telegraf/plugins/outputs/health/health.go

273 lines
5.9 KiB
Go

package health
import (
"context"
"crypto/tls"
"errors"
"log"
"net"
"net/http"
"net/url"
"sync"
"time"
"github.com/influxdata/telegraf"
"github.com/influxdata/telegraf/internal"
tlsint "github.com/influxdata/telegraf/internal/tls"
"github.com/influxdata/telegraf/plugins/outputs"
)
const (
defaultServiceAddress = "tcp://:8080"
defaultReadTimeout = 5 * time.Second
defaultWriteTimeout = 5 * time.Second
)
var sampleConfig = `
## Address and port to listen on.
## ex: service_address = "http://localhost:8080"
## service_address = "unix:///var/run/telegraf-health.sock"
# service_address = "http://:8080"
## The maximum duration for reading the entire request.
# read_timeout = "5s"
## The maximum duration for writing the entire response.
# write_timeout = "5s"
## Username and password to accept for HTTP basic authentication.
# basic_username = "user1"
# basic_password = "secret"
## Allowed CA certificates for client certificates.
# tls_allowed_cacerts = ["/etc/telegraf/clientca.pem"]
## TLS server certificate and private key.
# tls_cert = "/etc/telegraf/cert.pem"
# tls_key = "/etc/telegraf/key.pem"
## One or more check sub-tables should be defined, it is also recommended to
## use metric filtering to limit the metrics that flow into this output.
##
## When using the default buffer sizes, this example will fail when the
## metric buffer is half full.
##
## namepass = ["internal_write"]
## tagpass = { output = ["influxdb"] }
##
## [[outputs.health.compares]]
## field = "buffer_size"
## lt = 5000.0
##
## [[outputs.health.contains]]
## field = "buffer_size"
`
type Checker interface {
// Check returns true if the metrics meet its criteria.
Check(metrics []telegraf.Metric) bool
}
type Health struct {
ServiceAddress string `toml:"service_address"`
ReadTimeout internal.Duration `toml:"read_timeout"`
WriteTimeout internal.Duration `toml:"write_timeout"`
BasicUsername string `toml:"basic_username"`
BasicPassword string `toml:"basic_password"`
tlsint.ServerConfig
Compares []*Compares `toml:"compares"`
Contains []*Contains `toml:"contains"`
checkers []Checker
wg sync.WaitGroup
server *http.Server
origin string
network string
address string
tlsConf *tls.Config
mu sync.Mutex
healthy bool
}
func (h *Health) SampleConfig() string {
return sampleConfig
}
func (h *Health) Description() string {
return "Configurable HTTP health check resource based on metrics"
}
func (h *Health) Init() error {
u, err := url.Parse(h.ServiceAddress)
if err != nil {
return err
}
switch u.Scheme {
case "http", "https":
h.network = "tcp"
h.address = u.Host
case "unix":
h.network = u.Scheme
h.address = u.Path
case "tcp4", "tcp6", "tcp":
h.network = u.Scheme
h.address = u.Host
default:
return errors.New("service_address contains invalid scheme")
}
h.tlsConf, err = h.ServerConfig.TLSConfig()
if err != nil {
return err
}
h.checkers = make([]Checker, 0)
for i := range h.Compares {
h.checkers = append(h.checkers, h.Compares[i])
}
for i := range h.Contains {
h.checkers = append(h.checkers, h.Contains[i])
}
return nil
}
// Connect starts the HTTP server.
func (h *Health) Connect() error {
authHandler := internal.AuthHandler(h.BasicUsername, h.BasicPassword, "health", onAuthError)
h.server = &http.Server{
Addr: h.ServiceAddress,
Handler: authHandler(h),
ReadTimeout: h.ReadTimeout.Duration,
WriteTimeout: h.WriteTimeout.Duration,
TLSConfig: h.tlsConf,
}
listener, err := h.listen()
if err != nil {
return err
}
h.origin = h.getOrigin(listener)
log.Printf("I! [outputs.health] Listening on %s", h.origin)
h.wg.Add(1)
go func() {
defer h.wg.Done()
err := h.server.Serve(listener)
if err != http.ErrServerClosed {
log.Printf("E! [outputs.health] Serve error on %s: %v", h.origin, err)
}
h.origin = ""
}()
return nil
}
func onAuthError(_ http.ResponseWriter) {
}
func (h *Health) listen() (net.Listener, error) {
if h.tlsConf != nil {
return tls.Listen(h.network, h.address, h.tlsConf)
} else {
return net.Listen(h.network, h.address)
}
}
func (h *Health) ServeHTTP(rw http.ResponseWriter, req *http.Request) {
var code = http.StatusOK
if !h.isHealthy() {
code = http.StatusServiceUnavailable
}
rw.Header().Set("Server", internal.ProductToken())
http.Error(rw, http.StatusText(code), code)
}
// Write runs all checks over the metric batch and adjust health state.
func (h *Health) Write(metrics []telegraf.Metric) error {
healthy := true
for _, checker := range h.checkers {
success := checker.Check(metrics)
if !success {
healthy = false
}
}
h.setHealthy(healthy)
return nil
}
// Close shuts down the HTTP server.
func (h *Health) Close() error {
ctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)
defer cancel()
h.server.Shutdown(ctx)
h.wg.Wait()
return nil
}
// Origin returns the URL of the HTTP server.
func (h *Health) Origin() string {
return h.origin
}
func (h *Health) getOrigin(listener net.Listener) string {
scheme := "http"
if h.tlsConf != nil {
scheme = "https"
}
if h.network == "unix" {
scheme = "unix"
}
switch h.network {
case "unix":
origin := &url.URL{
Scheme: scheme,
Path: listener.Addr().String(),
}
return origin.String()
default:
origin := &url.URL{
Scheme: scheme,
Host: listener.Addr().String(),
}
return origin.String()
}
}
func (h *Health) setHealthy(healthy bool) {
h.mu.Lock()
defer h.mu.Unlock()
h.healthy = healthy
}
func (h *Health) isHealthy() bool {
h.mu.Lock()
defer h.mu.Unlock()
return h.healthy
}
func NewHealth() *Health {
return &Health{
ServiceAddress: defaultServiceAddress,
ReadTimeout: internal.Duration{Duration: defaultReadTimeout},
WriteTimeout: internal.Duration{Duration: defaultWriteTimeout},
healthy: true,
}
}
func init() {
outputs.Add("health", func() telegraf.Output {
return NewHealth()
})
}