search_journalctl.py 4.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150
  1. #!/usr/bin/python
  2. """Interface to journalctl."""
  3. from time import time
  4. import json
  5. import re
  6. import subprocess
  7. from ansible.module_utils.basic import AnsibleModule
  8. class InvalidMatcherRegexp(Exception):
  9. """Exception class for invalid matcher regexp."""
  10. pass
  11. class InvalidLogEntry(Exception):
  12. """Exception class for invalid / non-json log entries."""
  13. pass
  14. class LogInputSubprocessError(Exception):
  15. """Exception class for errors that occur while executing a subprocess."""
  16. pass
  17. def main():
  18. """Scan a given list of "log_matchers" for journalctl messages containing given patterns.
  19. "log_matchers" is a list of dicts consisting of three keys that help fine-tune log searching:
  20. 'start_regexp', 'regexp', and 'unit'.
  21. Sample "log_matchers" list:
  22. [
  23. {
  24. 'start_regexp': r'Beginning of systemd unit',
  25. 'regexp': r'the specific log message to find',
  26. 'unit': 'etcd',
  27. }
  28. ]
  29. """
  30. module = AnsibleModule(
  31. argument_spec=dict(
  32. log_count_limit=dict(type="int", default=500),
  33. log_matchers=dict(type="list", required=True),
  34. ),
  35. )
  36. timestamp_limit_seconds = time() - 60 * 60 # 1 hour
  37. log_count_limit = module.params["log_count_limit"]
  38. log_matchers = module.params["log_matchers"]
  39. matched_regexp, errors = get_log_matches(log_matchers, log_count_limit, timestamp_limit_seconds)
  40. module.exit_json(
  41. changed=False,
  42. failed=bool(errors),
  43. errors=errors,
  44. matched=matched_regexp,
  45. )
  46. def get_log_matches(matchers, log_count_limit, timestamp_limit_seconds):
  47. """Return a list of up to log_count_limit matches for each matcher.
  48. Log entries are only considered if newer than timestamp_limit_seconds.
  49. """
  50. matched_regexp = []
  51. errors = []
  52. for matcher in matchers:
  53. try:
  54. log_output = get_log_output(matcher)
  55. except LogInputSubprocessError as err:
  56. errors.append(str(err))
  57. continue
  58. try:
  59. matched = find_matches(log_output, matcher, log_count_limit, timestamp_limit_seconds)
  60. if matched:
  61. matched_regexp.append(matcher.get("regexp", ""))
  62. except InvalidMatcherRegexp as err:
  63. errors.append(str(err))
  64. except InvalidLogEntry as err:
  65. errors.append(str(err))
  66. return matched_regexp, errors
  67. def get_log_output(matcher):
  68. """Return an iterator on the logs of a given matcher."""
  69. try:
  70. cmd_output = subprocess.Popen(list([
  71. '/bin/journalctl',
  72. '-ru', matcher.get("unit", ""),
  73. '--output', 'json',
  74. ]), stdout=subprocess.PIPE)
  75. return iter(cmd_output.stdout.readline, '')
  76. except subprocess.CalledProcessError as exc:
  77. msg = "Could not obtain journalctl logs for the specified systemd unit: {}: {}"
  78. raise LogInputSubprocessError(msg.format(matcher.get("unit", "<missing>"), str(exc)))
  79. except OSError as exc:
  80. raise LogInputSubprocessError(str(exc))
  81. def find_matches(log_output, matcher, log_count_limit, timestamp_limit_seconds):
  82. """Return log messages matched in iterable log_output by a given matcher.
  83. Ignore any log_output items older than timestamp_limit_seconds.
  84. """
  85. try:
  86. regexp = re.compile(matcher.get("regexp", ""))
  87. start_regexp = re.compile(matcher.get("start_regexp", ""))
  88. except re.error as err:
  89. msg = "A log matcher object was provided with an invalid regular expression: {}"
  90. raise InvalidMatcherRegexp(msg.format(str(err)))
  91. matched = None
  92. for log_count, line in enumerate(log_output):
  93. if log_count >= log_count_limit:
  94. break
  95. try:
  96. obj = json.loads(line)
  97. # don't need to look past the most recent service restart
  98. if start_regexp.match(obj["MESSAGE"]):
  99. break
  100. log_timestamp_seconds = float(obj["__REALTIME_TIMESTAMP"]) / 1000000
  101. if log_timestamp_seconds < timestamp_limit_seconds:
  102. break
  103. if regexp.match(obj["MESSAGE"]):
  104. matched = line
  105. break
  106. except ValueError:
  107. msg = "Log entry for systemd unit {} contained invalid json syntax: {}"
  108. raise InvalidLogEntry(msg.format(matcher.get("unit"), line))
  109. return matched
  110. if __name__ == '__main__':
  111. main()