2015-10-12 01:36:21 +00:00
|
|
|
package phpfpm
|
|
|
|
|
|
|
|
import (
|
2016-01-14 22:20:59 +00:00
|
|
|
"crypto/rand"
|
|
|
|
"encoding/binary"
|
2015-10-12 01:36:21 +00:00
|
|
|
"fmt"
|
2016-01-14 22:20:59 +00:00
|
|
|
"net"
|
|
|
|
"net/http"
|
|
|
|
"net/http/fcgi"
|
|
|
|
"net/http/httptest"
|
2015-10-12 01:36:21 +00:00
|
|
|
"testing"
|
|
|
|
|
2016-01-20 20:19:03 +00:00
|
|
|
"github.com/influxdata/telegraf/testutil"
|
2015-10-12 01:36:21 +00:00
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
)
|
|
|
|
|
2016-01-14 22:20:59 +00:00
|
|
|
type statServer struct{}
|
|
|
|
|
|
|
|
// We create a fake server to return test data
|
|
|
|
func (s statServer) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
|
|
|
w.Header().Set("Content-Type", "text/plain")
|
|
|
|
w.Header().Set("Content-Length", fmt.Sprint(len(outputSample)))
|
|
|
|
fmt.Fprint(w, outputSample)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestPhpFpmGeneratesMetrics_From_Http(t *testing.T) {
|
|
|
|
sv := statServer{}
|
|
|
|
ts := httptest.NewServer(sv)
|
2015-10-12 01:36:21 +00:00
|
|
|
defer ts.Close()
|
|
|
|
|
|
|
|
r := &phpfpm{
|
|
|
|
Urls: []string{ts.URL},
|
|
|
|
}
|
|
|
|
|
|
|
|
var acc testutil.Accumulator
|
|
|
|
|
|
|
|
err := r.Gather(&acc)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
tags := map[string]string{
|
2016-01-14 22:20:59 +00:00
|
|
|
"pool": "www",
|
|
|
|
}
|
|
|
|
|
|
|
|
fields := map[string]interface{}{
|
|
|
|
"accepted_conn": int64(3),
|
|
|
|
"listen_queue": int64(1),
|
|
|
|
"max_listen_queue": int64(0),
|
|
|
|
"listen_queue_len": int64(0),
|
|
|
|
"idle_processes": int64(1),
|
|
|
|
"active_processes": int64(1),
|
|
|
|
"total_processes": int64(2),
|
|
|
|
"max_active_processes": int64(1),
|
|
|
|
"max_children_reached": int64(2),
|
|
|
|
"slow_requests": int64(1),
|
|
|
|
}
|
|
|
|
|
|
|
|
acc.AssertContainsTaggedFields(t, "phpfpm", fields, tags)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestPhpFpmGeneratesMetrics_From_Fcgi(t *testing.T) {
|
|
|
|
// Let OS find an available port
|
|
|
|
tcp, err := net.Listen("tcp", "127.0.0.1:0")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal("Cannot initalize test server")
|
|
|
|
}
|
|
|
|
defer tcp.Close()
|
|
|
|
|
|
|
|
s := statServer{}
|
|
|
|
go fcgi.Serve(tcp, s)
|
|
|
|
|
|
|
|
//Now we tested again above server
|
|
|
|
r := &phpfpm{
|
|
|
|
Urls: []string{"fcgi://" + tcp.Addr().String() + "/status"},
|
|
|
|
}
|
|
|
|
|
|
|
|
var acc testutil.Accumulator
|
|
|
|
err = r.Gather(&acc)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
tags := map[string]string{
|
|
|
|
"pool": "www",
|
|
|
|
}
|
|
|
|
|
|
|
|
fields := map[string]interface{}{
|
|
|
|
"accepted_conn": int64(3),
|
|
|
|
"listen_queue": int64(1),
|
|
|
|
"max_listen_queue": int64(0),
|
|
|
|
"listen_queue_len": int64(0),
|
|
|
|
"idle_processes": int64(1),
|
|
|
|
"active_processes": int64(1),
|
|
|
|
"total_processes": int64(2),
|
|
|
|
"max_active_processes": int64(1),
|
|
|
|
"max_children_reached": int64(2),
|
|
|
|
"slow_requests": int64(1),
|
|
|
|
}
|
|
|
|
|
|
|
|
acc.AssertContainsTaggedFields(t, "phpfpm", fields, tags)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestPhpFpmGeneratesMetrics_From_Socket(t *testing.T) {
|
|
|
|
// Create a socket in /tmp because we always have write permission and if the
|
|
|
|
// removing of socket fail when system restart /tmp is clear so
|
|
|
|
// we don't have junk files around
|
|
|
|
var randomNumber int64
|
|
|
|
binary.Read(rand.Reader, binary.LittleEndian, &randomNumber)
|
|
|
|
tcp, err := net.Listen("unix", fmt.Sprintf("/tmp/test-fpm%d.sock", randomNumber))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal("Cannot initalize server on port ")
|
|
|
|
}
|
|
|
|
|
|
|
|
defer tcp.Close()
|
|
|
|
s := statServer{}
|
|
|
|
go fcgi.Serve(tcp, s)
|
|
|
|
|
|
|
|
r := &phpfpm{
|
|
|
|
Urls: []string{tcp.Addr().String()},
|
|
|
|
}
|
|
|
|
|
|
|
|
var acc testutil.Accumulator
|
|
|
|
|
|
|
|
err = r.Gather(&acc)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
tags := map[string]string{
|
|
|
|
"pool": "www",
|
|
|
|
}
|
|
|
|
|
