310 lines
		
	
	
		
			8.5 KiB
		
	
	
	
		
			Go
		
	
	
	
			
		
		
	
	
			310 lines
		
	
	
		
			8.5 KiB
		
	
	
	
		
			Go
		
	
	
	
| package syslog
 | |
| 
 | |
| import (
 | |
| 	"crypto/tls"
 | |
| 	"io/ioutil"
 | |
| 	"net"
 | |
| 	"os"
 | |
| 	"path/filepath"
 | |
| 	"testing"
 | |
| 	"time"
 | |
| 
 | |
| 	"github.com/google/go-cmp/cmp"
 | |
| 	"github.com/influxdata/telegraf/internal"
 | |
| 	framing "github.com/influxdata/telegraf/internal/syslog"
 | |
| 	"github.com/influxdata/telegraf/testutil"
 | |
| 	"github.com/stretchr/testify/require"
 | |
| )
 | |
| 
 | |
| func getTestCasesForNonTransparent() []testCaseStream {
 | |
| 	testCases := []testCaseStream{
 | |
| 		{
 | |
| 			name: "1st/avg/ok",
 | |
| 			data: []byte(`<29>1 2016-02-21T04:32:57+00:00 web1 someservice 2341 2 [origin][meta sequence="14125553" service="someservice"] "GET /v1/ok HTTP/1.1" 200 145 "-" "hacheck 0.9.0" 24306 127.0.0.1:40124 575`),
 | |
| 			wantStrict: []testutil.Metric{
 | |
| 				{
 | |
| 					Measurement: "syslog",
 | |
| 					Fields: map[string]interface{}{
 | |
| 						"version":       uint16(1),
 | |
| 						"timestamp":     time.Unix(1456029177, 0).UnixNano(),
 | |
| 						"procid":        "2341",
 | |
| 						"msgid":         "2",
 | |
| 						"message":       `"GET /v1/ok HTTP/1.1" 200 145 "-" "hacheck 0.9.0" 24306 127.0.0.1:40124 575`,
 | |
| 						"origin":        true,
 | |
| 						"meta_sequence": "14125553",
 | |
| 						"meta_service":  "someservice",
 | |
| 						"severity_code": 5,
 | |
| 						"facility_code": 3,
 | |
| 					},
 | |
| 					Tags: map[string]string{
 | |
| 						"severity": "notice",
 | |
| 						"facility": "daemon",
 | |
| 						"hostname": "web1",
 | |
| 						"appname":  "someservice",
 | |
| 					},
 | |
| 					Time: defaultTime,
 | |
| 				},
 | |
| 			},
 | |
| 			wantBestEffort: []testutil.Metric{
 | |
| 				{
 | |
| 					Measurement: "syslog",
 | |
| 					Fields: map[string]interface{}{
 | |
| 						"version":       uint16(1),
 | |
| 						"timestamp":     time.Unix(1456029177, 0).UnixNano(),
 | |
| 						"procid":        "2341",
 | |
| 						"msgid":         "2",
 | |
| 						"message":       `"GET /v1/ok HTTP/1.1" 200 145 "-" "hacheck 0.9.0" 24306 127.0.0.1:40124 575`,
 | |
| 						"origin":        true,
 | |
| 						"meta_sequence": "14125553",
 | |
| 						"meta_service":  "someservice",
 | |
| 						"severity_code": 5,
 | |
| 						"facility_code": 3,
 | |
| 					},
 | |
| 					Tags: map[string]string{
 | |
| 						"severity": "notice",
 | |
| 						"facility": "daemon",
 | |
| 						"hostname": "web1",
 | |
| 						"appname":  "someservice",
 | |
| 					},
 | |
| 					Time: defaultTime,
 | |
| 				},
 | |
| 			},
 | |
| 			werr: 1,
 | |
| 		},
 | |
| 		{
 | |
| 			name: "1st/min/ok//2nd/min/ok",
 | |
| 			data: []byte("<1>2 - - - - - -\n<4>11 - - - - - -\n"),
 | |
| 			wantStrict: []testutil.Metric{
 | |
| 				{
 | |
| 					Measurement: "syslog",
 | |
| 					Fields: map[string]interface{}{
 | |
| 						"version":       uint16(2),
 | |
| 						"severity_code": 1,
 | |
| 						"facility_code": 0,
 | |
| 					},
 | |
| 					Tags: map[string]string{
 | |
| 						"severity": "alert",
 | |
| 						"facility": "kern",
 | |
| 					},
 | |
| 					Time: defaultTime,
 | |
| 				},
 | |
| 				{
 | |
| 					Measurement: "syslog",
 | |
| 					Fields: map[string]interface{}{
 | |
| 						"version":       uint16(11),
 | |
| 						"severity_code": 4,
 | |
| 						"facility_code": 0,
 | |
| 					},
 | |
| 					Tags: map[string]string{
 | |
| 						"severity": "warning",
 | |
| 						"facility": "kern",
 | |
| 					},
 | |
| 					Time: defaultTime.Add(time.Nanosecond),
 | |
| 				},
 | |
| 			},
 | |
