Server IP : 13.213.54.232 / Your IP : 216.73.216.30 Web Server : Apache/2.4.52 (Ubuntu) System : Linux ip-172-31-17-110 6.8.0-1029-aws #31~22.04.1-Ubuntu SMP Thu Apr 24 21:16:18 UTC 2025 x86_64 User : www-data ( 33) PHP Version : 7.1.33-67+ubuntu22.04.1+deb.sury.org+1 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals, MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : ON Directory : /lib/python3/dist-packages/sos/report/plugins/ |
Upload File : |
# Copyright (C) 2024 Marcin Wilk <marcin.wilk@canonical.com> # # This file is part of the sos project: https://github.com/sosreport/sos # # This copyrighted material is made available to anyone wishing to use, # modify, copy, or redistribute it subject to the terms and conditions of # version 2 of the GNU General Public License. # # See the LICENSE file in the source distribution for further information. from sos.report.plugins import Plugin, IndependentPlugin class Telegraf(Plugin, IndependentPlugin): short_desc = 'Telegraf, the metric collecting tool, plugin' plugin_name = "telegraf" profiles = ('observability',) services = ('telegraf',) files = ( '/etc/telegraf/', '/etc/default/telegraf', ) def setup(self): # Collect data from 'files' var super().setup() # collect logs in addition to the above if self.get_option("all_logs"): self.add_copy_spec([ "/var/log/telegraf/", ]) else: self.add_copy_spec([ "/var/log/telegraf/*.log", ]) def postproc(self): protect_keys = [ "password", "token", "pwd", ] telegraf_path_exps = [ "/etc/telegraf/*", "/etc/default/telegraf", ] match_exp = fr"(^\s*(.*({'|'.join(protect_keys)}))\s*=\s*)(.*)" # Obfuscate passwords and keys self.do_path_regex_sub(fr"({'|'.join(telegraf_path_exps)})", match_exp, r"\1*********") # Obfuscate certs self.do_file_private_sub(telegraf_path_exps[0]) # vim: et ts=4 sw=4