ntopng/scripts/lua/modules/alert_exclusions.lua
Alfredo Cardigliano 33a0b0d0dc Fix variable scope
2022-03-02 10:50:43 +01:00

380 lines
11 KiB
Lua

--
-- (C) 2017-22 - ntop.org
--
-- Module to keep things in common across alert_exclusions of various type
local dirs = ntop.getDirs()
package.path = dirs.installdir .. "/scripts/lua/modules/?.lua;" .. package.path
require "lua_utils"
local alert_consts = require "alert_consts"
local alert_entities = require "alert_entities"
local json = require "dkjson"
-- ##############################################
local alert_exclusions = {}
-- ##############################################
local function _get_alert_exclusions_prefix_key()
local key = string.format("ntopng.prefs.alert_exclusions")
return key
end
-- ##############################################
local function _get_alert_exclusions_lock_key()
local key = string.format("ntopng.cache.alert_exclusions.alert_exclusions_lock")
return key
end
-- ##############################################
local function _lock()
local max_lock_duration = 5 -- seconds
local max_lock_attempts = 5 -- give up after at most this number of attempts
local lock_key = _get_alert_exclusions_lock_key()
for i = 1, max_lock_attempts do
local value_set = ntop.setnxCache(lock_key, "1", max_lock_duration)
if value_set then
return true -- lock acquired
end
ntop.msleep(1000)
end
return false -- lock not acquired
end
-- ##############################################
local function _unlock()
ntop.delCache(_get_alert_exclusions_lock_key())
end
-- ##############################################
local function _check_host_ip_alert_key(host_ip, alert_key)
if not isIPv4(host_ip) and not isIPv6(host_ip) and not isIPv4Network(host_ip) then
-- Invalid host submitted
return false
end
if not alert_consts.getAlertType(tonumber(alert_key)) then
-- Invalid alert key submitted
return false
end
return true
end
-- ##############################################
local function _get_configured_alert_exclusions()
local excl_key = _get_alert_exclusions_prefix_key()
local configured_excl_str = ntop.getPref(excl_key)
local configured_excl = json.decode(configured_excl_str) or {}
return configured_excl
end
-- ##############################################
local function _set_configured_alert_exclusions(exclusions)
local excl_key = _get_alert_exclusions_prefix_key()
local str = json.encode(exclusions)
ntop.setPref(excl_key, str) -- Add the preference
ntop.reloadAlertExclusions() -- Tell ntopng to reload
end
-- ##############################################
--@brief Enables or disables an alert for an `host_ip`
local function _toggle_alert(is_flow_exclusion, host_ip, alert_key, enable_exclusion)
local ret = false
if not _check_host_ip_alert_key(host_ip, alert_key) then
-- Invalid params submitted
return false
end
local locked = _lock()
if locked then
local id = tonumber(alert_key)
local exclusions = _get_configured_alert_exclusions()
if(not enable_exclusion) then
-- disable alert
if exclusions[host_ip] then
local r = {}
if(is_flow_exclusion) then
t = exclusions[host_ip].flow_alerts
else
t = exclusions[host_ip].host_alerts
end
for i=0,table.len(t) do
if(t[i] ~= id) then
table.insert(r, t[i])
end
end
if(is_flow_exclusion) then
exclusions[host_ip].flow_alerts = r
else
exclusions[host_ip].host_alerts = r
end
end
else
-- enable alert
-- Add an entry for the current alert entity, if currently exising exclusions don't already have it
if(exclusions[host_ip] == nil) then
exclusions[host_ip] = { flow_alerts = {}, host_alerts = {} }
end
if(is_flow_exclusion) then
table.insert(exclusions[host_ip].flow_alerts, id)
else
table.insert(exclusions[host_ip].host_alerts, id)
end
end
_set_configured_alert_exclusions(exclusions)
ret = true
_unlock()
end
return ret
end
-- ##############################################
--@brief Removes all exclusions for a given entity
local function _enable_all_alerts(is_flow_exclusion, host_ip)
local ret = false
local locked = _lock()
if locked then
local exclusions
if(host_ip == nil) then
exclusions = {}
else
exclusions = _get_configured_alert_exclusions()
exclusions[host_ip] = nil
end
_set_configured_alert_exclusions(exclusions)
ret = true
_unlock()
end
return ret
end
-- ##############################################
-- @brief Returns true if `host_ip` has the alert identified with `alert_key` disabled
function _has_disabled_alert(is_flow_exclusion, host_ip, alert_key)
local exclusions = _get_configured_alert_exclusions()
local id = tonumber(alert_key)
if(is_flow_exclusion) then
if((exclusions[host_ip] == nil) or (exclusions[host_ip].flow_alerts[id] == nil)) then
return false
else
return true
end
else
if((exclusions[host_ip] == nil) or (exclusions[host_ip].host_alerts[id] == nil)) then
return false
else
return true
end
end
end
-- ##############################################
-- @brief Returns true if `is_flow_exclusion` has one or more disabled alerts
function alert_exclusions.has_disabled_alerts()
local exclusions = _get_configured_alert_exclusions()
if(table.len(exclusions) > 0) then
return true
else
return false
end
end
-- ##############################################
-- @brief Returns all excluded hosts for the given `alert_key` or nil if no excluded host exists
