Newer
Older
# Copyright 2021-2023 H2020 TeraFlow (https://www.teraflow-h2020.eu/)
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
import logging
from typing import List
from grpclib.client import Channel
from prometheus_client import Counter
from common.proto.asyncio.optical_attack_detector_grpc import \
OpticalAttackDetectorServiceStub
from common.proto.asyncio.optical_attack_detector_pb2 import DetectionRequest
from common.Settings import get_log_level, get_setting
DROP_COUNTER = Counter(
"tfs_opticalattackmanager_dropped_assessments",
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
"Dropped assessments due to detector timeout",
)
log_level = get_log_level()
logging.basicConfig(level=log_level)
LOGGER = logging.getLogger(__name__)
async def detect_attack(
host: str,
port: int,
context_id: str,
service_id: str,
kpi_id: str,
timeout: float = 20.0,
) -> None:
try:
LOGGER.debug("Sending request for {}...".format(service_id))
async with Channel(host, port) as channel:
stub = OpticalAttackDetectorServiceStub(channel)
request: DetectionRequest = DetectionRequest()
request.service_id.context_id.context_uuid.uuid = context_id
request.service_id.service_uuid.uuid = str(service_id)
request.kpi_id.kpi_id.uuid = kpi_id
await stub.DetectAttack(request, timeout=timeout)
LOGGER.debug("Monitoring finished for {}/{}".format(service_id, kpi_id))
except Exception as e:
LOGGER.warning(
"Exception while processing service_id {}/{}".format(service_id, kpi_id)
)
def delegate_services(
service_list,
start_index: int,
end_index: int,
host: str,
port: str,
monitoring_interval: float,
):
async def run_internal_loop():
tasks = []
for service in service_list[start_index:end_index]:
aw = detect_attack(
host,
port,
service["context"],
service["service"],
service["kpi"],
# allow at most 90% of the monitoring interval to succeed
monitoring_interval * 0.9,
)
tasks.append(aw)
[await aw for aw in tasks]
asyncio.run(run_internal_loop())