Collect statistics from the OpenLDAP monitoring database, and publish them through OpenCensus.
A utility to collect metrics from an LDAP server and report them to monitoring software, such as GCP.
- LDAP libraries and header files
- Python 3.9 or later
- C compilers, to compile the Python bindings to LDAP
sudo pip3 install openldap-opencensus-stats
A sample configuration file is provided in openldap-opencensus-stats.template.yml. The configuration is YAML data, with the structure described below.
This should be copied to /etc/openldap-opencensus-stats.yml
and amended to suit the
system requirements.
/usr/local/bin/openldap_opencensus_stats /etc/openldap-opencensus-stats.yml
A sample systemd service definition is provided in the redhat
directory.
A list of the LDAP servers to monitor, and their connection information. An example is:
ldapServers:
- database: UniqueName
connection:
server_uri: ldap://hostname
userDn: CN=admin,DC=example,DC=org
userPassword: adminpassword
startTls: false
timeout: 5
syncOnly: False
Each entry will have the structure:
- database (optional): A human name for this LDAP database. This will be used to tag the statistic for data labelling.
- connection (required): The connection information for this LDAP
database.
- serverUri (required): URI of this LDAP database. The protocol
may be
ldap://
,ldaps://
, orldapi://
. - userDn (optional): Also known as bind DN, this is the user credential to use in connecting to this LDAP database. Default: blank
- userPassword (optional): Password for the userDn. Default: blank
- startTls (optional): Whether to StartTLS on an
ldap://
connection. Takes a boolean value, such as "y", "Yes", true, False, 1, or 0. Default: false - caFile (optional): Full path to a file containing one or more CA certificates to use when verifying the LDAP server certificate. Default: blank
- certFile (optional): Full path to a file containing a client certificate to use in X509 authentication. Default: blank
- keyFile (optional): Full path to the private key for X509 authentication. Default: blank
- saslMech (optional): SASL mechanism to use. Only EXTERNAL is currently supported. Default: blank
- timeout (optional): Seconds to wait for a response from this LDAP server before timing out. A negative value causes the check to wait indefinitely. A zero value effects a poll. Default: -1
- serverUri (required): URI of this LDAP database. The protocol
may be
- syncOnly (optional): Set to True if this server definition is only present for evaluating replication delays
This is a list of the ways to export data to a monitoring system. An example is:
exporters:
- name: Stackdriver
options:
project_id: example
- name: Prometheus
options:
namespace: openldap
port: 8000
address: 0.0.0.0
Each entry will have the structure:
- name (required): The name of the exporter. Currently only two names
are supported,
Stackdriver
to export to GCP, andPrometheus
, which is mostly useful for development or debugging. - options (required): The options for instantiating the exporter.
The contents will vary depending on the chosen exporter.
- project_id (required for Stackdriver): The GCP project ID
- namespace (optional, used by Prometheus): Used to construct the Prometheus metric_name. Default: openldap
- port (optional, used by Prometheus): The TCP port for the Prometheus metrics web service. Default: 8000
- address (optional, used by Prometheus): The IP address to use for the Prometheus metrics web service. Default: 0.0.0.0
This is a configuration for the logging. The software uses the Python logging framework, and consumes a configuration documented at the Python documentation site. This entry is optional, with the default being the default Python configuration.
An example config is:
logConfig:
root:
level: DEBUG
handlers:
- stderr
- syslog
handlers:
stderr:
class: logging.StreamHandler
level: DEBUG
syslog:
class: logging.handlers.SysLogHandler
level: WARNING
This configuration specifies that the default logger, root, will log
any message of DEBUG
or lesser severity through two handlers, stderr
and syslog
. The stderr
handler will use a StreamHandler
to
output anything of DEBUG
or lesser severity to standard error. The
syslog
handler will use a SysLogHandler
to output anything of
WARNING
or lesser severity to the system log.
This part of the configuration details the database objects to monitor. This structure is nestable, dynamic, and interpreted.
- Nestable: The structure of this section is nestable. That is, it can repeat an arbitrary number of times.
- Dynamic: The structure is dynamic in two ways.
- The configuration can react to the LDAP database structure.
- The configuration can react to the LDAP database values
- Interpreted: The configuration can include Python code to be executed at data retrieval time to update the values.
object:
database-object-name: database-object-definition
database-object-name: database-object-definition
...
database-object-name: database-object-name-string | "children"
database-object-name-string: configuration-object-name
database-object-definition:
rdn: regex-string
name: regex-string
object: object
metric:
metric-definition-name: metric-definition
metric-definition-name: metric-definition
...
regex-string: "<string>"
metric-definition-name: configuration-object-name
metric-definition:
attribute: "<string>"
description: "<string>"
unit: unit-name
configuration-object-name: "[A-Za-z0-9_]+"
unit-name: "<string>"
object
contains a number of named database object definitions.
object:
name1:
[database object definition]
name2: ...
name3: ...
Names may contain alphanumeric characters plus the underscore. A
special database object name, children
, will instruct the system to
query the LDAP database for immediate children of the current DN and
replace the children
named database object definition with one copy
of the database object definition per qualifying child.
A database object definition
This is a list of statistics that can be collected from an LDAP database, and how to render the collected value in monitoring. An example is:
statistics:
- aggregator: LastValue
attribute: monitorCounter
description: connections_current
dn: cn=Current,cn=Connections,cn=Monitor
name: connections_current
unit: 1
Each entry will have the structure:
- name (required): The name for this statistic, which will be used to construct the collected metric name.
- dn (required): The LDAP DN to query for data
- attribute (required): The LDAP attribute from the above DN to use for the statistic data
- aggregator (optional): The type of aggregation to perform when the
monitoring system collects values from this software less often than
this software collects its values. Options are
LastValue
,Count
,Sum
, andDistribution
. Default: LastValue - unit (optional): The unit of measure for this statistic. The unit
must come from the Unified Code for Units of Measure.
Commonly this will be
1
,By
(Bytes), ors
(seconds). Default: 1
Configuration for the monitoring of replication delay in a replicated LDAP cluster An example is:
sync:
dc=example,dc=com:
clusterServers:
- database1
- database2
- database3
reportServers:
- database1
Each entry in the dictionary, specifies the base DN of the database in a given cluster. Under that:
- clusterServers (required): Specifies the LDAP servers which make up the cluster.
These must be values found in the
database
field inldapServers
. - reportServers (required): Specifies which of LDAP servers replication offset will be reported for.
When processing replication offset, the contextCSN
of the base DN is queried on all
the LDAP servers in the cluster. The maximum timestamp found is taken as the current
database timestamp.
For each of the servers listed in reportServers
, the offset from that timestamp is
reported.
This allows for two scenarios:
- a central reporting server which queries all hosts in a cluster and reports on all of them.
- distributed reporting, where, for example, each replica queries the masters and itself and reports only its own offset.
Statistics are tagged with the base DN and the rid
of the provider. In a multi master
cluster, for each reportServers
entry there will be one statistic recorded for each
provider in the cluster tagged with the appropriate rid
.
Copyright 2023, NetworkRADIUS This utility was written by Mark Donnelly, mark - at - painless-securtiy - dot - com.