50:44 +06:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
int ret=0;
|
|
|
|
|
int device_id_size=sizeof(unsigned long long);
|
2021-08-14 17:39:09 +08:00
|
|
|
unsigned long long device_id=(unsigned long long)g_tsg_para.device_seq_in_dc;
|
2021-04-27 09:49:15 +00:00
|
|
|
|
|
|
|
|
ret=MESA_get_stream_opt(a_stream, MSO_GLOBAL_STREAM_ID, (void *)&device_id, &device_id_size);
|
|
|
|
|
if(ret==0)
|
|
|
|
|
{
|
|
|
|
|
return device_id;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int is_multi_hit_same_policy(struct Maat_rule_t *result, int *policy_id, int *policy_id_num)
|
|
|
|
|
{
|
|
|
|
|
int j=0;
|
2020-11-14 15:50:44 +06:00
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
for(j=0;j<*policy_id_num;j++)
|
2020-11-14 15:50:44 +06:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
if(policy_id[j]==result->config_id)
|
|
|
|
|
{
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
2020-11-14 15:50:44 +06:00
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
policy_id[(*policy_id_num)++]=result->config_id;
|
|
|
|
|
|
|
|
|
|
return 0;
|
2020-11-14 15:50:44 +06:00
|
|
|
}
|
|
|
|
|
|
2020-04-16 13:03:56 +08:00
|
|
|
static int set_common_sub_action(struct TLD_handle_t *handle, char *field_name, struct Maat_rule_t *p_result)
|
|
|
|
|
{
|
|
|
|
|
cJSON *item=NULL;
|
|
|
|
|
cJSON *object=NULL;
|
|
|
|
|
char *tmp_buff=NULL;
|
|
|
|
|
|
|
|
|
|
if(p_result->serv_def_len<128)
|
|
|
|
|
{
|
|
|
|
|
object=cJSON_Parse(p_result->service_defined);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
tmp_buff=(char *)calloc(1, p_result->serv_def_len+1);
|
|
|
|
|
Maat_read_rule(g_tsg_maat_feather, p_result, MAAT_RULE_SERV_DEFINE, tmp_buff, p_result->serv_def_len);
|
|
|
|
|
object=cJSON_Parse(tmp_buff);
|
|
|
|
|
|
|
|
|
|
free(tmp_buff);
|
|
|
|
|
tmp_buff=NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if(object!=NULL)
|
|
|
|
|
{
|
|
|
|
|
item=cJSON_GetObjectItem(object, "method");
|
2020-04-27 17:49:59 +08:00
|
|
|
if(item!=NULL && item->valuestring!=NULL)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(handle, field_name, (void *)item->valuestring, TLD_TYPE_STRING);
|
|
|
|
|
}
|
|
|
|
|
|
2020-04-16 13:03:56 +08:00
|
|
|
cJSON_Delete(object);
|
|
|
|
|
object=NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2021-12-29 21:59:35 +03:00
|
|
|
int set_application_behavior(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct streaminfo *a_stream)
|
|
|
|
|
{
|
2022-01-04 17:07:02 +03:00
|
|
|
if(a_stream==NULL)
|
|
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2021-12-29 21:59:35 +03:00
|
|
|
struct application_behavior *behavior_result=NULL;
|
|
|
|
|
behavior_result=(struct application_behavior *)stream_bridge_async_data_get(a_stream, g_tsg_para.bridge_id[BRIDGE_TYPE_APP_BEHAVIOR_RESULT]);
|
|
|
|
|
if(behavior_result==NULL)
|
|
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_APPLICATION_BEHAVIOR].name, (void *)(behavior_result->stream_behavior), TLD_TYPE_STRING);
|
|
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int set_notify_execution_result(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct streaminfo *a_stream, struct Maat_rule_t *p_result)
|
2021-08-07 17:27:55 +08:00
|
|
|
{
|
2022-01-04 17:07:02 +03:00
|
|
|
if(a_stream==NULL)
|
|
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2021-08-07 17:27:55 +08:00
|
|
|
int i=0;
|
2021-12-28 20:27:37 +03:00
|
|
|
struct tsg_notify_execution_result *execution_result=NULL;
|
2021-12-29 21:59:35 +03:00
|
|
|
execution_result=(struct tsg_notify_execution_result *)stream_bridge_async_data_get(a_stream, g_tsg_para.bridge_id[BRIDGE_TYPE_CONN_SKETCH_EXEC_RESULT]);
|
2021-12-28 20:27:37 +03:00
|
|
|
if(execution_result==NULL)
|
2021-08-07 17:27:55 +08:00
|
|
|
{
|
2021-12-28 20:27:37 +03:00
|
|
|
return 0;
|
2021-08-07 17:27:55 +08:00
|
|
|
}
|
2021-12-28 20:27:37 +03:00
|
|
|
|
|
|
|
|
for(i=0; i<execution_result->stat_mirrored_cnt; i++)
|
2021-08-07 17:27:55 +08:00
|
|
|
{
|
2021-12-28 20:27:37 +03:00
|
|
|
if(execution_result->stat_mirrored[i].compile_id==p_result->config_id)
|
2021-08-07 17:27:55 +08:00
|
|
|
{
|
2022-01-04 17:07:02 +03:00
|
|
|
TLD_delete(_handle, _instance->id2field[LOG_COMMON_MIRRORED_PKTS].name);
|
|
|
|
|
TLD_delete(_handle, _instance->id2field[LOG_COMMON_MIRRORED_BYTES].name);
|
2021-12-28 20:27:37 +03:00
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_MIRRORED_PKTS].name, (void *)(execution_result->stat_mirrored[i].packets), TLD_TYPE_LONG);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_MIRRORED_BYTES].name, (void *)(execution_result->stat_mirrored[i].bytes), TLD_TYPE_LONG);
|
|
|
|
|
break;
|
2021-08-07 17:27:55 +08:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2021-12-28 20:27:37 +03:00
|
|
|
if(execution_result->capture_packet_path!=NULL)
|
2022-01-06 17:41:03 +03:00
|
|
|
{
|
|
|
|
|
TLD_delete(_handle, _instance->id2field[LOG_COMMON_PACKET_CAPTURE_FILE].name);
|
2021-12-28 20:27:37 +03:00
