+# -*- coding: utf-8 -*-
+
+##
+# Copyright 2016-2017 VMware Inc.
+# This file is part of ETSI OSM
+# All Rights Reserved.
+#
+# Licensed under the Apache License, Version 2.0 (the "License"); you may
+# not use this file except in compliance with the License. You may obtain
+# a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+# License for the specific language governing permissions and limitations
+# under the License.
+#
+# For those usages not covered by the Apache License, Version 2.0 please
+# contact: osslegalrouting@vmware.com
+##
+
+"""
+Montoring metrics & creating Alarm definations in vROPs
+"""
+
+import requests
+import logging
+from pyvcloud.vcloudair import VCA
+from xml.etree import ElementTree as XmlElementTree
+import traceback
+import time
+import json
+from OpenSSL.crypto import load_certificate, FILETYPE_PEM
+import os
+import datetime
+from socket import getfqdn
+
+from requests.packages.urllib3.exceptions import InsecureRequestWarning
+requests.packages.urllib3.disable_warnings(InsecureRequestWarning)
+
+OPERATION_MAPPING = {'GE':'GT_EQ', 'LE':'LT_EQ', 'GT':'GT', 'LT':'LT', 'EQ':'EQ'}
+severity_mano2vrops = {'WARNING':'WARNING', 'MINOR':'WARNING', 'MAJOR':"IMMEDIATE",\
+ 'CRITICAL':'CRITICAL', 'INDETERMINATE':'UNKNOWN'}
+PERIOD_MSEC = {'HR':3600000,'DAY':86400000,'WEEK':604800000,'MONTH':2678400000,'YEAR':31536000000}
+
+#To Do - Add actual webhook url & certificate
+#SSL_CERTIFICATE_FILE_NAME = 'vROPs_Webservice/SSL_certificate/www.vrops_webservice.com.cert'
+#webhook_url = "https://mano-dev-1:8080/notify/" #for testing
+webhook_url = "https://" + getfqdn() + ":8080/notify/"
+SSL_CERTIFICATE_FILE_NAME = ('vROPs_Webservice/SSL_certificate/' + getfqdn() + ".cert")
+#SSL_CERTIFICATE_FILE_NAME = 'vROPs_Webservice/SSL_certificate/10.172.137.214.cert' #for testing
+
+MODULE_DIR = os.path.dirname(__file__)
+CONFIG_FILE_NAME = 'vrops_config.xml'
+CONFIG_FILE_PATH = os.path.join(MODULE_DIR, CONFIG_FILE_NAME)
+SSL_CERTIFICATE_FILE_PATH = os.path.join(MODULE_DIR, SSL_CERTIFICATE_FILE_NAME)
+
+class MonPlugin():
+ """MON Plugin class for vROPs telemetry plugin
+ """
+ def __init__(self):
+ """Constructor of MON plugin
+ Params:
+ 'access_config': dictionary with VIM access information based on VIM type.
+ This contains a consolidate version of VIM & monitoring tool config at creation and
+ particular VIM config at their attachment.
+ For VIM type: 'vmware',
+ access_config - {'vrops_site':<>, 'vrops_user':<>, 'vrops_password':<>,
+ 'vcloud-site':<>,'admin_username':<>,'admin_password':<>,
+ 'nsx_manager':<>,'nsx_user':<>,'nsx_password':<>,
+ 'vcenter_ip':<>,'vcenter_port':<>,'vcenter_user':<>,'vcenter_password':<>,
+ 'vim_tenant_name':<>,'orgname':<>}
+
+ #To Do
+ Returns: Raise an exception if some needed parameter is missing, but it must not do any connectivity
+ check against the VIM
+ """
+ self.logger = logging.getLogger('PluginReceiver.MonPlugin')
+ self.logger.setLevel(logging.DEBUG)
+
+ access_config = self.get_default_Params('Access_Config')
+ self.access_config = access_config
+ if not bool(access_config):
+ self.logger.error("Access configuration not provided in vROPs Config file")
+ raise KeyError("Access configuration not provided in vROPs Config file")
+
+ try:
+ self.vrops_site = access_config['vrops_site']
+ self.vrops_user = access_config['vrops_user']
+ self.vrops_password = access_config['vrops_password']
+ self.vcloud_site = access_config['vcloud-site']
+ self.admin_username = access_config['admin_username']
+ self.admin_password = access_config['admin_password']
+ self.tenant_id = access_config['tenant_id']
+ except KeyError as exp:
+ self.logger.error("Check Access configuration in vROPs Config file: {}".format(exp))
+ raise KeyError("Check Access configuration in vROPs Config file: {}".format(exp))
+
+
+ def configure_alarm(self, config_dict = {}):
+ """Configures or creates a new alarm using the input parameters in config_dict
+ Params:
+ "alarm_name": Alarm name in string format
+ "description": Description of alarm in string format
+ "resource_uuid": Resource UUID for which alarm needs to be configured. in string format
+ "Resource type": String resource type: 'VDU' or 'host'
+ "Severity": 'WARNING', 'MINOR', 'MAJOR', 'CRITICAL'
+ "metric_name": Metric key in string format
+ "operation": One of ('GE', 'LE', 'GT', 'LT', 'EQ')
+ "threshold_value": Defines the threshold (up to 2 fraction digits) that,
+ if crossed, will trigger the alarm.
+ "unit": Unit of measurement in string format
+ "statistic": AVERAGE, MINIMUM, MAXIMUM, COUNT, SUM
+
+ Default parameters for each alarm are read from the plugin specific config file.
