559 lines
13 KiB
Go
559 lines
13 KiB
Go
package aerospike
|
|
|
|
import (
|
|
"bytes"
|
|
"encoding/binary"
|
|
"fmt"
|
|
"net"
|
|
"strconv"
|
|
"strings"
|
|
|
|
"github.com/influxdata/telegraf"
|
|
"github.com/influxdata/telegraf/plugins/inputs"
|
|
|
|
"github.com/jameskeane/bcrypt"
|
|
)
|
|
|
|
const (
|
|
MSG_HEADER_SIZE = 8
|
|
MSG_TYPE_INFO = 1 // Info is 1
|
|
MSG_TYPE_AUTH = 2 //
|
|
MSG_VERSION = 2
|
|
|
|
// Field IDs
|
|
USER byte = 0
|
|
CREDENTIAL byte = 3
|
|
|
|
// Commands
|
|
AUTHENTICATE byte = 0
|
|
|
|
//constants from aerospike doc
|
|
ERR_PASSWORD = 62
|
|
ERR_USER = 60
|
|
ERR_NOT_ENABLED = 52
|
|
ERR_SCHEME = 53
|
|
ERR_EXPIRED_PASSWORD = 63
|
|
ERR_NOT_SUPPORTED = 51
|
|
)
|
|
|
|
var errorCode2Msg map[int]string
|
|
|
|
var (
|
|
STATISTICS_COMMAND = []byte("statistics\n")
|
|
NAMESPACES_COMMAND = []byte("namespaces\n")
|
|
LATENCY_COMMAND = []byte("latency:back=60;\n") //get latency of previous minute
|
|
)
|
|
|
|
type aerospikeMessageHeader struct {
|
|
Version uint8
|
|
Type uint8
|
|
DataLen [6]byte
|
|
}
|
|
|
|
type aerospikeMessage struct {
|
|
aerospikeMessageHeader
|
|
Data []byte
|
|
}
|
|
|
|
// Taken from aerospike-client-go/types/message.go
|
|
func (msg *aerospikeMessage) Serialize() []byte {
|
|
msg.DataLen = msgLenToBytes(int64(len(msg.Data)))
|
|
buf := bytes.NewBuffer([]byte{})
|
|
binary.Write(buf, binary.BigEndian, msg.aerospikeMessageHeader)
|
|
binary.Write(buf, binary.BigEndian, msg.Data[:])
|
|
return buf.Bytes()
|
|
}
|
|
|
|
type aerospikeInfoCommand struct {
|
|
msg *aerospikeMessage
|
|
}
|
|
|
|
// Taken from aerospike-client-go/info.go
|
|
func (nfo *aerospikeInfoCommand) parseMultiResponse() (map[string]string, error) {
|
|
responses := make(map[string]string)
|
|
offset := int64(0)
|
|
begin := int64(0)
|
|
|
|
dataLen := int64(len(nfo.msg.Data))
|
|
|
|
// Create reusable StringBuilder for performance.
|
|
for offset < dataLen {
|
|
b := nfo.msg.Data[offset]
|
|
|
|
if b == '\t' {
|
|
name := nfo.msg.Data[begin:offset]
|
|
offset++
|
|
begin = offset
|
|
|
|
// Parse field value.