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_PACKET_CAPTURE_FILE].name, (void *)(execution_result->capture_packet_path), TLD_TYPE_STRING);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 1;
|
2021-08-07 17:27:55 +08:00
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
int set_session_attributes(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct streaminfo *a_stream)
|
2020-05-14 15:52:54 +08:00
|
|
|
{
|
2021-08-07 17:27:55 +08:00
|
|
|
int ret=0;
|
|
|
|
|
struct session_attribute_label *attribute_label=NULL;
|
2020-05-14 15:52:54 +08:00
|
|
|
|
2021-08-07 17:27:55 +08:00
|
|
|
attribute_label=(struct session_attribute_label *)project_req_get_struct(a_stream, _instance->session_attribute_project_id);
|
2021-03-02 10:39:33 +08:00
|
|
|
if(attribute_label!=NULL)
|
2021-04-27 09:49:15 +00:00
|
|
|
{
|
2021-03-02 10:39:33 +08:00
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_ESTABLISH_LATENCY_MS].name, (void *)attribute_label->establish_latency_ms, TLD_TYPE_LONG);
|
2021-08-07 17:27:55 +08:00
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_HTTP_ACTION_FILESIZE].name, (void *)(long)attribute_label->http_action_file_size, TLD_TYPE_LONG);
|
2020-05-14 15:52:54 +08:00
|
|
|
|
2021-04-28 09:23:05 +00:00
|
|
|
set_asn(_handle, a_stream, _instance->id2field[LOG_COMMON_CLINET_ASN].name, attribute_label->client_asn);
|
|
|
|
|
set_asn(_handle, a_stream, _instance->id2field[LOG_COMMON_SERVER_ASN].name, attribute_label->server_asn);
|
2020-05-14 15:52:54 +08:00
|
|
|
|
2021-04-28 09:23:05 +00:00
|
|
|
set_location(_handle, a_stream, _instance->id2field[LOG_COMMON_CLINET_LOCATION].name, attribute_label->client_location);
|
|
|
|
|
set_location(_handle, a_stream, _instance->id2field[LOG_COMMON_SERVER_LOCATION].name, attribute_label->server_location);
|
2021-08-07 17:27:55 +08:00
|
|
|
|
|
|
|
|
ret=set_subscriber_id(_handle, _instance->id2field[LOG_COMMON_SUBSCRIBER_ID].name, attribute_label->client_subscribe_id);
|
|
|
|
|
if(ret==0)
|
|
|
|
|
{
|
|
|
|
|
set_subscriber_id(_handle, _instance->id2field[LOG_COMMON_SUBSCRIBER_ID].name, attribute_label->server_subscribe_id);
|
|
|
|
|
}
|
2021-04-28 09:23:05 +00:00
|
|
|
|
|
|
|
|
set_fqdn_category(_instance, _handle, a_stream, attribute_label->fqdn_category_id, attribute_label->fqdn_category_id_num);
|
2020-09-11 18:06:09 +08:00
|
|
|
|
2021-03-02 10:39:33 +08:00
|
|
|
if(attribute_label->ja3_fingerprint!=NULL)
|
2020-09-11 18:06:09 +08:00
|
|
|
{
|
2021-03-02 10:39:33 +08:00
|
|
|
TLD_append(_handle, _instance->id2field[LOG_SSL_JA3_FINGERPRINT].name, (void *)attribute_label->ja3_fingerprint, TLD_TYPE_STRING);
|
2020-09-11 18:06:09 +08:00
|
|
|
}
|
2021-05-19 07:10:25 +00:00
|
|
|
|
|
|
|
|
set_umts_user_info(_instance, _handle, a_stream, attribute_label->user_info);
|
2020-05-14 15:52:54 +08:00
|
|
|
}
|
2021-03-02 10:39:33 +08:00
|
|
|
|
2020-05-14 15:52:54 +08:00
|
|
|
return 0;
|
|
|
|
|
}
|
2020-04-16 13:03:56 +08:00
|
|
|
|
2019-12-09 18:58:05 +08:00
|
|
|
int TLD_append_streaminfo(struct tsg_log_instance_t *instance, struct TLD_handle_t *handle, struct streaminfo *a_stream)
|
|
|
|
|
{
|
2021-07-05 14:22:24 +08:00
|
|
|
int ret=0;
|
2019-12-09 18:58:05 +08:00
|
|
|
char *addr_proto=NULL;
|
2021-06-03 11:48:36 +08:00
|
|
|
char stream_id_buff[128]={0};
|
2019-12-09 18:58:05 +08:00
|
|
|
unsigned long long stream_id=0;
|
|
|
|
|
struct TLD_handle_t *_handle=handle;
|
|
|
|
|
struct tsg_log_instance_t *_instance=instance;
|
|
|
|
|
|
|
|
|
|
if(_instance==NULL || _handle==NULL || a_stream==NULL)
|
|
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
MESA_handle_runtime_log(_instance->logger, RLOG_LV_DEBUG, "TLD_APPEND_STREAM", "instance==NULL || TLD_handle==NULL || addr==NULL");
|
2019-12-09 18:58:05 +08:00
|
|
|
return -1;
|
2019-11-12 13:35:19 +08:00
|
|
|
}
|
|
|
|
|
|
2021-07-05 14:22:24 +08:00
|
|
|
ret=set_linkinfo(_instance, _handle, a_stream);
|
|
|
|
|
if(ret==0)
|
|
|
|
|
{
|
|
|
|
|
set_direction(_instance, _handle, a_stream);
|
|
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
set_app_id(_instance, _handle, a_stream);
|
|
|
|
|
set_tcp_isn(_instance, _handle, a_stream);
|
|
|
|
|
set_tuple4(_instance, _handle, a_stream);
|
|
|
|
|
set_address_list(_instance, _handle, a_stream);
|
|
|
|
|
set_duraction(_instance, _handle, a_stream);
|
|
|
|
|
set_packet_bytes(_instance, _handle, a_stream);
|
|
|
|
|
set_session_attributes(_instance, _handle, a_stream);
|
2021-08-07 17:27:55 +08:00
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
if(is_tunnels(a_stream))
|
2019-12-09 18:58:05 +08:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
set_common_tunnels(_instance, _handle, a_stream);
|
2019-12-09 18:58:05 +08:00
|
|
|
}
|
2021-04-27 09:49:15 +00:00
|
|
|
|
2019-12-09 18:58:05 +08:00
|
|
|
stream_id=tsg_get_stream_id(a_stream);
|
2020-10-27 17:15:09 +08:00
|
|
|
snprintf(stream_id_buff, sizeof(stream_id_buff), "%llu", stream_id);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_STREAM_TRACE_ID].name, (void *)stream_id_buff, TLD_TYPE_STRING);
