2019-11-12 13:35:19 +08:00
|
|
|
#include <stdio.h>
|
|
|
|
|
#include <string.h>
|
|
|
|
|
#include <stdlib.h>
|
|
|
|
|
#include <assert.h>
|
2019-12-09 18:58:05 +08:00
|
|
|
#include <time.h>
|
2019-11-12 13:35:19 +08:00
|
|
|
#include <sys/socket.h>
|
|
|
|
|
#include <netinet/in.h>
|
|
|
|
|
#include <arpa/inet.h>
|
|
|
|
|
#include <net/if.h>
|
|
|
|
|
#include <sys/types.h>
|
|
|
|
|
#include <sys/ioctl.h>
|
|
|
|
|
#include <unistd.h>
|
2020-09-01 11:35:49 +08:00
|
|
|
#include <pthread.h>
|
2021-04-07 02:36:51 +00:00
|
|
|
#include <arpa/inet.h>
|
2019-11-12 13:35:19 +08:00
|
|
|
|
|
|
|
|
#include <MESA/stream.h>
|
|
|
|
|
#include <MESA/MESA_prof_load.h>
|
|
|
|
|
#include <MESA/MESA_handle_logger.h>
|
|
|
|
|
|
2020-11-14 15:50:44 +06:00
|
|
|
#include "app_label.h"
|
2019-12-09 18:58:05 +08:00
|
|
|
#include "tsg_entry.h"
|
2019-11-12 13:35:19 +08:00
|
|
|
#include "tsg_send_log.h"
|
|
|
|
|
#include "tsg_send_log_internal.h"
|
|
|
|
|
|
2021-08-13 19:45:18 +08:00
|
|
|
#include "rapidjson/document.h" // rapidjson's DOM-style API
|
|
|
|
|
#include "rapidjson/prettywriter.h" // for stringify JSON
|
|
|
|
|
#include "rapidjson/stringbuffer.h"
|
|
|
|
|
|
2022-09-09 15:07:37 +08:00
|
|
|
#ifndef MIN
|
|
|
|
|
#define MIN(a, b) (((a) < (b)) ? (a) : (b))
|
|
|
|
|
#endif
|
2021-08-13 19:45:18 +08:00
|
|
|
|
|
|
|
|
using namespace rapidjson;
|
|
|
|
|
using namespace std;
|
|
|
|
|
|
2020-07-29 18:51:58 +08:00
|
|
|
char TSG_SEND_LOG_VERSION_20200729=0;
|
2019-12-09 18:58:05 +08:00
|
|
|
struct tsg_log_instance_t *g_tsg_log_instance;
|
2019-11-12 13:35:19 +08:00
|
|
|
|
2021-08-13 19:45:18 +08:00
|
|
|
struct TLD_handle_t
|
|
|
|
|
{
|
|
|
|
|
int thread_id;
|
2021-11-13 13:27:59 +03:00
|
|
|
MemoryPoolAllocator<> *valueAllocator;
|
2021-08-13 19:45:18 +08:00
|
|
|
Document *document;
|
|
|
|
|
};
|
|
|
|
|
|
2022-05-17 10:05:40 +00:00
|
|
|
id2field_t g_log_fs2_field[LOG_FS2_TYPE_MAX]={
|
|
|
|
|
{0, LOG_FS2_ABORT_ALLOW, "abort_allow"},
|
|
|
|
|
{0, LOG_FS2_ABORT_DENY, "abort_deny"},
|
|
|
|
|
{0, LOG_FS2_ABORT_MONITOR, "abort_monitor"},
|
|
|
|
|
{0, LOG_FS2_ABORT_INTERCEPT, "abort_intercept"},
|
|
|
|
|
{0, LOG_FS2_ABORT_UNKNOWN, "abort_unknown"},
|
|
|
|
|
{0, LOG_FS2_CREATE_LOG_HANDLE, "create_log_cnt"},
|
|
|
|
|
{0, LOG_FS2_DUP_LOG_HANDLE, "dup_log_cnt"},
|
|
|
|
|
{0, LOG_FS2_APPEND_LOG_HANDLE, "append_log_cnt"},
|
|
|
|
|
{0, LOG_FS2_FREE_LOG_HANDLE, "free_log_cnt"},
|
|
|
|
|
{0, LOG_FS2_FREE_RAPID_SIZE, "free_rapid_size"},
|
|
|
|
|
{0, LOG_FS2_FREE_RAPID_CAPACITY, "free_rapid_capacity"}
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
2019-12-09 18:58:05 +08:00
|
|
|
const id2field_t tld_type[TLD_TYPE_MAX]={{TLD_TYPE_UNKNOWN, TLD_TYPE_UNKNOWN, "UNKOWN"},
|
|
|
|
|
{TLD_TYPE_LONG, TLD_TYPE_LONG, "LONG"},
|
|
|
|
|
{TLD_TYPE_STRING, TLD_TYPE_STRING, "STRING"},
|
2020-05-18 19:04:26 +08:00
|
|
|
{TLD_TYPE_FILE, TLD_TYPE_FILE, "FILE"},
|
|
|
|
|
{TLD_TYPE_TOPIC, TLD_TYPE_TOPIC, "TOPIC"}
|
2019-12-09 18:58:05 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
extern "C" int MESA_get_dev_ipv4(const char *device, int *ip_add);
|
|
|
|
|
|
2021-08-07 17:27:55 +08:00
|
|
|
static int string_cat(char *dst, int dst_len, char *src)
|
|
|
|
|
{
|
|
|
|
|
if(dst==NULL || dst_len<=0 || src==NULL)
|
|
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return snprintf(dst, dst_len, "%s", src);
|
|
|
|
|
}
|
|
|
|
|
|
2021-08-13 10:23:05 +00:00
|
|
|
#define add_number_member add_member
|
|
|
|
|
#define add_object_member add_member
|
|
|
|
|
|
|
|
|
|
#define add_member(handle, object, key, val) \
|
|
|
|
|
{ \
|
|
|
|
|
Value temp_key; \
|
|
|
|
|
temp_key.SetString((key), (handle)->document->GetAllocator()); \
|
|
|
|
|
(object)->AddMember(temp_key, (val), (handle)->document->GetAllocator()); \
|
|
|
|
|
}
|
|
|
|
|
|
2021-08-14 10:41:25 +08:00
|
|
|
static int copy_rapidjson(struct TLD_handle_t *_handle, char *field_name, const char *json_string)
|
2021-08-13 10:23:05 +00:00
|
|
|
{
|
|
|
|
|
Document nest_document;
|
|
|
|
|
nest_document.Parse(json_string);
|
|
|
|
|
|
|
|
|
|
Value p_object(kObjectType);
|
|
|
|
|
p_object.CopyFrom(nest_document, _handle->document->GetAllocator());
|
|
|
|
|
|
|
|
|
|
TLD_append(_handle, field_name, (void *)&p_object, TLD_TYPE_OBJECT);
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void add_str_member(struct TLD_handle_t *_handle, Value *object, const char *key, const char *val)
|
|
|
|
|
{
|
|
|
|
|
Value temp_key;
|
|
|
|
|
Value temp_val;
|
|
|
|
|
temp_key.SetString(key, _handle->document->GetAllocator());
|
|
|
|
|
temp_val.SetString(val, _handle->document->GetAllocator());
|
|
|
|
|
object->AddMember(temp_key, temp_val, _handle->document->GetAllocator());
|
|
|
|
|
}
|
|
|
|
|
|
2022-05-17 10:05:40 +00:00
|
|
|
|
|
|
|
|
static int register_topic(struct tsg_log_instance_t *instance, struct topic_stat *topic)
|
|
|
|
|
{
|
|
|
|
|
rd_kafka_topic_conf_t *topic_conf;
|
|
|
|
|
struct tsg_log_instance_t *_instance=(struct tsg_log_instance_t *)instance;
|
|
|
|
|
|
|
|
|
|
topic_conf=rd_kafka_topic_conf_new();
|
|
|
|
|
topic->status=1;
|
|
|
|
|
topic->topic_rkt=(rd_kafka_topic_t *)calloc(1, sizeof(rd_kafka_topic_t*));
|
|
|
|
|
topic->topic_rkt=rd_kafka_topic_new(_instance->kafka_handle, topic->name, topic_conf);
|
|
|
|
|
|
|
|
|
|
int thread_num=get_thread_count();
|
2022-07-20 17:21:17 +08:00
|
|
|
topic->drop_start=(long long *)calloc(thread_num, sizeof(long long));
|
2022-05-17 10:05:40 +00:00
|
|
|
topic->send_log_percent=(int *)calloc(thread_num, sizeof(int));
|
|
|
|
|
|
|
|
|
|
for(int i=0; i<thread_num; i++)
|
|
|
|
|
{
|
|
|
|
|
topic->send_log_percent[i]=100;
|
2022-07-20 17:21:17 +08:00
|
|
|
topic->drop_start[i]=get_current_time_ms();
|
2022-05-17 10:05:40 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
topic->fs2_line_id=FS_register(_instance->fs2_handle, FS_STYLE_LINE, FS_CALC_SPEED, topic->name);
|
|
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
static int update_percent(struct tsg_log_instance_t *_instance, int service_id, enum LOG_COLUMN_STATUS column, int thread_id)
|
|
|
|
|
{
|
2022-07-20 17:21:17 +08:00
|
|
|
long long current_time_ms=get_current_time_ms();
|
2022-05-17 10:05:40 +00:00
|
|
|
struct topic_stat *topic=(struct topic_stat *)&(_instance->service2topic[service_id]);
|
|
|
|
|
|
|
|
|
|
switch(column)
|
|
|
|
|
{
|
|
|
|
|
case LOG_COLUMN_STATUS_SUCCESS:
|
|
|
|
|
FS_operate(_instance->fs2_handle, topic->fs2_line_id, _instance->fs2_column_id[column], FS_OP_ADD, 1);
|
|
|
|
|
FS_operate(_instance->fs2_handle, topic->fs2_line_id, _instance->fs2_column_id[column+1], FS_OP_ADD, 1);
|
|
|
|
|
|
|
|
|
|
FS_operate(_instance->fs2_handle, _instance->sum_line_id, _instance->fs2_column_id[column], FS_OP_ADD, 1);
|
|
|
|
|
FS_operate(_instance->fs2_handle, _instance->sum_line_id, _instance->fs2_column_id[column+1], FS_OP_ADD, 1);
|
|
|
|
|
break;
|
|
|
|
|
case LOG_COLUMN_STATUS_FAIL:
|
|
|
|
|
FS_operate(_instance->fs2_handle, topic->fs2_line_id, _instance->fs2_column_id[column], FS_OP_ADD, 1);
|
|
|
|
|
FS_operate(_instance->fs2_handle, topic->fs2_line_id, _instance->fs2_column_id[column+1], FS_OP_ADD, 1);
|
|
|
|
|
|
|
|
|
|
FS_operate(_instance->fs2_handle, _instance->sum_line_id, _instance->fs2_column_id[column], FS_OP_ADD, 1);
|
|
|
|
|
FS_operate(_instance->fs2_handle, _instance->sum_line_id, _instance->fs2_column_id[column+1], FS_OP_ADD, 1);
|
2022-07-20 17:21:17 +08:00
|
|
|
if(current_time_ms - topic->drop_start[thread_id]>=1000)
|
2022-05-17 10:05:40 +00:00
|
|
|
{
|
|
|
|
|
topic->send_log_percent[thread_id]/=2;
|
2022-07-20 17:21:17 +08:00
|
|
|
topic->drop_start[thread_id]=current_time_ms;
|
2022-05-17 10:05:40 +00:00
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
case LOG_COLUMN_STATUS_DROP:
|
2022-07-20 17:21:17 +08:00
|
|
|
if((current_time_ms%100) > topic->send_log_percent[thread_id])
|
2022-05-17 10:05:40 +00:00
|
|
|
{
|
|
|
|
|
FS_operate(_instance->fs2_handle, topic->fs2_line_id, _instance->fs2_column_id[column], FS_OP_ADD, 1);
|
|
|
|
|
FS_operate(_instance->fs2_handle, topic->fs2_line_id, _instance->fs2_column_id[column+1], FS_OP_ADD, 1);
|
|
|
|
|
|
|
|
|
|
FS_operate(_instance->fs2_handle, _instance->sum_line_id, _instance->fs2_column_id[column], FS_OP_ADD, 1);
|
|
|
|
|
FS_operate(_instance->fs2_handle, _instance->sum_line_id, _instance->fs2_column_id[column+1], FS_OP_ADD, 1);
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
case LOG_COLUMN_STATUS_MAX:
|
|
|
|
|
if(topic->send_log_percent[thread_id]>=100)
|
|
|
|
|
{
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
2022-07-20 17:21:17 +08:00
|
|
|
if((current_time_ms - topic->drop_start[thread_id]) >= _instance->recovery_interval*1000)
|
2022-05-17 10:05:40 +00:00
|
|
|
{
|
|
|
|
|
topic->send_log_percent[thread_id]++;
|
2022-07-20 17:21:17 +08:00
|
|
|
topic->drop_start[thread_id]=current_time_ms;
|
2022-05-17 10:05:40 +00:00
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static struct tsg_log_instance_t *get_log_instance(void)
|
|
|
|
|
{
|
|
|
|
|
if(g_tsg_log_instance!=NULL)
|
|
|
|
|
{
|
|
|
|
|
return g_tsg_log_instance;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
2021-04-07 02:36:51 +00:00
|
|
|
static int is_tunnels(struct streaminfo *a_stream)
|
|
|
|
|
{
|
2021-04-20 14:37:00 +08:00
|
|
|
const struct streaminfo *ptmp = a_stream;
|
|
|
|
|
const struct streaminfo *pfather=NULL;
|
|
|
|
|
int is_tunnel=0;
|
|
|
|
|
|
|
|
|
|
while(ptmp)
|
2021-04-07 02:36:51 +00:00
|
|
|
{
|
2021-04-20 14:37:00 +08:00
|
|
|
pfather = ptmp->pfather;
|
|
|
|
|
switch(ptmp->addr.addrtype)
|
|
|
|
|
{
|
|
|
|
|
case ADDR_TYPE_GRE:
|
|
|
|
|
case ADDR_TYPE_VLAN:
|
|
|
|
|
case ADDR_TYPE_L2TP:
|
|
|
|
|
case ADDR_TYPE_PPTP:
|
|
|
|
|
case ADDR_TYPE_VXLAN:
|
|
|
|
|
case ADDR_TYPE_GPRS_TUNNEL:
|
|
|
|
|
case __ADDR_TYPE_IP_PAIR_V4:
|
|
|
|
|
case __ADDR_TYPE_IP_PAIR_V6:
|
|
|
|
|
is_tunnel=1;
|
|
|
|
|
break;
|
|
|
|
|
case ADDR_TYPE_MPLS:
|
|
|
|
|
if(ptmp->addr.mpls->s2c_layer_num==0 && ptmp->addr.mpls->c2s_layer_num==0)
|
|
|
|
|
{
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
is_tunnel=1;
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
ptmp = pfather;
|
2021-04-07 02:36:51 +00:00
|
|
|
}
|
|
|
|
|
|
2021-04-20 14:37:00 +08:00
|
|
|
return is_tunnel;
|
2021-04-07 02:36:51 +00:00
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
static int set_isn(struct TLD_handle_t *_handle, struct streaminfo *a_stream, char *field_name, enum MESA_stream_opt type)
|
2021-04-07 02:36:51 +00:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
int ret=0;
|
|
|
|
|
unsigned int isn=0;
|
|
|
|
|
int size=sizeof(unsigned long long);
|
|
|
|
|
|
|
|
|
|
size=sizeof(unsigned int);
|
|
|
|
|
ret=MESA_get_stream_opt(a_stream, type, &isn, &size);
|
|
|
|
|
if(ret==0)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, field_name, (void *)(long)isn, TLD_TYPE_LONG);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static int set_tcp_isn(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct streaminfo *a_stream)
|
|
|
|
|
{
|
|
|
|
|
if(a_stream->type==STREAM_TYPE_TCP)
|
|
|
|
|
{
|
|
|
|
|
switch(a_stream->dir)
|
|
|
|
|
{
|
|
|
|
|
case DIR_C2S:
|
|
|
|
|
set_isn(_handle, a_stream, _instance->id2field[LOG_COMMON_TCP_CLIENT_ISN].name, MSO_TCP_ISN_C2S);
|
|
|
|
|
break;
|
|
|
|
|
case DIR_S2C:
|
|
|
|
|
set_isn(_handle, a_stream, _instance->id2field[LOG_COMMON_TCP_SERVER_ISN].name, MSO_TCP_ISN_S2C);
|
|
|
|
|
break;
|
|
|
|
|
case DIR_DOUBLE:
|
|
|
|
|
set_isn(_handle, a_stream, _instance->id2field[LOG_COMMON_TCP_CLIENT_ISN].name, MSO_TCP_ISN_C2S);
|
|
|
|
|
set_isn(_handle, a_stream, _instance->id2field[LOG_COMMON_TCP_SERVER_ISN].name, MSO_TCP_ISN_S2C);
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
2021-04-20 14:37:00 +08:00
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
return 1;
|
|
|
|
|
}
|
2021-04-28 09:23:05 +00:00
|
|
|
|
2021-07-05 14:22:24 +08:00
|
|
|
static int set_linkinfo(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct streaminfo *a_stream)
|
|
|
|
|
{
|
2022-06-28 15:01:14 +08:00
|
|
|
const char *linkinfo=(const char *)stream_bridge_async_data_get(a_stream, _instance->bridge_id[LOG_BRIDGE_MAC_LINKINFO]);
|
2021-07-05 14:22:24 +08:00
|
|
|
if(linkinfo==NULL)
|
|
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
cJSON *item=NULL;
|
|
|
|
|
cJSON *object=cJSON_Parse(linkinfo);
|
|
|
|
|
if(object)
|
|
|
|
|
{
|
|
|
|
|
item=cJSON_GetObjectItem(object, "common_direction");
|
|
|
|
|
if(item!=NULL)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, (char *)"common_direction", (void *)(long)(item->valueint), TLD_TYPE_LONG);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
item=cJSON_GetObjectItem(object, "common_egress_link_id");
|
|
|
|
|
if(item!=NULL)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, (char *)"common_egress_link_id", (void *)(long)(item->valueint), TLD_TYPE_LONG);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
item=cJSON_GetObjectItem(object, "common_ingress_link_id");
|
|
|
|
|
if(item!=NULL)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, (char *)"common_ingress_link_id", (void *)(long)(item->valueint), TLD_TYPE_LONG);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
cJSON_Delete(object);
|
|
|
|
|
object=NULL;
|
|
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2021-08-07 17:27:55 +08:00
|
|
|
static int set_asn(struct TLD_handle_t *_handle, struct streaminfo *a_stream, char *field_name, struct asn_info *asn_info)
|
2021-04-28 09:23:05 +00:00
|
|
|
{
|
2021-08-07 17:27:55 +08:00
|
|
|
int len=0;
|
2021-04-28 09:23:05 +00:00
|
|
|
char buff[1024]={0};
|
2021-08-07 17:27:55 +08:00
|
|
|
int buff_len=sizeof(buff);
|
2021-04-28 09:23:05 +00:00
|
|
|
|
|
|
|
|
if(asn_info!=NULL)
|
|
|
|
|
{
|
2021-09-02 19:30:15 +08:00
|
|
|
len+=string_cat(buff+len, buff_len-len, asn_info->asn_id);
|
2021-08-07 17:27:55 +08:00
|
|
|
buff[len++]='(';
|
2021-09-02 19:30:15 +08:00
|
|
|
len+=string_cat(buff+len, buff_len-len, asn_info->organization);
|
2021-08-07 17:27:55 +08:00
|
|
|
buff[len++]=')';
|
2021-04-28 09:23:05 +00:00
|
|
|
TLD_append(_handle, field_name, (void *)buff, TLD_TYPE_STRING);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
2021-08-07 17:27:55 +08:00
|
|
|
static int set_location(struct TLD_handle_t *_handle, struct streaminfo *a_stream, char *field_name, struct location_info *location_info)
|
2021-04-28 09:23:05 +00:00
|
|
|
{
|
2021-08-07 17:27:55 +08:00
|
|
|
int len=0;
|
2021-04-28 09:23:05 +00:00
|
|
|
char buff[1024]={0};
|
2021-08-07 17:27:55 +08:00
|
|
|
int buff_len=sizeof(buff);
|
2021-04-28 09:23:05 +00:00
|
|
|
|
2022-02-10 02:46:49 +00:00
|
|
|
if(location_info==NULL)
|
2021-04-28 09:23:05 +00:00
|
|
|
{
|
2022-02-10 02:46:49 +00:00
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2022-05-18 11:41:41 +08:00
|
|
|
int location_type=tsg_get_location_type();
|
|
|
|
|
switch(location_type)
|
|
|
|
|
{
|
|
|
|
|
case 18:
|
|
|
|
|
len+=string_cat(buff+len, buff_len-len, location_info->city_full);
|
|
|
|
|
buff[len++]=',';
|
|
|
|
|
len+=string_cat(buff+len, buff_len-len, location_info->province_full);
|
|
|
|
|
buff[len++]=',';
|
|
|
|
|
len+=string_cat(buff+len, buff_len-len, location_info->country_full);
|
|
|
|
|
break;
|
|
|
|
|
case 19:
|
|
|
|
|
len+=string_cat(buff+len, buff_len-len, location_info->country_full);
|
|
|
|
|
buff[len++]='.';
|
|
|
|
|
len+=string_cat(buff+len, buff_len-len, location_info->province_full);
|
|
|
|
|
buff[len++]='.';
|
|
|
|
|
len+=string_cat(buff+len, buff_len-len, location_info->city_full);
|
|
|
|
|
|
|
|
|
|
if(location_info->subdivision_addr!=NULL)
|
|
|
|
|
{
|
|
|
|
|
buff[len++]='.';
|
|
|
|
|
len+=string_cat(buff+len, buff_len-len, location_info->subdivision_addr);
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
return 0;
|
2021-04-28 09:23:05 +00:00
|
|
|
}
|
2022-02-10 02:46:49 +00:00
|
|
|
|
|
|
|
|
TLD_append(_handle, field_name, (void *)buff, TLD_TYPE_STRING);
|
2021-04-28 09:23:05 +00:00
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
static int set_direction(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct streaminfo *a_stream)
|
|
|
|
|
{
|
|
|
|
|
int direction=0,i_or_e=0;
|
|
|
|
|
|
|
|
|
|
i_or_e=MESA_dir_link_to_human(a_stream->routedir);
|
|
|
|
|
switch(a_stream->curdir)
|
2021-04-07 02:36:51 +00:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
case DIR_C2S:
|
|
|
|
|
if(i_or_e=='E' || i_or_e=='e')
|
|
|
|
|
{
|
|
|
|
|
direction='E';
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
direction='I';
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
case DIR_S2C:
|
|
|
|
|
if(i_or_e=='E' || i_or_e=='e')
|
|
|
|
|
{
|
|
|
|
|
direction='I';
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
direction='E';
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
break;
|
2021-04-07 02:36:51 +00:00
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_DIRECTION].name, (void *)(long)direction, TLD_TYPE_LONG);
|
2021-04-07 02:36:51 +00:00
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
return 1;
|
2021-04-07 02:36:51 +00:00
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
static int set_address_list(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct streaminfo *a_stream)
|
2020-11-16 12:30:44 +06:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
unsigned short tunnel_type=0;
|
|
|
|
|
char nest_addr_buf[1024];
|
|
|
|
|
int tunnel_type_size=sizeof(tunnel_type);
|
|
|
|
|
|
2022-07-20 17:21:17 +08:00
|
|
|
MESA_get_stream_opt(a_stream, MSO_STREAM_TUNNEL_TYPE, &tunnel_type, &tunnel_type_size);
|
2021-04-27 09:49:15 +00:00
|
|
|
if(tunnel_type==STREAM_TUNNLE_NON)
|
|
|
|
|
{
|
|
|
|
|
layer_addr_ntop_r(a_stream,nest_addr_buf, sizeof(nest_addr_buf));
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
stream_addr_list_ntop(a_stream,nest_addr_buf, sizeof(nest_addr_buf));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_ADDRESS_LIST].name, (void *)nest_addr_buf, TLD_TYPE_STRING);
|
|
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static int set_tuple4(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct streaminfo *a_stream)
|
|
|
|
|
{
|
|
|
|
|
int addr_type=0;
|
|
|
|
|
unsigned short c_port=0, s_port=0;
|
|
|
|
|
struct layer_addr_ipv4 *ipv4=NULL;
|
|
|
|
|
struct layer_addr_ipv6 *ipv6=NULL;
|
|
|
|
|
char server_ip[MAX_IPV4_LEN*8]={0};
|
|
|
|
|
char client_ip[MAX_IPV4_LEN*8]={0};
|
|
|
|
|
|
|
|
|
|
switch(a_stream->addr.addrtype)
|
2020-11-16 12:30:44 +06:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
case ADDR_TYPE_IPV4:
|
|
|
|
|
case __ADDR_TYPE_IP_PAIR_V4:
|
|
|
|
|
ipv4=a_stream->addr.ipv4;
|
|
|
|
|
addr_type=4;
|
|
|
|
|
c_port=ntohs(ipv4->source);
|
|
|
|
|
s_port=ntohs(ipv4->dest);
|
|
|
|
|
|
|
|
|
|
inet_ntop(AF_INET, (void *)&ipv4->saddr, client_ip, sizeof(client_ip));
|
|
|
|
|
inet_ntop(AF_INET, (void *)&ipv4->daddr, server_ip, sizeof(server_ip));
|
2020-11-16 12:30:44 +06:00
|
|
|
break;
|
2021-04-27 09:49:15 +00:00
|
|
|
case ADDR_TYPE_IPV6:
|
|
|
|
|
case __ADDR_TYPE_IP_PAIR_V6:
|
|
|
|
|
ipv6=a_stream->addr.ipv6;
|
|
|
|
|
addr_type=6;
|
|
|
|
|
c_port=ntohs(ipv6->source);
|
|
|
|
|
s_port=ntohs(ipv6->dest);
|
|
|
|
|
|
|
|
|
|
inet_ntop(AF_INET6, (void *)ipv6->saddr, client_ip, sizeof(client_ip));
|
|
|
|
|
inet_ntop(AF_INET6, (void *)ipv6->daddr, server_ip, sizeof(server_ip));
|
2020-11-16 12:30:44 +06:00
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_SERVER_IP].name, (void *)server_ip, TLD_TYPE_STRING);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_CLIENT_IP].name, (void *)client_ip, TLD_TYPE_STRING);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_SERVER_PORT].name, (void *)(long)s_port, TLD_TYPE_LONG);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_CLIENT_PORT].name, (void *)(long)c_port, TLD_TYPE_LONG);
|
|
|
|
|
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_STREAM_DIR].name, (void *)(long)a_stream->dir, TLD_TYPE_LONG);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_ADDRESS_TYPE].name, (void *)(long)addr_type, TLD_TYPE_LONG);
|
|
|
|
|
|
|
|
|
|
return 1;
|
2020-11-16 12:30:44 +06:00
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
static int set_duraction(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct streaminfo *a_stream)
|
2020-07-20 15:59:15 +08:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
int ret=0;
|
|
|
|
|
long common_con_duration_ms=0;
|
2022-06-14 11:34:28 +08:00
|
|
|
unsigned long long create_time=0,last_time=0;
|
2021-04-27 09:49:15 +00:00
|
|
|
int size=sizeof(unsigned long long);
|
|
|
|
|
|
|
|
|
|
if(a_stream->ptcpdetail!=NULL)
|
2020-07-20 15:59:15 +08:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_START_TIME].name, (void *)(a_stream->ptcpdetail->createtime), TLD_TYPE_LONG);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_END_TIME].name, (void *)(a_stream->ptcpdetail->lastmtime), TLD_TYPE_LONG);
|
|
|
|
|
|
|
|
|
|
ret=MESA_get_stream_opt(a_stream, MSO_STREAM_CREATE_TIMESTAMP_MS, (void *)&create_time, &size);
|
|
|
|
|
if(ret>=0)
|
2020-07-20 15:59:15 +08:00
|
|
|
{
|
2022-06-14 11:34:28 +08:00
|
|
|
ret=MESA_get_stream_opt(a_stream, MSO_STREAM_LASTUPDATE_TIMESTAMP_MS, (void *)&last_time, &size);
|
|
|
|
|
if(ret>=0 && last_time>create_time)
|
|
|
|
|
{
|
|
|
|
|
common_con_duration_ms=last_time-create_time;
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_CON_DURATION_MS].name, (void *)(common_con_duration_ms), TLD_TYPE_LONG);
|
|
|
|
|
}
|
2021-04-27 09:49:15 +00:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
time_t cur_time=time(NULL);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_START_TIME].name, (void *)cur_time, TLD_TYPE_LONG);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_END_TIME].name, (void *)cur_time, TLD_TYPE_LONG);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_CON_DURATION_MS].name, (void *)(common_con_duration_ms), TLD_TYPE_LONG);
|
2020-07-20 15:59:15 +08:00
|
|
|
}
|
2021-04-27 09:49:15 +00:00
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
2020-07-20 15:59:15 +08:00
|
|
|
|
2021-08-07 17:27:55 +08:00
|
|
|
static int set_subscriber_id(struct TLD_handle_t *_handle, char *field_name, struct subscribe_id_info *subscriber)
|
|
|
|
|
{
|
|
|
|
|
if(subscriber!=NULL && subscriber->subscribe_id!=NULL)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, field_name, (void *)subscriber->subscribe_id, TLD_TYPE_STRING);
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2021-04-28 09:23:05 +00:00
|
|
|
static int set_fqdn_category(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct streaminfo *a_stream, unsigned int *category_id, int category_id_num)
|
|
|
|
|
{
|
2021-06-03 13:49:12 +08:00
|
|
|
int i=0;
|
|
|
|
|
if(category_id_num<=0 || category_id==NULL)
|
2021-04-28 09:23:05 +00:00
|
|
|
{
|
2021-06-03 13:49:12 +08:00
|
|
|
return 0;
|
2021-04-28 09:23:05 +00:00
|
|
|
}
|
2021-06-03 13:49:12 +08:00
|
|
|
|
2021-08-13 10:23:05 +00:00
|
|
|
Value array(kArrayType);
|
2021-06-03 13:49:12 +08:00
|
|
|
for(i=0; i<category_id_num; i++)
|
2021-04-28 09:23:05 +00:00
|
|
|
{
|
2021-08-13 10:23:05 +00:00
|
|
|
array.PushBack(category_id[i], _handle->document->GetAllocator());
|
2021-04-28 09:23:05 +00:00
|
|
|
}
|
|
|
|
|
|
2021-08-13 10:23:05 +00:00
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_FQDN_CATEGORY].name, &array, TLD_TYPE_OBJECT);
|
2021-06-03 13:49:12 +08:00
|
|
|
|
2021-04-28 09:23:05 +00:00
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
2021-05-19 07:10:25 +00:00
|
|
|
static int set_umts_user_info(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct streaminfo *a_stream, struct umts_user_info *user_info)
|
|
|
|
|
{
|
|
|
|
|
if(user_info==NULL)
|
|
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if(user_info->apn!=NULL)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_GTP_APN].name, (void *)user_info->apn, TLD_TYPE_STRING);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if(user_info->imsi!=NULL)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_GTP_IMSI].name, (void *)user_info->imsi, TLD_TYPE_STRING);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if(user_info->imei!=NULL)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_GTP_IMEI].name, (void *)user_info->imei, TLD_TYPE_STRING);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if(user_info->msisdn!=NULL)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_GTP_MSISDN].name, (void *)user_info->msisdn, TLD_TYPE_STRING); //phone number
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
2019-12-09 18:58:05 +08:00
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
static int set_packet_bytes(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct streaminfo *a_stream)
|
2019-11-12 13:35:19 +08:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
struct tcp_flow_stat *tflow_project=NULL;
|
|
|
|
|
struct udp_flow_stat *uflow_project=NULL;
|
|
|
|
|
|
|
|
|
|
switch(a_stream->type)
|
2019-12-09 18:58:05 +08:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
case STREAM_TYPE_TCP:
|
|
|
|
|
tflow_project=(struct tcp_flow_stat *)project_req_get_struct(a_stream, _instance->tcp_flow_project_id);
|
|
|
|
|
if(tflow_project!=NULL)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_S2C_PKT_NUM].name, (void *)(long)tflow_project->S2C_all_pkt, TLD_TYPE_LONG);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_S2C_BYTE_NUM].name, (void *)(long)tflow_project->S2C_all_byte_raw, TLD_TYPE_LONG);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_C2S_PKT_NUM].name, (void *)(long)tflow_project->C2S_all_pkt, TLD_TYPE_LONG);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_C2S_BYTE_NUM].name, (void *)(long)tflow_project->C2S_all_byte_raw, TLD_TYPE_LONG);
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
case STREAM_TYPE_UDP:
|
|
|
|
|
uflow_project=(struct udp_flow_stat *)project_req_get_struct(a_stream, _instance->udp_flow_project_id);
|
|
|
|
|
if(uflow_project!=NULL)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_S2C_PKT_NUM].name, (void *)(long)uflow_project->S2C_pkt, TLD_TYPE_LONG);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_S2C_BYTE_NUM].name, (void *)(long)uflow_project->S2C_all_byte_raw, TLD_TYPE_LONG);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_C2S_PKT_NUM].name, (void *)(long)uflow_project->C2S_pkt, TLD_TYPE_LONG);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_C2S_BYTE_NUM].name, (void *)(long)uflow_project->C2S_all_byte_raw, TLD_TYPE_LONG);
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
break;
|
2019-12-09 18:58:05 +08:00
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
return 1;
|
2019-11-12 13:35:19 +08:00
|
|
|
}
|
|
|
|
|
|
2022-06-02 16:57:11 +08:00
|
|
|
static int set_app_identify_info(struct TLD_handle_t *_handle, char *field_name, struct gather_app_result *result)
|
|
|
|
|
{
|
|
|
|
|
int i=0,j=0,ret=0;
|
2022-12-12 11:34:44 +08:00
|
|
|
int add_app_flag=0;
|
2022-06-02 16:57:11 +08:00
|
|
|
char app_name[512]={0};
|
|
|
|
|
Value array(kArrayType);
|
|
|
|
|
|
|
|
|
|
for(i=ORIGIN_USER_DEFINE; i<ORIGIN_MAX; i++)
|
|
|
|
|
{
|
2022-12-30 17:30:53 +08:00
|
|
|
if(result[i].app_num<=0 || i==ORIGIN_QM_ENGINE || i==ORIGIN_QM_ENGINE_L7)
|
2022-06-02 16:57:11 +08:00
|
|
|
{
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for(j=0; j<result[i].app_num; j++)
|
2022-12-12 11:34:44 +08:00
|
|
|
{
|
|
|
|
|
Value object(kObjectType);
|
2022-06-02 16:57:11 +08:00
|
|
|
ret=tsg_app_id2name(result[i].attributes[j].app_id, app_name, sizeof(app_name), 0);
|
|
|
|
|
if(ret>0)
|
|
|
|
|
{
|
|
|
|
|
add_str_member(_handle, &object, "app_name", app_name);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
object.AddMember("app_name", result[i].attributes[j].app_id, _handle->document->GetAllocator());
|
|
|
|
|
}
|
2022-12-12 11:34:44 +08:00
|
|
|
object.AddMember("packet_sequence",result[i].attributes[j].packet_sequence, _handle->document->GetAllocator());
|
|
|
|
|
array.PushBack(object, _handle->document->GetAllocator());
|
|
|
|
|
|
|
|
|
|
add_app_flag=1;
|
2022-06-02 16:57:11 +08:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2022-12-12 11:34:44 +08:00
|
|
|
if(add_app_flag==1)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, field_name, &array, TLD_TYPE_OBJECT);
|
|
|
|
|
}
|
|
|
|
|
|
2022-06-02 16:57:11 +08:00
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static int get_app_id_list(Value *app_id_object, struct TLD_handle_t *_handle, const char *field_name, struct gather_app_result *result)
|
2021-07-05 14:22:24 +08:00
|
|
|
{
|
2022-06-02 16:57:11 +08:00
|
|
|
int i=0,ret=0;
|
|
|
|
|
char app_name[512]={0};
|
|
|
|
|
|
|
|
|
|
if(result->app_num==0)
|
|
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
Value array(kArrayType);
|
|
|
|
|
for(i=0; i<result->app_num; i++)
|
|
|
|
|
