221 lines
5.2 KiB
Go
221 lines
5.2 KiB
Go
package http
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"fmt"
|
|
"io"
|
|
"io/ioutil"
|
|
"net/http"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/influxdata/telegraf"
|
|
"github.com/influxdata/telegraf/internal"
|
|
"github.com/influxdata/telegraf/internal/tls"
|
|
"github.com/influxdata/telegraf/plugins/outputs"
|
|
"github.com/influxdata/telegraf/plugins/serializers"
|
|
"golang.org/x/oauth2"
|
|
"golang.org/x/oauth2/clientcredentials"
|
|
)
|
|
|
|
var sampleConfig = `
|
|
## URL is the address to send metrics to
|
|
url = "http://127.0.0.1:8080/metric"
|
|
|
|
## Timeout for HTTP message
|
|
# timeout = "5s"
|
|
|
|
## HTTP method, one of: "POST" or "PUT"
|
|
# method = "POST"
|
|
|
|
## HTTP Basic Auth credentials
|
|
# username = "username"
|
|
# password = "pa$$word"
|
|
|
|
## OAuth2 Client Credentials Grant
|
|
# client_id = "clientid"
|
|
# client_secret = "secret"
|
|
# token_url = "https://indentityprovider/oauth2/v1/token"
|
|
# scopes = ["urn:opc:idm:__myscopes__"]
|
|
|
|
## Optional TLS Config
|
|
# tls_ca = "/etc/telegraf/ca.pem"
|
|
# tls_cert = "/etc/telegraf/cert.pem"
|
|
# tls_key = "/etc/telegraf/key.pem"
|
|
## Use TLS but skip chain & host verification
|
|
# insecure_skip_verify = false
|
|
|
|
## Data format to output.
|
|
## Each data format has it's own unique set of configuration options, read
|
|
## more about them here:
|
|
## https://github.com/influxdata/telegraf/blob/master/docs/DATA_FORMATS_OUTPUT.md
|
|
# data_format = "influx"
|
|
|
|
## Additional HTTP headers
|
|
# [outputs.http.headers]
|
|
# # Should be set manually to "application/json" for json data_format
|
|
# Content-Type = "text/plain; charset=utf-8"
|
|
|
|
## HTTP Content-Encoding for write request body, can be set to "gzip" to
|
|
## compress body or "identity" to apply no encoding.
|
|
# content_encoding = "identity"
|
|
`
|
|
|
|
const (
|
|
defaultClientTimeout = 5 * time.Second
|
|
defaultContentType = "text/plain; charset=utf-8"
|
|
defaultMethod = http.MethodPost
|
|
)
|
|
|
|
type HTTP struct {
|
|
URL string `toml:"url"`
|
|
Timeout internal.Duration `toml:"timeout"`
|
|
Method string `toml:"method"`
|
|
Username string `toml:"username"`
|
|
Password string `toml:"password"`
|
|
Headers map[string]string `toml:"headers"`
|
|
ClientID string `toml:"client_id"`
|
|
ClientSecret string `toml:"client_secret"`
|
|
TokenURL string `toml:"token_url"`
|
|
Scopes []string `toml:"scopes"`
|
|
ContentEncoding string `toml:"content_encoding"`
|
|
tls.ClientConfig
|
|
|
|
client *http.Client
|
|
serializer serializers.Serializer
|
|
}
|
|
|
|
func (h *HTTP) SetSerializer(serializer serializers.Serializer) {
|
|
h.serializer = serializer
|
|
}
|
|
|
|
func (h *HTTP) createClient(ctx context.Context) (*http.Client, error) {
|
|
tlsCfg, err := h.ClientConfig.TLSConfig()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
client := &http.Client{
|
|
Transport: &http.Transport{
|
|
TLSClientConfig: tlsCfg,
|
|
Proxy: http.ProxyFromEnvironment,
|
|
},
|
|
Timeout: h.Timeout.Duration,
|
|
}
|
|
|
|
if h.ClientID != "" && h.ClientSecret != "" && h.TokenURL != "" {
|
|
oauthConfig := clientcredentials.Config{
|
|
ClientID: h.ClientID,
|
|
ClientSecret: h.ClientSecret,
|
|
TokenURL: h.TokenURL,
|
|
Scopes: h.Scopes,
|
|
}
|
|
ctx = context.WithValue(ctx, oauth2.HTTPClient, client)
|
|
client = oauthConfig.Client(ctx)
|
|
}
|
|
|
|
return client, nil
|
|
}
|
|
|
|
func (h *HTTP) Connect() error {
|
|
if h.Method == "" {
|
|
h.Method = http.MethodPost
|
|
}
|
|
h.Method = strings.ToUpper(h.Method)
|
|
if h.Method != http.MethodPost && h.Method != http.MethodPut {
|
|
return fmt.Errorf("invalid method [%s] %s", h.URL, h.Method)
|
|
}
|
|
|
|
if h.Timeout.Duration == 0 {
|
|
h.Timeout.Duration = defaultClientTimeout
|
|
}
|
|
|
|
ctx := context.Background()
|
|
client, err := h.createClient(ctx)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
h.client = client
|
|
|
|
return nil
|
|
}
|
|
|
|
func (h *HTTP) Close() error {
|
|
return nil
|
|
}
|
|
|
|
func (h *HTTP) Description() string {
|
|
return "A plugin that can transmit metrics over HTTP"
|
|
}
|
|
|
|
func (h *HTTP) SampleConfig() string {
|
|
return sampleConfig
|
|
}
|
|
|
|
func (h *HTTP) Write(metrics []telegraf.Metric) error {
|
|
reqBody, err := h.serializer.SerializeBatch(metrics)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := h.write(reqBody); err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (h *HTTP) write(reqBody []byte) error {
|
|
var reqBodyBuffer io.Reader = bytes.NewBuffer(reqBody)
|
|
|
|
var err error
|
|
if h.ContentEncoding == "gzip" {
|
|
reqBodyBuffer, err = internal.CompressWithGzip(reqBodyBuffer)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
req, err := http.NewRequest(h.Method, h.URL, reqBodyBuffer)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if h.Username != "" || h.Password != "" {
|
|
req.SetBasicAuth(h.Username, h.Password)
|
|
}
|
|
|
|
req.Header.Set("User-Agent", "Telegraf/"+internal.Version())
|
|
req.Header.Set("Content-Type", defaultContentType)
|
|
if h.ContentEncoding == "gzip" {
|
|
req.Header.Set("Content-Encoding", "gzip")
|
|
}
|
|
for k, v := range h.Headers {
|
|
req.Header.Set(k, v)
|
|
}
|
|
|
|
resp, err := h.client.Do(req)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer resp.Body.Close()
|
|
_, err = ioutil.ReadAll(resp.Body)
|
|
|
|
if resp.StatusCode < 200 || resp.StatusCode >= 300 {
|
|
return fmt.Errorf("when writing to [%s] received status code: %d", h.URL, resp.StatusCode)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func init() {
|
|
outputs.Add("http", func() telegraf.Output {
|
|
return &HTTP{
|
|
Timeout: internal.Duration{Duration: defaultClientTimeout},
|
|
Method: defaultMethod,
|
|
}
|
|
})
|
|
}
|