Server IP : 184.107.3.203 / Your IP : 216.73.216.51 Web Server : Apache System : Linux dedicated2.avenfashion.com.ph 4.18.0-553.40.1.el8_10.x86_64 #1 SMP Mon Feb 10 12:11:18 EST 2025 x86_64 User : adminteladeoro ( 1015) PHP Version : 8.2.28 Disable Function : exec,passthru,shell_exec,system MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON Directory (0755) : /usr/lib/python3.6/site-packages/sos/report/plugins/ |
[ Home ] | [ C0mmand ] | [ Upload File ] |
---|
# This file is part of the sos project: https://github.com/sosreport/sos # # This copyrighted material is made available to anyone wishing to use, # modify, copy, or redistribute it subject to the terms and conditions of # version 2 of the GNU General Public License. # # See the LICENSE file in the source distribution for further information. from sos.report.plugins import Plugin, RedHatPlugin, PluginOpt class Veritas(Plugin, RedHatPlugin): short_desc = 'Veritas software' plugin_name = 'veritas' profiles = ('cluster', 'storage') # Information about VRTSexplorer obtained from # http://seer.entsupport.symantec.com/docs/243150.htm option_list = [ PluginOpt('script', default='/opt/VRTSspt/VRTSexplorer', desc='Path to VRTSexploer script') ] def check_enabled(self): return self.path_isfile(self.get_option("script")) def setup(self): """ interface with vrtsexplorer to capture veritas related data """ ret = self.exec_cmd(self.get_option("script")) if ret['status'] == 0: tarfile = "" for line in ret['output']: line = line.strip() tarfile = self.do_regex_find_all(r"ftp (.*tar.gz)", line) if len(tarfile) == 1: self.add_copy_spec(tarfile[0]) # vim: set et ts=4 sw=4 :