1 /* init.c - initialize monitor backend */
3 * Copyright 1998-2003 The OpenLDAP Foundation, All Rights Reserved.
4 * COPYING RESTRICTIONS APPLY, see COPYRIGHT file
7 * Copyright 2001, Pierangelo Masarati, All rights reserved. <ando@sys-net.it>
9 * This work has beed deveolped for the OpenLDAP Foundation
10 * in the hope that it may be useful to the Open Source community,
11 * but WITHOUT ANY WARRANTY.
13 * Permission is granted to anyone to use this software for any purpose
14 * on any computer system, and to alter it and redistribute it, subject
15 * to the following restrictions:
17 * 1. The author and SysNet s.n.c. are not responsible for the consequences
18 * of use of this software, no matter how awful, even if they arise from
21 * 2. The origin of this software must not be misrepresented, either by
22 * explicit claim or by omission. Since few users ever read sources,
23 * credits should appear in the documentation.
25 * 3. Altered versions must be plainly marked as such, and must not be
26 * misrepresented as being the original software. Since few users
27 * ever read sources, credits should appear in the documentation.
28 * SysNet s.n.c. cannot be responsible for the consequences of the
31 * 4. This notice may not be removed or altered.
37 #include <ac/string.h>
41 #include "back-monitor.h"
44 * used by many functions to add description to entries
46 BackendDB *be_monitor = NULL;
51 struct monitorsubsys monitor_subsys[] = {
53 SLAPD_MONITOR_LISTENER, SLAPD_MONITOR_LISTENER_NAME,
54 BER_BVNULL, BER_BVNULL, BER_BVNULL,
55 MONITOR_F_PERSISTENT_CH,
56 monitor_subsys_listener_init,
61 SLAPD_MONITOR_DATABASE, SLAPD_MONITOR_DATABASE_NAME,
62 BER_BVNULL, BER_BVNULL, BER_BVNULL,
63 MONITOR_F_PERSISTENT_CH,
64 monitor_subsys_database_init,
69 SLAPD_MONITOR_BACKEND, SLAPD_MONITOR_BACKEND_NAME,
70 BER_BVNULL, BER_BVNULL, BER_BVNULL,
71 MONITOR_F_PERSISTENT_CH,
72 monitor_subsys_backend_init,
77 SLAPD_MONITOR_THREAD, SLAPD_MONITOR_THREAD_NAME,
78 BER_BVNULL, BER_BVNULL, BER_BVNULL,
80 monitor_subsys_thread_init,
81 monitor_subsys_thread_update,
85 SLAPD_MONITOR_SASL, SLAPD_MONITOR_SASL_NAME,
86 BER_BVNULL, BER_BVNULL, BER_BVNULL,
93 SLAPD_MONITOR_TLS, SLAPD_MONITOR_TLS_NAME,
94 BER_BVNULL, BER_BVNULL, BER_BVNULL,
101 SLAPD_MONITOR_CONN, SLAPD_MONITOR_CONN_NAME,
102 BER_BVNULL, BER_BVNULL, BER_BVNULL,
103 MONITOR_F_VOLATILE_CH,
104 monitor_subsys_conn_init,
105 monitor_subsys_conn_update,
106 monitor_subsys_conn_create,
109 SLAPD_MONITOR_RWW, SLAPD_MONITOR_RWW_NAME,
110 BER_BVNULL, BER_BVNULL, BER_BVNULL,
111 MONITOR_F_PERSISTENT_CH,
112 monitor_subsys_rww_init,
113 monitor_subsys_rww_update,
117 SLAPD_MONITOR_LOG, SLAPD_MONITOR_LOG_NAME,
118 BER_BVNULL, BER_BVNULL, BER_BVNULL,
120 monitor_subsys_log_init,
123 monitor_subsys_log_modify
125 SLAPD_MONITOR_OPS, SLAPD_MONITOR_OPS_NAME,
126 BER_BVNULL, BER_BVNULL, BER_BVNULL,
127 MONITOR_F_PERSISTENT_CH,
128 monitor_subsys_ops_init,
129 monitor_subsys_ops_update,
133 SLAPD_MONITOR_SENT, SLAPD_MONITOR_SENT_NAME,
134 BER_BVNULL, BER_BVNULL, BER_BVNULL,
135 MONITOR_F_PERSISTENT_CH,