+ Dict of default parameters is as follows:
+ default_params keys = {'cancel_cycles','wait_cycles','resource_kind','adapter_kind',
+ 'alarm_type','alarm_subType',impact}
+
+ Returns the UUID of created alarm or None
+ """
+ alarm_def = None
+ #1) get alarm & metrics parameters from plugin specific file
+ def_a_params = self.get_default_Params(config_dict['alarm_name'])
+ if not def_a_params:
+ self.logger.warn("Alarm not supported: {}".format(config_dict['alarm_name']))
+ return None
+ metric_key_params = self.get_default_Params(config_dict['metric_name'])
+ if not metric_key_params:
+ self.logger.warn("Metric not supported: {}".format(config_dict['metric_name']))
+ return None
+ #2) create symptom definition
+ vrops_alarm_name = def_a_params['vrops_alarm']+ '-' + config_dict['resource_uuid']
+ symptom_params ={'cancel_cycles': (def_a_params['cancel_period']/300)*def_a_params['cancel_cycles'],
+ 'wait_cycles': (def_a_params['period']/300)*def_a_params['evaluation'],
+ 'resource_kind_key': def_a_params['resource_kind'],
+ 'adapter_kind_key': def_a_params['adapter_kind'],
+ 'symptom_name':vrops_alarm_name,
+ 'severity': severity_mano2vrops[config_dict['severity']],
+ 'metric_key':metric_key_params['metric_key'],
+ 'operation':OPERATION_MAPPING[config_dict['operation']],
+ 'threshold_value':config_dict['threshold_value']}
+ symptom_uuid = self.create_symptom(symptom_params)
+ if symptom_uuid is not None:
+ self.logger.info("Symptom defined: {} with ID: {}".format(symptom_params['symptom_name'],symptom_uuid))
+ else:
+ self.logger.warn("Failed to create Symptom: {}".format(symptom_params['symptom_name']))
+ return None
+ #3) create alert definition
+ #To Do - Get type & subtypes for all 5 alarms
+ alarm_params = {'name':vrops_alarm_name,
+ 'description':config_dict['description']\
+ if config_dict['description'] is not None else config_dict['alarm_name'],
+ 'adapterKindKey':def_a_params['adapter_kind'],
+ 'resourceKindKey':def_a_params['resource_kind'],
+ 'waitCycles':1, 'cancelCycles':1,
+ 'type':def_a_params['alarm_type'], 'subType':def_a_params['alarm_subType'],
+ 'severity':severity_mano2vrops[config_dict['severity']],
+ 'symptomDefinitionId':symptom_uuid,
+ 'impact':def_a_params['impact']}
+
+ alarm_def = self.create_alarm_definition(alarm_params)
+ if alarm_def is None:
+ self.logger.warn("Failed to create Alert: {}".format(alarm_params['name']))
+ return None
+
+ self.logger.info("Alarm defined: {} with ID: {}".format(alarm_params['name'],alarm_def))
+
+ #4) Find vm_moref_id from vApp uuid in vCD
+ vm_moref_id = self.get_vm_moref_id(config_dict['resource_uuid'])
+ if vm_moref_id is None:
+ self.logger.warn("Failed to find vm morefid for vApp in vCD: {}".format(config_dict['resource_uuid']))
+ return None
+
+ #5) Based on vm_moref_id, find VM's corresponding resource_id in vROPs to set notification
+ resource_id = self.get_vm_resource_id(vm_moref_id)
+ if resource_id is None:
+ self.logger.warn("Failed to find resource in vROPs: {}".format(config_dict['resource_uuid']))
+ return None
+
+ #6) Configure alarm notification for a particular VM using it's resource_id
+ notification_id = self.create_alarm_notification_rule(vrops_alarm_name, alarm_def, resource_id)
+ if notification_id is None:
+ return None
+ else:
+ alarm_def_uuid = alarm_def.split('-', 1)[1]
+ self.logger.info("Alarm defination created with notification: {} with ID: {}"\
+ .format(alarm_params['name'],alarm_def_uuid))
+ #Return alarm defination UUID by removing 'AlertDefinition' from UUID
+ return (alarm_def_uuid)
+
+ def get_default_Params(self, metric_alarm_name):
+ """
+ Read the default config parameters from plugin specific file stored with plugin file.
+ Params:
+ metric_alarm_name: Name of the alarm, whose congif params to be read from the config file.
+ """
+ a_params = {}
+ try:
+ source = open(CONFIG_FILE_PATH, 'r')
+ except IOError as exp:
+ msg = ("Could not read Config file: {}, \nException: {}"\
+ .format(CONFIG_FILE_PATH, exp))
+ self.logger.error(msg)
+ raise IOError(msg)
+
+ tree = XmlElementTree.parse(source)
+ alarms = tree.getroot()
+ for alarm in alarms:
+ if alarm.tag == metric_alarm_name:
+ for param in alarm:
+ if param.tag in ("period", "evaluation", "cancel_period", "alarm_type",\
+ "cancel_cycles", "alarm_subType"):
+ a_params[param.tag] = int(param.text)
+ elif param.tag in ("enabled", "repeat"):
+ if(param.text.lower() == "true"):
+ a_params[param.tag] = True
+ else:
+ a_params[param.tag] = False
+ else:
+ a_params[param.tag] = param.text
+ source.close()
+ return a_params
+
+
+ def create_symptom(self, symptom_params):
+ """Create Symptom definition for an alarm
+ Params:
+ symptom_params: Dict of parameters required for defining a symptom as follows
+ cancel_cycles
+ wait_cycles
+ resource_kind_key = "VirtualMachine"
+ adapter_kind_key = "VMWARE"
+ symptom_name = Test_Memory_Usage_TooHigh
+ severity
+ metric_key
+ operation = GT_EQ
+ threshold_value = 85
+ Returns the uuid of Symptom definition
+ """
+ symptom_id = None
+
+ try:
+ api_url = '/suite-api/api/symptomdefinitions'
+ headers = {'Content-Type': 'application/xml'}
+ data = """<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
+ <ops:symptom-definition cancelCycles="{0:s}" waitCycles="{1:s}"
+ resourceKindKey="{2:s}" adapterKindKey="{3:s}"
+ xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xmlns:ops="http://webservice.vmware.com/vRealizeOpsMgr/1.0/">
+ <ops:name>{4:s}</ops:name>
+ <ops:state severity="{5:s}">
+ <ops:condition xsi:type="ops:htCondition">
+ <ops:key>{6:s}</ops:key>
+ <ops:operator>{7:s}</ops:operator>
+ <ops:value>{8:s}</ops:value>
+ <ops:valueType>NUMERIC</ops:valueType>
+ <ops:instanced>false</ops:instanced>
+ <ops:thresholdType>STATIC</ops:thresholdType>
+ </ops:condition>
+ </ops:state>
+ </ops:symptom-definition>"""\
