summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authordongxiaoyan <[email protected]>2024-11-26 19:24:53 +0800
committerdongxiaoyan <[email protected]>2024-11-26 19:24:53 +0800
commita799484cebd0845d7a94f8d4ae2083e65a832278 (patch)
treef40a4209f2a8b968ec3bceeab8c5b87ca56c483b
parent2b38630962a53b763f06ecb8c6cea479eb6d30f4 (diff)
统一Trex获取log逻辑
-rw-r--r--support/api_utils/query_rule_log.py19
1 files changed, 8 insertions, 11 deletions
diff --git a/support/api_utils/query_rule_log.py b/support/api_utils/query_rule_log.py
index a1cb9c4fe..375baf004 100644
--- a/support/api_utils/query_rule_log.py
+++ b/support/api_utils/query_rule_log.py
@@ -105,21 +105,18 @@ class QueryRuleLog:
log_condition_dict['vsys'] = self.parameter["vsys"]
log_condition_dict['execution_mode'] = 'oneshot'
- if self.rule_type == "dos_protection":
- attack_type = "Custom Network Attack"
- log_condition_dict['filter'] = f"destination_ip='{traffic_generation['servers_start_ip']}'AND attack_type='{attack_type}'"
if self.is_attribute_name_exsit("ATTR_SUBSCRIBER_ID") == True:
log_filter = f"subscriber_id='{self.parameter['test_subcriber_id']}' AND has({log_query_rule_type}, '{rule_uuid}')"
log_condition_dict['filter'] = log_filter
else:
- if self.rule_type == "statistics":
- log_filter = f"client_ip={traffic_generation['clients_start_ip']} AND has({log_query_rule_type}, '{rule_uuid}')"
- log_condition_dict['filter'] = log_filter
- log_condition_dict['filter'] = log_condition_dict['filter'].replace(f"client_ip={traffic_generation['clients_start_ip']}", f"client_ip='{traffic_generation['clients_start_ip']}'")
- if self.rule_type == "monitor" and self.traffic_generation["tool"] == "trex":
- log_filter = f"client_ip={traffic_generation['clients_start_ip']} AND has({log_query_rule_type}, '{rule_uuid}')"
- log_condition_dict['filter'] = log_filter
- log_condition_dict['filter'] = log_condition_dict['filter'].replace(f"client_ip={traffic_generation['clients_start_ip']}",f"client_ip='{traffic_generation['clients_start_ip']}'")
+ if self.traffic_generation["tool"] == "trex":
+ if self.rule_type == "dos_protection":
+ attack_type = "Custom Network Attack"
+ log_condition_dict['filter'] = f"destination_ip='{traffic_generation['servers_start_ip']}'AND attack_type='{attack_type}'"
+ else:
+ log_filter = f"client_ip={traffic_generation['clients_start_ip']} AND has({log_query_rule_type}, '{rule_uuid}')"
+ log_condition_dict['filter'] = log_filter
+ log_condition_dict['filter'] = log_condition_dict['filter'].replace(f"client_ip={traffic_generation['clients_start_ip']}",f"client_ip='{traffic_generation['clients_start_ip']}'")
else:
log_filter = f"client_ip={self.parameter['test_pc_ip']} AND has({log_query_rule_type}, '{rule_uuid}')"
log_condition_dict['filter'] = log_filter