summaryrefslogtreecommitdiffstats
path: root/src/database/sqlite/sqlite_health.c
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-07-24 09:54:23 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-07-24 09:54:44 +0000
commit836b47cb7e99a977c5a23b059ca1d0b5065d310e (patch)
tree1604da8f482d02effa033c94a84be42bc0c848c3 /src/database/sqlite/sqlite_health.c
parentReleasing debian version 1.44.3-2. (diff)
downloadnetdata-836b47cb7e99a977c5a23b059ca1d0b5065d310e.tar.xz
netdata-836b47cb7e99a977c5a23b059ca1d0b5065d310e.zip
Merging upstream version 1.46.3.
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'src/database/sqlite/sqlite_health.c')
-rw-r--r--src/database/sqlite/sqlite_health.c1497
1 files changed, 1497 insertions, 0 deletions
diff --git a/src/database/sqlite/sqlite_health.c b/src/database/sqlite/sqlite_health.c
new file mode 100644
index 000000000..51e38d05a
--- /dev/null
+++ b/src/database/sqlite/sqlite_health.c
@@ -0,0 +1,1497 @@
+// SPDX-License-Identifier: GPL-3.0-or-later
+
+#include "sqlite_health.h"
+#include "sqlite_functions.h"
+#include "sqlite_db_migration.h"
+#include "health/health_internals.h"
+
+#define MAX_HEALTH_SQL_SIZE 2048
+#define SQLITE3_BIND_STRING_OR_NULL(res, param, key) \
+ ((key) ? sqlite3_bind_text((res), (param), string2str(key), -1, SQLITE_STATIC) : sqlite3_bind_null((res), (param)))
+
+#define SQLITE3_COLUMN_STRINGDUP_OR_NULL(res, param) \
+ ({ \
+ int _param = (param); \
+ sqlite3_column_type((res), (_param)) != SQLITE_NULL ? \
+ string_strdupz((char *)sqlite3_column_text((res), (_param))) : \
+ NULL; \
+ })
+
+/* Health related SQL queries
+ Updates an entry in the table
+*/
+#define SQL_UPDATE_HEALTH_LOG \
+ "UPDATE health_log_detail SET updated_by_id = @updated_by, flags = @flags, exec_run_timestamp = @exec_time, " \
+ "exec_code = @exec_code WHERE unique_id = @unique_id AND alarm_id = @alarm_id AND transition_id = @transaction"
+
+static void sql_health_alarm_log_update(RRDHOST *host, ALARM_ENTRY *ae)
+{
+ static __thread sqlite3_stmt *res = NULL;
+ int rc;
+
+ REQUIRE_DB(db_meta);
+
+ if (!PREPARE_COMPILED_STATEMENT(db_meta, SQL_UPDATE_HEALTH_LOG, &res))
+ return;
+
+ int param = 0;
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (sqlite3_int64) ae->updated_by_id));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (sqlite3_int64) ae->flags));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (sqlite3_int64) ae->exec_run_timestamp));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int(res, ++param, ae->exec_code));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (sqlite3_int64) ae->unique_id));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (sqlite3_int64) ae->alarm_id));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_blob(res, ++param, &ae->transition_id, sizeof(ae->transition_id), SQLITE_STATIC));
+
+ param = 0;
+ rc = execute_insert(res);
+ if (unlikely(rc != SQLITE_DONE)) {
+ error_report("HEALTH [%s]: Failed to update health log, rc = %d", rrdhost_hostname(host), rc);
+ }
+
+done:
+ REPORT_BIND_FAIL(res, param);
+ SQLITE_RESET(res);
+}
+
+/* Health related SQL queries
+ Inserts an entry in the table
+*/
+
+
+#define SQL_INSERT_HEALTH_LOG_DETAIL \
+ "INSERT INTO health_log_detail (health_log_id, unique_id, alarm_id, alarm_event_id, " \
+ "updated_by_id, updates_id, when_key, duration, non_clear_duration, flags, exec_run_timestamp, delay_up_to_timestamp, " \
+ "info, exec_code, new_status, old_status, delay, new_value, old_value, last_repeat, transition_id, global_id, summary) " \
+ "VALUES (@health_log_id,@unique_id,@alarm_id,@alarm_event_id,@updated_by_id,@updates_id,@when_key,@duration," \
+ "@non_clear_duration,@flags,@exec_run_timestamp,@delay_up_to_timestamp, @info,@exec_code,@new_status,@old_status," \
+ "@delay,@new_value,@old_value,@last_repeat,@transition_id,@global_id,@summary)"
+
+static void sql_health_alarm_log_insert_detail(RRDHOST *host, uint64_t health_log_id, ALARM_ENTRY *ae)
+{
+ static __thread sqlite3_stmt *res = NULL;
+ int rc;
+
+ if (!PREPARE_COMPILED_STATEMENT(db_meta, SQL_INSERT_HEALTH_LOG_DETAIL, &res))
+ return;
+
+ int param = 0;
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (sqlite3_int64)health_log_id));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (sqlite3_int64)ae->unique_id));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (sqlite3_int64)ae->alarm_id));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (sqlite3_int64)ae->alarm_event_id));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (sqlite3_int64)ae->updated_by_id));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (sqlite3_int64)ae->updates_id));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (sqlite3_int64)ae->when));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (sqlite3_int64)ae->duration));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (sqlite3_int64)ae->non_clear_duration));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (sqlite3_int64)ae->flags));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (sqlite3_int64)ae->exec_run_timestamp));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (sqlite3_int64)ae->delay_up_to_timestamp));
+ SQLITE_BIND_FAIL(done, SQLITE3_BIND_STRING_OR_NULL(res, ++param, ae->info));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int(res, ++param, ae->exec_code));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int(res, ++param, ae->new_status));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int(res, ++param, ae->old_status));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int(res, ++param, ae->delay));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_double(res, ++param, ae->new_value));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_double(res, ++param, ae->old_value));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (sqlite3_int64)ae->last_repeat));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_blob(res, ++param, &ae->transition_id, sizeof(ae->transition_id), SQLITE_STATIC));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (sqlite3_int64)ae->global_id));
+ SQLITE_BIND_FAIL(done, SQLITE3_BIND_STRING_OR_NULL(res, ++param, ae->summary));
+
+ param = 0;
+ rc = execute_insert(res);
+ if (rc == SQLITE_DONE)
+ ae->flags |= HEALTH_ENTRY_FLAG_SAVED;
+ else
+ error_report(
+ "HEALTH [%s]: Failed to execute SQL_INSERT_HEALTH_LOG_DETAIL, rc = %d", rrdhost_hostname(host), rc);
+
+done:
+ REPORT_BIND_FAIL(res, param);
+ SQLITE_RESET(res);
+}
+
+#define SQL_INSERT_HEALTH_LOG \
+ "INSERT INTO health_log (host_id, alarm_id, " \
+ "config_hash_id, name, chart, exec, recipient, units, chart_context, last_transition_id, chart_name) " \
+ "VALUES (@host_id,@alarm_id, @config_hash_id,@name,@chart,@exec,@recipient,@units,@chart_context," \
+ "@last_transition_id,@chart_name) ON CONFLICT (host_id, alarm_id) DO UPDATE " \
+ "SET last_transition_id = excluded.last_transition_id, chart_name = excluded.chart_name, " \
+ "config_hash_id=excluded.config_hash_id RETURNING health_log_id"
+
+static void sql_health_alarm_log_insert(RRDHOST *host, ALARM_ENTRY *ae)
+{
+ static __thread sqlite3_stmt *res = NULL;
+ int rc;
+ uint64_t health_log_id;
+
+ REQUIRE_DB(db_meta);
+
+ if (!PREPARE_COMPILED_STATEMENT(db_meta, SQL_INSERT_HEALTH_LOG, &res))
+ return;
+
+ int param = 0;
+ SQLITE_BIND_FAIL(done, sqlite3_bind_blob(res, ++param, &host->host_uuid, sizeof(host->host_uuid), SQLITE_STATIC));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (sqlite3_int64) ae->alarm_id));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_blob(res, ++param, &ae->config_hash_id, sizeof(ae->config_hash_id), SQLITE_STATIC));