+ .format(str(symptom_params['cancel_cycles']),str(symptom_params['wait_cycles']),
+ symptom_params['resource_kind_key'], symptom_params['adapter_kind_key'],
+ symptom_params['symptom_name'],symptom_params['severity'],
+ symptom_params['metric_key'],symptom_params['operation'],
+ str(symptom_params['threshold_value']))
+
+ resp = requests.post(self.vrops_site + api_url,
+ auth=(self.vrops_user, self.vrops_password),
+ headers=headers,
+ verify = False,
+ data=data)
+
+ if resp.status_code != 201:
+ self.logger.warn("Failed to create Symptom definition: {}, response {}"\
+ .format(symptom_params['symptom_name'], resp.content))
+ return None
+
+ symptom_xmlroot = XmlElementTree.fromstring(resp.content)
+ if symptom_xmlroot is not None and 'id' in symptom_xmlroot.attrib:
+ symptom_id = symptom_xmlroot.attrib['id']
+
+ return symptom_id
+
+ except Exception as exp:
+ self.logger.warn("Error creating symptom definition : {}\n{}"\
+ .format(exp, traceback.format_exc()))
+
+
+ def create_alarm_definition(self, alarm_params):
+ """
+ Create an alarm definition in vROPs
+ Params:
+ 'name': Alarm Name,
+ 'description':Alarm description,
+ 'adapterKindKey': Adapter type in vROPs "VMWARE",
+ 'resourceKindKey':Resource type in vROPs "VirtualMachine",
+ 'waitCycles': No of wait cycles,
+ 'cancelCycles': No of cancel cycles,
+ 'type': Alarm type,
+ 'subType': Alarm subtype,
+ 'severity': Severity in vROPs "CRITICAL",
+ 'symptomDefinitionId':symptom Definition uuid,
+ 'impact': impact 'risk'
+ Returns:
+ 'alarm_uuid': returns alarm uuid
+ """
+
+ alarm_uuid = None
+
+ try:
+ api_url = '/suite-api/api/alertdefinitions'
+ headers = {'Content-Type': 'application/xml'}
+ data = """<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
+ <ops:alert-definition xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xmlns:ops="http://webservice.vmware.com/vRealizeOpsMgr/1.0/">
+ <ops:name>{0:s}</ops:name>
+ <ops:description>{1:s}</ops:description>
+ <ops:adapterKindKey>{2:s}</ops:adapterKindKey>
+ <ops:resourceKindKey>{3:s}</ops:resourceKindKey>
+ <ops:waitCycles>1</ops:waitCycles>
+ <ops:cancelCycles>1</ops:cancelCycles>
+ <ops:type>{4:s}</ops:type>
+ <ops:subType>{5:s}</ops:subType>
+ <ops:states>
+ <ops:state severity="{6:s}">
+ <ops:symptom-set>
+ <ops:symptomDefinitionIds>
+ <ops:symptomDefinitionId>{7:s}</ops:symptomDefinitionId>
+ </ops:symptomDefinitionIds>
+ <ops:relation>SELF</ops:relation>
+ <ops:aggregation>ALL</ops:aggregation>
+ <ops:symptomSetOperator>AND</ops:symptomSetOperator>
+ </ops:symptom-set>
+ <ops:impact>
+ <ops:impactType>BADGE</ops:impactType>
+ <ops:detail>{8:s}</ops:detail>
+ </ops:impact>
+ </ops:state>
+ </ops:states>
+ </ops:alert-definition>"""\
+ .format(alarm_params['name'],alarm_params['description'],
+ alarm_params['adapterKindKey'],alarm_params['resourceKindKey'],
+ str(alarm_params['type']),str(alarm_params['subType']),
+ alarm_params['severity'],alarm_params['symptomDefinitionId'],
+ alarm_params['impact'])
+
+ resp = requests.post(self.vrops_site + api_url,
+ auth=(self.vrops_user, self.vrops_password),
+ headers=headers,
+ verify = False,
+ data=data)
+
+ if resp.status_code != 201:
+ self.logger.warn("Failed to create Alarm definition: {}, response {}"\
+ .format(alarm_params['name'], resp.content))
+ return None
+
+ alarm_xmlroot = XmlElementTree.fromstring(resp.content)
+ for child in alarm_xmlroot:
+ if child.tag.split("}")[1] == 'id':
+ alarm_uuid = child.text
+
+ return alarm_uuid
+
+ except Exception as exp:
+ self.logger.warn("Error creating alarm definition : {}\n{}".format(exp, traceback.format_exc()))
+
+
+ def configure_rest_plugin(self):
+ """
+ Creates REST Plug-in for vROPs outbound alerts
+
+ Returns Plugin ID
+ """
+ plugin_id = None
+ plugin_name = 'MON_module_REST_Plugin'
+ plugin_id = self.check_if_plugin_configured(plugin_name)
+
+ #If REST plugin not configured, configure it
+ if plugin_id is not None:
+ return plugin_id
+ else:
+ try:
+ cert_file_string = open(SSL_CERTIFICATE_FILE_PATH, "rb").read()
+ except IOError as exp:
+ msg = ("Could not read SSL certificate file: {}".format(SSL_CERTIFICATE_FILE_PATH))
+ self.logger.error(msg)
+ raise IOError(msg)
+ cert = load_certificate(FILETYPE_PEM, cert_file_string)
+ certificate = cert.digest("sha1")
+ api_url = '/suite-api/api/alertplugins'
+ headers = {'Content-Type': 'application/xml'}
+ data = """<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
+ <ops:notification-plugin version="0" xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xmlns:ops="http://webservice.vmware.com/vRealizeOpsMgr/1.0/">
+ <ops:pluginTypeId>RestPlugin</ops:pluginTypeId>
+ <ops:name>{0:s}</ops:name>
+ <ops:configValues>
+ <ops:configValue name="Url">{1:s}</ops:configValue>
+ <ops:configValue name="Content-type">application/json</ops:configValue>
+ <ops:configValue name="Certificate">{2:s}</ops:configValue>
+ <ops:configValue name="ConnectionCount">20</ops:configValue>
+ </ops:configValues>
+ </ops:notification-plugin>""".format(plugin_name, webhook_url, certificate)
+
+ resp = requests.post(self.vrops_site + api_url,
+ auth=(self.vrops_user, self.vrops_password),
+ headers=headers,
+ verify = False,
+ data=data)
+
+ if resp.status_code is not 201:
+ self.logger.warn("Failed to create REST Plugin: {} for url: {}, \nresponse code: {},"\
+ "\nresponse content: {}".format(plugin_name, webhook_url,\
+ resp.status_code, resp.content))
+ return None
+
+ plugin_xmlroot = XmlElementTree.fromstring(resp.content)
+ if plugin_xmlroot is not None:
+ for child in plugin_xmlroot:
+ if child.tag.split("}")[1] == 'pluginId':
+ plugin_id = plugin_xmlroot.find('{http://webservice.vmware.com/vRealizeOpsMgr/1.0/}pluginId').text
+
+ if plugin_id is None:
+ self.logger.warn("Failed to get REST Plugin ID for {}, url: {}".format(plugin_name, webhook_url))
