2016-07-01 14:55:37 +00:00
|
|
|
// Copyright 2016 The Prometheus Authors
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package kubernetes
|
|
|
|
|
|
|
|
import (
|
2017-10-25 04:21:42 +00:00
|
|
|
"context"
|
2022-06-03 11:47:14 +00:00
|
|
|
"errors"
|
|
|
|
"fmt"
|
2024-09-10 01:41:53 +00:00
|
|
|
"log/slog"
|
2016-07-01 14:55:37 +00:00
|
|
|
"net"
|
|
|
|
"strconv"
|
|
|
|
|
2023-10-23 13:55:36 +00:00
|
|
|
"github.com/prometheus/client_golang/prometheus"
|
2016-07-01 14:55:37 +00:00
|
|
|
"github.com/prometheus/common/model"
|
2024-09-10 01:41:53 +00:00
|
|
|
"github.com/prometheus/common/promslog"
|
2018-07-03 07:37:22 +00:00
|
|
|
apiv1 "k8s.io/api/core/v1"
|
2017-05-11 08:29:10 +00:00
|
|
|
"k8s.io/client-go/tools/cache"
|
2018-04-09 16:35:14 +00:00
|
|
|
"k8s.io/client-go/util/workqueue"
|
2019-03-25 23:01:12 +00:00
|
|
|
|
|
|
|
"github.com/prometheus/prometheus/discovery/targetgroup"
|
|
|
|
"github.com/prometheus/prometheus/util/strutil"
|
2016-07-01 14:55:37 +00:00
|
|
|
)
|
|
|
|
|
2018-07-03 12:04:27 +00:00
|
|
|
const (
|
|
|
|
NodeLegacyHostIP = "LegacyHostIP"
|
|
|
|
)
|
|
|
|
|
2016-10-07 12:53:11 +00:00
|
|
|
// Node discovers Kubernetes nodes.
|
|
|
|
type Node struct {
|
2024-09-10 01:41:53 +00:00
|
|
|
logger *slog.Logger
|
2016-10-07 12:53:11 +00:00
|
|
|
informer cache.SharedInformer
|
|
|
|
store cache.Store
|
2018-04-09 16:35:14 +00:00
|
|
|
queue *workqueue.Type
|
2016-07-01 14:55:37 +00:00
|
|
|
}
|
|
|
|
|
2016-10-07 12:53:11 +00:00
|
|
|
// NewNode returns a new node discovery.
|
2024-09-10 01:41:53 +00:00
|
|
|
func NewNode(l *slog.Logger, inf cache.SharedInformer, eventCount *prometheus.CounterVec) *Node {
|
2017-08-11 18:45:52 +00:00
|
|
|
if l == nil {
|
2024-09-10 01:41:53 +00:00
|
|
|
l = promslog.NewNopLogger()
|
2017-08-11 18:45:52 +00:00
|
|
|
}
|
2023-12-11 13:12:43 +00:00
|
|
|
|
2023-12-11 13:17:47 +00:00
|
|
|
nodeAddCount := eventCount.WithLabelValues(RoleNode.String(), MetricLabelRoleAdd)
|
|
|
|
nodeUpdateCount := eventCount.WithLabelValues(RoleNode.String(), MetricLabelRoleUpdate)
|
|
|
|
nodeDeleteCount := eventCount.WithLabelValues(RoleNode.String(), MetricLabelRoleDelete)
|
2023-12-11 13:12:43 +00:00
|
|
|
|
|
|
|
n := &Node{
|
|
|
|
logger: l,
|
|
|
|
informer: inf,
|
|
|
|
store: inf.GetStore(),
|
2023-12-11 13:17:47 +00:00
|
|
|
queue: workqueue.NewNamed(RoleNode.String()),
|
2023-12-11 13:12:43 +00:00
|
|
|
}
|
|
|
|
|
2022-12-14 09:43:53 +00:00
|
|
|
_, err := n.informer.AddEventHandler(cache.ResourceEventHandlerFuncs{
|
2018-04-09 16:35:14 +00:00
|
|
|
AddFunc: func(o interface{}) {
|
2023-12-11 13:12:43 +00:00
|
|
|
nodeAddCount.Inc()
|
2018-04-09 16:35:14 +00:00
|
|
|
n.enqueue(o)
|
|
|
|
},
|
|
|
|
DeleteFunc: func(o interface{}) {
|
2023-12-11 13:12:43 +00:00
|
|
|
nodeDeleteCount.Inc()
|
2018-04-09 16:35:14 +00:00
|
|
|
n.enqueue(o)
|
|
|
|
},
|
|
|
|
UpdateFunc: func(_, o interface{}) {
|
2023-12-11 13:12:43 +00:00
|
|
|
nodeUpdateCount.Inc()
|
2018-04-09 16:35:14 +00:00
|
|
|
n.enqueue(o)
|
|
|
|
},
|
|
|
|
})
|
2022-12-14 09:43:53 +00:00
|
|
|
if err != nil {
|
2024-09-10 01:41:53 +00:00
|
|
|
l.Error("Error adding nodes event handler.", "err", err)
|
2022-12-14 09:43:53 +00:00
|
|
|
}
|
2018-04-09 16:35:14 +00:00
|
|
|
return n
|
|
|
|
}
|
|
|
|
|
2018-07-18 04:07:33 +00:00
|
|
|