{
|
|
|
|
|
Value object(kObjectType);
|
|
|
|
|
ret=tsg_app_id2name(result->attributes[i].app_id, app_name, sizeof(app_name), 1);
|
|
|
|
|
if(ret>0)
|
|
|
|
|
{
|
|
|
|
|
add_str_member(_handle, &object, "app_name", app_name);
|
|
|
|
|
}
|
|
|
|
|
object.AddMember("app_id", result->attributes[i].app_id, _handle->document->GetAllocator());
|
|
|
|
|
object.AddMember("surrogate_id", result->attributes[i].surrogate_id, _handle->document->GetAllocator());
|
|
|
|
|
object.AddMember("packet_sequence",result->attributes[i].packet_sequence, _handle->document->GetAllocator());
|
|
|
|
|
array.PushBack(object, _handle->document->GetAllocator());
|
|
|
|
|
}
|
|
|
|
|
add_object_member(_handle, app_id_object, field_name, array);
|
|
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2022-12-29 06:03:04 +00:00
|
|
|
static int set_userdefine_app(struct TLD_handle_t *_handle, char *field_name, struct gather_app_result *result)
|
2022-06-02 16:57:11 +08:00
|
|
|
{
|
|
|
|
|
if(result==NULL || result->app_num<=0)
|
2021-07-05 14:22:24 +08:00
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int i=0;
|
|
|
|
|
char app_name[256]={0};
|
|
|
|
|
|
2021-08-13 10:23:05 +00:00
|
|
|
Value array(kArrayType);
|
2022-06-02 16:57:11 +08:00
|
|
|
for(i=0; i<result->app_num; i++)
|
2021-07-05 14:22:24 +08:00
|
|
|
{
|
|
|
|
|
memset(app_name, 0, sizeof(app_name));
|
2022-06-02 16:57:11 +08:00
|
|
|
tsg_app_id2name(result->attributes[i].app_id, app_name, sizeof(app_name), 1);
|
2021-07-05 14:22:24 +08:00
|
|
|
if(strnlen(app_name, sizeof(app_name)) > 0)
|
|
|
|
|
{
|
2021-08-13 10:23:05 +00:00
|
|
|
Value app_name_str;
|
|
|
|
|
app_name_str.SetString(app_name, _handle->document->GetAllocator());
|
|
|
|
|
array.PushBack(app_name_str, _handle->document->GetAllocator());
|
2021-07-05 14:22:24 +08:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2021-08-13 10:23:05 +00:00
|
|
|
TLD_append(_handle, field_name, &array, TLD_TYPE_OBJECT);
|
2021-07-05 14:22:24 +08:00
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
2022-06-02 16:57:11 +08:00
|
|
|
static unsigned int get_userdefine_name(struct gather_app_result *result, char *app_name, int app_name_len, int *flag, int is_joint_parent)
|
2021-07-05 14:22:24 +08:00
|
|
|
{
|
2022-06-02 16:57:11 +08:00
|
|
|
if((*flag)==1 || result->app_num<=0)
|
2021-07-22 11:53:48 +08:00
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
2022-06-02 16:57:11 +08:00
|
|
|
|
2021-07-22 11:53:48 +08:00
|
|
|
|
2021-07-05 14:22:24 +08:00
|
|
|
int i=0;
|
2022-06-02 16:57:11 +08:00
|
|
|
unsigned int max_app_id=0;
|
2021-07-05 14:22:24 +08:00
|
|
|
|
2022-06-02 16:57:11 +08:00
|
|
|
for(i=0; i< result->app_num; i++)
|
2021-07-05 14:22:24 +08:00
|
|
|
{
|
2022-06-02 16:57:11 +08:00
|
|
|
if(max_app_id < result->attributes[i].app_id)
|
2021-07-05 14:22:24 +08:00
|
|
|
{
|
2022-06-02 16:57:11 +08:00
|
|
|
max_app_id=result->attributes[i].app_id;
|
2021-07-05 14:22:24 +08:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2022-06-02 16:57:11 +08:00
|
|
|
(*flag)=1;
|
|
|
|
|
tsg_app_id2name(max_app_id, app_name, app_name_len, is_joint_parent);
|
2021-07-05 14:22:24 +08:00
|
|
|
|
|
|
|
|
return max_app_id;
|
|
|
|
|
}
|
|
|
|
|
|
2022-06-02 16:57:11 +08:00
|
|
|
static int get_app_name_list(struct gather_app_result *result, char *app_name, int app_name_len, int *flag, int is_joint_parent)
|
2021-05-11 17:19:41 +08:00
|
|
|
{
|
|
|
|
|
int i=0;
|
|
|
|
|
int offset=0;
|
2021-04-27 09:49:15 +00:00
|
|
|
|
2022-06-02 16:57:11 +08:00
|
|
|
if((*flag)==1 || result->app_num<=0)
|
2021-04-27 09:49:15 +00:00
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
2019-11-12 13:35:19 +08:00
|
|
|
|
2022-06-02 16:57:11 +08:00
|
|
|
for(i=result->app_num-1; i<result->app_num; i++)
|
2019-12-09 18:58:05 +08:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
(*flag)=1;
|
2021-05-11 17:19:41 +08:00
|
|
|
|
|
|
|
|
if(i>0 && offset>0 && (app_name_len-offset)>0)
|
|
|
|
|
{
|
2022-12-29 06:03:04 +00:00
|
|
|
app_name[offset++]='.';
|
2021-05-11 17:19:41 +08:00
|
|
|
}
|
|
|
|
|
|
2022-06-02 16:57:11 +08:00
|
|
|
offset+=tsg_app_id2name(result->attributes[i].app_id, app_name+offset, app_name_len-offset, is_joint_parent);
|
2019-12-09 18:58:05 +08:00
|
|
|
}
|
2019-11-12 13:35:19 +08:00
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
return 1;
|
2019-12-09 18:58:05 +08:00
|
|
|
}
|
2019-11-12 13:35:19 +08:00
|
|
|
|
2022-12-29 06:03:04 +00:00
|
|
|
/*
|
|
|
|
|
L7(openvpn), appSketch(psiphon), Thrid(openvpn.ssl.wechat) = openvpn.ssl.psiphon
|
|
|
|
|
L7(openvpn), appSketch(psiphon), Thrid(openvpn.qq_web.wechat) = openvpn.psiphon
|
|
|
|
|
L7(openvpn), appSketch(psiphon), Thrid(openvpn.wechat) = openvpn.psiphon
|
|
|
|
|
L7(openvpn.ssl), appSketch(psiphon), Thrid(openvpn.wechat) = openvpn.ssl.psiphon
|
|
|
|
|
L7(openvpn.ssl), appSketch(psiphon), Thrid(openvpn) = openvpn.ssl.psiphon
|
|
|
|
|
L7(openvpn.ssl), appSketch(psiphon), Thrid(openvpn.ssl.wechat) = openvpn.ssl.psiphon
|
|
|
|
|
L7(null), appSketch(psiphon), Thrid(openvpn.ssl.wechat) = openvpn.ssl.psiphon
|
|
|
|
|
L7(null), appSketch(psiphon), Thrid(wechat) = psiphon
|
|
|
|
|
L7(null), appSketch(null), Thrid(openvpn.ssl.wechat) = openvpn.ssl.wechat
|
|
|
|
|
L7(null), appSketch(null), Thrid(null) = unknown
|
|
|
|
|
*/
|
|
|
|
|
|
2022-12-30 17:30:53 +08:00
|
|
|
static int split_l7_and_app(struct gather_app_result *qm_result, struct gather_app_result *qm_l7_result)
|
2022-12-29 06:03:04 +00:00
|
|
|
{
|
|
|
|
|
int i=0;
|
2022-12-30 17:30:53 +08:00
|
|
|
for(i=qm_result->app_num; i>0; i--)
|
2022-12-29 06:03:04 +00:00
|
|
|
{
|
2022-12-30 17:30:53 +08:00
|
|
|
if(tsg_l7_protocol_id2name(qm_result->attributes[i-1].app_id))
|
2022-12-29 06:03:04 +00:00
|
|
|
{
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2022-12-30 17:30:53 +08:00
|
|
|
qm_l7_result->app_num=i;
|
|
|
|
|
qm_l7_result->origin=ORIGIN_QM_ENGINE_L7;
|
|
|
|
|
memcpy(qm_l7_result->attributes, qm_result->attributes, sizeof(struct app_attributes)*i);
|
|
|
|
|
|
|
|
|
|
return 0;
|
2022-12-29 06:03:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
** Engine1 1.2 Engine2 1 -> 1.2
|
|
|
|
|
** Engine1 1.2 Engine2 1.3 -> 1.2
|
|
|
|
|
** Engine1 1 Engine2 1.2 -> 1.2
|
|
|
|
|
** Engine1 2 Engine2 1.2 -> 1.2
|
|
|
|
|
** Engine1 1 Engine2 2.3 -> 1
|
|
|
|
|
** Engine1 1 Engine2 2 -> 1
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
static int copy_app_id(struct app_attributes *result, int result_num, unsigned int *combined_array, int combined_array_num)
|
|
|
|
|
{
|
|
|
|
|
int i=0;
|
|
|
|
|
for(i=0; i<result_num && i<combined_array_num; i++)
|
|
|
|
|
{
|
|
|
|
|
combined_array[i]=result[i].app_id;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return i;
|
|
|
|
|
}
|
|
|
|
|
|
2022-12-30 17:30:53 +08:00
|
|
|
#define COMBINED_APP_ID_NUM MAX_APP_ID_NUM*2
|
2022-12-29 06:03:04 +00:00
|
|
|
int set_app_full_path(struct TLD_handle_t *_handle, char *field_name, struct gather_app_result *result)
|
|
|
|
|
{
|
|
|
|
|
int offset=0;
|
|
|
|
|
int combined_num=0;
|
|
|
|
|
char app_full_path[256]={0};
|
2022-12-30 17:30:53 +08:00
|
|
|
unsigned int combined_array[COMBINED_APP_ID_NUM]={0};
|
2022-12-29 06:03:04 +00:00
|
|
|
|
2022-12-30 17:30:53 +08:00
|
|
|
if(result[ORIGIN_BASIC_PROTOCOL].app_num>0)
|
2022-12-29 06:03:04 +00:00
|
|
|
{
|
2022-12-30 17:30:53 +08:00
|
|
|
combined_num+=copy_app_id(result[ORIGIN_BASIC_PROTOCOL].attributes, result[ORIGIN_BASIC_PROTOCOL].app_num, combined_array, COMBINED_APP_ID_NUM);
|
2022-12-29 06:03:04 +00:00
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
2022-12-30 17:30:53 +08:00
|
|
|
combined_num+=copy_app_id(result[ORIGIN_QM_ENGINE_L7].attributes, result[ORIGIN_QM_ENGINE_L7].app_num, combined_array, COMBINED_APP_ID_NUM);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if(result[ORIGIN_USER_DEFINE].app_num>0)
|
|
|
|
|
{
|
|
|
|
|
combined_num+=copy_app_id(result[ORIGIN_USER_DEFINE].attributes, result[ORIGIN_USER_DEFINE].app_num, combined_array+combined_num, COMBINED_APP_ID_NUM-combined_num);
|
|
|
|
|
}
|
|
|
|
|
else if(result[ORIGIN_BUILT_IN].app_num>0)
|
|
|
|
|
{
|
|
|
|
|
combined_num+=copy_app_id(result[ORIGIN_BUILT_IN].attributes, result[ORIGIN_BUILT_IN].app_num, combined_array+combined_num, COMBINED_APP_ID_NUM-combined_num);
|
|
|
|
|
}
|
|
|
|
|
else if(result[ORIGIN_QM_ENGINE].app_num-result[ORIGIN_QM_ENGINE_L7].app_num > 0)
|
|
|
|
|
{
|
|
|
|
|
combined_num+=copy_app_id( result[ORIGIN_QM_ENGINE].attributes + result[ORIGIN_QM_ENGINE_L7].app_num,
|
|
|
|
|
result[ORIGIN_QM_ENGINE].app_num - result[ORIGIN_QM_ENGINE_L7].app_num,
|
|
|
|
|
combined_array+combined_num,
|
|
|
|
|
COMBINED_APP_ID_NUM-combined_num
|
|
|
|
|
);
|
2022-12-29 06:03:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if(combined_num==0)
|
|
|
|
|
{
|
|
|
|
|
offset=tsg_app_id2name(result[ORIGIN_UNKNOWN].attributes[0].app_id, app_full_path, sizeof(app_full_path), 0);
|
|
|
|
|
if(offset>0)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, field_name, (void *)app_full_path, TLD_TYPE_STRING);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for(int i=0; i<combined_num; i++)
|
|
|
|
|
{
|
|
|
|
|
offset+=tsg_app_id2name(combined_array[i], app_full_path+offset, sizeof(app_full_path)-offset, 0);
|
|
|
|
|
if(offset>0)
|
|
|
|
|
{
|
|
|
|
|
app_full_path[offset++]='.';
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if(offset>0)
|
|
|
|
|
{
|
|
|
|
|
app_full_path[offset-1]='\0';
|
|
|
|
|
TLD_append(_handle, field_name, (void *)app_full_path, TLD_TYPE_STRING);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
static int set_app_id(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct streaminfo *a_stream)
|
2019-12-09 18:58:05 +08:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
int app_id_flag=0;
|
2021-05-11 17:19:41 +08:00
|
|
|
char app_name[512]={0};
|
2022-06-02 16:57:11 +08:00
|
|
|
struct gather_app_result *gather_result=NULL;
|
2019-12-09 18:58:05 +08:00
|
|
|
|
2022-06-02 16:57:11 +08:00
|
|
|
gather_result=(struct gather_app_result *)project_req_get_struct(a_stream, g_tsg_para.gather_app_project_id);
|
|
|
|
|
if(gather_result==NULL)
|
2022-12-29 06:03:04 +00:00
|
|
|
{
|
|
|
|
|
if(tsg_app_id2name(_instance->unknown_app_id, app_name, sizeof(app_name), 0))
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_APP_FULL_PATH].name, (void *)app_name, TLD_TYPE_STRING);
|
|
|
|
|
}
|
|
|
|
|
|
2021-05-11 17:19:41 +08:00
|
|
|
return 0;
|
|
|
|
|
}
|
2022-12-30 17:30:53 +08:00
|
|
|
|
|
|
|
|
split_l7_and_app(&(gather_result[ORIGIN_QM_ENGINE]), &(gather_result[ORIGIN_QM_ENGINE_L7]));
|
|
|
|
|
|
|
|
|
|
set_userdefine_app(_handle, _instance->id2field[LOG_COMMON_USERDEFINE_APP].name, &(gather_result[ORIGIN_USER_DEFINE]));
|
|
|
|
|
|
|
|
|
|
set_app_full_path(_handle, _instance->id2field[LOG_COMMON_APP_FULL_PATH].name, gather_result);
|
|
|
|
|
|
|
|
|
|
if(gather_result[ORIGIN_USER_DEFINE].app_num > 0)
|
2021-05-11 17:19:41 +08:00
|
|
|
{
|
2022-12-30 17:30:53 +08:00
|
|
|
get_userdefine_name(&(gather_result[ORIGIN_USER_DEFINE]), app_name, sizeof(app_name), &app_id_flag, 0);
|
|
|
|
|
}
|
|
|
|
|
else if(gather_result[ORIGIN_BUILT_IN].app_num > 0)
|
2021-05-13 18:14:07 +08:00
|
|
|
{
|
2022-12-30 17:30:53 +08:00
|
|
|
get_app_name_list(&(gather_result[ORIGIN_BUILT_IN]), app_name, sizeof(app_name), &app_id_flag, 0);
|
2021-05-13 18:14:07 +08:00
|
|
|
}
|
2022-12-30 17:30:53 +08:00
|
|
|
else if(gather_result[ORIGIN_DKPT].app_num > 0)
|
|
|
|
|
{
|
|
|
|
|
get_app_name_list(&(gather_result[ORIGIN_DKPT]), app_name, sizeof(app_name), &app_id_flag, 0);
|
|
|
|
|
}
|
|
|
|
|
else if(gather_result[ORIGIN_QM_ENGINE].app_num - gather_result[ORIGIN_QM_ENGINE_L7].app_num > 0)
|
|
|
|
|
{
|
|
|
|
|
get_app_name_list(&(gather_result[ORIGIN_QM_ENGINE]), app_name, sizeof(app_name), &app_id_flag, 0);
|
2021-06-03 11:48:36 +08:00
|
|
|
}
|
2022-12-30 17:30:53 +08:00
|
|
|
else if(gather_result[ORIGIN_UNKNOWN].app_num > 0)
|
|
|
|
|
{
|
|
|
|
|
get_app_name_list(&(gather_result[ORIGIN_UNKNOWN]), app_name, sizeof(app_name), &app_id_flag, 0);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if(app_id_flag==1)
|
2021-06-03 11:48:36 +08:00
|
|
|
{
|
2022-12-30 17:30:53 +08:00
|
|
|
if(!(TLD_search(_handle, _instance->id2field[LOG_COMMON_APP_LABEL].name)))
|
2021-07-05 14:22:24 +08:00
|
|
|
{
|
2022-12-30 17:30:53 +08:00
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_APP_LABEL].name, (void *)app_name, TLD_TYPE_STRING);
|
2021-07-05 14:22:24 +08:00
|
|
|
}
|
2022-12-30 17:30:53 +08:00
|
|
|
|
|
|
|
|
set_app_identify_info(_handle, _instance->id2field[LOG_COMMON_APP_IDENTIFY_INFO].name, gather_result);
|
|
|
|
|
}
|
2021-05-11 17:19:41 +08:00
|
|
|
|
2022-12-30 17:30:53 +08:00
|
|
|
if(_instance->send_app_id)
|
|
|
|
|
{
|
|
|
|
|
Value app_id_object(kObjectType);
|
|
|
|
|
get_app_id_list(&app_id_object, _handle, "LPI_L7", &(gather_result[ORIGIN_BASIC_PROTOCOL]));
|
|
|
|
|
get_app_id_list(&app_id_object, _handle, "USER_DEFINE", &(gather_result[ORIGIN_USER_DEFINE]));
|
|
|
|
|
get_app_id_list(&app_id_object, _handle, "BUILT_IN", &(gather_result[ORIGIN_BUILT_IN]));
|
|
|
|
|
get_app_id_list(&app_id_object, _handle, "DKPT", &(gather_result[ORIGIN_DKPT]));
|
|
|
|
|
get_app_id_list(&app_id_object, _handle, "THIRD", &(gather_result[ORIGIN_QM_ENGINE]));
|
|
|
|
|
get_app_id_list(&app_id_object, _handle, "UNKNOWN", &(gather_result[ORIGIN_UNKNOWN]));
|
|
|
|
|
get_app_id_list(&app_id_object, _handle, "QM_L7", &(gather_result[ORIGIN_QM_ENGINE_L7]));
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_APP_ID].name, &app_id_object, TLD_TYPE_OBJECT);
|
2021-05-11 17:19:41 +08:00
|
|
|
}
|
2022-12-30 17:30:53 +08:00
|
|
|
|
2021-06-22 07:01:46 +00:00
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
2022-12-29 06:03:04 +00:00
|
|
|
int set_vlan(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct single_layer_vlan_addr *vlan_addr, int layer_num, Value *tunnel_object, tsg_log_field_id_t id)
|
2021-04-27 09:49:15 +00:00
|
|
|
{
|
|
|
|
|
if(layer_num==0)
|
2019-11-12 13:35:19 +08:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
return 0;
|
2019-11-12 13:35:19 +08:00
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
int i=0;
|
2021-08-13 10:23:05 +00:00
|
|
|
Value vlan_array(kArrayType);
|
2021-04-27 09:49:15 +00:00
|
|
|
for(i=0; i<layer_num; i++)
|
2019-12-09 18:58:05 +08:00
|
|
|
{
|
2021-08-13 10:23:05 +00:00