+ return None
+ else:
+ self.logger.info("Created REST Plugin: {} with ID : {} for url: {}".format(plugin_name, plugin_id, webhook_url))
+ status = self.enable_rest_plugin(plugin_id, plugin_name)
+ if status is False:
+ self.logger.warn("Failed to enable created REST Plugin: {} for url: {}".format(plugin_name, webhook_url))
+ return None
+ else:
+ self.logger.info("Enabled REST Plugin: {} for url: {}".format(plugin_name, webhook_url))
+ return plugin_id
+
+ def check_if_plugin_configured(self, plugin_name):
+ """Check if the REST plugin is already created
+ Returns: plugin_id: if already created, None: if needs to be created
+ """
+ plugin_id = None
+ #Find the REST Plugin id details for - MON_module_REST_Plugin
+ api_url = '/suite-api/api/alertplugins'
+ headers = {'Accept': 'application/xml'}
+ namespace = {'params':"http://webservice.vmware.com/vRealizeOpsMgr/1.0/"}
+
+ resp = requests.get(self.vrops_site + api_url,
+ auth=(self.vrops_user, self.vrops_password),
+ verify = False, headers = headers)
+
+ if resp.status_code is not 200:
+ self.logger.warn("Failed to REST GET Alarm plugin details \nResponse code: {}\nResponse content: {}"\
+ .format(resp.status_code, resp.content))
+ return None
+
+ # Look for specific plugin & parse pluginId for 'MON_module_REST_Plugin'
+ xmlroot_resp = XmlElementTree.fromstring(resp.content)
+ for notify_plugin in xmlroot_resp.findall('params:notification-plugin',namespace):
+ if notify_plugin.find('params:name',namespace) is not None and\
+ notify_plugin.find('params:pluginId',namespace) is not None:
+ if notify_plugin.find('params:name',namespace).text == plugin_name:
+ plugin_id = notify_plugin.find('params:pluginId',namespace).text
+
+ if plugin_id is None:
+ self.logger.warn("REST plugin {} not found".format('MON_module_REST_Plugin'))
+ return None
+ else:
+ self.logger.info("Found REST Plugin: {}".format(plugin_name))
+ return plugin_id
+
+
+ def enable_rest_plugin(self, plugin_id, plugin_name):
+ """
+ Enable the REST plugin using plugin_id
+ Params: plugin_id: plugin ID string that is to be enabled
+ Returns: status (Boolean) - True for success, False for failure
+ """
+
+ if plugin_id is None or plugin_name is None:
+ self.logger.debug("enable_rest_plugin() : Plugin ID or plugin_name not provided for {} plugin"\
+ .format(plugin_name))
+ return False
+
+ try:
+ api_url = "/suite-api/api/alertplugins/{}/enable/True".format(plugin_id)
+
+ resp = requests.put(self.vrops_site + api_url,
+ auth=(self.vrops_user, self.vrops_password),
+ verify = False)
+
+ if resp.status_code is not 204:
+ self.logger.warn("Failed to enable REST plugin {}. \nResponse code {}\nResponse Content: {}"\
+ .format(plugin_name, resp.status_code, resp.content))
+ return False
+
+ self.logger.info("Enabled REST plugin {}.".format(plugin_name))
+ return True
+
+ except Exception as exp:
+ self.logger.warn("Error enabling REST plugin for {} plugin: Exception: {}\n{}"\
+ .format(plugin_name, exp, traceback.format_exc()))
+
+ def create_alarm_notification_rule(self, alarm_name, alarm_id, resource_id):
+ """
+ Create notification rule for each alarm
+ Params:
+ alarm_name
+ alarm_id
+ resource_id
+
+ Returns:
+ notification_id: notification_id or None
+ """
+ notification_name = 'notify_' + alarm_name
+ notification_id = None
+ plugin_name = 'MON_module_REST_Plugin'
+
+ #1) Find the REST Plugin id details for - MON_module_REST_Plugin
+ plugin_id = self.check_if_plugin_configured(plugin_name)
+ if plugin_id is None:
+ self.logger.warn("Failed to get REST plugin_id for : {}".format('MON_module_REST_Plugin'))
+ return None
+
+ #2) Create Alarm notification rule
+ api_url = '/suite-api/api/notifications/rules'
+ headers = {'Content-Type': 'application/xml'}
+ data = """<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
+ <ops:notification-rule xmlns:xs="http://www.w3.org/2001/XMLSchema"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xmlns:ops="http://webservice.vmware.com/vRealizeOpsMgr/1.0/">
+ <ops:name>{0:s}</ops:name>
+ <ops:pluginId>{1:s}</ops:pluginId>
+ <ops:resourceFilter resourceId="{2:s}">
+ <ops:matchResourceIdOnly>true</ops:matchResourceIdOnly>
+ </ops:resourceFilter>
+ <ops:alertDefinitionIdFilters>
+ <ops:values>{3:s}</ops:values>
+ </ops:alertDefinitionIdFilters>
+ </ops:notification-rule>"""\
+ .format(notification_name, plugin_id, resource_id, alarm_id)
+
+ resp = requests.post(self.vrops_site + api_url,
+ auth=(self.vrops_user, self.vrops_password),
+ headers=headers,
+ verify = False,
+ data=data)
+
+ if resp.status_code is not 201:
+ self.logger.warn("Failed to create Alarm notification rule {} for {} alarm."\
+ "\nResponse code: {}\nResponse content: {}"\
+ .format(notification_name, alarm_name, resp.status_code, resp.content))
+ return None
+
+ #parse notification id from response
+ xmlroot_resp = XmlElementTree.fromstring(resp.content)
+ if xmlroot_resp is not None and 'id' in xmlroot_resp.attrib:
+ notification_id = xmlroot_resp.attrib.get('id')
+
+ self.logger.info("Created Alarm notification rule {} for {} alarm.".format(notification_name, alarm_name))
+ return notification_id
+
+ def get_vm_moref_id(self, vapp_uuid):
+ """
+ Get the moref_id of given VM
+ """
+ try:
+ if vapp_uuid:
+ vm_details = self.get_vapp_details_rest(vapp_uuid)
+ if vm_details and "vm_vcenter_info" in vm_details:
+ vm_moref_id = vm_details["vm_vcenter_info"].get("vm_moref_id", None)
+
+ self.logger.info("Found vm_moref_id: {} for vApp UUID: {}".format(vm_moref_id, vapp_uuid))
+ return vm_moref_id
+
+ except Exception as exp:
+ self.logger.warn("Error occurred while getting VM moref ID for VM : {}\n{}"\
+ .format(exp, traceback.format_exc()))
+
+
+ def get_vapp_details_rest(self, vapp_uuid=None):
+ """
+ Method retrieve vapp detail from vCloud director
+
+ Args:
+ vapp_uuid - is vapp identifier.
