-
Notifications
You must be signed in to change notification settings - Fork 2
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #115 from Icinga/prometheus-config
Prometheus config fallbacks
- Loading branch information
Showing
8 changed files
with
225 additions
and
22 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,152 @@ | ||
package internal | ||
|
||
import ( | ||
"context" | ||
"fmt" | ||
"github.com/icinga/icinga-go-library/database" | ||
"github.com/icinga/icinga-go-library/types" | ||
"github.com/icinga/icinga-kubernetes/pkg/metrics" | ||
schemav1 "github.com/icinga/icinga-kubernetes/pkg/schema/v1" | ||
"github.com/jmoiron/sqlx" | ||
"github.com/pkg/errors" | ||
v1 "k8s.io/api/core/v1" | ||
kmetav1 "k8s.io/apimachinery/pkg/apis/meta/v1" | ||
"k8s.io/client-go/kubernetes" | ||
"k8s.io/client-go/rest" | ||
"strings" | ||
) | ||
|
||
func SyncPrometheusConfig(ctx context.Context, db *database.DB, config *metrics.PrometheusConfig, clusterUuid types.UUID) error { | ||
_true := types.Bool{Bool: true, Valid: true} | ||
|
||
if config.Url != "" { | ||
toDb := []schemav1.Config{ | ||
{ClusterUuid: clusterUuid, Key: schemav1.ConfigKeyPrometheusUrl, Value: config.Url, Locked: _true}, | ||
} | ||
|
||
if config.Username != "" { | ||
toDb = append( | ||
toDb, | ||
schemav1.Config{ClusterUuid: clusterUuid, Key: schemav1.ConfigKeyPrometheusUsername, Value: config.Username, Locked: _true}, | ||
schemav1.Config{ClusterUuid: clusterUuid, Key: schemav1.ConfigKeyPrometheusPassword, Value: config.Password, Locked: _true}, | ||
) | ||
} | ||
|
||
err := db.ExecTx(ctx, func(ctx context.Context, tx *sqlx.Tx) error { | ||
if _, err := tx.ExecContext( | ||
ctx, | ||
fmt.Sprintf( | ||
`DELETE FROM "%s" WHERE "cluster_uuid" = ? AND "key" LIKE ? AND "locked" = ?`, | ||
database.TableName(&schemav1.Config{}), | ||
), | ||
clusterUuid, | ||
`prometheus.%`, | ||
_true, | ||
); err != nil { | ||
return errors.Wrap(err, "cannot delete Prometheus config") | ||
} | ||
|
||
stmt, _ := db.BuildInsertStmt(schemav1.Config{}) | ||
if _, err := tx.NamedExecContext(ctx, stmt, toDb); err != nil { | ||
return errors.Wrap(err, "cannot insert Prometheus config") | ||
} | ||
|
||
return nil | ||
}) | ||
if err != nil { | ||
return errors.Wrap(err, "cannot upsert Prometheus config") | ||
} | ||
} else { | ||
err := db.ExecTx(ctx, func(ctx context.Context, tx *sqlx.Tx) error { | ||
if _, err := tx.ExecContext( | ||
ctx, | ||
fmt.Sprintf( | ||
`DELETE FROM "%s" WHERE "cluster_uuid" = ? AND "key" LIKE ? AND "locked" = ?`, | ||
database.TableName(&schemav1.Config{}), | ||
), | ||
clusterUuid, | ||
`prometheus.%`, | ||
_true, | ||
); err != nil { | ||
return errors.Wrap(err, "cannot delete Prometheus config") | ||
} | ||
|
||
rows, err := tx.QueryxContext(ctx, db.BuildSelectStmt(&schemav1.Config{}, &schemav1.Config{})) | ||
if err != nil { | ||
return errors.Wrap(err, "cannot fetch Prometheus config from DB") | ||
} | ||
|
||
for rows.Next() { | ||
var r schemav1.Config | ||
if err := rows.StructScan(&r); err != nil { | ||
return errors.Wrap(err, "cannot fetch Prometheus config from DB") | ||
} | ||
|
||
switch r.Key { | ||
case schemav1.ConfigKeyPrometheusUrl: | ||
config.Url = r.Value | ||
case schemav1.ConfigKeyPrometheusUsername: | ||
config.Username = r.Value | ||
case schemav1.ConfigKeyPrometheusPassword: | ||
config.Password = r.Value | ||
} | ||
} | ||
|