+ SQLITE_BIND_FAIL(done, SQLITE3_BIND_STRING_OR_NULL(res, ++param, ae->name));
+ SQLITE_BIND_FAIL(done, SQLITE3_BIND_STRING_OR_NULL(res, ++param, ae->chart));
+ SQLITE_BIND_FAIL(done, SQLITE3_BIND_STRING_OR_NULL(res, ++param, ae->exec));
+ SQLITE_BIND_FAIL(done, SQLITE3_BIND_STRING_OR_NULL(res, ++param, ae->recipient));
+ SQLITE_BIND_FAIL(done, SQLITE3_BIND_STRING_OR_NULL(res, ++param, ae->units));
+ SQLITE_BIND_FAIL(done, SQLITE3_BIND_STRING_OR_NULL(res, ++param, ae->chart_context));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_blob(res, ++param, &ae->transition_id, sizeof(ae->transition_id), SQLITE_STATIC));
+ SQLITE_BIND_FAIL(done, SQLITE3_BIND_STRING_OR_NULL(res, ++param, ae->chart_name));
+
+ param = 0;
+ rc = sqlite3_step_monitored(res);
+ if (rc == SQLITE_ROW) {
+ health_log_id = (size_t)sqlite3_column_int64(res, 0);
+ sql_health_alarm_log_insert_detail(host, health_log_id, ae);
+ } else
+ error_report("HEALTH [%s]: Failed to execute SQL_INSERT_HEALTH_LOG, rc = %d", rrdhost_hostname(host), rc);
+
+done:
+ REPORT_BIND_FAIL(res, param);
+ SQLITE_RESET(res);
+}
+
+void sql_health_alarm_log_save(RRDHOST *host, ALARM_ENTRY *ae)
+{
+ if (ae->flags & HEALTH_ENTRY_FLAG_SAVED)
+ sql_health_alarm_log_update(host, ae);
+ else {
+ sql_health_alarm_log_insert(host, ae);
+#ifdef ENABLE_ACLK
+ if (netdata_cloud_enabled) {
+ sql_queue_alarm_to_aclk(host, ae, false);
+ }
+#endif
+ }
+}
+
+/*
+ *
+ * Health related SQL queries
+ * Cleans up the health_log_detail table on a non-claimed or claimed host
+ *
+ */
+
+#define SQL_CLEANUP_HEALTH_LOG_DETAIL_NOT_CLAIMED \
+ "DELETE FROM health_log_detail WHERE health_log_id IN " \
+ "(SELECT health_log_id FROM health_log WHERE host_id = @host_id) AND when_key < UNIXEPOCH() - @history " \
+ "AND updated_by_id <> 0 AND transition_id NOT IN " \
+ "(SELECT last_transition_id FROM health_log hl WHERE hl.host_id = @host_id)"
+
+#define SQL_CLEANUP_HEALTH_LOG_DETAIL_CLAIMED(guid) \
+ "DELETE from health_log_detail WHERE unique_id NOT IN " \
+ "(SELECT filtered_alert_unique_id FROM aclk_alert_%s) " \
+ "AND unique_id IN (SELECT hld.unique_id FROM health_log hl, health_log_detail hld WHERE " \
+ "hl.host_id = @host_id AND hl.health_log_id = hld.health_log_id) " \
+ "AND health_log_id IN (SELECT health_log_id FROM health_log WHERE host_id = @host_id) " \
+ "AND when_key < unixepoch() - @history " \
+ "AND updated_by_id <> 0 AND transition_id NOT IN " \
+ "(SELECT last_transition_id FROM health_log hl WHERE hl.host_id = @host_id)", \
+ guid
+
+void sql_health_alarm_log_cleanup(RRDHOST *host, bool claimed) {
+ sqlite3_stmt *res = NULL;
+ int rc;
+ char command[MAX_HEALTH_SQL_SIZE + 1];
+
+ REQUIRE_DB(db_meta);
+
+ char uuid_str[UUID_STR_LEN];
+ uuid_unparse_lower_fix(&host->host_uuid, uuid_str);
+ snprintfz(command, sizeof(command) - 1, "aclk_alert_%s", uuid_str);
+
+ bool aclk_table_exists = table_exists_in_database(db_meta, command);
+
+ char *sql = SQL_CLEANUP_HEALTH_LOG_DETAIL_NOT_CLAIMED;
+
+ if (claimed && aclk_table_exists) {
+ snprintfz(command, sizeof(command) - 1, SQL_CLEANUP_HEALTH_LOG_DETAIL_CLAIMED(uuid_str));
+ sql = command;
+ }
+
+ if (!PREPARE_STATEMENT(db_meta, sql, &res))
+ return;
+
+ int param = 0;
+ SQLITE_BIND_FAIL(done, sqlite3_bind_blob(res, ++param, &host->host_uuid, sizeof(host->host_uuid), SQLITE_STATIC));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (sqlite3_int64)host->health_log.health_log_history));
+
+ param = 0;
+ rc = sqlite3_step_monitored(res);
+ if (unlikely(rc != SQLITE_DONE))
+ error_report("Failed to cleanup health log detail table, rc = %d", rc);
+
+ if (aclk_table_exists)
+ sql_aclk_alert_clean_dead_entries(host);
+
+done:
+ REPORT_BIND_FAIL(res, param);
+ SQLITE_FINALIZE(res);
+}
+
+#define SQL_INJECT_REMOVED \
+ "INSERT INTO health_log_detail (health_log_id, unique_id, alarm_id, alarm_event_id, updated_by_id, updates_id, when_key, " \
+ "duration, non_clear_duration, flags, exec_run_timestamp, delay_up_to_timestamp, info, exec_code, new_status, old_status, " \
+ "delay, new_value, old_value, last_repeat, transition_id, global_id, summary) " \
+ "SELECT health_log_id, ?1, ?2, ?3, 0, ?4, UNIXEPOCH(), 0, 0, flags, exec_run_timestamp, UNIXEPOCH(), info, exec_code, -2, " \
+ "new_status, delay, NULL, new_value, 0, ?5, NOW_USEC(0), summary FROM health_log_detail WHERE unique_id = ?6 AND transition_id = ?7"
+
+#define SQL_INJECT_REMOVED_UPDATE_DETAIL \
+ "UPDATE health_log_detail SET flags = flags | ?1, updated_by_id = ?2 WHERE unique_id = ?3 AND transition_id = ?4"
+
+#define SQL_INJECT_REMOVED_UPDATE_LOG \
+ "UPDATE health_log SET last_transition_id = ?1 WHERE alarm_id = ?2 AND last_transition_id = ?3 AND host_id = ?4"
+
+bool sql_update_removed_in_health_log(RRDHOST *host, uint32_t alarm_id, nd_uuid_t *transition_id, nd_uuid_t *last_transition)
+{
+ int rc = 0;
+ sqlite3_stmt *res;
+
+ if (!PREPARE_STATEMENT(db_meta, SQL_INJECT_REMOVED_UPDATE_LOG, &res))
+ return false;
+
+ int param = 0;
+ SQLITE_BIND_FAIL(done, sqlite3_bind_blob(res, ++param, transition_id, sizeof(*transition_id), SQLITE_STATIC));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (sqlite3_int64)alarm_id));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_blob(res, ++param, last_transition, sizeof(*last_transition), SQLITE_STATIC));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_blob(res, ++param, &host->host_uuid, sizeof(host->host_uuid), SQLITE_STATIC));
+
+ param = 0;
+ rc = execute_insert(res);
+ if (unlikely(rc != SQLITE_DONE))
+ error_report("HEALTH [N/A]: Failed to execute SQL_INJECT_REMOVED_UPDATE_DETAIL, rc = %d", rc);
+
+done:
+ REPORT_BIND_FAIL(res, param);
+ SQLITE_FINALIZE(res);
+
+ return (param == 0 && rc == SQLITE_DONE);
+}
+
+bool sql_update_removed_in_health_log_detail(uint32_t unique_id, uint32_t max_unique_id, nd_uuid_t *prev_transition_id)
+{
+ int rc = 0;
+ sqlite3_stmt *res;
+
+ if (!PREPARE_STATEMENT(db_meta, SQL_INJECT_REMOVED_UPDATE_DETAIL, &res))
+ return false;
+
+ int param = 0;
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (sqlite3_int64) HEALTH_ENTRY_FLAG_UPDATED));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (sqlite3_int64) max_unique_id));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (sqlite3_int64) unique_id));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_blob(res, ++param, prev_transition_id, sizeof(*prev_transition_id), SQLITE_STATIC));
+
+ param = 0;
+ rc = execute_insert(res);
+ if (unlikely(rc != SQLITE_DONE))
+ error_report("HEALTH [N/A]: Failed to execute SQL_INJECT_REMOVED_UPDATE_DETAIL, rc = %d", rc);
+
+done:
+ REPORT_BIND_FAIL(res, param);
+ SQLITE_FINALIZE(res);
+
+ return (param == 0 && rc == SQLITE_DONE);
+}
+
+void sql_inject_removed_status(
+ RRDHOST *host,
+ uint32_t alarm_id,
+ uint32_t alarm_event_id,
+ uint32_t unique_id,
+ uint32_t max_unique_id,
+ nd_uuid_t *last_transition)
+{
+ if (!alarm_id || !alarm_event_id || !unique_id || !max_unique_id)
+ return;
+
+ sqlite3_stmt *res = NULL;
+
+ if (!PREPARE_STATEMENT(db_meta, SQL_INJECT_REMOVED, &res))
+ return;
+
+ nd_uuid_t transition_id;
+ uuid_generate_random(transition_id);
+
+ int param = 0;
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (sqlite3_int64) max_unique_id));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (sqlite3_int64) alarm_id));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (sqlite3_int64) alarm_event_id + 1));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (sqlite3_int64) unique_id));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_blob(res, ++param, &transition_id, sizeof(transition_id), SQLITE_STATIC));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (sqlite3_int64) unique_id));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_blob(res, ++param, last_transition, sizeof(*last_transition), SQLITE_STATIC));