+
+ Returns:
+ Returns VM MOref ID or return None
+ """
+
+ parsed_respond = {}
+ vca = None
+
+ vca = self.connect_as_admin()
+
+ if not vca:
+ self.logger.warn("connect() to vCD is failed")
+ if vapp_uuid is None:
+ return None
+
+ url_list = [vca.host, '/api/vApp/vapp-', vapp_uuid]
+ get_vapp_restcall = ''.join(url_list)
+
+ if vca.vcloud_session and vca.vcloud_session.organization:
+ response = requests.get(get_vapp_restcall,
+ headers=vca.vcloud_session.get_vcloud_headers(),
+ verify=vca.verify)
+
+ if response.status_code != 200:
+ self.logger.warn("REST API call {} failed. Return status code {}"\
+ .format(get_vapp_restcall, response.content))
+ return parsed_respond
+
+ try:
+ xmlroot_respond = XmlElementTree.fromstring(response.content)
+
+ namespaces = {'vm': 'http://www.vmware.com/vcloud/v1.5',
+ "vmext":"http://www.vmware.com/vcloud/extension/v1.5",
+ "xmlns":"http://www.vmware.com/vcloud/v1.5"
+ }
+
+ # parse children section for other attrib
+ children_section = xmlroot_respond.find('vm:Children/', namespaces)
+ if children_section is not None:
+ vCloud_extension_section = children_section.find('xmlns:VCloudExtension', namespaces)
+ if vCloud_extension_section is not None:
+ vm_vcenter_info = {}
+ vim_info = vCloud_extension_section.find('vmext:VmVimInfo', namespaces)
+ vmext = vim_info.find('vmext:VmVimObjectRef', namespaces)
+ if vmext is not None:
+ vm_vcenter_info["vm_moref_id"] = vmext.find('vmext:MoRef', namespaces).text
+ parsed_respond["vm_vcenter_info"]= vm_vcenter_info
+
+ except Exception as exp :
+ self.logger.warn("Error occurred calling rest api for getting vApp details: {}\n{}"\
+ .format(exp, traceback.format_exc()))
+
+ return parsed_respond
+
+
+ def connect_as_admin(self):
+ """ Method connect as pvdc admin user to vCloud director.
+ There are certain action that can be done only by provider vdc admin user.
+ Organization creation / provider network creation etc.
+
+ Returns:
+ The return vca object that letter can be used to connect to vcloud direct as admin for provider vdc
+ """
+
+ self.logger.info("Logging in to a VCD org as admin.")
+
+ vca_admin = VCA(host=self.vcloud_site,
+ username=self.admin_username,
+ service_type='standalone',
+ version='5.9',
+ verify=False,
+ log=False)
+ result = vca_admin.login(password=self.admin_password, org='System')
+ if not result:
+ self.logger.warn("Can't connect to a vCloud director as: {}".format(self.admin_username))
+ result = vca_admin.login(token=vca_admin.token, org='System', org_url=vca_admin.vcloud_session.org_url)
+ if result is True:
+ self.logger.info("Successfully logged to a vcloud direct org: {} as user: {}"\
+ .format('System', self.admin_username))
+
+ return vca_admin
+
+
+ def get_vm_resource_id(self, vm_moref_id):
+ """ Find resource ID in vROPs using vm_moref_id
+ """
+ if vm_moref_id is None:
+ return None
+
+ api_url = '/suite-api/api/resources'
+ headers = {'Accept': 'application/xml'}
+ namespace = {'params':"http://webservice.vmware.com/vRealizeOpsMgr/1.0/"}
+
+ resp = requests.get(self.vrops_site + api_url,
+ auth=(self.vrops_user, self.vrops_password),
+ verify = False, headers = headers)
+
+ if resp.status_code is not 200:
+ self.logger.warn("Failed to get resource details from vROPs for {}\nResponse code:{}\nResponse Content: {}"\
+ .format(vm_moref_id, resp.status_code, resp.content))
+ return None
+
+ try:
+ xmlroot_respond = XmlElementTree.fromstring(resp.content)
+ for resource in xmlroot_respond.findall('params:resource',namespace):
+ if resource is not None:
+ resource_key = resource.find('params:resourceKey',namespace)
+ if resource_key is not None:
+ if resource_key.find('params:adapterKindKey',namespace).text == 'VMWARE' and \
+ resource_key.find('params:resourceKindKey',namespace).text == 'VirtualMachine':
+ for child in resource_key:
+ if child.tag.split('}')[1]=='resourceIdentifiers':
+ resourceIdentifiers = child
+ for r_id in resourceIdentifiers:
+ if r_id.find('params:value',namespace).text == vm_moref_id:
+ self.logger.info("Found Resource ID : {} in vROPs for {}"\
+ .format(resource.attrib['identifier'], vm_moref_id))
+ return resource.attrib['identifier']
+ except Exception as exp:
+ self.logger.warn("Error in parsing {}\n{}".format(exp, traceback.format_exc()))
+
+
+ def get_metrics_data(self, metric={}):
+ """Get an individual metric's data of a resource.
+ Params:
+ 'metric_name': Normalized name of metric (string)
+ 'resource_uuid': Resource UUID (string)
+ 'period': Time period in Period Unit for which metrics data to be collected from
+ Monitoring tool from now.
+ 'period_unit': Period measurement unit can be one of 'HR', 'DAY', 'MONTH', 'YEAR'
+
+ Return a dict that contains:
+ 'metric_name': Normalized name of metric (string)
+ 'resource_uuid': Resource UUID (string)
+ 'tenant_id': tenent id name in which the resource is present in string format
+ 'metrics_data': Dictionary containing time_series & metric_series data.
