mirror of
https://github.com/VictoriaMetrics/VictoriaMetrics.git
synced 2024-11-21 14:44:00 +00:00
app/vmagent: add -remoteWrite.proxyURL
command-line option
This option allows writing data to `-remoteWrite.url` via http, https or socks5 proxy. This is similar to `proxy_url` option in `remote_write` section of Prometheus. See https://prometheus.io/docs/prometheus/latest/configuration/configuration/#remote_write
This commit is contained in:
parent
efcbb51968
commit
ad6290953c
2 changed files with 77 additions and 99 deletions
|
@ -1,10 +1,14 @@
|
||||||
package remotewrite
|
package remotewrite
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"bytes"
|
||||||
"crypto/tls"
|
"crypto/tls"
|
||||||
"encoding/base64"
|
"encoding/base64"
|
||||||
"flag"
|
"flag"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"io/ioutil"
|
||||||
|
"net/http"
|
||||||
|
"net/url"
|
||||||
"strings"
|
"strings"
|
||||||
"sync"
|
"sync"
|
||||||
"time"
|
"time"
|
||||||
|
@ -13,12 +17,13 @@ import (
|
||||||
"github.com/VictoriaMetrics/VictoriaMetrics/lib/logger"
|
"github.com/VictoriaMetrics/VictoriaMetrics/lib/logger"
|
||||||
"github.com/VictoriaMetrics/VictoriaMetrics/lib/persistentqueue"
|
"github.com/VictoriaMetrics/VictoriaMetrics/lib/persistentqueue"
|
||||||
"github.com/VictoriaMetrics/VictoriaMetrics/lib/promauth"
|
"github.com/VictoriaMetrics/VictoriaMetrics/lib/promauth"
|
||||||
"github.com/VictoriaMetrics/fasthttp"
|
|
||||||
"github.com/VictoriaMetrics/metrics"
|
"github.com/VictoriaMetrics/metrics"
|
||||||
)
|
)
|
||||||
|
|
||||||
var (
|
var (
|
||||||
sendTimeout = flag.Duration("remoteWrite.sendTimeout", time.Minute, "Timeout for sending a single block of data to -remoteWrite.url")
|
sendTimeout = flag.Duration("remoteWrite.sendTimeout", time.Minute, "Timeout for sending a single block of data to -remoteWrite.url")
|
||||||
|
proxyURL = flagutil.NewArray("remoteWrite.proxyURL", "Optional proxy URL for writing data to -remoteWrite.url. Supported proxies: http, https, socks5. "+
|
||||||
|
"Example: -remoteWrite.proxyURL=socks5://proxy:1234")
|
||||||
|
|
||||||
tlsInsecureSkipVerify = flag.Bool("remoteWrite.tlsInsecureSkipVerify", false, "Whether to skip tls verification when connecting to -remoteWrite.url")
|
tlsInsecureSkipVerify = flag.Bool("remoteWrite.tlsInsecureSkipVerify", false, "Whether to skip tls verification when connecting to -remoteWrite.url")
|
||||||
tlsCertFile = flagutil.NewArray("remoteWrite.tlsCertFile", "Optional path to client-side TLS certificate file to use when connecting to -remoteWrite.url. "+
|
tlsCertFile = flagutil.NewArray("remoteWrite.tlsCertFile", "Optional path to client-side TLS certificate file to use when connecting to -remoteWrite.url. "+
|
||||||
|
@ -41,11 +46,9 @@ var (
|
||||||
type client struct {
|
type client struct {
|
||||||
urlLabelValue string
|
urlLabelValue string
|
||||||
remoteWriteURL string
|
remoteWriteURL string
|
||||||
host string
|
|
||||||
requestURI string
|
|
||||||
authHeader string
|
authHeader string
|
||||||
fq *persistentqueue.FastQueue
|
fq *persistentqueue.FastQueue
|
||||||
hc *fasthttp.HostClient
|
hc *http.Client
|
||||||
|
|
||||||
requestDuration *metrics.Histogram
|
requestDuration *metrics.Histogram
|
||||||
requestsOKCount *metrics.Counter
|
requestsOKCount *metrics.Counter
|
||||||
|
@ -57,6 +60,28 @@ type client struct {
|
||||||
}
|
}
|
||||||
|
|
||||||
func newClient(argIdx int, remoteWriteURL, urlLabelValue string, fq *persistentqueue.FastQueue, concurrency int) *client {
|
