fillLine($line); $data = array(); $data['input'] = $entry; unset($entry['msg']); // empty msg $data['result'] = array_merge($entry, $resultDelta); return $data; } public function testCiscoSyslog() { // populate fake $dev_cache and $config global $config, $dev_cache; $dev_cache['1.1.1.1'] = array('device_id' => 1, 'os' => 'ios', 'version' => 1); $config = array(); $config['syslog_filter'] = array(); // populate test data $testdata = array(); // ---- IOS ---- $testdata[] = $this->createData( "1.1.1.1||user||info||info||0e||2016-02-28 00:23:34||%CARD-SEVERITY-MSG:SLOT %FACILITY-SEVERITY-MNEMONIC: Message-text||", array('device_id'=>1, 'program'=>'%CARD-SEVERITY-MSG:SLOT %FACILITY-SEVERITY-MNEMONIC', 'msg'=>'Message-text') ); $testdata[] = $this->createData( "1.1.1.1||user||info||info||0e||2016-02-28 00:23:34||%FACILITY-SUBFACILITY-SEVERITY-MNEMONIC: Message-text||", array('device_id'=>1, 'program'=>'%FACILITY-SUBFACILITY-SEVERITY-MNEMONIC', 'msg'=>'Message-text') ); // ---- CatOS ---- $testdata[] = $this->createData( "1.1.1.1||user||info||info||0e||2016-02-28 00:23:34||%IP-3-UDP_SOCKOVFL:UDP socket overflow||", array('device_id'=>1, 'program'=>'%IP-3-UDP_SOCKOVFL', 'msg'=>'UDP socket overflow') ); $testdata[] = $this->createData( "1.1.1.1||user||info||info||0e||2016-02-28 00:23:34||DTP-1-ILGLCFG: Illegal config (on, isl--on,dot1q) on Port [mod/port]||", array('device_id'=>1, 'program'=>'DTP-1-ILGLCFG', 'msg'=>'Illegal config (on, isl--on,dot1q) on Port [mod/port]') ); $testdata[] = $this->createData( "1.1.1.1||user||info||info||0e||2016-02-28 00:23:34||Cannot enable text mode config if ACL config is cleared from nvram||", array('device_id'=>1, 'program'=>'', 'msg'=>'Cannot enable text mode config if ACL config is cleared from nvram') ); $testdata[] = $this->createData( "1.1.1.1||user||info||info||0e||2016-02-28 00:23:34||%PAGP-5-PORTFROMSTP / %PAGP-5-PORTTOSTP||", array('device_id'=>1, 'program'=>'%PAGP-5-PORTFROMSTP / %PAGP-5-PORTTOSTP') ); $testdata[] = $this->createData( "1.1.1.1||user||info||info||0e||2016-02-28 00:23:34||%SYS-3-EOBC_CHANNELREINIT||", array('device_id'=>1, 'program'=>'%SYS-3-EOBC_CHANNELREINIT') ); $testdata[] = $this->createData( "1.1.1.1||user||info||info||0e||2016-02-28 00:23:34||%SYS-4-MODHPRESET:||", array('device_id'=>1, 'program'=>'%SYS-4-MODHPRESET', 'msg'=>'') ); $testdata[] = $this->createData( "1.1.1.1||user||info||info||0e||2016-02-28 00:23:34||InbandPingProcessFailure:Module x not responding over inband||", array('device_id'=>1, 'program'=>'INBANDPINGPROCESSFAILURE', 'msg'=>'Module x not responding over inband') ); $testdata[] = $this->createData( "1.1.1.1||user||info||info||0e||2016-02-28 00:23:34||RxSBIF_SEQ_NUM_ERROR:slot=x||", array('device_id'=>1, 'program'=>'RXSBIF_SEQ_NUM_ERROR', 'msg'=>'slot=x') ); // run tests foreach($testdata as $data) { $res = process_syslog($data['input'], 0); $this->assertEquals($data['result'], $res); } } public function testLinuxSyslog() { // populate