136 monitor_subsys_sent_init,
137 monitor_subsys_sent_update,
141 SLAPD_MONITOR_TIME, SLAPD_MONITOR_TIME_NAME,
142 BER_BVNULL, BER_BVNULL, BER_BVNULL,
143 MONITOR_F_PERSISTENT_CH,
144 monitor_subsys_time_init,
145 monitor_subsys_time_update,
151 #ifdef SLAPD_MONITOR_DYNAMIC
154 back_monitor_LTX_init_module( int argc, char *argv[] )
158 memset( &bi, '\0', sizeof(bi) );
159 bi.bi_type = "monitor";
160 bi.bi_init = monitor_back_initialize;
165 #endif /* SLAPD_MONITOR_DYNAMIC */
168 monitor_back_initialize(
172 static char *controls[] = {
173 LDAP_CONTROL_MANAGEDSAIT,
174 LDAP_CONTROL_VALUESRETURNFILTER,
178 bi->bi_controls = controls;
182 bi->bi_config = monitor_back_config;
186 bi->bi_db_init = monitor_back_db_init;
187 bi->bi_db_config = monitor_back_db_config;
188 bi->bi_db_open = monitor_back_db_open;
190 bi->bi_db_destroy = monitor_back_db_destroy;
192 bi->bi_op_bind = monitor_back_bind;
193 bi->bi_op_unbind = 0;
194 bi->bi_op_search = monitor_back_search;
195 bi->bi_op_compare = monitor_back_compare;
196 bi->bi_op_modify = monitor_back_modify;
197 bi->bi_op_modrdn = 0;
199 bi->bi_op_delete = 0;
200 bi->bi_op_abandon = 0;
204 bi->bi_entry_release_rw = 0;
205 bi->bi_chk_referrals = 0;
206 bi->bi_operational = monitor_back_operational;
209 * hooks for slap tools
211 bi->bi_tool_entry_open = 0;
212 bi->bi_tool_entry_close = 0;
213 bi->bi_tool_entry_first = 0;
214 bi->bi_tool_entry_next = 0;
215 bi->bi_tool_entry_get = 0;
216 bi->bi_tool_entry_put = 0;
217 bi->bi_tool_entry_reindex = 0;
218 bi->bi_tool_sync = 0;
220 bi->bi_connection_init = 0;
221 bi->bi_connection_destroy = 0;
227 monitor_back_db_init(
231 struct monitorinfo *mi;
233 struct berval dn, ndn;
237 * database monitor can be defined once only
241 LDAP_LOG( OPERATION, CRIT,
242 "only one monitor backend is allowed\n", 0, 0, 0);
244 Debug( LDAP_DEBUG_ANY,
245 "only one monitor backend is allowed\n", 0, 0, 0 );
251 /* indicate system schema supported */
252 be->be_flags |= SLAP_BFLAG_MONITOR;
254 dn.bv_val = SLAPD_MONITOR_DN;
255 dn.bv_len = sizeof( SLAPD_MONITOR_DN ) - 1;
257 rc = dnNormalize2( NULL, &dn, &ndn, NULL );
258 if( rc != LDAP_SUCCESS ) {
260 LDAP_LOG( OPERATION, CRIT,
261 "unable to normalize monitor DN \"" SLAPD_MONITOR_DN
264 Debug( LDAP_DEBUG_ANY,
265 "unable to normalize monitor DN \"" SLAPD_MONITOR_DN
271 ber_dupbv( &bv, &dn );
272 ber_bvarray_add( &be->be_suffix, &bv );
273 ber_bvarray_add( &be->be_nsuffix, &ndn );
275 mi = ( struct monitorinfo * )ch_calloc( sizeof( struct monitorinfo ), 1 );
278 LDAP_LOG( OPERATION, CRIT,
279 "unable to initialize monitor backend\n", 0, 0, 0 );
281 Debug( LDAP_DEBUG_ANY,
282 "unable to initialize monitor backend\n", 0, 0, 0 );
287 memset( mi, 0, sizeof( struct monitorinfo ) );
289 ldap_pvt_thread_mutex_init( &mi->mi_cache_mutex );
297 monitor_back_db_open(
301 struct monitorinfo *mi = (struct monitorinfo *)be->be_private;
302 struct monitorsubsys *ms;
304 struct monitorentrypriv *mp;
306 char buf[1024], *end_of_line;
314 { "monitor", "( 1.3.6.1.4.1.4203.666.3.2 "
316 "DESC 'OpenLDAP system monitoring' "