+
+ param = 0;
+ int rc = execute_insert(res);
+ if (rc == SQLITE_DONE) {
+ //update the old entry in health_log_detail
+ sql_update_removed_in_health_log_detail(unique_id, max_unique_id, last_transition);
+ //update the old entry in health_log
+ sql_update_removed_in_health_log(host, alarm_id, &transition_id, last_transition);
+ }
+ else
+ error_report("HEALTH [N/A]: Failed to execute SQL_INJECT_REMOVED, rc = %d", rc);
+
+done:
+ REPORT_BIND_FAIL(res, param);
+ SQLITE_FINALIZE(res);
+}
+
+#define SQL_SELECT_MAX_UNIQUE_ID \
+ "SELECT MAX(hld.unique_id) FROM health_log_detail hld, health_log hl " \
+ "WHERE hl.host_id = @host_id AND hl.health_log_id = hld.health_log_id"
+
+uint32_t sql_get_max_unique_id (RRDHOST *host)
+{
+ uint32_t max_unique_id = 0;
+
+ sqlite3_stmt *res = NULL;
+
+ if (!PREPARE_STATEMENT(db_meta, SQL_SELECT_MAX_UNIQUE_ID, &res))
+ return 0;
+
+ int param = 0;
+ SQLITE_BIND_FAIL(done, sqlite3_bind_blob(res, ++param, &host->host_uuid, sizeof(host->host_uuid), SQLITE_STATIC));
+
+ param = 0;
+ while (sqlite3_step_monitored(res) == SQLITE_ROW)
+ max_unique_id = (uint32_t)sqlite3_column_int64(res, 0);
+
+done:
+ REPORT_BIND_FAIL(res, param);
+ SQLITE_FINALIZE(res);
+ return max_unique_id;
+}
+
+#define SQL_SELECT_LAST_STATUSES \
+ "SELECT hld.new_status, hld.unique_id, hld.alarm_id, hld.alarm_event_id, hld.transition_id FROM health_log hl, " \
+ "health_log_detail hld WHERE hl.host_id = @host_id AND hl.last_transition_id = hld.transition_id"
+
+void sql_check_removed_alerts_state(RRDHOST *host)
+{
+ uint32_t max_unique_id = 0;
+ sqlite3_stmt *res = NULL;
+ nd_uuid_t transition_id;
+
+ if (!PREPARE_STATEMENT(db_meta, SQL_SELECT_LAST_STATUSES, &res))
+ return;
+
+ int param = 0;
+ SQLITE_BIND_FAIL(done, sqlite3_bind_blob(res, ++param, &host->host_uuid, sizeof(host->host_uuid), SQLITE_STATIC));
+
+ param = 0;
+ while (sqlite3_step_monitored(res) == SQLITE_ROW) {
+ uint32_t alarm_id, alarm_event_id, unique_id;
+ RRDCALC_STATUS status;
+
+ status = (RRDCALC_STATUS)sqlite3_column_int(res, 0);
+ unique_id = (uint32_t)sqlite3_column_int64(res, 1);
+ alarm_id = (uint32_t)sqlite3_column_int64(res, 2);
+ alarm_event_id = (uint32_t)sqlite3_column_int64(res, 3);
+ uuid_copy(transition_id, *((nd_uuid_t *)sqlite3_column_blob(res, 4)));
+
+ if (unlikely(status != RRDCALC_STATUS_REMOVED)) {
+ if (unlikely(!max_unique_id))
+ max_unique_id = sql_get_max_unique_id(host);
+
+ sql_inject_removed_status(host, alarm_id, alarm_event_id, unique_id, ++max_unique_id, &transition_id);
+ }
+ }
+done:
+ REPORT_BIND_FAIL(res, param);
+ SQLITE_FINALIZE(res);
+}
+
+#define SQL_DELETE_MISSING_CHART_ALERT \
+ "DELETE FROM health_log WHERE host_id = @host_id AND chart NOT IN " \
+ "(SELECT type||'.'||id FROM chart WHERE host_id = @host_id)"
+
+static void sql_remove_alerts_from_deleted_charts(RRDHOST *host, nd_uuid_t *host_uuid)
+{
+ sqlite3_stmt *res = NULL;
+ int ret;
+
+ nd_uuid_t *actual_uuid = host ? &host->host_uuid : host_uuid;
+ if (!actual_uuid)
+ return;
+
+ if (!PREPARE_STATEMENT(db_meta, SQL_DELETE_MISSING_CHART_ALERT, &res))
+ return;
+
+ int param = 0;
+ SQLITE_BIND_FAIL(done, sqlite3_bind_blob(res, ++param, actual_uuid, sizeof(*actual_uuid), SQLITE_STATIC));
+
+ param = 0;
+ ret = execute_insert(res);
+ if (ret != SQLITE_DONE)
+ error_report("Failed to execute command to delete missing charts from health_log");
+
+done:
+ REPORT_BIND_FAIL(res, param);
+ SQLITE_FINALIZE(res);
+}
+
+static int clean_host_alerts(void *data, int argc, char **argv, char **column)
+{
+ UNUSED(argc);
+ UNUSED(data);
+ UNUSED(column);
+
+ char guid[UUID_STR_LEN];
+ uuid_unparse_lower(*(nd_uuid_t *)argv[0], guid);
+
+ netdata_log_info("Checking host %s (%s)", guid, (const char *) argv[1]);
+ sql_remove_alerts_from_deleted_charts(NULL, (nd_uuid_t *)argv[0]);
+
+ return 0;
+}
+
+
+#define SQL_HEALTH_CHECK_ALL_HOSTS "SELECT host_id, hostname FROM host"
+
+void sql_alert_cleanup(bool cli)
+{
+ UNUSED(cli);
+
+ errno = 0;
+ if (sql_init_meta_database(DB_CHECK_NONE, 0)) {
+ netdata_log_error("Failed to open database");
+ return;
+ }
+ netdata_log_info("Alert cleanup running ...");
+ int rc = sqlite3_exec_monitored(db_meta, SQL_HEALTH_CHECK_ALL_HOSTS, clean_host_alerts, NULL, NULL);
+ if (rc != SQLITE_OK)
+ netdata_log_error("Failed to check host alerts");
+ else
+ netdata_log_info("Alert cleanup done");
+
+}
+/* Health related SQL queries
+ Load from the health log table
+*/
+#define SQL_LOAD_HEALTH_LOG \
+ "SELECT hld.unique_id, hld.alarm_id, hld.alarm_event_id, hl.config_hash_id, hld.updated_by_id, " \
+ "hld.updates_id, hld.when_key, hld.duration, hld.non_clear_duration, hld.flags, hld.exec_run_timestamp, " \
+ "hld.delay_up_to_timestamp, hl.name, hl.chart, hl.exec, hl.recipient, ah.source, hl.units, " \
+ "hld.info, hld.exec_code, hld.new_status, hld.old_status, hld.delay, hld.new_value, hld.old_value, " \
+ "hld.last_repeat, ah.class, ah.component, ah.type, hl.chart_context, hld.transition_id, hld.global_id, " \
+ "hl.chart_name, hld.summary FROM health_log hl, alert_hash ah, health_log_detail hld " \
+ "WHERE hl.config_hash_id = ah.hash_id and hl.host_id = @host_id and hl.last_transition_id = hld.transition_id"
+
+void sql_health_alarm_log_load(RRDHOST *host)
+{
+ sqlite3_stmt *res = NULL;
+ int ret;
+ ssize_t errored = 0, loaded = 0;
+
+ if (!REQUIRE_DB(db_meta))
+ return;
+
+ sql_check_removed_alerts_state(host);
+
+ if (!PREPARE_STATEMENT(db_meta, SQL_LOAD_HEALTH_LOG, &res))
+ return;
+
+ ret = sqlite3_bind_blob(res, 1, &host->host_uuid, sizeof(host->host_uuid), SQLITE_STATIC);
+ if (unlikely(ret != SQLITE_OK)) {
+ error_report("Failed to bind host_id parameter for SQL_LOAD_HEALTH_LOG.");
+ SQLITE_FINALIZE(res);
+ return;
+ }
+
+ DICTIONARY *all_rrdcalcs = dictionary_create(
+ DICT_OPTION_NAME_LINK_DONT_CLONE | DICT_OPTION_VALUE_LINK_DONT_CLONE | DICT_OPTION_DONT_OVERWRITE_VALUE);
+ RRDCALC *rc;
+ foreach_rrdcalc_in_rrdhost_read(host, rc) {
+ dictionary_set(all_rrdcalcs, rrdcalc_name(rc), rc, sizeof(*rc));
+ }
+ foreach_rrdcalc_in_rrdhost_done(rc);
+
+ rw_spinlock_read_lock(&host->health_log.spinlock);
+
+ while (sqlite3_step_monitored(res) == SQLITE_ROW) {
+ ALARM_ENTRY *ae = NULL;
+
+ // check that we have valid ids
+ uint32_t unique_id = (uint32_t) sqlite3_column_int64(res, 0);
+ if(!unique_id) {
+ error_report("HEALTH [%s]: Got invalid unique id. Ignoring it.", rrdhost_hostname(host));
+ errored++;
+ continue;
+ }
+
+ uint32_t alarm_id = (uint32_t) sqlite3_column_int64(res, 1);
+ if(!alarm_id) {
+ error_report("HEALTH [%s]: Got invalid alarm id. Ignoring it.", rrdhost_hostname(host));
+ errored++;
+ continue;
+ }
+
+ //need name and chart
+ if (sqlite3_column_type(res, 12) == SQLITE_NULL) {
+ error_report("HEALTH [%s]: Got null name field. Ignoring it.", rrdhost_hostname(host));
+ errored++;
+ continue;
+ }
+
+ if (sqlite3_column_type(res, 13) == SQLITE_NULL) {
+ error_report("HEALTH [%s]: Got null chart field. Ignoring it.", rrdhost_hostname(host));
+ errored++;
+ continue;
+ }
+
+ // Check if we got last_repeat field
+ time_t last_repeat = (time_t)sqlite3_column_int64(res, 25);
+
+ rc = dictionary_get(all_rrdcalcs, (char *) sqlite3_column_text(res, 13));
+ if(unlikely(rc)) {
+ if (rrdcalc_isrepeating(rc)) {
+ rc->last_repeat = last_repeat;
+ // We iterate through repeating alarm entries only to
+ // find the latest last_repeat timestamp. Otherwise,
+ // there is no need to keep them in memory.