| 			wantBestEffort: []testutil.Metric{
 | |
| 				{
 | |
| 					Measurement: "syslog",
 | |
| 					Fields: map[string]interface{}{
 | |
| 						"version":       uint16(2),
 | |
| 						"severity_code": 1,
 | |
| 						"facility_code": 0,
 | |
| 					},
 | |
| 					Tags: map[string]string{
 | |
| 						"severity": "alert",
 | |
| 						"facility": "kern",
 | |
| 					},
 | |
| 					Time: defaultTime,
 | |
| 				},
 | |
| 				{
 | |
| 					Measurement: "syslog",
 | |
| 					Fields: map[string]interface{}{
 | |
| 						"version":       uint16(11),
 | |
| 						"severity_code": 4,
 | |
| 						"facility_code": 0,
 | |
| 					},
 | |
| 					Tags: map[string]string{
 | |
| 						"severity": "warning",
 | |
| 						"facility": "kern",
 | |
| 					},
 | |
| 					Time: defaultTime.Add(time.Nanosecond),
 | |
| 				},
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 	return testCases
 | |
| }
 | |
| 
 | |
| func testStrictNonTransparent(t *testing.T, protocol string, address string, wantTLS bool, keepAlive *internal.Duration) {
 | |
| 	for _, tc := range getTestCasesForNonTransparent() {
 | |
| 		t.Run(tc.name, func(t *testing.T) {
 | |
| 			// Creation of a strict mode receiver
 | |
| 			receiver := newTCPSyslogReceiver(protocol+"://"+address, keepAlive, 0, false, framing.NonTransparent)
 | |
| 			require.NotNil(t, receiver)
 | |
| 			if wantTLS {
 | |
| 				receiver.ServerConfig = *pki.TLSServerConfig()
 | |
| 			}
 | |
| 			require.Equal(t, receiver.KeepAlivePeriod, keepAlive)
 | |
| 			acc := &testutil.Accumulator{}
 | |
| 			require.NoError(t, receiver.Start(acc))
 | |
| 			defer receiver.Stop()
 | |
| 
 | |
| 			// Connect
 | |
| 			var conn net.Conn
 | |
| 			var err error
 | |
| 			if wantTLS {
 | |
| 				config, e := pki.TLSClientConfig().TLSConfig()
 | |
| 				require.NoError(t, e)
 | |
| 				config.ServerName = "localhost"
 | |
| 				conn, err = tls.Dial(protocol, address, config)
 | |
| 			} else {
 | |
| 				conn, err = net.Dial(protocol, address)
 | |
| 				defer conn.Close()
 | |
| 			}
 | |
| 			require.NotNil(t, conn)
 | |
| 			require.NoError(t, err)
 | |
| 
 | |
| 			// Clear
 | |
| 			acc.ClearMetrics()
 | |
| 			acc.Errors = make([]error, 0)
 | |
| 
 | |
| 			// Write
 | |
| 			_, err = conn.Write(tc.data)
 | |
| 			conn.Close()
 | |
| 			require.NoError(t, err)
 | |
| 
 | |
| 			// Wait that the the number of data points is accumulated
 | |
| 			// Since the receiver is running concurrently
 | |
| 			if tc.wantStrict != nil {
 | |
| 				acc.Wait(len(tc.wantStrict))
 | |
| 			}
 | |
| 
 | |
| 			// Wait the parsing error
 | |
| 			acc.WaitError(tc.werr)
 | |
| 
 | |
| 			// Verify
 | |
| 			if len(acc.Errors) != tc.werr {
 | |
| 				t.Fatalf("Got unexpected errors. want error = %v, errors = %v\n", tc.werr, acc.Errors)
 | |
| 			}
 | |
| 			var got []testutil.Metric
 | |
| 			for _, metric := range acc.Metrics {
 | |
| 				got = append(got, *metric)
 | |
| 			}
 | |
| 			if !cmp.Equal(tc.wantStrict, got) {
 | |
| 				t.Fatalf("Got (+) / Want (-)\n %s", cmp.Diff(tc.wantStrict, got))
 | |
| 			}
 | |
| 		})
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func testBestEffortNonTransparent(t *testing.T, protocol string, address string, wantTLS bool, keepAlive *internal.Duration) {
 | |
| 	for _, tc := range getTestCasesForNonTransparent() {
 | |
| 		t.Run(tc.name, func(t *testing.T) {
 | |
| 			// Creation of a best effort mode receiver
 | |
| 			receiver := newTCPSyslogReceiver(protocol+"://"+address, keepAlive, 0, true, framing.NonTransparent)
 | |
| 			require.NotNil(t, receiver)
 | |
| 			if wantTLS {
 | |
| 				receiver.ServerConfig = *pki.TLSServerConfig()
 | |
| 			}
 | |
| 			require.Equal(t, receiver.KeepAlivePeriod, keepAlive)