317 "SUP top STRUCTURAL "
324 offsetof(struct monitorinfo, oc_monitor) },
325 { "monitorServer", "( 1.3.6.1.4.1.4203.666.3.7 "
326 "NAME 'monitorServer' "
327 "DESC 'Server monitoring root entry' "
328 "SUP monitor STRUCTURAL "
332 offsetof(struct monitorinfo, oc_monitorServer) },
333 { "monitorContainer", "( 1.3.6.1.4.1.4203.666.3.8 "
334 "NAME 'monitorContainer' "
335 "DESC 'monitor container class' "
336 "SUP monitor STRUCTURAL )",
337 offsetof(struct monitorinfo, oc_monitorContainer) },
338 { "monitorCounterObject", "( 1.3.6.1.4.1.4203.666.3.9 "
339 "NAME 'monitorCounterObject' "
340 "DESC 'monitor counter class' "
341 "SUP monitor STRUCTURAL )",
342 offsetof(struct monitorinfo, oc_monitorCounterObject) },
343 { "monitorOperation", "( 1.3.6.1.4.1.4203.666.3.10 "
344 "NAME 'monitorOperation' "
345 "DESC 'monitor operation class' "
346 "SUP monitor STRUCTURAL )",
347 offsetof(struct monitorinfo, oc_monitorOperation) },
348 { "monitorConnection", "( 1.3.6.1.4.1.4203.666.3.11 "
349 "NAME 'monitorConnection' "
350 "DESC 'monitor connection class' "
351 "SUP monitor STRUCTURAL )",
352 offsetof(struct monitorinfo, oc_monitorConnection) },
353 { "managedObject", "( 1.3.6.1.4.1.4203.666.3.12 "
354 "NAME 'managedObject' "
355 "DESC 'monitor managed entity class' "
356 "SUP monitor STRUCTURAL )",
357 offsetof(struct monitorinfo, oc_managedObject) },
358 { "monitoredObject", "( 1.3.6.1.4.1.4203.666.3.13 "
359 "NAME 'monitoredObject' "
360 "DESC 'monitor monitored entity class' "
361 "SUP monitor STRUCTURAL )",
362 offsetof(struct monitorinfo, oc_monitoredObject) },
365 { "monitoredInfo", "( 1.3.6.1.4.1.4203.666.1.14 "
366 "NAME 'monitoredInfo' "
367 "DESC 'monitored info' "
369 "EQUALITY caseIgnoreMatch "
370 "SUBSTR caseIgnoreSubstringsMatch "
371 "SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{32768} "
372 "NO-USER-MODIFICATION "
373 "USAGE directoryOperation )",
374 offsetof(struct monitorinfo, ad_monitoredInfo) },
375 { "managedInfo", "( 1.3.6.1.4.1.4203.666.1.15 "
376 "NAME 'managedInfo' "
377 "DESC 'monitor managed info' "
379 offsetof(struct monitorinfo, ad_managedInfo) },
380 { "monitorCounter", "( 1.3.6.1.4.1.4203.666.1.16 "
381 "NAME 'monitorCounter' "
382 "DESC 'monitor counter' "
383 "EQUALITY integerMatch "
384 "ORDERING integerOrderingMatch "
385 "SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 "
386 "NO-USER-MODIFICATION "
387 "USAGE directoryOperation )",
388 offsetof(struct monitorinfo, ad_monitorCounter) },
389 { "monitorOpCompleted", "( 1.3.6.1.4.1.4203.666.1.17 "
390 "NAME 'monitorOpCompleted' "
391 "DESC 'monitor completed operations' "
392 "SUP monitorCounter "
393 "NO-USER-MODIFICATION "
394 "USAGE directoryOperation )",
395 offsetof(struct monitorinfo, ad_monitorOpCompleted) },
396 { "monitorOpInitiated", "( 1.3.6.1.4.1.4203.666.1.18 "
397 "NAME 'monitorOpInitiated' "
398 "DESC 'monitor initiated operations' "
399 "SUP monitorCounter "
400 "NO-USER-MODIFICATION "
401 "USAGE directoryOperation )",
402 offsetof(struct monitorinfo, ad_monitorOpInitiated) },
403 { "monitorConnectionNumber", "( 1.3.6.1.4.1.4203.666.1.19 "