+ continue;
+ }
+ }
+
+ ae = callocz(1, sizeof(ALARM_ENTRY));
+
+ ae->unique_id = unique_id;
+ ae->alarm_id = alarm_id;
+
+ if (sqlite3_column_type(res, 3) != SQLITE_NULL)
+ uuid_copy(ae->config_hash_id, *((nd_uuid_t *) sqlite3_column_blob(res, 3)));
+
+ ae->alarm_event_id = (uint32_t) sqlite3_column_int64(res, 2);
+ ae->updated_by_id = (uint32_t) sqlite3_column_int64(res, 4);
+ ae->updates_id = (uint32_t) sqlite3_column_int64(res, 5);
+
+ ae->when = (time_t) sqlite3_column_int64(res, 6);
+ ae->duration = (time_t) sqlite3_column_int64(res, 7);
+ ae->non_clear_duration = (time_t) sqlite3_column_int64(res, 8);
+
+ ae->flags = (uint32_t) sqlite3_column_int64(res, 9);
+ ae->flags |= HEALTH_ENTRY_FLAG_SAVED;
+
+ ae->exec_run_timestamp = (time_t) sqlite3_column_int64(res, 10);
+ ae->delay_up_to_timestamp = (time_t) sqlite3_column_int64(res, 11);
+
+ ae->name = string_strdupz((char *) sqlite3_column_text(res, 12));
+ ae->chart = string_strdupz((char *) sqlite3_column_text(res, 13));
+
+ ae->exec = SQLITE3_COLUMN_STRINGDUP_OR_NULL(res, 14);
+ ae->recipient = SQLITE3_COLUMN_STRINGDUP_OR_NULL(res, 15);
+ ae->source = SQLITE3_COLUMN_STRINGDUP_OR_NULL(res, 16);
+ ae->units = SQLITE3_COLUMN_STRINGDUP_OR_NULL(res, 17);
+ ae->info = SQLITE3_COLUMN_STRINGDUP_OR_NULL(res, 18);
+
+ ae->exec_code = (int) sqlite3_column_int(res, 19);
+ ae->new_status = (RRDCALC_STATUS) sqlite3_column_int(res, 20);
+ ae->old_status = (RRDCALC_STATUS)sqlite3_column_int(res, 21);
+ ae->delay = (int) sqlite3_column_int(res, 22);
+
+ ae->new_value = (NETDATA_DOUBLE) sqlite3_column_double(res, 23);
+ ae->old_value = (NETDATA_DOUBLE) sqlite3_column_double(res, 24);
+
+ ae->last_repeat = last_repeat;
+
+ ae->classification = SQLITE3_COLUMN_STRINGDUP_OR_NULL(res, 26);
+ ae->component = SQLITE3_COLUMN_STRINGDUP_OR_NULL(res, 27);
+ ae->type = SQLITE3_COLUMN_STRINGDUP_OR_NULL(res, 28);
+ ae->chart_context = SQLITE3_COLUMN_STRINGDUP_OR_NULL(res, 29);
+
+ if (sqlite3_column_type(res, 30) != SQLITE_NULL)
+ uuid_copy(ae->transition_id, *((nd_uuid_t *)sqlite3_column_blob(res, 30)));
+
+ if (sqlite3_column_type(res, 31) != SQLITE_NULL)
+ ae->global_id = sqlite3_column_int64(res, 31);
+
+ ae->chart_name = SQLITE3_COLUMN_STRINGDUP_OR_NULL(res, 32);
+ ae->summary = SQLITE3_COLUMN_STRINGDUP_OR_NULL(res, 33);
+
+ char value_string[100 + 1];
+ string_freez(ae->old_value_string);
+ string_freez(ae->new_value_string);
+ ae->old_value_string = string_strdupz(format_value_and_unit(value_string, 100, ae->old_value, ae_units(ae), -1));
+ ae->new_value_string = string_strdupz(format_value_and_unit(value_string, 100, ae->new_value, ae_units(ae), -1));
+
+ ae->next = host->health_log.alarms;
+ host->health_log.alarms = ae;
+
+ if(unlikely(ae->unique_id > host->health_max_unique_id))
+ host->health_max_unique_id = ae->unique_id;
+
+ if(unlikely(ae->alarm_id >= host->health_max_alarm_id))
+ host->health_max_alarm_id = ae->alarm_id;
+
+ loaded++;
+ }
+
+ rw_spinlock_read_unlock(&host->health_log.spinlock);
+
+ dictionary_destroy(all_rrdcalcs);
+ all_rrdcalcs = NULL;
+
+ if(!host->health_max_unique_id) host->health_max_unique_id = (uint32_t)now_realtime_sec();
+ if(!host->health_max_alarm_id) host->health_max_alarm_id = (uint32_t)now_realtime_sec();
+
+ host->health_log.next_log_id = host->health_max_unique_id + 1;
+ if (unlikely(!host->health_log.next_alarm_id || host->health_log.next_alarm_id <= host->health_max_alarm_id))
+ host->health_log.next_alarm_id = host->health_max_alarm_id + 1;
+
+ nd_log(NDLS_DAEMON, errored ? NDLP_WARNING : NDLP_DEBUG,
+ "[%s]: Table health_log, loaded %zd alarm entries, errors in %zd entries.",
+ rrdhost_hostname(host), loaded, errored);
+
+ SQLITE_FINALIZE(res);
+}
+
+/*
+ * Store an alert config hash in the database
+ */
+#define SQL_STORE_ALERT_CONFIG_HASH \
+ "insert or replace into alert_hash (hash_id, date_updated, alarm, template, " \
+ "on_key, class, component, type, lookup, every, units, calc, " \
+ "green, red, warn, crit, exec, to_key, info, delay, options, repeat, host_labels, " \
+ "p_db_lookup_dimensions, p_db_lookup_method, p_db_lookup_options, p_db_lookup_after, " \
+ "p_db_lookup_before, p_update_every, source, chart_labels, summary, time_group_condition, " \
+ "time_group_value, dims_group, data_source) " \
+ "values (@hash_id,UNIXEPOCH(),@alarm,@template," \
+ "@on_key,@class,@component,@type,@lookup,@every,@units,@calc," \
+ "@green,@red,@warn,@crit,@exec,@to_key,@info,@delay,@options,@repeat,@host_labels," \
+ "@p_db_lookup_dimensions,@p_db_lookup_method,@p_db_lookup_options,@p_db_lookup_after," \
+ "@p_db_lookup_before,@p_update_every,@source,@chart_labels,@summary, @time_group_condition, " \
+ "@time_group_value, @dims_group, @data_source)"
+
+void sql_alert_store_config(RRD_ALERT_PROTOTYPE *ap __maybe_unused)
+{
+ static __thread sqlite3_stmt *res = NULL;
+ int param = 0;
+
+ if (!PREPARE_COMPILED_STATEMENT(db_meta, SQL_STORE_ALERT_CONFIG_HASH, &res))
+ return;
+
+ BUFFER *buf = buffer_create(128, NULL);
+
+ SQLITE_BIND_FAIL(
+ done, sqlite3_bind_blob(res, ++param, &ap->config.hash_id, sizeof(ap->config.hash_id), SQLITE_STATIC));
+
+ if (ap->match.is_template) {
+ SQLITE_BIND_FAIL(done, SQLITE3_BIND_STRING_OR_NULL(res, ++param, NULL));
+ SQLITE_BIND_FAIL(done, SQLITE3_BIND_STRING_OR_NULL(res, ++param, ap->config.name));
+ SQLITE_BIND_FAIL(done, SQLITE3_BIND_STRING_OR_NULL(res, ++param, ap->match.on.context));
+ }
+ else {
+ SQLITE_BIND_FAIL(done, SQLITE3_BIND_STRING_OR_NULL(res, ++param, ap->config.name));
+ SQLITE_BIND_FAIL(done, SQLITE3_BIND_STRING_OR_NULL(res, ++param, NULL));
+ SQLITE_BIND_FAIL(done, SQLITE3_BIND_STRING_OR_NULL(res, ++param, ap->match.on.chart));
+ }
+
+ SQLITE_BIND_FAIL(done, SQLITE3_BIND_STRING_OR_NULL(res, ++param, ap->config.classification));
+ SQLITE_BIND_FAIL(done, SQLITE3_BIND_STRING_OR_NULL(res, ++param, ap->config.component));
+ SQLITE_BIND_FAIL(done, SQLITE3_BIND_STRING_OR_NULL(res, ++param, ap->config.type));
+ SQLITE_BIND_FAIL(done, SQLITE3_BIND_STRING_OR_NULL(res, ++param, NULL)); // lookup
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int(res, ++param, ap->config.update_every));
+ SQLITE_BIND_FAIL(done, SQLITE3_BIND_STRING_OR_NULL(res, ++param, ap->config.units));
+
+ if (ap->config.calculation)
+ SQLITE_BIND_FAIL(done, sqlite3_bind_text(res, ++param, expression_source(ap->config.calculation), -1, SQLITE_STATIC));
+ else
+ SQLITE_BIND_FAIL(done,sqlite3_bind_null(res, ++param));
+
+ NETDATA_DOUBLE nan_value = NAN;
+ SQLITE_BIND_FAIL(done, sqlite3_bind_double(res, ++param, nan_value));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_double(res, ++param, nan_value));
+
+ if (ap->config.warning)
+ SQLITE_BIND_FAIL(done, sqlite3_bind_text(res, ++param, expression_source(ap->config.warning), -1, SQLITE_STATIC));
+ else
+ SQLITE_BIND_FAIL(done, sqlite3_bind_null(res, ++param));
+
+ if (ap->config.critical)
+ SQLITE_BIND_FAIL(done, sqlite3_bind_text(res, ++param, expression_source(ap->config.critical), -1, SQLITE_STATIC));
+ else
+ SQLITE_BIND_FAIL(done, sqlite3_bind_null(res, ++param));
+
+ SQLITE_BIND_FAIL(done, SQLITE3_BIND_STRING_OR_NULL(res, ++param, ap->config.exec));
+ SQLITE_BIND_FAIL(done, SQLITE3_BIND_STRING_OR_NULL(res, ++param, ap->config.recipient));
+ SQLITE_BIND_FAIL(done, SQLITE3_BIND_STRING_OR_NULL(res, ++param, ap->config.info));
+
+ if (ap->config.delay_up_duration)
+ buffer_sprintf(buf, "up %ds ", ap->config.delay_up_duration);
+
+ if (ap->config.delay_down_duration)
+ buffer_sprintf(buf, "down %ds ", ap->config.delay_down_duration);
+
+ if (ap->config.delay_multiplier)
+ buffer_sprintf(buf, "multiplier %.1f ", ap->config.delay_multiplier);
+
+ if (ap->config.delay_max_duration)
+ buffer_sprintf(buf, "max %ds", ap->config.delay_max_duration);
+
+ // delay
+ SQLITE_BIND_FAIL(done, sqlite3_bind_text(res, ++param, buffer_tostring(buf), -1, SQLITE_STATIC));
+
+ if (ap->config.alert_action_options & ALERT_ACTION_OPTION_NO_CLEAR_NOTIFICATION)
+ SQLITE_BIND_FAIL(done, sqlite3_bind_text(res, ++param, "no-clear-notification", -1, SQLITE_STATIC));