|
2019-12-09 18:58:05 +08:00
|
|
|
|
|
|
|
|
addr_proto=(char *)layer_addr_prefix_ntop(a_stream);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_L4_PROTOCOL].name, (void *)addr_proto, TLD_TYPE_STRING);
|
2021-01-28 17:20:44 +08:00
|
|
|
|
2019-12-09 18:58:05 +08:00
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2020-01-19 15:53:02 +08:00
|
|
|
int load_log_common_field(const char *filename, id2field_t *id2field, id2field_t **service2topic, int *max_service)
|
2019-12-09 18:58:05 +08:00
|
|
|
{
|
|
|
|
|
int i=0;
|
|
|
|
|
int ret=0,id=0;
|
|
|
|
|
FILE *fp=NULL;
|
|
|
|
|
char line[1024]={0};
|
|
|
|
|
char field_name[64]={0};
|
|
|
|
|
char type_name[32]={0};
|
2020-01-19 15:53:02 +08:00
|
|
|
id2field_t *_service2topic=NULL;
|
|
|
|
|
|
2019-12-09 18:58:05 +08:00
|
|
|
fp=fopen(filename, "r");
|
|
|
|
|
if(fp==NULL)
|
|
|
|
|
{
|
|
|
|
|
printf("Open %s failed ...", filename);
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
2019-11-12 13:35:19 +08:00
|
|
|
|
2019-12-09 18:58:05 +08:00
|
|
|
memset(line, 0, sizeof(line));
|
|
|
|
|
|
|
|
|
|
while((fgets(line, sizeof(line), fp))!=NULL)
|
|
|
|
|
{
|
|
|
|
|
if(line[0]=='#' || line[0]=='\n' || line[0]=='\r' ||line[0]=='\0')
|
|
|
|
|
{
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
memset(type_name, 0, sizeof(type_name));
|
|
|
|
|
ret=sscanf(line, "%s %s %d", type_name, field_name, &id);
|
2020-11-14 15:50:44 +06:00
|
|
|
assert(ret==3);
|
2019-12-09 18:58:05 +08:00
|
|
|
|
2020-05-18 19:04:26 +08:00
|
|
|
for(i=0; i<TLD_TYPE_MAX; i++)
|
2019-12-09 18:58:05 +08:00
|
|
|
{
|
|
|
|
|
if((strncasecmp(tld_type[i].name, type_name, strlen(tld_type[i].name)))==0)
|
|
|
|
|
{
|
|
|
|
|
switch(tld_type[i].type)
|
|
|
|
|
{
|
|
|
|
|
case TLD_TYPE_FILE:
|
|
|
|
|
case TLD_TYPE_LONG:
|
|
|
|
|
case TLD_TYPE_STRING:
|
|
|
|
|
id2field[id].type = tld_type[i].type;
|
|
|
|
|
id2field[id].id = id;
|
|
|
|
|
memcpy(id2field[id].name, field_name, strlen(field_name));
|
|
|
|
|
break;
|
2020-05-18 19:04:26 +08:00
|
|
|
case TLD_TYPE_TOPIC:
|
|
|
|
|
if(_service2topic==NULL)
|
2019-12-09 18:58:05 +08:00
|
|
|
{
|
2020-05-18 19:04:26 +08:00
|
|
|
_service2topic=(id2field_t *)calloc(1, sizeof(id2field_t)*(id+1));
|
|
|
|
|
_service2topic[id].type = TLD_TYPE_MAX;
|
|
|
|
|
_service2topic[id].id = id;
|
|
|
|
|
memcpy(_service2topic[id].name, field_name, strlen(field_name));
|
|
|
|
|
|
|
|
|
|
*max_service=id+1;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
if(*max_service<=id)
|
2020-01-19 15:53:02 +08:00
|
|
|
{
|
2020-05-18 19:04:26 +08:00
|
|
|
_service2topic=(id2field_t *)realloc(_service2topic, sizeof(id2field_t)*(id+1));
|
|
|
|
|
memset(&_service2topic[id], 0, sizeof(id2field_t));
|
2020-01-19 15:53:02 +08:00
|
|
|
_service2topic[id].type = TLD_TYPE_MAX;
|
|
|
|
|
_service2topic[id].id = id;
|
|
|
|
|
memcpy(_service2topic[id].name, field_name, strlen(field_name));
|
|
|
|
|
|
|
|
|
|
*max_service=id+1;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
2020-05-18 19:04:26 +08:00
|
|
|
memset(&_service2topic[id], 0, sizeof(id2field_t));
|
|
|
|
|
_service2topic[id].type = TLD_TYPE_MAX;
|
|
|
|
|
_service2topic[id].id = id;
|
|
|
|
|
memcpy(_service2topic[id].name, field_name, strlen(field_name));
|
2020-01-19 15:53:02 +08:00
|
|
|
}
|
2019-12-09 18:58:05 +08:00
|
|
|
}
|
|
|
|
|
break;
|
2020-05-18 19:04:26 +08:00
|
|
|
default:
|
|
|
|
|
break;
|
2019-12-09 18:58:05 +08:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
memset(line, 0, sizeof(line));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
fclose(fp);
|
|
|
|
|
fp=NULL;
|
|
|
|
|
|
2020-11-14 15:50:44 +06:00
|
|
|
if(service2topic!=NULL)
|
|
|
|
|
{
|
|
|
|
|
*service2topic=_service2topic;
|
|
|
|
|
}
|
2020-01-19 15:53:02 +08:00
|
|
|
|
2019-11-12 13:35:19 +08:00
|
|
|
return 0;
|
|
|
|
|
}
|
2019-12-09 18:58:05 +08:00
|
|
|
|
|
|
|
|
struct tsg_log_instance_t *tsg_sendlog_init(const char *conffile)
|
2019-11-12 13:35:19 +08:00
|
|
|
{
|
2020-09-28 17:13:39 +08:00
|
|
|
int i=0,ret=0;
|
2021-08-13 10:23:05 +00:00
|
|
|
char label_buff[128]={0};
|
2019-12-09 18:58:05 +08:00
|
|
|
char nic_name[32]={0};
|
|
|
|
|
char kafka_errstr[1024]={0};
|
|
|
|
|
unsigned int local_ip_nr=0;
|
|
|
|
|
rd_kafka_conf_t *rdkafka_conf = NULL;
|
|
|
|
|
rd_kafka_topic_conf_t *topic_conf;
|
|
|
|
|
struct tsg_log_instance_t *_instance=NULL;
|
|
|
|
|
|
|
|
|
|
_instance=(struct tsg_log_instance_t *)calloc(1, sizeof(struct tsg_log_instance_t));
|
2020-09-01 11:35:49 +08:00
|
|
|
|
|
|
|
|
int thread_num=get_thread_count();
|
|
|
|
|
_instance->drop_start=(struct timespec *)calloc(1, sizeof(struct timespec)*thread_num);
|
|
|
|
|
_instance->fs_status_ids=(int *)calloc(1, sizeof(int)*thread_num);
|
|
|
|
|
_instance->send_log_percent=(int *)calloc(1, sizeof(int)*thread_num);
|
|
|
|
|
|
|
|
|
|
for(i=0;i<thread_num; i++)
|
|
|
|
|
{
|
|
|
|
|
_instance->send_log_percent[i]=100;
|
|
|
|
|
}
|
2019-12-09 18:58:05 +08:00
|
|
|
|