|
|
for offset < dataLen {
|
|
if nfo.msg.Data[offset] == '\n' {
|
|
break
|
|
}
|
|
offset++
|
|
}
|
|
|
|
if offset > begin {
|
|
value := nfo.msg.Data[begin:offset]
|
|
responses[string(name)] = string(value)
|
|
} else {
|
|
responses[string(name)] = ""
|
|
}
|
|
offset++
|
|
begin = offset
|
|
} else if b == '\n' {
|
|
if offset > begin {
|
|
name := nfo.msg.Data[begin:offset]
|
|
responses[string(name)] = ""
|
|
}
|
|
offset++
|
|
begin = offset
|
|
} else {
|
|
offset++
|
|
}
|
|
}
|
|
|
|
if offset > begin {
|
|
name := nfo.msg.Data[begin:offset]
|
|
responses[string(name)] = ""
|
|
}
|
|
return responses, nil
|
|
}
|
|
|
|
//wrapper for field
|
|
type Field struct {
|
|
size int32
|
|
typeId byte
|
|
data []byte
|
|
}
|
|
|
|
//creates new field
|
|
func newField(typeId byte, data []byte) *Field {
|
|
return &Field{
|
|
size: int32(len(data) + 1),
|
|
typeId: typeId,
|
|
data: data,
|
|
}
|
|
}
|
|
|
|
//serializes field and writes it to buf
|
|
func (f *Field) WriteToBuf(buf *bytes.Buffer) {
|
|
binary.Write(buf, binary.BigEndian, f.size)
|
|
binary.Write(buf, binary.BigEndian, f.typeId)
|
|
buf.Write(f.data)
|
|
|
|
}
|
|
|
|
type Aerospike struct {
|
|
Server string
|
|
EnableAuth bool
|
|
AutoAuthDisable bool
|
|
Username string
|
|
Password string
|
|
}
|
|
|
|
var sampleConfig = `
|
|
## Aerospike servers to connect to (with port),
|
|
## provide username,password and set EnableAuth =true if authentication is enabled
|
|
## autoAuthDisable disables authentication if not supported
|
|
## This plugin will query all namespaces the aerospike
|
|
## server has configured and get stats for them.
|
|
server = "localhost:3000"
|
|
enableAuth = false
|
|
autoAuthDisable = false
|
|
username = ""
|
|
password = ""
|
|
`
|
|
|
|
func (a *Aerospike) SampleConfig() string {
|
|
return sampleConfig
|
|
}
|
|
|
|
func (a *Aerospike) Description() string {
|
|
return "Read stats from an aerospike server"
|
|
}
|
|
|
|
func (a *Aerospike) Gather(acc telegraf.Accumulator) error {
|
|
|
|
host := a.Server
|
|
|
|
aerospikeInfo, err := a.getMap(STATISTICS_COMMAND, host)
|
|
if err != nil {
|
|
return fmt.Errorf("Aerospike info failed: %s", err)
|
|
}
|
|
fields := make(map[string]interface{})
|
|
readAerospikeStats(aerospikeInfo, fields, host, "")
|
|
|
|
latencyInfo, err := a.get(LATENCY_COMMAND, host)
|
|
if err != nil {
|
|
fmt.Println("gathering latency failed ", err)
|
|
return fmt.Errorf("Latency info failed %s", err.Error())
|
|
}
|
|
|
|
tags := map[string]string{
|
|
"aerospike_host": host,
|
|
"namespace": "_service",
|
|
}
|
|
|
|
readAerospikeLatency(latencyInfo, fields, host)
|
|
|
|
acc.AddFields("aerospike", fields, tags)
|
|
|
|
namespaces, err := a.getList(NAMESPACES_COMMAND, host)
|
|
if err != nil {
|
|
return fmt.Errorf("Aerospike namespace list failed: %s", err)
|
|
}
|
|
|
|
for ix := range namespaces {
|
|
nsInfo, err := a.getMap([]byte("namespace/"+namespaces[ix]+"\n"), host)
|
|
if err != nil {
|
|
return fmt.Errorf("Aerospike namespace '%s' query failed: %s", namespaces[ix], err)
|
|
}
|
|
fields := make(map[string]interface{})
|
|
readAerospikeStats(nsInfo, fields, host, namespaces[ix])
|
|