func (n *Node) enqueue(obj interface{}) {
|
2024-10-15 18:29:07 +00:00
|
|
|
key, err := nodeName(obj)
|
2018-04-09 16:35:14 +00:00
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-07-18 04:07:33 +00:00
|
|
|
n.queue.Add(key)
|
2018-04-09 16:35:14 +00:00
|
|
|
}
|
|
|
|
|
2018-01-08 23:59:18 +00:00
|
|
|
// Run implements the Discoverer interface.
|
Refactor SD configuration to remove `config` dependency (#3629)
* refactor: move targetGroup struct and CheckOverflow() to their own package
* refactor: move auth and security related structs to a utility package, fix import error in utility package
* refactor: Azure SD, remove SD struct from config
* refactor: DNS SD, remove SD struct from config into dns package
* refactor: ec2 SD, move SD struct from config into the ec2 package
* refactor: file SD, move SD struct from config to file discovery package
* refactor: gce, move SD struct from config to gce discovery package
* refactor: move HTTPClientConfig and URL into util/config, fix import error in httputil
* refactor: consul, move SD struct from config into consul discovery package
* refactor: marathon, move SD struct from config into marathon discovery package
* refactor: triton, move SD struct from config to triton discovery package, fix test
* refactor: zookeeper, move SD structs from config to zookeeper discovery package
* refactor: openstack, remove SD struct from config, move into openstack discovery package
* refactor: kubernetes, move SD struct from config into kubernetes discovery package
* refactor: notifier, use targetgroup package instead of config
* refactor: tests for file, marathon, triton SD - use targetgroup package instead of config.TargetGroup
* refactor: retrieval, use targetgroup package instead of config.TargetGroup
* refactor: storage, use config util package
* refactor: discovery manager, use targetgroup package instead of config.TargetGroup
* refactor: use HTTPClient and TLS config from configUtil instead of config
* refactor: tests, use targetgroup package instead of config.TargetGroup
* refactor: fix tagetgroup.Group pointers that were removed by mistake
* refactor: openstack, kubernetes: drop prefixes
* refactor: remove import aliases forced due to vscode bug
* refactor: move main SD struct out of config into discovery/config
* refactor: rename configUtil to config_util
* refactor: rename yamlUtil to yaml_config
* refactor: kubernetes, remove prefixes
* refactor: move the TargetGroup package to discovery/
* refactor: fix order of imports
2017-12-29 20:01:34 +00:00
|
|
|
func (n *Node) Run(ctx context.Context, ch chan<- []*targetgroup.Group) {
|
2018-04-09 16:35:14 +00:00
|
|
|
defer n.queue.ShutDown()
|
|
|
|
|
|
|
|
if !cache.WaitForCacheSync(ctx.Done(), n.informer.HasSynced) {
|
2022-06-03 11:47:14 +00:00
|
|
|
if !errors.Is(ctx.Err(), context.Canceled) {
|
2024-09-10 01:41:53 +00:00
|
|
|
n.logger.Error("node informer unable to sync cache")
|
2019-10-09 09:51:38 +00:00
|
|
|
}
|
2016-07-01 14:55:37 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-04-09 16:35:14 +00:00
|
|
|
go func() {
|
2023-10-31 11:35:13 +00:00
|
|
|
for n.process(ctx, ch) {
|
2018-04-09 16:35:14 +00:00
|
|
|
}
|
|
|
|
}()
|
2016-07-01 14:55:37 +00:00
|
|
|
|
2016-10-07 12:53:11 +00:00
|
|
|
// Block until the target provider is explicitly canceled.