2020-09-28 17:13:39 +08:00
|
|
|
MESA_load_profile_int_def(conffile, "TSG_LOG", "LOG_LEVEL",&(_instance->level), 30);
|
|
|
|
|
MESA_load_profile_string_def(conffile, "TSG_LOG", "LOG_PATH", _instance->log_path, sizeof(_instance->log_path), "./tsglog/tsglog");
|
2021-10-06 16:29:24 +08:00
|
|
|
MESA_load_profile_int_def(conffile, "TSG_LOG", "SEND_USER_REGION", &(_instance->send_user_region), 0);
|
|
|
|
|
MESA_load_profile_int_def(conffile, "TSG_LOG", "SEND_DATA_CENTER_SWITCH", &(_instance->send_data_center), 0);
|
2021-11-13 13:27:59 +03:00
|
|
|
MESA_load_profile_int_def(conffile, "TSG_LOG", "RAPIDJSON_CHUNK_CAPACITY", &(_instance->rapidjson_chunk_capacity), 8096);
|
2019-12-09 18:58:05 +08:00
|
|
|
|
2021-06-03 11:48:36 +08:00
|
|
|
MESA_load_profile_int_def(conffile, "TSG_LOG", "APP_ID_TYPE", &(_instance->app_id_type), 1); //0: int, 1: string
|
2021-05-13 18:14:07 +08:00
|
|
|
MESA_load_profile_string_def(conffile, "TSG_LOG", "L7_UNKNOWN_NAME", _instance->l7_unknown_name, sizeof(_instance->l7_unknown_name), "UNCATEGORIZED");
|
|
|
|
|
|
2021-08-13 10:23:05 +00:00
|
|
|
MESA_load_profile_string_def(conffile, "TSG_LOG", "LINKINFO_FROM_MAC", label_buff, sizeof(label_buff), "mirror_linkinfo_from_mac");
|
2021-10-06 15:31:38 +08:00
|
|
|
_instance->mac_linkinfo_project_id=stream_bridge_build(label_buff, "w");
|
2021-08-13 10:23:05 +00:00
|
|
|
if(_instance->mac_linkinfo_project_id<0)
|
|
|
|
|
{
|
2021-10-06 15:31:38 +08:00
|
|
|
MESA_handle_runtime_log(g_tsg_para.logger, RLOG_LV_FATAL, "LINKINFO_FROM_MAC", "stream_bridge_build is error, app_bridge_name: %s", label_buff);
|
2021-08-13 10:23:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
MESA_load_profile_string_def(conffile, "TSG_LOG", "NAT_C2S_LINKINFO", label_buff, sizeof(label_buff), "common_link_info_c2s");
|
2021-10-06 15:31:38 +08:00
|
|
|
_instance->nat_c2s_linkinfo_project_id=stream_bridge_build(label_buff, "w");
|
2021-08-13 10:23:05 +00:00
|
|
|
if(_instance->nat_c2s_linkinfo_project_id<0)
|
|
|
|
|
{
|
2021-10-06 15:31:38 +08:00
|
|
|
MESA_handle_runtime_log(g_tsg_para.logger, RLOG_LV_FATAL, "NAT_C2S_LINKINFO", "stream_bridge_build is error, app_bridge_name: %s", label_buff);
|
2021-08-13 10:23:05 +00:00
|
|
|
}
|
2021-10-06 15:31:38 +08:00
|
|
|
|
2021-08-13 10:23:05 +00:00
|
|
|
MESA_load_profile_string_def(conffile, "TSG_LOG", "NAT_S2C_LINKINFO", label_buff, sizeof(label_buff), "common_link_info_s2c");
|
2021-10-06 15:31:38 +08:00
|
|
|
_instance->nat_s2c_linkinfo_project_id=stream_bridge_build(label_buff, "w");
|
2021-08-13 10:23:05 +00:00
|
|
|
if(_instance->nat_s2c_linkinfo_project_id<0)
|
|
|
|
|
{
|
2021-10-06 15:31:38 +08:00
|
|
|
MESA_handle_runtime_log(g_tsg_para.logger, RLOG_LV_FATAL, "NAT_S2C_LINKINFO", "stream_bridge_build is error, app_bridge_name: %s", label_buff);
|
2021-08-13 10:23:05 +00:00
|
|
|
}
|
|
|
|
|
|
2020-09-28 17:13:39 +08:00
|
|
|
_instance->logger=MESA_create_runtime_log_handle(_instance->log_path, _instance->level);
|
2019-12-09 18:58:05 +08:00
|
|
|
if(_instance->logger==NULL)
|
|
|
|
|
{
|
2020-09-28 17:13:39 +08:00
|
|
|
printf("MESA_create_runtime_log_handle failed ..., path: %s level: %d", _instance->log_path, _instance->level);
|
2019-12-09 18:58:05 +08:00
|
|
|
return NULL;
|
|
|
|
|
}
|
2019-12-20 11:15:29 +08:00
|
|
|
|
|
|
|
|
MESA_load_profile_int_def(conffile, "TSG_LOG", "MODE",&(_instance->mode), 0);
|
|
|
|
|
if(_instance->mode==CLOSE)
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(_instance->logger, RLOG_LV_FATAL, "TSG_LOG", "Disable tsg_send_log");
|
|
|
|
|
return _instance;
|
|
|
|
|
}
|
2020-09-01 11:35:49 +08:00
|
|
|
|
|
|
|
|
MESA_load_profile_int_def(conffile, "TSG_LOG", "RECOVERY_INTERVEL_S", &(_instance->recovery_interval), 30);
|
|
|
|
|
|
2019-12-20 11:15:29 +08:00
|
|
|
MESA_load_profile_string_def(conffile, "TSG_LOG", "COMMON_FIELD_FILE", _instance->common_field_file, sizeof(_instance->common_field_file), NULL);
|
|
|
|
|
MESA_load_profile_string_def(conffile, "TSG_LOG", "BROKER_LIST", _instance->broker_list, sizeof(_instance->broker_list), NULL);
|
2021-08-19 06:20:32 +00:00
|
|
|
MESA_load_profile_string_def(conffile, "TSG_LOG", "SASL_USERNAME", _instance->sasl_username, sizeof(_instance->sasl_username), ""); //admin
|
|
|
|
|
MESA_load_profile_string_def(conffile, "TSG_LOG", "SASL_PASSWD", _instance->sasl_passwd, sizeof(_instance->sasl_passwd), "");
|
2019-12-09 18:58:05 +08:00
|
|
|
|
2020-09-01 11:35:49 +08:00
|
|
|
MESA_load_profile_string_def(conffile, "TSG_LOG", "SEND_QUEUE_MAX_MESSAGE", _instance->send_queue_max_msg, sizeof(_instance->send_queue_max_msg), "1000000");
|
|
|
|
|
MESA_load_profile_string_def(conffile, "TSG_LOG", "REFRESH_INTERVAL_MS", _instance->refresh_interval_ms, sizeof(_instance->refresh_interval_ms), "600000");
|
|
|
|
|
MESA_load_profile_string_def(conffile, "TSG_LOG", "REQUIRE_ACK", _instance->require_ack, sizeof(_instance->require_ack), "1");
|
|
|
|
|
|
2021-06-22 07:01:46 +00:00
|
|
|
