On 12/3/2018 6:56 AM, Robert Milkowski wrote:
> Hi,
> 
>  
> 
> Just a teaser:
> 
>  
> 
> # dtrace -q -n vlserver*:::*GetEntry-done* \
> 
>    '{printf("%Y client: %s volname: %s rc: %s\n", walltimestamp, \
> 
>      args[1]->ci_remote, args[3]->volname, afs_errorstr[args[0]]);}'
> 
>  
> 
> 2018 Nov 19 15:55:15 client: 10.170.57.130 volname: zz.vldb.13 rc: OK
> 
> 2018 Nov 19 15:55:28 client: 10.170.57.130 volname: ms.dist rc: OK
> 
> 2018 Nov 19 15:55:57 client: 10.170.57.130 volname: ms.distXX rc: VL_NOENT
> 
> ...
> 
>  
> 
> This is a probe provided by vlserver directly. Obviously one can achieve
> the same by using PID provider, but it gets more complicated and does
> require understanding of the code and is more involved.
> 
> This works on Solaris and should work on FreeBSD as well. It shouldn’t
> be hard to get it working with SystemTAP on Linux either (although looks
> like Linux will be going with ebpf in the future).

Hi Robert,

Once trace points are added tracing can be used to answer all sorts of
questions.  The specific output from your example is very similar to the
data that is collected by the baked in audit infrastructure.   The
following is output from AuriStorFS vlserver:

Mon Dec 03 06:25:30 2018 [71] EVENT AFS_VL_GetEntByN CODE 363524 NAME
--UnAuth-- HOST [204.29.154.74]:7001 STR symbols

Mon Dec 03 06:35:08 2018 [71] EVENT AFS_VL_GetEntByN CODE 0 NAME
--UnAuth-- HOST [204.29.154.72]:7001 STR 536872388

Mon Dec 03 06:35:10 2018 [71] EVENT AFS_VL_GetEntByN CODE 0 NAME
--UnAuth-- HOST [204.29.154.72]:7001 STR 536872388

Mon Dec 03 06:36:05 2018 [71] EVENT AFS_VL_GetEntByN CODE 0 NAME
--UnAuth-- HOST [2604:2000:1741:a019:6d77:8346:dab0:49c0]:7001 STR root.cell

Mon Dec 03 06:36:05 2018 [71] EVENT AFS_VL_GetEntByN CODE 0 NAME
--UnAuth-- HOST [2604:2000:1741:a019:6d77:8346:dab0:49c0]:7001 STR
root.public

In OpenAFS the audit infrastructure can be enabled per-service and its
output can be set to files, named pipes, syslog, Linux message queues
and on AIX its integrated with the OS auditing system.

Jeffrey Altman

<<attachment: jaltman.vcf>>

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

Reply via email to