func newClient(argIdx int, remoteWriteURL, urlLabelValue string, fq *persistentqueue.FastQueue, concurrency int) *client {
|
||||||
|
tlsCfg, err := getTLSConfig(argIdx)
|
||||||
|
if err != nil {
|
||||||
|
logger.Panicf("FATAL: cannot initialize TLS config: %s", err)
|
||||||
|
}
|
||||||
|
tr := &http.Transport{
|
||||||
|
Dial: statDial,
|
||||||
|
TLSClientConfig: tlsCfg,
|
||||||
|
TLSHandshakeTimeout: 5 * time.Second,
|
||||||
|
MaxConnsPerHost: 2 * concurrency,
|
||||||
|
WriteBufferSize: 16 * 1024,
|
||||||
|
}
|
||||||
|
pURL := proxyURL.GetOptionalArg(argIdx)
|
||||||
|
if len(pURL) > 0 {
|
||||||
|
if !strings.Contains(pURL, "://") {
|
||||||
|
logger.Fatalf("cannot parse -remoteWrite.proxyURL=%q: it must start with `http://`, `https://` or `socks5://`", pURL)
|
||||||
|
}
|
||||||
|
urlProxy, err := url.Parse(pURL)
|
||||||
|
if err != nil {
|
||||||
|
logger.Fatalf("cannot parse -remoteWrite.proxyURL=%q: %s", pURL, err)
|
||||||
|
}
|
||||||
|
tr.Proxy = http.ProxyURL(urlProxy)
|
||||||
|
}
|
||||||
authHeader := ""
|
authHeader := ""
|
||||||
username := basicAuthUsername.GetOptionalArg(argIdx)
|
username := basicAuthUsername.GetOptionalArg(argIdx)
|
||||||
password := basicAuthPassword.GetOptionalArg(argIdx)
|
password := basicAuthPassword.GetOptionalArg(argIdx)
|
||||||
|
@ -73,63 +98,16 @@ func newClient(argIdx int, remoteWriteURL, urlLabelValue string, fq *persistentq
|
||||||
}
|
}
|
||||||
authHeader = "Bearer " + token
|
authHeader = "Bearer " + token
|
||||||
}
|
}
|
||||||
|
|
||||||
readTimeout := *sendTimeout
|
|
||||||
if readTimeout <= 0 {
|
|
||||||
readTimeout = time.Minute
|
|
||||||
}
|
|
||||||
writeTimeout := readTimeout
|
|
||||||
var u fasthttp.URI
|
|
||||||
u.Update(remoteWriteURL)
|
|
||||||
scheme := string(u.Scheme())
|
|
||||||
switch scheme {
|
|
||||||
case "http", "https":
|
|
||||||
default:
|
|
||||||
logger.Fatalf("unsupported scheme in -remoteWrite.url=%q: %q. It must be http or https", remoteWriteURL, scheme)
|
|
||||||
}
|
|
||||||
host := string(u.Host())
|
|
||||||
if len(host) == 0 {
|
|
||||||
logger.Fatalf("invalid -remoteWrite.url=%q: host cannot be empty. Make sure the url looks like `http://host:port/path`", remoteWriteURL)
|
|
||||||
}
|
|
||||||
requestURI := string(u.RequestURI())
|
|
||||||
isTLS := scheme == "https"
|
|
||||||
var tlsCfg *tls.Config
|
|
||||||
if isTLS {
|
|
||||||
var err error
|
|
||||||
tlsCfg, err = getTLSConfig(argIdx)
|
|
||||||
if err != nil {
|
|
||||||
logger.Panicf("FATAL: cannot initialize TLS config: %s", err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if !strings.Contains(host, ":") {
|
|
||||||
if isTLS {
|
|
||||||
host += ":443"
|
|
||||||
} else {
|
|
||||||
host += ":80"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
maxConns := 2 * concurrency
|
|
||||||
hc := &fasthttp.HostClient{
|
|
||||||
Addr: host,
|
|
||||||
Name: "vmagent",
|
|
||||||
Dial: statDial,
|
|
||||||
IsTLS: isTLS,
|
|
||||||
TLSConfig: tlsCfg,
|
|
||||||
MaxConns: maxConns,
|
|
||||||
MaxIdleConnDuration: 10 * readTimeout,
|
|
||||||
ReadTimeout: readTimeout,
|
|
||||||
WriteTimeout: writeTimeout,
|
|
||||||
MaxResponseBodySize: 1024 * 1024,
|
|
||||||
}
|
|
||||||
c := &client{
|
c := &client{
|
||||||
urlLabelValue: urlLabelValue,
|
urlLabelValue: urlLabelValue,
|
||||||
remoteWriteURL: remoteWriteURL,
|
remoteWriteURL: remoteWriteURL,
|
||||||
host: host,
|
|
||||||
requestURI: requestURI,
|
|
||||||
authHeader: authHeader,
|
authHeader: authHeader,
|
||||||
fq: fq,
|
fq: fq,
|
||||||
hc: hc,
|
hc: &http.Client{
|
||||||
stopCh: make(chan struct{}),
|
Transport: tr,
|
||||||
|
