telegraf/plugins/inputs/aerospike/aerospike.go

559 lines
13 KiB
Go
Raw Normal View History

package aerospike
import (
"bytes"
"encoding/binary"
"fmt"
"net"
"strconv"
"strings"
"github.com/influxdata/telegraf"
"github.com/influxdata/telegraf/plugins/inputs"
"github.com/jameskeane/bcrypt"
)
const (
MSG_HEADER_SIZE = 8
MSG_TYPE_INFO = 1 // Info is 1
MSG_TYPE_AUTH = 2 //
MSG_VERSION = 2
// Field IDs
USER byte = 0
CREDENTIAL byte = 3
// Commands
AUTHENTICATE byte = 0
//constants from aerospike doc
ERR_PASSWORD = 62
ERR_USER = 60
ERR_NOT_ENABLED = 52
ERR_SCHEME = 53
ERR_EXPIRED_PASSWORD = 63
ERR_NOT_SUPPORTED = 51
)
var errorCode2Msg map[int]string
var (
STATISTICS_COMMAND = []byte("statistics\n")
NAMESPACES_COMMAND = []byte("namespaces\n")
LATENCY_COMMAND = []byte("latency:back=60;\n") //get latency of previous minute
)
type aerospikeMessageHeader struct {
Version uint8
Type uint8
DataLen [6]byte
}
type aerospikeMessage struct {
aerospikeMessageHeader
Data []byte
}
// Taken from aerospike-client-go/types/message.go
func (msg *aerospikeMessage) Serialize() []byte {
msg.DataLen = msgLenToBytes(int64(len(msg.Data)))
buf := bytes.NewBuffer([]byte{})
binary.Write(buf, binary.BigEndian, msg.aerospikeMessageHeader)
binary.Write(buf, binary.BigEndian, msg.Data[:])
return buf.Bytes()
}
type aerospikeInfoCommand struct {
msg *aerospikeMessage
}
// Taken from aerospike-client-go/info.go
func (nfo *aerospikeInfoCommand) parseMultiResponse() (map[string]string, error) {
responses := make(map[string]string)
offset := int64(0)
begin := int64(0)
dataLen := int64(len(nfo.msg.Data))
// Create reusable StringBuilder for performance.
for offset < dataLen {
b := nfo.msg.Data[offset]
if b == '\t' {
name := nfo.msg.Data[begin:offset]
offset++
begin = offset
// Parse field value.
for offset < dataLen {
if nfo.msg.Data[offset] == '\n' {
break
}
offset++
}
if offset > begin {
value := nfo.msg.Data[begin:offset]
responses[string(name)] = string(value)
} else {
responses[string(name)] = ""
}
offset++
begin = offset
} else if b == '\n' {
if offset > begin {
name := nfo.msg.Data[begin:offset]
responses[string(name)] = ""
}
offset++
begin = offset
} else {
offset++
}
}
if offset > begin {
name := nfo.msg.Data[begin:offset]
responses[string(name)] = ""
}
return responses, nil
}
//wrapper for field
type Field struct {
size int32
typeId byte
data []byte
}
//creates new field
func newField(typeId byte, data []byte) *Field {
return &Field{
size: int32(len(data) + 1),
typeId: typeId,
data: data,
}
}
//serializes field and writes it to buf
func (f *Field) WriteToBuf(buf *bytes.Buffer) {
binary.Write(buf, binary.BigEndian, f.size)
binary.Write(buf, binary.BigEndian, f.typeId)
buf.Write(f.data)