404 "NAME 'monitorConnectionNumber' "
405 "DESC 'monitor connection number' "
406 "SUP monitorCounter "
407 "NO-USER-MODIFICATION "
408 "USAGE directoryOperation )",
409 offsetof(struct monitorinfo, ad_monitorConnectionNumber) },
410 { "monitorConnectionAuthzDN", "( 1.3.6.1.4.1.4203.666.1.20 "
411 "NAME 'monitorConnectionAuthzDN' "
412 "DESC 'monitor connection authorization DN' "
413 /* "SUP distinguishedName " */
414 "EQUALITY distinguishedNameMatch "
415 "SYNTAX 1.3.6.1.4.1.1466.115.121.1.12 "
416 "NO-USER-MODIFICATION "
417 "USAGE directoryOperation )",
418 offsetof(struct monitorinfo, ad_monitorConnectionAuthzDN) },
419 { "monitorConnectionLocalAddress", "( 1.3.6.1.4.1.4203.666.1.21 "
420 "NAME 'monitorConnectionLocalAddress' "
421 "DESC 'monitor connection local address' "
423 "NO-USER-MODIFICATION "
424 "USAGE directoryOperation )",
425 offsetof(struct monitorinfo, ad_monitorConnectionLocalAddress) },
426 { "monitorConnectionPeerAddress", "( 1.3.6.1.4.1.4203.666.1.22 "
427 "NAME 'monitorConnectionPeerAddress' "
428 "DESC 'monitor connection peer address' "
430 "NO-USER-MODIFICATION "
431 "USAGE directoryOperation )",
432 offsetof(struct monitorinfo, ad_monitorConnectionPeerAddress) },
436 for ( i = 0; mat[i].name; i++ ) {
437 LDAPAttributeType *at;
440 AttributeDescription **ad;
442 at = ldap_str2attributetype( mat[i].schema, &code,
443 &err, LDAP_SCHEMA_ALLOW_ALL );
446 LDAP_LOG( OPERATION, CRIT, "monitor_back_db_init: "
447 "in AttributeType '%s' %s before %s\n",
448 mat[i].name, ldap_scherr2str(code), err );
450 Debug( LDAP_DEBUG_ANY, "monitor_back_db_init: "
451 "in AttributeType '%s' %s before %s\n",
452 mat[i].name, ldap_scherr2str(code), err );
457 if ( at->at_oid == NULL ) {
459 LDAP_LOG( OPERATION, CRIT, "monitor_back_db_init: "
460 "null OID for attributeType '%s'\n",
463 Debug( LDAP_DEBUG_ANY, "monitor_back_db_init: "
464 "null OID for attributeType '%s'\n",
470 code = at_add(at, &err);
473 LDAP_LOG( OPERATION, CRIT, "monitor_back_db_init: "
474 "%s in attributeType '%s'\n",
475 scherr2str(code), mat[i].name, 0 );
477 Debug( LDAP_DEBUG_ANY, "monitor_back_db_init: "
478 "%s in attributeType '%s'\n",
479 scherr2str(code), mat[i].name, 0 );
485 ad = ((AttributeDescription **)&(((char *)mi)[mat[i].offset]));
487 if ( slap_str2ad( mat[i].name, ad, &text ) ) {
489 LDAP_LOG( OPERATION, CRIT,
490 "monitor_back_db_init: %s\n", text, 0, 0 );
492 Debug( LDAP_DEBUG_ANY,
493 "monitor_back_db_init: %s\n", text, 0, 0 );
499 if ( slap_str2ad( "description", &mi->ad_description, &text ) ) {
501 LDAP_LOG( OPERATION, CRIT,
502 "monitor_back_db_init: description: %s\n", text, 0, 0 );
504 Debug( LDAP_DEBUG_ANY,
505 "monitor_back_db_init: description: %s\n", text, 0, 0 );
510 if ( slap_str2ad( "seeAlso", &mi->ad_seeAlso, &text ) ) {
512 LDAP_LOG( OPERATION, CRIT,
513 "monitor_back_db_init: seeAlso: %s\n", text, 0, 0 );
515 Debug( LDAP_DEBUG_ANY,
516 "monitor_back_db_init: seeAlso: %s\n", text, 0, 0 );
521 for ( i = 0; moc[i].name; i++ ) {
527 oc = ldap_str2objectclass(moc[i].schema, &code, &err,
