Socket Statistics (ss)
Socket Statistics (ss)
The Socket Statistics application polls ss and scrapes socket statuses. Individual sockets and address-families may be filtered out within the script's optional configuration JSON file.
-
The following socket types are polled directly. Filtering a socket type will disable direct polling as-well-as indirect polling within any address-families that list the socket type as their child:
dccp (also exists within address-families "inet" and "inet6") mptcp (also exists within address-families "inet" and "inet6") raw (also exists within address-families "inet" and "inet6") sctp (also exists within address-families "inet" and "inet6") tcp (also exists within address-families "inet" and "inet6") udp (also exists within address-families "inet" and "inet6") xdp
-
The following socket types are polled within an address-family only:
inet6 (within address-family "inet6") p_dgr (within address-family "link") p_raw (within address-family "link") ti_dg (within address-family "tipc") ti_rd (within address-family "tipc") ti_sq (within address-family "tipc") ti_st (within address-family "tipc") v_dgr (within address-family "vsock") v_str (within address-family "vsock") unknown (within address-families "inet", "inet6", "link", "tipc", and "vsock")
-
The following address-families are polled directly and have their child socket types tab-indented below them. Filtering a socket type (see "1" above) will filter it from the address-family. Filtering an address-family will filter out all of its child socket types. However, if those socket types are not DIRECTLY filtered out (see "1" above), then they will continue to be monitored either directly or within other address-families in which they exist:
inet dccp mptcp raw sctp tcp udp unknown inet6 dccp icmp6 mptcp raw sctp tcp udp unknown link p_dgr p_raw unknown netlink tipc ti_dg ti_rd ti_sq ti_st unknown unix u_dgr u_seq u_str vsock v_dgr v_str unknown
SNMP Extend
-
Copy the python script, ss.py, to the desired host
wget https://github.com/librenms/librenms-agent/raw/master/snmp/ss.py -O /etc/snmp/ss.py
-
Make the script executable
chmod +x /etc/snmp/ss.py
-
Edit your snmpd.conf file and add:
extend ss /etc/snmp/ss.py
-
(Optional) Create a /etc/snmp/ss.json file and specify:
-
"ss_cmd" - String path to the ss binary: ["/sbin/ss"]
-
"socket_types" - A comma-delimited list of socket types to include. The following socket types are valid: dccp, icmp6, mptcp, p_dgr, p_raw, raw, sctp, tcp, ti_dg, ti_rd, ti_sq, ti_st, u_dgr, u_seq, u_str, udp, unknown, v_dgr, v_dgr, xdp. Please note that the "unknown" socket type is represented in /sbin/ss output with the netid "???". Please also note that the p_dgr and p_raw socket types are specific to the "link" address family; the ti_dg, ti_rd, ti_sq, and ti_st socket types are specific to the "tipc" address family; the u_dgr, u_seq, and u_str socket types are specific to the "unix" address family; and the v_dgr and v_str socket types are specific to the "vsock" address family. Filtering out the parent address families for the aforementioned will also filter out their specific socket types. Specifying "all" includes all of the socket types. For example: to include only tcp, udp, icmp6 sockets, you would specify "tcp,udp,icmp6": ["all"]
-
"addr_families" - A comma-delimited list of address families to include. The following families are valid: inet, inet6, link, netlink, tipc, unix, vsock. As mentioned above under (b), filtering out the link, tipc, unix, or vsock address families will also filter out their respective socket types. Specifying "all" includes all of the families. For example: to include only inet and inet6 families, you would specify "inet,inet6": ["all"]
-
{
"ss_cmd": "/sbin/ss",
"socket_types": "all"
"addr_families": "all"
}
{
"ss_cmd": "/sbin/ss",
"socket_types": "icmp6,p_dgr,p_raw,raw,tcp,u_dgr,u_seq,u_str,udp",
"addr_families": "inet,inet6,link,netlink,unix"
}
-
(Optional) If SELinux is in Enforcing mode, you must add a module so the script can poll sockets:
cat << EOF > snmpd_ss.te module snmp_ss 1.0; require { type snmpd_t; class netlink_tcpdiag_socket { bind create getattr nlmsg_read read setopt write }; } #============= snmpd_t ============== allow snmpd_t self:netlink_tcpdiag_socket { bind create getattr nlmsg_read read setopt write }; EOF checkmodule -M -m -o snmpd_ss.mod snmpd_ss.te semodule_package -o snmpd_ss.pp -m snmpd_ss.mod semodule -i snmpd_ss.pp
-
Restart snmpd.