+ 'time_series': List of individual time stamp values in msec
+ 'metric_series': List of individual metrics data values
+ Raises an exception upon error or when network is not found
+ """
+ return_data = {}
+ return_data['schema_version'] = 1.0
+ return_data['schema_type'] = 'read_metric_data_response'
+ return_data['metric_name'] = metric['metric_name']
+ #To do - No metric_uuid in vROPs, thus returning '0'
+ return_data['metric_uuid'] = '0'
+ return_data['correlation_id'] = metric['correlation_id']
+ return_data['resource_uuid'] = metric['resource_uuid']
+ return_data['metrics_data'] = {'time_series':[], 'metric_series':[]}
+ #To do - Need confirmation about uuid & id
+ if 'tenant_uuid' in metric and metric['tenant_uuid'] is not None:
+ return_data['tenant_uuid'] = metric['tenant_uuid']
+ else:
+ return_data['tenant_uuid'] = None
+ return_data['unit'] = None
+ #return_data['tenant_id'] = self.tenant_id
+ #self.logger.warn("return_data: {}".format(return_data))
+
+ #1) Get metric details from plugin specific file & format it into vROPs metrics
+ metric_key_params = self.get_default_Params(metric['metric_name'])
+
+ if not metric_key_params:
+ self.logger.warn("Metric not supported: {}".format(metric['metric_name']))
+ #To Do: Return message
+ return return_data
+
+ return_data['unit'] = metric_key_params['unit']
+
+ #2) Find the resource id in vROPs based on OSM resource_uuid
+ #2.a) Find vm_moref_id from vApp uuid in vCD
+ vm_moref_id = self.get_vm_moref_id(metric['resource_uuid'])
+ if vm_moref_id is None:
+ self.logger.warn("Failed to find vm morefid for vApp in vCD: {}".format(config_dict['resource_uuid']))
+ return return_data
+ #2.b) Based on vm_moref_id, find VM's corresponding resource_id in vROPs to set notification
+ resource_id = self.get_vm_resource_id(vm_moref_id)
+ if resource_id is None:
+ self.logger.warn("Failed to find resource in vROPs: {}".format(config_dict['resource_uuid']))
+ return return_data
+
+ #3) Calculate begin & end time for period & period unit
+ end_time = int(round(time.time() * 1000))
+ if metric['collection_unit'] == 'YR':
+ time_diff = PERIOD_MSEC[metric['collection_unit']]
+ else:
+ time_diff = metric['collection_period']* PERIOD_MSEC[metric['collection_unit']]
+ begin_time = end_time - time_diff
+
+ #4) Get the metrics data
+ self.logger.info("metric_key_params['metric_key'] = {}".format(metric_key_params['metric_key']))
+ self.logger.info("end_time: {}, begin_time: {}".format(end_time, begin_time))
+
+ url_list = ['/suite-api/api/resources/', resource_id, '/stats?statKey=',\
+ metric_key_params['metric_key'], '&begin=', str(begin_time),'&end=',str(end_time)]
+ api_url = ''.join(url_list)
+ headers = {'Accept': 'application/json'}
+
+ resp = requests.get(self.vrops_site + api_url,
+ auth=(self.vrops_user, self.vrops_password),
+ verify = False, headers = headers)
+
+ if resp.status_code is not 200:
+ self.logger.warn("Failed to retrive Metric data from vROPs for {}\nResponse code:{}\nResponse Content: {}"\
+ .format(metric['metric_name'], resp.status_code, resp.content))
+ return return_data
+
+ #5) Convert to required format
+ metrics_data = {}
+ json_data = json.loads(resp.content)
+ for resp_key,resp_val in json_data.iteritems():
+ if resp_key == 'values':
+ data = json_data['values'][0]
+ for data_k,data_v in data.iteritems():
+ if data_k == 'stat-list':
+ stat_list = data_v
+ for stat_list_k,stat_list_v in stat_list.iteritems():
+ for stat_keys,stat_vals in stat_list_v[0].iteritems():
+ if stat_keys == 'timestamps':
+ metrics_data['time_series'] = stat_list_v[0]['timestamps']
+ if stat_keys == 'data':
+ metrics_data['metric_series'] = stat_list_v[0]['data']
+
+ return_data['metrics_data'] = metrics_data
+
+ return return_data
+
+ def update_alarm_configuration(self, new_alarm_config):
+ """Update alarm configuration (i.e. Symptom & alarm) as per request
+ """
+ #1) Get Alarm details from it's uuid & find the symptom defination
+ alarm_details_json, alarm_details = self.get_alarm_defination_details(new_alarm_config['alarm_uuid'])
+ if alarm_details_json is None:
+ return None
+
+ try:
+ #2) Update the symptom defination
+ if alarm_details['alarm_id'] is not None and alarm_details['symptom_definition_id'] is not None:
+ symptom_defination_id = alarm_details['symptom_definition_id']
+ else:
+ self.logger.info("Symptom Defination ID not found for {}".format(new_alarm_config['alarm_uuid']))
+ return None
+
+ symptom_uuid = self.update_symptom_defination(symptom_defination_id, new_alarm_config)
+
+ #3) Update the alarm defination & Return UUID if successful update
+ if symptom_uuid is None:
+ self.logger.info("Symptom Defination details not found for {}"\
+ .format(new_alarm_config['alarm_uuid']))
+ return None
+ else:
+ alarm_uuid = self.reconfigure_alarm(alarm_details_json, new_alarm_config)
+ if alarm_uuid is None:
+ return None
+ else:
+ return alarm_uuid
+ except:
+ self.logger.error("Exception while updating alarm: {}".format(traceback.format_exc()))
+
+ def get_alarm_defination_details(self, alarm_uuid):
+ """Get alarm details based on alarm UUID
+ """
+ if alarm_uuid is None:
+ self.logger.warn("get_alarm_defination_details: Alarm UUID not provided")
+ return None, None
+
+ alarm_details = {}
+ json_data = {}
+ api_url = '/suite-api/api/alertdefinitions/AlertDefinition-'
+ headers = {'Accept': 'application/json'}
+
+ resp = requests.get(self.vrops_site + api_url + alarm_uuid,
+ auth=(self.vrops_user, self.vrops_password),
+ verify = False, headers = headers)
+
+ if resp.status_code is not 200:
+ self.logger.warn("Alarm to be updated not found: {}\nResponse code:{}\nResponse Content: {}"\
+ .format(alarm_uuid, resp.status_code, resp.content))
+ return None, None
+
+ try:
+ json_data = json.loads(resp.content)
+ if json_data['id'] is not None:
+ alarm_details['alarm_id'] = json_data['id']
+ alarm_details['alarm_name'] = json_data['name']
+ alarm_details['adapter_kind'] = json_data['adapterKindKey']
+ alarm_details['resource_kind'] = json_data['resourceKindKey']
+ alarm_details['type'] = json_data['type']
+ alarm_details['sub_type'] = json_data['subType']
+ alarm_details['symptom_definition_id'] = json_data['states'][0]['base-symptom-set']['symptomDefinitionIds'][0]
+ except exception as exp:
+ self.logger.warn("Exception while retriving alarm defination details: {}".format(exp))
+ return None, None
+
+ return json_data, alarm_details
+
+
+ def update_symptom_defination(self, symptom_uuid, new_alarm_config):
+ """Update symptom defination based on new alarm input configuration
+ """