MESA_load_profile_string_def(conffile, "SYSTEM", "TCP_LABEL", _instance->tcp_label, sizeof(_instance->tcp_label), "tcp_flow_stat");
|
|
|
|
|
MESA_load_profile_string_def(conffile, "SYSTEM", "UDP_LABEL", _instance->udp_label, sizeof(_instance->udp_label), "udp_flow_stat");
|
2020-07-24 17:04:09 +08:00
|
|
|
|
|
|
|
|
_instance->tcp_flow_project_id=project_customer_register(_instance->tcp_label, "struct");
|
|
|
|
|
_instance->udp_flow_project_id=project_customer_register(_instance->udp_label, "struct");
|
|
|
|
|
if(_instance->tcp_flow_project_id<0 || _instance->udp_flow_project_id<0)
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(_instance->logger,
|
|
|
|
|
RLOG_LV_FATAL,
|
|
|
|
|
"TCP_OR_UDP_LABEL",
|
|
|
|
|
"project_customer_register is error, tcp_label: %s udp_label: %s, please check etc/project.conf",
|
|
|
|
|
_instance->tcp_label,
|
|
|
|
|
_instance->udp_label
|
|
|
|
|
);
|
|
|
|
|
}
|
|
|
|
|
|
2021-06-22 07:01:46 +00:00
|
|
|
MESA_load_profile_string_def(conffile, "SYSTEM", "NIC_NAME", nic_name, sizeof(nic_name), "lo");
|
2019-12-09 18:58:05 +08:00
|
|
|
ret=MESA_get_dev_ipv4(nic_name, (int *)&local_ip_nr);
|
|
|
|
|
if(ret<0)
|
|
|
|
|
{
|
2020-04-27 17:49:59 +08:00
|
|
|
MESA_handle_runtime_log(_instance->logger,
|
|
|
|
|
RLOG_LV_FATAL,
|
|
|
|
|
"GET_LOCAL_IP",
|
|
|
|
|
"MESA_get_dev_ipv4 is error, nic_name: %s, please check tsgconf/main.conf",
|
|
|
|
|
nic_name
|
|
|
|
|
);
|
2019-12-09 18:58:05 +08:00
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
inet_ntop(AF_INET,&(local_ip_nr),_instance->local_ip_str,sizeof(_instance->local_ip_str));
|
2020-11-14 15:50:44 +06:00
|
|
|
|
2020-09-01 11:35:49 +08:00
|
|
|
rdkafka_conf = rd_kafka_conf_new();
|
|
|
|
|
rd_kafka_conf_set(rdkafka_conf, "queue.buffering.max.messages", _instance->send_queue_max_msg, kafka_errstr, sizeof(kafka_errstr));
|
|
|
|
|
rd_kafka_conf_set(rdkafka_conf, "topic.metadata.refresh.interval.ms", _instance->refresh_interval_ms, kafka_errstr, sizeof(kafka_errstr));
|
2021-04-29 14:43:44 +08:00
|
|
|
rd_kafka_conf_set(rdkafka_conf, "request.required.acks", _instance->require_ack, kafka_errstr, sizeof(kafka_errstr));
|
2021-07-10 03:40:39 +00:00
|
|
|
rd_kafka_conf_set(rdkafka_conf, "socket.keepalive.enable", "true", kafka_errstr, sizeof(kafka_errstr));
|
|
|
|
|
rd_kafka_conf_set(rdkafka_conf, "bootstrap.servers", _instance->broker_list, kafka_errstr, sizeof(kafka_errstr));
|
2021-08-19 06:20:32 +00:00
|
|
|
|
2021-09-02 15:15:15 +08:00
|
|
|
if(strlen(_instance->sasl_username)> 0 && strlen(_instance->sasl_passwd)>0)
|
2019-12-09 18:58:05 +08:00
|
|
|
{
|
2021-08-19 06:20:32 +00:00
|
|
|
rd_kafka_conf_set(rdkafka_conf, "security.protocol", "sasl_plaintext", kafka_errstr, sizeof(kafka_errstr));
|
|
|
|
|
rd_kafka_conf_set(rdkafka_conf, "sasl.mechanisms", "PLAIN", kafka_errstr, sizeof(kafka_errstr));
|
|
|
|
|
rd_kafka_conf_set(rdkafka_conf, "sasl.username", _instance->sasl_username, kafka_errstr, sizeof(kafka_errstr));
|
|
|
|
|
rd_kafka_conf_set(rdkafka_conf, "sasl.password", _instance->sasl_passwd, kafka_errstr, sizeof(kafka_errstr));
|
2019-12-09 18:58:05 +08:00
|
|
|
}
|
2021-08-19 06:20:32 +00:00
|
|
|
|
2021-08-24 05:28:08 +00:00
|
|
|
if(!(_instance->kafka_handle=rd_kafka_new(RD_KAFKA_PRODUCER, rdkafka_conf, kafka_errstr, sizeof(kafka_errstr))))
|
2019-12-09 18:58:05 +08:00
|
|
|
{
|
2021-08-19 06:20:32 +00:00
|
|
|
MESA_handle_runtime_log(_instance->logger, RLOG_LV_FATAL, "KAFKA_INIT", "rd_kafka_new is error");
|
2019-12-09 18:58:05 +08:00
|
|
|
return NULL;
|
|
|
|
|
}
|
2021-08-19 06:20:32 +00:00
|
|
|
|
2020-01-19 15:53:02 +08:00
|
|
|
load_log_common_field(_instance->common_field_file, _instance->id2field, &(_instance->service2topic), &(_instance->max_service));
|
2019-12-09 18:58:05 +08:00
|
|
|
|
2020-01-19 15:53:02 +08:00
|
|
|
if(_instance->service2topic!=NULL)
|
2019-12-09 18:58:05 +08:00
|
|
|
{
|
2020-01-19 15:53:02 +08:00
|
|
|
_instance->topic_rkt=(rd_kafka_topic_t **)calloc(1, (_instance->max_service)*sizeof(rd_kafka_topic_t*));
|
|
|
|
|
|
2020-04-27 17:49:59 +08:00
|
|
|
for(i=0; i<_instance->max_service; i++)
|
2019-12-09 18:58:05 +08:00
|
|
|
{
|
2020-01-19 15:53:02 +08:00
|
|
|
if(_instance->service2topic[i].type==TLD_TYPE_MAX)
|
|
|
|
|
{
|
|
|
|
|
topic_conf=rd_kafka_topic_conf_new();
|
2021-08-24 05:28:08 +00:00
|
|
|
_instance->topic_rkt[_instance->service2topic[i].id]=rd_kafka_topic_new(_instance->kafka_handle, _instance->service2topic[i].name, topic_conf);
|
2020-01-19 15:53:02 +08:00
|
|
|
}
|
2019-12-09 18:58:05 +08:00
|
|
|
}
|
|
|
|
|
}
|
2020-01-19 15:53:02 +08:00
|
|
|
else
|
|
|
|
|
{
|
2020-04-27 17:49:59 +08:00
|
|
|
MESA_handle_runtime_log(_instance->logger,
|
|
|
|
|
RLOG_LV_FATAL,
|
|
|
|
|
"KAFKA_INIT",
|
|
|
|
|
"load_log_common_field is error, please check %s",
|
|
|
|
|
_instance->common_field_file
|
|
|
|
|
);
|
2020-01-19 15:53:02 +08:00
|
|
|
}
|
2019-12-09 18:58:05 +08:00
|
|
|
|
|
|
|
|
return _instance;
|
|
|
|
|
}
|
2022-02-23 18:43:00 +08:00
|
|
|
