2020-04-13 18:02:27 +00:00
package kubernetes
import (
2021-02-26 14:54:03 +00:00
"encoding/json"
"errors"
"flag"
"fmt"
"io"
"io/ioutil"
"net"
"net/http"
"net/url"
"os"
"strconv"
"strings"
2021-02-26 14:46:13 +00:00
"sync"
2021-02-26 14:54:03 +00:00
"time"
2020-04-13 18:02:27 +00:00
2021-02-26 19:41:54 +00:00
"github.com/VictoriaMetrics/VictoriaMetrics/lib/fasttime"
2021-02-26 14:54:03 +00:00
"github.com/VictoriaMetrics/VictoriaMetrics/lib/logger"
"github.com/VictoriaMetrics/VictoriaMetrics/lib/promauth"
2020-05-04 13:21:24 +00:00
"github.com/VictoriaMetrics/VictoriaMetrics/lib/promscrape/discoveryutils"
2020-04-13 18:02:27 +00:00
)
2021-02-26 23:45:34 +00:00
var apiServerTimeout = flag . Duration ( "promscrape.kubernetes.apiServerTimeout" , 10 * time . Minute , "How frequently to reload the full state from Kuberntes API server" )
2021-02-26 14:54:03 +00:00
2020-04-23 08:34:04 +00:00
// apiConfig contains config for API server
type apiConfig struct {
2021-02-26 14:54:03 +00:00
aw * apiWatcher
2020-04-23 08:34:04 +00:00
}
2020-05-04 13:21:24 +00:00
var configMap = discoveryutils . NewConfigMap ( )
2020-05-04 12:53:50 +00:00
2021-02-26 14:54:03 +00:00
func getAPIConfig ( sdc * SDConfig , baseDir string ) ( * apiConfig , error ) {
v , err := configMap . Get ( sdc , func ( ) ( interface { } , error ) { return newAPIConfig ( sdc , baseDir ) } )
2020-04-13 18:02:27 +00:00
if err != nil {
return nil , err
}
2020-05-04 13:21:24 +00:00
return v . ( * apiConfig ) , nil
2020-05-04 12:53:50 +00:00
}
2021-02-26 14:54:03 +00:00
func newAPIConfig ( sdc * SDConfig , baseDir string ) ( * apiConfig , error ) {
ac , err := promauth . NewConfig ( baseDir , sdc . BasicAuth , sdc . BearerToken , sdc . BearerTokenFile , sdc . TLSConfig )
2020-05-04 12:53:50 +00:00
if err != nil {
2021-02-26 14:54:03 +00:00
return nil , fmt . Errorf ( "cannot parse auth config: %w" , err )
}
apiServer := sdc . APIServer
if len ( apiServer ) == 0 {
// Assume we run at k8s pod.
// Discover apiServer and auth config according to k8s docs.
// See https://kubernetes.io/docs/reference/access-authn-authz/service-accounts-admin/#service-account-admission-controller
host := os . Getenv ( "KUBERNETES_SERVICE_HOST" )
port := os . Getenv ( "KUBERNETES_SERVICE_PORT" )
if len ( host ) == 0 {
return nil , fmt . Errorf ( "cannot find KUBERNETES_SERVICE_HOST env var; it must be defined when running in k8s; " +
"probably, `kubernetes_sd_config->api_server` is missing in Prometheus configs?" )
}
if len ( port ) == 0 {
return nil , fmt . Errorf ( "cannot find KUBERNETES_SERVICE_PORT env var; it must be defined when running in k8s; " +
"KUBERNETES_SERVICE_HOST=%q" , host )
}
apiServer = "https://" + net . JoinHostPort ( host , port )
tlsConfig := promauth . TLSConfig {
CAFile : "/var/run/secrets/kubernetes.io/serviceaccount/ca.crt" ,
}
acNew , err := promauth . NewConfig ( "." , nil , "" , "/var/run/secrets/kubernetes.io/serviceaccount/token" , & tlsConfig )
if err != nil {
return nil , fmt . Errorf ( "cannot initialize service account auth: %w; probably, `kubernetes_sd_config->api_server` is missing in Prometheus configs?" , err )
}
ac = acNew
}
if ! strings . Contains ( apiServer , "://" ) {
proto := "http"
if sdc . TLSConfig != nil {
proto = "https"
}
apiServer = proto + "://" + apiServer
}
for strings . HasSuffix ( apiServer , "/" ) {
apiServer = apiServer [ : len ( apiServer ) - 1 ]
2020-04-13 18:02:27 +00:00
}
2021-02-26 14:54:03 +00:00