|
|
|
|
<-ctx.Done()
|
2016-07-01 14:55:37 +00:00
|
|
|
}
|
|
|
|
|
2018-04-10 08:53:00 +00:00
|
|
|
func (n *Node) process(ctx context.Context, ch chan<- []*targetgroup.Group) bool {
|
2018-04-09 16:35:14 +00:00
|
|
|
keyObj, quit := n.queue.Get()
|
|
|
|
if quit {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
defer n.queue.Done(keyObj)
|
|
|
|
key := keyObj.(string)
|
|
|
|
|
|
|
|
_, name, err := cache.SplitMetaNamespaceKey(key)
|
|
|
|
if err != nil {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
o, exists, err := n.store.GetByKey(key)
|
|
|
|
if err != nil {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
if !exists {
|
2020-02-18 16:36:57 +00:00
|
|
|
send(ctx, ch, &targetgroup.Group{Source: nodeSourceFromName(name)})
|
2018-04-09 16:35:14 +00:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
node, err := convertToNode(o)
|
|
|
|
if err != nil {
|
2024-09-10 01:41:53 +00:00
|
|
|
n.logger.Error("converting to Node object failed", "err", err)
|
2018-04-09 16:35:14 +00:00
|
|
|
return true
|
|
|
|
}
|
2020-02-18 16:36:57 +00:00
|
|
|
send(ctx, ch, n.buildNode(node))
|
2018-04-09 16:35:14 +00:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2016-11-14 15:21:38 +00:00
|
|
|
func convertToNode(o interface{}) (*apiv1.Node, error) {
|
2017-09-04 11:10:44 +00:00
|
|
|
node, ok := o.(*apiv1.Node)
|
|
|
|
if ok {
|
|
|
|
return node, nil
|
2016-11-14 15:21:38 +00:00
|
|
|
}
|
|
|
|
|
2022-06-03 11:47:14 +00:00
|
|
|
return nil, fmt.Errorf("received unexpected object: %v", o)
|
2016-11-14 15:21:38 +00:00
|
|
|
}
|
|
|
|
|
2016-10-07 12:53:11 +00:00
|
|
|
func nodeSource(n *apiv1.Node) string {
|
2018-04-25 16:36:22 +00:00
|
|
|
return nodeSourceFromName(n.Name)
|
2016-10-07 12:53:11 +00:00
|
|
|
}
|
2016-07-01 14:55:37 +00:00
|
|
|
|
2018-04-09 16:35:14 +00:00
|
|
|
func nodeSourceFromName(name string) string {
|
|
|
|
return "node/" + name
|
|
|
|
}
|
|
|
|
|
2016-10-07 12:53:11 +00:00
|
|
|
const (
|
2023-05-30 12:13:00 +00:00
|
|
|
nodeProviderIDLabel = metaLabelPrefix + "node_provider_id"
|
|
|
|
nodeAddressPrefix = metaLabelPrefix + "node_address_"
|
2016-10-07 12:53:11 +00:00
|
|
|
)
|
2016-07-01 14:55:37 +00:00
|
|
|
|
2016-10-07 12:53:11 +00:00
|
|
|
func nodeLabels(n *apiv1.Node) model.LabelSet {
|
2019-10-26 02:06:00 +00:00
|
|
|
// Each label and annotation will create two key-value pairs in the map.