|
|
tags["namespace"] = namespaces[ix]
|
|
acc.AddFields("aerospike", fields, tags)
|
|
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (a *Aerospike) getMap(key []byte, host string) (map[string]string, error) {
|
|
data, err := a.get(key, host)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("Failed to get data: %s", err)
|
|
}
|
|
parsed, err := unmarshalMapInfo(data, string(key))
|
|
if err != nil {
|
|
return nil, fmt.Errorf("Failed to unmarshal data: %s", err)
|
|
}
|
|
|
|
return parsed, nil
|
|
}
|
|
|
|
func (a *Aerospike) getList(key []byte, host string) ([]string, error) {
|
|
data, err := a.get(key, host)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("Failed to get data: %s", err)
|
|
}
|
|
parsed, err := unmarshalListInfo(data, string(key))
|
|
if err != nil {
|
|
return nil, fmt.Errorf("Failed to unmarshal data: %s", err)
|
|
}
|
|
|
|
return parsed, nil
|
|
}
|
|
|
|
func (a *Aerospike) get(key []byte, host string) (map[string]string, error) {
|
|
var err error
|
|
var data map[string]string
|
|
|
|
asInfo := &aerospikeInfoCommand{
|
|
msg: &aerospikeMessage{
|
|
aerospikeMessageHeader: aerospikeMessageHeader{
|
|
Version: uint8(MSG_VERSION),
|
|
Type: uint8(MSG_TYPE_INFO),
|
|
DataLen: msgLenToBytes(int64(len(key))),
|
|
},
|
|
Data: key,
|
|
},
|
|
}
|
|
|
|
cmd := asInfo.msg.Serialize()
|
|
addr, err := net.ResolveTCPAddr("tcp", host)
|
|
if err != nil {
|
|
return data, fmt.Errorf("Lookup failed for '%s': %s", host, err)
|
|
}
|
|
|
|
conn, err := net.DialTCP("tcp", nil, addr)
|
|
if err != nil {
|
|
return data, fmt.Errorf("Connection failed for '%s': %s", host, err)
|
|
}
|
|
defer conn.Close()
|
|
|
|
if a.EnableAuth {
|
|
fmt.Println("Going to authenticate")
|
|
err = a.authenticate(conn)
|
|
if err != nil {
|
|
fmt.Println("Authentication failed with error ", err)
|
|
return data, err
|
|
}
|
|
}
|
|
|
|
_, err = conn.Write(cmd)
|
|
if err != nil {
|
|
return data, fmt.Errorf("Failed to send to '%s': %s", host, err)
|
|
}
|
|
|
|
msgHeader := bytes.NewBuffer(make([]byte, MSG_HEADER_SIZE))
|
|
_, err = readLenFromConn(conn, msgHeader.Bytes(), MSG_HEADER_SIZE)
|
|
if err != nil {
|
|
return data, fmt.Errorf("Failed to read header: %s", err)
|
|
}
|
|
err = binary.Read(msgHeader, binary.BigEndian, &asInfo.msg.aerospikeMessageHeader)
|
|
if err != nil {
|
|
return data, fmt.Errorf("Failed to unmarshal header: %s", err)
|
|
}
|
|
|
|
msgLen := msgLenFromBytes(asInfo.msg.aerospikeMessageHeader.DataLen)
|
|
|
|
if int64(len(asInfo.msg.Data)) != msgLen {
|
|
asInfo.msg.Data = make([]byte, msgLen)
|
|
}
|
|
|
|
_, err = readLenFromConn(conn, asInfo.msg.Data, len(asInfo.msg.Data))
|
|
if err != nil {
|
|
return data, fmt.Errorf("Failed to read from connection to '%s': %s", host, err)
|
|
}
|
|
|
|
data, err = asInfo.parseMultiResponse()
|
|
if err != nil {
|
|
return data, fmt.Errorf("Failed to parse response from '%s': %s", host, err)
|
|
}
|
|
|
|
return data, err
|
|
}
|
|
|
|
func (a *Aerospike) authenticate(conn *net.TCPConn) error {
|
|
|
|
buf := bytes.NewBuffer([]byte{})
|
|
header := make([]byte, 16)
|
|
|
|
for i := 0; i < 16; i++ {
|
|
header[i] = 0
|
|
}
|
|
header[2] = AUTHENTICATE