var proxy func ( * http . Request ) ( * url . URL , error )
if proxyURL := sdc . ProxyURL . URL ( ) ; proxyURL != nil {
proxy = http . ProxyURL ( proxyURL )
}
client := & http . Client {
Transport : & http . Transport {
TLSClientConfig : ac . NewTLSConfig ( ) ,
Proxy : proxy ,
TLSHandshakeTimeout : 10 * time . Second ,
IdleConnTimeout : * apiServerTimeout ,
} ,
Timeout : * apiServerTimeout ,
}
aw := newAPIWatcher ( client , apiServer , ac . Authorization , sdc . Namespaces . Names , sdc . Selectors )
2020-05-04 17:48:02 +00:00
cfg := & apiConfig {
2021-02-26 14:54:03 +00:00
aw : aw ,
2020-04-13 18:02:27 +00:00
}
2020-05-04 17:48:02 +00:00
return cfg , nil
}
2021-02-26 14:54:03 +00:00
// WatchEvent is a watch event returned from API server endpoints if `watch=1` query arg is set.
//
// See https://kubernetes.io/docs/reference/using-api/api-concepts/#efficient-detection-of-changes
type WatchEvent struct {
Type string
Object json . RawMessage
}
// object is any Kubernetes object.
type object interface {
key ( ) string
2021-02-26 18:21:27 +00:00
getTargetLabels ( aw * apiWatcher ) [ ] map [ string ] string
2021-02-26 14:54:03 +00:00
}
// parseObjectFunc must parse object from the given data.
type parseObjectFunc func ( data [ ] byte ) ( object , error )
// parseObjectListFunc must parse objectList from the given data.
type parseObjectListFunc func ( data [ ] byte ) ( map [ string ] object , ListMeta , error )
// apiWatcher is used for watching for Kuberntes object changes and caching their latest states.
type apiWatcher struct {
// The client used for watching for object changes
client * http . Client
// Kubenetes API server address in the form http://api-server
apiServer string
// The contents for `Authorization` HTTP request header
authorization string
// Namespaces to watch
namespaces [ ] string
// Selectors to apply during watch
selectors [ ] Selector
// mu protects watchersByURL and lastAccessTime
mu sync . Mutex
// a map of watchers keyed by request paths
watchersByURL map [ string ] * urlWatcher
// The last time the apiWatcher was queried for cached objects.
// It is used for stopping unused watchers.
2021-02-26 19:41:54 +00:00
lastAccessTime uint64
2021-02-26 14:54:03 +00:00
}
func newAPIWatcher ( client * http . Client , apiServer , authorization string , namespaces [ ] string , selectors [ ] Selector ) * apiWatcher {
return & apiWatcher {
apiServer : apiServer ,
authorization : authorization ,
client : client ,
namespaces : namespaces ,
selectors : selectors ,
watchersByURL : make ( map [ string ] * urlWatcher ) ,
2021-02-26 19:41:54 +00:00
lastAccessTime : fasttime . UnixTimestamp ( ) ,
2021-02-26 14:54:03 +00:00
}
}
2021-02-26 18:21:27 +00:00
// getLabelsForRole returns all the sets of labels for the given role.
func ( aw * apiWatcher ) getLabelsForRole ( role string ) [ ] map [ string ] string {
2021-02-28 11:56:24 +00:00
aw . startWatchersForRole ( role )
2021-02-26 18:21:27 +00:00
var ms [ ] map [ string ] string
aw . mu . Lock ( )
for _ , uw := range aw . watchersByURL {
if uw . role != role {
continue
}
uw . mu . Lock ( )
for _ , labels := range uw . labelsByKey {
ms = append ( ms , labels ... )
}
uw . mu . Unlock ( )
}
2021-02-26 19:41:54 +00:00
aw . lastAccessTime = fasttime . UnixTimestamp ( )
aw . mu . Unlock ( )
2021-02-26 18:21:27 +00:00
return ms
}
2021-02-26 14:54:03 +00:00
// getObjectByRole returns an object with the given (namespace, name) key and the given role.