528 LDAP_SCHEMA_ALLOW_ALL );
531 LDAP_LOG( OPERATION, CRIT,
532 "unable to parse monitor objectclass '%s': "
533 "%s before %s\n" , moc[i].name,
534 ldap_scherr2str(code), err );
536 Debug( LDAP_DEBUG_ANY,
537 "unable to parse monitor objectclass '%s': "
538 "%s before %s\n" , moc[i].name,
539 ldap_scherr2str(code), err );
544 if ( oc->oc_oid == NULL ) {
546 LDAP_LOG( OPERATION, CRIT,
547 "objectclass '%s' has no OID\n" ,
550 Debug( LDAP_DEBUG_ANY,
551 "objectclass '%s' has no OID\n" ,
557 code = oc_add(oc, 0, &err);
560 LDAP_LOG( OPERATION, CRIT,
561 "objectclass '%s': %s \"%s\"\n" ,
562 moc[i].name, scherr2str(code), err );
564 Debug( LDAP_DEBUG_ANY,
565 "objectclass '%s': %s \"%s\"\n" ,
566 moc[i].name, scherr2str(code), err );
573 Oc = oc_find( moc[i].name );
576 LDAP_LOG( OPERATION, CRIT, "monitor_back_db_init: "
577 "unable to find objectClass %s "
578 "(just added)\n", moc[i].name, 0, 0 );
580 Debug( LDAP_DEBUG_ANY, "monitor_back_db_init: "
581 "unable to find objectClass %s "
582 "(just added)\n", moc[i].name, 0, 0 );
587 ((ObjectClass **)&(((char *)mi)[moc[i].offset]))[0] = Oc;
591 * Create all the subsystem specific entries
594 for ( i = 0; monitor_subsys[ i ].mss_name != NULL; i++ ) {
595 int len = strlen( monitor_subsys[ i ].mss_name );
599 dn.bv_len = len + sizeof( "cn=" ) - 1;
600 dn.bv_val = ch_calloc( sizeof( char ), dn.bv_len + 1 );
601 strcpy( dn.bv_val, "cn=" );
602 strcat( dn.bv_val, monitor_subsys[ i ].mss_name );
603 rc = dnPretty2( NULL, &dn, &monitor_subsys[ i ].mss_rdn, NULL );
605 if ( rc != LDAP_SUCCESS ) {
607 LDAP_LOG( OPERATION, CRIT,
608 "monitor RDN \"%s\" is invalid\n",
611 Debug( LDAP_DEBUG_ANY,
612 "monitor RDN \"%s\" is invalid\n",
618 dn.bv_len += sizeof( SLAPD_MONITOR_DN ); /* 1 for the , */
619 dn.bv_val = ch_malloc( dn.bv_len + 1 );
620 strcpy( dn.bv_val , monitor_subsys[ i ].mss_rdn.bv_val );
621 strcat( dn.bv_val, "," SLAPD_MONITOR_DN );
622 rc = dnPrettyNormal( NULL, &dn, &monitor_subsys[ i ].mss_dn,
623 &monitor_subsys[ i ].mss_ndn, NULL );
625 if ( rc != LDAP_SUCCESS ) {
627 LDAP_LOG( OPERATION, CRIT,
628 "monitor DN \"%s\" is invalid\n",
631 Debug( LDAP_DEBUG_ANY,
632 "monitor DN \"%s\" is invalid\n",
638 snprintf( buf, sizeof( buf ),
641 "structuralObjectClass: %s\n"
643 monitor_subsys[ i ].mss_dn.bv_val,
644 mi->oc_monitorContainer->soc_cname.bv_val,
645 mi->oc_monitorContainer->soc_cname.bv_val,
646 monitor_subsys[ i ].mss_name );
648 e = str2entry( buf );
652 LDAP_LOG( OPERATION, CRIT,
653 "unable to create '%s' entry\n",
654 monitor_subsys[ i ].mss_dn.bv_val, 0, 0 );
656 Debug( LDAP_DEBUG_ANY,
657 "unable to create '%s' entry\n",
658 monitor_subsys[ i ].mss_dn.bv_val, 0, 0 );
663 mp = ( struct monitorentrypriv * )ch_calloc( sizeof( struct monitorentrypriv ), 1 );
664 e->e_private = ( void * )mp;
665 mp->mp_info = &monitor_subsys[ i ];
666 mp->mp_children = NULL;
668 mp->mp_flags = monitor_subsys[ i ].mss_flags;
670 if ( monitor_cache_add( mi, e ) ) {
672 LDAP_LOG( OPERATION, CRIT,
673 "unable to add entry '%s' to cache\n",
674 monitor_subsys[ i ].mss_dn.bv_val, 0, 0 );