}
type Aerospike struct {
Server string
EnableAuth bool
AutoAuthDisable bool
Username string
Password string
}
var sampleConfig = `
## Aerospike servers to connect to (with port),
## provide username,password and set EnableAuth =true if authentication is enabled
## autoAuthDisable disables authentication if not supported
## This plugin will query all namespaces the aerospike
## server has configured and get stats for them.
server = "localhost:3000"
enableAuth = false
authAuthDisable = false
username = ""
password = ""
`
func (a *Aerospike) SampleConfig() string {
return sampleConfig
}
func (a *Aerospike) Description() string {
return "Read stats from an aerospike server"
}
func (a *Aerospike) Gather(acc telegraf.Accumulator) error {
host := a.Server
aerospikeInfo, err := a.getMap(STATISTICS_COMMAND, host)
if err != nil {
return fmt.Errorf("Aerospike info failed: %s", err)
}
fields := make(map[string]interface{})
readAerospikeStats(aerospikeInfo, fields, host, "")
latencyInfo, err := a.get(LATENCY_COMMAND, host)
if err != nil {
fmt.Println("gathering latency failed ", err)
return fmt.Errorf("Latency info failed %s", err.Error())
}
tags := map[string]string{
"aerospike_host": host,
"namespace": "_service",
}
readAerospikeLatency(latencyInfo, fields, host)
acc.AddFields("aerospike", fields, tags)
namespaces, err := a.getList(NAMESPACES_COMMAND, host)
if err != nil {
return fmt.Errorf("Aerospike namespace list failed: %s", err)
}
for ix := range namespaces {
nsInfo, err := a.getMap([]byte("namespace/"+namespaces[ix]+"\n"), host)
if err != nil {
return fmt.Errorf("Aerospike namespace '%s' query failed: %s", namespaces[ix], err)
}
fields := make(map[string]interface{})
readAerospikeStats(nsInfo, fields, host, namespaces[ix])
tags["namespace"] = namespaces[ix]
acc.AddFields("aerospike", fields, tags)
}
return nil
}
func (a *Aerospike) getMap(key []byte, host string) (map[string]string, error) {
data, err := a.get(key, host)
if err != nil {
return nil, fmt.Errorf("Failed to get data: %s", err)
}
parsed, err := unmarshalMapInfo(data, string(key))
if err != nil {
return nil, fmt.Errorf("Failed to unmarshal data: %s", err)
}
return parsed, nil
}
func (a *Aerospike) getList(key []byte, host string) ([]string, error) {
data, err := a.get(key, host)
if err != nil {
return nil, fmt.Errorf("Failed to get data: %s", err)
}
parsed, err := unmarshalListInfo(data, string(key))
if err != nil {
return nil, fmt.Errorf("Failed to unmarshal data: %s", err)
}
return parsed, nil
}
func (a *Aerospike) get(key []byte, host string) (map[string]string, error) {
var err error
var data map[string]string
asInfo := &aerospikeInfoCommand{
msg: &aerospikeMessage{
aerospikeMessageHeader: aerospikeMessageHeader{
Version: uint8(MSG_VERSION),
Type: uint8(MSG_TYPE_INFO),
DataLen: msgLenToBytes(int64(len(key))),
},
Data: key,
},
}
cmd := asInfo.msg.Serialize()
addr, err := net.ResolveTCPAddr("tcp", host)
if err != nil {
return data, fmt.Errorf("Lookup failed for '%s': %s", host, err)
}
conn, err := net.DialTCP("tcp", nil, addr)
if err != nil {
return data, fmt.Errorf("Connection failed for '%s': %s", host, err)
}
defer conn.Close()
if a.EnableAuth {
fmt.Println("Going to authenticate")
err = a.authenticate(conn)
if err != nil {
fmt.Println("Authentication failed with error ", err)