|
|
|
vlan_array.PushBack(ntohs(vlan_addr[i].VID), _handle->document->GetAllocator());
|
2019-12-09 18:58:05 +08:00
|
|
|
}
|
2021-08-13 10:23:05 +00:00
|
|
|
add_object_member(_handle, tunnel_object, _instance->id2field[id].name, vlan_array);
|
2021-04-27 09:49:15 +00:00
|
|
|
|
|
|
|
|
return 1;
|
2019-12-09 18:58:05 +08:00
|
|
|
}
|
2019-11-12 13:35:19 +08:00
|
|
|
|
2021-08-13 10:23:05 +00:00
|
|
|
static int set_mpls(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct single_layer_mpls_addr *mpls_addr, int layer_num, Value *tunnel_object, tsg_log_field_id_t id)
|
2019-12-09 18:58:05 +08:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
if(layer_num==0)
|
|
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int i=0;
|
2021-08-13 10:23:05 +00:00
|
|
|
Value mpls_array(kArrayType);
|
2021-04-27 09:49:15 +00:00
|
|
|
for(i=0; i<layer_num; i++)
|
|
|
|
|
{
|
2021-08-13 10:23:05 +00:00
|
|
|
mpls_array.PushBack(ntohl(mpls_addr[i].label), _handle->document->GetAllocator());
|
2021-04-27 09:49:15 +00:00
|
|
|
}
|
2021-08-13 10:23:05 +00:00
|
|
|
add_object_member(_handle, tunnel_object, _instance->id2field[id].name, mpls_array);
|
2021-04-27 09:49:15 +00:00
|
|
|
|
|
|
|
|
return 1;
|
2019-12-09 18:58:05 +08:00
|
|
|
}
|
|
|
|
|
|
2021-11-20 11:49:18 +03:00
|
|
|
static int set_l2tp(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct layer_addr_l2tp *l2tp_addr, Value *object)
|
|
|
|
|
{
|
|
|
|
|
if(l2tp_addr==NULL || object==NULL)
|
|
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
struct layer_addr_l2tp_v2_t *l2tp_v2=NULL;
|
|
|
|
|
|
|
|
|
|
switch(l2tp_addr->version)
|
|
|
|
|
{
|
|
|
|
|
case 2:
|
|
|
|
|
l2tp_v2=&(l2tp_addr->l2tpun.l2tp_addr_v2);
|
|
|
|
|
add_str_member(_handle, object, _instance->id2field[LOG_COMMON_L2TP_VERSION].name, "v2");
|
|
|
|
|
add_number_member(_handle, object, _instance->id2field[LOG_COMMON_L2TP_LAC2LNS_TUNNEL_ID].name, ntohs(l2tp_v2->tunnelid_C2S));
|
|
|
|
|
add_number_member(_handle, object, _instance->id2field[LOG_COMMON_L2TP_LNS2LAC_TUNNEL_ID].name, ntohs(l2tp_v2->tunnelid_S2C));
|
|
|
|
|
add_number_member(_handle, object, _instance->id2field[LOG_COMMON_L2TP_LAC2LNS_SESSION_ID].name, ntohs(l2tp_v2->sessionid_C2S));
|
|
|
|
|
add_number_member(_handle, object, _instance->id2field[LOG_COMMON_L2TP_LNS2LAC_SESSION_ID].name, ntohs(l2tp_v2->sessionid_S2C));
|
|
|
|
|
break;
|
|
|
|
|
case 3:
|
|
|
|
|
add_str_member(_handle, object, _instance->id2field[LOG_COMMON_L2TP_VERSION].name, "v3");
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
static int mac_to_string(unsigned char *mac, char *buff)
|
|
|
|
|
{
|
|
|
|
|
int i=0,len=0;
|
2020-11-15 11:18:28 +06:00
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
for(i=0; i<6; i++)
|
2020-11-15 11:18:28 +06:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
len+=sprintf(buff+len, "%02x:", mac[i]);
|
2020-11-15 11:18:28 +06:00
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
buff[len-1]='\0';
|
|
|
|
|
|
2020-11-15 11:18:28 +06:00
|
|
|
return 0;
|
|
|
|
|
}
|
2019-12-09 18:58:05 +08:00
|
|
|
|
2021-08-13 10:23:05 +00:00
|
|
|
static int set_link_mac(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct layer_addr_mac *mac, Value *tunnel_object)
|
2021-04-07 02:36:51 +00:00
|
|
|
{
|
2021-05-08 15:32:39 +08:00
|
|
|
int flag=0;
|
2021-04-20 14:37:00 +08:00
|
|
|
char default_mac[6]={0,0,0,0,0,0};
|
2021-05-08 15:32:39 +08:00
|
|
|
char c2s_source_mac[128]={0};
|
|
|
|
|
char c2s_dest_mac[128]={0};
|
|
|
|
|
char s2c_source_mac[128]={0};
|
|
|
|
|
char s2c_dest_mac[128]={0};
|
2021-04-20 14:37:00 +08:00
|
|
|
|
|
|
|
|
if((memcmp(mac->src_addr.h_source, default_mac, 6)))
|
|
|
|
|
{
|
2021-05-08 15:32:39 +08:00
|
|
|
flag|=1;
|
|
|
|
|
mac_to_string(mac->src_addr.h_source, c2s_source_mac);
|
|
|
|
|
mac_to_string(mac->src_addr.h_dest, c2s_dest_mac);
|
2021-04-20 14:37:00 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if((memcmp(mac->dst_addr.h_source, default_mac, 6)))
|
|
|
|
|
{
|
2021-05-08 15:32:39 +08:00
|
|
|
flag|=2;
|
|
|
|
|
mac_to_string(mac->dst_addr.h_source, s2c_source_mac);
|
|
|
|
|
mac_to_string(mac->dst_addr.h_dest, s2c_dest_mac);
|
2021-04-20 14:37:00 +08:00
|
|
|
}
|
|
|
|
|
|
2021-05-08 15:32:39 +08:00
|
|
|
switch(flag)
|
|
|
|
|
{
|
2021-08-13 10:23:05 +00:00
|
|
|
case 1:
|
|
|
|
|
add_str_member(_handle, tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_SCHEMA_TYPE].name, "ETHERNET");
|
|
|
|
|
add_str_member(_handle, tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_MAC_SOURCE].name, c2s_source_mac);
|
|
|
|
|
add_str_member(_handle, tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_MAC_DEST].name, c2s_dest_mac);
|
2021-05-08 15:32:39 +08:00
|
|
|
break;
|
2021-08-13 10:23:05 +00:00
|
|
|
case 2:
|
|
|
|
|
add_str_member(_handle, tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_SCHEMA_TYPE].name, "ETHERNET");
|
|
|
|
|
add_str_member(_handle, tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_MAC_SOURCE].name, s2c_source_mac);
|
|
|
|
|
add_str_member(_handle, tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_MAC_DEST].name, s2c_dest_mac);
|
2021-05-08 15:32:39 +08:00
|
|
|
break;
|
2021-08-13 10:23:05 +00:00
|
|
|
case 3:
|
|
|
|
|
add_str_member(_handle, tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_SCHEMA_TYPE].name, "MULTIPATH_ETHERNET");
|
|
|
|
|
add_str_member(_handle, tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_C2S_MAC_SOURCE].name, c2s_source_mac);
|
|
|
|
|
add_str_member(_handle, tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_C2S_MAC_DEST].name, c2s_dest_mac);
|
|
|
|
|
add_str_member(_handle, tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_S2C_MAC_SOURCE].name, s2c_source_mac);
|
|
|
|
|
add_str_member(_handle, tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_S2C_MAC_DEST].name, s2c_dest_mac);
|
2021-05-08 15:32:39 +08:00
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
2021-04-20 14:37:00 +08:00
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
static int action2fs_id(int action)
|
|
|
|
|
{
|
|
|
|
|
switch(action)
|
|
|
|
|
{
|
|
|
|
|
case TSG_ACTION_DENY:
|
2022-05-17 10:05:40 +00:00
|
|
|
return LOG_FS2_ABORT_DENY;
|
2021-04-27 09:49:15 +00:00
|
|
|
break;
|
|
|
|
|
case TSG_ACTION_BYPASS:
|
2022-05-17 10:05:40 +00:00
|
|
|
return LOG_FS2_ABORT_ALLOW;
|
2021-04-27 09:49:15 +00:00
|
|
|
break;
|
|
|
|
|
case TSG_ACTION_MONITOR:
|
2022-05-17 10:05:40 +00:00
|
|
|
return LOG_FS2_ABORT_MONITOR;
|
2021-04-27 09:49:15 +00:00
|
|
|
break;
|
|
|
|
|
case TSG_ACTION_INTERCEPT:
|
2022-05-17 10:05:40 +00:00
|
|
|
return LOG_FS2_ABORT_INTERCEPT;
|
2021-04-27 09:49:15 +00:00
|
|
|
break;
|
|
|
|
|
default:
|
2022-05-17 10:05:40 +00:00
|
|
|
return LOG_FS2_ABORT_UNKNOWN;
|
2021-04-27 09:49:15 +00:00
|
|
|
break;
|
|
|
|
|
}
|
2021-04-20 14:37:00 +08:00
|
|
|
|
2022-05-17 10:05:40 +00:00
|
|
|
return LOG_FS2_ABORT_UNKNOWN;
|
2021-04-27 09:49:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int TLD_cancel(struct TLD_handle_t *handle)
|
2021-04-20 14:37:00 +08:00
|
|
|
{
|
2021-08-13 10:23:05 +00:00
|
|
|
if (handle != NULL)
|
2021-04-20 14:37:00 +08:00
|
|
|
{
|
2021-08-13 10:23:05 +00:00
|
|
|
if (handle->document != NULL)
|
2022-05-17 10:05:40 +00:00
|
|
|
{
|
|
|
|
|
long long length=0;
|
|
|
|
|
struct tsg_log_instance_t *_instance=get_log_instance();
|
|
|
|
|
|
2021-11-13 13:27:59 +03:00
|
|
|
length=handle->document->GetAllocator().Size();
|
2022-05-17 10:05:40 +00:00
|
|
|
FS_operate(_instance->fs2_handle, _instance->fs2_field_id[LOG_FS2_FREE_RAPID_SIZE], 0, FS_OP_ADD, length);
|
2021-11-13 13:27:59 +03:00
|
|
|
|
|
|
|
|
length=handle->document->GetAllocator().Capacity();
|
2022-05-17 10:05:40 +00:00
|
|
|
FS_operate(_instance->fs2_handle, _instance->fs2_field_id[LOG_FS2_FREE_RAPID_CAPACITY], 0, FS_OP_ADD, length);
|
2021-11-13 13:27:59 +03:00
|
|
|
|
2021-08-13 10:23:05 +00:00
|
|
|
delete handle->document;
|
|
|
|
|
handle->document = NULL;
|
2021-11-13 13:27:59 +03:00
|
|
|
|
|
|
|
|
delete handle->valueAllocator;
|
|
|
|
|
handle->valueAllocator=NULL;
|
|
|
|
|
|
2022-05-17 10:05:40 +00:00
|
|
|
FS_operate(_instance->fs2_handle, _instance->fs2_field_id[LOG_FS2_FREE_LOG_HANDLE], 0, FS_OP_ADD, 1);
|
2021-04-27 09:49:15 +00:00
|
|
|
}
|
2021-11-13 13:27:59 +03:00
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
free(handle);
|
2021-11-13 13:27:59 +03:00
|
|
|
handle = NULL;
|
2021-04-20 14:37:00 +08:00
|
|
|
}
|
2021-04-07 02:36:51 +00:00
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2022-01-06 23:33:37 +03:00
|
|
|
int TLD_search(struct TLD_handle_t *handle, char *key)
|
|
|
|
|
{
|
|
|
|
|
if (handle != NULL && handle->document != NULL && key != NULL)
|
|
|
|
|
{
|
|
|
|
|
Value::ConstMemberIterator itr = handle->document->FindMember(key);
|
|
|
|
|
if (itr!=handle->document->MemberEnd())
|
|
|
|
|
{
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2021-08-13 10:23:05 +00:00
|
|
|
static void TLD_delete(struct TLD_handle_t *handle, char *key)
|
2021-04-27 09:49:15 +00:00
|
|
|
{
|
2021-08-13 10:23:05 +00:00
|
|
|
if (handle != NULL && handle->document != NULL && key != NULL)
|
2021-04-20 14:37:00 +08:00
|
|
|
{
|
2021-08-13 10:23:05 +00:00
|
|
|
handle->document->RemoveMember(key);
|
2021-04-20 14:37:00 +08:00
|
|
|
}
|
2021-04-07 02:36:51 +00:00
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
int TLD_append(struct TLD_handle_t *handle, char *key, void *value, TLD_TYPE type)
|
2021-04-20 14:37:00 +08:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
struct TLD_handle_t *_handle=handle;
|
|
|
|
|
|
|
|
|
|
if(_handle==NULL || key==NULL || (value==NULL && type!=TLD_TYPE_LONG))
|
2021-04-20 14:37:00 +08:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
return -1;
|
2021-04-20 14:37:00 +08:00
|
|
|
}
|
2021-04-27 09:49:15 +00:00
|
|
|
|
|
|
|
|
switch(type)
|
2021-04-20 14:37:00 +08:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
case TLD_TYPE_LONG:
|
2021-08-13 10:23:05 +00:00
|
|
|
add_number_member(_handle, _handle->document, key, (long)value);
|
2021-04-27 09:49:15 +00:00
|
|
|
break;
|
|
|
|
|
case TLD_TYPE_FILE:
|
|
|
|
|
break;
|
|
|
|
|
case TLD_TYPE_STRING:
|
2021-05-12 13:51:51 +08:00
|
|
|
if(strlen((char *)value)==0)
|
|
|
|
|
{
|
|
|
|
|
break;
|
|
|
|
|
}
|
2021-08-13 10:23:05 +00:00
|
|
|
add_str_member(_handle, _handle->document, key, (const char *)value);
|
2021-04-27 09:49:15 +00:00
|
|
|
break;
|
2021-08-13 10:23:05 +00:00
|
|
|
case TLD_TYPE_OBJECT:
|
|
|
|
|
add_object_member(handle, handle->document, key, ((Value &)(*(Value *)value)));
|
2021-04-27 09:49:15 +00:00
|
|
|
break;
|
2021-08-13 10:23:05 +00:00
|
|
|
case TLD_TYPE_CJSON:
|
|
|
|
|
printf("TLD_TYPE_CJSON is obsolete, please use TLD_TYPE_OBJECT !!!\n");
|
|
|
|
|
abort();
|
2021-04-27 09:49:15 +00:00
|
|
|
default:
|
|
|
|
|
return -1;
|
|
|
|
|
break;
|
2021-04-20 14:37:00 +08:00
|
|
|
}
|
2021-11-13 13:27:59 +03:00
|
|
|
|
2022-05-17 10:05:40 +00:00
|
|
|
struct tsg_log_instance_t *_instance=get_log_instance();
|
|
|
|
|
|
|
|
|
|
FS_operate(_instance->fs2_handle, _instance->fs2_field_id[LOG_FS2_APPEND_LOG_HANDLE], 0, FS_OP_ADD, 1);
|
2021-04-27 09:49:15 +00:00
|
|
|
|
|
|
|
|
return 0;
|
2021-04-20 14:37:00 +08:00
|
|
|
}
|
|
|
|
|
|
2022-05-16 08:54:36 +00:00
|
|
|
int TLD_array_append(struct TLD_handle_t *handle, char *key, void **array, int array_num, TLD_TYPE type)
|
|
|
|
|
{
|
2022-06-09 10:01:33 +08:00
|
|
|
if(handle==NULL || key==NULL || array_num<=0 || array==NULL || type!=TLD_TYPE_LONG || type!=TLD_TYPE_STRING)
|
|
|
|
|
{
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int i=0;
|
|
|
|
|
Value obj_array(kArrayType);
|
|
|
|
|
|
|
|
|
|
switch(type)
|
|
|
|
|
{
|
|
|
|
|
case TLD_TYPE_LONG:
|
|
|
|
|
for(i=0; i<array_num; i++)
|
|
|
|
|
{
|
|
|
|
|
obj_array.PushBack((long)(array[i]), handle->document->GetAllocator());
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
case TLD_TYPE_STRING:
|
|
|
|
|
for(i=0; i<array_num; i++)
|
|
|
|
|
{
|
|
|
|
|
Value str_value(StringRef((char *)(array[i]), strlen((char *)array[i])));
|
|
|
|
|
obj_array.PushBack(str_value, handle->document->GetAllocator());
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
add_object_member(handle, handle->document, key, obj_array);
|
|
|
|
|
|
|
|
|
|
return 1;
|
2022-05-16 08:54:36 +00:00
|
|
|
}
|
|
|
|
|
|
2021-11-01 11:18:38 +08:00
|
|
|
struct TLD_handle_t *TLD_duplicate(struct TLD_handle_t *handle)
|
|
|
|
|
{
|
|
|
|
|
if (handle == NULL)
|
|
|
|
|
{
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
struct TLD_handle_t *_handle=(struct TLD_handle_t *)calloc(1, sizeof(struct TLD_handle_t));
|
|
|
|
|
_handle->thread_id = handle->thread_id;
|
|
|
|
|
_handle->document = new Document();
|
|
|
|
|
//_handle->document->SetObject();
|
|
|
|
|
|
|
|
|
|
_handle->document->CopyFrom(*handle->document, _handle->document->GetAllocator());
|
2022-05-17 10:05:40 +00:00
|
|
|
|
|
|
|
|
struct tsg_log_instance_t *_instance=get_log_instance();
|
|
|
|
|
FS_operate(_instance->fs2_handle, _instance->fs2_field_id[LOG_FS2_DUP_LOG_HANDLE], 0, FS_OP_ADD, 1);
|
2021-11-13 13:27:59 +03:00
|
|
|
|
2021-11-01 11:18:38 +08:00
|
|
|
return _handle;
|
|
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
struct TLD_handle_t *TLD_create(int thread_id)
|
|
|
|
|
{
|
2022-06-09 10:01:33 +08:00
|
|
|
struct tsg_log_instance_t *_instance=get_log_instance();
|
|
|
|
|
if(_instance->mode==CLOSE)
|
|
|
|
|
{
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
2021-04-27 09:49:15 +00:00
|
|
|
|
|
|
|
|
struct TLD_handle_t *_handle=(struct TLD_handle_t *)calloc(1, sizeof(struct TLD_handle_t));
|
|
|
|
|
_handle->thread_id = thread_id;
|
2021-11-13 13:27:59 +03:00
|
|
|
|
|
|
|
|
_handle->valueAllocator =new MemoryPoolAllocator<>(g_tsg_log_instance->rapidjson_chunk_capacity);
|
|
|
|
|
_handle->document = new Document(_handle->valueAllocator);
|
2021-08-13 10:23:05 +00:00
|
|
|
_handle->document->SetObject();
|
2021-11-13 13:27:59 +03:00
|
|
|
|
2022-05-17 10:05:40 +00:00
|
|
|
FS_operate(_instance->fs2_handle, _instance->fs2_field_id[LOG_FS2_CREATE_LOG_HANDLE], 0, FS_OP_ADD, 1);
|
2021-08-13 10:23:05 +00:00
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
return _handle;
|
|
|
|
|
}
|
2021-04-20 14:37:00 +08:00
|
|
|
|
2022-07-01 17:08:16 +08:00
|
|
|
static int set_mail_eml(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct streaminfo *a_stream)