|
|
header[3] = byte(2) //field count
|
|
|
|
binary.Write(buf, binary.BigEndian, header)
|
|
usernameField := newField(USER, []byte(a.Username))
|
|
usernameField.WriteToBuf(buf)
|
|
|
|
pw, err := bcrypt.Hash(a.Password, "$2a$10$7EqJtq98hPqEX7fNZaFWoO")
|
|
if err != nil {
|
|
fmt.Println("Failed to hash password", err)
|
|
return err
|
|
}
|
|
|
|
passwordField := newField(CREDENTIAL, []byte(pw))
|
|
passwordField.WriteToBuf(buf)
|
|
|
|
data := buf.Bytes()
|
|
|
|
asInfo := &aerospikeInfoCommand{
|
|
msg: &aerospikeMessage{
|
|
aerospikeMessageHeader: aerospikeMessageHeader{
|
|
Version: uint8(MSG_VERSION),
|
|
Type: uint8(MSG_TYPE_AUTH),
|
|
DataLen: msgLenToBytes(int64(len(data))),
|
|
},
|
|
Data: data,
|
|
},
|
|
}
|
|
|
|
cmd := asInfo.msg.Serialize()
|
|
_, err = conn.Write(cmd)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
msgHeaderData := bytes.NewBuffer(make([]byte, MSG_HEADER_SIZE))
|
|
var msgHeader aerospikeMessageHeader
|
|
|
|
_, err = readLenFromConn(conn, msgHeaderData.Bytes(), MSG_HEADER_SIZE)
|
|
if err != nil {
|
|
return fmt.Errorf("Failed to read header: %s", err)
|
|
}
|
|
err = binary.Read(msgHeaderData, binary.BigEndian, &msgHeader)
|
|
if err != nil {
|
|
return fmt.Errorf("Failed to unmarshal header: %s", err)
|
|
}
|
|
|
|
msgLen := msgLenFromBytes(msgHeader.DataLen)
|
|
buffer := make([]byte, msgLen)
|
|
_, err = readLenFromConn(conn, buffer, int(msgLen))
|
|
if err != nil {
|
|
return fmt.Errorf("Failed to read from connection to '%s': ", err)
|
|
}
|
|
|
|
fmt.Println("Got: ", buffer)
|
|
|
|
errorCode := int(buffer[1])
|
|
|
|
if (errorCode == ERR_NOT_SUPPORTED || errorCode == ERR_NOT_ENABLED) && a.AutoAuthDisable {
|
|
fmt.Println("Disabling auth for ", a.Server)
|
|
a.EnableAuth = false
|
|
return nil
|
|
|
|
}
|
|
|
|
val, exist := errorCode2Msg[errorCode]
|
|
if exist {
|
|
return fmt.Errorf("Authentication failed: %s", val)
|
|
} else if errorCode != 0 {
|
|
return fmt.Errorf("Authentication request failed with errorcode %d", errorCode)
|
|
}
|
|
|
|
fmt.Println("Authenticated with return code ", errorCode)
|
|
|
|
return nil
|
|
}
|
|
|
|
func readAerospikeStats(
|
|
stats map[string]string,
|
|
fields map[string]interface{},
|
|
host string,
|
|
namespace string,
|
|
) {
|
|
tags := map[string]string{
|
|
"aerospike_host": host,
|
|
"namespace": "_service",
|
|
}
|
|
|
|
if namespace != "" {
|
|
tags["namespace"] = namespace
|
|
}
|
|
for key, value := range stats {
|
|
// We are going to ignore all string based keys
|
|
val, err := strconv.ParseInt(value, 10, 64)
|
|
if err == nil {
|
|
if strings.Contains(key, "-") {
|
|
key = strings.Replace(key, "-", "_", -1)
|
|
}
|
|
fields[key] = val
|
|
}
|
|
}
|
|
}
|
|
|
|
func readAerospikeLatency(
|
|
stats map[string]string,
|
|
fields map[string]interface{},
|
|
host string,
|
|
) {
|
|
|
|
key := strings.TrimSuffix(string(LATENCY_COMMAND), "\n")
|
|
data := stats[key]
|
|
|
|
splitted := strings.Split(data, ";")
|
|
|
|
for i := 0; i < len(splitted)-1; i = i + 2 {
|
|
ind := strings.Index(splitted[i], ":")
|
|
if ind == -1 {
|
|
continue
|
|
}
|
|
|
|
metrName := splitted[i][0:ind]
|
|
spl1 := splitted[i][ind:]