+ #1) Get symptom defination details
+ symptom_details = self.get_symptom_defination_details(symptom_uuid)
+ #print "\n\nsymptom_details: {}".format(symptom_details)
+ if symptom_details is None:
+ return None
+
+ if new_alarm_config.has_key('severity') and new_alarm_config['severity'] is not None:
+ symptom_details['state']['severity'] = severity_mano2vrops[new_alarm_config['severity']]
+ if new_alarm_config.has_key('operation') and new_alarm_config['operation'] is not None:
+ symptom_details['state']['condition']['operator'] = OPERATION_MAPPING[new_alarm_config['operation']]
+ if new_alarm_config.has_key('threshold_value') and new_alarm_config['threshold_value'] is not None:
+ symptom_details['state']['condition']['value'] = new_alarm_config['threshold_value']
+ #Find vrops metric key from metric_name, if required
+ """
+ if new_alarm_config.has_key('metric_name') and new_alarm_config['metric_name'] is not None:
+ metric_key_params = self.get_default_Params(new_alarm_config['metric_name'])
+ if not metric_key_params:
+ self.logger.warn("Metric not supported: {}".format(config_dict['metric_name']))
+ return None
+ symptom_details['state']['condition']['key'] = metric_key_params['metric_key']
+ """
+ self.logger.info("Fetched Symptom details : {}".format(symptom_details))
+
+ api_url = '/suite-api/api/symptomdefinitions'
+ headers = {'Content-Type': 'application/json', 'Accept':'application/json'}
+ data = json.dumps(symptom_details)
+ resp = requests.put(self.vrops_site + api_url,
+ auth=(self.vrops_user, self.vrops_password),
+ headers=headers,
+ verify = False,
+ data=data)
+
+ if resp.status_code != 200:
+ self.logger.warn("Failed to update Symptom definition: {}, response {}"\
+ .format(symptom_uuid, resp.content))
+ return None
+
+
+ if symptom_uuid is not None:
+ self.logger.info("Symptom defination updated {} for alarm: {}"\
+ .format(symptom_uuid, new_alarm_config['alarm_uuid']))
+ return symptom_uuid
+ else:
+ self.logger.warn("Failed to update Symptom Defination {} for : {}"\
+ .format(symptom_uuid, new_alarm_config['alarm_uuid']))
+ return None
+
+
+ def get_symptom_defination_details(self, symptom_uuid):
+ """Get symptom defination details
+ """
+ symptom_details = {}
+ if symptom_uuid is None:
+ self.logger.warn("get_symptom_defination_details: Symptom UUID not provided")
+ return None
+
+ api_url = '/suite-api/api/symptomdefinitions/'
+ headers = {'Accept': 'application/json'}
+
+ resp = requests.get(self.vrops_site + api_url + symptom_uuid,
+ auth=(self.vrops_user, self.vrops_password),
+ verify = False, headers = headers)
+
+ if resp.status_code is not 200:
+ self.logger.warn("Symptom defination not found {} \nResponse code:{}\nResponse Content: {}"\
+ .format(symptom_uuid, resp.status_code, resp.content))
+ return None
+
+ symptom_details = json.loads(resp.content)
+ #print "New symptom Details: {}".format(symptom_details)
+ return symptom_details
+
+
+ def reconfigure_alarm(self, alarm_details_json, new_alarm_config):
+ """Reconfigure alarm defination as per input
+ """
+ if new_alarm_config.has_key('severity') and new_alarm_config['severity'] is not None:
+ alarm_details_json['states'][0]['severity'] = new_alarm_config['severity']
+ if new_alarm_config.has_key('description') and new_alarm_config['description'] is not None:
+ alarm_details_json['description'] = new_alarm_config['description']
+
+ api_url = '/suite-api/api/alertdefinitions'
+ headers = {'Content-Type': 'application/json', 'Accept':'application/json'}
+ data = json.dumps(alarm_details_json)
+ resp = requests.put(self.vrops_site + api_url,
+ auth=(self.vrops_user, self.vrops_password),
+ headers=headers,
+ verify = False,
+ data=data)
+
+ if resp.status_code != 200:
+ self.logger.warn("Failed to create Symptom definition: {}, response code {}, response content: {}"\
+ .format(symptom_uuid, resp.status_code, resp.content))
+ return None
+ else:
+ parsed_alarm_details = json.loads(resp.content)
+ alarm_def_uuid = parsed_alarm_details['id'].split('-', 1)[1]
+ self.logger.info("Successfully updated Alarm defination: {}".format(alarm_def_uuid))
+ return alarm_def_uuid
+
+ def delete_alarm_configuration(self, delete_alarm_req_dict):
+ """Delete complete alarm configuration
+ """
+ if delete_alarm_req_dict['alarm_uuid'] is None:
+ self.logger.info("delete_alarm_configuration: Alarm UUID not provided")
+ return None
+ #1)Get alarm & symptom defination details
+ alarm_details_json, alarm_details = self.get_alarm_defination_details(delete_alarm_req_dict['alarm_uuid'])
+ if alarm_details is None or alarm_details_json is None:
+ return None
+
+ #2) Delete alarm notfication
+ rule_id = self.delete_notification_rule(alarm_details['alarm_name'])
+ if rule_id is None:
+ return None
+
+ #3) Delete alarm configuraion
+ alarm_id = self.delete_alarm_defination(alarm_details['alarm_id'])
+ if alarm_id is None:
+ return None
+
+ #4) Delete alarm symptom
+ symptom_id = self.delete_symptom_definition(alarm_details['symptom_definition_id'])
+ if symptom_id is None:
+ return None
+ else:
+ self.logger.info("Completed deleting alarm configuration: {}"\
+ .format(delete_alarm_req_dict['alarm_uuid']))
+ return delete_alarm_req_dict['alarm_uuid']
+
+ def delete_notification_rule(self, alarm_name):
+ """Deleted notification rule defined for a particular alarm
+ """
+ rule_id = self.get_notification_rule_id_by_alarm_name(alarm_name)
+ if rule_id is None:
+ return None
+ else:
+ api_url = '/suite-api/api/notifications/rules/'
+ headers = {'Accept':'application/json'}
+ resp = requests.delete(self.vrops_site + api_url + rule_id,
+ auth=(self.vrops_user, self.vrops_password),
+ verify = False, headers = headers)
+ if resp.status_code is not 204:
+ self.logger.warn("Failed to delete notification rules for {}".format(alarm_name))
+ return None
+ else:
+ self.logger.info("Deleted notification rules for {}".format(alarm_name))
+ return rule_id
+
+ def get_notification_rule_id_by_alarm_name(self, alarm_name):
+ """Find created Alarm notification rule id by alarm name
+ """
+ alarm_notify_id = 'notify_' + alarm_name
+ api_url = '/suite-api/api/notifications/rules'
+ headers = {'Content-Type': 'application/json', 'Accept':'application/json'}
+ resp = requests.get(self.vrops_site + api_url,
+ auth=(self.vrops_user, self.vrops_password),
+ verify = False, headers = headers)
+
+ if resp.status_code is not 200:
+ self.logger.warn("Failed to get notification rules details for {}"\
+ .format(delete_alarm_req_dict['alarm_name']))
+ return None
+
+ notifications = json.loads(resp.content)
+ if notifications is not None and notifications.has_key('notification-rule'):
