2016-10-13 12:04:23 +00:00
|
|
|
// Copyright 2016 The Prometheus Authors
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package kubernetes
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
"github.com/prometheus/common/model"
|
Refactor SD configuration to remove `config` dependency (#3629)
* refactor: move targetGroup struct and CheckOverflow() to their own package
* refactor: move auth and security related structs to a utility package, fix import error in utility package
* refactor: Azure SD, remove SD struct from config
* refactor: DNS SD, remove SD struct from config into dns package
* refactor: ec2 SD, move SD struct from config into the ec2 package
* refactor: file SD, move SD struct from config to file discovery package
* refactor: gce, move SD struct from config to gce discovery package
* refactor: move HTTPClientConfig and URL into util/config, fix import error in httputil
* refactor: consul, move SD struct from config into consul discovery package
* refactor: marathon, move SD struct from config into marathon discovery package
* refactor: triton, move SD struct from config to triton discovery package, fix test
* refactor: zookeeper, move SD structs from config to zookeeper discovery package
* refactor: openstack, remove SD struct from config, move into openstack discovery package
* refactor: kubernetes, move SD struct from config into kubernetes discovery package
* refactor: notifier, use targetgroup package instead of config
* refactor: tests for file, marathon, triton SD - use targetgroup package instead of config.TargetGroup
* refactor: retrieval, use targetgroup package instead of config.TargetGroup
* refactor: storage, use config util package
* refactor: discovery manager, use targetgroup package instead of config.TargetGroup
* refactor: use HTTPClient and TLS config from configUtil instead of config
* refactor: tests, use targetgroup package instead of config.TargetGroup
* refactor: fix tagetgroup.Group pointers that were removed by mistake
* refactor: openstack, kubernetes: drop prefixes
* refactor: remove import aliases forced due to vscode bug
* refactor: move main SD struct out of config into discovery/config
* refactor: rename configUtil to config_util
* refactor: rename yamlUtil to yaml_config
* refactor: kubernetes, remove prefixes
* refactor: move the TargetGroup package to discovery/
* refactor: fix order of imports
2017-12-29 20:01:34 +00:00
|
|
|
"github.com/prometheus/prometheus/discovery/targetgroup"
|
2019-01-28 15:42:25 +00:00
|
|
|
v1 "k8s.io/api/core/v1"
|
2017-05-11 08:29:10 +00:00
|
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
2016-10-13 12:04:23 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func makeMultiPortService() *v1.Service {
|
|
|
|
return &v1.Service{
|
2017-05-11 08:29:10 +00:00
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
2016-10-13 12:04:23 +00:00
|
|
|
Name: "testservice",
|
|
|
|
Namespace: "default",
|
|
|
|
Labels: map[string]string{"testlabel": "testvalue"},
|
|
|
|
Annotations: map[string]string{"testannotation": "testannotationvalue"},
|
|
|
|
},
|
|
|
|
Spec: v1.ServiceSpec{
|
|
|
|
Ports: []v1.ServicePort{
|
2017-03-16 23:29:47 +00:00
|
|
|
{
|
2016-10-13 12:04:23 +00:00
|
|
|
Name: "testport0",
|
|
|
|
Protocol: v1.ProtocolTCP,
|
|
|
|
Port: int32(30900),
|
|
|
|
},
|
2017-03-16 23:29:47 +00:00
|
|
|
{
|
2016-10-13 12:04:23 +00:00
|
|
|
Name: "testport1",
|
|
|
|
Protocol: v1.ProtocolUDP,
|
|
|
|
Port: int32(30901),
|
|
|
|
},
|
|
|
|
},
|
2018-12-18 15:17:34 +00:00
|
|
|
Type: v1.ServiceTypeClusterIP,
|
|
|
|
ClusterIP: "10.0.0.1",
|
2016-10-13 12:04:23 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func makeSuffixedService(suffix string) *v1.Service {
|
|
|
|
return &v1.Service{
|
2017-05-11 08:29:10 +00:00
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
2016-10-13 12:04:23 +00:00
|
|
|
Name: fmt.Sprintf("testservice%s", suffix),
|
|
|