|
|
ind = strings.Index(spl1, ",")
|
|
spl1 = spl1[ind+1:]
|
|
unitTimes := strings.Split(spl1, ",")
|
|
|
|
vals := strings.Split(splitted[i+1], ",")
|
|
|
|
//fmt.Println("Got ", metrName, " dime ", unitTimes, " vals ", vals)
|
|
|
|
for i := 1; i < len(unitTimes); i++ {
|
|
metric := metrName + "_" + unitTimes[i] //strings.Replace(unitTimes[i], ">", "_gt_", 1)
|
|
value, err := strconv.ParseFloat(vals[i], 64)
|
|
if err != nil {
|
|
fmt.Println("Failed to parse float when parsing latency ")
|
|
continue
|
|
}
|
|
fields[metric] = value
|
|
}
|
|
|
|
}
|
|
//fmt.Println("aerospike", "Tags", tags, "Fields", fields)
|
|
|
|
}
|
|
func unmarshalMapInfo(infoMap map[string]string, key string) (map[string]string, error) {
|
|
key = strings.TrimSuffix(key, "\n")
|
|
res := map[string]string{}
|
|
|
|
v, exists := infoMap[key]
|
|
if !exists {
|
|
errString := ""
|
|
for k, v := range infoMap {
|
|
if strings.HasPrefix(k, "ERROR:") || strings.HasPrefix(k, "Error:") {
|
|
errString = k + ": " + v
|
|
}
|
|
}
|
|
if errString == "" {
|
|
return res, fmt.Errorf("Key '%s' missing from info", key)
|
|
}
|
|
return res, fmt.Errorf("Key '%s' missing from info: Probable Error: '%s' ", key, errString)
|
|
|
|
}
|
|
|
|
values := strings.Split(v, ";")
|
|
for i := range values {
|
|
kv := strings.Split(values[i], "=")
|
|
if len(kv) > 1 {
|
|
res[kv[0]] = kv[1]
|
|
}
|
|
}
|
|
|
|
return res, nil
|
|
}
|
|
|
|
func unmarshalListInfo(infoMap map[string]string, key string) ([]string, error) {
|
|
key = strings.TrimSuffix(key, "\n")
|
|
|
|
v, exists := infoMap[key]
|
|
if !exists {
|
|
return []string{}, fmt.Errorf("Key '%s' missing from info", key)
|
|
}
|
|
|
|
values := strings.Split(v, ";")
|
|
return values, nil
|
|
}
|
|
|
|
func readLenFromConn(c net.Conn, buffer []byte, length int) (total int, err error) {
|
|
var r int
|
|
for total < length {
|
|
r, err = c.Read(buffer[total:length])
|
|
total += r
|
|
if err != nil {
|
|
break
|
|
}
|
|
}
|
|
return
|
|
}
|
|
|
|
// Taken from aerospike-client-go/types/message.go
|
|
func msgLenToBytes(DataLen int64) [6]byte {
|
|
b := make([]byte, 8)
|
|
binary.BigEndian.PutUint64(b, uint64(DataLen))
|
|
res := [6]byte{}
|
|
copy(res[:], b[2:])
|
|
return res
|
|
}
|
|
|
|
// Taken from aerospike-client-go/types/message.go
|
|
func msgLenFromBytes(buf [6]byte) int64 {
|
|
nbytes := append([]byte{0, 0}, buf[:]...)
|
|
DataLen := binary.BigEndian.Uint64(nbytes)
|
|
return int64(DataLen)
|
|
}
|
|
|
|
func populateErrorCode2Msg() {
|
|
errorCode2Msg = make(map[int]string)
|
|
|
|
errorCode2Msg[ERR_USER] = "No user supplied or unknown user."
|
|
errorCode2Msg[ERR_PASSWORD] = "Password does not exists or not recognized."
|
|
errorCode2Msg[ERR_NOT_ENABLED] = "Security functionality not enabled by connected server."
|
|
errorCode2Msg[ERR_SCHEME] = "Security scheme not supported."
|
|
errorCode2Msg[ERR_EXPIRED_PASSWORD] = "Expired password."
|
|
errorCode2Msg[ERR_NOT_SUPPORTED] = "Security functionality not supported by connected server."
|
|
}
|
|
|
|
func init() {
|
|
|
|
populateErrorCode2Msg()
|
|
|
|
inputs.Add("aerospike", func() telegraf.Input {
|
|
return &Aerospike{}
|
|
})
|
|
}
|