2017-10-27 05:54:45 -04:00
|
|
|
if (Rails.env.production? && SiteSetting.logging_provider == 'lograge') || ENV["ENABLE_LOGRAGE"]
|
2017-10-27 10:54:50 -04:00
|
|
|
require 'lograge'
|
|
|
|
|
2017-11-14 20:02:34 -05:00
|
|
|
if Rails.configuration.multisite
|
|
|
|
Rails.logger.formatter = ActiveSupport::Logger::SimpleFormatter.new
|
|
|
|
end
|
|
|
|
|
2017-10-27 05:54:45 -04:00
|
|
|
Rails.application.configure do
|
|
|
|
config.lograge.enabled = true
|
|
|
|
|
2018-02-20 23:19:59 -05:00
|
|
|
Lograge.ignore(lambda do |event|
|
|
|
|
# this is our hijack magic status,
|
|
|
|
# no point logging this cause we log again
|
|
|
|
# direct from hijack
|
|
|
|
event.payload[:status] == 418
|
|
|
|
end)
|
|
|
|
|
2017-12-07 19:30:48 -05:00
|
|
|
config.lograge.custom_payload do |controller|
|
|
|
|
begin
|
2017-12-12 04:22:38 -05:00
|
|
|
username =
|
|
|
|
begin
|
|
|
|
controller.current_user&.username
|
|
|
|
rescue Discourse::InvalidAccess
|
|
|
|
nil
|
|
|
|
end
|
|
|
|
|
|
|
|
ip =
|
|
|
|
begin
|
|
|
|
controller.request.remote_ip
|
|
|
|
rescue ActionDispatch::RemoteIp::IpSpoofAttackError
|
|
|
|
nil
|
|
|
|
end
|
|
|
|
|
2017-12-07 19:30:48 -05:00
|
|
|
{
|
2017-12-12 04:22:38 -05:00
|
|
|
ip: ip,
|
|
|
|
username: username,
|
2017-12-07 19:30:48 -05:00
|
|
|
}
|
|
|
|
rescue => e
|
|
|
|
Rails.logger.warn("Failed to append custom payload: #{e.message}\n#{e.backtrace.join("\n")}")
|
|
|
|
{}
|
|
|
|
end
|
|
|
|
end
|
2017-12-04 22:51:03 -05:00
|
|
|
|
2017-10-27 05:54:45 -04:00
|
|
|
config.lograge.custom_options = lambda do |event|
|
2017-12-07 19:30:48 -05:00
|
|
|
begin
|
|
|
|
exceptions = %w(controller action format id)
|
2017-10-27 10:54:50 -04:00
|
|
|
|
2017-12-07 19:30:48 -05:00
|
|
|
params = event.payload[:params].except(*exceptions)
|
|
|
|
params[:files].map!(&:headers) if params[:files]
|
2017-10-31 20:37:11 -04:00
|
|
|
|
2017-12-07 19:30:48 -05:00
|
|
|
output = {
|
|
|
|
params: params.to_query,
|
|
|
|
database: RailsMultisite::ConnectionManagement.current_db,
|
|
|
|
}
|
2017-11-02 02:40:18 -04:00
|
|
|
|
2018-02-20 23:19:59 -05:00
|
|
|
if data = (Thread.current[:_method_profiler] || event.payload[:timings])
|
2017-12-07 19:30:48 -05:00
|
|
|
sql = data[:sql]
|
2017-11-28 01:00:13 -05:00
|
|
|
|
2017-12-07 19:30:48 -05:00
|
|
|
if sql
|
|
|
|
output[:db] = sql[:duration] * 1000
|
|
|
|
output[:db_calls] = sql[:calls]
|
|
|
|
end
|
2017-11-28 01:00:13 -05:00
|
|
|
|
2017-12-07 19:30:48 -05:00
|
|
|
redis = data[:redis]
|
2017-11-28 01:00:13 -05:00
|
|
|
|
2017-12-07 19:30:48 -05:00
|
|
|
if redis
|
|
|
|
output[:redis] = redis[:duration] * 1000
|
|
|
|
output[:redis_calls] = redis[:calls]
|
|
|
|
end
|
2018-02-20 23:19:59 -05:00
|
|
|
|
|
|
|
net = data[:net]
|
|
|
|
|
|
|
|
if net
|
|
|
|
output[:net] = net[:duration] * 1000
|
|
|
|
output[:net_calls] = net[:calls]
|
|
|
|
end
|
2017-11-28 01:00:13 -05:00
|
|
|
end
|
2017-11-24 19:10:49 -05:00
|
|
|
|
2017-12-07 19:30:48 -05:00
|
|
|
output
|
2017-12-11 01:52:48 -05:00
|
|
|
rescue RateLimiter::LimitExceeded
|
|
|
|
# no idea who this is, but they are limited
|
|
|
|
{}
|
2017-12-07 19:30:48 -05:00
|
|
|
rescue => e
|
|
|
|
Rails.logger.warn("Failed to append custom options: #{e.message}\n#{e.backtrace.join("\n")}")
|
|
|
|
{}
|
|
|
|
end
|
2017-10-27 05:54:45 -04:00
|
|
|
end
|
2017-10-31 20:37:11 -04:00
|
|
|
|
2017-11-13 23:50:26 -05:00
|
|
|
if ENV["LOGSTASH_URI"]
|
2017-10-31 20:37:11 -04:00
|
|
|
config.lograge.formatter = Lograge::Formatters::Logstash.new
|
2017-11-13 23:50:26 -05:00
|
|
|
|
|
|
|
require 'discourse_logstash_logger'
|
|
|
|
|
|
|
|
config.lograge.logger = DiscourseLogstashLogger.logger(
|
|
|
|
uri: ENV['LOGSTASH_URI'], type: :rails
|
|
|
|
)
|
2017-10-31 20:37:11 -04:00
|
|
|
end
|
2017-10-27 05:54:45 -04:00
|
|
|
end
|
|
|
|
end
|