|
Namespace: "default",
|
|
|
|
},
|
|
|
|
Spec: v1.ServiceSpec{
|
|
|
|
Ports: []v1.ServicePort{
|
2017-03-16 23:29:47 +00:00
|
|
|
{
|
2016-10-13 12:04:23 +00:00
|
|
|
Name: "testport",
|
|
|
|
Protocol: v1.ProtocolTCP,
|
|
|
|
Port: int32(30900),
|
|
|
|
},
|
|
|
|
},
|
2018-12-18 15:17:34 +00:00
|
|
|
Type: v1.ServiceTypeClusterIP,
|
|
|
|
ClusterIP: "10.0.0.1",
|
2016-10-13 12:04:23 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func makeService() *v1.Service {
|
|
|
|
return makeSuffixedService("")
|
|
|
|
}
|
|
|
|
|
2018-12-18 15:17:34 +00:00
|
|
|
func makeExternalService() *v1.Service {
|
|
|
|
return &v1.Service{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "testservice-external",
|
|
|
|
Namespace: "default",
|
|
|
|
},
|
|
|
|
Spec: v1.ServiceSpec{
|
|
|
|
Ports: []v1.ServicePort{
|
|
|
|
{
|
|
|
|
Name: "testport",
|
|
|
|
Protocol: v1.ProtocolTCP,
|
|
|
|
Port: int32(31900),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Type: v1.ServiceTypeExternalName,
|
|
|
|
ExternalName: "FooExternalName",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-04-09 16:35:14 +00:00
|
|
|
func TestServiceDiscoveryAdd(t *testing.T) {
|
2019-01-28 15:42:25 +00:00
|
|
|
n, c := makeDiscovery(RoleService, NamespaceDiscovery{})
|
2016-10-13 12:04:23 +00:00
|
|
|
|
|
|
|
k8sDiscoveryTest{
|
|
|
|
discovery: n,
|
2018-04-09 16:35:14 +00:00
|
|
|
afterStart: func() {
|
|
|
|
obj := makeService()
|
|
|
|
c.CoreV1().Services(obj.Namespace).Create(obj)
|
2018-12-18 15:17:34 +00:00
|
|
|
obj = makeExternalService()
|
|
|
|
c.CoreV1().Services(obj.Namespace).Create(obj)
|
2016-10-13 12:04:23 +00:00
|
|
|
},
|
2018-12-18 15:17:34 +00:00
|
|
|
expectedMaxItems: 2,
|
2018-04-09 16:35:14 +00:00
|
|
|
expectedRes: map[string]*targetgroup.Group{
|
|
|
|
"svc/default/testservice": {
|
2016-10-13 12:04:23 +00:00
|
|
|
Targets: []model.LabelSet{
|
2017-03-16 23:29:47 +00:00
|
|
|
{
|
2016-10-13 12:04:23 +00:00
|
|
|
"__meta_kubernetes_service_port_protocol": "TCP",
|
2018-12-18 15:17:34 +00:00
|
|
|
"__address__": "testservice.default.svc:30900",
|
|
|
|
"__meta_kubernetes_service_cluster_ip": "10.0.0.1",
|
|
|
|
"__meta_kubernetes_service_port_name": "testport",
|
2016-10-13 12:04:23 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
Labels: model.LabelSet{
|
|
|
|
"__meta_kubernetes_service_name": "testservice",
|
|
|
|
"__meta_kubernetes_namespace": "default",
|
|
|
|
},
|
|
|
|
Source: "svc/default/testservice",
|
|
|
|
},
|
2018-12-18 15:17:34 +00:00
|
|
|
"svc/default/testservice-external": {
|
|
|
|
Targets: []model.LabelSet{
|
|
|
|
{
|
|
|
|
"__meta_kubernetes_service_port_protocol": "TCP",
|
|
|
|
"__address__": "testservice-external.default.svc:31900",
|
|
|
|
"__meta_kubernetes_service_port_name": "testport",
|
|
|
|
"__meta_kubernetes_service_external_name": "FooExternalName",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Labels: model.LabelSet{
|
|
|
|
"__meta_kubernetes_service_name": "testservice-external",
|
|
|
|
"__meta_kubernetes_namespace": "default",
|
|
|
|
},
|
|
|
|
Source: "svc/default/testservice-external",
|
|
|
|
},
|
2016-10-13 12:04:23 +00:00
|
|
|
},
|
|
|
|
}.Run(t)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestServiceDiscoveryDelete(t *testing.T) {
|
2019-01-28 15:42:25 +00:00
|
|
|
n, c := makeDiscovery(RoleService, NamespaceDiscovery{}, makeService())
|
2016-10-13 12:04:23 +00:00
|
|
|
|
|
|
|
k8sDiscoveryTest{
|
2018-04-09 16:35:14 +00:00
|
|
|
discovery: n,
|
|
|
|
afterStart: func() {
|
|
|
|
obj := makeService()
|
|
|
|
c.CoreV1().Services(obj.Namespace).Delete(obj.Name, &metav1.DeleteOptions{})
|
2016-10-13 12:04:23 +00:00
|
|
|
},
|
2018-04-09 16:35:14 +00:00
|
|
|
expectedMaxItems: 2,
|
|
|
|
expectedRes: map[string]*targetgroup.Group{
|
|
|
|
"svc/default/testservice": {
|
2016-10-13 12:04:23 +00:00
|
|
|