|
|
|
|
|
{
|
|
|
|
|
struct tsg_conn_sketch_notify_data *notify_mail=(struct tsg_conn_sketch_notify_data *)stream_bridge_async_data_get(a_stream, g_tsg_para.bridge_id[BRIDGE_TYPE_RECV_CONN_SKETCH_DATA]);
|
2022-07-01 18:03:06 +08:00
|
|
|
if(notify_mail!=NULL && notify_mail->pdata.mail_eml_filename!=NULL && notify_mail->protocol==PROTO_MAIL)
|
2022-07-01 17:08:16 +08:00
|
|
|
{
|
|
|
|
|
TLD_delete(_handle, _instance->id2field[LOG_COMMON_MAIL_EML_FILE].name);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_MAIL_EML_FILE].name, (void *)notify_mail->pdata.mail_eml_filename, TLD_TYPE_STRING);
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
static int set_s3_filename(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct streaminfo *a_stream)
|
|
|
|
|
{
|
|
|
|
|
struct business_notify_data *bnd_label=(struct business_notify_data *)stream_bridge_async_data_get(a_stream, _instance->bridge_id[LOG_BRIDGE_BUSINESS_S3_FILENAME]);
|
|
|
|
|
if(bnd_label==NULL || bnd_label->pdata==NULL)
|
|
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
switch(bnd_label->proto)
|
|
|
|
|
{
|
|
|
|
|
case PROTO_HTTP:
|
|
|
|
|
TLD_delete(_handle, _instance->id2field[LOG_COMMON_HTTP_REQUEST_S3_FILE].name);
|
|
|
|
|
TLD_delete(_handle, _instance->id2field[LOG_COMMON_HTTP_RESPONSE_S3_FILE].name);
|
|
|
|
|
|
|
|
|
|
if(bnd_label->s3_http==NULL)
|
|
|
|
|
{
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_HTTP_REQUEST_S3_FILE].name, bnd_label->s3_http->request_filename, TLD_TYPE_STRING);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_HTTP_RESPONSE_S3_FILE].name, bnd_label->s3_http->response_filename, TLD_TYPE_STRING);
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
2021-08-13 10:23:05 +00:00
|
|
|
int set_nat_linkinfo(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct streaminfo *a_stream, char *field_name, int project_id)
|
|
|
|
|
{
|
2021-10-06 15:31:38 +08:00
|
|
|
const char *nat_linkinfo=(const char *)stream_bridge_async_data_get(a_stream, project_id);
|
2021-08-13 10:23:05 +00:00
|
|
|
if(nat_linkinfo==NULL)
|
|
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2021-08-14 10:41:25 +08:00
|
|
|
copy_rapidjson(_handle, field_name, nat_linkinfo);
|
2021-08-07 17:27:55 +08:00
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2021-11-20 11:49:18 +03:00
|
|
|
static int set_tunnel_ipv4v6_port(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct streaminfo *a_stream, Value *object, enum addr_type_t up_layer_type)
|
2021-04-07 02:36:51 +00:00
|
|
|
{
|
|
|
|
|
char ip_buff[64]={0};
|
2021-11-20 11:49:18 +03:00
|
|
|
if(a_stream==NULL)
|
|
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
tsg_log_field_id_t s_ip_idx, d_ip_idx, s_port_idx, d_port_idx;
|
|
|
|
|
|
|
|
|
|
switch(up_layer_type)
|
2021-04-07 02:36:51 +00:00
|
|
|
{
|
2021-11-20 11:49:18 +03:00
|
|
|
case ADDR_TYPE_L2TP:
|
|
|
|
|
s_ip_idx=LOG_COMMON_L2TP_ACCESS_CONCENTRATOR_IP;
|
|
|
|
|
d_ip_idx=LOG_COMMON_L2TP_NETWORK_SERVER_IP;
|
|
|
|
|
s_port_idx=LOG_COMMON_L2TP_ACCESS_CONCENTRATOR_PORT;
|
|
|
|
|
d_port_idx=LOG_COMMON_L2TP_NETWORK_SERVER_PORT;
|
|
|
|
|
break;
|
|
|
|
|
case ADDR_TYPE_GPRS_TUNNEL:
|
|
|
|
|
s_ip_idx=LOG_COMMON_TUNNELS_GTP_SGW_IP;
|
|
|
|
|
d_ip_idx=LOG_COMMON_TUNNELS_GTP_PGW_IP;
|
|
|
|
|
s_port_idx=LOG_COMMON_TUNNELS_GTP_SGW_PORT;
|
|
|
|
|
d_port_idx=LOG_COMMON_TUNNELS_GTP_PGW_PORT;
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
return 0;
|
|
|
|
|
break;
|
2021-04-07 02:36:51 +00:00
|
|
|
}
|
2021-11-20 11:49:18 +03:00
|
|
|
|
|
|
|
|
switch(a_stream->addr.addrtype)
|
|
|
|
|
{
|
|
|
|
|
case ADDR_TYPE_IPV4:
|
|
|
|
|
inet_ntop(AF_INET, (const void *)&(a_stream->addr.ipv4->saddr), ip_buff, sizeof(ip_buff));
|
|
|
|
|
add_str_member(_handle, object, _instance->id2field[s_ip_idx].name, ip_buff);
|
2021-04-07 02:36:51 +00:00
|
|
|
|
2021-11-20 11:49:18 +03:00
|
|
|
inet_ntop(AF_INET, (const void *)&(a_stream->addr.ipv4->daddr), ip_buff, sizeof(ip_buff));
|
|
|
|
|
add_str_member(_handle, object, _instance->id2field[d_ip_idx].name, ip_buff);
|
|
|
|
|
|
|
|
|
|
add_number_member(_handle, object, _instance->id2field[s_port_idx].name, ntohs(a_stream->addr.ipv4->source));
|
|
|
|
|
add_number_member(_handle, object, _instance->id2field[d_port_idx].name, ntohs(a_stream->addr.ipv4->dest));
|
|
|
|
|
return 1;
|
|
|
|
|
break;
|
|
|
|
|
case ADDR_TYPE_IPV6:
|
|
|
|
|
inet_ntop(AF_INET6, (const void *)(a_stream->addr.ipv6->saddr), ip_buff, sizeof(ip_buff));
|
|
|
|
|
add_str_member(_handle, object, _instance->id2field[s_ip_idx].name, ip_buff);
|
|
|
|
|
|
|
|
|
|
inet_ntop(AF_INET6, (const void *)(a_stream->addr.ipv6->daddr), ip_buff, sizeof(ip_buff));
|
|
|
|
|
add_str_member(_handle, object, _instance->id2field[d_ip_idx].name, ip_buff);
|
|
|
|
|
|
|
|
|
|
add_number_member(_handle, object, _instance->id2field[s_port_idx].name, ntohs(a_stream->addr.ipv6->source));
|
|
|
|
|
add_number_member(_handle, object, _instance->id2field[d_port_idx].name, ntohs(a_stream->addr.ipv6->dest));
|
|
|
|
|
return 1;
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
2021-04-07 02:36:51 +00:00
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
static int set_common_tunnels(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct streaminfo *a_stream)
|
2021-04-07 02:36:51 +00:00
|
|
|
{
|
2021-04-20 14:37:00 +08:00
|
|
|
int ret=0;
|
2021-04-07 02:36:51 +00:00
|
|
|
char ip_buff[64]={0};
|
|
|
|
|
const struct streaminfo *ptmp = a_stream;
|
|
|
|
|
const struct streaminfo *pfather=NULL;
|
2021-08-13 10:23:05 +00:00
|
|
|
Value tunnel_array(kArrayType);
|
2021-04-20 14:37:00 +08:00
|
|
|
|
2021-04-07 02:36:51 +00:00
|
|
|
while(ptmp)
|
|
|
|
|
{
|
2021-08-13 10:23:05 +00:00
|
|
|
Value tunnel_object(kObjectType);
|
2021-04-07 02:36:51 +00:00
|
|
|
pfather = ptmp->pfather;
|
|
|
|
|
switch(ptmp->addr.addrtype)
|
|
|
|
|
{
|
|
|
|
|
case ADDR_TYPE_MAC:
|
2021-08-13 10:23:05 +00:00
|
|
|
set_link_mac(_instance, _handle, (ptmp->addr.mac), &tunnel_object);
|
2021-04-07 02:36:51 +00:00
|
|
|
break;
|
|
|
|
|
case ADDR_TYPE_VLAN:
|
2021-08-13 10:23:05 +00:00
|
|
|
add_str_member(_handle, &tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_SCHEMA_TYPE].name, "VLAN");
|
|
|
|
|
set_vlan(_instance, _handle, ptmp->addr.vlan->c2s_addr_array, ptmp->addr.vlan->c2s_layer_num, &tunnel_object, LOG_COMMON_TUNNELS_VLAN_SRC_ID);
|
|
|
|
|
set_vlan(_instance, _handle, ptmp->addr.vlan->s2c_addr_array, ptmp->addr.vlan->s2c_layer_num, &tunnel_object, LOG_COMMON_TUNNELS_VLAN_DST_ID);
|
2021-04-07 02:36:51 +00:00
|
|
|
break;
|
|
|
|
|
case ADDR_TYPE_GRE:
|
2021-08-13 10:23:05 +00:00
|
|
|
add_str_member(_handle, &tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_SCHEMA_TYPE].name, "GRE");
|
2021-04-07 02:36:51 +00:00
|
|
|
break;
|
|
|
|
|
case ADDR_TYPE_MPLS:
|
2021-04-20 14:37:00 +08:00
|
|
|
if(ptmp->addr.mpls->s2c_layer_num==0 && ptmp->addr.mpls->c2s_layer_num==0)
|
2021-04-07 02:36:51 +00:00
|
|
|
{
|
2021-04-20 14:37:00 +08:00
|
|
|
ptmp = pfather;
|
|
|
|
|
continue;
|
2021-04-07 02:36:51 +00:00
|
|
|
}
|
2021-08-13 10:23:05 +00:00
|
|
|
add_str_member(_handle, &tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_SCHEMA_TYPE].name, "MPLS");
|
|
|
|
|
set_mpls(_instance, _handle, ptmp->addr.mpls->c2s_addr_array, ptmp->addr.mpls->c2s_layer_num, &tunnel_object, LOG_COMMON_TUNNELS_MPLS_SRC_LABEL);
|
|
|
|
|
set_mpls(_instance, _handle, ptmp->addr.mpls->s2c_addr_array, ptmp->addr.mpls->s2c_layer_num, &tunnel_object, LOG_COMMON_TUNNELS_MPLS_DST_LABEL);
|
2021-04-07 02:36:51 +00:00
|
|
|
break;
|
|
|
|
|
case ADDR_TYPE_L2TP:
|
2021-08-13 10:23:05 +00:00
|
|
|
add_str_member(_handle, &tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_SCHEMA_TYPE].name, "L2TP");
|
2021-11-20 11:49:18 +03:00
|
|
|
set_l2tp(_instance, _handle, ptmp->addr.l2tp, &tunnel_object);
|
|
|
|
|
|
|
|
|
|
ret=set_tunnel_ipv4v6_port(_instance, _handle, ptmp->pfather, &tunnel_object, ADDR_TYPE_L2TP);
|
|
|
|
|
if(ret==1)
|
|
|
|
|
{
|
|
|
|
|
ptmp=pfather->pfather;
|
|
|
|
|
}
|
2021-04-07 02:36:51 +00:00
|
|
|
break;
|
|
|
|
|
case __ADDR_TYPE_IP_PAIR_V4:
|
2021-08-13 10:23:05 +00:00
|
|
|
add_str_member(_handle, &tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_SCHEMA_TYPE].name, "IPv4");
|
|
|
|
|
|
2021-04-07 02:36:51 +00:00
|
|
|
inet_ntop(AF_INET, (const void *)&(ptmp->addr.ipv4->saddr), ip_buff, sizeof(ip_buff));
|
2021-08-13 10:23:05 +00:00
|
|
|
add_str_member(_handle, &tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_CLIENT_IP].name, ip_buff);
|
|
|
|
|
|
|
|
|
|
inet_ntop(AF_INET, (const void *)&(ptmp->addr.ipv4->daddr), ip_buff, sizeof(ip_buff));
|
|
|
|
|
add_str_member(_handle, &tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_SERVER_IP].name, ip_buff);
|
2021-04-07 02:36:51 +00:00
|
|
|
break;
|
2021-08-13 10:23:05 +00:00
|
|
|
case __ADDR_TYPE_IP_PAIR_V6:
|
|
|
|
|
add_str_member(_handle, &tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_SCHEMA_TYPE].name, "IPv6");
|
|
|
|
|
|
2021-04-07 02:36:51 +00:00
|
|
|
inet_ntop(AF_INET6, (const void *)(ptmp->addr.ipv6->saddr), ip_buff, sizeof(ip_buff));
|
2021-08-13 10:23:05 +00:00
|
|
|
add_str_member(_handle, &tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_CLIENT_IP].name, ip_buff);
|
|
|
|
|
|
|
|
|
|
inet_ntop(AF_INET6, (const void *)(ptmp->addr.ipv6->daddr), ip_buff, sizeof(ip_buff));
|
|
|
|
|
add_str_member(_handle, &tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_SERVER_IP].name, ip_buff);
|
2021-04-07 02:36:51 +00:00
|
|
|
break;
|
|
|
|
|
case ADDR_TYPE_PPTP:
|
2021-08-13 10:23:05 +00:00
|
|
|
add_str_member(_handle, &tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_SCHEMA_TYPE].name, "PPTP");
|
|
|
|
|
add_number_member(_handle, &tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_PPTP_C2S_ID].name, ntohs(ptmp->addr.pptp->C2S_call_id));
|
|
|
|
|
add_number_member(_handle, &tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_PPTP_S2C_ID].name, ntohs(ptmp->addr.pptp->S2C_call_id));
|
2021-04-07 02:36:51 +00:00
|
|
|
break;
|
|
|
|
|
case ADDR_TYPE_GPRS_TUNNEL:
|
2021-08-13 10:23:05 +00:00
|
|
|
add_str_member(_handle, &tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_SCHEMA_TYPE].name, "GTP");
|
|
|
|
|
add_number_member(_handle, &tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_GTP_UPLINK_TEID].name, ntohl(ptmp->addr.gtp->teid_c2s));
|
|
|
|
|
add_number_member(_handle, &tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_GTP_DOWNLINK_TEID].name, ntohl(ptmp->addr.gtp->teid_s2c));
|
2021-04-07 02:36:51 +00:00
|
|
|
|
2021-11-20 11:49:18 +03:00
|
|
|
ret=set_tunnel_ipv4v6_port(_instance, _handle, ptmp->pfather, &tunnel_object, ADDR_TYPE_GPRS_TUNNEL);
|
2021-04-07 02:36:51 +00:00
|
|
|
if(ret==1)
|
|
|
|
|
{
|
|
|
|
|
ptmp=pfather->pfather;
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
case ADDR_TYPE_VXLAN:
|
2021-08-13 10:23:05 +00:00
|
|
|
add_str_member(_handle, &tunnel_object, _instance->id2field[LOG_COMMON_TUNNELS_SCHEMA_TYPE].name, "VXLAN");
|
2021-04-07 02:36:51 +00:00
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
ptmp = pfather;
|
|
|
|
|
continue;
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
2021-08-13 10:23:05 +00:00
|
|
|
ptmp = pfather;;
|
|
|
|
|
tunnel_array.PushBack(tunnel_object, _handle->document->GetAllocator());
|
2021-04-07 02:36:51 +00:00
|
|
|
}
|
|
|
|
|
|
2021-08-13 10:23:05 +00:00
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_TUNNELS].name, &tunnel_array, TLD_TYPE_OBJECT);
|
|
|
|
|
|
2021-04-07 02:36:51 +00:00
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2019-12-09 18:58:05 +08:00
|
|
|
char *log_field_id2name(struct tsg_log_instance_t *instance, tsg_log_field_id_t id)
|
|
|
|
|
{
|
|
|
|
|
struct tsg_log_instance_t *_instance=instance;
|
|
|
|
|
if(_instance!=NULL)
|
2019-11-12 13:35:19 +08:00
|
|
|
{
|
2019-12-09 18:58:05 +08:00
|
|
|
return _instance->id2field[id].name;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
unsigned long long tsg_get_stream_id(struct streaminfo * a_stream)
|
2020-11-14 15:50:44 +06:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
int ret=0;
|
|
|
|
|
int device_id_size=sizeof(unsigned long long);
|
2021-08-14 17:39:09 +08:00
|
|
|
unsigned long long device_id=(unsigned long long)g_tsg_para.device_seq_in_dc;
|
2021-04-27 09:49:15 +00:00
|
|
|
|
|
|
|
|
ret=MESA_get_stream_opt(a_stream, MSO_GLOBAL_STREAM_ID, (void *)&device_id, &device_id_size);
|
|
|
|
|
if(ret==0)
|
|
|
|
|
{
|
|
|
|
|
return device_id;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int is_multi_hit_same_policy(struct Maat_rule_t *result, int *policy_id, int *policy_id_num)
|
|
|
|
|
{
|
|
|
|
|
int j=0;
|
2020-11-14 15:50:44 +06:00
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
for(j=0;j<*policy_id_num;j++)
|
2020-11-14 15:50:44 +06:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
if(policy_id[j]==result->config_id)
|
|
|
|
|
{
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
2020-11-14 15:50:44 +06:00
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
policy_id[(*policy_id_num)++]=result->config_id;
|
|
|
|
|
|
|
|
|
|
return 0;
|
2020-11-14 15:50:44 +06:00
|
|
|
}
|
|
|
|
|
|
2022-07-29 10:09:15 +08:00
|
|
|
static int set_xxxx_from_user_region(struct TLD_handle_t *_handle, struct tsg_log_instance_t *_instance, struct Maat_rule_t *p_result, int thread_seq)
|
2020-04-16 13:03:56 +08:00
|
|
|
{
|
2022-07-29 10:09:15 +08:00
|
|
|
int ret=0;
|
2020-04-16 13:03:56 +08:00
|
|
|
cJSON *item=NULL;
|
|
|
|
|
cJSON *object=NULL;
|
2022-07-29 10:09:15 +08:00
|
|
|
char *user_region=NULL;
|
|
|
|
|
|
2022-10-24 14:48:16 +08:00
|
|
|
TLD_delete(_handle, _instance->id2field[LOG_COMMON_USER_REGION].name);
|
|
|
|
|
TLD_delete(_handle, _instance->id2field[LOG_COMMON_VSYSTEM_ID].name);
|
|
|
|
|
TLD_delete(_handle, _instance->id2field[LOG_COMMON_SUB_ACTION].name);
|
|
|
|
|
|
2022-07-29 10:09:15 +08:00
|
|
|
if(p_result->action!=TSG_ACTION_NONE && p_result->serv_def_len>0)
|
2020-04-16 13:03:56 +08:00
|
|
|
{
|
2022-07-29 10:09:15 +08:00
|
|
|
user_region=(char *)dictator_malloc(thread_seq, p_result->serv_def_len+1);
|
|
|
|
|
ret=Maat_read_rule(g_tsg_maat_feather, p_result, MAAT_RULE_SERV_DEFINE, user_region, p_result->serv_def_len+1);
|
|
|
|
|
if(ret==p_result->serv_def_len)
|
|
|
|
|
{
|
|
|
|
|
user_region[p_result->serv_def_len]='\0';
|
|
|
|
|
|
|
|
|
|
object=cJSON_Parse(user_region);
|