func ( aw * apiWatcher ) getObjectByRole ( role , namespace , name string ) object {
if aw == nil {
return nil
}
key := namespace + "/" + name
aw . startWatchersForRole ( role )
var o object
aw . mu . Lock ( )
for _ , uw := range aw . watchersByURL {
if uw . role != role {
continue
}
uw . mu . Lock ( )
o = uw . objectsByKey [ key ]
uw . mu . Unlock ( )
if o != nil {
break
}
}
2021-02-26 19:41:54 +00:00
aw . lastAccessTime = fasttime . UnixTimestamp ( )
2021-02-26 14:54:03 +00:00
aw . mu . Unlock ( )
return o
}
func ( aw * apiWatcher ) startWatchersForRole ( role string ) {
parseObject , parseObjectList := getObjectParsersForRole ( role )
paths := getAPIPaths ( role , aw . namespaces , aw . selectors )
for _ , path := range paths {
apiURL := aw . apiServer + path
aw . startWatcherForURL ( role , apiURL , parseObject , parseObjectList )
}
}
func ( aw * apiWatcher ) startWatcherForURL ( role , apiURL string , parseObject parseObjectFunc , parseObjectList parseObjectListFunc ) {
aw . mu . Lock ( )
if aw . watchersByURL [ apiURL ] != nil {
// Watcher for the given path already exists.
2021-02-28 13:25:30 +00:00
aw . mu . Unlock ( )
2021-02-26 14:54:03 +00:00
return
}
uw := aw . newURLWatcher ( role , apiURL , parseObject , parseObjectList )
aw . watchersByURL [ apiURL ] = uw
2021-02-28 13:25:30 +00:00
aw . mu . Unlock ( )
resourceVersion := uw . reloadObjects ( )
2021-02-26 14:54:03 +00:00
go func ( ) {
uw . watchForUpdates ( resourceVersion )
aw . mu . Lock ( )
delete ( aw . watchersByURL , apiURL )
aw . mu . Unlock ( )
} ( )
}
// needStop returns true if aw wasn't used for long time.
func ( aw * apiWatcher ) needStop ( ) bool {
aw . mu . Lock ( )
defer aw . mu . Unlock ( )
2021-02-26 19:41:54 +00:00
return fasttime . UnixTimestamp ( ) > aw . lastAccessTime + 5 * 60
2021-02-26 14:54:03 +00:00
}
// doRequest performs http request to the given requestURL.
func ( aw * apiWatcher ) doRequest ( requestURL string ) ( * http . Response , error ) {
req , err := http . NewRequest ( "GET" , requestURL , nil )
if err != nil {
logger . Fatalf ( "cannot create a request for %q: %s" , requestURL , err )
}
if aw . authorization != "" {
req . Header . Set ( "Authorization" , aw . authorization )
}
return aw . client . Do ( req )
}
// urlWatcher watches for an apiURL and updates object states in objectsByKey.
type urlWatcher struct {
role string
apiURL string
parseObject parseObjectFunc
parseObjectList parseObjectListFunc
2021-02-26 18:21:27 +00:00
// mu protects objectsByKey and labelsByKey
2021-02-26 14:54:03 +00:00
mu sync . Mutex
// objectsByKey contains the latest state for objects obtained from apiURL
objectsByKey map [ string ] object
2021-02-26 18:21:27 +00:00
labelsByKey map [ string ] [ ] map [ string ] string
2021-02-26 14:54:03 +00:00
// the parent apiWatcher
aw * apiWatcher
}
func ( aw * apiWatcher ) newURLWatcher ( role , apiURL string , parseObject parseObjectFunc , parseObjectList parseObjectListFunc ) * urlWatcher {
return & urlWatcher {
role : role ,
apiURL : apiURL ,
parseObject : parseObject ,
parseObjectList : parseObjectList ,
objectsByKey : make ( map [ string ] object ) ,
2021-02-26 18:21:27 +00:00
labelsByKey : make ( map [ string ] [ ] map [ string ] string ) ,
2021-02-26 14:54:03 +00:00
aw : aw ,
}
}
// reloadObjects reloads objects to the latest state and returns resourceVersion for the latest state.