return data, err
}
}
_, err = conn.Write(cmd)
if err != nil {
return data, fmt.Errorf("Failed to send to '%s': %s", host, err)
}
msgHeader := bytes.NewBuffer(make([]byte, MSG_HEADER_SIZE))
_, err = readLenFromConn(conn, msgHeader.Bytes(), MSG_HEADER_SIZE)
if err != nil {
return data, fmt.Errorf("Failed to read header: %s", err)
}
err = binary.Read(msgHeader, binary.BigEndian, &asInfo.msg.aerospikeMessageHeader)
if err != nil {
return data, fmt.Errorf("Failed to unmarshal header: %s", err)
}
msgLen := msgLenFromBytes(asInfo.msg.aerospikeMessageHeader.DataLen)
if int64(len(asInfo.msg.Data)) != msgLen {
asInfo.msg.Data = make([]byte, msgLen)
}
_, err = readLenFromConn(conn, asInfo.msg.Data, len(asInfo.msg.Data))
if err != nil {
return data, fmt.Errorf("Failed to read from connection to '%s': %s", host, err)
}
data, err = asInfo.parseMultiResponse()
if err != nil {
return data, fmt.Errorf("Failed to parse response from '%s': %s", host, err)
}
return data, err
}
func (a *Aerospike) authenticate(conn *net.TCPConn) error {
buf := bytes.NewBuffer([]byte{})
header := make([]byte, 16)
for i := 0; i < 16; i++ {
header[i] = 0
}
header[2] = AUTHENTICATE
header[3] = byte(2) //field count
binary.Write(buf, binary.BigEndian, header)
usernameField := newField(USER, []byte(a.Username))
usernameField.WriteToBuf(buf)
pw, err := bcrypt.Hash(a.Password, "$2a$10$7EqJtq98hPqEX7fNZaFWoO")
if err != nil {
fmt.Println("Failed to hash password", err)
return err
}
passwordField := newField(CREDENTIAL, []byte(pw))
passwordField.WriteToBuf(buf)
data := buf.Bytes()
asInfo := &aerospikeInfoCommand{
msg: &aerospikeMessage{
aerospikeMessageHeader: aerospikeMessageHeader{
Version: uint8(MSG_VERSION),
Type: uint8(MSG_TYPE_AUTH),
DataLen: msgLenToBytes(int64(len(data))),
},
Data: data,
},
}
cmd := asInfo.msg.Serialize()
_, err = conn.Write(cmd)
if err != nil {
return err
}
msgHeaderData := bytes.NewBuffer(make([]byte, MSG_HEADER_SIZE))
var msgHeader aerospikeMessageHeader
_, err = readLenFromConn(conn, msgHeaderData.Bytes(), MSG_HEADER_SIZE)
if err != nil {
return fmt.Errorf("Failed to read header: %s", err)
}
err = binary.Read(msgHeaderData, binary.BigEndian, &msgHeader)
if err != nil {
return fmt.Errorf("Failed to unmarshal header: %s", err)
}
msgLen := msgLenFromBytes(msgHeader.DataLen)
buffer := make([]byte, msgLen)
_, err = readLenFromConn(conn, buffer, int(msgLen))
if err != nil {
return fmt.Errorf("Failed to read from connection to '%s': ", err)
}
fmt.Println("Got: ", buffer)
errorCode := int(buffer[1])
if (errorCode == ERR_NOT_SUPPORTED || errorCode == ERR_NOT_ENABLED) && a.AutoAuthDisable {
fmt.Println("Disabling auth for ", a.Server)
a.EnableAuth = false
return nil
}
val, exist := errorCode2Msg[errorCode]
if exist {
return fmt.Errorf("Authentication failed: %s", val)
} else if errorCode != 0 {
return fmt.Errorf("Authentication request failed with errorcode %d", errorCode)
}
fmt.Println("Authenticated with return code ", errorCode)
return nil
}
func readAerospikeStats(
stats map[string]string,
fields map[string]interface{},
host string,
namespace string,
) {
tags := map[string]string{
"aerospike_host": host,
"namespace": "_service",
}
if namespace != "" {
tags["namespace"] = namespace
}
for key, value := range stats {
