#!/bin/bash

G_MML_FILE_PATH="/opt/huawei/snas/script/inspect_mml"
source $G_MML_FILE_PATH/CheckItems
CurInspectNum="253"
CurInspectFun="$(GetInspectType $CurInspectNum)"
RESULTFILE="/tmp/tmpResult${CurInspectFun}"
LOG_FILE="/var/log/inspect.log"
isPass=0
>${RESULTFILE}


function LOG
{
    echo [`date`][$$]$@ >> $LOG_FILE
}
SNAS_CONFIG_PATH=/opt/huawei/snas/etc/snas.ini;
LOCAL_BACK_IP=`grep ipaddr_1 $SNAS_CONFIG_PATH | awk -F "=" '{print $2}'`;
flag=0
flagport=""
ports=(988 4016 4004 4100 4104 4108 4020 4048 4040 4088)
for port in ${ports[*]}
do
    #˿Ƿ񱻼
    netstat -ntl | grep ":$port" >/dev/null 2>&1
    if [ $? -ne 0 ];then
        LOG "this port is not monitoring"
        continue
    fi
    /opt/huawei/snas/script/inspect_mml/ShowInspectMml $LOCAL_BACK_IP $port "log show lvl" |grep "[A-Z]\+:[^4]" >/dev/null 2>&1
    if [ $? -eq 0 ];then
        flag=1
        if [ "$flagport" == "" ];then
            flagport="$port"
        else
            flagport="$flagport,$port"
        fi
    fi
done
LOG "flag=$flag, flagport=$flagport"

if [ $flag -eq 0 ];then
    echo "INFO: Log print level is WARN" >>${RESULTFILE}
else
    isPass=1
    echo "[ERR]INFO: Log print level is not WARN(port:$flagport).ERRCODE(4)" >>${RESULTFILE}
fi

echo "${CurInspectFun}_Pass $isPass" >>${RESULTFILE}