diff --git a/check_brocade/trunk/check_brocade_interfaces.py b/check_brocade/trunk/check_brocade_interfaces.py new file mode 100755 index 0000000..71a17fd --- /dev/null +++ b/check_brocade/trunk/check_brocade_interfaces.py @@ -0,0 +1,296 @@ +#!/usr/bin/python +# +# Copyright 2010, Pall Sigurdsson +# +# This script is free software: you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation, either version 3 of the License, or +# (at your option) any later version. +# +# This script is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program. If not, see . + +# About this script +# +# This script will check the status of a remote Cisco Call Manager via SNMP + + + +# No real need to change anything below here +version="1.0" +ok=0 +warning=1 +critical=2 +unknown=3 +not_present = -1 +exit_status = -1 + + + +state = {} +state[not_present] = "Not Present" +state[ok] = "OK" +state[warning] = "Warning" +state[critical] = "Critical" +state[unknown] = "Unknown" + + +longserviceoutput="\n" +perfdata="" +summary="" +sudo=False + + +from sys import exit +from sys import argv +from os import getenv,putenv,environ +import subprocess + + + + +# Parse some Arguments +from optparse import OptionParser +parser = OptionParser() +parser.add_option("-H","--host", dest="host", + help="Hostname or IP address of the host to check") +parser.add_option("-w","--warning", dest="warning_threshold", + help="Warning threshold", type="int", default=None) +parser.add_option("-c","--critical", type="int", dest="critical_threshold", + help="Critical threshold", default=None) +parser.add_option("-e","--exclude", dest="exclude", + help="Exclude specific object", default=None) +parser.add_option("-v","--snmp_version", dest="snmp_version", + help="SNMP Version to use (1, 2c or 3)", default="3") +parser.add_option("-u","--snmp_username", dest="snmp_username", + help="SNMP username (only with SNMP v3)", default=None) +parser.add_option("-C","--snmp_community", dest="snmp_community", + help="SNMP Community (only with SNMP v1|v2c)", default=None) +parser.add_option("-p","--snmp_password", dest="snmp_password", + help="SNMP password (only with SNMP v3)", default=None) +parser.add_option("-l","--snmp_security_level", dest="snmp_seclevel", + help="SNMP security level (only with SNMP v3) (noAuthNoPriv|authNoPriv|authPriv)", default=None) +parser.add_option("-d","--debug", dest="debug", + help="Enable debugging (for troubleshooting", action="store_true", default=False) + +(opts,args) = parser.parse_args() + + +if opts.host == None: + parser.error("Hostname (-H) is required.") + +snmp_options = "" +def set_snmp_options(): + global snmp_options + if opts.snmp_version is not None: + snmp_options = snmp_options + " -v%s" % opts.snmp_version + if opts.snmp_version == "3": + if opts.snmp_username is None: + parser.error("--snmp_username required with --snmp_version=3") + if opts.snmp_seclevel is None: + parser.error("--snmp_security_level required with --snmp_version=3") + if opts.snmp_password is None: + parser.error("--snmp_password required with --snmp_version=3") + snmp_options = snmp_options + " -u %s -l %s -A %s " % (opts.snmp_username, opts.snmp_seclevel,opts.snmp_password) + else: + if opts.snmp_community is None: + parser.error("--snmp_community is required with --snmp_version=1|2c") + snmp_options = snmp_options + " -c %s " % opts.snmp_community + +def error(errortext): + print "* Error: %s" % errortext + exit(unknown) + +def debug( debugtext ): + if opts.debug: + print debugtext + +def nagios_status( newStatus ): + global exit_status + exit_status = max(exit_status, newStatus) + return exit_status + +'''runCommand: Runs command from the shell prompt. Exit Nagios style if unsuccessful''' +def runCommand(command): + debug( "Executing: %s" % command ) + proc = subprocess.Popen(command, shell=True, stdout=subprocess.PIPE,stderr=subprocess.PIPE,) + stdout, stderr = proc.communicate('through stdin to stdout') + if proc.returncode > 0: + print "Error %s: %s\n command was: '%s'" % (proc.returncode,stderr.strip(),command) + debug("results: %s" % (stdout.strip() ) ) + if proc.returncode == 127: # File not found, lets print path + path=getenv("PATH") + print "Check if your path is correct %s" % (path) + if stderr.find('Password:') == 0 and command.find('sudo') == 0: + print "Check if user is in the sudoers file" + if stderr.find('sorry, you must have a tty to run sudo') == 0 and command.find('sudo') == 0: + print "Please remove 'requiretty' from /etc/sudoers" + exit(unknown) + else: + return stdout + +def end(): + global summary + global longserviceoutput + global perfdata + global exit_status + print "%s - %s | %s" % (state[exit_status], summary,perfdata) + print longserviceoutput + if exit_status < 0: exit_status = unknown + exit(exit_status) + +def add_perfdata(text): + global perfdata + text = text.strip() + perfdata = perfdata + " %s " % (text) + +def add_long(text): + global longserviceoutput + longserviceoutput = longserviceoutput + text + '\n' + +def add_summary(text): + global summary + summary = summary + text + +def set_path(path): + current_path = getenv('PATH') + if current_path.find('C:\\') > -1: # We are on this platform + if path == '': + path = ";C:\Program Files\Hewlett-Packard\Sanworks\Element Manager for StorageWorks HSV" + path = path + ";C:\Program Files (x86)\Compaq\Hpacucli\Bin" + path = path + ";C:\Program Files\Compaq\Hpacucli\Bin" + else: path = ';' + path + else: # Unix/Linux, etc + if path == '': path = ":/usr/sbin" + else: path = ':' + path + current_path = "%s%s" % (current_path,path) + environ['PATH'] = current_path + + + +def snmpget(oid): + snmpgetcommand = "snmpget %s %s %s" % (snmp_options,opts.host,oid) + output = runCommand(snmpgetcommand) + oid,result = output.strip().split(' = ', 1) + resultType,resultValue = result.split(': ',1) + if resultType == 'STRING': # strip quotes of the string + resultValue = resultValue[1:-1] + return resultValue + +# snmpwalk -v3 -u v3get mgmt-rek-proxy-p02 -A proxy2011 -l authNoPriv 1.3.6.1.4.1.15497 +def snmpwalk(base_oid): + snmpwalkcommand = "snmpwalk %s %s %s" % (snmp_options, opts.host, base_oid) + output = runCommand(snmpwalkcommand + " " + base_oid) + return output + +def getTable(base_oid): + myTable = {} + output = snmpwalk(base_oid) + for line in output.split('\n'): + tmp = line.strip().split(' = ', 1) + if len(tmp) == 2: + oid,result = tmp + else: + continue + tmp = result.split(': ',1) + if len(tmp) > 1: + resultType,resultValue = tmp[0],tmp[1] + else: + resultType = None + resultValue = tmp[0] + if resultType == 'STRING': # strip quotes of the string + resultValue = resultValue[1:-1] + index = oid.strip().split('.') + column = int(index.pop()) + row = int(index.pop()) + if not myTable.has_key(column): myTable[column] = {} + myTable[column][row] = resultValue + return myTable +def get_interface_statistics(): + interfaces = getTable('.1.3.6.1.4.1.1588.2.1.1.1.6.2.1') + index = 1 + status = 4 + description = 36 + words_transmitted = 11 + words_received = 12 + frames_transmitted = 13 + frames_received = 14 + encoding_disparity_errors = 21 + crc_errors = 22 + truncated_frames = 23 + too_long_frames = 24 + bad_eof_frames = 25 + error_disparity_error = 26 + invalid_ordered_sets = 27 + discarded_class3_frames = 28 + timed_out_multicast_frames = 29 + + bytes_transmitted = words_transmitted * 4 + bytes_received = words_received * 4 + concatted_counters = {} + for i in interfaces.values(): + for k,v in i.items(): + if not concatted_counters.has_key( k ): concatted_counters[ k ] = 0 + #print concatted_counters[k] + try: tmp = int( i[k] ) + except: continue + #print k, v + concatted_counters[k] = concatted_counters[k] + tmp + add_perfdata("'Bad EOF Frames'=%sc" % ( concatted_counters[bad_eof_frames] ) ) + add_perfdata("'CRC Errors'=%sc" % ( concatted_counters[crc_errors] ) ) + add_perfdata("'Truncated Frames'=%sc" % ( concatted_counters[truncated_frames] ) ) + add_perfdata("'Too Long Frames'=%sc" % ( concatted_counters[too_long_frames] ) ) + add_perfdata("'Error/Disparity Error'=%sc" % ( concatted_counters[error_disparity_error] ) ) + add_perfdata("'Invalid Ordered sets received'=%sc" % ( concatted_counters[invalid_ordered_sets] ) ) + add_perfdata("'Discarded Class 3 Frames'=%sc" % ( concatted_counters[discarded_class3_frames] ) ) + add_perfdata("'Timed Out Multicast Frames'=%sc" % ( concatted_counters[timed_out_multicast_frames] ) ) + add_perfdata("'Encoding/Disparity Errors'=%sc" % ( concatted_counters[encoding_disparity_errors] ) ) + + bytes_transmitted = concatted_counters[words_transmitted] * 4 + bytes_received = concatted_counters[words_received] * 4 + add_perfdata("'Bytes Transmitted'=%sc" % ( bytes_transmitted ) ) + add_perfdata("'Bytes Received'=%sc" % ( bytes_received) ) + nagios_status(ok) + add_summary("%s interfaces found." % (len(interfaces) ) ) + +def check_raid(): + drives = getTable('.1.3.6.1.4.1.15497.1.1.1.18.1') + status = 2 + raidID = 3 + raidLastError = 4 + friendlyRaidStatus = { + "1":"driveHealthy", + "2":"driveFailure", + "3":"driveRebuild", + } + num_healthy_drives = 0 + for i in drives.values(): + driveStatus = i[status] + driveStatus = friendlyRaidStatus[ driveStatus ] + if i[raidID] == opts.exclude: continue + if driveStatus == 'driveHealthy': + nagios_status(ok) + num_healthy_drives = num_healthy_drives + 1 + elif driveStatus == 'driveFailure': + nagios_status(critical) + add_summary( '"%s" has failed (%s). ' % ( i[raidID], i[raidLastError] ) ) + elif driveStatus == 'driveRebuild': + nagios_status(warning) + add_summary( '"%s" is rebuilding (%s). ' % ( i[raidID], i[raidLastError] ) ) + else: print driveStatus + add_long( '"%s" - %s (%s) ' % (i[raidID], driveStatus, i[raidLastError]) ) + add_summary( "%s out of %s drives are healthy" % (num_healthy_drives, len(drives) ) ) + nagios_status(ok) + + + + +if __name__ == '__main__': + set_snmp_options() + get_interface_statistics() + end()