void tsg_sendlog_destroy(struct tsg_log_instance_t * instance)
|
|
|
|
|
{
|
2022-02-24 11:50:11 +08:00
|
|
|
if(instance==NULL)
|
2022-02-23 18:43:00 +08:00
|
|
|
{
|
2022-02-24 11:50:11 +08:00
|
|
|
return ;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if(instance->mode==CLOSE)
|
|
|
|
|
{
|
|
|
|
|
for(int i=0; i<instance->max_service; i++)
|
2022-02-23 18:43:00 +08:00
|
|
|
{
|
2022-02-24 11:50:11 +08:00
|
|
|
if(instance->topic_rkt[i]==NULL)
|
|
|
|
|
{
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
rd_kafka_topic_destroy(instance->topic_rkt[i]);
|
2022-02-23 18:43:00 +08:00
|
|
|
}
|
2022-02-24 11:50:11 +08:00
|
|
|
|
|
|
|
|
//rd_kafka_destroy_flags(instance->kafka_handle, 4);
|
|
|
|
|
//rd_kafka_destroy(instance->kafka_handle);
|
|
|
|
|
|
|
|
|
|
free(instance->topic_rkt);
|
|
|
|
|
instance->topic_rkt=NULL;
|
2022-02-23 18:43:00 +08:00
|
|
|
|
2022-02-24 11:50:11 +08:00
|
|
|
free(instance->service2topic);
|
|
|
|
|
instance->service2topic=NULL;
|
2022-02-23 18:43:00 +08:00
|
|
|
}
|
|
|
|
|
|
2022-02-24 11:50:11 +08:00
|
|
|
|
2022-02-23 18:43:00 +08:00
|
|
|
MESA_destroy_runtime_log_handle(instance->logger);
|
|
|
|
|
instance->logger=NULL;
|
|
|
|
|
|
2022-02-24 11:50:11 +08:00
|
|
|
free(instance->drop_start);
|
|
|
|
|
instance->drop_start=NULL;
|
|
|
|
|
|
|
|
|
|
free(instance->fs_status_ids);
|
|
|
|
|
instance->fs_status_ids=NULL;
|
|
|
|
|
|
|
|
|
|
free(instance->send_log_percent);
|
|
|
|
|
instance->send_log_percent=NULL;
|
2022-02-23 18:43:00 +08:00
|
|
|
|
|
|
|
|
free(instance);
|
|
|
|
|
instance=NULL;
|
|
|
|
|
/*
|
|
|
|
|
int ret=0,count=0;
|
|
|
|
|
|
|
|
|
|
while(1)
|
|
|
|
|
{
|
|
|
|
|
ret=rd_kafka_wait_destroyed(1000);
|
|
|
|
|
if(ret==0)
|
|
|
|
|
{
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
count++;
|
|
|
|
|
}
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
return ;
|
|
|
|
|
}
|
2019-12-09 18:58:05 +08:00
|
|
|
|
|
|
|
|
int tsg_send_log(struct tsg_log_instance_t *instance, struct TLD_handle_t *handle, tsg_log_t *log_msg, int thread_id)
|
|
|
|
|
{
|
2021-08-07 17:27:55 +08:00
|
|
|
int fs_id=0;
|
2020-01-19 15:53:02 +08:00
|
|
|
int i=0,status=0;
|
2020-07-20 15:59:15 +08:00
|
|
|
int repeat_cnt=0;
|
2020-09-01 11:35:49 +08:00
|
|
|
struct timespec cur_time;
|
2020-07-20 15:59:15 +08:00
|
|
|
int policy_id[MAX_RESULT_NUM]={0};
|
2019-12-09 18:58:05 +08:00
|
|
|
struct TLD_handle_t *_handle=handle;
|
|
|
|
|
struct tsg_log_instance_t *_instance=instance;
|
2020-05-14 15:52:54 +08:00
|
|
|
|
2019-12-09 18:58:05 +08:00
|
|
|
if(_instance==NULL || _handle==NULL || log_msg==NULL)
|
|
|
|
|
{
|
|
|
|
|
TLD_cancel(handle);
|
2021-11-13 13:27:59 +03:00
|
|
|
MESA_handle_runtime_log(_instance->logger, RLOG_LV_DEBUG, "TSG_SEND_LOG", " instance==NULL || TLD_handle==NULL || log_msg==NULL ");
|
2019-12-09 18:58:05 +08:00
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if(_instance->mode==CLOSE)
|
|
|
|
|
{
|
2020-09-01 11:35:49 +08:00
|
|
|
TLD_cancel(handle);
|
|
|
|
|
FS_operate(g_tsg_para.fs2_handle, g_tsg_para.fs2_field_id[TSG_FS2_DROP_LOG], 0, FS_OP_ADD, 1);
|
2019-12-09 18:58:05 +08:00
|
|
|
MESA_handle_runtime_log(_instance->logger, RLOG_LV_INFO, "TSG_SEND_LOG", "Disable tsg_send_log.");
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
TLD_append_streaminfo(instance, handle, log_msg->a_stream);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_SLED_IP].name, (void *)(_instance->local_ip_str), TLD_TYPE_STRING);
|
2020-09-23 16:51:25 +08:00
|
|
|
if(strlen(g_tsg_para.device_sn)>0)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_DEVICE_ID].name, (void *)(g_tsg_para.device_sn), TLD_TYPE_STRING);
|
|
|
|
|
}
|
2019-12-09 18:58:05 +08:00
|
|
|
|
2021-10-06 16:29:24 +08:00
|
|
|
if(strlen(g_tsg_para.data_center)>0 && _instance->send_data_center==1)
|
2020-09-23 16:51:25 +08:00
|
|
|
{
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_DATA_CENTER].name, (void *)(g_tsg_para.data_center), TLD_TYPE_STRING);
|
|
|
|
|
}
|
2021-10-06 16:29:24 +08:00
|
|
|
|
|
|
|
|
if(strlen(g_tsg_para.device_tag)>0)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_DEVICE_TAG].name, (void *)(g_tsg_para.device_tag), TLD_TYPE_STRING);
|
|
|
|
|
}
|
2021-12-29 21:59:35 +03:00
|
|
|
|
|
|
|
|
set_application_behavior(_instance, _handle, log_msg->a_stream);
|
2021-10-06 16:29:24 +08:00
|
|
|
|
2019-12-09 18:58:05 +08:00
|
|
|
for(i=0;i<log_msg->result_num; i++)
|
|
|
|
|
{
|
2020-07-20 15:59:15 +08:00
|
|
|
if(is_multi_hit_same_policy(&(log_msg->result[i]), policy_id, &repeat_cnt))
|
|
|
|
|
{
|
2020-09-16 10:09:05 +08:00
|
|
|
MESA_handle_runtime_log(_instance->logger, RLOG_LV_DEBUG,
|
|
|
|
|
"TSG_SEND_LOG",
|
|
|
|
|
"tsg same log:cfg_id=%d service=%d addr=%s",
|
|
|
|
|
log_msg->result[i].config_id,
|
|
|
|
|
log_msg->result[i].service_id,
|
2021-04-19 20:37:05 +08:00
|
|
|
(log_msg->a_stream==NULL ? "" : PRINTADDR(log_msg->a_stream,_instance->level))
|
2020-09-16 11:09:44 +08:00
|
|
|
);
|
2020-07-20 15:59:15 +08:00
|