function _get_excluded_hosts(is_flow_exclusion, alert_key)
local exclusions = _get_configured_alert_exclusions()
local id = tonumber(alert_key)
local ret = {}
for host,v in pairs(exclusions) do
local t
if(is_flow_exclusion) then
t = v.flow_alerts
else
t = v.host_alerts
end
if not t then
traceError(TRACE_INFO,TRACE_CONSOLE, "Failure checking exclusions for host")
else
for i=0,table.len(t) do
if(t[i] == id) then
ret[host] = true
break
end
end
end
end
return ret
end
-- ##############################################
--@brief Marks a flow alert as disabled for a given `host_ip`, considered either as client or server
--@return True, if alert is disabled with success, false otherwise
function alert_exclusions.disable_flow_alert(host_ip, alert_key)
return _toggle_alert(true --[[ flow --]], host_ip, alert_key, true --[[ disable --]])
end
-- ##############################################
--@brief Marks a flow alert as enabled for a given `host_ip`, considered either as client or server
--@return True, if alert is enabled with success, false otherwise
function alert_exclusions.enable_flow_alert(host_ip, alert_key)
return _toggle_alert(true --[[ flow --]], host_ip, alert_key, false --[[ enable --]])
end
-- ##############################################
--@brief Enables all flow alerts possibly disabled
--@param host If a valid ip address is specified, then all alerts will be enabled only for `host`, otherwise all alerts will be enabled
--@return True, if enabled with success, false otherwise
function alert_exclusions.enable_all_flow_alerts(host)
return _enable_all_alerts(true --[[ flow --]], host)
end
-- ##############################################
-- @brief Returns true if `host_ip` has the flow alert identified with `alert_key` disabled
function alert_exclusions.has_disabled_flow_alert(host_ip, alert_key)
return _has_disabled_alert(true --[[ flow --]], host_ip, alert_key)
end
-- ##############################################
--@brief Marks a host alert as disabled for a given `host_ip`
--@return True, if alert is disabled with success, false otherwise
function alert_exclusions.disable_host_alert(host_ip, alert_key)
return _toggle_alert(false --[[ host --]], host_ip, alert_key, true --[[ disable --]])
end
-- ##############################################
--@brief Marks a host alert as enabled for a given `host_ip`
--@return True, if alert is enabled with success, false otherwise
function alert_exclusions.enable_host_alert(host_ip, alert_key)
return _toggle_alert(false --[[ host --]], host_ip, alert_key, false --[[ enable --]])
end
-- ##############################################
--@brief Enables all host alerts possibly disabled
--@param host If a valid ip address is specified, then all alerts will be enabled only for `host`, otherwise all alerts will be enabled
--@return True, if enabled with success, false otherwise
function alert_exclusions.enable_all_host_alerts(host)
return _enable_all_alerts(false --[[ host --]], host)
end
-- ##############################################
-- @brief Returns true if `host_ip` has the host alert identified with `alert_key` disabled
function alert_exclusions.has_disabled_host_alert(host_ip, alert_key)
return _has_disabled_alert(false --[[ host --]], host_ip, alert_key)
end
-- ##############################################
-- @brief Returns all the excluded hosts for the host alert identified with `alert_key`
function alert_exclusions.host_alerts_get_excluded_hosts(alert_key)
return _get_excluded_hosts(false --[[ host --]], alert_key) or {}
end
-- ##############################################
-- @brief Returns all the excluded hosts for the flowt alert identified with `alert_key`
function alert_exclusions.flow_alerts_get_excluded_hosts(alert_key)
return _get_excluded_hosts(true --[[ flow --]], alert_key) or {}
end
-- ##############################################
-- @brief Returns all the excluded hosts for the flowt alert identified with `alert_key`
--function alert_exclusions.domain_alerts_get_excluded_hosts(alert_key)
-- return _get_excluded_hosts(alert_entities.domain, alert_key) or {}
--end
-- ##############################################
-- @brief Returns true if `host_ip` has the host alert identified with `alert_key` disabled
function alert_exclusions.has_disabled_host_alert(host_ip, alert_key)
return _has_disabled_alert(false --[[ host --]], host_ip, alert_key)
end
-- ##############################################
-- @brief Import a previously `export`ed exclusions configuration
function alert_exclusions.import(exclusions)
_set_configured_alert_exclusions(exclusions)
end
-- ##############################################
-- @brief Exports the current configuration
function alert_exclusions.export()
local exclusions = _get_configured_alert_exclusions()
return exclusions
end
-- ##############################################
-- @brief Delete all alert_exclusions
function alert_exclusions.cleanup()
local locked = _lock()
if locked then
local excl_key = _get_alert_exclusions_prefix_key()
ntop.delCache(excl_key)
ntop.reloadAlertExclusions() -- Tell ntopng to reload
_unlock()
end
end
-- ##############################################
return alert_exclusions