|
2023-05-30 12:13:00 +00:00
|
|
|
ls := make(model.LabelSet)
|
2016-07-01 14:55:37 +00:00
|
|
|
|
2021-12-06 21:27:11 +00:00
|
|
|
ls[nodeProviderIDLabel] = lv(n.Spec.ProviderID)
|
2016-07-01 14:55:37 +00:00
|
|
|
|
2023-05-30 12:13:00 +00:00
|
|
|
addObjectMetaLabels(ls, n.ObjectMeta, RoleNode)
|
2016-07-01 14:55:37 +00:00
|
|
|
|
2016-10-07 12:53:11 +00:00
|
|
|
return ls
|
2016-07-01 14:55:37 +00:00
|
|
|
}
|
|
|
|
|
Refactor SD configuration to remove `config` dependency (#3629)
* refactor: move targetGroup struct and CheckOverflow() to their own package
* refactor: move auth and security related structs to a utility package, fix import error in utility package
* refactor: Azure SD, remove SD struct from config
* refactor: DNS SD, remove SD struct from config into dns package
* refactor: ec2 SD, move SD struct from config into the ec2 package
* refactor: file SD, move SD struct from config to file discovery package
* refactor: gce, move SD struct from config to gce discovery package
* refactor: move HTTPClientConfig and URL into util/config, fix import error in httputil
* refactor: consul, move SD struct from config into consul discovery package
* refactor: marathon, move SD struct from config into marathon discovery package
* refactor: triton, move SD struct from config to triton discovery package, fix test
* refactor: zookeeper, move SD structs from config to zookeeper discovery package
* refactor: openstack, remove SD struct from config, move into openstack discovery package
* refactor: kubernetes, move SD struct from config into kubernetes discovery package
* refactor: notifier, use targetgroup package instead of config
* refactor: tests for file, marathon, triton SD - use targetgroup package instead of config.TargetGroup
* refactor: retrieval, use targetgroup package instead of config.TargetGroup
* refactor: storage, use config util package
* refactor: discovery manager, use targetgroup package instead of config.TargetGroup
* refactor: use HTTPClient and TLS config from configUtil instead of config
* refactor: tests, use targetgroup package instead of config.TargetGroup
* refactor: fix tagetgroup.Group pointers that were removed by mistake
* refactor: openstack, kubernetes: drop prefixes
* refactor: remove import aliases forced due to vscode bug
* refactor: move main SD struct out of config into discovery/config
* refactor: rename configUtil to config_util
* refactor: rename yamlUtil to yaml_config
* refactor: kubernetes, remove prefixes
* refactor: move the TargetGroup package to discovery/
* refactor: fix order of imports
2017-12-29 20:01:34 +00:00
|
|
|
func (n *Node) buildNode(node *apiv1.Node) *targetgroup.Group {
|
|
|
|
tg := &targetgroup.Group{
|
2016-10-07 12:53:11 +00:00
|
|
|
Source: nodeSource(node),
|
2016-07-01 14:55:37 +00:00
|
|
|
}
|
2016-10-07 12:53:11 +00:00
|
|
|
tg.Labels = nodeLabels(node)