2020-04-16 13:03:56 +08:00
|
|
|
|
2022-07-29 10:09:15 +08:00
|
|
|
if(_instance->send_user_region==1)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_USER_REGION].name, (void *)user_region, TLD_TYPE_STRING);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
dictator_free(thread_seq, user_region);
|
|
|
|
|
user_region=NULL;
|
2020-04-16 13:03:56 +08:00
|
|
|
}
|
|
|
|
|
|
2022-07-29 10:09:15 +08:00
|
|
|
if(object==NULL)
|
2022-10-14 16:12:55 +08:00
|
|
|
{
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_VSYSTEM_ID].name, (void *)(long)(_instance->vsystem_id), TLD_TYPE_LONG);
|
2022-07-29 10:09:15 +08:00
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if(p_result->action==TSG_ACTION_DENY)
|
2020-04-16 13:03:56 +08:00
|
|
|
{
|
|
|
|
|
item=cJSON_GetObjectItem(object, "method");
|
2020-04-27 17:49:59 +08:00
|
|
|
if(item!=NULL && item->valuestring!=NULL)
|
|
|
|
|
{
|
2022-07-29 10:09:15 +08:00
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_SUB_ACTION].name, (void *)item->valuestring, TLD_TYPE_STRING);
|
2020-04-27 17:49:59 +08:00
|
|
|
}
|
2020-04-16 13:03:56 +08:00
|
|
|
}
|
2022-07-29 10:09:15 +08:00
|
|
|
|
2022-10-14 16:12:55 +08:00
|
|
|
item=cJSON_GetObjectItem(object, "vsys_id");
|
|
|
|
|
if(item!=NULL)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_VSYSTEM_ID].name, (void *)(long)item->valueint, TLD_TYPE_LONG);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_VSYSTEM_ID].name, (void *)(long)_instance->vsystem_id, TLD_TYPE_LONG);
|
|
|
|
|
}
|
|
|
|
|
|
2022-07-29 10:09:15 +08:00
|
|
|
cJSON_Delete(object);
|
|
|
|
|
object=NULL;
|
2020-04-16 13:03:56 +08:00
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2021-12-29 21:59:35 +03:00
|
|
|
int set_application_behavior(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct streaminfo *a_stream)
|
|
|
|
|
{
|
2022-01-04 17:07:02 +03:00
|
|
|
if(a_stream==NULL)
|
|
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2021-12-29 21:59:35 +03:00
|
|
|
struct application_behavior *behavior_result=NULL;
|
2022-07-01 17:08:16 +08:00
|
|
|
behavior_result=(struct application_behavior *)stream_bridge_async_data_get(a_stream, _instance->bridge_id[LOG_BRIDGE_APP_BEHAVIOR_RESULT]);
|
2021-12-29 21:59:35 +03:00
|
|
|
if(behavior_result==NULL)
|
|
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_APPLICATION_BEHAVIOR].name, (void *)(behavior_result->stream_behavior), TLD_TYPE_STRING);
|
|
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int set_notify_execution_result(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct streaminfo *a_stream, struct Maat_rule_t *p_result)
|
2021-08-07 17:27:55 +08:00
|
|
|
{
|
2022-01-04 17:07:02 +03:00
|
|
|
if(a_stream==NULL)
|
|
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2021-08-07 17:27:55 +08:00
|
|
|
int i=0;
|
2021-12-28 20:27:37 +03:00
|
|
|
struct tsg_notify_execution_result *execution_result=NULL;
|
2022-07-01 17:08:16 +08:00
|
|
|
execution_result=(struct tsg_notify_execution_result *)stream_bridge_async_data_get(a_stream, _instance->bridge_id[LOG_BRIDGE_CONN_SKETCH_EXEC_RESULT]);
|
2021-12-28 20:27:37 +03:00
|
|
|
if(execution_result==NULL)
|
2021-08-07 17:27:55 +08:00
|
|
|
{
|
2021-12-28 20:27:37 +03:00
|
|
|
return 0;
|
2021-08-07 17:27:55 +08:00
|
|
|
}
|
2022-06-06 14:45:32 +08:00
|
|
|
|
|
|
|
|
TLD_delete(_handle, _instance->id2field[LOG_COMMON_MIRRORED_PKTS].name);
|
|
|
|
|
TLD_delete(_handle, _instance->id2field[LOG_COMMON_MIRRORED_BYTES].name);
|
|
|
|
|
TLD_delete(_handle, _instance->id2field[LOG_COMMON_PACKET_CAPTURE_FILE].name);
|
2021-12-28 20:27:37 +03:00
|
|
|
|
|
|
|
|
for(i=0; i<execution_result->stat_mirrored_cnt; i++)
|
2021-08-07 17:27:55 +08:00
|
|
|
{
|
2021-12-28 20:27:37 +03:00
|
|
|
if(execution_result->stat_mirrored[i].compile_id==p_result->config_id)
|
2021-08-07 17:27:55 +08:00
|
|
|
{
|
2021-12-28 20:27:37 +03:00
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_MIRRORED_PKTS].name, (void *)(execution_result->stat_mirrored[i].packets), TLD_TYPE_LONG);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_MIRRORED_BYTES].name, (void *)(execution_result->stat_mirrored[i].bytes), TLD_TYPE_LONG);
|
|
|
|
|
break;
|
2021-08-07 17:27:55 +08:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2022-06-06 14:45:32 +08:00
|
|
|
for(i=0; i<execution_result->capture_result_cnt; i++)
|
2022-01-06 17:41:03 +03:00
|
|
|
{
|
2022-06-06 14:45:32 +08:00
|
|
|
if(execution_result->capture_result[i].compile_id==p_result->config_id)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_PACKET_CAPTURE_FILE].name, (void *)(execution_result->capture_result[i].packet_path), TLD_TYPE_STRING);
|
|
|
|
|
break;
|
|
|
|
|
}
|
2021-12-28 20:27:37 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 1;
|
2021-08-07 17:27:55 +08:00
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
int set_session_attributes(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct streaminfo *a_stream)
|
2020-05-14 15:52:54 +08:00
|
|
|
{
|
2021-08-07 17:27:55 +08:00
|
|
|
int ret=0;
|
|
|
|
|
struct session_attribute_label *attribute_label=NULL;
|
2020-05-14 15:52:54 +08:00
|
|
|
|
2021-08-07 17:27:55 +08:00
|
|
|
attribute_label=(struct session_attribute_label *)project_req_get_struct(a_stream, _instance->session_attribute_project_id);
|
2022-06-10 13:20:33 +08:00
|
|
|
if(attribute_label==NULL)
|
|
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if(attribute_label->establish_latency_ms>0)
|
2021-04-27 09:49:15 +00:00
|
|
|
{
|
2021-03-02 10:39:33 +08:00
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_ESTABLISH_LATENCY_MS].name, (void *)attribute_label->establish_latency_ms, TLD_TYPE_LONG);
|
2022-06-10 13:20:33 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if(attribute_label->http_action_file_size>0)
|
|
|
|
|
{
|
2021-08-07 17:27:55 +08:00
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_HTTP_ACTION_FILESIZE].name, (void *)(long)attribute_label->http_action_file_size, TLD_TYPE_LONG);
|
2022-06-10 13:20:33 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
set_asn(_handle, a_stream, _instance->id2field[LOG_COMMON_CLINET_ASN].name, attribute_label->client_asn);
|
|
|
|
|
set_asn(_handle, a_stream, _instance->id2field[LOG_COMMON_SERVER_ASN].name, attribute_label->server_asn);
|
|
|
|
|
|
|
|
|
|
set_location(_handle, a_stream, _instance->id2field[LOG_COMMON_CLINET_LOCATION].name, attribute_label->client_location);
|
|
|
|
|
set_location(_handle, a_stream, _instance->id2field[LOG_COMMON_SERVER_LOCATION].name, attribute_label->server_location);
|
2020-05-14 15:52:54 +08:00
|
|
|
|
2022-06-10 13:20:33 +08:00
|
|
|
ret=set_subscriber_id(_handle, _instance->id2field[LOG_COMMON_SUBSCRIBER_ID].name, attribute_label->client_subscribe_id);
|
|
|
|
|
if(ret==0)
|
|
|
|
|
{
|
|
|
|
|
set_subscriber_id(_handle, _instance->id2field[LOG_COMMON_SUBSCRIBER_ID].name, attribute_label->server_subscribe_id);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
set_fqdn_category(_instance, _handle, a_stream, attribute_label->fqdn_category_id, attribute_label->fqdn_category_id_num);
|
2021-08-07 17:27:55 +08:00
|
|
|
|
2022-06-10 13:20:33 +08:00
|
|
|
if(attribute_label->ja3_fingerprint!=NULL)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_SSL_JA3_FINGERPRINT].name, (void *)attribute_label->ja3_fingerprint, TLD_TYPE_STRING);
|
|
|
|
|
}
|
2020-09-11 18:06:09 +08:00
|
|
|
|
2022-06-10 13:20:33 +08:00
|
|
|
set_umts_user_info(_instance, _handle, a_stream, attribute_label->user_info);
|
2021-05-19 07:10:25 +00:00
|
|
|
|
2022-09-09 14:52:05 +08:00
|
|
|
if(attribute_label->client_endpoint!=NULL)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_TUNNELS_ENDPOINT_A_DESC].name, (void *)attribute_label->client_endpoint->description, TLD_TYPE_STRING);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if(attribute_label->server_endpoint!=NULL)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_TUNNELS_ENDPOINT_B_DESC].name, (void *)attribute_label->server_endpoint->description, TLD_TYPE_STRING);
|
|
|
|
|
}
|
|
|
|
|
|
2022-06-10 13:20:33 +08:00
|
|
|
return 1;
|
2020-05-14 15:52:54 +08:00
|
|
|
}
|
2020-04-16 13:03:56 +08:00
|
|
|
|
2022-06-28 15:01:14 +08:00
|
|
|
int set_lua_scripts_result(struct tsg_log_instance_t *_instance, struct TLD_handle_t *_handle, struct streaminfo *a_stream)
|
|
|
|
|
{
|
|
|
|
|
int i=0;
|
|
|
|
|
struct user_defined_attribute_label *uda_label=(struct user_defined_attribute_label *)stream_bridge_async_data_get(a_stream, _instance->bridge_id[LOG_BRIDGE_APP_LUA_RESULT]);
|
|
|
|
|
if(uda_label!=NULL)
|
|
|
|
|
{
|
|
|
|
|
Value array(kArrayType);
|
|
|
|
|
|
|
|
|
|
for(i=0; i<uda_label->attribute_num; i++)
|
|
|
|
|
{
|
|
|
|
|
Value object(kObjectType);
|
|
|
|
|
switch(uda_label->attribute[i].type)
|
|
|
|
|
{
|
|
|
|
|
case ATTRIBUTE_TYPE_BOOL:
|
|
|
|
|
case ATTRIBUTE_TYPE_NUMERIC:
|
|
|
|
|
add_number_member(_handle, &object, uda_label->attribute[i].name, uda_label->attribute[i].number);
|
|
|
|
|
break;
|
|
|
|
|
case ATTRIBUTE_TYPE_IP:
|
|
|
|
|
case ATTRIBUTE_TYPE_STRING:
|
|
|
|
|
add_str_member(_handle, &object, uda_label->attribute[i].name, uda_label->attribute[i].string);
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
array.PushBack(object, _handle->document->GetAllocator());
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_APP_EXTRACT_INFO].name, &array, TLD_TYPE_OBJECT);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2019-12-09 18:58:05 +08:00
|
|
|
int TLD_append_streaminfo(struct tsg_log_instance_t *instance, struct TLD_handle_t *handle, struct streaminfo *a_stream)
|
|
|
|
|
{
|
2021-07-05 14:22:24 +08:00
|
|
|
int ret=0;
|
2019-12-09 18:58:05 +08:00
|
|
|
char *addr_proto=NULL;
|
2021-06-03 11:48:36 +08:00
|
|
|
char stream_id_buff[128]={0};
|
2019-12-09 18:58:05 +08:00
|
|
|
unsigned long long stream_id=0;
|
|
|
|
|
struct TLD_handle_t *_handle=handle;
|
|
|
|
|
struct tsg_log_instance_t *_instance=instance;
|
|
|
|
|
|
|
|
|
|
if(_instance==NULL || _handle==NULL || a_stream==NULL)
|
|
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
MESA_handle_runtime_log(_instance->logger, RLOG_LV_DEBUG, "TLD_APPEND_STREAM", "instance==NULL || TLD_handle==NULL || addr==NULL");
|
2019-12-09 18:58:05 +08:00
|
|
|
return -1;
|
2019-11-12 13:35:19 +08:00
|
|
|
}
|
|
|
|
|
|
2021-07-05 14:22:24 +08:00
|
|
|
ret=set_linkinfo(_instance, _handle, a_stream);
|
|
|
|
|
if(ret==0)
|
|
|
|
|
{
|
|
|
|
|
set_direction(_instance, _handle, a_stream);
|
|
|
|
|
}
|
|
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
set_app_id(_instance, _handle, a_stream);
|
|
|
|
|
set_tcp_isn(_instance, _handle, a_stream);
|
|
|
|
|
set_tuple4(_instance, _handle, a_stream);
|
|
|
|
|
set_address_list(_instance, _handle, a_stream);
|
|
|
|
|
set_duraction(_instance, _handle, a_stream);
|
|
|
|
|
set_packet_bytes(_instance, _handle, a_stream);
|
|
|
|
|
set_session_attributes(_instance, _handle, a_stream);
|
2022-06-28 15:01:14 +08:00
|
|
|
set_lua_scripts_result(_instance, _handle, a_stream);
|
2022-07-01 17:08:16 +08:00
|
|
|
|
2021-04-27 09:49:15 +00:00
|
|
|
if(is_tunnels(a_stream))
|
2019-12-09 18:58:05 +08:00
|
|
|
{
|
2021-04-27 09:49:15 +00:00
|
|
|
set_common_tunnels(_instance, _handle, a_stream);
|
2019-12-09 18:58:05 +08:00
|
|
|
}
|
2021-04-27 09:49:15 +00:00
|
|
|
|
2019-12-09 18:58:05 +08:00
|
|
|
stream_id=tsg_get_stream_id(a_stream);
|
2020-10-27 17:15:09 +08:00
|
|
|
snprintf(stream_id_buff, sizeof(stream_id_buff), "%llu", stream_id);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_STREAM_TRACE_ID].name, (void *)stream_id_buff, TLD_TYPE_STRING);
|
2019-12-09 18:58:05 +08:00
|
|
|
|
|
|
|
|
addr_proto=(char *)layer_addr_prefix_ntop(a_stream);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_L4_PROTOCOL].name, (void *)addr_proto, TLD_TYPE_STRING);
|
2021-01-28 17:20:44 +08:00
|
|
|
|
2019-12-09 18:58:05 +08:00
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2022-05-17 10:05:40 +00:00
|
|
|
int load_log_common_field(const char *filename, id2field_t *id2field, struct topic_stat **service2topic, int *max_service)
|
2019-12-09 18:58:05 +08:00
|
|
|
{
|
2022-05-17 10:05:40 +00:00
|
|
|
int i=0,flag=0;
|
2019-12-09 18:58:05 +08:00
|
|
|
int ret=0,id=0;
|
|
|
|
|
FILE *fp=NULL;
|
|
|
|
|
char line[1024]={0};
|
|
|
|
|
char field_name[64]={0};
|
|
|
|
|
char type_name[32]={0};
|
2022-05-17 10:05:40 +00:00
|
|
|
struct topic_stat *_service2topic=NULL;
|
2020-01-19 15:53:02 +08:00
|
|
|
|
2019-12-09 18:58:05 +08:00
|
|
|
fp=fopen(filename, "r");
|
|
|
|
|
if(fp==NULL)
|
|
|
|
|
{
|
|
|
|
|
printf("Open %s failed ...", filename);
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
2019-11-12 13:35:19 +08:00
|
|
|
|
2019-12-09 18:58:05 +08:00
|
|
|
memset(line, 0, sizeof(line));
|
|
|
|
|
|
|
|
|
|
while((fgets(line, sizeof(line), fp))!=NULL)
|
|
|
|
|
{
|
|
|
|
|
if(line[0]=='#' || line[0]=='\n' || line[0]=='\r' ||line[0]=='\0')
|
|
|
|
|
{
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
memset(type_name, 0, sizeof(type_name));
|
|
|
|
|
ret=sscanf(line, "%s %s %d", type_name, field_name, &id);
|
2020-11-14 15:50:44 +06:00
|
|
|
assert(ret==3);
|
2019-12-09 18:58:05 +08:00
|
|
|
|
2020-05-18 19:04:26 +08:00
|
|
|
for(i=0; i<TLD_TYPE_MAX; i++)
|
2019-12-09 18:58:05 +08:00
|
|
|
{
|
|
|
|
|
if((strncasecmp(tld_type[i].name, type_name, strlen(tld_type[i].name)))==0)
|
|
|
|
|
{
|
|
|
|
|
switch(tld_type[i].type)
|
|
|
|
|
{
|
|
|
|
|
case TLD_TYPE_FILE:
|
|
|
|
|
case TLD_TYPE_LONG:
|
|
|
|
|
case TLD_TYPE_STRING:
|
2022-12-23 11:54:29 +08:00
|
|
|
if(id<LOG_COMMON_MAX)
|
|
|
|
|
{
|
|
|
|
|
id2field[id].type = tld_type[i].type;
|
|
|
|
|
id2field[id].id = id;
|
|
|
|
|
memcpy(id2field[id].name, field_name, strlen(field_name));
|
|
|
|
|
}
|
2022-05-17 10:05:40 +00:00
|
|
|
flag=1;
|
2019-12-09 18:58:05 +08:00
|
|
|
break;
|
2020-05-18 19:04:26 +08:00
|
|
|
case TLD_TYPE_TOPIC:
|
|
|
|
|
if(_service2topic==NULL)
|
2019-12-09 18:58:05 +08:00
|
|
|
{
|
2022-05-17 10:05:40 +00:00
|
|
|
_service2topic=(struct topic_stat *)calloc(1, sizeof(struct topic_stat)*(id+1));
|
2020-05-18 19:04:26 +08:00
|
|
|
_service2topic[id].type = TLD_TYPE_MAX;
|
2022-05-17 10:05:40 +00:00
|
|
|
//_service2topic[id].id = id;
|
2020-05-18 19:04:26 +08:00
|
|
|
memcpy(_service2topic[id].name, field_name, strlen(field_name));
|
|
|
|
|
|
|
|
|
|
*max_service=id+1;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