fake $dev_cache and $config global $config, $dev_cache; $dev_cache['1.1.1.1'] = array('device_id' => 1, 'os' => 'linux', 'version' => 1); $config = array(); $config['syslog_filter'] = array(); // populate test data $testdata = array(); // ---- PAM ---- $testdata[] = $this->createData( "1.1.1.1||auth||info||info||0e||2016-02-28 00:23:34||pam_unix(cron:session): session opened for user librenms by (uid=0)||CRON", array('device_id'=>1, 'program'=>'PAM_UNIX(CRON:SESSION)', 'msg'=>'session opened for user librenms by (uid=0)') ); $testdata[] = $this->createData( "1.1.1.1||auth||info||info||0e||2016-02-28 00:23:34||pam_unix(sudo:session): session opened for user librenms by root (uid=0)||sudo", array('device_id'=>1, 'program'=>'PAM_UNIX(SUDO:SESSION)', 'msg'=>'session opened for user librenms by root (uid=0)') ); $testdata[] = $this->createData( "1.1.1.1||auth||info||info||0e||2016-02-28 00:23:34||pam_krb5(sshd:auth): authentication failure; logname=root uid=0 euid=0 tty=ssh ruser= rhost=123.213.132.231||sshd", array('device_id'=>1, 'program'=>'PAM_KRB5(SSHD:AUTH)', 'msg'=>'authentication failure; logname=root uid=0 euid=0 tty=ssh ruser= rhost=123.213.132.231') ); $testdata[] = $this->createData( "1.1.1.1||auth||info||info||0e||2016-02-28 00:23:34||pam_krb5[sshd:auth]: authentication failure; logname=root uid=0 euid=0 tty=ssh ruser= rhost=123.213.132.231||sshd", array('device_id'=>1, 'program'=>'PAM_KRB5[SSHD:AUTH]', 'msg'=>'authentication failure; logname=root uid=0 euid=0 tty=ssh ruser= rhost=123.213.132.231') ); // ---- Postfix ---- $testdata[] = $this->createData( "1.1.1.1||mail||info||info||0e||2016-02-28 00:23:34||5C62E329EF: to=, relay=mail.example.com[127.0.0.1]:25, delay=0.11, delays=0.04/0.01/0/0.06, dsn=2.0.0, status=sent (250 2.0.0 Ok: queued as 5362E6A670E)||postfix/smtp", array('device_id'=>1, 'program'=>'POSTFIX/SMTP', 'msg'=>'5C62E329EF: to=, relay=mail.example.com[127.0.0.1]:25, delay=0.11, delays=0.04/0.01/0/0.06, dsn=2.0.0, status=sent (250 2.0.0 Ok: queued as 5362E6A670E)') ); $testdata[] = $this->createData( "1.1.1.1||mail||info||info||0e||2016-02-28 00:23:34||D7256400EF: from=, size=882, nrcpt=1 (queue active)||postfix/qmgr", array('device_id'=>1, 'program'=>'POSTFIX/QMGR', 'msg'=>'D7256400EF: from=, size=882, nrcpt=1 (queue active)') ); // ---- No program ---- $testdata[] = $this->createData( "1.1.1.1||user||info||info||0e||2016-02-28 00:23:34||some random message||", array('device_id'=>1, 'program'=>'USER', 'msg'=>'some random message') ); // ---- Other ---- $testdata[] = $this->createData( "1.1.1.1||syslog||info||info||0e||2016-02-28 00:23:34||(librenms) CMD ( /opt/librenms/alerts.php >> /var/log/librenms_alert.log 2>&1)||CRON", array('device_id'=>1, 'program'=>'CRON', 'msg'=>'(librenms) CMD ( /opt/librenms/alerts.php >> /var/log/librenms_alert.log 2>&1)') ); // run tests foreach($testdata as $data) { $res = process_syslog($data['input'], 0); $this->assertEquals($data['result'], $res); } } }