2023-03-12 22:44:14 +01:00
|
|
|
import prometheus_client
|
|
|
|
import time
|
|
|
|
import argparse
|
2023-04-10 16:46:44 +02:00
|
|
|
import utmp
|
2023-03-12 22:44:14 +01:00
|
|
|
|
2023-04-10 16:46:44 +02:00
|
|
|
# These defaults can be overwritten by command line arguments
|
2023-03-12 22:44:14 +01:00
|
|
|
SERVER_HOST = '0.0.0.0'
|
|
|
|
SERVER_PORT = 9999
|
2023-04-18 22:18:02 +02:00
|
|
|
FETCH_INTERVAL = 15
|
2023-03-12 22:44:14 +01:00
|
|
|
|
2023-04-10 16:46:44 +02:00
|
|
|
|
2023-03-12 22:44:14 +01:00
|
|
|
class Session:
|
2023-04-10 16:46:44 +02:00
|
|
|
""" This class is used to create a Session object containing info on an SSH session, mainly for readability
|
|
|
|
Only the fields name, tty, from_, login are actually used for now """
|
|
|
|
|
2023-04-18 22:18:02 +02:00
|
|
|
def __init__(self, name : str, tty : str, from_ : str, login : str, idle=0, jcpu=0, pcpu=0, what=0):
|
2023-04-10 16:46:44 +02:00
|
|
|
self.name = name # Username that is logged in
|
|
|
|
self.tty = tty # Which tty is used
|
|
|
|
self.from_ = from_ # remote IP address
|
|
|
|
self.login = login # time of login
|
|
|
|
self.idle = idle # unused
|
|
|
|
self.jcpu = jcpu # unused
|
|
|
|
self.pcpu = pcpu # unused
|
|
|
|
self.what = what # unused
|
2023-03-12 22:44:14 +01:00
|
|
|
|
|
|
|
def __str__(self):
|
|
|
|
return "%s %s" % (self.name, self.from_)
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return "%s %s" % (self.name, self.from_)
|
|
|
|
|
|
|
|
def __eq__(self, other):
|
|
|
|
return self.login == other.login and self.tty == other.tty and self.from_ == other.from_
|
|
|
|
|
2023-04-18 22:18:02 +02:00
|
|
|
|
|
|
|
def get_utmp_data() -> list[Session]:
|
2023-04-10 16:46:44 +02:00
|
|
|
"""
|
|
|
|
Returns a list of User Objects
|
2023-04-18 22:18:02 +02:00
|
|
|
The function uses the utmp library. The utmp file contains information about ALL currently logged in users,
|
|
|
|
including local users (not SSH sessions). We filter out the local users by checking if the remote IP address
|
|
|
|
is empty.
|
2023-04-10 16:46:44 +02:00
|
|
|
"""
|
2023-04-18 22:18:02 +02:00
|
|
|
users : list[Session] = []
|
|
|
|
with open('/var/run/utmp', 'rb') as fd:
|
|
|
|
buffer = fd.read()
|
2023-04-10 16:46:44 +02:00
|
|
|
for record in utmp.read(buffer):
|
2023-04-18 22:18:02 +02:00
|
|
|
if record.type == utmp.UTmpRecordType.user_process and record.host != '':
|
|
|
|
users.append(Session(record.user, record.line, record.host, record.sec))
|
2023-03-12 22:44:14 +01:00
|
|
|
return users
|
|
|
|
|
|
|
|
|
2023-04-10 16:46:44 +02:00
|
|
|
|
2023-04-18 22:18:02 +02:00
|
|
|
def parse_arguments() -> None:
|
2023-04-10 16:46:44 +02:00
|
|
|
|
2023-03-12 22:44:14 +01:00
|
|
|
global FETCH_INTERVAL, SERVER_PORT, SERVER_HOST
|
2023-04-10 16:46:44 +02:00
|
|
|
|
2023-03-12 22:44:14 +01:00
|
|
|
parser = argparse.ArgumentParser(
|
2023-04-10 16:46:44 +02:00
|
|
|
prog='python prometheus-ssh-exporter.py',
|
|
|
|
description='Prometheus exporter for info about SSH sessions')
|
|
|
|
parser.add_argument('-H', '--host', type=str,
|
|
|
|
default='0.0.0.0', help='Hostname to bind to')
|
|
|
|
parser.add_argument('-p', '--port', type=int, default=9999,
|
|
|
|
help='Port for the server to listen to')
|
|
|
|
parser.add_argument('-i', '--interval', type=int, default=15,
|
|
|
|
help='Interval in seconds to fetch SSH sessions data')
|
|
|
|
|
2023-03-12 22:44:14 +01:00
|
|
|
args = parser.parse_args()
|
|
|
|
FETCH_INTERVAL = args.interval
|
|
|
|
SERVER_PORT = args.port
|
|
|
|
SERVER_HOST = args.host
|
|
|
|
|
|
|
|
|
|
|
|
if __name__ == '__main__':
|
2023-04-10 16:46:44 +02:00
|
|
|
"""
|
|
|
|
This program exports the number of SSH sessions as a metric "ssh_num_sessions" for prometheus.
|
|
|
|
It applies a label to each increment or decrement of that number, containing the remote IP address.
|
|
|
|
That way we can filter by the remote IP in Grafana, getting the number of SSH sessions by IP address,
|
|
|
|
or sum them up to get the total number of sessions.
|
|
|
|
"""
|
2023-03-12 22:44:14 +01:00
|
|
|
|
|
|
|
parse_arguments()
|
|
|
|
|
|
|
|
# Start up the server to expose the metrics.
|
|
|
|
prometheus_client.start_http_server(SERVER_PORT)
|
|
|
|
print("Started metrics server bound to {}:{}".format(SERVER_HOST, SERVER_PORT))
|
2023-04-10 16:46:44 +02:00
|
|
|
gauge_num_sessions = prometheus_client.Gauge(
|
|
|
|
'ssh_num_sessions', 'Number of SSH sessions', ['remote_ip'])
|
2023-04-18 22:18:02 +02:00
|
|
|
|
|
|
|
session_data = get_utmp_data()
|
|
|
|
num_sessions = len(session_data)
|
|
|
|
|
2023-03-12 22:44:14 +01:00
|
|
|
# Initial metrics
|
2023-04-18 22:18:02 +02:00
|
|
|
print("Active sessions at startup:")
|
|
|
|
for session in session_data:
|
|
|
|
gauge_num_sessions.labels(remote_ip=session.from_).inc()
|
|
|
|
print("Initial connection: {}".format(session.from_))
|
2023-03-12 22:44:14 +01:00
|
|
|
|
|
|
|
# Generate some requests.
|
|
|
|
print("Looking for SSH connection changes at interval {}".format(FETCH_INTERVAL))
|
|
|
|
while True:
|
|
|
|
|
2023-04-18 22:18:02 +02:00
|
|
|
old_session_data = session_data
|
|
|
|
old_num_sessions = len(old_session_data)
|
|
|
|
|
|
|
|
session_data = get_utmp_data()
|
|
|
|
num_sessions = len(session_data)
|
2023-03-12 22:44:14 +01:00
|
|
|
|
2023-04-18 22:18:02 +02:00
|
|
|
for maybe_new_session in session_data:
|
2023-03-12 22:44:14 +01:00
|
|
|
# Looking for newly found SSH sessions
|
2023-04-18 22:18:02 +02:00
|
|
|
if not maybe_new_session in old_session_data:
|
|
|
|
print("Session connected: %s" % maybe_new_session.from_)
|
|
|
|
gauge_num_sessions.labels(remote_ip=maybe_new_session.from_).inc()
|
2023-04-10 16:46:44 +02:00
|
|
|
|
2023-04-18 22:18:02 +02:00
|
|
|
for maybe_old_session in old_session_data:
|
2023-03-12 22:44:14 +01:00
|
|
|
# Looking for SSH sessions that no longer exist
|
2023-04-18 22:18:02 +02:00
|
|
|
if not maybe_old_session in session_data:
|
|
|
|
print("Session disconnected: %s" % maybe_old_session.from_)
|
|
|
|
gauge_num_sessions.labels(remote_ip=maybe_old_session.from_).dec()
|
2023-03-12 22:44:14 +01:00
|
|
|
|
|
|
|
time.sleep(FETCH_INTERVAL)
|