if(*max_service<=id)
|
2020-01-19 15:53:02 +08:00
|
|
|
{
|
2022-05-17 10:05:40 +00:00
|
|
|
_service2topic=(struct topic_stat *)realloc(_service2topic, sizeof(struct topic_stat)*(id+1));
|
|
|
|
|
memset(&_service2topic[id], 0, sizeof(struct topic_stat));
|
2020-01-19 15:53:02 +08:00
|
|
|
_service2topic[id].type = TLD_TYPE_MAX;
|
2022-05-17 10:05:40 +00:00
|
|
|
//_service2topic[id].id = id;
|
2020-01-19 15:53:02 +08:00
|
|
|
memcpy(_service2topic[id].name, field_name, strlen(field_name));
|
|
|
|
|
|
|
|
|
|
*max_service=id+1;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
2022-05-17 10:05:40 +00:00
|
|
|
memset(&_service2topic[id], 0, sizeof(struct topic_stat));
|
2020-05-18 19:04:26 +08:00
|
|
|
_service2topic[id].type = TLD_TYPE_MAX;
|
2022-05-17 10:05:40 +00:00
|
|
|
//_service2topic[id].id = id;
|
2020-05-18 19:04:26 +08:00
|
|
|
memcpy(_service2topic[id].name, field_name, strlen(field_name));
|
2020-01-19 15:53:02 +08:00
|
|
|
}
|
2019-12-09 18:58:05 +08:00
|
|
|
}
|
2022-05-17 10:05:40 +00:00
|
|
|
flag=1;
|
2019-12-09 18:58:05 +08:00
|
|
|
break;
|
2020-05-18 19:04:26 +08:00
|
|
|
default:
|
|
|
|
|
break;
|
2019-12-09 18:58:05 +08:00
|
|
|
}
|
2022-05-17 10:05:40 +00:00
|
|
|
|
|
|
|
|
if(flag==1)
|
|
|
|
|
{
|
|
|
|
|
flag=0;
|
|
|
|
|
break;
|
|
|
|
|
}
|
2019-12-09 18:58:05 +08:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
memset(line, 0, sizeof(line));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
fclose(fp);
|
|
|
|
|
fp=NULL;
|
|
|
|
|
|
2020-11-14 15:50:44 +06:00
|
|
|
if(service2topic!=NULL)
|
|
|
|
|
{
|
2022-05-17 10:05:40 +00:00
|
|
|
(*service2topic)=_service2topic;
|
2020-11-14 15:50:44 +06:00
|
|
|
}
|
2020-01-19 15:53:02 +08:00
|
|
|
|
2019-11-12 13:35:19 +08:00
|
|
|
return 0;
|
|
|
|
|
}
|
2019-12-09 18:58:05 +08:00
|
|
|
|
2022-05-17 10:05:40 +00:00
|
|
|
struct tsg_log_instance_t *tsg_sendlog_init(const char *conffile, screen_stat_handle_t fs2_handle)
|
2019-11-12 13:35:19 +08:00
|
|
|
{
|
2020-09-28 17:13:39 +08:00
|
|
|
int i=0,ret=0;
|
2019-12-09 18:58:05 +08:00
|
|
|
char nic_name[32]={0};
|
2022-09-09 15:07:37 +08:00
|
|
|
char override_sled_ip[32]={0};
|
2019-12-09 18:58:05 +08:00
|
|
|
char kafka_errstr[1024]={0};
|
|
|
|
|
unsigned int local_ip_nr=0;
|
2022-06-28 15:01:14 +08:00
|
|
|
char bridge_name[LOG_BRIDGE_MAX][128]={0};
|
2019-12-09 18:58:05 +08:00
|
|
|
rd_kafka_conf_t *rdkafka_conf = NULL;
|
|
|
|
|
struct tsg_log_instance_t *_instance=NULL;
|
|
|
|
|
|
2022-05-17 10:05:40 +00:00
|
|
|
_instance=(struct tsg_log_instance_t *)calloc(1, sizeof(struct tsg_log_instance_t));
|
|
|
|
|
_instance->fs2_handle=fs2_handle;
|
2020-09-01 11:35:49 +08:00
|
|
|
|
2022-05-17 10:05:40 +00:00
|
|
|
for(i=0; i<LOG_FS2_TYPE_MAX; i++)
|
2020-09-01 11:35:49 +08:00
|
|
|
{
|
2022-05-17 10:05:40 +00:00
|
|
|
_instance->fs2_field_id[i]=FS_register(_instance->fs2_handle, FS_STYLE_FIELD, FS_CALC_SPEED, g_log_fs2_field[i].name);
|
2020-09-01 11:35:49 +08:00
|
|
|
}
|
2022-05-17 10:05:40 +00:00
|
|
|
|
|
|
|
|
_instance->fs2_column_id[LOG_COLUMN_STATUS_SUCCESS]=FS_register(_instance->fs2_handle, FS_STYLE_COLUMN, FS_CALC_CURRENT, "T_success_log");
|
|
|
|
|
_instance->fs2_column_id[LOG_COLUMN_STATUS_FAIL]=FS_register(_instance->fs2_handle, FS_STYLE_COLUMN, FS_CALC_CURRENT, "T_fail_log");
|
|
|
|
|
_instance->fs2_column_id[LOG_COLUMN_STATUS_DROP]=FS_register(_instance->fs2_handle, FS_STYLE_COLUMN, FS_CALC_CURRENT, "T_drop_log");
|
|
|
|
|
|
|
|
|
|
_instance->fs2_column_id[LOG_COLUMN_STATUS_SUCCESS_S]=FS_register(_instance->fs2_handle, FS_STYLE_COLUMN, FS_CALC_SPEED, "success_log/s");
|
|
|
|
|
_instance->fs2_column_id[LOG_COLUMN_STATUS_FAIL_S]=FS_register(_instance->fs2_handle, FS_STYLE_COLUMN, FS_CALC_SPEED, "fail_log/s");
|
|
|
|
|
_instance->fs2_column_id[LOG_COLUMN_STATUS_DROP_S]=FS_register(_instance->fs2_handle, FS_STYLE_COLUMN, FS_CALC_SPEED, "drop_log/s");
|
|
|
|
|
|
|
|
|
|
_instance->sum_line_id=FS_register(_instance->fs2_handle, FS_STYLE_LINE, FS_CALC_SPEED, "SUM");
|
2019-12-09 18:58:05 +08:00
|
|
|
|
2020-09-28 17:13:39 +08:00
|
|
|
MESA_load_profile_int_def(conffile, "TSG_LOG", "LOG_LEVEL",&(_instance->level), 30);
|
|
|
|
|
MESA_load_profile_string_def(conffile, "TSG_LOG", "LOG_PATH", _instance->log_path, sizeof(_instance->log_path), "./tsglog/tsglog");
|
2021-10-06 16:29:24 +08:00
|
|
|
MESA_load_profile_int_def(conffile, "TSG_LOG", "SEND_USER_REGION", &(_instance->send_user_region), 0);
|
2022-12-30 13:41:12 +08:00
|
|
|
MESA_load_profile_int_def(conffile, "TSG_LOG", "SEND_DATA_CENTER_SWITCH", &(_instance->send_data_center), 0);
|
|
|
|
|
MESA_load_profile_int_def(conffile, "TSG_LOG", "SEND_APP_ID_SWITCH", &(_instance->send_app_id), 0);
|
|
|
|
|
MESA_load_profile_int_def(conffile, "TSG_LOG", "SEND_NAT_LINKINFO_SWITCH", &(_instance->send_nat_linkinfo), 0);
|
|
|
|
|
MESA_load_profile_int_def(conffile, "TSG_LOG", "RAPIDJSON_CHUNK_CAPACITY", &(_instance->rapidjson_chunk_capacity), 8192);
|
2019-12-09 18:58:05 +08:00
|
|
|
|
2022-07-29 10:09:15 +08:00
|
|
|
MESA_load_profile_int_def(conffile, "TSG_LOG", "VSYSTEM_ID", &(_instance->vsystem_id), 1);
|
2022-12-29 06:03:04 +00:00
|
|
|
MESA_load_profile_int_def(conffile, "SYSTEM","UNKNOWN_APP_ID", &_instance->unknown_app_id, 4);
|
2022-07-29 10:09:15 +08:00
|
|
|
|
2022-06-28 15:01:14 +08:00
|
|
|
MESA_load_profile_string_def(conffile, "TSG_LOG", "LINKINFO_FROM_MAC", bridge_name[LOG_BRIDGE_MAC_LINKINFO], sizeof(bridge_name[LOG_BRIDGE_MAC_LINKINFO]), "mirror_linkinfo_from_mac");
|
|
|
|
|
MESA_load_profile_string_def(conffile, "TSG_LOG", "NAT_C2S_LINKINFO", bridge_name[LOG_BRIDGE_NAT_C2S_LINKINFO], sizeof(bridge_name[LOG_BRIDGE_NAT_C2S_LINKINFO]), "common_link_info_c2s");
|
|
|
|
|
MESA_load_profile_string_def(conffile, "TSG_LOG", "NAT_S2C_LINKINFO", bridge_name[LOG_BRIDGE_NAT_S2C_LINKINFO], sizeof(bridge_name[LOG_BRIDGE_NAT_S2C_LINKINFO]), "common_link_info_s2c");
|
2022-07-01 17:08:16 +08:00
|
|
|
MESA_load_profile_string_def(conffile, "TSG_LOG", "APP_LUA_SCRIPTS_BRIDGE_NAME", bridge_name[LOG_BRIDGE_APP_LUA_RESULT], sizeof(bridge_name[LOG_BRIDGE_APP_LUA_RESULT]), "LUA_USER_DEFINED_ATTRIBUTE");
|
|
|
|
|
MESA_load_profile_string_def(conffile, "TSG_LOG", "BUSINESS_S3_FILENAME", bridge_name[LOG_BRIDGE_BUSINESS_S3_FILENAME], sizeof(bridge_name[LOG_BRIDGE_BUSINESS_S3_FILENAME]), "TSG_BUSINESS_S3_FILENAME");
|
|
|
|
|
MESA_load_profile_string_def(conffile, "SYSTEM", "APP_BEHAVIOR_BRIDGE_NAME", bridge_name[LOG_BRIDGE_APP_BEHAVIOR_RESULT], sizeof(bridge_name[LOG_BRIDGE_APP_BEHAVIOR_RESULT]), "TSG_APPLICATION_BEHAVIOR");
|
|
|
|
|
MESA_load_profile_string_def(conffile, "SYSTEM", "NOTIFY_EXEC_RESULT_BRIDGE_NAME", bridge_name[LOG_BRIDGE_CONN_SKETCH_EXEC_RESULT], sizeof(bridge_name[LOG_BRIDGE_CONN_SKETCH_EXEC_RESULT]), "TSG_NOTIFICATION_EXECUTION_RESULT");
|
2021-08-13 10:23:05 +00:00
|
|
|
|
2022-06-28 15:01:14 +08:00
|
|
|
for(i=0; i<LOG_BRIDGE_MAX; i++)
|
2021-08-13 10:23:05 +00:00
|
|
|
{
|
2022-06-28 15:01:14 +08:00
|
|
|
_instance->bridge_id[i]=stream_bridge_build(bridge_name[i], "w");
|
|
|
|
|
if(_instance->bridge_id[i]<0)
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(g_tsg_para.logger, RLOG_LV_FATAL, "LINKINFO_FROM_MAC", "stream_bridge_build is error, bridge_name: %s", bridge_name[i]);
|
|
|
|
|
}
|
|
|
|
|
}
|
2021-08-13 10:23:05 +00:00
|
|
|
|
2020-09-28 17:13:39 +08:00
|
|
|
_instance->logger=MESA_create_runtime_log_handle(_instance->log_path, _instance->level);
|
2019-12-09 18:58:05 +08:00
|
|
|
if(_instance->logger==NULL)
|
|
|
|
|
{
|
2020-09-28 17:13:39 +08:00
|
|
|
printf("MESA_create_runtime_log_handle failed ..., path: %s level: %d", _instance->log_path, _instance->level);
|
2019-12-09 18:58:05 +08:00
|
|
|
return NULL;
|
|
|
|
|
}
|
2019-12-20 11:15:29 +08:00
|
|
|
|
|
|
|
|
MESA_load_profile_int_def(conffile, "TSG_LOG", "MODE",&(_instance->mode), 0);
|
|
|
|
|
if(_instance->mode==CLOSE)
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(_instance->logger, RLOG_LV_FATAL, "TSG_LOG", "Disable tsg_send_log");
|
|
|
|
|
return _instance;
|
|
|
|
|
}
|
2020-09-01 11:35:49 +08:00
|
|
|
|
|
|
|
|
MESA_load_profile_int_def(conffile, "TSG_LOG", "RECOVERY_INTERVEL_S", &(_instance->recovery_interval), 30);
|
|
|
|
|
|
2019-12-20 11:15:29 +08:00
|
|
|
MESA_load_profile_string_def(conffile, "TSG_LOG", "COMMON_FIELD_FILE", _instance->common_field_file, sizeof(_instance->common_field_file), NULL);
|
|
|
|
|
MESA_load_profile_string_def(conffile, "TSG_LOG", "BROKER_LIST", _instance->broker_list, sizeof(_instance->broker_list), NULL);
|
2021-08-19 06:20:32 +00:00
|
|
|
MESA_load_profile_string_def(conffile, "TSG_LOG", "SASL_USERNAME", _instance->sasl_username, sizeof(_instance->sasl_username), ""); //admin
|
|
|
|
|
MESA_load_profile_string_def(conffile, "TSG_LOG", "SASL_PASSWD", _instance->sasl_passwd, sizeof(_instance->sasl_passwd), "");
|
2019-12-09 18:58:05 +08:00
|
|
|
|
2020-09-01 11:35:49 +08:00
|
|
|
MESA_load_profile_string_def(conffile, "TSG_LOG", "SEND_QUEUE_MAX_MESSAGE", _instance->send_queue_max_msg, sizeof(_instance->send_queue_max_msg), "1000000");
|
|
|
|
|
MESA_load_profile_string_def(conffile, "TSG_LOG", "REFRESH_INTERVAL_MS", _instance->refresh_interval_ms, sizeof(_instance->refresh_interval_ms), "600000");
|
|
|
|
|
MESA_load_profile_string_def(conffile, "TSG_LOG", "REQUIRE_ACK", _instance->require_ack, sizeof(_instance->require_ack), "1");
|
|
|
|
|
|
2021-06-22 07:01:46 +00:00
|
|
|
MESA_load_profile_string_def(conffile, "SYSTEM", "TCP_LABEL", _instance->tcp_label, sizeof(_instance->tcp_label), "tcp_flow_stat");
|
|
|
|
|
MESA_load_profile_string_def(conffile, "SYSTEM", "UDP_LABEL", _instance->udp_label, sizeof(_instance->udp_label), "udp_flow_stat");
|
2020-07-24 17:04:09 +08:00
|
|
|
|
|
|
|
|
_instance->tcp_flow_project_id=project_customer_register(_instance->tcp_label, "struct");
|
|
|
|
|
_instance->udp_flow_project_id=project_customer_register(_instance->udp_label, "struct");
|
|
|
|
|
if(_instance->tcp_flow_project_id<0 || _instance->udp_flow_project_id<0)
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(_instance->logger,
|
|
|
|
|
RLOG_LV_FATAL,
|
|
|
|
|
"TCP_OR_UDP_LABEL",
|
|
|
|
|
"project_customer_register is error, tcp_label: %s udp_label: %s, please check etc/project.conf",
|
|
|
|
|
_instance->tcp_label,
|
|
|
|
|
_instance->udp_label
|
|
|
|
|
);
|
|
|
|
|
}
|
2022-09-09 15:07:37 +08:00
|
|
|
|
|
|
|
|
MESA_load_profile_string_def(conffile, "SYSTEM", "OVERRIDE_SLED_IP", override_sled_ip, sizeof(override_sled_ip), "OVERRIDE_SLED_IP");
|
|
|
|
|
char *sled_ip=getenv(override_sled_ip);
|
|
|
|
|
if(sled_ip==NULL)
|
2019-12-09 18:58:05 +08:00
|
|
|
{
|
2022-09-09 15:07:37 +08:00
|
|
|
MESA_load_profile_string_def(conffile, "SYSTEM", "NIC_NAME", nic_name, sizeof(nic_name), "lo");
|
|
|
|
|
ret=MESA_get_dev_ipv4(nic_name, (int *)&local_ip_nr);
|
|
|
|
|
if(ret<0)
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(_instance->logger,
|
|
|
|
|
RLOG_LV_FATAL,
|
|
|
|
|
"GET_LOCAL_IP",
|
|
|
|
|
"MESA_get_dev_ipv4 is error, nic_name: %s, please check tsgconf/main.conf",
|
|
|
|
|
nic_name
|
|
|
|
|
);
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
inet_ntop(AF_INET,&(local_ip_nr),_instance->local_ip_str,sizeof(_instance->local_ip_str));
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
memcpy(_instance->local_ip_str, sled_ip, MIN(sizeof(_instance->local_ip_str)-1, strlen(sled_ip)));
|
2019-12-09 18:58:05 +08:00
|
|
|
}
|
2020-11-14 15:50:44 +06:00
|
|
|
|
2020-09-01 11:35:49 +08:00
|
|
|
rdkafka_conf = rd_kafka_conf_new();
|
|
|
|
|
rd_kafka_conf_set(rdkafka_conf, "queue.buffering.max.messages", _instance->send_queue_max_msg, kafka_errstr, sizeof(kafka_errstr));
|
|
|
|
|
rd_kafka_conf_set(rdkafka_conf, "topic.metadata.refresh.interval.ms", _instance->refresh_interval_ms, kafka_errstr, sizeof(kafka_errstr));
|
2021-04-29 14:43:44 +08:00
|
|
|
rd_kafka_conf_set(rdkafka_conf, "request.required.acks", _instance->require_ack, kafka_errstr, sizeof(kafka_errstr));
|
2021-07-10 03:40:39 +00:00
|
|
|
rd_kafka_conf_set(rdkafka_conf, "socket.keepalive.enable", "true", kafka_errstr, sizeof(kafka_errstr));
|
|
|
|
|
rd_kafka_conf_set(rdkafka_conf, "bootstrap.servers", _instance->broker_list, kafka_errstr, sizeof(kafka_errstr));
|
2021-08-19 06:20:32 +00:00
|
|
|
|
2021-09-02 15:15:15 +08:00
|
|
|
if(strlen(_instance->sasl_username)> 0 && strlen(_instance->sasl_passwd)>0)
|
2019-12-09 18:58:05 +08:00
|
|
|
{
|
2021-08-19 06:20:32 +00:00
|
|
|
rd_kafka_conf_set(rdkafka_conf, "security.protocol", "sasl_plaintext", kafka_errstr, sizeof(kafka_errstr));
|
|
|
|
|
rd_kafka_conf_set(rdkafka_conf, "sasl.mechanisms", "PLAIN", kafka_errstr, sizeof(kafka_errstr));
|
|
|
|
|
rd_kafka_conf_set(rdkafka_conf, "sasl.username", _instance->sasl_username, kafka_errstr, sizeof(kafka_errstr));
|
|
|
|
|
rd_kafka_conf_set(rdkafka_conf, "sasl.password", _instance->sasl_passwd, kafka_errstr, sizeof(kafka_errstr));
|
2019-12-09 18:58:05 +08:00
|
|
|
}
|
2021-08-19 06:20:32 +00:00
|
|
|
|
2021-08-24 05:28:08 +00:00
|
|
|
if(!(_instance->kafka_handle=rd_kafka_new(RD_KAFKA_PRODUCER, rdkafka_conf, kafka_errstr, sizeof(kafka_errstr))))
|
2019-12-09 18:58:05 +08:00
|
|
|
{
|
2021-08-19 06:20:32 +00:00
|
|
|
MESA_handle_runtime_log(_instance->logger, RLOG_LV_FATAL, "KAFKA_INIT", "rd_kafka_new is error");
|
2019-12-09 18:58:05 +08:00
|
|
|
return NULL;
|
|
|
|
|
}
|
2021-08-19 06:20:32 +00:00
|
|
|
|
2020-01-19 15:53:02 +08:00
|
|
|
load_log_common_field(_instance->common_field_file, _instance->id2field, &(_instance->service2topic), &(_instance->max_service));
|
2019-12-09 18:58:05 +08:00
|
|
|
|
2020-01-19 15:53:02 +08:00
|
|
|
if(_instance->service2topic!=NULL)
|
2019-12-09 18:58:05 +08:00
|
|
|
{
|
2020-04-27 17:49:59 +08:00
|
|
|
for(i=0; i<_instance->max_service; i++)
|
2019-12-09 18:58:05 +08:00
|
|
|
{
|
2022-05-17 10:05:40 +00:00
|
|
|
if(_instance->service2topic[i].type==TLD_TYPE_MAX && strlen(_instance->service2topic[i].name)>0)
|
|
|
|
|
{
|
|
|
|
|
register_topic(_instance, &( _instance->service2topic[i]));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if(i==1)
|
2020-01-19 15:53:02 +08:00
|
|
|
{
|
2022-05-17 10:05:40 +00:00
|
|
|
memcpy(&(_instance->service2topic[i]), &(_instance->service2topic[0]), sizeof(struct topic_stat)); // service id of security event is 0 and 1
|
2020-01-19 15:53:02 +08:00
|
|
|
}
|
2019-12-09 18:58:05 +08:00
|
|
|
}
|
|
|
|
|
}
|