|
2016-07-01 14:55:37 +00:00
|
|
|
|
2016-10-07 12:53:11 +00:00
|
|
|
addr, addrMap, err := nodeAddress(node)
|
2016-07-01 14:55:37 +00:00
|
|
|
if err != nil {
|
2024-09-10 01:41:53 +00:00
|
|
|
n.logger.Warn("No node address found", "err", err)
|
2016-10-07 12:53:11 +00:00
|
|
|
return nil
|
2016-07-01 14:55:37 +00:00
|
|
|
}
|
2016-10-07 12:53:11 +00:00
|
|
|
addr = net.JoinHostPort(addr, strconv.FormatInt(int64(node.Status.DaemonEndpoints.KubeletEndpoint.Port), 10))
|
2016-07-01 14:55:37 +00:00
|
|
|
|
2016-10-07 12:53:11 +00:00
|
|
|
t := model.LabelSet{
|
|
|
|
model.AddressLabel: lv(addr),
|
|
|
|
model.InstanceLabel: lv(node.Name),
|
2016-07-01 14:55:37 +00:00
|
|
|
}
|
|
|
|
|
2016-10-07 12:53:11 +00:00
|
|
|
for ty, a := range addrMap {
|
|
|
|
ln := strutil.SanitizeLabelName(nodeAddressPrefix + string(ty))
|
|
|
|
t[model.LabelName(ln)] = lv(a[0])
|
2016-07-01 14:55:37 +00:00
|
|
|
}
|
2016-10-07 12:53:11 +00:00
|
|
|
tg.Targets = append(tg.Targets, t)
|
2016-07-01 14:55:37 +00:00
|
|
|
|
2016-10-07 12:53:11 +00:00
|
|
|
return tg
|
2016-07-01 14:55:37 +00:00
|
|
|
}
|
|
|
|
|
2023-04-25 06:19:16 +00:00
|
|
|
// nodeAddress returns the provided node's address, based on the priority:
|
2016-07-01 14:55:37 +00:00
|
|
|
// 1. NodeInternalIP
|
2019-08-20 14:52:11 +00:00
|
|
|
// 2. NodeInternalDNS
|
|
|
|
// 3. NodeExternalIP
|
|
|
|
// 4. NodeExternalDNS
|
|
|
|
// 5. NodeLegacyHostIP
|
|
|
|
// 6. NodeHostName
|
2016-07-01 14:55:37 +00:00
|
|
|
//
|
2023-10-03 20:09:25 +00:00
|
|
|
// Derived from k8s.io/kubernetes/pkg/util/node/node.go.
|
2016-10-07 12:53:11 +00:00
|
|
|
func nodeAddress(node *apiv1.Node) (string, map[apiv1.NodeAddressType][]string, error) {
|
|
|
|
m := map[apiv1.NodeAddressType][]string{}
|
|
|
|
for _, a := range node.Status.Addresses {
|
|
|
|
m[a.Type] = append(m[a.Type], a.Address)
|
|
|
|
}
|
|
|
|
|
|
|
|
if addresses, ok := m[apiv1.NodeInternalIP]; ok {
|
|
|
|
return addresses[0], m, nil
|
2016-07-01 14:55:37 +00:00
|
|
|
}
|
2019-08-20 14:52:11 +00:00
|
|
|
if addresses, ok := m[apiv1.NodeInternalDNS]; ok {
|
|
|
|
return addresses[0], m, nil
|
|
|
|
}
|
2016-10-07 12:53:11 +00:00
|
|
|
if addresses, ok := m[apiv1.NodeExternalIP]; ok {
|
|
|
|
return addresses[0], m, nil
|
2016-07-01 14:55:37 +00:00
|
|
|
}
|
2019-08-20 14:52:11 +00:00
|
|
|
if addresses, ok := m[apiv1.NodeExternalDNS]; ok {
|
|
|
|
return addresses[0], m, nil
|
|
|
|
}
|
2018-07-03 12:04:27 +00:00
|
|
|
if addresses, ok := m[apiv1.NodeAddressType(NodeLegacyHostIP)]; ok {
|
|
|
|
return addresses[0], m, nil
|
|
|
|
}
|
2016-10-07 12:53:11 +00:00
|
|
|
if addresses, ok := m[apiv1.NodeHostName]; ok {
|
|
|
|
return addresses[0], m, nil
|
2016-07-01 14:55:37 +00:00
|
|
|
}
|
2019-03-25 23:01:12 +00:00
|
|
|
return "", m, errors.New("host address unknown")
|
2016-07-01 14:55:37 +00:00
|
|
|
}
|