|
|
continue;
|
|
|
|
|
}
|
2020-09-01 11:35:49 +08:00
|
|
|
|
2020-09-16 10:09:05 +08:00
|
|
|
clock_gettime(CLOCK_REALTIME, &cur_time);
|
2020-09-01 11:35:49 +08:00
|
|
|
if((cur_time.tv_nsec%100)>_instance->send_log_percent[thread_id])
|
|
|
|
|
{
|
|
|
|
|
FS_operate(g_tsg_para.fs2_handle, g_tsg_para.fs2_field_id[TSG_FS2_DROP_LOG], 0, FS_OP_ADD, 1);
|
2020-09-16 10:09:05 +08:00
|
|
|
MESA_handle_runtime_log(_instance->logger, RLOG_LV_INFO,
|
|
|
|
|
"TSG_SEND_LOG",
|
|
|
|
|
"tsg drop log:cfg_id=%d service=%d send_log_percent: %d addr=%s",
|
|
|
|
|
log_msg->result[i].config_id,
|
|
|
|
|
log_msg->result[i].service_id,
|
|
|
|
|
_instance->send_log_percent[thread_id],
|
2021-04-19 20:37:05 +08:00
|
|
|
(log_msg->a_stream==NULL ? "" : PRINTADDR(log_msg->a_stream,_instance->level))
|
2020-09-16 11:09:44 +08:00
|
|
|
);
|
2020-09-01 11:35:49 +08:00
|
|
|
continue;
|
|
|
|
|
}
|
2020-07-20 15:59:15 +08:00
|
|
|
|
2019-12-09 18:58:05 +08:00
|
|
|
switch(log_msg->result[i].do_log)
|
|
|
|
|
{
|
|
|
|
|
case LOG_ABORT:
|
|
|
|
|
MESA_handle_runtime_log(_instance->logger, RLOG_LV_INFO,
|
2020-09-16 11:09:44 +08:00
|
|
|
"TSG_SEND_LOG",
|
|
|
|
|
"tsg abort log:cfg_id=%d service=%d addr=%s",
|
|
|
|
|
log_msg->result[i].config_id,
|
|
|
|
|
log_msg->result[i].service_id,
|
2021-04-19 20:37:05 +08:00
|
|
|
(log_msg->a_stream==NULL ? "" : PRINTADDR(log_msg->a_stream,_instance->level))
|
2020-09-16 11:09:44 +08:00
|
|
|
);
|
2020-11-16 12:30:44 +06:00
|
|
|
|
|
|
|
|
fs_id=action2fs_id((int)log_msg->result[i].action);
|
|
|
|
|
FS_operate(g_tsg_para.fs2_handle, g_tsg_para.fs2_field_id[fs_id], 0, FS_OP_ADD, 1);
|
2019-12-09 18:58:05 +08:00
|
|
|
continue;
|
|
|
|
|
break;
|
|
|
|
|
case LOG_ALL:
|
|
|
|
|
break;
|
|
|
|
|
case LOG_NOFILE:
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_POLICY_ID].name, (void *)(long)(log_msg->result[i].config_id), TLD_TYPE_LONG);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_SERVICE].name, (void *)(long)(log_msg->result[i].service_id), TLD_TYPE_LONG);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_ACTION].name, (void *)(long)((unsigned char)log_msg->result[i].action), TLD_TYPE_LONG);
|
2020-12-17 14:44:01 +06:00
|
|
|
|
2021-12-29 21:59:35 +03:00
|
|
|
set_notify_execution_result(_instance, _handle, log_msg->a_stream, &(log_msg->result[i]));
|
2021-08-07 17:27:55 +08:00
|
|
|
|
|
|
|
|
if(_instance->send_user_region==1)
|
|
|
|
|
{
|
|
|
|
|
set_user_region(_instance, _handle, &log_msg->result[i], thread_id);
|
2020-12-17 14:44:01 +06:00
|
|
|
}
|
2021-08-13 10:23:05 +00:00
|
|
|
|
|
|
|
|
if(log_msg->result[i].config_id==0 && log_msg->a_stream!=NULL)
|
|
|
|
|
{
|
|
|
|
|
set_nat_linkinfo(_instance, _handle, log_msg->a_stream, _instance->id2field[LOG_COMMON_LINK_INFO_C2S].name, _instance->nat_c2s_linkinfo_project_id);
|
|
|
|
|
set_nat_linkinfo(_instance, _handle, log_msg->a_stream, _instance->id2field[LOG_COMMON_LINK_INFO_S2C].name, _instance->nat_s2c_linkinfo_project_id);
|
|
|
|
|
}
|
2020-04-27 17:49:59 +08:00
|
|
|
|
|
|
|
|
if(log_msg->result[i].action==TSG_ACTION_DENY)
|
|
|
|
|
{
|
|
|
|
|
set_common_sub_action(_handle, _instance->id2field[LOG_COMMON_SUB_ACTION].name, &(log_msg->result[i]));
|
|
|
|
|
}
|
2020-04-16 13:03:56 +08:00
|
|
|
|
2021-08-13 10:23:05 +00:00
|
|
|
StringBuffer sb(0, 2048);
|
|
|
|
|
Writer<StringBuffer> writer(sb);
|
|
|
|
|
_handle->document->Accept(writer);
|
2019-12-09 18:58:05 +08:00
|
|
|
|
2021-08-13 10:23:05 +00:00
|
|
|
status=rd_kafka_produce(_instance->topic_rkt[log_msg->result[i].service_id], RD_KAFKA_PARTITION_UA, RD_KAFKA_MSG_F_COPY, (void *)sb.GetString(), sb.GetSize(), NULL, 0, NULL);
|
2021-05-11 17:19:41 +08:00
|
|
|
if(status<0)
|
2019-12-09 18:58:05 +08:00
|
|
|
{
|
2020-09-01 11:35:49 +08:00
|
|
|
clock_gettime(CLOCK_REALTIME, &cur_time);
|
|
|
|
|
if(cur_time.tv_sec - _instance->drop_start[thread_id].tv_sec>=1)
|
|
|
|
|
{
|
|
|
|
|
_instance->send_log_percent[thread_id]/=2;
|
|
|
|
|
clock_gettime(CLOCK_REALTIME, &_instance->drop_start[thread_id]);
|
2020-09-16 11:09:44 +08:00
|
|
|
FS_operate(g_tsg_para.fs2_handle, _instance->fs_status_ids[thread_id], 0, FS_OP_SET, _instance->send_log_percent[thread_id]);
|
2020-09-01 11:35:49 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
FS_operate(g_tsg_para.fs2_handle, g_tsg_para.fs2_field_id[TSG_FS2_FAILED_LOG], 0, FS_OP_ADD, 1);
|
|
|
|
|
|
|
|
|
|
MESA_handle_runtime_log(_instance->logger,
|
|
|
|
|
RLOG_LV_INFO,
|
|
|
|
|
"TSG_SEND_LOG",
|
2021-05-18 11:24:26 +08:00
|
|
|
"tsg_send_log to kafka is error of %s(%s), status: %d, topic: %s payload: %s",
|
|
|
|
|
rd_kafka_err2name(rd_kafka_last_error()),
|
|
|
|
|
rd_kafka_err2str(rd_kafka_last_error()),
|
2020-09-01 11:35:49 +08:00
|
|
|
status,
|
|
|
|
|
_instance->service2topic[log_msg->result[i].service_id].name,
|
2021-08-13 10:23:05 +00:00
|
|
|
sb.GetString()
|
2020-09-01 11:35:49 +08:00
|
|
|
);
|
2019-12-09 18:58:05 +08:00
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
