2015-01-21 19:07:45 +00:00
|
|
|
// Copyright 2013 The Prometheus Authors
|
2013-01-04 11:17:31 +00:00
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
2013-07-14 21:03:56 +00:00
|
|
|
|
2012-12-25 12:50:36 +00:00
|
|
|
package retrieval
|
|
|
|
|
|
|
|
import (
|
2015-03-15 02:36:15 +00:00
|
|
|
"errors"
|
2013-01-04 13:41:47 +00:00
|
|
|
"fmt"
|
2014-07-29 18:31:11 +00:00
|
|
|
"math/rand"
|
2013-01-04 13:41:47 +00:00
|
|
|
"net/http"
|
2015-02-19 17:58:47 +00:00
|
|
|
"net/url"
|
2013-04-10 12:26:07 +00:00
|
|
|
"os"
|
|
|
|
"strings"
|
2014-12-03 17:07:23 +00:00
|
|
|
"sync"
|
2012-12-25 12:50:36 +00:00
|
|
|
"time"
|
2013-06-25 12:02:27 +00:00
|
|
|
|
2013-08-12 15:18:02 +00:00
|
|
|
"github.com/golang/glog"
|
2013-06-25 12:02:27 +00:00
|
|
|
"github.com/prometheus/client_golang/extraction"
|
2014-06-18 17:43:15 +00:00
|
|
|
"github.com/prometheus/client_golang/prometheus"
|
2013-06-25 12:02:27 +00:00
|
|
|
|
|
|
|
clientmodel "github.com/prometheus/client_golang/model"
|
2013-07-30 15:18:07 +00:00
|
|
|
|
2015-04-20 10:24:25 +00:00
|
|
|
"github.com/prometheus/prometheus/config"
|
2015-03-15 02:36:15 +00:00
|
|
|
"github.com/prometheus/prometheus/storage"
|
2013-07-30 15:18:07 +00:00
|
|
|
"github.com/prometheus/prometheus/utility"
|
2012-12-25 12:50:36 +00:00
|
|
|
)
|
|
|
|
|
2013-06-25 12:02:27 +00:00
|
|
|
const (
|
2014-12-10 15:16:49 +00:00
|
|
|
// ScrapeHealthMetricName is the metric name for the synthetic health
|
|
|
|
// variable.
|
2014-12-26 12:37:30 +00:00
|
|
|
scrapeHealthMetricName clientmodel.LabelValue = "up"
|
|
|
|
// ScrapeTimeMetricName is the metric name for the synthetic scrape duration
|
|
|
|
// variable.
|
|
|
|
scrapeDurationMetricName clientmodel.LabelValue = "scrape_duration_seconds"
|
2015-03-15 02:36:15 +00:00
|
|
|
// Capacity of the channel to buffer samples during ingestion.
|
|
|
|
ingestedSamplesCap = 256
|
2014-06-18 17:43:15 +00:00
|
|
|
|
|
|
|
// Constants for instrumentation.
|
2014-07-23 17:55:33 +00:00
|
|
|
namespace = "prometheus"
|
2014-07-29 18:31:11 +00:00
|
|
|
interval = "interval"
|
2014-06-18 17:43:15 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
2015-03-15 02:36:15 +00:00
|
|
|
errIngestChannelFull = errors.New("ingestion channel full")
|
|
|
|
|
2015-04-20 10:24:25 +00:00
|
|
|
localhostRepresentations = []string{"127.0.0.1", "localhost"}
|
2014-06-18 17:43:15 +00:00
|
|
|
|
2014-07-29 18:31:11 +00:00
|
|
|
targetIntervalLength = prometheus.NewSummaryVec(
|
|
|
|
prometheus.SummaryOpts{
|
|
|
|
Namespace: namespace,
|
|
|
|
Name: "target_interval_length_seconds",
|
|
|
|
Help: "Actual intervals between scrapes.",
|
2015-01-21 14:42:25 +00:00
|
|
|
Objectives: map[float64]float64{0.01: 0.001, 0.05: 0.005, 0.5: 0.05, 0.90: 0.01, 0.99: 0.001},
|
2014-07-29 18:31:11 +00:00
|
|
|
},
|
|
|
|
[]string{interval},
|
|
|
|
)
|
2013-04-10 12:26:07 +00:00
|
|
|
)
|
|
|
|
|
2014-06-18 17:43:15 +00:00
|
|
|
func init() {
|
2014-07-29 18:31:11 +00:00
|
|
|
prometheus.MustRegister(targetIntervalLength)
|
2014-06-18 17:43:15 +00:00
|
|
|
}
|
2013-06-25 12:02:27 +00:00
|
|
|
|
2014-12-10 15:16:49 +00:00
|
|
|
// TargetState describes the state of a Target.
|
2012-12-25 12:50:36 +00:00
|
|
|
type TargetState int
|
|
|
|
|
2013-03-21 10:52:42 +00:00
|
|
|
func (t TargetState) String() string {
|
|
|
|
switch t {
|
2014-12-10 15:16:49 +00:00
|
|
|
case Unknown:
|
2013-03-21 10:52:42 +00:00
|
|
|
return "UNKNOWN"
|
2015-03-07 20:50:02 +00:00
|
|
|
case Healthy:
|
|
|
|
return "HEALTHY"
|
|
|
|
case Unhealthy:
|
|
|
|
return "UNHEALTHY"
|
2013-03-21 10:52:42 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
panic("unknown state")
|
|
|
|
}
|
|
|
|
|
2012-12-25 12:50:36 +00:00
|
|
|
const (
|
2015-03-07 20:50:02 +00:00
|
|
|
// Unknown is the state of a Target before it is first scraped.
|
2014-12-10 15:16:49 +00:00
|
|
|
Unknown TargetState = iota
|
2015-03-07 20:50:02 +00:00
|
|
|
// Healthy is the state of a Target that has been successfully scraped.
|
|
|
|
Healthy
|
|
|
|
// Unhealthy is the state of a Target that was scraped unsuccessfully.
|
|
|
|
Unhealthy
|
2012-12-25 12:50:36 +00:00
|
|
|
)
|
|
|
|
|
2013-01-13 09:46:55 +00:00
|
|
|
// A Target represents an endpoint that should be interrogated for metrics.
|
|
|
|
//
|
|
|
|
// The protocol described by this type will likely change in future iterations,
|
|
|
|
// as it offers no good support for aggregated targets and fan out. Thusly,
|
|
|
|
// it is likely that the current Target and target uses will be
|
|
|
|
// wrapped with some resolver type.
|
|
|
|
//
|
|
|
|
// For the future, the Target protocol will abstract away the exact means that
|
|
|
|
// metrics are retrieved and deserialized from the given instance to which it
|
|
|
|
// refers.
|
2015-03-15 02:36:15 +00:00
|
|
|
//
|
|
|
|
// Target implements extraction.Ingester.
|
2013-01-13 09:46:55 +00:00
|
|
|
type Target interface {
|
2015-04-19 06:39:33 +00:00
|
|
|
extraction.Ingester
|
|
|
|
|
2013-05-21 13:31:27 +00:00
|
|
|
// Return the last encountered scrape error, if any.
|
|
|
|
LastError() error
|
2014-07-29 16:28:48 +00:00
|
|
|
// Return the health of the target.
|
|
|
|
State() TargetState
|
|
|
|
// Return the last time a scrape was attempted.
|
|
|
|
LastScrape() time.Time
|
2014-12-17 18:40:59 +00:00
|
|
|
// The URL to which the Target corresponds. Out of all of the available
|
2013-01-13 09:46:55 +00:00
|
|
|
// points in this interface, this one is the best candidate to change given
|
|
|
|
// the ways to express the endpoint.
|
2014-12-17 18:40:59 +00:00
|
|
|
URL() string
|
2015-02-20 15:21:13 +00:00
|
|
|
// Used to populate the `instance` label in metrics.
|
|
|
|
InstanceIdentifier() string
|
2014-12-17 18:40:59 +00:00
|
|
|
// The URL as seen from other hosts. References to localhost are resolved
|
2013-04-10 12:26:07 +00:00
|
|
|
// to the address of the prometheus server.
|
2014-12-17 18:40:59 +00:00
|
|
|
GlobalURL() string
|
2015-04-25 10:59:05 +00:00
|
|
|
// Return the labels describing the targets. These are the base labels
|
|
|
|
// as well as internal labels.
|
|
|
|
Labels() clientmodel.LabelSet
|
2013-02-22 20:07:35 +00:00
|
|
|
// Return the target's base labels.
|
2013-06-25 12:02:27 +00:00
|
|
|
BaseLabels() clientmodel.LabelSet
|
2015-03-18 17:53:43 +00:00
|
|
|
// Return the target's base labels without job and instance label. That's
|
|
|
|
// useful for display purposes.
|
|
|
|
BaseLabelsWithoutJobAndInstance() clientmodel.LabelSet
|
2015-04-20 10:24:25 +00:00
|
|
|
// Start scraping the target in regular intervals.
|
|
|
|
RunScraper(storage.SampleAppender)
|
2014-07-29 18:31:11 +00:00
|
|
|
// Stop scraping, synchronous.
|
|
|
|
StopScraper()
|
2015-04-20 10:24:25 +00:00
|
|
|
// Update the target's state.
|
2015-04-25 10:59:05 +00:00
|
|
|
Update(*config.ScrapeConfig, clientmodel.LabelSet)
|
2013-01-12 20:22:59 +00:00
|
|
|
}
|
2013-01-04 13:41:47 +00:00
|
|
|
|
2013-01-13 09:46:55 +00:00
|
|
|
// target is a Target that refers to a singular HTTP or HTTPS endpoint.
|
|
|
|
type target struct {
|
2014-12-03 17:07:23 +00:00
|
|
|
// Closing scraperStopping signals that scraping should stop.
|
|
|
|
scraperStopping chan struct{}
|
|
|
|
// Closing scraperStopped signals that scraping has been stopped.
|
|
|
|
scraperStopped chan struct{}
|
2015-03-15 02:36:15 +00:00
|
|
|
// Channel to buffer ingested samples.
|
|
|
|
ingestedSamples chan clientmodel.Samples
|
2013-01-04 11:17:31 +00:00
|
|
|
|
2013-05-21 13:31:27 +00:00
|
|
|
// The HTTP client used to scrape the target's endpoint.
|
2013-08-09 17:32:55 +00:00
|
|
|
httpClient *http.Client
|
2014-12-03 17:07:23 +00:00
|
|
|
|
2015-04-20 10:24:25 +00:00
|
|
|
// Mutex protects the members below.
|
2015-04-19 06:39:33 +00:00
|
|
|
sync.RWMutex
|
2015-04-20 10:24:25 +00:00
|
|
|
|
|
|
|
url *url.URL
|
|
|
|
// Any base labels that are added to this target and its metrics.
|
|
|
|
baseLabels clientmodel.LabelSet
|
|
|
|
// The current health state of the target.
|
|
|
|
state TargetState
|
|
|
|
// The last encountered scrape error, if any.
|
|
|
|
lastError error
|
|
|
|
// The last time a scrape was attempted.
|
|
|
|
lastScrape time.Time
|
|
|
|
// What is the deadline for the HTTP or HTTPS against this endpoint.
|
|
|
|
deadline time.Duration
|
|
|
|
// The time between two scrapes.
|
|
|
|
scrapeInterval time.Duration
|
2012-12-25 12:50:36 +00:00
|
|
|
}
|
|
|
|
|
2014-12-10 15:16:49 +00:00
|
|
|
// NewTarget creates a reasonably configured target for querying.
|
2015-04-28 22:08:58 +00:00
|
|
|
func NewTarget(cfg *config.ScrapeConfig, baseLabels clientmodel.LabelSet) Target {
|
2015-03-15 02:36:15 +00:00
|
|
|
t := &target{
|
2015-04-20 10:24:25 +00:00
|
|
|
url: &url.URL{
|
2015-04-28 22:08:58 +00:00
|
|
|
Host: string(baseLabels[clientmodel.AddressLabel]),
|
2015-04-20 10:24:25 +00:00
|
|
|
},
|
2014-12-03 17:07:23 +00:00
|
|
|
scraperStopping: make(chan struct{}),
|
|
|
|
scraperStopped: make(chan struct{}),
|
2013-01-04 13:41:47 +00:00
|
|
|
}
|
2015-04-20 10:24:25 +00:00
|
|
|
t.Update(cfg, baseLabels)
|
2015-03-15 02:36:15 +00:00
|
|
|
return t
|
|
|
|
}
|
2013-04-16 15:22:10 +00:00
|
|
|
|
2015-04-20 10:24:25 +00:00
|
|
|
// Update overwrites settings in the target that are derived from the job config
|
|
|
|
// it belongs to.
|
2015-04-25 10:59:05 +00:00
|
|
|
func (t *target) Update(cfg *config.ScrapeConfig, baseLabels clientmodel.LabelSet) {
|
2015-04-20 10:24:25 +00:00
|
|
|
t.Lock()
|
|
|
|
defer t.Unlock()
|
|
|
|
|
2015-05-07 08:55:03 +00:00
|
|
|
t.url.Scheme = cfg.Scheme
|
2015-04-25 10:59:05 +00:00
|
|
|
t.url.Path = string(baseLabels[clientmodel.MetricsPathLabel])
|
2015-04-20 10:24:25 +00:00
|
|
|
|
2015-05-07 08:55:03 +00:00
|
|
|
t.scrapeInterval = time.Duration(cfg.ScrapeInterval)
|
|
|
|
t.deadline = time.Duration(cfg.ScrapeTimeout)
|
|
|
|
t.httpClient = utility.NewDeadlineClient(time.Duration(cfg.ScrapeTimeout))
|
2015-04-20 10:24:25 +00:00
|
|
|
|
2015-04-28 22:08:58 +00:00
|
|
|
t.baseLabels = clientmodel.LabelSet{}
|
2015-04-25 10:59:05 +00:00
|
|
|
// All remaining internal labels will not be part of the label set.
|
2015-04-20 10:24:25 +00:00
|
|
|
for name, val := range baseLabels {
|
2015-04-25 10:59:05 +00:00
|
|
|
if !strings.HasPrefix(string(name), clientmodel.ReservedLabelPrefix) {
|
|
|
|
t.baseLabels[name] = val
|
|
|
|
}
|
2015-04-20 10:24:25 +00:00
|
|
|
}
|
2015-04-28 22:08:58 +00:00
|
|
|
if _, ok := t.baseLabels[clientmodel.InstanceLabel]; !ok {
|
|
|
|
t.baseLabels[clientmodel.InstanceLabel] = clientmodel.LabelValue(t.InstanceIdentifier())
|
|
|
|
}
|
2015-04-20 10:24:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (t *target) String() string {
|
|
|
|
t.RLock()
|
|
|
|
defer t.RUnlock()
|
|
|
|
return t.url.Host
|
|
|
|
}
|
|
|
|
|
2015-03-15 02:36:15 +00:00
|
|
|
// Ingest implements Target and extraction.Ingester.
|
|
|
|
func (t *target) Ingest(s clientmodel.Samples) error {
|
|
|
|
// Since the regular case is that ingestedSamples is ready to receive,
|
|
|
|
// first try without setting a timeout so that we don't need to allocate
|
|
|
|
// a timer most of the time.
|
|
|
|
select {
|
|
|
|
case t.ingestedSamples <- s:
|
|
|
|
return nil
|
|
|
|
default:
|
|
|
|
select {
|
|
|
|
case t.ingestedSamples <- s:
|
|
|
|
return nil
|
|
|
|
case <-time.After(t.deadline / 10):
|
|
|
|
return errIngestChannelFull
|
|
|
|
}
|
2014-12-26 12:37:30 +00:00
|
|
|
}
|
2013-04-16 15:22:10 +00:00
|
|
|
}
|
|
|
|
|
2014-10-09 13:59:47 +00:00
|
|
|
// RunScraper implements Target.
|
2015-04-20 10:24:25 +00:00
|
|
|
func (t *target) RunScraper(sampleAppender storage.SampleAppender) {
|
2015-04-19 06:39:33 +00:00
|
|
|
defer close(t.scraperStopped)
|
2014-11-11 15:41:20 +00:00
|
|
|
|
2015-04-20 10:24:25 +00:00
|
|
|
t.RLock()
|
|
|
|
lastScrapeInterval := t.scrapeInterval
|
|
|
|
t.RUnlock()
|
|
|
|
|
|
|
|
glog.V(1).Infof("Starting scraper for target %v...", t)
|
|
|
|
|
|
|
|
jitterTimer := time.NewTimer(time.Duration(float64(lastScrapeInterval) * rand.Float64()))
|
2014-07-29 18:31:11 +00:00
|
|
|
select {
|
|
|
|
case <-jitterTimer.C:
|
2014-12-03 17:07:23 +00:00
|
|
|
case <-t.scraperStopping:
|
2014-11-11 23:38:28 +00:00
|
|
|
jitterTimer.Stop()
|
2014-07-29 18:31:11 +00:00
|
|
|
return
|
2013-04-26 15:26:52 +00:00
|
|
|
}
|
2014-07-29 18:31:11 +00:00
|
|
|
jitterTimer.Stop()
|
|
|
|
|
2015-04-20 10:24:25 +00:00
|
|
|
ticker := time.NewTicker(lastScrapeInterval)
|
2014-07-29 18:31:11 +00:00
|
|
|
defer ticker.Stop()
|
|
|
|
|
2014-12-03 17:07:23 +00:00
|
|
|
t.Lock() // Writing t.lastScrape requires the lock.
|
2014-07-29 16:28:48 +00:00
|
|
|
t.lastScrape = time.Now()
|
2014-12-03 17:07:23 +00:00
|
|
|
t.Unlock()
|
2015-03-15 02:36:15 +00:00
|
|
|
t.scrape(sampleAppender)
|
2014-11-11 23:38:28 +00:00
|
|
|
|
|
|
|
// Explanation of the contraption below:
|
|
|
|
//
|
2015-04-19 06:39:33 +00:00
|
|
|
// In case t.scraperStopping has something to receive, we want to read
|
|
|
|
// from that channel rather than starting a new scrape (which might take very
|
|
|
|
// long). That's why the outer select has no ticker.C. Should t.scraperStopping
|
|
|
|
// not have anything to receive, we go into the inner select, where ticker.C
|
|
|
|
// is in the mix.
|
2014-07-29 18:31:11 +00:00
|
|
|
for {
|
|
|
|
select {
|
2014-12-03 17:07:23 +00:00
|
|
|
case <-t.scraperStopping:
|
2014-07-29 18:31:11 +00:00
|
|
|
return
|
2014-11-11 23:38:28 +00:00
|
|
|
default:
|
|
|
|
select {
|
2014-12-03 17:07:23 +00:00
|
|
|
case <-t.scraperStopping:
|
2014-11-11 23:38:28 +00:00
|
|
|
return
|
|
|
|
case <-ticker.C:
|
2015-04-20 10:24:25 +00:00
|
|
|
t.Lock()
|
2015-04-19 06:39:33 +00:00
|
|
|
took := time.Since(t.lastScrape)
|
2014-11-11 23:38:28 +00:00
|
|
|
t.lastScrape = time.Now()
|
2015-04-20 10:24:25 +00:00
|
|
|
|
|
|
|
intervalStr := lastScrapeInterval.String()
|
|
|
|
|
|
|
|
// On changed scrape interval the new interval becomes effective
|
|
|
|
// after the next scrape.
|
|
|
|
if lastScrapeInterval != t.scrapeInterval {
|
2015-05-12 14:52:56 +00:00
|
|
|
ticker.Stop()
|
2015-04-20 10:24:25 +00:00
|
|
|
ticker = time.NewTicker(t.scrapeInterval)
|
|
|
|
lastScrapeInterval = t.scrapeInterval
|
|
|
|
}
|
2014-12-03 17:07:23 +00:00
|
|
|
t.Unlock()
|
2015-04-20 10:24:25 +00:00
|
|
|
|
|
|
|
targetIntervalLength.WithLabelValues(intervalStr).Observe(
|
2015-02-06 15:44:56 +00:00
|
|
|
float64(took) / float64(time.Second), // Sub-second precision.
|
|
|
|
)
|
2015-03-15 02:36:15 +00:00
|
|
|
t.scrape(sampleAppender)
|
2014-11-11 23:38:28 +00:00
|
|
|
}
|
2014-07-29 18:31:11 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-10-09 13:59:47 +00:00
|
|
|
// StopScraper implements Target.
|
2014-07-29 18:31:11 +00:00
|
|
|
func (t *target) StopScraper() {
|
2015-04-20 10:24:25 +00:00
|
|
|
glog.V(1).Infof("Stopping scraper for target %v...", t)
|
|
|
|
|
2014-12-03 17:07:23 +00:00
|
|
|
close(t.scraperStopping)
|
|
|
|
<-t.scraperStopped
|
2015-04-20 10:24:25 +00:00
|
|
|
|
|
|
|
glog.V(1).Infof("Scraper for target %v stopped.", t)
|
2013-04-26 15:26:52 +00:00
|
|
|
}
|
2013-01-22 17:37:01 +00:00
|
|
|
|
2014-09-03 14:46:29 +00:00
|
|
|
const acceptHeader = `application/vnd.google.protobuf;proto=io.prometheus.client.MetricFamily;encoding=delimited;q=0.7,text/plain;version=0.0.4;q=0.3,application/json;schema="prometheus/telemetry";version=0.0.2;q=0.2,*/*;q=0.1`
|
2013-06-27 16:32:05 +00:00
|
|
|
|
2015-03-15 02:36:15 +00:00
|
|
|
func (t *target) scrape(sampleAppender storage.SampleAppender) (err error) {
|
2015-04-19 06:39:33 +00:00
|
|
|
t.RLock()
|
2014-07-29 18:31:11 +00:00
|
|
|
timestamp := clientmodel.Now()
|
2015-04-19 06:39:33 +00:00
|
|
|
|
2013-04-26 15:26:52 +00:00
|
|
|
defer func(start time.Time) {
|
2015-04-19 06:39:33 +00:00
|
|
|
t.recordScrapeHealth(sampleAppender, timestamp, err == nil, time.Since(start))
|
|
|
|
t.RUnlock()
|
|
|
|
|
2014-12-03 17:07:23 +00:00
|
|
|
t.Lock() // Writing t.state and t.lastError requires the lock.
|
2014-07-29 18:31:11 +00:00
|
|
|
if err == nil {
|
2015-03-07 20:50:02 +00:00
|
|
|
t.state = Healthy
|
2014-07-29 18:31:11 +00:00
|
|
|
} else {
|
2015-03-07 20:50:02 +00:00
|
|
|
t.state = Unhealthy
|
2012-12-25 12:50:36 +00:00
|
|
|
}
|
2014-07-29 18:31:11 +00:00
|
|
|
t.lastError = err
|
2014-12-03 17:07:23 +00:00
|
|
|
t.Unlock()
|
2013-04-26 15:26:52 +00:00
|
|
|
}(time.Now())
|
2013-01-04 13:41:47 +00:00
|
|
|
|
2015-04-20 10:24:25 +00:00
|
|
|
req, err := http.NewRequest("GET", t.url.String(), nil)
|
2013-06-27 16:32:05 +00:00
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
req.Header.Add("Accept", acceptHeader)
|
|
|
|
|
2013-08-09 17:32:55 +00:00
|
|
|
resp, err := t.httpClient.Do(req)
|
2013-04-26 15:26:52 +00:00
|
|
|
if err != nil {
|
2013-05-16 05:38:31 +00:00
|
|
|
return err
|
2013-04-26 15:26:52 +00:00
|
|
|
}
|
2014-07-26 21:41:05 +00:00
|
|
|
defer resp.Body.Close()
|
2014-06-16 15:04:08 +00:00
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
|
|
return fmt.Errorf("server returned HTTP status %s", resp.Status)
|
|
|
|
}
|
2013-01-04 13:41:47 +00:00
|
|
|
|
2013-06-25 12:02:27 +00:00
|
|
|
processor, err := extraction.ProcessorForRequestHeader(resp.Header)
|
2013-04-26 15:26:52 +00:00
|
|
|
if err != nil {
|
2013-05-16 05:38:31 +00:00
|
|
|
return err
|
2013-04-26 15:26:52 +00:00
|
|
|
}
|
2013-01-04 13:41:47 +00:00
|
|
|
|
2015-03-15 02:36:15 +00:00
|
|
|
t.ingestedSamples = make(chan clientmodel.Samples, ingestedSamplesCap)
|
2013-08-10 15:02:28 +00:00
|
|
|
|
2013-08-12 13:15:41 +00:00
|
|
|
processOptions := &extraction.ProcessOptions{
|
2013-08-10 15:02:28 +00:00
|
|
|
Timestamp: timestamp,
|
2013-08-12 13:15:41 +00:00
|
|
|
}
|
2015-03-15 02:36:15 +00:00
|
|
|
go func() {
|
|
|
|
err = processor.ProcessSingle(resp.Body, t, processOptions)
|
|
|
|
close(t.ingestedSamples)
|
|
|
|
}()
|
|
|
|
|
|
|
|
for samples := range t.ingestedSamples {
|
|
|
|
for _, s := range samples {
|
|
|
|
s.Metric.MergeFromLabelSet(t.baseLabels, clientmodel.ExporterLabelPrefix)
|
|
|
|
sampleAppender.Append(s)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return err
|
2012-12-25 12:50:36 +00:00
|
|
|
}
|
2013-01-12 20:22:59 +00:00
|
|
|
|
2014-10-09 13:59:47 +00:00
|
|
|
// LastError implements Target.
|
2014-07-29 16:28:48 +00:00
|
|
|
func (t *target) LastError() error {
|
2015-04-19 06:39:33 +00:00
|
|
|
t.RLock()
|
|
|
|
defer t.RUnlock()
|
2014-07-29 16:28:48 +00:00
|
|
|
return t.lastError
|
2013-01-12 20:22:59 +00:00
|
|
|
}
|
2013-01-13 09:46:55 +00:00
|
|
|
|
2014-10-09 13:59:47 +00:00
|
|
|
// State implements Target.
|
2014-07-29 16:28:48 +00:00
|
|
|
func (t *target) State() TargetState {
|
2015-04-19 06:39:33 +00:00
|
|
|
t.RLock()
|
|
|
|
defer t.RUnlock()
|
2014-07-29 16:28:48 +00:00
|
|
|
return t.state
|
2013-07-15 13:11:41 +00:00
|
|
|
}
|
|
|
|
|
2014-10-09 13:59:47 +00:00
|
|
|
// LastScrape implements Target.
|
2014-07-29 16:28:48 +00:00
|
|
|
func (t *target) LastScrape() time.Time {
|
2015-04-19 06:39:33 +00:00
|
|
|
t.RLock()
|
|
|
|
defer t.RUnlock()
|
2014-07-29 16:28:48 +00:00
|
|
|
return t.lastScrape
|
2013-05-21 13:31:27 +00:00
|
|
|
}
|
|
|
|
|
2014-12-17 18:40:59 +00:00
|
|
|
// URL implements Target.
|
|
|
|
func (t *target) URL() string {
|
2015-04-20 10:24:25 +00:00
|
|
|
t.RLock()
|
|
|
|
defer t.RUnlock()
|
|
|
|
return t.url.String()
|
2013-01-13 09:46:55 +00:00
|
|
|
}
|
|
|
|
|
2015-02-20 15:21:13 +00:00
|
|
|
// InstanceIdentifier implements Target.
|
|
|
|
func (t *target) InstanceIdentifier() string {
|
|
|
|
// If we are given a port in the host port, use that.
|
2015-04-20 10:24:25 +00:00
|
|
|
if strings.Contains(t.url.Host, ":") {
|
|
|
|
return t.url.Host
|
2015-02-20 15:21:13 +00:00
|
|
|
}
|
2015-04-20 10:24:25 +00:00
|
|
|
|
|
|
|
t.RLock()
|
|
|
|
defer t.RUnlock()
|
|
|
|
|
2015-02-20 15:21:13 +00:00
|
|
|
// Otherwise, deduce port based on protocol.
|
2015-04-20 10:24:25 +00:00
|
|
|
if t.url.Scheme == "http" {
|
|
|
|
return fmt.Sprintf("%s:80", t.url.Host)
|
|
|
|
} else if t.url.Scheme == "https" {
|
|
|
|
return fmt.Sprintf("%s:443", t.url.Host)
|
2015-02-20 15:21:13 +00:00
|
|
|
}
|
|
|
|
|
2015-04-20 10:24:25 +00:00
|
|
|
glog.Warningf("Unknown scheme %s when generating identifier, using host without port number.", t.url.Scheme)
|
|
|
|
return t.url.Host
|
2015-02-19 17:58:47 +00:00
|
|
|
}
|
|
|
|
|
2014-12-17 18:40:59 +00:00
|
|
|
// GlobalURL implements Target.
|
|
|
|
func (t *target) GlobalURL() string {
|
2015-04-20 10:24:25 +00:00
|
|
|
url := t.URL()
|
|
|
|
|
2013-04-10 12:26:07 +00:00
|
|
|
hostname, err := os.Hostname()
|
|
|
|
if err != nil {
|
2014-12-17 18:40:59 +00:00
|
|
|
glog.Warningf("Couldn't get hostname: %s, returning target.URL()", err)
|
|
|
|
return url
|
2013-04-10 12:26:07 +00:00
|
|
|
}
|
|
|
|
for _, localhostRepresentation := range localhostRepresentations {
|
2015-04-20 10:24:25 +00:00
|
|
|
url = strings.Replace(url, "//"+localhostRepresentation, "//"+hostname, 1)
|
2013-04-10 12:26:07 +00:00
|
|
|
}
|
2014-12-17 18:40:59 +00:00
|
|
|
return url
|
2013-04-10 12:26:07 +00:00
|
|
|
}
|
|
|
|
|
2015-04-25 10:59:05 +00:00
|
|
|
// Labels implements Target.
|
|
|
|
func (t *target) Labels() clientmodel.LabelSet {
|
|
|
|
t.RLock()
|
|
|
|
defer t.RUnlock()
|
|
|
|
ls := clientmodel.LabelSet{}
|
|
|
|
for ln, lv := range t.baseLabels {
|
|
|
|
ls[ln] = lv
|
|
|
|
}
|
|
|
|
ls[clientmodel.MetricsPathLabel] = clientmodel.LabelValue(t.url.Path)
|
|
|
|
ls[clientmodel.AddressLabel] = clientmodel.LabelValue(t.url.Host)
|
|
|
|
return ls
|
|
|
|
}
|
|
|
|
|
2014-10-09 13:59:47 +00:00
|
|
|
// BaseLabels implements Target.
|
2013-07-14 16:48:03 +00:00
|
|
|
func (t *target) BaseLabels() clientmodel.LabelSet {
|
2015-04-19 06:39:33 +00:00
|
|
|
t.RLock()
|
|
|
|
defer t.RUnlock()
|
2013-02-22 20:07:35 +00:00
|
|
|
return t.baseLabels
|
|
|
|
}
|
|
|
|
|
2015-03-18 17:53:43 +00:00
|
|
|
// BaseLabelsWithoutJobAndInstance implements Target.
|
2015-04-25 10:59:05 +00:00
|
|
|
//
|
|
|
|
// TODO(fabxc): This method does not have to be part of the interface. Implement this
|
|
|
|
// as a template filter func for the single use case.
|
2015-03-18 17:53:43 +00:00
|
|
|
func (t *target) BaseLabelsWithoutJobAndInstance() clientmodel.LabelSet {
|
2015-04-25 10:59:05 +00:00
|
|
|
t.RLock()
|
|
|
|
defer t.RUnlock()
|
2015-03-18 17:53:43 +00:00
|
|
|
ls := clientmodel.LabelSet{}
|
2015-04-25 10:59:05 +00:00
|
|
|
for ln, lv := range t.baseLabels {
|
2015-04-20 10:24:25 +00:00
|
|
|
if ln != clientmodel.JobLabel && ln != clientmodel.InstanceLabel {
|
2015-03-18 17:53:43 +00:00
|
|
|
ls[ln] = lv
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ls
|
|
|
|
}
|
|
|
|
|
2015-03-15 02:36:15 +00:00
|
|
|
func (t *target) recordScrapeHealth(sampleAppender storage.SampleAppender, timestamp clientmodel.Timestamp, healthy bool, scrapeDuration time.Duration) {
|
|
|
|
healthMetric := clientmodel.Metric{}
|
|
|
|
durationMetric := clientmodel.Metric{}
|
|
|
|
for label, value := range t.baseLabels {
|
|
|
|
healthMetric[label] = value
|
|
|
|
durationMetric[label] = value
|
|
|
|
}
|
|
|
|
healthMetric[clientmodel.MetricNameLabel] = clientmodel.LabelValue(scrapeHealthMetricName)
|
|
|
|
durationMetric[clientmodel.MetricNameLabel] = clientmodel.LabelValue(scrapeDurationMetricName)
|
|
|
|
|
|
|
|
healthValue := clientmodel.SampleValue(0)
|
|
|
|
if healthy {
|
|
|
|
healthValue = clientmodel.SampleValue(1)
|
|
|
|
}
|
|
|
|
|
|
|
|
healthSample := &clientmodel.Sample{
|
|
|
|
Metric: healthMetric,
|
|
|
|
Timestamp: timestamp,
|
|
|
|
Value: healthValue,
|
|
|
|
}
|
|
|
|
durationSample := &clientmodel.Sample{
|
|
|
|
Metric: durationMetric,
|
|
|
|
Timestamp: timestamp,
|
|
|
|
Value: clientmodel.SampleValue(float64(scrapeDuration) / float64(time.Second)),
|
|
|
|
}
|
|
|
|
|
|
|
|
sampleAppender.Append(healthSample)
|
|
|
|
sampleAppender.Append(durationSample)
|
|
|
|
}
|