func ( uw * urlWatcher ) reloadObjects ( ) string {
requestURL := uw . apiURL
resp , err := uw . aw . doRequest ( requestURL )
if err != nil {
logger . Errorf ( "error when performing a request to %q: %s" , requestURL , err )
return ""
}
body , _ := ioutil . ReadAll ( resp . Body )
_ = resp . Body . Close ( )
if resp . StatusCode != http . StatusOK {
logger . Errorf ( "unexpected status code for request to %q: %d; want %d; response: %q" , requestURL , resp . StatusCode , http . StatusOK , body )
return ""
}
objectsByKey , metadata , err := uw . parseObjectList ( body )
if err != nil {
logger . Errorf ( "cannot parse response from %q: %s" , requestURL , err )
return ""
}
2021-02-28 13:09:28 +00:00
labelsByKey := make ( map [ string ] [ ] map [ string ] string , len ( objectsByKey ) )
for k , o := range objectsByKey {
2021-02-28 13:12:08 +00:00
labelsByKey [ k ] = o . getTargetLabels ( uw . aw )
2021-02-28 13:09:28 +00:00
}
2021-02-26 14:54:03 +00:00
uw . mu . Lock ( )
uw . objectsByKey = objectsByKey
2021-02-28 13:09:28 +00:00
uw . labelsByKey = labelsByKey
2021-02-26 14:54:03 +00:00
uw . mu . Unlock ( )
return metadata . ResourceVersion
}
// watchForUpdates watches for object updates starting from resourceVersion and updates the corresponding objects to the latest state.
//
// See https://kubernetes.io/docs/reference/using-api/api-concepts/#efficient-detection-of-changes
func ( uw * urlWatcher ) watchForUpdates ( resourceVersion string ) {
aw := uw . aw
backoffDelay := time . Second
maxBackoffDelay := 30 * time . Second
backoffSleep := func ( ) {
time . Sleep ( backoffDelay )
backoffDelay *= 2
if backoffDelay > maxBackoffDelay {
backoffDelay = maxBackoffDelay
}
}
apiURL := uw . apiURL
delimiter := "?"
if strings . Contains ( apiURL , "?" ) {
delimiter = "&"
}
timeoutSeconds := time . Duration ( 0.9 * float64 ( aw . client . Timeout ) ) . Seconds ( )
apiURL += delimiter + "watch=1&timeoutSeconds=" + strconv . Itoa ( int ( timeoutSeconds ) )
logger . Infof ( "started watcher for %q" , apiURL )
for {
if aw . needStop ( ) {
logger . Infof ( "stopped unused watcher for %q" , apiURL )
return
}
requestURL := apiURL
if resourceVersion != "" {
requestURL += "&resourceVersion=" + url . QueryEscape ( resourceVersion ) + "&resourceVersionMatch=NotOlderThan"
}
resp , err := aw . doRequest ( requestURL )
if err != nil {
logger . Errorf ( "error when performing a request to %q: %s" , requestURL , err )
backoffSleep ( )
2021-02-26 23:45:34 +00:00
resourceVersion = uw . reloadObjects ( )
2021-02-26 14:54:03 +00:00
continue
}
if resp . StatusCode != http . StatusOK {
body , _ := ioutil . ReadAll ( resp . Body )
_ = resp . Body . Close ( )
logger . Errorf ( "unexpected status code for request to %q: %d; want %d; response: %q" , requestURL , resp . StatusCode , http . StatusOK , body )
if resp . StatusCode == 410 {
2021-02-26 23:45:34 +00:00
// There is no need for sleep on 410 error. See https://kubernetes.io/docs/reference/using-api/api-concepts/#410-gone-responses
2021-02-26 14:54:03 +00:00
backoffDelay = time . Second
} else {
backoffSleep ( )
}
2021-02-26 23:45:34 +00:00
resourceVersion = uw . reloadObjects ( )
2021-02-26 14:54:03 +00:00
continue
}
backoffDelay = time . Second
err = uw . readObjectUpdateStream ( resp . Body )
_ = resp . Body . Close ( )
if err != nil {
2021-02-26 23:45:34 +00:00
if ! errors . Is ( err , io . EOF ) {
logger . Errorf ( "error when reading WatchEvent stream from %q: %s" , requestURL , err )
2021-02-26 14:54:03 +00:00
}
backoffSleep ( )
2021-02-26 23:45:34 +00:00
resourceVersion = uw . reloadObjects ( )
2021-02-26 14:54:03 +00:00
continue
}
}
}
// readObjectUpdateStream reads Kuberntes watch events from r and updates locally cached objects according to the received events.