+ else
+ SQLITE_BIND_FAIL(done, sqlite3_bind_null(res, ++param));
+
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int(res, ++param, ap->config.update_every));
+ SQLITE_BIND_FAIL(done, SQLITE3_BIND_STRING_OR_NULL(res, ++param, ap->match.host_labels));
+
+ if (ap->config.after) {
+ SQLITE_BIND_FAIL(done, SQLITE3_BIND_STRING_OR_NULL(res, ++param, ap->config.dimensions));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_text(res, ++param, time_grouping_id2txt(ap->config.time_group), -1, SQLITE_STATIC));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int(res, ++param, (int) RRDR_OPTIONS_REMOVE_OVERLAPPING(ap->config.options)));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (int) ap->config.after));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (int) ap->config.before));
+ } else {
+ SQLITE_BIND_FAIL(done, sqlite3_bind_null(res, ++param));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_null(res, ++param));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_null(res, ++param));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_null(res, ++param));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_null(res, ++param));
+ }
+
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int(res, ++param, ap->config.update_every));
+ SQLITE_BIND_FAIL(done, SQLITE3_BIND_STRING_OR_NULL(res, ++param, ap->config.source));
+ SQLITE_BIND_FAIL(done, SQLITE3_BIND_STRING_OR_NULL(res, ++param, ap->match.chart_labels));
+ SQLITE_BIND_FAIL(done, SQLITE3_BIND_STRING_OR_NULL(res, ++param, ap->config.summary));
+
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int(res, ++param, ap->config.time_group_condition));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_double(res, ++param, ap->config.time_group_value));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int(res, ++param, ap->config.dims_group));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int(res, ++param, ap->config.data_source));
+
+ param = 0;
+ int rc = execute_insert(res);
+ if (unlikely(rc != SQLITE_DONE))
+ error_report("Failed to store alert config, rc = %d", rc);
+
+done:
+ buffer_free(buf);
+ REPORT_BIND_FAIL(res, param);
+ SQLITE_RESET(res);
+}
+
+#define SQL_SELECT_HEALTH_LAST_EXECUTED_EVENT \
+ "SELECT hld.new_status FROM health_log hl, health_log_detail hld " \
+ "WHERE hl.host_id = @host_id AND hl.alarm_id = @alarm_id AND hld.unique_id != @unique_id AND hld.flags & @flags " \
+ "AND hl.health_log_id = hld.health_log_id ORDER BY hld.unique_id DESC LIMIT 1"
+
+int sql_health_get_last_executed_event(RRDHOST *host, ALARM_ENTRY *ae, RRDCALC_STATUS *last_executed_status)
+{
+ int ret = -1;
+ sqlite3_stmt *res = NULL;
+
+ if (!PREPARE_STATEMENT(db_meta, SQL_SELECT_HEALTH_LAST_EXECUTED_EVENT, &res))
+ return ret;
+
+ int param = 0;
+ SQLITE_BIND_FAIL(done, sqlite3_bind_blob(res, ++param, &host->host_uuid, sizeof(host->host_uuid), SQLITE_STATIC));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int(res, ++param, (int) ae->alarm_id));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int(res, ++param, (int) ae->unique_id));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int(res, ++param, (uint32_t) HEALTH_ENTRY_FLAG_EXEC_RUN));
+
+ param = 0;
+ ret = 0;
+ while (sqlite3_step_monitored(res) == SQLITE_ROW) {
+ *last_executed_status = (RRDCALC_STATUS) sqlite3_column_int(res, 0);
+ ret = 1;
+ }
+
+done:
+ REPORT_BIND_FAIL(res, param);
+ SQLITE_FINALIZE(res);
+ return ret;
+}
+
+#define SQL_SELECT_HEALTH_LOG \
+ "SELECT hld.unique_id, hld.alarm_id, hld.alarm_event_id, hl.config_hash_id, hld.updated_by_id, hld.updates_id, " \
+ "hld.when_key, hld.duration, hld.non_clear_duration, hld.flags, hld.exec_run_timestamp, " \
+ "hld.delay_up_to_timestamp, hl.name, hl.chart, hl.exec, hl.recipient, ah.source, " \
+ "hl.units, hld.info, hld.exec_code, hld.new_status, hld.old_status, hld.delay, hld.new_value, hld.old_value, " \
+ "hld.last_repeat, ah.class, ah.component, ah.type, hl.chart_context, hld.transition_id, hld.summary " \
+ "FROM health_log hl, alert_hash ah, health_log_detail hld WHERE hl.config_hash_id = ah.hash_id and " \
+ "hl.health_log_id = hld.health_log_id and hl.host_id = @host_id AND hld.unique_id > @after "
+
+void sql_health_alarm_log2json(RRDHOST *host, BUFFER *wb, time_t after, const char *chart)
+{
+ unsigned int max = host->health_log.max;
+
+ static __thread sqlite3_stmt *stmt_no_chart = NULL;
+ static __thread sqlite3_stmt *stmt_with_chart = NULL;
+
+ sqlite3_stmt **active_stmt;
+ sqlite3_stmt *stmt_query;
+
+ int rc;
+
+ active_stmt = chart ? &stmt_with_chart : &stmt_no_chart;
+
+ if (!*active_stmt) {
+
+ BUFFER *command = buffer_create(MAX_HEALTH_SQL_SIZE, NULL);
+ buffer_sprintf(command, SQL_SELECT_HEALTH_LOG);
+
+ if (chart)
+ buffer_strcat(command, " AND hl.chart = @chart ");
+
+ buffer_strcat(command, " ORDER BY hld.unique_id DESC LIMIT @limit");
+
+ rc = prepare_statement(db_meta, buffer_tostring(command), active_stmt);
+ buffer_free(command);
+
+ if (unlikely(rc != SQLITE_OK)) {
+ error_report("Failed to prepare statement SQL_SELECT_HEALTH_LOG");
+ return;
+ }
+ }
+
+ stmt_query = *active_stmt;
+
+ int param = 0;
+ rc = sqlite3_bind_blob(stmt_query, ++param, &host->host_uuid, sizeof(host->host_uuid), SQLITE_STATIC);
+ if (unlikely(rc != SQLITE_OK)) {
+ error_report("Failed to bind host_id for SQL_SELECT_HEALTH_LOG.");
+ goto finish;
+ }
+
+ rc = sqlite3_bind_int64(stmt_query, ++param, after);
+ if (unlikely(rc != SQLITE_OK)) {
+ error_report("Failed to bind after for SQL_SELECT_HEALTH_LOG.");
+ goto finish;
+ }
+
+ if (chart) {
+ rc = sqlite3_bind_text(stmt_query, ++param, chart, -1, SQLITE_STATIC);
+ if (unlikely(rc != SQLITE_OK)) {
+ error_report("Failed to bind after for SQL_SELECT_HEALTH_LOG.");
+ goto finish;
+ }
+ }
+
+ rc = sqlite3_bind_int64(stmt_query, ++param, max);
+ if (unlikely(rc != SQLITE_OK)) {
+ error_report("Failed to bind max lines for SQL_SELECT_HEALTH_LOG.");
+ goto finish;
+ }
+
+ buffer_json_initialize(wb, "\"", "\"", 0, false, BUFFER_JSON_OPTIONS_DEFAULT);
+ buffer_json_member_add_array(wb, NULL);
+
+ while (sqlite3_step(stmt_query) == SQLITE_ROW) {
+ char old_value_string[100 + 1];
+ char new_value_string[100 + 1];
+
+ char config_hash_id[UUID_STR_LEN];
+ uuid_unparse_lower(*((nd_uuid_t *)sqlite3_column_blob(stmt_query, 3)), config_hash_id);
+
+ char transition_id[UUID_STR_LEN] = {0};
+ if (sqlite3_column_type(stmt_query, 30) != SQLITE_NULL)
+ uuid_unparse_lower(*((nd_uuid_t *)sqlite3_column_blob(stmt_query, 30)), transition_id);
+
+ char *edit_command = sqlite3_column_bytes(stmt_query, 16) > 0 ?
+ health_edit_command_from_source((char *)sqlite3_column_text(stmt_query, 16)) :
+ strdupz("UNKNOWN=0=UNKNOWN");
+
+ buffer_json_add_array_item_object(wb); // this node
+
+ buffer_json_member_add_string_or_empty(wb, "hostname", rrdhost_hostname(host));
+ buffer_json_member_add_int64(wb, "utc_offset", (int64_t)host->utc_offset);
+ buffer_json_member_add_string_or_empty(wb, "timezone", rrdhost_abbrev_timezone(host));
+ buffer_json_member_add_int64(wb, "unique_id", (int64_t) sqlite3_column_int64(stmt_query, 0));
+ buffer_json_member_add_int64(wb, "alarm_id", (int64_t) sqlite3_column_int64(stmt_query, 1));
+ buffer_json_member_add_int64(wb, "alarm_event_id", (int64_t) sqlite3_column_int64(stmt_query, 2));
+ buffer_json_member_add_string_or_empty(wb, "config_hash_id", config_hash_id);
+ buffer_json_member_add_string_or_empty(wb, "transition_id", transition_id);
+ buffer_json_member_add_string_or_empty(wb, "name", (const char *) sqlite3_column_text(stmt_query, 12));
+ buffer_json_member_add_string_or_empty(wb, "chart", (const char *) sqlite3_column_text(stmt_query, 13));
+ buffer_json_member_add_string_or_empty(wb, "context", (const char *) sqlite3_column_text(stmt_query, 29));
+ buffer_json_member_add_string_or_empty(wb, "class", sqlite3_column_text(stmt_query, 26) ? (const char *) sqlite3_column_text(stmt_query, 26) : (char *) "Unknown");