|
|
|
fields := map[string]interface{}{
|
|
|
|
"accepted_conn": int64(3),
|
|
|
|
"listen_queue": int64(1),
|
|
|
|
"max_listen_queue": int64(0),
|
|
|
|
"listen_queue_len": int64(0),
|
|
|
|
"idle_processes": int64(1),
|
|
|
|
"active_processes": int64(1),
|
|
|
|
"total_processes": int64(2),
|
|
|
|
"max_active_processes": int64(1),
|
|
|
|
"max_children_reached": int64(2),
|
|
|
|
"slow_requests": int64(1),
|
|
|
|
}
|
|
|
|
|
|
|
|
acc.AssertContainsTaggedFields(t, "phpfpm", fields, tags)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestPhpFpmGeneratesMetrics_From_Socket_Custom_Status_Path(t *testing.T) {
|
|
|
|
// Create a socket in /tmp because we always have write permission. If the
|
|
|
|
// removing of socket fail we won't have junk files around. Cuz when system
|
|
|
|
// restart, it clears out /tmp
|
|
|
|
var randomNumber int64
|
|
|
|
binary.Read(rand.Reader, binary.LittleEndian, &randomNumber)
|
|
|
|
tcp, err := net.Listen("unix", fmt.Sprintf("/tmp/test-fpm%d.sock", randomNumber))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal("Cannot initalize server on port ")
|
|
|
|
}
|
|
|
|
|
|
|
|
defer tcp.Close()
|
|
|
|
s := statServer{}
|
|
|
|
go fcgi.Serve(tcp, s)
|
|
|
|
|
|
|
|
r := &phpfpm{
|
|
|
|
Urls: []string{tcp.Addr().String() + ":custom-status-path"},
|
|
|
|
}
|
|
|
|
|
|
|
|
var acc testutil.Accumulator
|
|
|
|
|
|
|
|
err = r.Gather(&acc)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
tags := map[string]string{
|
2015-10-12 01:36:21 +00:00
|
|
|
"pool": "www",
|
|
|
|
}
|
|
|
|
|
2016-01-07 00:37:56 +00:00
|
|
|
fields := map[string]interface{}{
|
|
|
|
"accepted_conn": int64(3),
|
|
|
|
"listen_queue": int64(1),
|
|
|
|
"max_listen_queue": int64(0),
|
|
|
|
"listen_queue_len": int64(0),
|
|
|
|
"idle_processes": int64(1),
|
|
|
|
"active_processes": int64(1),
|
|
|
|
"total_processes": int64(2),
|
|
|
|
"max_active_processes": int64(1),
|
|
|
|
"max_children_reached": int64(2),
|
|
|
|
"slow_requests": int64(1),
|
2015-10-12 01:36:21 +00:00
|
|
|
}
|
|
|
|
|
2016-01-07 00:37:56 +00:00
|
|
|
acc.AssertContainsTaggedFields(t, "phpfpm", fields, tags)
|
2015-10-12 01:36:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
//When not passing server config, we default to localhost
|
|
|
|
//We just want to make sure we did request stat from localhost
|
2016-01-14 22:20:59 +00:00
|
|
|
func TestPhpFpmDefaultGetFromLocalhost(t *testing.T) {
|
2015-10-12 01:36:21 +00:00
|
|
|
r := &phpfpm{}
|
|
|
|
|
|
|
|
var acc testutil.Accumulator
|
|
|
|
|
|
|
|
err := r.Gather(&acc)
|
|
|
|
require.Error(t, err)
|
|
|
|
assert.Contains(t, err.Error(), "127.0.0.1/status")
|
|
|
|
}
|
|
|
|
|
2016-01-14 22:20:59 +00:00
|
|
|
func TestPhpFpmGeneratesMetrics_Throw_Error_When_Fpm_Status_Is_Not_Responding(t *testing.T) {
|
|
|
|
r := &phpfpm{
|
|
|
|
Urls: []string{"http://aninvalidone"},
|
|
|
|
}
|
|
|
|
|
|
|
|
var acc testutil.Accumulator
|
|
|
|
|
|
|
|
err := r.Gather(&acc)
|
|
|
|
require.Error(t, err)
|
|
|
|
assert.Contains(t, err.Error(), `Unable to connect to phpfpm status page 'http://aninvalidone': Get http://aninvalidone: dial tcp: lookup aninvalidone`)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestPhpFpmGeneratesMetrics_Throw_Error_When_Socket_Path_Is_Invalid(t *testing.T) {
|
|
|
|
r := &phpfpm{
|
|
|
|
Urls: []string{"/tmp/invalid.sock"},
|
|
|
|
}
|
|
|
|
|
|
|
|
var acc testutil.Accumulator
|
|
|
|
|
|
|
|
err := r.Gather(&acc)
|
|
|
|
require.Error(t, err)
|
|
|
|
assert.Equal(t, `Socket doesn't exist '/tmp/invalid.sock': stat /tmp/invalid.sock: no such file or directory`, err.Error())
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2015-10-12 01:36:21 +00:00
|
|
|
const outputSample = `
|
|
|
|
pool: www
|
|
|
|
process manager: dynamic
|
|
|
|
start time: 11/Oct/2015:23:38:51 +0000
|
|
|
|
start since: 1991
|
|
|
|
accepted conn: 3
|
|
|
|
listen queue: 1
|
|
|
|
max listen queue: 0
|
|
|
|
listen queue len: 0
|
|
|
|
idle processes: 1
|
|
|
|
active processes: 1
|
|
|
|
total processes: 2
|
|
|
|
max active processes: 1
|
|
|
|
max children reached: 2
|
|
|
|
slow requests: 1
|
|
|
|
`
|