prometheus-ssh-exporter/prometheus-ssh-exporter.py

124 lines
4.6 KiB
Python
Raw Normal View History

2023-03-12 22:44:14 +01:00
import prometheus_client
import time
import argparse
2023-04-10 16:46:44 +02:00
import utmp
2023-03-12 22:44:14 +01:00
2023-04-10 16:46:44 +02:00
# These defaults can be overwritten by command line arguments
2023-03-12 22:44:14 +01:00
SERVER_HOST = '0.0.0.0'
SERVER_PORT = 9999
2023-04-18 22:18:02 +02:00
FETCH_INTERVAL = 15
2023-03-12 22:44:14 +01:00
2023-04-10 16:46:44 +02:00
2023-03-12 22:44:14 +01:00
class Session:
2023-04-10 16:46:44 +02:00
""" This class is used to create a Session object containing info on an SSH session, mainly for readability
Only the fields name, tty, from_, login are actually used for now """
2023-04-18 22:18:02 +02:00
def __init__(self, name : str, tty : str, from_ : str, login : str, idle=0, jcpu=0, pcpu=0, what=0):
2023-04-10 16:46:44 +02:00
self.name = name # Username that is logged in
self.tty = tty # Which tty is used
self.from_ = from_ # remote IP address
self.login = login # time of login
self.idle = idle # unused
self.jcpu = jcpu # unused
self.pcpu = pcpu # unused
self.what = what # unused
2023-03-12 22:44:14 +01:00
def __str__(self):
return "%s %s" % (self.name, self.from_)
def __repr__(self):
return "%s %s" % (self.name, self.from_)
def __eq__(self, other):
return self.login == other.login and self.tty == other.tty and self.from_ == other.from_
2023-04-18 22:18:02 +02:00
def get_utmp_data() -> list[Session]:
2023-04-10 16:46:44 +02:00
"""
Returns a list of User Objects
2023-04-18 22:18:02 +02:00
The function uses the utmp library. The utmp file contains information about ALL currently logged in users,
including local users (not SSH sessions). We filter out the local users by checking if the remote IP address
is empty and set the hostname for the local sessions to "localhost".
2023-04-10 16:46:44 +02:00
"""
2023-04-18 22:18:02 +02:00
users : list[Session] = []
with open('/var/run/utmp', 'rb') as fd:
buffer = fd.read()
2023-04-10 16:46:44 +02:00
for record in utmp.read(buffer):
if record.type == utmp.UTmpRecordType.user_process:
if record.host != '':
users.append(Session(record.user, record.line, record.host, record.sec))
else:
users.append(Session(record.user, record.line, 'localhost', record.sec))
2023-03-12 22:44:14 +01:00
return users
2023-04-10 16:46:44 +02:00
2023-04-18 22:18:02 +02:00
def parse_arguments() -> None:
2023-04-10 16:46:44 +02:00
2023-03-12 22:44:14 +01:00
global FETCH_INTERVAL, SERVER_PORT, SERVER_HOST
2023-04-10 16:46:44 +02:00
2023-03-12 22:44:14 +01:00
parser = argparse.ArgumentParser(
2023-04-10 16:46:44 +02:00
prog='python prometheus-ssh-exporter.py',
description='Prometheus exporter for info about SSH sessions')
parser.add_argument('-H', '--host', type=str,
default='0.0.0.0', help='Hostname to bind to')
parser.add_argument('-p', '--port', type=int, default=9999,
help='Port for the server to listen to')
parser.add_argument('-i', '--interval', type=int, default=15,
help='Interval in seconds to fetch SSH sessions data')
2023-03-12 22:44:14 +01:00
args = parser.parse_args()
FETCH_INTERVAL = args.interval
SERVER_PORT = args.port
SERVER_HOST = args.host
if __name__ == '__main__':
2023-04-10 16:46:44 +02:00
"""
This program exports the number of SSH sessions as a metric "ssh_num_sessions" for prometheus.
It applies a label to each increment or decrement of that number, containing the remote IP address.
That way we can filter by the remote IP in Grafana, getting the number of SSH sessions by IP address,
or sum them up to get the total number of sessions.
"""
2023-03-12 22:44:14 +01:00
parse_arguments()
# Start up the server to expose the metrics.
prometheus_client.start_http_server(SERVER_PORT)
print("Started metrics server bound to {}:{}".format(SERVER_HOST, SERVER_PORT))
2023-04-10 16:46:44 +02:00
gauge_num_sessions = prometheus_client.Gauge(
'ssh_num_sessions', 'Number of SSH sessions', ['remote_ip'])
2023-04-18 22:18:02 +02:00
session_data = get_utmp_data()
num_sessions = len(session_data)
2023-03-12 22:44:14 +01:00
# Initial metrics
2023-04-18 22:18:02 +02:00
print("Active sessions at startup:")
for session in session_data:
gauge_num_sessions.labels(remote_ip=session.from_).inc()
print("Initial connection: {}".format(session.from_))
2023-03-12 22:44:14 +01:00
# Generate some requests.
print("Looking for SSH connection changes at interval {}".format(FETCH_INTERVAL))
while True:
2023-04-18 22:18:02 +02:00
old_session_data = session_data
old_num_sessions = len(old_session_data)
session_data = get_utmp_data()
num_sessions = len(session_data)
2023-03-12 22:44:14 +01:00
2023-04-18 22:18:02 +02:00
for maybe_new_session in session_data:
2023-03-12 22:44:14 +01:00
# Looking for newly found SSH sessions
2023-04-18 22:18:02 +02:00
if not maybe_new_session in old_session_data:
print("Session connected: %s" % maybe_new_session.from_)
gauge_num_sessions.labels(remote_ip=maybe_new_session.from_).inc()
2023-04-10 16:46:44 +02:00
2023-04-18 22:18:02 +02:00
for maybe_old_session in old_session_data:
2023-03-12 22:44:14 +01:00
# Looking for SSH sessions that no longer exist
2023-04-18 22:18:02 +02:00
if not maybe_old_session in session_data:
print("Session disconnected: %s" % maybe_old_session.from_)
gauge_num_sessions.labels(remote_ip=maybe_old_session.from_).dec()
2023-03-12 22:44:14 +01:00
time.sleep(FETCH_INTERVAL)