+ notifications_list = notifications['notification-rule']
+ for dict in notifications_list:
+ if dict['name'] is not None and dict['name'] == alarm_notify_id:
+ notification_id = dict['id']
+ self.logger.info("Found Notification id to be deleted: {} for {}"\
+ .format(notification_id, alarm_name))
+ return notification_id
+
+ self.logger.warn("Notification id to be deleted not found for {}"\
+ .format(notification_id, alarm_name))
+ return None
+
+ def delete_alarm_defination(self, alarm_id):
+ """Delete created Alarm defination
+ """
+ api_url = '/suite-api/api/alertdefinitions/'
+ headers = {'Accept':'application/json'}
+ resp = requests.delete(self.vrops_site + api_url + alarm_id,
+ auth=(self.vrops_user, self.vrops_password),
+ verify = False, headers = headers)
+ if resp.status_code is not 204:
+ self.logger.warn("Failed to delete alarm definition {}".format(alarm_id))
+ return None
+ else:
+ self.logger.info("Deleted alarm definition {}".format(alarm_id))
+ return alarm_id
+
+ def delete_symptom_definition(self, symptom_id):
+ """Delete symptom defination
+ """
+ api_url = '/suite-api/api/symptomdefinitions/'
+ headers = {'Accept':'application/json'}
+ resp = requests.delete(self.vrops_site + api_url + symptom_id,
+ auth=(self.vrops_user, self.vrops_password),
+ verify = False, headers = headers)
+ if resp.status_code is not 204:
+ self.logger.warn("Failed to delete symptom definition {}".format(symptom_id))
+ return None
+ else:
+ self.logger.info("Deleted symptom definition {}".format(symptom_id))
+ return symptom_id
+
+
+ def verify_metric_support(self, metric_info):
+ """Verify, if Metric is supported by vROPs plugin, verify metric unit & return status
+ Returns:
+ status: True if supported, False if not supported
+ """
+ status = False
+ if 'metric_name' not in metric_info:
+ self.logger.debug("Metric name not provided: {}".format(metric_info))
+ return status
+ metric_key_params = self.get_default_Params(metric_info['metric_name'])
+ if not metric_key_params:
+ self.logger.warn("Metric not supported: {}".format(metric_info['metric_name']))
+ return status
+ else:
+ #If Metric is supported, verify optional metric unit & return status
+ if 'metric_unit' in metric_info:
+ if metric_key_params.get('unit') == metric_info['metric_unit']:
+ self.logger.info("Metric is supported with unit: {}".format(metric_info['metric_name']))
+ status = True
+ else:
+ self.logger.debug("Metric supported but there is unit mismatch for: {}."\
+ "Supported unit: {}"\
+ .format(metric_info['metric_name'],metric_key_params['unit']))
+ status = True
+ return status
+
+ def get_triggered_alarms_list(self, list_alarm_input):
+ """Get list of triggered alarms on a resource based on alarm input request.
+ """
+ #TO Do - Need to add filtering of alarms based on Severity & alarm name
+
+ triggered_alarms_list = []
+ if list_alarm_input['resource_uuid'] is None:
+ return triggered_alarms_list
+
+ #1)Find vROPs resource ID using RO resource UUID
+ vrops_resource_id = self.get_vrops_resourceid_from_ro_uuid(list_alarm_input['resource_uuid'])
+ if vrops_resource_id is None:
+ return triggered_alarms_list
+
+ #2)Get triggered alarms on particular resource
+ triggered_alarms_list = self.get_triggered_alarms_on_resource(list_alarm_input['resource_uuid'], vrops_resource_id)
+ return triggered_alarms_list
+
+ def get_vrops_resourceid_from_ro_uuid(self, ro_resource_uuid):
+ """Fetch vROPs resource ID using resource UUID from RO/SO
+ """
+ #1) Find vm_moref_id from vApp uuid in vCD
+ vm_moref_id = self.get_vm_moref_id(ro_resource_uuid)
+ if vm_moref_id is None:
+ self.logger.warn("Failed to find vm morefid for vApp in vCD: {}".format(ro_resource_uuid))
+ return None
+
+ #2) Based on vm_moref_id, find VM's corresponding resource_id in vROPs to set notification
+ vrops_resource_id = self.get_vm_resource_id(vm_moref_id)
+ if vrops_resource_id is None:
+ self.logger.warn("Failed to find resource in vROPs: {}".format(ro_resource_uuid))
+ return None
+ return vrops_resource_id
+
+
+ def get_triggered_alarms_on_resource(self, ro_resource_uuid, vrops_resource_id):
+ """Get triggered alarms on particular resource & return list of dictionary of alarms
+ """
+ resource_alarms = []
+ api_url = '/suite-api/api/alerts?resourceId='
+ headers = {'Accept':'application/json'}
+ resp = requests.get(self.vrops_site + api_url + vrops_resource_id,
+ auth=(self.vrops_user, self.vrops_password),
+ verify = False, headers = headers)
+
+ if resp.status_code is not 200:
+ self.logger.warn("Failed to get notification rules details for {}"\
+ .format(delete_alarm_req_dict['alarm_name']))
+ return None
+
+ all_alerts = json.loads(resp.content)
+ if all_alerts.has_key('alerts'):
+ if not all_alerts['alerts']:
+ self.logger.info("No alarms present on resource {}".format(ro_resource_uuid))
+ return resource_alarms
+ all_alerts_list = all_alerts['alerts']
+ for alarm in all_alerts_list:
+ #self.logger.info("Triggered Alarm {}".format(alarm))
+ if alarm['alertDefinitionName'] is not None and\
+ len(alarm['alertDefinitionName'].split('-', 1)) == 2:
+ if alarm['alertDefinitionName'].split('-', 1)[1] == ro_resource_uuid:
+ alarm_instance = {}
+ alarm_instance['alarm_uuid'] = alarm['alertDefinitionId'].split('-', 1)[1]
+ alarm_instance['resource_uuid'] = ro_resource_uuid
+ alarm_instance['alarm_instance_uuid'] = alarm['alertId']
+ alarm_instance['vim_type'] = 'VMware'
+ #find severity of alarm
+ severity = None
+ for key,value in severity_mano2vrops.iteritems():
+ if value == alarm['alertLevel']:
+ severity = key
+ if severity is None:
+ severity = 'INDETERMINATE'
+ alarm_instance['severity'] = severity
+ alarm_instance['status'] = alarm['status']
+ alarm_instance['start_date'] = self.convert_date_time(alarm['startTimeUTC'])
+ alarm_instance['update_date'] = self.convert_date_time(alarm['updateTimeUTC'])
+ alarm_instance['cancel_date'] = self.convert_date_time(alarm['cancelTimeUTC'])
+ self.logger.info("Triggered Alarm on resource {}".format(alarm_instance))
+ resource_alarms.append(alarm_instance)
+ if not resource_alarms:
+ self.logger.info("No alarms present on resource {}".format(ro_resource_uuid))
+ return resource_alarms
+
+ def convert_date_time(self, date_time):
+ """Convert the input UTC time in msec to OSM date time format
+ """
+ date_time_formatted = '0000-00-00T00:00:00'
+ if date_time != 0:
+ complete_datetime = datetime.datetime.fromtimestamp(date_time/1000.0).isoformat('T')
+ date_time_formatted = complete_datetime.split('.',1)[0]
+ return date_time_formatted
+
+