+ buffer_json_member_add_string_or_empty(wb, "component", sqlite3_column_text(stmt_query, 27) ? (const char *) sqlite3_column_text(stmt_query, 27) : (char *) "Unknown");
+ buffer_json_member_add_string_or_empty(wb, "type", sqlite3_column_text(stmt_query, 28) ? (const char *) sqlite3_column_text(stmt_query, 28) : (char *) "Unknown");
+ buffer_json_member_add_boolean(wb, "processed", (sqlite3_column_int64(stmt_query, 9) & HEALTH_ENTRY_FLAG_PROCESSED));
+ buffer_json_member_add_boolean(wb, "updated", (sqlite3_column_int64(stmt_query, 9) & HEALTH_ENTRY_FLAG_UPDATED));
+ buffer_json_member_add_int64(wb, "exec_run", (int64_t)sqlite3_column_int64(stmt_query, 10));
+ buffer_json_member_add_boolean(wb, "exec_failed", (sqlite3_column_int64(stmt_query, 9) & HEALTH_ENTRY_FLAG_EXEC_FAILED));
+ buffer_json_member_add_string_or_empty(wb, "exec", sqlite3_column_text(stmt_query, 14) ? (const char *) sqlite3_column_text(stmt_query, 14) : string2str(host->health.health_default_exec));
+ buffer_json_member_add_string_or_empty(wb, "recipient", sqlite3_column_text(stmt_query, 15) ? (const char *) sqlite3_column_text(stmt_query, 15) : string2str(host->health.health_default_recipient));
+ buffer_json_member_add_int64(wb, "exec_code", sqlite3_column_int(stmt_query, 19));
+ buffer_json_member_add_string_or_empty(wb, "source", sqlite3_column_text(stmt_query, 16) ? (const char *) sqlite3_column_text(stmt_query, 16) : (char *) "Unknown");
+ buffer_json_member_add_string_or_empty(wb, "command", edit_command);
+ buffer_json_member_add_string_or_empty(wb, "units", (const char *) sqlite3_column_text(stmt_query, 17));
+ buffer_json_member_add_int64(wb, "when", (int64_t)sqlite3_column_int64(stmt_query, 6));
+ buffer_json_member_add_int64(wb, "duration", (int64_t)sqlite3_column_int64(stmt_query, 7));
+ buffer_json_member_add_int64(wb, "non_clear_duration", (int64_t)sqlite3_column_int64(stmt_query, 8));
+ buffer_json_member_add_string_or_empty(wb, "status", rrdcalc_status2string(sqlite3_column_int(stmt_query, 20)));
+ buffer_json_member_add_string_or_empty(wb, "old_status", rrdcalc_status2string(sqlite3_column_int(stmt_query, 21)));
+ buffer_json_member_add_int64(wb, "delay", sqlite3_column_int(stmt_query, 22));
+ buffer_json_member_add_int64(wb, "delay_up_to_timestamp",(int64_t)sqlite3_column_int64(stmt_query, 11));
+ buffer_json_member_add_int64(wb, "updated_by_id", (unsigned int)sqlite3_column_int64(stmt_query, 4));
+ buffer_json_member_add_int64(wb, "updates_id", (unsigned int)sqlite3_column_int64(stmt_query, 5));
+ buffer_json_member_add_string_or_empty(wb, "value_string", sqlite3_column_type(stmt_query, 23) == SQLITE_NULL ? "-" :
+ format_value_and_unit(new_value_string, 100, sqlite3_column_double(stmt_query, 23), (char *) sqlite3_column_text(stmt_query, 17), -1));
+ buffer_json_member_add_string_or_empty(wb, "old_value_string", sqlite3_column_type(stmt_query, 24) == SQLITE_NULL ? "-" :
+ format_value_and_unit(old_value_string, 100, sqlite3_column_double(stmt_query, 24), (char *) sqlite3_column_text(stmt_query, 17), -1));
+ buffer_json_member_add_int64(wb, "last_repeat", (int64_t)sqlite3_column_int64(stmt_query, 25));
+ buffer_json_member_add_boolean(wb, "silenced", (sqlite3_column_int64(stmt_query, 9) & HEALTH_ENTRY_FLAG_SILENCED));
+ buffer_json_member_add_string_or_empty(wb, "summary", (const char *) sqlite3_column_text(stmt_query, 31));
+ buffer_json_member_add_string_or_empty(wb, "info", (const char *) sqlite3_column_text(stmt_query, 18));
+ buffer_json_member_add_boolean(wb, "no_clear_notification",(sqlite3_column_int64(stmt_query, 9) & HEALTH_ENTRY_FLAG_NO_CLEAR_NOTIFICATION));
+
+ if (sqlite3_column_type(stmt_query, 23) == SQLITE_NULL)
+ buffer_json_member_add_string(wb, "value", NULL);
+ else
+ buffer_json_member_add_double(wb, "value", sqlite3_column_double(stmt_query, 23));
+
+ if (sqlite3_column_type(stmt_query, 24) == SQLITE_NULL)
+ buffer_json_member_add_string(wb, "old_value", NULL);
+ else
+ buffer_json_member_add_double(wb, "old_value", sqlite3_column_double(stmt_query, 23));
+
+ freez(edit_command);
+
+ buffer_json_object_close(wb);
+ }
+
+ buffer_json_array_close(wb);
+ buffer_json_finalize(wb);
+
+finish:
+ SQLITE_RESET(stmt_query);
+}
+
+#define SQL_COPY_HEALTH_LOG(table) "INSERT OR IGNORE INTO health_log (host_id, alarm_id, config_hash_id, name, chart, family, exec, recipient, units, chart_context) SELECT ?1, alarm_id, config_hash_id, name, chart, family, exec, recipient, units, chart_context from %s", table
+#define SQL_COPY_HEALTH_LOG_DETAIL(table) "INSERT INTO health_log_detail (unique_id, alarm_id, alarm_event_id, updated_by_id, updates_id, when_key, duration, non_clear_duration, flags, exec_run_timestamp, delay_up_to_timestamp, info, exec_code, new_status, old_status, delay, new_value, old_value, last_repeat, transition_id, global_id, host_id) SELECT unique_id, alarm_id, alarm_event_id, updated_by_id, updates_id, when_key, duration, non_clear_duration, flags, exec_run_timestamp, delay_up_to_timestamp, info, exec_code, new_status, old_status, delay, new_value, old_value, last_repeat, transition_id, now_usec(1), ?1 from %s", table
+#define SQL_UPDATE_HEALTH_LOG_DETAIL_TRANSITION_ID "update health_log_detail set transition_id = uuid_random() where transition_id is null"
+#define SQL_UPDATE_HEALTH_LOG_DETAIL_HEALTH_LOG_ID "update health_log_detail set health_log_id = (select health_log_id from health_log where host_id = ?1 and alarm_id = health_log_detail.alarm_id) where health_log_id is null and host_id = ?2"
+#define SQL_UPDATE_HEALTH_LOG_LAST_TRANSITION_ID "update health_log set last_transition_id = (select transition_id from health_log_detail where health_log_id = health_log.health_log_id and alarm_id = health_log.alarm_id group by (alarm_id) having max(alarm_event_id)) where host_id = ?1"
+int health_migrate_old_health_log_table(char *table) {
+ if (!table)
+ return 0;
+
+ //table should contain guid. We need to
+ //keep it in the new table along with it's data
+ //health_log_XXXXXXXX_XXXX_XXXX_XXXX_XXXXXXXXXXXX
+ if (strnlen(table, 46) != 46) {
+ return 0;
+ }
+
+ char *uuid_from_table = strdupz(table + 11);
+ nd_uuid_t uuid;
+ if (uuid_parse_fix(uuid_from_table, uuid)) {
+ freez(uuid_from_table);
+ return 0;
+ }
+
+ int rc;
+ char command[MAX_HEALTH_SQL_SIZE + 1];
+ sqlite3_stmt *res = NULL;
+ snprintfz(command, sizeof(command) - 1, SQL_COPY_HEALTH_LOG(table));
+ rc = sqlite3_prepare_v2(db_meta, command, -1, &res, 0);
+ if (unlikely(rc != SQLITE_OK)) {
+ error_report("Failed to prepare statement to copy health log, rc = %d", rc);
+ freez(uuid_from_table);
+ return 0;
+ }
+
+ rc = sqlite3_bind_blob(res, 1, &uuid, sizeof(uuid), SQLITE_STATIC);
+ if (unlikely(rc != SQLITE_OK)) {
+ SQLITE_FINALIZE(res);
+ freez(uuid_from_table);
+ return 0;
+ }
+
+ rc = execute_insert(res);
+ if (unlikely(rc != SQLITE_DONE)) {
+ error_report("Failed to execute SQL_COPY_HEALTH_LOG, rc = %d", rc);
+ SQLITE_FINALIZE(res);
+ freez(uuid_from_table);
+ }
+
+ //detail
+ snprintfz(command, sizeof(command) - 1, SQL_COPY_HEALTH_LOG_DETAIL(table));
+ rc = sqlite3_prepare_v2(db_meta, command, -1, &res, 0);
+ if (unlikely(rc != SQLITE_OK)) {
+ error_report("Failed to prepare statement to copy health log detail, rc = %d", rc);
+ return 0;
+ }
+
+ rc = sqlite3_bind_blob(res, 1, &uuid, sizeof(uuid), SQLITE_STATIC);
+ if (unlikely(rc != SQLITE_OK)) {
+ SQLITE_FINALIZE(res);
+ return 0;
+ }
+
+ rc = execute_insert(res);
+ if (unlikely(rc != SQLITE_DONE)) {
+ error_report("Failed to execute SQL_COPY_HEALTH_LOG_DETAIL, rc = %d", rc);
+ SQLITE_FINALIZE(res);
+ return 0;
+ }
+
+ //update transition ids
+ rc = sqlite3_prepare_v2(db_meta, SQL_UPDATE_HEALTH_LOG_DETAIL_TRANSITION_ID, -1, &res, 0);
+ if (unlikely(rc != SQLITE_OK)) {
+ error_report("Failed to prepare statement to update health log detail with transition ids, rc = %d", rc);
+ return 0;
+ }
+
+ rc = execute_insert(res);
+ if (unlikely(rc != SQLITE_DONE)) {
+ error_report("Failed to execute SQL_UPDATE_HEALTH_LOG_DETAIL_TRANSITION_ID, rc = %d", rc);
+ SQLITE_FINALIZE(res);