Timeout: *sendTimeout,
|
||||||
|
},
|
||||||
|
stopCh: make(chan struct{}),
|
||||||
}
|
}
|
||||||
c.requestDuration = metrics.GetOrCreateHistogram(fmt.Sprintf(`vmagent_remotewrite_duration_seconds{url=%q}`, c.urlLabelValue))
|
c.requestDuration = metrics.GetOrCreateHistogram(fmt.Sprintf(`vmagent_remotewrite_duration_seconds{url=%q}`, c.urlLabelValue))
|
||||||
c.requestsOKCount = metrics.GetOrCreateCounter(fmt.Sprintf(`vmagent_remotewrite_requests_total{url=%q, status_code="2XX"}`, c.urlLabelValue))
|
c.requestsOKCount = metrics.GetOrCreateCounter(fmt.Sprintf(`vmagent_remotewrite_requests_total{url=%q, status_code="2XX"}`, c.urlLabelValue))
|
||||||
|
@ -153,14 +131,17 @@ func (c *client) MustStop() {
|
||||||
}
|
}
|
||||||
|
|
||||||
func getTLSConfig(argIdx int) (*tls.Config, error) {
|
func getTLSConfig(argIdx int) (*tls.Config, error) {
|
||||||
tlsConfig := &promauth.TLSConfig{
|
c := &promauth.TLSConfig{
|
||||||
CAFile: tlsCAFile.GetOptionalArg(argIdx),
|
CAFile: tlsCAFile.GetOptionalArg(argIdx),
|
||||||
CertFile: tlsCertFile.GetOptionalArg(argIdx),
|
CertFile: tlsCertFile.GetOptionalArg(argIdx),
|
||||||
KeyFile: tlsKeyFile.GetOptionalArg(argIdx),
|
KeyFile: tlsKeyFile.GetOptionalArg(argIdx),
|
||||||
ServerName: tlsServerName.GetOptionalArg(argIdx),
|
ServerName: tlsServerName.GetOptionalArg(argIdx),
|
||||||
InsecureSkipVerify: *tlsInsecureSkipVerify,
|
InsecureSkipVerify: *tlsInsecureSkipVerify,
|
||||||
}
|
}
|
||||||
cfg, err := promauth.NewConfig(".", nil, "", "", tlsConfig)
|
if c.CAFile == "" && c.CertFile == "" && c.KeyFile == "" && c.ServerName == "" && !c.InsecureSkipVerify {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
cfg, err := promauth.NewConfig(".", nil, "", "", c)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("cannot populate TLS config: %w", err)
|
return nil, fmt.Errorf("cannot populate TLS config: %w", err)
|
||||||
}
|
}
|
||||||
|
@ -201,32 +182,24 @@ func (c *client) runWorker() {
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *client) sendBlock(block []byte) {
|
func (c *client) sendBlock(block []byte) {
|
||||||
req := fasthttp.AcquireRequest()
|
req, err := http.NewRequest("POST", c.remoteWriteURL, bytes.NewBuffer(block))
|
||||||
req.SetRequestURI(c.requestURI)
|
if err != nil {
|
||||||
req.SetHost(c.host)
|
logger.Panicf("BUG: unexected error from http.NewRequest(%q): %s", c.remoteWriteURL, err)
|
||||||
req.Header.SetMethod("POST")
|
}
|
||||||
req.Header.Add("Content-Type", "application/x-protobuf")
|
h := req.Header
|
||||||
req.Header.Add("Content-Encoding", "snappy")
|
h.Set("User-Agent", "vmagent")
|
||||||
req.Header.Add("X-Prometheus-Remote-Write-Version", "0.1.0")
|
h.Set("Content-Type", "application/x-protobuf")
|
||||||
|
h.Set("Content-Encoding", "snappy")
|
||||||
|
h.Set("X-Prometheus-Remote-Write-Version", "0.1.0")
|
||||||
if c.authHeader != "" {
|
if c.authHeader != "" {
|
||||||
req.Header.Set("Authorization", c.authHeader)
|
req.Header.Set("Authorization", c.authHeader)
|
||||||
}
|
}
|
||||||
req.SetBody(block)
|
|
||||||
|
|
||||||
retryDuration := time.Second
|
retryDuration := time.Second
|
||||||
resp := fasthttp.AcquireResponse()
|
|
||||||
|
|
||||||
again:
|
again:
|
||||||
select {
|
|
||||||
case <-c.stopCh:
|
|
||||||
fasthttp.ReleaseRequest(req)
|
|
||||||
fasthttp.ReleaseResponse(resp)
|
|
||||||
return
|
|
||||||
default:
|
|
||||||
}
|
|
||||||
|
|
||||||
startTime := time.Now()
|
startTime := time.Now()
|
||||||
err := doRequestWithPossibleRetry(c.hc, req, resp)
|
resp, err := c.hc.Do(req)
|
||||||
c.requestDuration.UpdateDuration(startTime)