 | |
| 			acc := &testutil.Accumulator{}
 | |
| 			require.NoError(t, receiver.Start(acc))
 | |
| 			defer receiver.Stop()
 | |
| 
 | |
| 			// Connect
 | |
| 			var conn net.Conn
 | |
| 			var err error
 | |
| 			if wantTLS {
 | |
| 				config, e := pki.TLSClientConfig().TLSConfig()
 | |
| 				require.NoError(t, e)
 | |
| 				config.ServerName = "localhost"
 | |
| 				conn, err = tls.Dial(protocol, address, config)
 | |
| 			} else {
 | |
| 				conn, err = net.Dial(protocol, address)
 | |
| 			}
 | |
| 			require.NotNil(t, conn)
 | |
| 			require.NoError(t, err)
 | |
| 
 | |
| 			// Clear
 | |
| 			acc.ClearMetrics()
 | |
| 			acc.Errors = make([]error, 0)
 | |
| 
 | |
| 			// Write
 | |
| 			_, err = conn.Write(tc.data)
 | |
| 			require.NoError(t, err)
 | |
| 			conn.Close()
 | |
| 
 | |
| 			// Wait that the the number of data points is accumulated
 | |
| 			// Since the receiver is running concurrently
 | |
| 			if tc.wantBestEffort != nil {
 | |
| 				acc.Wait(len(tc.wantBestEffort))
 | |
| 			}
 | |
| 
 | |
| 			// Verify
 | |
| 			var got []testutil.Metric
 | |
| 			for _, metric := range acc.Metrics {
 | |
| 				got = append(got, *metric)
 | |
| 			}
 | |
| 			if !cmp.Equal(tc.wantBestEffort, got) {
 | |
| 				t.Fatalf("Got (+) / Want (-)\n %s", cmp.Diff(tc.wantBestEffort, got))
 | |
| 			}
 | |
| 		})
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestNonTransparentStrict_tcp(t *testing.T) {
 | |
| 	testStrictNonTransparent(t, "tcp", address, false, nil)
 | |
| }
 | |
| 
 | |
| func TestNonTransparentBestEffort_tcp(t *testing.T) {
 | |
| 	testBestEffortNonTransparent(t, "tcp", address, false, nil)
 | |
| }
 | |
| 
 | |
| func TestNonTransparentStrict_tcp_tls(t *testing.T) {
 | |
| 	testStrictNonTransparent(t, "tcp", address, true, nil)
 | |
| }
 | |
| 
 | |
| func TestNonTransparentBestEffort_tcp_tls(t *testing.T) {
 | |
| 	testBestEffortNonTransparent(t, "tcp", address, true, nil)
 | |
| }
 | |
| 
 | |
| func TestNonTransparentStrictWithKeepAlive_tcp_tls(t *testing.T) {
 | |
| 	testStrictNonTransparent(t, "tcp", address, true, &internal.Duration{Duration: time.Minute})
 | |
| }
 | |
| 
 | |
| func TestNonTransparentStrictWithZeroKeepAlive_tcp_tls(t *testing.T) {
 | |
| 	testStrictNonTransparent(t, "tcp", address, true, &internal.Duration{Duration: 0})
 | |
| }
 | |
| 
 | |
| func TestNonTransparentStrict_unix(t *testing.T) {
 | |
| 	tmpdir, err := ioutil.TempDir("", "telegraf")
 | |
| 	require.NoError(t, err)
 | |
| 	defer os.RemoveAll(tmpdir)
 | |
| 	sock := filepath.Join(tmpdir, "syslog.TestStrict_unix.sock")
 | |
| 	testStrictNonTransparent(t, "unix", sock, false, nil)
 | |
| }
 | |
| 
 | |
| func TestNonTransparentBestEffort_unix(t *testing.T) {
 | |
| 	tmpdir, err := ioutil.TempDir("", "telegraf")
 | |
| 	require.NoError(t, err)
 | |
| 	defer os.RemoveAll(tmpdir)
 | |
| 	sock := filepath.Join(tmpdir, "syslog.TestBestEffort_unix.sock")
 | |
| 	testBestEffortNonTransparent(t, "unix", sock, false, nil)
 | |
| }
 | |
| 
 | |
| func TestNonTransparentStrict_unix_tls(t *testing.T) {
 | |
| 	tmpdir, err := ioutil.TempDir("", "telegraf")
 | |
| 	require.NoError(t, err)
 | |
| 	defer os.RemoveAll(tmpdir)
 | |
| 	sock := filepath.Join(tmpdir, "syslog.TestStrict_unix_tls.sock")
 | |
| 	testStrictNonTransparent(t, "unix", sock, true, nil)
 | |
| }
 | |
| 
 | |
| func TestNonTransparentBestEffort_unix_tls(t *testing.T) {
 | |
| 	tmpdir, err := ioutil.TempDir("", "telegraf")
 | |
| 	require.NoError(t, err)
 | |
| 	defer os.RemoveAll(tmpdir)
 | |
| 	sock := filepath.Join(tmpdir, "syslog.TestBestEffort_unix_tls.sock")
 | |
| 	testBestEffortNonTransparent(t, "unix", sock, true, nil)
 | |
| }
 |