676 Debug( LDAP_DEBUG_ANY,
677 "unable to add entry '%s' to cache\n",
678 monitor_subsys[ i ].mss_dn.bv_val, 0, 0 );
687 * creates the "cn=Monitor" entry
689 snprintf( buf, sizeof( buf ),
690 "dn: " SLAPD_MONITOR_DN "\n"
692 "structuralObjectClass: %s\n"
694 "%s: This subtree contains monitoring/managing objects.\n"
695 "%s: This object contains information about this server.\n"
696 "%s: createTimeStamp reflects the time this server instance was created.\n"
697 "%s: modifyTimeStamp reflects the current time.\n",
698 mi->oc_monitorServer->soc_cname.bv_val,
699 mi->oc_monitorServer->soc_cname.bv_val,
700 mi->ad_description->ad_cname.bv_val,
701 mi->ad_description->ad_cname.bv_val,
702 mi->ad_description->ad_cname.bv_val,
703 mi->ad_description->ad_cname.bv_val );
705 e = str2entry( buf );
708 LDAP_LOG( OPERATION, CRIT,
709 "unable to create '%s' entry\n",
710 SLAPD_MONITOR_DN, 0, 0 );
712 Debug( LDAP_DEBUG_ANY,
713 "unable to create '%s' entry\n",
714 SLAPD_MONITOR_DN, 0, 0 );
719 bv.bv_val = (char *) Versionstr;
720 end_of_line = strchr( Versionstr, '\n' );
722 bv.bv_len = end_of_line - Versionstr;
724 bv.bv_len = strlen( Versionstr );
727 if ( attr_merge_normalize_one( e, mi->ad_monitoredInfo,
730 LDAP_LOG( OPERATION, CRIT,
731 "unable to add monitoredInfo to '%s' entry\n",
732 SLAPD_MONITOR_DN, 0, 0 );
734 Debug( LDAP_DEBUG_ANY,
735 "unable to add monitoredInfo to '%s' entry\n",
736 SLAPD_MONITOR_DN, 0, 0 );
741 if ( mi->l.bv_len ) {
742 AttributeDescription *ad = NULL;
743 const char *text = NULL;
745 if ( slap_str2ad( "l", &ad, &text ) ) {
747 LDAP_LOG( OPERATION, CRIT, "unable to get 'l'\n",
748 SLAPD_MONITOR_DN, 0, 0 );
750 Debug( LDAP_DEBUG_ANY, "unable to get 'l'\n",
751 SLAPD_MONITOR_DN, 0, 0 );
756 if ( attr_merge_normalize_one( e, ad, &mi->l, NULL ) ) {
758 LDAP_LOG( OPERATION, CRIT,
759 "unable to add locality to '%s' entry\n",
760 SLAPD_MONITOR_DN, 0, 0 );
762 Debug( LDAP_DEBUG_ANY,
763 "unable to add locality to '%s' entry\n",
764 SLAPD_MONITOR_DN, 0, 0 );
770 mp = ( struct monitorentrypriv * )ch_calloc( sizeof( struct monitorentrypriv ), 1 );
771 e->e_private = ( void * )mp;
774 mp->mp_children = e_tmp;
777 if ( monitor_cache_add( mi, e ) ) {
779 LDAP_LOG( OPERATION, CRIT,
780 "unable to add entry '%s' to cache\n",
781 SLAPD_MONITOR_DN, 0, 0 );
783 Debug( LDAP_DEBUG_ANY,
784 "unable to add entry '%s' to cache\n",
785 SLAPD_MONITOR_DN, 0, 0 );
795 * opens the monitor backend
797 for ( ms = monitor_subsys; ms->mss_name != NULL; ms++ ) {
798 if ( ms->mss_init && ( *ms->mss_init )( be ) ) {
816 * eventually, will hold backend specific configuration parameters
822 monitor_back_db_config(
830 struct monitorinfo *mi = (struct monitorinfo *)be->be_private;
833 * eventually, will hold database specific configuration parameters
835 if ( strcasecmp( argv[ 0 ], "l" ) == 0 ) {
840 ber_str2bv( argv[ 1 ], 0, 1, &mi->l );
844 LDAP_LOG( CONFIG, INFO,
845 "line %d of file '%s' will be ignored\n",
848 Debug( LDAP_DEBUG_CONFIG,
849 "line %d of file '%s' will be ignored\n",
858 monitor_back_db_destroy(
863 * FIXME: destroys all the data