||
return nil | ||
}) | ||
if err != nil { | ||
return errors.Wrap(err, "cannot retrieve Prometheus config") | ||
} | ||
} | ||
|
||
return nil | ||
} | ||
|
||
// AutoDetectPrometheus tries to auto-detect the Prometheus service in the monitoring namespace and | ||
// if found sets the URL in the supplied Prometheus configuration. The first service with the label | ||
// "app.kubernetes.io/name=prometheus" is used. Until now the ServiceTypes ClusterIP and NodePort are supported. | ||
func AutoDetectPrometheus(ctx context.Context, clientset *kubernetes.Clientset, config *metrics.PrometheusConfig) error { | ||
services, err := clientset.CoreV1().Services("monitoring").List(ctx, kmetav1.ListOptions{ | ||
LabelSelector: "app.kubernetes.io/name=prometheus", | ||
}) | ||
if err != nil { | ||
return errors.Wrap(err, "cannot list Prometheus services") | ||
} | ||
|
||
if len(services.Items) == 0 { | ||
return errors.New("no Prometheus service found") | ||
} | ||
|
||
var ip string | ||
var port int32 | ||
|
||
// Check if we are running in a Kubernetes cluster. If so, use the | ||
// service's ClusterIP. Otherwise, use the API Server's IP and NodePort. | ||
if _, err = rest.InClusterConfig(); err == nil { | ||
for _, service := range services.Items { | ||
if service.Spec.Type == v1.ServiceTypeClusterIP { | ||
ip = service.Spec.ClusterIP | ||
port = service.Spec.Ports[0].Port | ||
|
||
break | ||
} | ||
} | ||
} else if errors.Is(err, rest.ErrNotInCluster) { | ||
for _, service := range services.Items { | ||
if service.Spec.Type == v1.ServiceTypeNodePort { | ||
ip = strings.Split(clientset.RESTClient().Get().URL().Host, ":")[0] | ||
port = service.Spec.Ports[0].NodePort | ||
|
||
break | ||
} | ||
} | ||
} | ||
|
||
if ip == "" { | ||
return errors.New("no Prometheus found") | ||
} | ||
|
||
config.Url = fmt.Sprintf("http://%s:%d", ip, port) | ||
|
||
return nil | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,19 @@ | ||
package com | ||
|
||
import ( | ||
"net/http" | ||
) | ||
|
||
// BasicAuthTransport is a http.RoundTripper that authenticates all requests using HTTP Basic Authentication. | ||
type BasicAuthTransport struct { | ||
http.RoundTripper | ||
Username string | ||
Password string | ||
} | ||
|
||
// RoundTrip executes a single HTTP transaction with the basic auth credentials. | ||
func (t *BasicAuthTransport) RoundTrip(req *http.Request) (*http.Response, error) { | ||
Check failure on line 15 in pkg/com/basic_auth_transport.go GitHub Actions / build-and-test
|
||
req.SetBasicAuth(t.Username, t.Password) | ||
|
||
return t.RoundTripper.RoundTrip(req) | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,11 +1,21 @@ | ||
package metrics | ||
|
||
import ( | ||
"github.com/pkg/errors" | ||
) | ||
|
||
// PrometheusConfig defines Prometheus configuration. | ||
type PrometheusConfig struct { | ||
Url string `yaml:"url"` | ||
Url string `yaml:"url"` | ||
Username string `yaml:"username"` | ||
Password string `yaml:"password"` | ||
} | ||
|
||
// Validate checks constraints in the supplied Prometheus configuration and returns an error if they are violated. | ||
func (c *PrometheusConfig) Validate() error { | ||
if c.Url != "" && (c.Username == "") != (c.Password == "") { | ||
return errors.New("both username and password must be provided") | ||
} | ||
|
||
return nil | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters