mirror of https://github.com/hashicorp/consul
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
1694 lines
64 KiB
1694 lines
64 KiB
// Copyright (c) HashiCorp, Inc. |
|
// SPDX-License-Identifier: MPL-2.0 |
|
|
|
package envoy |
|
|
|
import ( |
|
"encoding/json" |
|
"reflect" |
|
"regexp" |
|
"strings" |
|
"testing" |
|
|
|
"github.com/stretchr/testify/assert" |
|
"github.com/stretchr/testify/require" |
|
) |
|
|
|
const ( |
|
expectedSelfAdminCluster = `{ |
|
"name": "self_admin", |
|
"ignore_health_on_host_removal": false, |
|
"connect_timeout": "5s", |
|
"type": "STATIC", |
|
"http_protocol_options": {}, |
|
"loadAssignment": { |
|
"clusterName": "self_admin", |
|
"endpoints": [ |
|
{ |
|
"lbEndpoints": [ |
|
{ |
|
"endpoint": { |
|
"address": { |
|
"socket_address": { |
|
"address": "127.0.0.1", |
|
"port_value": 19000 |
|
} |
|
} |
|
} |
|
} |
|
] |
|
} |
|
] |
|
} |
|
}` |
|
expectedSelfAdminClusterNonLoopbackIP = `{ |
|
"name": "self_admin", |
|
"ignore_health_on_host_removal": false, |
|
"connect_timeout": "5s", |
|
"type": "STATIC", |
|
"http_protocol_options": {}, |
|
"loadAssignment": { |
|
"clusterName": "self_admin", |
|
"endpoints": [ |
|
{ |
|
"lbEndpoints": [ |
|
{ |
|
"endpoint": { |
|
"address": { |
|
"socket_address": { |
|
"address": "192.0.2.10", |
|
"port_value": 19002 |
|
} |
|
} |
|
} |
|
} |
|
] |
|
} |
|
] |
|
} |
|
}` |
|
expectedPrometheusBackendCluster = `{ |
|
"name": "prometheus_backend", |
|
"ignore_health_on_host_removal": false, |
|
"connect_timeout": "5s", |
|
"type": "STATIC", |
|
"http_protocol_options": {}, |
|
"loadAssignment": { |
|
"clusterName": "prometheus_backend", |
|
"endpoints": [ |
|
{ |
|
"lbEndpoints": [ |
|
{ |
|
"endpoint": { |
|
"address": { |
|
"socket_address": { |
|
"address": "127.0.0.1", |
|
"port_value": 20100 |
|
} |
|
} |
|
} |
|
} |
|
] |
|
} |
|
] |
|
} |
|
}` |
|
expectedPromListener = `{ |
|
"name": "envoy_prometheus_metrics_listener", |
|
"address": { |
|
"socket_address": { |
|
"address": "0.0.0.0", |
|
"port_value": 9000 |
|
} |
|
}, |
|
"filter_chains": [ |
|
{ |
|
"filters": [ |
|
{ |
|
"name": "envoy.filters.network.http_connection_manager", |
|
"typedConfig": { |
|
"@type": "type.googleapis.com/envoy.extensions.filters.network.http_connection_manager.v3.HttpConnectionManager", |
|
"stat_prefix": "envoy_prometheus_metrics", |
|
"codec_type": "HTTP1", |
|
"route_config": { |
|
"name": "self_admin_route", |
|
"virtual_hosts": [ |
|
{ |
|
"name": "self_admin", |
|
"domains": [ |
|
"*" |
|
], |
|
"routes": [ |
|
{ |
|
"match": { |
|
"path": "/metrics" |
|
}, |
|
"route": { |
|
"cluster": "self_admin", |
|
"prefix_rewrite": "/stats/prometheus" |
|
} |
|
}, |
|
{ |
|
"match": { |
|
"prefix": "/" |
|
}, |
|
"direct_response": { |
|
"status": 404 |
|
} |
|
} |
|
] |
|
} |
|
] |
|
}, |
|
"http_filters": [ |
|
{ |
|
"name": "envoy.filters.http.router", |
|
"typedConfig": { |
|
"@type": "type.googleapis.com/envoy.extensions.filters.http.router.v3.Router" |
|
} |
|
} |
|
] |
|
} |
|
} |
|
] |
|
} |
|
] |
|
}` |
|
expectedPromListenerCustomScrapePath = `{ |
|
"name": "envoy_prometheus_metrics_listener", |
|
"address": { |
|
"socket_address": { |
|
"address": "0.0.0.0", |
|
"port_value": 9000 |
|
} |
|
}, |
|
"filter_chains": [ |
|
{ |
|
"filters": [ |
|
{ |
|
"name": "envoy.filters.network.http_connection_manager", |
|
"typedConfig": { |
|
"@type": "type.googleapis.com/envoy.extensions.filters.network.http_connection_manager.v3.HttpConnectionManager", |
|
"stat_prefix": "envoy_prometheus_metrics", |
|
"codec_type": "HTTP1", |
|
"route_config": { |
|
"name": "self_admin_route", |
|
"virtual_hosts": [ |
|
{ |
|
"name": "self_admin", |
|
"domains": [ |
|
"*" |
|
], |
|
"routes": [ |
|
{ |
|
"match": { |
|
"path": "/scrape-path" |
|
}, |
|
"route": { |
|
"cluster": "self_admin", |
|
"prefix_rewrite": "/stats/prometheus" |
|
} |
|
}, |
|
{ |
|
"match": { |
|
"prefix": "/" |
|
}, |
|
"direct_response": { |
|
"status": 404 |
|
} |
|
} |
|
] |
|
} |
|
] |
|
}, |
|
"http_filters": [ |
|
{ |
|
"name": "envoy.filters.http.router", |
|
"typedConfig": { |
|
"@type": "type.googleapis.com/envoy.extensions.filters.http.router.v3.Router" |
|
} |
|
} |
|
] |
|
} |
|
} |
|
] |
|
} |
|
] |
|
}` |
|
expectedPromListenerWithPrometheusBackendCluster = `{ |
|
"name": "envoy_prometheus_metrics_listener", |
|
"address": { |
|
"socket_address": { |
|
"address": "0.0.0.0", |
|
"port_value": 9000 |
|
} |
|
}, |
|
"filter_chains": [ |
|
{ |
|
"filters": [ |
|
{ |
|
"name": "envoy.filters.network.http_connection_manager", |
|
"typedConfig": { |
|
"@type": "type.googleapis.com/envoy.extensions.filters.network.http_connection_manager.v3.HttpConnectionManager", |
|
"stat_prefix": "envoy_prometheus_metrics", |
|
"codec_type": "HTTP1", |
|
"route_config": { |
|
"name": "self_admin_route", |
|
"virtual_hosts": [ |
|
{ |
|
"name": "self_admin", |
|
"domains": [ |
|
"*" |
|
], |
|
"routes": [ |
|
{ |
|
"match": { |
|
"path": "/metrics" |
|
}, |
|
"route": { |
|
"cluster": "prometheus_backend", |
|
"prefix_rewrite": "/stats/prometheus" |
|
} |
|
}, |
|
{ |
|
"match": { |
|
"prefix": "/" |
|
}, |
|
"direct_response": { |
|
"status": 404 |
|
} |
|
} |
|
] |
|
} |
|
] |
|
}, |
|
"http_filters": [ |
|
{ |
|
"name": "envoy.filters.http.router", |
|
"typedConfig": { |
|
"@type": "type.googleapis.com/envoy.extensions.filters.http.router.v3.Router" |
|
} |
|
} |
|
] |
|
} |
|
} |
|
] |
|
} |
|
] |
|
}` |
|
expectedPromListenerWithBackendAndTLS = `{ |
|
"name": "envoy_prometheus_metrics_listener", |
|
"address": { |
|
"socket_address": { |
|
"address": "0.0.0.0", |
|
"port_value": 9000 |
|
} |
|
}, |
|
"filter_chains": [ |
|
{ |
|
"filters": [ |
|
{ |
|
"name": "envoy.filters.network.http_connection_manager", |
|
"typedConfig": { |
|
"@type": "type.googleapis.com/envoy.extensions.filters.network.http_connection_manager.v3.HttpConnectionManager", |
|
"stat_prefix": "envoy_prometheus_metrics", |
|
"codec_type": "HTTP1", |
|
"route_config": { |
|
"name": "self_admin_route", |
|
"virtual_hosts": [ |
|
{ |
|
"name": "self_admin", |
|
"domains": [ |
|
"*" |
|
], |
|
"routes": [ |
|
{ |
|
"match": { |
|
"path": "/metrics" |
|
}, |
|
"route": { |
|
"cluster": "prometheus_backend", |
|
"prefix_rewrite": "/stats/prometheus" |
|
} |
|
}, |
|
{ |
|
"match": { |
|
"prefix": "/" |
|
}, |
|
"direct_response": { |
|
"status": 404 |
|
} |
|
} |
|
] |
|
} |
|
] |
|
}, |
|
"http_filters": [ |
|
{ |
|
"name": "envoy.filters.http.router", |
|
"typedConfig": { |
|
"@type": "type.googleapis.com/envoy.extensions.filters.http.router.v3.Router" |
|
} |
|
} |
|
] |
|
} |
|
} |
|
], |
|
"transportSocket": { |
|
"name": "tls", |
|
"typedConfig": { |
|
"@type": "type.googleapis.com/envoy.extensions.transport_sockets.tls.v3.DownstreamTlsContext", |
|
"commonTlsContext": { |
|
"tlsCertificateSdsSecretConfigs": [ |
|
{ |
|
"name": "prometheus_cert" |
|
} |
|
], |
|
"validationContextSdsSecretConfig": { |
|
"name": "prometheus_validation_context" |
|
} |
|
} |
|
} |
|
} |
|
} |
|
] |
|
}` |
|
|
|
expectedPromSecretsWithBackendAndTLS = `{ |
|
"name": "prometheus_cert", |
|
"tlsCertificate": { |
|
"certificateChain": { |
|
"filename": "test-cert-file" |
|
}, |
|
"privateKey": { |
|
"filename": "test-key-file" |
|
} |
|
} |
|
}, |
|
{ |
|
"name": "prometheus_validation_context", |
|
"validationContext": { |
|
"trustedCa": { |
|
"filename": "test-ca-file" |
|
} |
|
} |
|
}` |
|
|
|
expectedPromSecretsWithBackendAndTLSCAPath = `{ |
|
"name": "prometheus_cert", |
|
"tlsCertificate": { |
|
"certificateChain": { |
|
"filename": "test-cert-file" |
|
}, |
|
"privateKey": { |
|
"filename": "test-key-file" |
|
} |
|
} |
|
}, |
|
{ |
|
"name": "prometheus_validation_context", |
|
"validationContext": { |
|
"watchedDirectory": { |
|
"path": "test-ca-directory" |
|
} |
|
} |
|
}` |
|
|
|
expectedStatsListener = `{ |
|
"name": "envoy_metrics_listener", |
|
"address": { |
|
"socket_address": { |
|
"address": "0.0.0.0", |
|
"port_value": 9000 |
|
} |
|
}, |
|
"filter_chains": [ |
|
{ |
|
"filters": [ |
|
{ |
|
"name": "envoy.filters.network.http_connection_manager", |
|
"typedConfig": { |
|
"@type": "type.googleapis.com/envoy.extensions.filters.network.http_connection_manager.v3.HttpConnectionManager", |
|
"stat_prefix": "envoy_metrics", |
|
"codec_type": "HTTP1", |
|
"route_config": { |
|
"name": "self_admin_route", |
|
"virtual_hosts": [ |
|
{ |
|
"name": "self_admin", |
|
"domains": [ |
|
"*" |
|
], |
|
"routes": [ |
|
{ |
|
"match": { |
|
"prefix": "/stats" |
|
}, |
|
"route": { |
|
"cluster": "self_admin", |
|
"prefix_rewrite": "/stats" |
|
} |
|
}, |
|
{ |
|
"match": { |
|
"prefix": "/" |
|
}, |
|
"direct_response": { |
|
"status": 404 |
|
} |
|
} |
|
] |
|
} |
|
] |
|
}, |
|
"http_filters": [ |
|
{ |
|
"name": "envoy.filters.http.router", |
|
"typedConfig": { |
|
"@type": "type.googleapis.com/envoy.extensions.filters.http.router.v3.Router" |
|
} |
|
} |
|
] |
|
} |
|
} |
|
] |
|
} |
|
] |
|
}` |
|
expectedReadyListener = `{ |
|
"name": "envoy_ready_listener", |
|
"address": { |
|
"socket_address": { |
|
"address": "0.0.0.0", |
|
"port_value": 4444 |
|
} |
|
}, |
|
"filter_chains": [ |
|
{ |
|
"filters": [ |
|
{ |
|
"name": "envoy.filters.network.http_connection_manager", |
|
"typedConfig": { |
|
"@type": "type.googleapis.com/envoy.extensions.filters.network.http_connection_manager.v3.HttpConnectionManager", |
|
"stat_prefix": "envoy_ready", |
|
"codec_type": "HTTP1", |
|
"route_config": { |
|
"name": "self_admin_route", |
|
"virtual_hosts": [ |
|
{ |
|
"name": "self_admin", |
|
"domains": [ |
|
"*" |
|
], |
|
"routes": [ |
|
{ |
|
"match": { |
|
"path": "/ready" |
|
}, |
|
"route": { |
|
"cluster": "self_admin", |
|
"prefix_rewrite": "/ready" |
|
} |
|
}, |
|
{ |
|
"match": { |
|
"prefix": "/" |
|
}, |
|
"direct_response": { |
|
"status": 404 |
|
} |
|
} |
|
] |
|
} |
|
] |
|
}, |
|
"http_filters": [ |
|
{ |
|
"name": "envoy.filters.http.router", |
|
"typedConfig": { |
|
"@type": "type.googleapis.com/envoy.extensions.filters.http.router.v3.Router" |
|
} |
|
} |
|
] |
|
} |
|
} |
|
] |
|
} |
|
] |
|
}` |
|
|
|
expectedStatsdSink = `{ |
|
"name": "envoy.stat_sinks.statsd", |
|
"typedConfig": { |
|
"@type": "type.googleapis.com/envoy.config.metrics.v3.StatsdSink", |
|
"address": { |
|
"socket_address": { |
|
"address": "127.0.0.1", |
|
"port_value": 9125 |
|
} |
|
} |
|
} |
|
}` |
|
|
|
expectedHCPMetricsStatsSink = `{ |
|
"name": "envoy.stat_sinks.metrics_service", |
|
"typed_config": { |
|
"@type": "type.googleapis.com/envoy.config.metrics.v3.MetricsServiceConfig", |
|
"transport_api_version": "V3", |
|
"grpc_service": { |
|
"envoy_grpc": { |
|
"cluster_name": "hcp_metrics_collector" |
|
} |
|
} |
|
} |
|
}` |
|
|
|
expectedHCPMetricsCluster = `{ |
|
"name": "hcp_metrics_collector", |
|
"type": "STATIC", |
|
"http2_protocol_options": {}, |
|
"loadAssignment": { |
|
"clusterName": "hcp_metrics_collector", |
|
"endpoints": [ |
|
{ |
|
"lbEndpoints": [ |
|
{ |
|
"endpoint": { |
|
"address": { |
|
"pipe": { |
|
"path": "/tmp/consul/hcp-metrics/default_web-sidecar-proxy.sock" |
|
} |
|
} |
|
} |
|
} |
|
] |
|
} |
|
] |
|
} |
|
}` |
|
) |
|
|
|
func TestBootstrapConfig_ConfigureArgs(t *testing.T) { |
|
defaultTags, err := generateStatsTags(&BootstrapTplArgs{}, nil, false) |
|
require.NoError(t, err) |
|
|
|
defaultTagsJSON := strings.Join(defaultTags, ",\n") |
|
defaultStatsConfigJSON := formatStatsTags(defaultTags) |
|
|
|
// The updated tags exclude the ones deprecated in Consul 1.9 |
|
updatedTags, err := generateStatsTags(&BootstrapTplArgs{}, nil, true) |
|
require.NoError(t, err) |
|
|
|
updatedStatsConfigJSON := formatStatsTags(updatedTags) |
|
|
|
tests := []struct { |
|
name string |
|
input BootstrapConfig |
|
env []string |
|
baseArgs BootstrapTplArgs |
|
wantArgs BootstrapTplArgs |
|
omitDeprecatedTags bool |
|
wantErr bool |
|
}{ |
|
{ |
|
name: "defaults", |
|
input: BootstrapConfig{}, |
|
wantArgs: BootstrapTplArgs{ |
|
StatsConfigJSON: defaultStatsConfigJSON, |
|
}, |
|
wantErr: false, |
|
}, |
|
{ |
|
name: "extra-stats-sinks", |
|
input: BootstrapConfig{ |
|
StatsSinksJSON: `{ |
|
"name": "envoy.custom_exciting_sink", |
|
"config": { |
|
"foo": "bar" |
|
} |
|
}`, |
|
}, |
|
wantArgs: BootstrapTplArgs{ |
|
StatsConfigJSON: defaultStatsConfigJSON, |
|
StatsSinksJSON: `{ |
|
"name": "envoy.custom_exciting_sink", |
|
"config": { |
|
"foo": "bar" |
|
} |
|
}`, |
|
}, |
|
}, |
|
{ |
|
name: "hcp-metrics-sink", |
|
baseArgs: BootstrapTplArgs{ |
|
ProxyID: "web-sidecar-proxy", |
|
}, |
|
input: BootstrapConfig{ |
|
HCPMetricsBindSocketDir: "/tmp/consul/hcp-metrics", |
|
}, |
|
wantArgs: BootstrapTplArgs{ |
|
ProxyID: "web-sidecar-proxy", |
|
StatsConfigJSON: defaultStatsConfigJSON, |
|
StatsSinksJSON: `{ |
|
"name": "envoy.stat_sinks.metrics_service", |
|
"typed_config": { |
|
"@type": "type.googleapis.com/envoy.config.metrics.v3.MetricsServiceConfig", |
|
"transport_api_version": "V3", |
|
"grpc_service": { |
|
"envoy_grpc": { |
|
"cluster_name": "hcp_metrics_collector" |
|
} |
|
} |
|
} |
|
}`, |
|
StaticClustersJSON: `{ |
|
"name": "hcp_metrics_collector", |
|
"type": "STATIC", |
|
"http2_protocol_options": {}, |
|
"loadAssignment": { |
|
"clusterName": "hcp_metrics_collector", |
|
"endpoints": [ |
|
{ |
|
"lbEndpoints": [ |
|
{ |
|
"endpoint": { |
|
"address": { |
|
"pipe": { |
|
"path": "/tmp/consul/hcp-metrics/default_web-sidecar-proxy.sock" |
|
} |
|
} |
|
} |
|
} |
|
] |
|
} |
|
] |
|
} |
|
}`, |
|
}, |
|
wantErr: false, |
|
}, |
|
{ |
|
name: "simple-statsd-sink", |
|
input: BootstrapConfig{ |
|
StatsdURL: "udp://127.0.0.1:9125", |
|
}, |
|
wantArgs: BootstrapTplArgs{ |
|
StatsConfigJSON: defaultStatsConfigJSON, |
|
StatsSinksJSON: expectedStatsdSink, |
|
}, |
|
wantErr: false, |
|
}, |
|
{ |
|
name: "simple-statsd-sink-plus-extra", |
|
input: BootstrapConfig{ |
|
StatsdURL: "udp://127.0.0.1:9125", |
|
StatsSinksJSON: `{ |
|
"name": "envoy.custom_exciting_sink", |
|
"config": { |
|
"foo": "bar" |
|
} |
|
}`, |
|
}, |
|
wantArgs: BootstrapTplArgs{ |
|
StatsConfigJSON: defaultStatsConfigJSON, |
|
StatsSinksJSON: `{ |
|
"name": "envoy.stat_sinks.statsd", |
|
"typedConfig": { |
|
"@type": "type.googleapis.com/envoy.config.metrics.v3.StatsdSink", |
|
"address": { |
|
"socket_address": { |
|
"address": "127.0.0.1", |
|
"port_value": 9125 |
|
} |
|
} |
|
} |
|
}, |
|
{ |
|
"name": "envoy.custom_exciting_sink", |
|
"config": { |
|
"foo": "bar" |
|
} |
|
}`, |
|
}, |
|
wantErr: false, |
|
}, |
|
{ |
|
name: "simple-statsd-sink-env", |
|
input: BootstrapConfig{ |
|
StatsdURL: "$MY_STATSD_URL", |
|
}, |
|
env: []string{"MY_STATSD_URL=udp://127.0.0.1:9125"}, |
|
wantArgs: BootstrapTplArgs{ |
|
StatsConfigJSON: defaultStatsConfigJSON, |
|
StatsSinksJSON: `{ |
|
"name": "envoy.stat_sinks.statsd", |
|
"typedConfig": { |
|
"@type": "type.googleapis.com/envoy.config.metrics.v3.StatsdSink", |
|
"address": { |
|
"socket_address": { |
|
"address": "127.0.0.1", |
|
"port_value": 9125 |
|
} |
|
} |
|
} |
|
}`, |
|
}, |
|
wantErr: false, |
|
}, |
|
{ |
|
name: "simple-statsd-sink-inline-env-allowed", |
|
input: BootstrapConfig{ |
|
StatsdURL: "udp://$HOST_IP:9125", |
|
}, |
|
env: []string{"HOST_IP=127.0.0.1"}, |
|
wantArgs: BootstrapTplArgs{ |
|
StatsConfigJSON: defaultStatsConfigJSON, |
|
StatsSinksJSON: `{ |
|
"name": "envoy.stat_sinks.statsd", |
|
"typedConfig": { |
|
"@type": "type.googleapis.com/envoy.config.metrics.v3.StatsdSink", |
|
"address": { |
|
"socket_address": { |
|
"address": "127.0.0.1", |
|
"port_value": 9125 |
|
} |
|
} |
|
} |
|
}`, |
|
}, |
|
wantErr: false, |
|
}, |
|
{ |
|
name: "simple-statsd-sink-inline-env-disallowed", |
|
input: BootstrapConfig{ |
|
StatsdURL: "udp://$HOST_ADDRESS:9125", |
|
}, |
|
env: []string{"HOST_ADDRESS=127.0.0.1"}, |
|
wantArgs: BootstrapTplArgs{ |
|
StatsConfigJSON: defaultStatsConfigJSON, |
|
}, |
|
wantErr: true, |
|
}, |
|
{ |
|
name: "simple-dogstatsd-sink", |
|
input: BootstrapConfig{ |
|
DogstatsdURL: "udp://127.0.0.1:9125", |
|
}, |
|
wantArgs: BootstrapTplArgs{ |
|
StatsConfigJSON: defaultStatsConfigJSON, |
|
StatsSinksJSON: `{ |
|
"name": "envoy.stat_sinks.dog_statsd", |
|
"typedConfig": { |
|
"@type": "type.googleapis.com/envoy.config.metrics.v3.DogStatsdSink", |
|
"address": { |
|
"socket_address": { |
|
"address": "127.0.0.1", |
|
"port_value": 9125 |
|
} |
|
} |
|
} |
|
}`, |
|
}, |
|
wantErr: false, |
|
}, |
|
{ |
|
name: "simple-dogstatsd-unix-sink", |
|
input: BootstrapConfig{ |
|
DogstatsdURL: "unix:///var/run/dogstatsd.sock", |
|
}, |
|
wantArgs: BootstrapTplArgs{ |
|
StatsConfigJSON: defaultStatsConfigJSON, |
|
StatsSinksJSON: `{ |
|
"name": "envoy.stat_sinks.dog_statsd", |
|
"typedConfig": { |
|
"@type": "type.googleapis.com/envoy.config.metrics.v3.DogStatsdSink", |
|
"address": { |
|
"pipe": { |
|
"path": "/var/run/dogstatsd.sock" |
|
} |
|
} |
|
} |
|
}`, |
|
}, |
|
wantErr: false, |
|
}, |
|
|
|
{ |
|
name: "simple-dogstatsd-sink-env", |
|
input: BootstrapConfig{ |
|
DogstatsdURL: "$MY_STATSD_URL", |
|
}, |
|
env: []string{"MY_STATSD_URL=udp://127.0.0.1:9125"}, |
|
wantArgs: BootstrapTplArgs{ |
|
StatsConfigJSON: defaultStatsConfigJSON, |
|
StatsSinksJSON: `{ |
|
"name": "envoy.stat_sinks.dog_statsd", |
|
"typedConfig": { |
|
"@type": "type.googleapis.com/envoy.config.metrics.v3.DogStatsdSink", |
|
"address": { |
|
"socket_address": { |
|
"address": "127.0.0.1", |
|
"port_value": 9125 |
|
} |
|
} |
|
} |
|
}`, |
|
}, |
|
wantErr: false, |
|
}, |
|
{ |
|
name: "stats-config-override", |
|
input: BootstrapConfig{ |
|
StatsConfigJSON: `{ |
|
"use_all_default_tags": true |
|
}`, |
|
}, |
|
wantArgs: BootstrapTplArgs{ |
|
StatsConfigJSON: `{ |
|
"use_all_default_tags": true |
|
}`, |
|
}, |
|
wantErr: false, |
|
}, |
|
{ |
|
name: "simple-tags", |
|
input: BootstrapConfig{ |
|
StatsTags: []string{"canary", "foo=bar", "baz=2"}, |
|
}, |
|
wantArgs: BootstrapTplArgs{ |
|
StatsConfigJSON: `{ |
|
"stats_tags": [ |
|
{ |
|
"tag_name": "canary", |
|
"fixed_value": "1" |
|
}, |
|
{ |
|
"tag_name": "foo", |
|
"fixed_value": "bar" |
|
}, |
|
{ |
|
"tag_name": "baz", |
|
"fixed_value": "2" |
|
}, |
|
` + defaultTagsJSON + ` |
|
], |
|
"use_all_default_tags": true |
|
}`, |
|
}, |
|
wantErr: false, |
|
}, |
|
{ |
|
name: "prometheus-bind-addr", |
|
input: BootstrapConfig{ |
|
PrometheusBindAddr: "0.0.0.0:9000", |
|
}, |
|
baseArgs: BootstrapTplArgs{ |
|
AdminBindAddress: "127.0.0.1", |
|
AdminBindPort: "19000", |
|
PrometheusScrapePath: "/metrics", |
|
}, |
|
wantArgs: BootstrapTplArgs{ |
|
AdminBindAddress: "127.0.0.1", |
|
AdminBindPort: "19000", |
|
// Should add a static cluster for the self-proxy to admin |
|
StaticClustersJSON: expectedSelfAdminCluster, |
|
// Should add a static http listener too |
|
StaticListenersJSON: expectedPromListener, |
|
StatsConfigJSON: defaultStatsConfigJSON, |
|
PrometheusScrapePath: "/metrics", |
|
}, |
|
wantErr: false, |
|
}, |
|
{ |
|
name: "prometheus-bind-addr-non-loopback-ip", |
|
input: BootstrapConfig{ |
|
PrometheusBindAddr: "0.0.0.0:9000", |
|
}, |
|
baseArgs: BootstrapTplArgs{ |
|
AdminBindAddress: "192.0.2.10", |
|
AdminBindPort: "19002", |
|
PrometheusScrapePath: "/metrics", |
|
}, |
|
wantArgs: BootstrapTplArgs{ |
|
AdminBindAddress: "192.0.2.10", |
|
AdminBindPort: "19002", |
|
// Should add a static cluster for the self-proxy to admin |
|
StaticClustersJSON: expectedSelfAdminClusterNonLoopbackIP, |
|
// Should add a static http listener too |
|
StaticListenersJSON: expectedPromListener, |
|
StatsConfigJSON: defaultStatsConfigJSON, |
|
PrometheusScrapePath: "/metrics", |
|
}, |
|
wantErr: false, |
|
}, |
|
{ |
|
name: "prometheus-bind-addr-with-overrides", |
|
input: BootstrapConfig{ |
|
PrometheusBindAddr: "0.0.0.0:9000", |
|
StaticClustersJSON: `{"foo":"bar"}`, |
|
StaticListenersJSON: `{"baz":"qux"}`, |
|
}, |
|
baseArgs: BootstrapTplArgs{ |
|
AdminBindAddress: "127.0.0.1", |
|
AdminBindPort: "19000", |
|
PrometheusScrapePath: "/scrape-path", |
|
}, |
|
wantArgs: BootstrapTplArgs{ |
|
AdminBindAddress: "127.0.0.1", |
|
AdminBindPort: "19000", |
|
// Should add a static cluster for the self-proxy to admin |
|
StaticClustersJSON: `{"foo":"bar"},` + expectedSelfAdminCluster, |
|
// Should add a static http listener too |
|
StaticListenersJSON: `{"baz":"qux"},` + expectedPromListenerCustomScrapePath, |
|
StatsConfigJSON: defaultStatsConfigJSON, |
|
PrometheusScrapePath: "/scrape-path", |
|
}, |
|
wantErr: false, |
|
}, |
|
{ |
|
name: "prometheus-bind-addr-with-prometheus-backend", |
|
input: BootstrapConfig{ |
|
PrometheusBindAddr: "0.0.0.0:9000", |
|
}, |
|
baseArgs: BootstrapTplArgs{ |
|
AdminBindAddress: "127.0.0.1", |
|
AdminBindPort: "19000", |
|
PrometheusBackendPort: "20100", |
|
PrometheusScrapePath: "/metrics", |
|
}, |
|
wantArgs: BootstrapTplArgs{ |
|
AdminBindAddress: "127.0.0.1", |
|
AdminBindPort: "19000", |
|
// Should use the "prometheus_backend" cluster instead, which |
|
// uses the PrometheusBackendPort rather than Envoy admin port |
|
StaticClustersJSON: expectedPrometheusBackendCluster, |
|
StaticListenersJSON: expectedPromListenerWithPrometheusBackendCluster, |
|
StatsConfigJSON: defaultStatsConfigJSON, |
|
PrometheusBackendPort: "20100", |
|
PrometheusScrapePath: "/metrics", |
|
}, |
|
wantErr: false, |
|
}, |
|
{ |
|
name: "prometheus-bind-addr-with-backend-and-tls", |
|
input: BootstrapConfig{ |
|
PrometheusBindAddr: "0.0.0.0:9000", |
|
}, |
|
baseArgs: BootstrapTplArgs{ |
|
AdminBindAddress: "127.0.0.1", |
|
AdminBindPort: "19000", |
|
PrometheusBackendPort: "20100", |
|
PrometheusScrapePath: "/metrics", |
|
PrometheusCAFile: "test-ca-file", |
|
PrometheusCertFile: "test-cert-file", |
|
PrometheusKeyFile: "test-key-file", |
|
}, |
|
wantArgs: BootstrapTplArgs{ |
|
AdminBindAddress: "127.0.0.1", |
|
AdminBindPort: "19000", |
|
// Should use the "prometheus_backend" cluster instead, which |
|
// uses the PrometheusBackendPort rather than Envoy admin port |
|
StaticClustersJSON: expectedPrometheusBackendCluster, |
|
StaticListenersJSON: expectedPromListenerWithBackendAndTLS, |
|
StaticSecretsJSON: expectedPromSecretsWithBackendAndTLS, |
|
StatsConfigJSON: defaultStatsConfigJSON, |
|
PrometheusBackendPort: "20100", |
|
PrometheusScrapePath: "/metrics", |
|
PrometheusCAFile: "test-ca-file", |
|
PrometheusCertFile: "test-cert-file", |
|
PrometheusKeyFile: "test-key-file", |
|
}, |
|
wantErr: false, |
|
}, |
|
{ |
|
name: "prometheus-bind-addr-with-backend-and-tls-ca-path", |
|
input: BootstrapConfig{ |
|
PrometheusBindAddr: "0.0.0.0:9000", |
|
}, |
|
baseArgs: BootstrapTplArgs{ |
|
AdminBindAddress: "127.0.0.1", |
|
AdminBindPort: "19000", |
|
PrometheusBackendPort: "20100", |
|
PrometheusScrapePath: "/metrics", |
|
PrometheusCAPath: "test-ca-directory", |
|
PrometheusCertFile: "test-cert-file", |
|
PrometheusKeyFile: "test-key-file", |
|
}, |
|
wantArgs: BootstrapTplArgs{ |
|
AdminBindAddress: "127.0.0.1", |
|
AdminBindPort: "19000", |
|
// Should use the "prometheus_backend" cluster instead, which |
|
// uses the PrometheusBackendPort rather than Envoy admin port |
|
StaticClustersJSON: expectedPrometheusBackendCluster, |
|
StaticListenersJSON: expectedPromListenerWithBackendAndTLS, |
|
StaticSecretsJSON: expectedPromSecretsWithBackendAndTLSCAPath, |
|
StatsConfigJSON: defaultStatsConfigJSON, |
|
PrometheusBackendPort: "20100", |
|
PrometheusScrapePath: "/metrics", |
|
PrometheusCAPath: "test-ca-directory", |
|
PrometheusCertFile: "test-cert-file", |
|
PrometheusKeyFile: "test-key-file", |
|
}, |
|
wantErr: false, |
|
}, |
|
{ |
|
name: "stats-bind-addr", |
|
input: BootstrapConfig{ |
|
StatsBindAddr: "0.0.0.0:9000", |
|
}, |
|
baseArgs: BootstrapTplArgs{ |
|
AdminBindAddress: "127.0.0.1", |
|
AdminBindPort: "19000", |
|
}, |
|
wantArgs: BootstrapTplArgs{ |
|
AdminBindAddress: "127.0.0.1", |
|
AdminBindPort: "19000", |
|
// Should add a static cluster for the self-proxy to admin |
|
StaticClustersJSON: expectedSelfAdminCluster, |
|
// Should add a static http listener too |
|
StaticListenersJSON: expectedStatsListener, |
|
StatsConfigJSON: defaultStatsConfigJSON, |
|
}, |
|
wantErr: false, |
|
}, |
|
{ |
|
name: "stats-bind-addr-with-overrides", |
|
input: BootstrapConfig{ |
|
StatsBindAddr: "0.0.0.0:9000", |
|
StaticClustersJSON: `{"foo":"bar"}`, |
|
StaticListenersJSON: `{"baz":"qux"}`, |
|
}, |
|
baseArgs: BootstrapTplArgs{ |
|
AdminBindAddress: "127.0.0.1", |
|
AdminBindPort: "19000", |
|
}, |
|
wantArgs: BootstrapTplArgs{ |
|
AdminBindAddress: "127.0.0.1", |
|
AdminBindPort: "19000", |
|
// Should add a static cluster for the self-proxy to admin |
|
StaticClustersJSON: `{"foo":"bar"},` + expectedSelfAdminCluster, |
|
// Should add a static http listener too |
|
StaticListenersJSON: `{"baz":"qux"},` + expectedStatsListener, |
|
StatsConfigJSON: defaultStatsConfigJSON, |
|
}, |
|
wantErr: false, |
|
}, |
|
{ |
|
name: "stats-flush-interval", |
|
input: BootstrapConfig{ |
|
StatsFlushInterval: `10s`, |
|
}, |
|
wantArgs: BootstrapTplArgs{ |
|
StatsConfigJSON: defaultStatsConfigJSON, |
|
StatsFlushInterval: `10s`, |
|
}, |
|
wantErr: false, |
|
}, |
|
{ |
|
name: "override-tracing", |
|
input: BootstrapConfig{ |
|
TracingConfigJSON: `{"foo": "bar"}`, |
|
}, |
|
wantArgs: BootstrapTplArgs{ |
|
StatsConfigJSON: defaultStatsConfigJSON, |
|
TracingConfigJSON: `{"foo": "bar"}`, |
|
}, |
|
wantErr: false, |
|
}, |
|
{ |
|
name: "err-bad-prometheus-addr", |
|
input: BootstrapConfig{ |
|
PrometheusBindAddr: "asdasdsad", |
|
}, |
|
wantErr: true, |
|
}, |
|
{ |
|
name: "err-bad-stats-addr", |
|
input: BootstrapConfig{ |
|
StatsBindAddr: "asdasdsad", |
|
}, |
|
wantErr: true, |
|
}, |
|
{ |
|
name: "err-bad-statsd-addr", |
|
input: BootstrapConfig{ |
|
StatsdURL: "asdasdsad", |
|
}, |
|
wantErr: true, |
|
}, |
|
{ |
|
name: "err-bad-dogstatsd-addr", |
|
input: BootstrapConfig{ |
|
DogstatsdURL: "asdasdsad", |
|
}, |
|
wantErr: true, |
|
}, |
|
{ |
|
name: "ready-bind-addr", |
|
input: BootstrapConfig{ |
|
ReadyBindAddr: "0.0.0.0:4444", |
|
}, |
|
baseArgs: BootstrapTplArgs{ |
|
AdminBindAddress: "127.0.0.1", |
|
AdminBindPort: "19000", |
|
}, |
|
wantArgs: BootstrapTplArgs{ |
|
AdminBindAddress: "127.0.0.1", |
|
AdminBindPort: "19000", |
|
// Should add a static cluster for the self-proxy to admin |
|
StaticClustersJSON: expectedSelfAdminCluster, |
|
// Should add a static http listener too |
|
StaticListenersJSON: expectedReadyListener, |
|
StatsConfigJSON: defaultStatsConfigJSON, |
|
}, |
|
wantErr: false, |
|
}, |
|
{ |
|
name: "ready-bind-addr-with-overrides", |
|
input: BootstrapConfig{ |
|
ReadyBindAddr: "0.0.0.0:4444", |
|
StaticClustersJSON: `{"foo":"bar"}`, |
|
StaticListenersJSON: `{"baz":"qux"}`, |
|
}, |
|
baseArgs: BootstrapTplArgs{ |
|
AdminBindAddress: "127.0.0.1", |
|
AdminBindPort: "19000", |
|
}, |
|
wantArgs: BootstrapTplArgs{ |
|
AdminBindAddress: "127.0.0.1", |
|
AdminBindPort: "19000", |
|
// Should add a static cluster for the self-proxy to admin |
|
StaticClustersJSON: `{"foo":"bar"},` + expectedSelfAdminCluster, |
|
// Should add a static http listener too |
|
StaticListenersJSON: `{"baz":"qux"},` + expectedReadyListener, |
|
StatsConfigJSON: defaultStatsConfigJSON, |
|
}, |
|
wantErr: false, |
|
}, |
|
{ |
|
name: "ready-bind-addr-and-prometheus-and-stats", |
|
input: BootstrapConfig{ |
|
ReadyBindAddr: "0.0.0.0:4444", |
|
PrometheusBindAddr: "0.0.0.0:9000", |
|
StatsBindAddr: "0.0.0.0:9000", |
|
}, |
|
baseArgs: BootstrapTplArgs{ |
|
AdminBindAddress: "127.0.0.1", |
|
AdminBindPort: "19000", |
|
PrometheusScrapePath: "/metrics", |
|
}, |
|
wantArgs: BootstrapTplArgs{ |
|
AdminBindAddress: "127.0.0.1", |
|
AdminBindPort: "19000", |
|
// Should add a static cluster for the self-proxy to admin |
|
StaticClustersJSON: expectedSelfAdminCluster, |
|
// Should add a static http listener too |
|
StaticListenersJSON: strings.Join( |
|
[]string{expectedPromListener, expectedStatsListener, expectedReadyListener}, |
|
", ", |
|
), |
|
StatsConfigJSON: defaultStatsConfigJSON, |
|
PrometheusScrapePath: "/metrics", |
|
}, |
|
wantErr: false, |
|
}, |
|
{ |
|
name: "omit-deprecated-tags", |
|
input: BootstrapConfig{ |
|
ReadyBindAddr: "0.0.0.0:4444", |
|
PrometheusBindAddr: "0.0.0.0:9000", |
|
StatsBindAddr: "0.0.0.0:9000", |
|
}, |
|
baseArgs: BootstrapTplArgs{ |
|
AdminBindAddress: "127.0.0.1", |
|
AdminBindPort: "19000", |
|
PrometheusScrapePath: "/metrics", |
|
}, |
|
omitDeprecatedTags: true, |
|
wantArgs: BootstrapTplArgs{ |
|
AdminBindAddress: "127.0.0.1", |
|
AdminBindPort: "19000", |
|
StaticClustersJSON: expectedSelfAdminCluster, |
|
StaticListenersJSON: strings.Join( |
|
[]string{expectedPromListener, expectedStatsListener, expectedReadyListener}, |
|
", ", |
|
), |
|
// Should not have default stats config JSON when deprecated tags are omitted |
|
StatsConfigJSON: updatedStatsConfigJSON, |
|
PrometheusScrapePath: "/metrics", |
|
}, |
|
wantErr: false, |
|
}, |
|
} |
|
for _, tt := range tests { |
|
t.Run(tt.name, func(t *testing.T) { |
|
args := tt.baseArgs |
|
|
|
defer testSetAndResetEnv(t, tt.env)() |
|
|
|
err := tt.input.ConfigureArgs(&args, tt.omitDeprecatedTags) |
|
if tt.wantErr { |
|
require.Error(t, err) |
|
} else { |
|
require.NoError(t, err) |
|
|
|
// Want to compare JSON fields with JSONEq |
|
argV := reflect.ValueOf(args) |
|
wantV := reflect.ValueOf(tt.wantArgs) |
|
argT := reflect.TypeOf(args) |
|
for i := 0; i < argT.NumField(); i++ { |
|
f := argT.Field(i) |
|
if strings.HasSuffix(f.Name, "JSON") && wantV.Field(i).String() != "" { |
|
// Some of our JSON strings are comma separated objects to be |
|
// insertedinto an array which is not valid JSON on it's own so wrap |
|
// them all in an array. For simple values this is still valid JSON |
|
// too. |
|
want := "[" + wantV.Field(i).String() + "]" |
|
got := "[" + argV.Field(i).String() + "]" |
|
require.JSONEq(t, want, got, "field %s should be equivalent JSON", f.Name) |
|
} else { |
|
require.Equalf(t, wantV.Field(i).Interface(), |
|
argV.Field(i).Interface(), "field %s should be equal", f.Name) |
|
} |
|
} |
|
} |
|
}) |
|
} |
|
} |
|
|
|
func TestConsulTagSpecifiers(t *testing.T) { |
|
// Conveniently both envoy and Go use the re2 dialect of regular |
|
// expressions, so we can actually test the stats tag extraction regular |
|
// expressions right here! |
|
|
|
specs, err := resourceTagSpecifiers(false) |
|
require.NoError(t, err) |
|
|
|
specsNoDeprecated, err := resourceTagSpecifiers(true) |
|
require.NoError(t, err) |
|
|
|
type testPattern struct { |
|
name string |
|
r *regexp.Regexp |
|
} |
|
|
|
parseSpecs := func(specs []string) []testPattern { |
|
var patterns []testPattern |
|
for _, spec := range specs { |
|
var m struct { |
|
TagName string `json:"tag_name"` |
|
Regex string `json:"regex"` |
|
} |
|
require.NoError(t, json.Unmarshal([]byte(spec), &m)) |
|
|
|
patterns = append(patterns, testPattern{ |
|
name: m.TagName, |
|
r: regexp.MustCompile(m.Regex), |
|
}) |
|
} |
|
return patterns |
|
} |
|
|
|
var ( |
|
patterns = parseSpecs(specs) |
|
patternsNoDeprecated = parseSpecs(specsNoDeprecated) |
|
) |
|
|
|
type testcase struct { |
|
name string |
|
stat string |
|
expect map[string][]string // this is the m[1:] of the match |
|
expectNoDeprecated map[string][]string // this is the m[1:] of the match |
|
} |
|
|
|
cases := []testcase{ |
|
{ |
|
name: "cluster service", |
|
stat: "cluster.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.bind_errors", |
|
expect: map[string][]string{ |
|
"consul.custom_hash": {"pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", ""}, |
|
"consul.datacenter": {"pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "dc2"}, |
|
"consul.destination.custom_hash": {"pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", ""}, |
|
"consul.destination.datacenter": {"pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "dc2"}, |
|
"consul.destination.full_target": {"pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
"consul.destination.namespace": {"pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "default"}, |
|
"consul.destination.partition": {"pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", ""}, |
|
"consul.destination.routing_type": {"pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "internal"}, |
|
"consul.destination.service": {"pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "pong"}, |
|
"consul.destination.service_subset": {"pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", ""}, |
|
"consul.destination.target": {"pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "pong.default.dc2"}, |
|
"consul.destination.trust_domain": {"pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
"consul.full_target": {"pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
"consul.namespace": {"pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "default"}, |
|
"consul.routing_type": {"pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "internal"}, |
|
"consul.service": {"pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "pong"}, |
|
"consul.service_subset": {"pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", ""}, |
|
"consul.target": {"pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "pong.default.dc2"}, |
|
"consul.trust_domain": {"pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
}, |
|
expectNoDeprecated: map[string][]string{ |
|
"consul.destination.custom_hash": {"pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", ""}, |
|
"consul.destination.datacenter": {"pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "dc2"}, |
|
"consul.destination.full_target": {"pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
"consul.destination.namespace": {"pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "default"}, |
|
"consul.destination.partition": {"pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", ""}, |
|
"consul.destination.routing_type": {"pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "internal"}, |
|
"consul.destination.service": {"pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "pong"}, |
|
"consul.destination.service_subset": {"pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", ""}, |
|
"consul.destination.target": {"pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "pong.default.dc2"}, |
|
"consul.destination.trust_domain": {"pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
}, |
|
}, |
|
{ |
|
name: "cluster custom service", |
|
stat: "cluster.f8f8f8f8~pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.bind_errors", |
|
expect: map[string][]string{ |
|
"consul.custom_hash": {"f8f8f8f8~pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "f8f8f8f8"}, |
|
"consul.datacenter": {"f8f8f8f8~pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "dc2"}, |
|
"consul.destination.custom_hash": {"f8f8f8f8~pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "f8f8f8f8"}, |
|
"consul.destination.datacenter": {"f8f8f8f8~pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "dc2"}, |
|
"consul.destination.full_target": {"f8f8f8f8~pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "f8f8f8f8~pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
"consul.destination.namespace": {"f8f8f8f8~pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "default"}, |
|
"consul.destination.partition": {"f8f8f8f8~pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", ""}, |
|
"consul.destination.routing_type": {"f8f8f8f8~pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "internal"}, |
|
"consul.destination.service": {"f8f8f8f8~pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "pong"}, |
|
"consul.destination.service_subset": {"f8f8f8f8~pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", ""}, |
|
"consul.destination.target": {"f8f8f8f8~pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "f8f8f8f8~pong.default.dc2"}, |
|
"consul.destination.trust_domain": {"f8f8f8f8~pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
"consul.full_target": {"f8f8f8f8~pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "f8f8f8f8~pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
"consul.namespace": {"f8f8f8f8~pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "default"}, |
|
"consul.routing_type": {"f8f8f8f8~pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "internal"}, |
|
"consul.service": {"f8f8f8f8~pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "pong"}, |
|
"consul.service_subset": {"f8f8f8f8~pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", ""}, |
|
"consul.target": {"f8f8f8f8~pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "f8f8f8f8~pong.default.dc2"}, |
|
"consul.trust_domain": {"f8f8f8f8~pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
}, |
|
expectNoDeprecated: map[string][]string{ |
|
"consul.destination.custom_hash": {"f8f8f8f8~pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "f8f8f8f8"}, |
|
"consul.destination.datacenter": {"f8f8f8f8~pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "dc2"}, |
|
"consul.destination.full_target": {"f8f8f8f8~pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "f8f8f8f8~pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
"consul.destination.namespace": {"f8f8f8f8~pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "default"}, |
|
"consul.destination.partition": {"f8f8f8f8~pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", ""}, |
|
"consul.destination.routing_type": {"f8f8f8f8~pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "internal"}, |
|
"consul.destination.service": {"f8f8f8f8~pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "pong"}, |
|
"consul.destination.service_subset": {"f8f8f8f8~pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", ""}, |
|
"consul.destination.target": {"f8f8f8f8~pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "f8f8f8f8~pong.default.dc2"}, |
|
"consul.destination.trust_domain": {"f8f8f8f8~pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
}, |
|
}, |
|
{ |
|
name: "cluster service subset", |
|
stat: "cluster.v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.bind_errors", |
|
expect: map[string][]string{ |
|
"consul.custom_hash": {"v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", ""}, |
|
"consul.datacenter": {"v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "dc2"}, |
|
"consul.destination.custom_hash": {"v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", ""}, |
|
"consul.destination.datacenter": {"v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "dc2"}, |
|
"consul.destination.full_target": {"v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
"consul.destination.namespace": {"v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "default"}, |
|
"consul.destination.partition": {"v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", ""}, |
|
"consul.destination.routing_type": {"v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "internal"}, |
|
"consul.destination.service": {"v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "pong"}, |
|
"consul.destination.service_subset": {"v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "v2"}, |
|
"consul.destination.target": {"v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "v2.pong.default.dc2"}, |
|
"consul.destination.trust_domain": {"v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
"consul.full_target": {"v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
"consul.namespace": {"v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "default"}, |
|
"consul.routing_type": {"v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "internal"}, |
|
"consul.service": {"v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "pong"}, |
|
"consul.service_subset": {"v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "v2"}, |
|
"consul.target": {"v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "v2.pong.default.dc2"}, |
|
"consul.trust_domain": {"v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
}, |
|
expectNoDeprecated: map[string][]string{ |
|
"consul.destination.custom_hash": {"v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", ""}, |
|
"consul.destination.datacenter": {"v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "dc2"}, |
|
"consul.destination.full_target": {"v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
"consul.destination.namespace": {"v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "default"}, |
|
"consul.destination.partition": {"v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", ""}, |
|
"consul.destination.routing_type": {"v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "internal"}, |
|
"consul.destination.service": {"v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "pong"}, |
|
"consul.destination.service_subset": {"v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "v2"}, |
|
"consul.destination.target": {"v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "v2.pong.default.dc2"}, |
|
"consul.destination.trust_domain": {"v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
}, |
|
}, |
|
{ |
|
name: "cluster custom service subset", |
|
stat: "cluster.f8f8f8f8~v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.bind_errors", |
|
expect: map[string][]string{ |
|
"consul.custom_hash": {"f8f8f8f8~v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "f8f8f8f8"}, |
|
"consul.datacenter": {"f8f8f8f8~v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "dc2"}, |
|
"consul.destination.custom_hash": {"f8f8f8f8~v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "f8f8f8f8"}, |
|
"consul.destination.datacenter": {"f8f8f8f8~v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "dc2"}, |
|
"consul.destination.full_target": {"f8f8f8f8~v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "f8f8f8f8~v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
"consul.destination.namespace": {"f8f8f8f8~v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "default"}, |
|
"consul.destination.partition": {"f8f8f8f8~v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", ""}, |
|
"consul.destination.routing_type": {"f8f8f8f8~v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "internal"}, |
|
"consul.destination.service": {"f8f8f8f8~v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "pong"}, |
|
"consul.destination.service_subset": {"f8f8f8f8~v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "v2"}, |
|
"consul.destination.target": {"f8f8f8f8~v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "f8f8f8f8~v2.pong.default.dc2"}, |
|
"consul.destination.trust_domain": {"f8f8f8f8~v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
"consul.full_target": {"f8f8f8f8~v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "f8f8f8f8~v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
"consul.namespace": {"f8f8f8f8~v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "default"}, |
|
"consul.routing_type": {"f8f8f8f8~v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "internal"}, |
|
"consul.service": {"f8f8f8f8~v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "pong"}, |
|
"consul.service_subset": {"f8f8f8f8~v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "v2"}, |
|
"consul.target": {"f8f8f8f8~v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "f8f8f8f8~v2.pong.default.dc2"}, |
|
"consul.trust_domain": {"f8f8f8f8~v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
}, |
|
expectNoDeprecated: map[string][]string{ |
|
"consul.destination.custom_hash": {"f8f8f8f8~v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "f8f8f8f8"}, |
|
"consul.destination.datacenter": {"f8f8f8f8~v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "dc2"}, |
|
"consul.destination.full_target": {"f8f8f8f8~v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "f8f8f8f8~v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
"consul.destination.namespace": {"f8f8f8f8~v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "default"}, |
|
"consul.destination.partition": {"f8f8f8f8~v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", ""}, |
|
"consul.destination.routing_type": {"f8f8f8f8~v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "internal"}, |
|
"consul.destination.service": {"f8f8f8f8~v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "pong"}, |
|
"consul.destination.service_subset": {"f8f8f8f8~v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "v2"}, |
|
"consul.destination.target": {"f8f8f8f8~v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "f8f8f8f8~v2.pong.default.dc2"}, |
|
"consul.destination.trust_domain": {"f8f8f8f8~v2.pong.default.dc2.internal.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
}, |
|
}, |
|
{ |
|
name: "cluster custom service subset non-default partition", |
|
stat: "cluster.f8f8f8f8~v2.pong.default.partA.dc2.internal-v1.e5b08d03-bfc3-c870-1833-baddb116e648.consul.bind_errors", |
|
expect: map[string][]string{ |
|
"consul.custom_hash": {"f8f8f8f8~v2.pong.default.partA.dc2.internal-v1.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "f8f8f8f8"}, |
|
"consul.datacenter": {"f8f8f8f8~v2.pong.default.partA.dc2.internal-v1.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "dc2"}, |
|
"consul.destination.custom_hash": {"f8f8f8f8~v2.pong.default.partA.dc2.internal-v1.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "f8f8f8f8"}, |
|
"consul.destination.datacenter": {"f8f8f8f8~v2.pong.default.partA.dc2.internal-v1.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "dc2"}, |
|
"consul.destination.full_target": {"f8f8f8f8~v2.pong.default.partA.dc2.internal-v1.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "f8f8f8f8~v2.pong.default.partA.dc2.internal-v1.e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
"consul.destination.namespace": {"f8f8f8f8~v2.pong.default.partA.dc2.internal-v1.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "default"}, |
|
"consul.destination.partition": {"f8f8f8f8~v2.pong.default.partA.dc2.internal-v1.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "partA"}, |
|
"consul.destination.routing_type": {"f8f8f8f8~v2.pong.default.partA.dc2.internal-v1.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "internal-v1"}, |
|
"consul.destination.service": {"f8f8f8f8~v2.pong.default.partA.dc2.internal-v1.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "pong"}, |
|
"consul.destination.service_subset": {"f8f8f8f8~v2.pong.default.partA.dc2.internal-v1.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "v2"}, |
|
"consul.destination.target": {"f8f8f8f8~v2.pong.default.partA.dc2.internal-v1.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "f8f8f8f8~v2.pong.default.partA.dc2"}, |
|
"consul.destination.trust_domain": {"f8f8f8f8~v2.pong.default.partA.dc2.internal-v1.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
"consul.full_target": {"f8f8f8f8~v2.pong.default.partA.dc2.internal-v1.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "f8f8f8f8~v2.pong.default.partA.dc2.internal-v1.e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
"consul.namespace": {"f8f8f8f8~v2.pong.default.partA.dc2.internal-v1.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "default"}, |
|
"consul.routing_type": {"f8f8f8f8~v2.pong.default.partA.dc2.internal-v1.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "internal-v1"}, |
|
"consul.service": {"f8f8f8f8~v2.pong.default.partA.dc2.internal-v1.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "pong"}, |
|
"consul.service_subset": {"f8f8f8f8~v2.pong.default.partA.dc2.internal-v1.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "v2"}, |
|
"consul.target": {"f8f8f8f8~v2.pong.default.partA.dc2.internal-v1.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "f8f8f8f8~v2.pong.default.partA.dc2"}, |
|
"consul.trust_domain": {"f8f8f8f8~v2.pong.default.partA.dc2.internal-v1.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
}, |
|
expectNoDeprecated: map[string][]string{ |
|
"consul.destination.custom_hash": {"f8f8f8f8~v2.pong.default.partA.dc2.internal-v1.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "f8f8f8f8"}, |
|
"consul.destination.datacenter": {"f8f8f8f8~v2.pong.default.partA.dc2.internal-v1.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "dc2"}, |
|
"consul.destination.full_target": {"f8f8f8f8~v2.pong.default.partA.dc2.internal-v1.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "f8f8f8f8~v2.pong.default.partA.dc2.internal-v1.e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
"consul.destination.namespace": {"f8f8f8f8~v2.pong.default.partA.dc2.internal-v1.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "default"}, |
|
"consul.destination.partition": {"f8f8f8f8~v2.pong.default.partA.dc2.internal-v1.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "partA"}, |
|
"consul.destination.routing_type": {"f8f8f8f8~v2.pong.default.partA.dc2.internal-v1.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "internal-v1"}, |
|
"consul.destination.service": {"f8f8f8f8~v2.pong.default.partA.dc2.internal-v1.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "pong"}, |
|
"consul.destination.service_subset": {"f8f8f8f8~v2.pong.default.partA.dc2.internal-v1.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "v2"}, |
|
"consul.destination.target": {"f8f8f8f8~v2.pong.default.partA.dc2.internal-v1.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "f8f8f8f8~v2.pong.default.partA.dc2"}, |
|
"consul.destination.trust_domain": {"f8f8f8f8~v2.pong.default.partA.dc2.internal-v1.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
}, |
|
}, |
|
{ |
|
name: "cluster service peered", |
|
stat: "cluster.pong.default.cloudpeer.external.e5b08d03-bfc3-c870-1833-baddb116e648.consul.bind_errors", |
|
expect: map[string][]string{ |
|
"consul.custom_hash": {"pong.default.cloudpeer.external.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", ""}, |
|
"consul.destination.custom_hash": {"pong.default.cloudpeer.external.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", ""}, |
|
"consul.destination.full_target": {"pong.default.cloudpeer.external.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "pong.default.cloudpeer.external.e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
"consul.destination.namespace": {"pong.default.cloudpeer.external.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "default"}, |
|
"consul.destination.peer": {"pong.default.cloudpeer.external.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "cloudpeer"}, |
|
"consul.destination.routing_type": {"pong.default.cloudpeer.external.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "external"}, |
|
"consul.destination.service": {"pong.default.cloudpeer.external.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "pong"}, |
|
"consul.destination.service_subset": {"pong.default.cloudpeer.external.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", ""}, |
|
"consul.destination.target": {"pong.default.cloudpeer.external.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "pong.default.cloudpeer"}, |
|
"consul.destination.trust_domain": {"pong.default.cloudpeer.external.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
"consul.full_target": {"pong.default.cloudpeer.external.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "pong.default.cloudpeer.external.e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
"consul.namespace": {"pong.default.cloudpeer.external.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "default"}, |
|
"consul.routing_type": {"pong.default.cloudpeer.external.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "external"}, |
|
"consul.service": {"pong.default.cloudpeer.external.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "pong"}, |
|
"consul.service_subset": {"pong.default.cloudpeer.external.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", ""}, |
|
"consul.target": {"pong.default.cloudpeer.external.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "pong.default.cloudpeer"}, |
|
"consul.trust_domain": {"pong.default.cloudpeer.external.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
}, |
|
expectNoDeprecated: map[string][]string{ |
|
"consul.destination.custom_hash": {"pong.default.cloudpeer.external.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", ""}, |
|
"consul.destination.full_target": {"pong.default.cloudpeer.external.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "pong.default.cloudpeer.external.e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
"consul.destination.namespace": {"pong.default.cloudpeer.external.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "default"}, |
|
"consul.destination.peer": {"pong.default.cloudpeer.external.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "cloudpeer"}, |
|
"consul.destination.routing_type": {"pong.default.cloudpeer.external.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "external"}, |
|
"consul.destination.service": {"pong.default.cloudpeer.external.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "pong"}, |
|
"consul.destination.service_subset": {"pong.default.cloudpeer.external.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", ""}, |
|
"consul.destination.target": {"pong.default.cloudpeer.external.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "pong.default.cloudpeer"}, |
|
"consul.destination.trust_domain": {"pong.default.cloudpeer.external.e5b08d03-bfc3-c870-1833-baddb116e648.consul.", "e5b08d03-bfc3-c870-1833-baddb116e648"}, |
|
}, |
|
}, |
|
{ |
|
name: "tcp listener no namespace or partition (OSS)", |
|
stat: "tcp.upstream.db.dc1.downstream_cx_total", |
|
expect: map[string][]string{ |
|
"consul.upstream.datacenter": {"db.dc1.", "dc1"}, |
|
"consul.upstream.namespace": {"db.dc1.", ""}, |
|
"consul.upstream.partition": {"db.dc1.", ""}, |
|
"consul.upstream.service": {"db.dc1.", "db"}, |
|
}, |
|
}, |
|
{ |
|
name: "tcp peered listener no namespace or partition (OSS)", |
|
stat: "tcp.upstream_peered.db.cloudpeer.downstream_cx_total", |
|
expect: map[string][]string{ |
|
"consul.upstream.peer": {"db.cloudpeer.", "cloudpeer"}, |
|
"consul.upstream.namespace": {"db.cloudpeer.", ""}, |
|
"consul.upstream.service": {"db.cloudpeer.", "db"}, |
|
}, |
|
}, |
|
{ |
|
name: "tcp listener with namespace and partition", |
|
stat: "tcp.upstream.db.frontend.west.dc1.downstream_cx_total", |
|
expect: map[string][]string{ |
|
"consul.upstream.datacenter": {"db.frontend.west.dc1.", "dc1"}, |
|
"consul.upstream.namespace": {"db.frontend.west.dc1.", "frontend"}, |
|
"consul.upstream.partition": {"db.frontend.west.dc1.", "west"}, |
|
"consul.upstream.service": {"db.frontend.west.dc1.", "db"}, |
|
}, |
|
}, |
|
{ |
|
name: "tcp peered listener with namespace", |
|
stat: "tcp.upstream_peered.db.frontend.cloudpeer.downstream_cx_total", |
|
expect: map[string][]string{ |
|
"consul.upstream.peer": {"db.frontend.cloudpeer.", "cloudpeer"}, |
|
"consul.upstream.namespace": {"db.frontend.cloudpeer.", "frontend"}, |
|
"consul.upstream.service": {"db.frontend.cloudpeer.", "db"}, |
|
}, |
|
}, |
|
{ |
|
name: "http listener no namespace or partition (OSS)", |
|
stat: "http.upstream.web.dc1.downstream_cx_total", |
|
expect: map[string][]string{ |
|
"consul.upstream.datacenter": {"web.dc1.", "dc1"}, |
|
"consul.upstream.namespace": {"web.dc1.", ""}, |
|
"consul.upstream.partition": {"web.dc1.", ""}, |
|
"consul.upstream.service": {"web.dc1.", "web"}, |
|
}, |
|
}, |
|
{ |
|
name: "http peered listener no namespace or partition (OSS)", |
|
stat: "http.upstream_peered.web.cloudpeer.downstream_cx_total", |
|
expect: map[string][]string{ |
|
"consul.upstream.peer": {"web.cloudpeer.", "cloudpeer"}, |
|
"consul.upstream.namespace": {"web.cloudpeer.", ""}, |
|
"consul.upstream.service": {"web.cloudpeer.", "web"}, |
|
}, |
|
}, |
|
{ |
|
name: "http listener with namespace and partition", |
|
stat: "http.upstream.web.frontend.west.dc1.downstream_cx_total", |
|
expect: map[string][]string{ |
|
"consul.upstream.datacenter": {"web.frontend.west.dc1.", "dc1"}, |
|
"consul.upstream.namespace": {"web.frontend.west.dc1.", "frontend"}, |
|
"consul.upstream.partition": {"web.frontend.west.dc1.", "west"}, |
|
"consul.upstream.service": {"web.frontend.west.dc1.", "web"}, |
|
}, |
|
}, |
|
{ |
|
name: "http peered listener with namespace", |
|
stat: "http.upstream_peered.web.frontend.cloudpeer.downstream_cx_total", |
|
expect: map[string][]string{ |
|
"consul.upstream.peer": {"web.frontend.cloudpeer.", "cloudpeer"}, |
|
"consul.upstream.namespace": {"web.frontend.cloudpeer.", "frontend"}, |
|
"consul.upstream.service": {"web.frontend.cloudpeer.", "web"}, |
|
}, |
|
}, |
|
} |
|
|
|
for _, tc := range cases { |
|
tc := tc |
|
t.Run(tc.name, func(t *testing.T) { |
|
var ( |
|
got = make(map[string][]string) |
|
gotNoDeprecated = make(map[string][]string) |
|
) |
|
for _, p := range patterns { |
|
m := p.r.FindStringSubmatch(tc.stat) |
|
if len(m) > 1 { |
|
m = m[1:] |
|
got[p.name] = m |
|
} |
|
} |
|
for _, p := range patternsNoDeprecated { |
|
m := p.r.FindStringSubmatch(tc.stat) |
|
if len(m) > 1 { |
|
m = m[1:] |
|
gotNoDeprecated[p.name] = m |
|
} |
|
} |
|
|
|
if tc.expectNoDeprecated == nil { |
|
tc.expectNoDeprecated = tc.expect |
|
} |
|
|
|
assert.Equal(t, tc.expect, got) |
|
assert.Equal(t, tc.expectNoDeprecated, gotNoDeprecated) |
|
}) |
|
} |
|
} |
|
|
|
func TestAppendHCPMetrics(t *testing.T) { |
|
tests := map[string]struct { |
|
inputArgs *BootstrapTplArgs |
|
bindSocketDir string |
|
wantArgs *BootstrapTplArgs |
|
}{ |
|
"dir-without-trailing-slash": { |
|
inputArgs: &BootstrapTplArgs{ |
|
ProxyID: "web-sidecar-proxy", |
|
}, |
|
bindSocketDir: "/tmp/consul/hcp-metrics", |
|
wantArgs: &BootstrapTplArgs{ |
|
ProxyID: "web-sidecar-proxy", |
|
StatsSinksJSON: expectedHCPMetricsStatsSink, |
|
StaticClustersJSON: expectedHCPMetricsCluster, |
|
}, |
|
}, |
|
"dir-with-trailing-slash": { |
|
inputArgs: &BootstrapTplArgs{ |
|
ProxyID: "web-sidecar-proxy", |
|
}, |
|
bindSocketDir: "/tmp/consul/hcp-metrics", |
|
wantArgs: &BootstrapTplArgs{ |
|
ProxyID: "web-sidecar-proxy", |
|
StatsSinksJSON: expectedHCPMetricsStatsSink, |
|
StaticClustersJSON: expectedHCPMetricsCluster, |
|
}, |
|
}, |
|
"append-clusters-and-stats-sink": { |
|
inputArgs: &BootstrapTplArgs{ |
|
ProxyID: "web-sidecar-proxy", |
|
StatsSinksJSON: expectedStatsdSink, |
|
StaticClustersJSON: expectedSelfAdminCluster, |
|
}, |
|
bindSocketDir: "/tmp/consul/hcp-metrics", |
|
wantArgs: &BootstrapTplArgs{ |
|
ProxyID: "web-sidecar-proxy", |
|
StatsSinksJSON: expectedStatsdSink + ",\n" + expectedHCPMetricsStatsSink, |
|
StaticClustersJSON: expectedSelfAdminCluster + ",\n" + expectedHCPMetricsCluster, |
|
}, |
|
}, |
|
} |
|
|
|
for name, tt := range tests { |
|
t.Run(name, func(t *testing.T) { |
|
appendHCPMetricsConfig(tt.inputArgs, tt.bindSocketDir) |
|
|
|
// Some of our JSON strings are comma separated objects to be |
|
// insertedinto an array which is not valid JSON on it's own so wrap |
|
// them all in an array. For simple values this is still valid JSON |
|
// too. |
|
wantStatsSink := "[" + tt.wantArgs.StatsSinksJSON + "]" |
|
gotStatsSink := "[" + tt.inputArgs.StatsSinksJSON + "]" |
|
require.JSONEq(t, wantStatsSink, gotStatsSink, "field StatsSinksJSON should be equivalent JSON") |
|
|
|
wantClusters := "[" + tt.wantArgs.StaticClustersJSON + "]" |
|
gotClusters := "[" + tt.inputArgs.StaticClustersJSON + "]" |
|
require.JSONEq(t, wantClusters, gotClusters, "field StaticClustersJSON should be equivalent JSON") |
|
}) |
|
} |
|
}
|
|
|