2020-01-19 15:53:02 +08:00
|
|
|
else
|
|
|
|
|
{
|
2020-04-27 17:49:59 +08:00
|
|
|
MESA_handle_runtime_log(_instance->logger,
|
|
|
|
|
RLOG_LV_FATAL,
|
|
|
|
|
"KAFKA_INIT",
|
|
|
|
|
"load_log_common_field is error, please check %s",
|
|
|
|
|
_instance->common_field_file
|
|
|
|
|
);
|
2020-01-19 15:53:02 +08:00
|
|
|
}
|
2019-12-09 18:58:05 +08:00
|
|
|
|
|
|
|
|
return _instance;
|
|
|
|
|
}
|
2022-02-23 18:43:00 +08:00
|
|
|
void tsg_sendlog_destroy(struct tsg_log_instance_t * instance)
|
|
|
|
|
{
|
2022-02-24 11:50:11 +08:00
|
|
|
if(instance==NULL)
|
2022-02-23 18:43:00 +08:00
|
|
|
{
|
2022-02-24 11:50:11 +08:00
|
|
|
return ;
|
|
|
|
|
}
|
|
|
|
|
|
2022-02-25 18:08:50 +08:00
|
|
|
if(instance->mode!=CLOSE)
|
2022-02-24 11:50:11 +08:00
|
|
|
{
|
|
|
|
|
for(int i=0; i<instance->max_service; i++)
|
2022-02-23 18:43:00 +08:00
|
|
|
{
|
2022-05-17 10:05:40 +00:00
|
|
|
if(instance->service2topic[i].type!=TLD_TYPE_MAX || i==1) //i=1 equal i=0, service id of security event is 0 and 1
|
|
|
|
|
{
|
2022-02-24 11:50:11 +08:00
|
|
|
continue;
|
|
|
|
|
}
|
2022-05-17 10:05:40 +00:00
|
|
|
|
|
|
|
|
if(instance->service2topic[i].topic_rkt!=NULL)
|
|
|
|
|
{
|
|
|
|
|
rd_kafka_topic_destroy(instance->service2topic[i].topic_rkt);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if(instance->service2topic[i].drop_start!=NULL)
|
|
|
|
|
{
|
|
|
|
|
free(instance->service2topic[i].drop_start);
|
|
|
|
|
instance->service2topic[i].drop_start=NULL;
|
|
|
|
|
}
|
2022-02-24 11:50:11 +08:00
|
|
|
|
2022-05-17 10:05:40 +00:00
|
|
|
if(instance->service2topic[i].send_log_percent!=NULL)
|
|
|
|
|
{
|
|
|
|
|
free(instance->service2topic[i].send_log_percent);
|
|
|
|
|
instance->service2topic[i].send_log_percent=NULL;
|
|
|
|
|
}
|
2022-02-23 18:43:00 +08:00
|
|
|
}
|
2022-02-24 11:50:11 +08:00
|
|
|
|
2022-03-10 17:19:39 +08:00
|
|
|
//rd_kafka_destroy_flags(instance->kafka_handle, 4);
|
2022-02-25 18:08:50 +08:00
|
|
|
rd_kafka_destroy(instance->kafka_handle);
|
2022-02-24 11:50:11 +08:00
|
|
|
|
|
|
|
|
free(instance->service2topic);
|
|
|
|
|
instance->service2topic=NULL;
|
2022-02-23 18:43:00 +08:00
|
|
|
}
|
|
|
|
|
|
2022-02-24 11:50:11 +08:00
|
|
|
|
2022-02-23 18:43:00 +08:00
|
|
|
MESA_destroy_runtime_log_handle(instance->logger);
|
|
|
|
|
instance->logger=NULL;
|
|
|
|
|
|
|
|
|
|
free(instance);
|
|
|
|
|
instance=NULL;
|
|
|
|
|
/*
|
|
|
|
|
int ret=0,count=0;
|
|
|
|
|
|
|
|
|
|
while(1)
|
|
|
|
|
{
|
|
|
|
|
ret=rd_kafka_wait_destroyed(1000);
|
|
|
|
|
if(ret==0)
|
|
|
|
|
{
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
count++;
|
|
|
|
|
}
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
return ;
|
|
|
|
|
}
|
2019-12-09 18:58:05 +08:00
|
|
|
|
|
|
|
|
int tsg_send_log(struct tsg_log_instance_t *instance, struct TLD_handle_t *handle, tsg_log_t *log_msg, int thread_id)
|
|
|
|
|
{
|
2022-05-17 10:05:40 +00:00
|
|
|
int fs_id=0,ret=0;
|
|
|
|
|
int i=0,repeat_cnt=0;
|
2020-07-20 15:59:15 +08:00
|
|
|
int policy_id[MAX_RESULT_NUM]={0};
|
2019-12-09 18:58:05 +08:00
|
|
|
struct TLD_handle_t *_handle=handle;
|
|
|
|
|
struct tsg_log_instance_t *_instance=instance;
|
2020-05-14 15:52:54 +08:00
|
|
|
|
2019-12-09 18:58:05 +08:00
|
|
|
if(_instance==NULL || _handle==NULL || log_msg==NULL)
|
|
|
|
|
{
|
|
|
|
|
TLD_cancel(handle);
|
2021-11-13 13:27:59 +03:00
|
|
|
MESA_handle_runtime_log(_instance->logger, RLOG_LV_DEBUG, "TSG_SEND_LOG", " instance==NULL || TLD_handle==NULL || log_msg==NULL ");
|
2019-12-09 18:58:05 +08:00
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if(_instance->mode==CLOSE)
|
|
|
|
|
{
|
2020-09-01 11:35:49 +08:00
|
|
|
TLD_cancel(handle);
|
2022-05-17 10:05:40 +00:00
|
|
|
FS_operate(_instance->fs2_handle, _instance->sum_line_id, _instance->fs2_field_id[LOG_COLUMN_STATUS_DROP], FS_OP_ADD, 1);
|
2019-12-09 18:58:05 +08:00
|
|
|
MESA_handle_runtime_log(_instance->logger, RLOG_LV_INFO, "TSG_SEND_LOG", "Disable tsg_send_log.");
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
TLD_append_streaminfo(instance, handle, log_msg->a_stream);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_SLED_IP].name, (void *)(_instance->local_ip_str), TLD_TYPE_STRING);
|
2020-09-23 16:51:25 +08:00
|
|
|
if(strlen(g_tsg_para.device_sn)>0)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_DEVICE_ID].name, (void *)(g_tsg_para.device_sn), TLD_TYPE_STRING);
|
|
|
|
|
}
|
2019-12-09 18:58:05 +08:00
|
|
|
|
2021-10-06 16:29:24 +08:00
|
|
|
if(strlen(g_tsg_para.data_center)>0 && _instance->send_data_center==1)
|
2020-09-23 16:51:25 +08:00
|
|
|
{
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_DATA_CENTER].name, (void *)(g_tsg_para.data_center), TLD_TYPE_STRING);
|
|
|
|
|
}
|
2021-10-06 16:29:24 +08:00
|
|
|
|
|
|
|
|
if(strlen(g_tsg_para.device_tag)>0)
|
|
|
|
|
{
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_DEVICE_TAG].name, (void *)(g_tsg_para.device_tag), TLD_TYPE_STRING);
|
|
|
|
|
}
|
2022-10-24 14:48:16 +08:00
|
|
|
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_TRAFFIC_VSYSTEM_ID].name, (void *)(long)_instance->vsystem_id, TLD_TYPE_LONG);
|
|
|
|
|
|
2021-12-29 21:59:35 +03:00
|
|
|
set_application_behavior(_instance, _handle, log_msg->a_stream);
|
2021-10-06 16:29:24 +08:00
|
|
|
|
2019-12-09 18:58:05 +08:00
|
|
|
for(i=0;i<log_msg->result_num; i++)
|
|
|
|
|
{
|
2020-07-20 15:59:15 +08:00
|
|
|
if(is_multi_hit_same_policy(&(log_msg->result[i]), policy_id, &repeat_cnt))
|
|
|
|
|
{
|
2020-09-16 10:09:05 +08:00
|
|
|
MESA_handle_runtime_log(_instance->logger, RLOG_LV_DEBUG,
|
|
|
|
|
"TSG_SEND_LOG",
|
|
|
|
|
"tsg same log:cfg_id=%d service=%d addr=%s",
|
|
|
|
|
log_msg->result[i].config_id,
|
|
|
|
|
log_msg->result[i].service_id,
|
2021-04-19 20:37:05 +08:00
|
|
|
(log_msg->a_stream==NULL ? "" : PRINTADDR(log_msg->a_stream,_instance->level))
|
2020-09-16 11:09:44 +08:00
|
|
|
);
|
2020-07-20 15:59:15 +08:00
|
|
|
continue;
|
|
|
|
|
}
|
2020-09-01 11:35:49 +08:00
|
|
|
|
2019-12-09 18:58:05 +08:00
|
|
|
switch(log_msg->result[i].do_log)
|
|
|
|
|
{
|
|
|
|
|
case LOG_ABORT:
|
2022-06-09 10:01:33 +08:00
|
|
|
MESA_handle_runtime_log(_instance->logger, RLOG_LV_DEBUG,
|
2020-09-16 11:09:44 +08:00
|
|
|
"TSG_SEND_LOG",
|
|
|
|
|
"tsg abort log:cfg_id=%d service=%d addr=%s",
|
|
|
|
|
log_msg->result[i].config_id,
|
|
|
|
|
log_msg->result[i].service_id,
|
2021-04-19 20:37:05 +08:00
|
|
|
(log_msg->a_stream==NULL ? "" : PRINTADDR(log_msg->a_stream,_instance->level))
|
2020-09-16 11:09:44 +08:00
|
|
|
);
|
2020-11-16 12:30:44 +06:00
|
|
|
|
|
|
|
|
fs_id=action2fs_id((int)log_msg->result[i].action);
|
2022-05-17 10:05:40 +00:00
|
|
|
FS_operate(_instance->fs2_handle, _instance->fs2_field_id[fs_id], 0, FS_OP_ADD, 1);
|
2019-12-09 18:58:05 +08:00
|
|
|
continue;
|
|
|
|
|
break;
|
|
|
|
|
case LOG_ALL:
|
2022-07-01 17:08:16 +08:00
|
|
|
if(log_msg->result[i].action==TSG_ACTION_MONITOR)
|
|
|
|
|
{
|
|
|
|
|
set_s3_filename(_instance, _handle, log_msg->a_stream);
|
|
|
|
|
set_mail_eml(_instance, _handle, log_msg->a_stream);
|
|
|
|
|
}
|
2019-12-09 18:58:05 +08:00
|
|
|
break;
|
|
|
|
|
case LOG_NOFILE:
|
2022-07-01 17:08:16 +08:00
|
|
|
if(log_msg->result[i].action==TSG_ACTION_MONITOR)
|
|
|
|
|
{
|
|
|
|
|
TLD_delete(_handle, _instance->id2field[LOG_COMMON_MAIL_EML_FILE].name);
|
|
|
|
|
TLD_delete(_handle, _instance->id2field[LOG_COMMON_HTTP_REQUEST_S3_FILE].name);
|
|
|
|
|
TLD_delete(_handle, _instance->id2field[LOG_COMMON_HTTP_RESPONSE_S3_FILE].name);
|
|
|
|
|
}
|
2019-12-09 18:58:05 +08:00
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
2022-06-09 10:01:33 +08:00
|
|
|
ret=update_percent(_instance, log_msg->result[i].service_id, LOG_COLUMN_STATUS_DROP, thread_id);
|
|
|
|
|
if(ret==1)
|
|
|
|
|
{
|
|
|
|
|
MESA_handle_runtime_log(_instance->logger, RLOG_LV_DEBUG,
|
|
|
|
|
"TSG_SEND_LOG",
|
|
|
|
|
"tsg drop log:cfg_id=%d service=%d send_log_percent: %d addr=%s",
|
|
|
|
|
log_msg->result[i].config_id,
|
|
|
|
|
log_msg->result[i].service_id,
|
|
|
|
|
_instance->service2topic[log_msg->result[i].service_id].send_log_percent[thread_id],
|
|
|
|
|
(log_msg->a_stream==NULL ? "" : PRINTADDR(log_msg->a_stream,_instance->level))
|
|
|
|
|
);
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
2019-12-09 18:58:05 +08:00
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_POLICY_ID].name, (void *)(long)(log_msg->result[i].config_id), TLD_TYPE_LONG);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_SERVICE].name, (void *)(long)(log_msg->result[i].service_id), TLD_TYPE_LONG);
|
|
|
|
|
TLD_append(_handle, _instance->id2field[LOG_COMMON_ACTION].name, (void *)(long)((unsigned char)log_msg->result[i].action), TLD_TYPE_LONG);
|
2020-12-17 14:44:01 +06:00
|
|
|
|
2021-12-29 21:59:35 +03:00
|
|
|
set_notify_execution_result(_instance, _handle, log_msg->a_stream, &(log_msg->result[i]));
|
2021-08-13 10:23:05 +00:00
|
|
|
|
2022-12-30 13:41:12 +08:00
|
|
|
if(_instance->send_nat_linkinfo && log_msg->result[i].config_id==0 && log_msg->a_stream!=NULL)
|
2021-08-13 10:23:05 +00:00
|
|
|
{
|
2022-06-28 15:01:14 +08:00
|
|
|
set_nat_linkinfo(_instance, _handle, log_msg->a_stream, _instance->id2field[LOG_COMMON_LINK_INFO_C2S].name, _instance->bridge_id[LOG_BRIDGE_NAT_C2S_LINKINFO]);
|
|
|
|
|
set_nat_linkinfo(_instance, _handle, log_msg->a_stream, _instance->id2field[LOG_COMMON_LINK_INFO_S2C].name, _instance->bridge_id[LOG_BRIDGE_NAT_S2C_LINKINFO]);
|
2021-08-13 10:23:05 +00:00
|
|
|
}
|
2020-04-27 17:49:59 +08:00
|
|
|
|
2022-07-29 10:09:15 +08:00
|
|
|
set_xxxx_from_user_region(_handle, _instance, &(log_msg->result[i]), thread_id);
|
2020-04-16 13:03:56 +08:00
|
|
|
|
2021-08-13 10:23:05 +00:00
|
|
|
StringBuffer sb(0, 2048);
|
|
|
|
|
Writer<StringBuffer> writer(sb);
|
|
|
|
|
_handle->document->Accept(writer);
|
2019-12-09 18:58:05 +08:00
|
|
|
|
2022-05-17 10:05:40 +00:00
|
|
|
tsg_send_payload(_instance, log_msg->result[i].service_id, (char *)sb.GetString(), sb.GetSize(), thread_id);
|
2019-12-09 18:58:05 +08:00
|
|
|
|
|
|
|
|
TLD_delete(_handle, _instance->id2field[LOG_COMMON_POLICY_ID].name);
|
|
|
|
|
TLD_delete(_handle, _instance->id2field[LOG_COMMON_SERVICE].name);
|
|
|
|
|
TLD_delete(_handle, _instance->id2field[LOG_COMMON_ACTION].name);
|
2020-12-17 14:44:01 +06:00
|
|
|
TLD_delete(_handle, _instance->id2field[LOG_COMMON_USER_REGION].name);
|
2019-12-09 18:58:05 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
TLD_cancel(handle);
|
|
|
|
|
|
|
|
|
|
return 0;
|
2019-11-12 13:35:19 +08:00
|
|
|
}
|
|
|
|
|
|
2021-08-24 05:28:08 +00:00
|
|
|
int tsg_register_topic(struct tsg_log_instance_t *instance, char *topic_name)
|
|
|
|
|
{
|
|
|
|
|
struct tsg_log_instance_t *_instance=(struct tsg_log_instance_t *)instance;
|
2022-05-20 15:53:47 +08:00
|
|
|
if(_instance==NULL || _instance->mode==CLOSE || topic_name==NULL || _instance->kafka_handle==NULL)
|
2021-08-24 05:28:08 +00:00
|
|
|
{
|
2022-05-17 10:05:40 +00:00
|
|
|
return -1;
|
2021-08-24 05:28:08 +00:00
|
|
|
}
|
|
|
|
|
|
2022-05-17 10:05:40 +00:00
|
|
|
_instance->service2topic=(struct topic_stat *)realloc(_instance->service2topic, (_instance->max_service+1)*sizeof(struct topic_stat));
|
|
|
|
|
_instance->service2topic[_instance->max_service].type=TLD_TYPE_MAX;
|
|
|
|
|
memset(_instance->service2topic[_instance->max_service].name, 0, MAX_STRING_LEN);
|
|
|
|
|
memcpy(_instance->service2topic[_instance->max_service].name, topic_name, MIN(MAX_STRING_LEN-1, strlen(topic_name)));
|
2021-08-24 05:28:08 +00:00
|
|
|
|
2022-05-17 10:05:40 +00:00
|
|
|
register_topic(_instance, &(_instance->service2topic[_instance->max_service]));
|
|
|
|
|
_instance->max_service++;
|
2021-08-24 05:28:08 +00:00
|
|
|
|
|
|
|
|
return (_instance->max_service-1);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int tsg_send_payload(struct tsg_log_instance_t *instance, int topic_id, char *payload, int payload_len, int thread_id)
|
|
|
|
|
{
|
|
|
|
|
int status=0;
|
|
|
|
|
struct tsg_log_instance_t *_instance=instance;
|
|
|
|
|
|
2021-08-24 06:06:43 +00:00
|
|
|
if(_instance==NULL || _instance->mode==CLOSE)
|
2021-08-24 05:28:08 +00:00
|
|
|
{
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2022-05-17 10:05:40 +00:00
|
|
|
if(payload==NULL || payload_len<=0 || topic_id<0 || _instance->service2topic[topic_id].topic_rkt==NULL)
|
2021-08-24 05:28:08 +00:00
|
|
|
{
|
2022-05-17 10:05:40 +00:00
|
|
|
MESA_handle_runtime_log(_instance->logger,
|
|
|
|
|
RLOG_LV_INFO,
|
|
|
|
|
"TSG_SEND_LOG",
|
|
|
|
|
"tsg_send_log to kafka is error (payload==NULL || payload_len<=0 || topic_id<0 || _instance->service2topic[topic_id].topic_rkt==NULL), topic: %s",
|
|
|
|
|
_instance->service2topic[topic_id].name
|
|
|
|
|
);
|
2021-08-24 05:28:08 +00:00
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
2022-05-17 10:05:40 +00:00
|
|
|
status=rd_kafka_produce(_instance->service2topic[topic_id].topic_rkt, RD_KAFKA_PARTITION_UA, RD_KAFKA_MSG_F_COPY, payload, payload_len, NULL, 0, NULL);
|
2021-08-24 05:28:08 +00:00
|
|
|
if(status<0)
|
|
|
|
|
{
|
2022-05-17 10:05:40 +00:00
|
|
|
update_percent(_instance, topic_id, LOG_COLUMN_STATUS_FAIL, thread_id);
|
2021-08-24 05:28:08 +00:00
|
|
|
|
|
|
|
|
MESA_handle_runtime_log(_instance->logger,
|
|
|
|
|
RLOG_LV_INFO,
|
|
|
|
|
"TSG_SEND_LOG",
|
2022-05-17 10:05:40 +00:00
|
|
|
"tsg_send_log to kafka is error of code: %d %s(%s), status: %d, topic: %s %s",
|
|
|
|
|
rd_kafka_last_error(),
|
2021-08-24 05:28:08 +00:00
|
|
|
rd_kafka_err2name(rd_kafka_last_error()),
|
|
|
|
|
rd_kafka_err2str(rd_kafka_last_error()),
|
|
|
|
|
status,
|
2022-05-17 10:05:40 +00:00
|
|
|
_instance->service2topic[topic_id].name,
|
|
|
|
|
payload
|
2021-08-24 05:28:08 +00:00
|
|
|
);
|
2022-05-17 10:05:40 +00:00
|
|
|
return -1;
|
2021-08-24 05:28:08 +00:00
|
|
|
}
|
2022-05-18 11:41:41 +08:00
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
update_percent(_instance, topic_id, LOG_COLUMN_STATUS_SUCCESS, thread_id);
|
|
|
|
|
MESA_handle_runtime_log(_instance->logger,
|
|
|
|
|
RLOG_LV_DEBUG,
|
|
|
|
|
"TSG_SEND_LOG",
|
|
|
|
|
"log send successfully %s: %s",
|
|
|
|
|
_instance->service2topic[topic_id].name,
|
|
|
|
|
payload
|
|
|
|
|
);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2022-05-17 10:05:40 +00:00
|
|
|
|
|
|
|
|
update_percent(_instance, topic_id, LOG_COLUMN_STATUS_MAX, thread_id);
|
2021-08-24 05:28:08 +00:00
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|