func ( uw * urlWatcher ) readObjectUpdateStream ( r io . Reader ) error {
d := json . NewDecoder ( r )
var we WatchEvent
for {
if err := d . Decode ( & we ) ; err != nil {
return err
}
o , err := uw . parseObject ( we . Object )
if err != nil {
return err
}
key := o . key ( )
switch we . Type {
case "ADDED" , "MODIFIED" :
uw . mu . Lock ( )
uw . objectsByKey [ key ] = o
uw . mu . Unlock ( )
2021-02-26 18:21:27 +00:00
labels := o . getTargetLabels ( uw . aw )
uw . mu . Lock ( )
uw . labelsByKey [ key ] = labels
uw . mu . Unlock ( )
2021-02-26 14:54:03 +00:00
case "DELETED" :
uw . mu . Lock ( )
delete ( uw . objectsByKey , key )
2021-02-26 18:21:27 +00:00
delete ( uw . labelsByKey , key )
2021-02-26 14:54:03 +00:00
uw . mu . Unlock ( )
default :
return fmt . Errorf ( "unexpected WatchEvent type %q for role %q" , we . Type , uw . role )
}
}
}
func getAPIPaths ( role string , namespaces [ ] string , selectors [ ] Selector ) [ ] string {
objectName := getObjectNameByRole ( role )
if objectName == "nodes" || len ( namespaces ) == 0 {
query := joinSelectors ( role , selectors )
path := getAPIPath ( objectName , "" , query )
return [ ] string { path }
}
query := joinSelectors ( role , selectors )
paths := make ( [ ] string , len ( namespaces ) )
for i , namespace := range namespaces {
paths [ i ] = getAPIPath ( objectName , namespace , query )
}
return paths
}
func getAPIPath ( objectName , namespace , query string ) string {
suffix := objectName
if namespace != "" {
suffix = "namespaces/" + namespace + "/" + objectName
}
if len ( query ) > 0 {
suffix += "?" + query
}
if objectName == "endpointslices" {
return "/apis/discovery.k8s.io/v1beta1/" + suffix
}
return "/api/v1/" + suffix
}
func joinSelectors ( role string , selectors [ ] Selector ) string {
var labelSelectors , fieldSelectors [ ] string
for _ , s := range selectors {
if s . Role != role {
continue
}
if s . Label != "" {
labelSelectors = append ( labelSelectors , s . Label )
}
if s . Field != "" {
fieldSelectors = append ( fieldSelectors , s . Field )
}
}
var args [ ] string
if len ( labelSelectors ) > 0 {
args = append ( args , "labelSelector=" + url . QueryEscape ( strings . Join ( labelSelectors , "," ) ) )
}
if len ( fieldSelectors ) > 0 {
args = append ( args , "fieldSelector=" + url . QueryEscape ( strings . Join ( fieldSelectors , "," ) ) )
}
return strings . Join ( args , "&" )
}
func getObjectNameByRole ( role string ) string {
switch role {
case "node" :
return "nodes"
case "pod" :
return "pods"
case "service" :
return "services"
case "endpoints" :
return "endpoints"
case "endpointslices" :
return "endpointslices"
case "ingress" :
return "ingresses"
default :
logger . Panicf ( "BUG: unknonw role=%q" , role )
return ""
}
}
func getObjectParsersForRole ( role string ) ( parseObjectFunc , parseObjectListFunc ) {
switch role {
case "node" :
return parseNode , parseNodeList
case "pod" :
return parsePod , parsePodList
case "service" :
return parseService , parseServiceList
case "endpoints" :
return parseEndpoints , parseEndpointsList
case "endpointslices" :
return parseEndpointSlice , parseEndpointSliceList
case "ingress" :
return parseIngress , parseIngressList
default :
logger . Panicf ( "BUG: unsupported role=%q" , role )
return nil , nil
}
}