Source: "svc/default/testservice",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}.Run(t)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestServiceDiscoveryUpdate(t *testing.T) {
|
2019-01-28 15:42:25 +00:00
|
|
|
n, c := makeDiscovery(RoleService, NamespaceDiscovery{}, makeService())
|
2016-10-13 12:04:23 +00:00
|
|
|
|
|
|
|
k8sDiscoveryTest{
|
2018-04-09 16:35:14 +00:00
|
|
|
discovery: n,
|
|
|
|
afterStart: func() {
|
|
|
|
obj := makeMultiPortService()
|
|
|
|
c.CoreV1().Services(obj.Namespace).Update(obj)
|
2016-10-13 12:04:23 +00:00
|
|
|
},
|
2018-04-09 16:35:14 +00:00
|
|
|
expectedMaxItems: 2,
|
|
|
|
expectedRes: map[string]*targetgroup.Group{
|
|
|
|
"svc/default/testservice": {
|
2016-10-13 12:04:23 +00:00
|
|
|
Targets: []model.LabelSet{
|
2017-03-16 23:29:47 +00:00
|
|
|
{
|
2016-10-13 12:04:23 +00:00
|
|
|
"__meta_kubernetes_service_port_protocol": "TCP",
|
2018-12-18 15:17:34 +00:00
|
|
|
"__address__": "testservice.default.svc:30900",
|
|
|
|
"__meta_kubernetes_service_cluster_ip": "10.0.0.1",
|
|
|
|
"__meta_kubernetes_service_port_name": "testport0",
|
2016-10-13 12:04:23 +00:00
|
|
|
},
|
2017-03-16 23:29:47 +00:00
|
|
|
{
|
2016-10-13 12:04:23 +00:00
|
|
|
"__meta_kubernetes_service_port_protocol": "UDP",
|
2018-12-18 15:17:34 +00:00
|
|
|
"__address__": "testservice.default.svc:30901",
|
|
|
|
"__meta_kubernetes_service_cluster_ip": "10.0.0.1",
|
|
|
|
"__meta_kubernetes_service_port_name": "testport1",
|
2016-10-13 12:04:23 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
Labels: model.LabelSet{
|
2019-04-10 12:21:42 +00:00
|
|
|
"__meta_kubernetes_service_name": "testservice",
|
|
|
|
"__meta_kubernetes_namespace": "default",
|
|
|
|
"__meta_kubernetes_service_label_testlabel": "testvalue",
|
|
|
|
"__meta_kubernetes_service_labelpresent_testlabel": "true",
|
|
|
|
"__meta_kubernetes_service_annotation_testannotation": "testannotationvalue",
|
|
|
|
"__meta_kubernetes_service_annotationpresent_testannotation": "true",
|
2016-10-13 12:04:23 +00:00
|
|
|
},
|
|
|
|
Source: "svc/default/testservice",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}.Run(t)
|
|
|
|
}
|
2018-06-14 14:49:43 +00:00
|
|
|
|
|
|
|
func TestServiceDiscoveryNamespaces(t *testing.T) {
|
2019-01-28 15:42:25 +00:00
|
|
|
n, c := makeDiscovery(RoleService, NamespaceDiscovery{Names: []string{"ns1", "ns2"}})
|
2018-06-14 14:49:43 +00:00
|
|
|
|
|
|
|
k8sDiscoveryTest{
|
|
|
|
discovery: n,
|
|
|
|
afterStart: func() {
|
|
|
|
for _, ns := range []string{"ns1", "ns2"} {
|
|
|
|
obj := makeService()
|
|
|
|
obj.Namespace = ns
|
|
|
|
c.CoreV1().Services(obj.Namespace).Create(obj)
|
|
|
|
}
|
|
|
|
},
|
|
|
|
expectedMaxItems: 2,
|
|
|
|
expectedRes: map[string]*targetgroup.Group{
|
|
|
|
"svc/ns1/testservice": {
|
|
|
|
Targets: []model.LabelSet{
|
|
|
|
{
|
|
|
|
"__meta_kubernetes_service_port_protocol": "TCP",
|
2018-12-18 15:17:34 +00:00
|
|
|
"__address__": "testservice.ns1.svc:30900",
|
|
|
|
"__meta_kubernetes_service_cluster_ip": "10.0.0.1",
|
|
|
|
"__meta_kubernetes_service_port_name": "testport",
|
2018-06-14 14:49:43 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
Labels: model.LabelSet{
|
|
|
|
"__meta_kubernetes_service_name": "testservice",
|
|
|
|
"__meta_kubernetes_namespace": "ns1",
|
|
|
|
},
|
|
|
|
Source: "svc/ns1/testservice",
|
|
|
|
},
|
|
|
|
"svc/ns2/testservice": {
|
|
|
|
Targets: []model.LabelSet{
|
|
|
|
{
|
|
|
|
"__meta_kubernetes_service_port_protocol": "TCP",
|
2018-12-18 15:17:34 +00:00
|
|
|
"__address__": "testservice.ns2.svc:30900",
|
|
|
|
"__meta_kubernetes_service_cluster_ip": "10.0.0.1",
|
|
|
|
"__meta_kubernetes_service_port_name": "testport",
|
2018-06-14 14:49:43 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
Labels: model.LabelSet{
|
|
|
|
"__meta_kubernetes_service_name": "testservice",
|
|
|
|
"__meta_kubernetes_namespace": "ns2",
|
|
|
|
},
|
|
|
|
Source: "svc/ns2/testservice",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}.Run(t)
|
|
|
|
}
|