+ return 0;
+ }
+
+ //update health_log_id
+ rc = sqlite3_prepare_v2(db_meta, SQL_UPDATE_HEALTH_LOG_DETAIL_HEALTH_LOG_ID, -1, &res, 0);
+ if (unlikely(rc != SQLITE_OK)) {
+ error_report("Failed to prepare statement to update health log detail with health log ids, rc = %d", rc);
+ return 0;
+ }
+
+ rc = sqlite3_bind_blob(res, 1, &uuid, sizeof(uuid), SQLITE_STATIC);
+ if (unlikely(rc != SQLITE_OK)) {
+ SQLITE_FINALIZE(res);
+ return 0;
+ }
+
+ rc = sqlite3_bind_blob(res, 2, &uuid, sizeof(uuid), SQLITE_STATIC);
+ if (unlikely(rc != SQLITE_OK)) {
+ SQLITE_FINALIZE(res);
+ return 0;
+ }
+
+ rc = execute_insert(res);
+ if (unlikely(rc != SQLITE_DONE)) {
+ error_report("Failed to execute SQL_UPDATE_HEALTH_LOG_DETAIL_HEALTH_LOG_ID, rc = %d", rc);
+ SQLITE_FINALIZE(res);
+ }
+
+ //update last transition id
+ rc = sqlite3_prepare_v2(db_meta, SQL_UPDATE_HEALTH_LOG_LAST_TRANSITION_ID, -1, &res, 0);
+ if (unlikely(rc != SQLITE_OK)) {
+ error_report("Failed to prepare statement to update health log with last transition id, rc = %d", rc);
+ return 0;
+ }
+
+ rc = sqlite3_bind_blob(res, 1, &uuid, sizeof(uuid), SQLITE_STATIC);
+ if (unlikely(rc != SQLITE_OK)) {
+ SQLITE_FINALIZE(res);
+ return 0;
+ }
+
+ rc = execute_insert(res);
+ if (unlikely(rc != SQLITE_DONE)) {
+ error_report("Failed to execute SQL_UPDATE_HEALTH_LOG_LAST_TRANSITION_ID, rc = %d", rc);
+ SQLITE_FINALIZE(res);
+ }
+
+ return 1;
+}
+
+#define SQL_GET_EVENT_ID \
+ "SELECT MAX(alarm_event_id)+1 FROM health_log_detail WHERE health_log_id = @health_log_id AND alarm_id = @alarm_id"
+
+static uint32_t get_next_alarm_event_id(uint64_t health_log_id, uint32_t alarm_id)
+{
+ int rc;
+ sqlite3_stmt *res = NULL;
+ uint32_t next_event_id = alarm_id;
+
+ rc = sqlite3_prepare_v2(db_meta, SQL_GET_EVENT_ID, -1, &res, 0);
+ if (rc != SQLITE_OK) {
+ error_report("Failed to prepare statement when trying to get an event id");
+ return alarm_id;
+ }
+
+ int param = 0;
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (sqlite3_int64) health_log_id));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (sqlite3_int64) alarm_id));
+
+ param = 0;
+ while (sqlite3_step_monitored(res) == SQLITE_ROW)
+ next_event_id = (uint32_t)sqlite3_column_int64(res, 0);
+
+done:
+ REPORT_BIND_FAIL(res, param);
+ SQLITE_FINALIZE(res);
+ return next_event_id;
+}
+
+#define SQL_GET_ALARM_ID \
+ "SELECT alarm_id, health_log_id FROM health_log WHERE host_id = @host_id AND chart = @chart AND name = @name"
+
+uint32_t sql_get_alarm_id(RRDHOST *host, STRING *chart, STRING *name, uint32_t *next_event_id)
+{
+ sqlite3_stmt *res = NULL;
+ uint32_t alarm_id = 0;
+ uint64_t health_log_id = 0;
+
+ if (!PREPARE_STATEMENT(db_meta, SQL_GET_ALARM_ID, &res))
+ return alarm_id;
+
+ int param = 0;
+ SQLITE_BIND_FAIL(done, sqlite3_bind_blob(res, ++param, &host->host_uuid, sizeof(host->host_uuid), SQLITE_STATIC));
+ SQLITE_BIND_FAIL(done, SQLITE3_BIND_STRING_OR_NULL(res, ++param, chart));
+ SQLITE_BIND_FAIL(done, SQLITE3_BIND_STRING_OR_NULL(res, ++param, name));
+
+ param = 0;
+ while (sqlite3_step_monitored(res) == SQLITE_ROW) {
+ alarm_id = (uint32_t)sqlite3_column_int64(res, 0);
+ health_log_id = (uint64_t)sqlite3_column_int64(res, 1);
+ }
+
+ if (alarm_id)
+ *next_event_id = get_next_alarm_event_id(health_log_id, alarm_id);
+done:
+ REPORT_BIND_FAIL(res, param);
+ SQLITE_FINALIZE(res);
+ return alarm_id;
+}
+
+#define SQL_GET_ALARM_ID_FROM_TRANSITION_ID \
+ "SELECT hld.alarm_id, hl.host_id, hl.chart_context FROM health_log_detail hld, health_log hl " \
+ "WHERE hld.transition_id = @transition_id " \
+ "AND hld.health_log_id = hl.health_log_id"
+
+bool sql_find_alert_transition(
+ const char *transition,
+ void (*cb)(const char *machine_guid, const char *context, time_t alert_id, void *data),
+ void *data)
+{
+ static __thread sqlite3_stmt *res = NULL;
+
+ char machine_guid[UUID_STR_LEN];
+
+ nd_uuid_t transition_uuid;
+ if (uuid_parse(transition, transition_uuid))
+ return false;
+
+ if (!PREPARE_COMPILED_STATEMENT(db_meta, SQL_GET_ALARM_ID_FROM_TRANSITION_ID, &res))
+ return false;
+
+ bool ok = false;
+
+ int param = 0;
+ SQLITE_BIND_FAIL(done, sqlite3_bind_blob(res, ++param, &transition_uuid, sizeof(transition_uuid), SQLITE_STATIC));
+
+ param = 0;
+ while (sqlite3_step_monitored(res) == SQLITE_ROW) {
+ ok = true;
+ uuid_unparse_lower(*(nd_uuid_t *) sqlite3_column_blob(res, 1), machine_guid);
+ cb(machine_guid, (const char *) sqlite3_column_text(res, 2), sqlite3_column_int(res, 0), data);
+ }
+
+done:
+ REPORT_BIND_FAIL(res, param);
+ SQLITE_RESET(res);
+ return ok;
+}
+
+#define SQL_BUILD_ALERT_TRANSITION "CREATE TEMP TABLE IF NOT EXISTS v_%p (host_id blob)"
+
+#define SQL_POPULATE_TEMP_ALERT_TRANSITION_TABLE "INSERT INTO v_%p (host_id) VALUES (@host_id)"
+
+#define SQL_SEARCH_ALERT_TRANSITION_SELECT \
+ "SELECT h.host_id, h.alarm_id, h.config_hash_id, h.name, h.chart, h.chart_name, h.family, h.recipient, h.units, h.exec, " \
+ "h.chart_context, d.when_key, d.duration, d.non_clear_duration, d.flags, d.delay_up_to_timestamp, " \
+ "d.info, d.exec_code, d.new_status, d.old_status, d.delay, d.new_value, d.old_value, d.last_repeat, " \
+ "d.transition_id, d.global_id, ah.class, ah.type, ah.component, d.exec_run_timestamp, d.summary"
+
+#define SQL_SEARCH_ALERT_TRANSITION_COMMON_WHERE "h.config_hash_id = ah.hash_id AND h.health_log_id = d.health_log_id"
+
+#define SQL_SEARCH_ALERT_TRANSITION \
+ SQL_SEARCH_ALERT_TRANSITION_SELECT \
+ " FROM health_log h, health_log_detail d, v_%p t, alert_hash ah " \
+ " WHERE h.host_id = t.host_id AND " SQL_SEARCH_ALERT_TRANSITION_COMMON_WHERE \
+ " AND ( d.new_status > 2 OR d.old_status > 2 ) AND d.global_id BETWEEN @after AND @before "
+
+#define SQL_SEARCH_ALERT_TRANSITION_DIRECT \
+ SQL_SEARCH_ALERT_TRANSITION_SELECT " FROM health_log h, health_log_detail d, alert_hash ah " \
+ " WHERE " SQL_SEARCH_ALERT_TRANSITION_COMMON_WHERE \
+ " AND transition_id = @transition "
+
+void sql_alert_transitions(
+ DICTIONARY *nodes,
+ time_t after,
+ time_t before,
+ const char *context,
+ const char *alert_name,
+ const char *transition,
+ void (*cb)(struct sql_alert_transition_data *, void *),
+ void *data,
+ bool debug __maybe_unused)
+{
+ nd_uuid_t transition_uuid;
+ char sql[512];
+ int rc;
+ sqlite3_stmt *res = NULL;
+ BUFFER *command = NULL;
+
+ if (unlikely(!nodes))
+ return;
+
+ int param = 0;
+ if (transition) {
+ if (uuid_parse(transition, transition_uuid)) {
+ error_report("Invalid transition given %s", transition);
+ return;
+ }
+
+ if (!PREPARE_STATEMENT(db_meta, SQL_SEARCH_ALERT_TRANSITION_DIRECT, &res))
+ goto done_only_drop;
+
+ SQLITE_BIND_FAIL(done, sqlite3_bind_blob(res, ++param, &transition_uuid, sizeof(transition_uuid), SQLITE_STATIC));
+ goto run_query;
+ }
+
+ snprintfz(sql, sizeof(sql) - 1, SQL_BUILD_ALERT_TRANSITION, nodes);
+ rc = db_execute(db_meta, sql);
+ if (rc)
+ return;
+
+ snprintfz(sql, sizeof(sql) - 1, SQL_POPULATE_TEMP_ALERT_TRANSITION_TABLE, nodes);
+
+ // Prepare statement to add things
+ rc = sqlite3_prepare_v2(db_meta, sql, -1, &res, 0);
+ if (unlikely(rc != SQLITE_OK)) {
+ error_report("Failed to prepare statement to INSERT into v_%p", nodes);
+ goto done_only_drop;
+ }
+
+ void *t;
+ dfe_start_read(nodes, t) {
+ nd_uuid_t host_uuid;
+ uuid_parse( t_dfe.name, host_uuid);
+
+ rc = sqlite3_bind_blob(res, 1, &host_uuid, sizeof(host_uuid), SQLITE_STATIC);
+ if (unlikely(rc != SQLITE_OK))
+ error_report("Failed to bind host_id parameter.");
+
+ rc = sqlite3_step_monitored(res);
+ if (rc != SQLITE_DONE)
+ error_report("Error while populating temp table");
+
+ SQLITE_RESET(res);
+ }
+ dfe_done(t);
+
+ SQLITE_FINALIZE(res);
+
+ command = buffer_create(MAX_HEALTH_SQL_SIZE, NULL);
+
+ buffer_sprintf(command, SQL_SEARCH_ALERT_TRANSITION, nodes);
+
+ if (context)
+ buffer_sprintf(command, " AND h.chart_context = @context");
+
+ if (alert_name)
+ buffer_sprintf(command, " AND h.name = @alert_name");
+
+ buffer_strcat(command, " ORDER BY d.global_id DESC");
+