// We are going to ignore all string based keys
val, err := strconv.ParseInt(value, 10, 64)
if err == nil {
if strings.Contains(key, "-") {
key = strings.Replace(key, "-", "_", -1)
}
fields[key] = val
}
}
}
func readAerospikeLatency(
stats map[string]string,
fields map[string]interface{},
host string,
) {
key := strings.TrimSuffix(string(LATENCY_COMMAND), "\n")
data := stats[key]
splitted := strings.Split(data, ";")
for i := 0; i < len(splitted)-1; i = i + 2 {
ind := strings.Index(splitted[i], ":")
if ind == -1 {
continue
}
metrName := splitted[i][0:ind]
spl1 := splitted[i][ind:]
ind = strings.Index(spl1, ",")
spl1 = spl1[ind+1:]
unitTimes := strings.Split(spl1, ",")
vals := strings.Split(splitted[i+1], ",")
//fmt.Println("Got ", metrName, " dime ", unitTimes, " vals ", vals)
for i := 1; i < len(unitTimes); i++ {
metric := metrName + "_" + unitTimes[i] //strings.Replace(unitTimes[i], ">", "_gt_", 1)
value, err := strconv.ParseFloat(vals[i], 64)
if err != nil {
fmt.Println("Failed to parse float when parsing latency ")
continue
}
fields[metric] = value
}
}
//fmt.Println("aerospike", "Tags", tags, "Fields", fields)
}
func unmarshalMapInfo(infoMap map[string]string, key string) (map[string]string, error) {
key = strings.TrimSuffix(key, "\n")
res := map[string]string{}
v, exists := infoMap[key]
if !exists {
errString := ""
for k, v := range infoMap {
if strings.HasPrefix(k, "ERROR:") || strings.HasPrefix(k, "Error:") {
errString = k + ": " + v
}
}
if errString == "" {
return res, fmt.Errorf("Key '%s' missing from info", key)
}
return res, fmt.Errorf("Key '%s' missing from info: Probable Error: '%s' ", key, errString)
}
values := strings.Split(v, ";")
for i := range values {
kv := strings.Split(values[i], "=")
if len(kv) > 1 {
res[kv[0]] = kv[1]
}
}
return res, nil
}
func unmarshalListInfo(infoMap map[string]string, key string) ([]string, error) {
key = strings.TrimSuffix(key, "\n")
v, exists := infoMap[key]
if !exists {
return []string{}, fmt.Errorf("Key '%s' missing from info", key)
}
values := strings.Split(v, ";")
return values, nil
}
func readLenFromConn(c net.Conn, buffer []byte, length int) (total int, err error) {
var r int
for total < length {
r, err = c.Read(buffer[total:length])
total += r
if err != nil {
break
}
}
return
}
// Taken from aerospike-client-go/types/message.go
func msgLenToBytes(DataLen int64) [6]byte {
b := make([]byte, 8)
binary.BigEndian.PutUint64(b, uint64(DataLen))
res := [6]byte{}
copy(res[:], b[2:])
return res
}
// Taken from aerospike-client-go/types/message.go
func msgLenFromBytes(buf [6]byte) int64 {
nbytes := append([]byte{0, 0}, buf[:]...)
DataLen := binary.BigEndian.Uint64(nbytes)
return int64(DataLen)
}
func populateErrorCode2Msg() {
errorCode2Msg = make(map[int]string)
errorCode2Msg[ERR_USER] = "No user supplied or unknown user."
errorCode2Msg[ERR_PASSWORD] = "Password does not exists or not recognized."
errorCode2Msg[ERR_NOT_ENABLED] = "Security functionality not enabled by connected server."
errorCode2Msg[ERR_SCHEME] = "Security scheme not supported."
errorCode2Msg[ERR_EXPIRED_PASSWORD] = "Expired password."
errorCode2Msg[ERR_NOT_SUPPORTED] = "Security functionality not supported by connected server."
}
func init() {
populateErrorCode2Msg()
inputs.Add("aerospike", func() telegraf.Input {
return &Aerospike{}
})
}