2020-09-01 11:35:49 +08:00
|
|
|
MESA_handle_runtime_log(_instance->logger,
|
|
|
|
|
RLOG_LV_DEBUG,
|
|
|
|
|
"TSG_SEND_LOG",
|
|
|
|
|
"log send successfully %s: %s",
|
|
|
|
|
_instance->service2topic[log_msg->result[i].service_id].name,
|
2021-08-13 10:23:05 +00:00
|
|
|
sb.GetString()
|
2020-09-01 11:35:49 +08:00
|
|
|
);
|
2020-09-16 10:09:05 +08:00
|
|
|
FS_operate(g_tsg_para.fs2_handle, g_tsg_para.fs2_field_id[TSG_FS2_SUCCESS_LOG], 0, FS_OP_ADD, 1);
|
2020-09-16 11:09:44 +08:00
|
|
|
FS_operate(g_tsg_para.fs2_handle, _instance->fs_status_ids[thread_id], 0, FS_OP_SET, _instance->send_log_percent[thread_id]);
|
2019-12-09 18:58:05 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
TLD_delete(_handle, _instance->id2field[LOG_COMMON_POLICY_ID].name);
|
|
|
|
|
TLD_delete(_handle, _instance->id2field[LOG_COMMON_SERVICE].name);
|
|
|
|
|
TLD_delete(_handle, _instance->id2field[LOG_COMMON_ACTION].name);
|
2020-12-17 14:44:01 +06:00
|
|
|
TLD_delete(_handle, _instance->id2field[LOG_COMMON_USER_REGION].name);
|
2020-04-16 13:03:56 +08:00
|
|
|
TLD_delete(_handle, _instance->id2field[LOG_COMMON_SUB_ACTION].name);
|
2019-12-09 18:58:05 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
TLD_cancel(handle);
|
|
|
|
|
|
2020-09-01 11:35:49 +08:00
|
|
|
if(_instance->send_log_percent[thread_id]<100)
|
|
|
|
|
{
|
|
|
|
|
clock_gettime(CLOCK_REALTIME, &cur_time);
|
|
|
|
|
if(cur_time.tv_sec - _instance->drop_start[thread_id].tv_sec>=_instance->recovery_interval)
|
|
|
|
|
{
|
|
|
|
|
_instance->send_log_percent[thread_id]++;
|
|
|
|
|
_instance->drop_start[thread_id].tv_sec=cur_time.tv_sec;
|
2020-09-16 11:09:44 +08:00
|
|
|
FS_operate(g_tsg_para.fs2_handle, _instance->fs_status_ids[thread_id], 0, FS_OP_SET, _instance->send_log_percent[thread_id]);
|
2020-09-01 11:35:49 +08:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2019-12-09 18:58:05 +08:00
|
|
|
return 0;
|
2019-11-12 13:35:19 +08:00
|
|
|
}
|
|
|
|
|
|
2021-08-24 05:28:08 +00:00
|
|
|
int tsg_register_topic(struct tsg_log_instance_t *instance, char *topic_name)
|
|
|
|
|
{
|
|
|
|
|
rd_kafka_topic_conf_t *topic_conf;
|
|
|
|
|
struct tsg_log_instance_t *_instance=(struct tsg_log_instance_t *)instance;
|
2021-08-24 06:06:43 +00:00
|
|
|
if(_instance==NULL || _instance->mode==CLOSE)
|
2021-08-24 05:28:08 +00:00
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2021-08-24 06:06:43 +00:00
|
|
|
if(topic_name!=NULL && _instance->kafka_handle!=NULL)
|
2021-08-24 05:28:08 +00:00
|
|
|
{
|
|
|
|
|
_instance->service2topic=(id2field_t *)realloc(_instance->service2topic, (_instance->max_service+1)*sizeof(id2field_t));
|
|
|
|
|
_instance->service2topic[_instance->max_service].id=_instance->max_service;
|
|
|
|
|
_instance->service2topic[_instance->max_service].type=TLD_TYPE_MAX;
|
|
|
|
|
memset(_instance->service2topic[_instance->max_service].name, 0, MAX_STRING_LEN);
|
|
|
|
|
memcpy(_instance->service2topic[_instance->max_service].name, topic_name, MIN(MAX_STRING_LEN-1, strlen(topic_name)));
|
|
|
|
|
|
|
|
|
|
_instance->topic_rkt=(rd_kafka_topic_t **)realloc(_instance->topic_rkt, (_instance->max_service+1)*sizeof(rd_kafka_topic_t*));
|
|
|
|
|
topic_conf=rd_kafka_topic_conf_new();
|
|
|
|
|
_instance->topic_rkt[_instance->max_service]=rd_kafka_topic_new(_instance->kafka_handle, topic_name, topic_conf);
|
|
|
|
|
|
|
|
|
|
_instance->max_service++;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return (_instance->max_service-1);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int tsg_send_payload(struct tsg_log_instance_t *instance, int topic_id, char *payload, int payload_len, int thread_id)
|
|
|
|
|
{
|
|
|
|
|
int status=0;
|
|
|
|
|
struct tsg_log_instance_t *_instance=instance;
|
|
|
|
|
|
2021-08-24 06:06:43 +00:00
|
|
|
if(_instance==NULL || _instance->mode==CLOSE)
|
2021-08-24 05:28:08 +00:00
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2021-08-24 06:06:43 +00:00
|
|
|
if(payload==NULL || payload_len<=0 || topic_id<0 || _instance->topic_rkt==NULL)
|
2021-08-24 05:28:08 +00:00
|
|
|
{
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
status=rd_kafka_produce(_instance->topic_rkt[topic_id], RD_KAFKA_PARTITION_UA, RD_KAFKA_MSG_F_COPY, payload, payload_len, NULL, 0, NULL);
|
|
|
|
|
if(status<0)
|
|
|
|
|
{
|
|
|
|
|
FS_operate(g_tsg_para.fs2_handle, g_tsg_para.fs2_field_id[TSG_FS2_DDOS_FAILED_LOG], 0, FS_OP_ADD, 1);
|
|
|
|
|
|
|
|
|
|
MESA_handle_runtime_log(_instance->logger,
|
|
|
|
|
RLOG_LV_INFO,
|
|
|
|
|
"TSG_SEND_LOG",
|
|
|
|
|
"tsg_send_log to kafka is error of %s(%s), status: %d, topic: %s",
|
|
|
|
|
rd_kafka_err2name(rd_kafka_last_error()),
|
|
|
|
|
rd_kafka_err2str(rd_kafka_last_error()),
|
|
|
|
|
status,
|
|
|
|
|
_instance->service2topic[topic_id].name
|
|
|
|
|
);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
FS_operate(g_tsg_para.fs2_handle, g_tsg_para.fs2_field_id[TSG_FS2_DDOS_SUCCESS_LOG], 0, FS_OP_ADD, 1);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|