+ rc = sqlite3_prepare_v2(db_meta, buffer_tostring(command), -1, &res, 0);
+ if (unlikely(rc != SQLITE_OK)) {
+ error_report("Failed to prepare statement sql_alert_transitions");
+ goto done_only_drop;
+ }
+
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (sqlite3_int64)(after * USEC_PER_SEC)));
+ SQLITE_BIND_FAIL(done, sqlite3_bind_int64(res, ++param, (sqlite3_int64)(before * USEC_PER_SEC)));
+
+ if (context)
+ SQLITE_BIND_FAIL(done, sqlite3_bind_text(res, ++param, context, -1, SQLITE_STATIC));
+
+ if (alert_name)
+ SQLITE_BIND_FAIL(done, sqlite3_bind_text(res, ++param, alert_name, -1, SQLITE_STATIC));
+
+run_query:;
+
+ struct sql_alert_transition_data atd = {0 };
+
+ param = 0;
+ while (sqlite3_step(res) == SQLITE_ROW) {
+ atd.host_id = (nd_uuid_t *) sqlite3_column_blob(res, 0);
+ atd.alarm_id = sqlite3_column_int64(res, 1);
+ atd.config_hash_id = (nd_uuid_t *)sqlite3_column_blob(res, 2);
+ atd.alert_name = (const char *) sqlite3_column_text(res, 3);
+ atd.chart = (const char *) sqlite3_column_text(res, 4);
+ atd.chart_name = (const char *) sqlite3_column_text(res, 5);
+ atd.family = (const char *) sqlite3_column_text(res, 6);
+ atd.recipient = (const char *) sqlite3_column_text(res, 7);
+ atd.units = (const char *) sqlite3_column_text(res, 8);
+ atd.exec = (const char *) sqlite3_column_text(res, 9);
+ atd.chart_context = (const char *) sqlite3_column_text(res, 10);
+ atd.when_key = sqlite3_column_int64(res, 11);
+ atd.duration = sqlite3_column_int64(res, 12);
+ atd.non_clear_duration = sqlite3_column_int64(res, 13);
+ atd.flags = sqlite3_column_int64(res, 14);
+ atd.delay_up_to_timestamp = sqlite3_column_int64(res, 15);
+ atd.info = (const char *) sqlite3_column_text(res, 16);
+ atd.exec_code = sqlite3_column_int(res, 17);
+ atd.new_status = sqlite3_column_int(res, 18);
+ atd.old_status = sqlite3_column_int(res, 19);
+ atd.delay = (int) sqlite3_column_int(res, 20);
+ atd.new_value = (NETDATA_DOUBLE) sqlite3_column_double(res, 21);
+ atd.old_value = (NETDATA_DOUBLE) sqlite3_column_double(res, 22);
+ atd.last_repeat = sqlite3_column_int64(res, 23);
+ atd.transition_id = (nd_uuid_t *) sqlite3_column_blob(res, 24);
+ atd.global_id = sqlite3_column_int64(res, 25);
+ atd.classification = (const char *) sqlite3_column_text(res, 26);
+ atd.type = (const char *) sqlite3_column_text(res, 27);
+ atd.component = (const char *) sqlite3_column_text(res, 28);
+ atd.exec_run_timestamp = sqlite3_column_int64(res, 29);
+ atd.summary = (const char *) sqlite3_column_text(res, 30);
+
+ cb(&atd, data);
+ }
+
+done:
+ REPORT_BIND_FAIL(res, param);
+ SQLITE_FINALIZE(res);
+
+done_only_drop:
+ if (likely(!transition)) {
+ (void)snprintfz(sql, sizeof(sql) - 1, "DROP TABLE IF EXISTS v_%p", nodes);
+ (void)db_execute(db_meta, sql);
+ buffer_free(command);
+ }
+}
+
+#define SQL_BUILD_CONFIG_TARGET_LIST "CREATE TEMP TABLE IF NOT EXISTS c_%p (hash_id blob)"
+
+#define SQL_POPULATE_TEMP_CONFIG_TARGET_TABLE "INSERT INTO c_%p (hash_id) VALUES (@hash_id)"
+
+#define SQL_SEARCH_CONFIG_LIST \
+ "SELECT ah.hash_id, alarm, template, on_key, class, component, type, lookup, every, " \
+ " units, calc, families, green, red, warn, crit, " \
+ " exec, to_key, info, delay, options, repeat, host_labels, p_db_lookup_dimensions, p_db_lookup_method, " \
+ " p_db_lookup_options, p_db_lookup_after, p_db_lookup_before, p_update_every, source, chart_labels, summary, " \
+ " time_group_condition, time_group_value, dims_group, data_source " \
+ " FROM alert_hash ah, c_%p t where ah.hash_id = t.hash_id"
+
+int sql_get_alert_configuration(
+ DICTIONARY *configs,
+ void (*cb)(struct sql_alert_config_data *, void *),
+ void *data,
+ bool debug __maybe_unused)
+{
+ int added = -1;
+ char sql[512];
+ int rc;
+ sqlite3_stmt *res = NULL;
+ BUFFER *command = NULL;
+
+ if (unlikely(!configs))
+ return added;
+
+ snprintfz(sql, sizeof(sql) - 1, SQL_BUILD_CONFIG_TARGET_LIST, configs);
+ rc = db_execute(db_meta, sql);
+ if (rc)
+ return added;
+
+ snprintfz(sql, sizeof(sql) - 1, SQL_POPULATE_TEMP_CONFIG_TARGET_TABLE, configs);
+
+ // Prepare statement to add things
+ rc = sqlite3_prepare_v2(db_meta, sql, -1, &res, 0);
+ if (unlikely(rc != SQLITE_OK)) {
+ error_report("Failed to prepare statement to INSERT into c_%p", configs);
+ goto fail_only_drop;
+ }
+
+ void *t;
+ dfe_start_read(configs, t) {
+ nd_uuid_t hash_id;
+ uuid_parse( t_dfe.name, hash_id);
+
+ rc = sqlite3_bind_blob(res, 1, &hash_id, sizeof(hash_id), SQLITE_STATIC);
+ if (unlikely(rc != SQLITE_OK))
+ error_report("Failed to bind host_id parameter.");
+
+ rc = sqlite3_step_monitored(res);
+ if (rc != SQLITE_DONE)
+ error_report("Error while populating temp table");
+
+ SQLITE_RESET(res);
+ }
+ dfe_done(t);
+
+ SQLITE_FINALIZE(res);
+
+ command = buffer_create(MAX_HEALTH_SQL_SIZE, NULL);
+
+ buffer_sprintf(command, SQL_SEARCH_CONFIG_LIST, configs);
+
+ rc = sqlite3_prepare_v2(db_meta, buffer_tostring(command), -1, &res, 0);
+ if (unlikely(rc != SQLITE_OK)) {
+ error_report("Failed to prepare statement sql_get_alert_configuration");
+ goto fail_only_drop;
+ }
+
+ struct sql_alert_config_data acd = {0 };
+
+ added = 0;
+ int param;
+ while (sqlite3_step(res) == SQLITE_ROW) {
+ param = 0;
+ acd.config_hash_id = (nd_uuid_t *) sqlite3_column_blob(res, param++);
+ acd.name = (const char *) sqlite3_column_text(res, param++);
+ acd.selectors.on_template = (const char *) sqlite3_column_text(res, param++);
+ acd.selectors.on_key = (const char *) sqlite3_column_text(res, param++);
+ acd.classification = (const char *) sqlite3_column_text(res, param++);
+ acd.component = (const char *) sqlite3_column_text(res, param++);
+ acd.type = (const char *) sqlite3_column_text(res, param++);
+ acd.value.db.lookup = (const char *) sqlite3_column_text(res, param++);
+ acd.value.every = (const char *) sqlite3_column_text(res, param++);
+ acd.value.units = (const char *) sqlite3_column_text(res, param++);
+ acd.value.calc = (const char *) sqlite3_column_text(res, param++);
+ acd.selectors.families = (const char *) sqlite3_column_text(res, param++);
+ acd.status.green = (const char *) sqlite3_column_text(res, param++);
+ acd.status.red = (const char *) sqlite3_column_text(res, param++);
+ acd.status.warn = (const char *) sqlite3_column_text(res, param++);
+ acd.status.crit = (const char *) sqlite3_column_text(res, param++);
+ acd.notification.exec = (const char *) sqlite3_column_text(res, param++);
+ acd.notification.to_key = (const char *) sqlite3_column_text(res, param++);
+ acd.info = (const char *) sqlite3_column_text(res, param++);
+ acd.notification.delay = (const char *) sqlite3_column_text(res, param++);
+ acd.notification.options = (const char *) sqlite3_column_text(res, param++);
+ acd.notification.repeat = (const char *) sqlite3_column_text(res, param++);
+ acd.selectors.host_labels = (const char *) sqlite3_column_text(res, param++);
+ acd.value.db.dimensions = (const char *) sqlite3_column_text(res, param++);
+ acd.value.db.method = (const char *) sqlite3_column_text(res, param++);
+ acd.value.db.options = (uint32_t) sqlite3_column_int(res, param++);
+ acd.value.db.after = (int32_t) sqlite3_column_int(res, param++);
+ acd.value.db.before = (int32_t) sqlite3_column_int(res, param++);
+ acd.value.update_every = (int32_t) sqlite3_column_int(res, param++);
+ acd.source = (const char *) sqlite3_column_text(res, param++);
+ acd.selectors.chart_labels = (const char *) sqlite3_column_text(res, param++);
+ acd.summary = (const char *) sqlite3_column_text(res, param++);
+ acd.value.db.time_group_condition =(int32_t) sqlite3_column_int(res, param++);
+ acd.value.db.time_group_value = sqlite3_column_double(res, param++);
+ acd.value.db.dims_group = (int32_t) sqlite3_column_int(res, param++);
+ acd.value.db.data_source = (int32_t) sqlite3_column_int(res, param++);
+
+ cb(&acd, data);
+ added++;
+ }
+
+ SQLITE_FINALIZE(res);
+
+fail_only_drop:
+ (void)snprintfz(sql, sizeof(sql) - 1, "DROP TABLE IF EXISTS c_%p", configs);
+ (void)db_execute(db_meta, sql);
+ buffer_free(command);
+ return added;
+}