|
c.requestDuration.UpdateDuration(startTime)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
c.errorsCount.Inc()
|
c.errorsCount.Inc()
|
||||||
|
@ -236,39 +209,39 @@ again:
|
||||||
}
|
}
|
||||||
logger.Errorf("couldn't send a block with size %d bytes to %q: %s; re-sending the block in %.3f seconds",
|
logger.Errorf("couldn't send a block with size %d bytes to %q: %s; re-sending the block in %.3f seconds",
|
||||||
len(block), c.remoteWriteURL, err, retryDuration.Seconds())
|
len(block), c.remoteWriteURL, err, retryDuration.Seconds())
|
||||||
time.Sleep(retryDuration)
|
t := time.NewTimer(retryDuration)
|
||||||
|
select {
|
||||||
|
case <-c.stopCh:
|
||||||
|
t.Stop()
|
||||||
|
return
|
||||||
|
case <-t.C:
|
||||||
|
}
|
||||||
c.retriesCount.Inc()
|
c.retriesCount.Inc()
|
||||||
goto again
|
goto again
|
||||||
}
|
}
|
||||||
statusCode := resp.StatusCode()
|
statusCode := resp.StatusCode
|
||||||
if statusCode/100 != 2 {
|
if statusCode/100 != 2 {
|
||||||
metrics.GetOrCreateCounter(fmt.Sprintf(`vmagent_remotewrite_requests_total{url=%q, status_code="%d"}`, c.urlLabelValue, statusCode)).Inc()
|
metrics.GetOrCreateCounter(fmt.Sprintf(`vmagent_remotewrite_requests_total{url=%q, status_code="%d"}`, c.urlLabelValue, statusCode)).Inc()
|
||||||
retryDuration *= 2
|
retryDuration *= 2
|
||||||
if retryDuration > time.Minute {
|
if retryDuration > time.Minute {
|
||||||
retryDuration = time.Minute
|
retryDuration = time.Minute
|
||||||
}
|
}
|
||||||
logger.Errorf("unexpected status code received after sending a block with size %d bytes to %q: %d; response body=%q; re-sending the block in %.3f seconds",
|
body, err := ioutil.ReadAll(resp.Body)
|
||||||
len(block), c.remoteWriteURL, statusCode, resp.Body(), retryDuration.Seconds())
|
if err != nil {
|
||||||
time.Sleep(retryDuration)
|
logger.Errorf("cannot read response body from %q: %s", c.remoteWriteURL, err)
|
||||||
|
} else {
|
||||||
|
logger.Errorf("unexpected status code received after sending a block with size %d bytes to %q: %d; response body=%q; re-sending the block in %.3f seconds",
|
||||||
|
len(block), c.remoteWriteURL, statusCode, body, retryDuration.Seconds())
|
||||||
|
}
|
||||||
|
t := time.NewTimer(retryDuration)
|
||||||
|
select {
|
||||||
|
case <-c.stopCh:
|
||||||
|
t.Stop()
|
||||||
|
return
|
||||||
|
case <-t.C:
|
||||||
|
}
|
||||||
c.retriesCount.Inc()
|
c.retriesCount.Inc()
|
||||||
goto again
|
goto again
|
||||||
}
|
}
|
||||||
c.requestsOKCount.Inc()
|
c.requestsOKCount.Inc()
|
||||||
|
|
||||||
// The block has been successfully sent to the remote storage.
|
|
||||||
fasthttp.ReleaseResponse(resp)
|
|
||||||
fasthttp.ReleaseRequest(req)
|
|
||||||
}
|
|
||||||
|
|
||||||
func doRequestWithPossibleRetry(hc *fasthttp.HostClient, req *fasthttp.Request, resp *fasthttp.Response) error {
|
|
||||||
// There is no need in calling DoTimeout, since the timeout must be already set in hc.ReadTimeout.
|
|
||||||
err := hc.Do(req, resp)
|
|
||||||
if err == nil {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
if err != fasthttp.ErrConnectionClosed {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
// Retry request if the server closed the keep-alive connection during the first attempt.
|
|
||||||
return hc.Do(req, resp)
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,7 +1,9 @@
|
||||||
package remotewrite
|
package remotewrite
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"fmt"
|
||||||
"net"
|
"net"
|
||||||
|
"strings"
|
||||||
"sync/atomic"
|
"sync/atomic"
|
||||||
|
|
||||||
"github.com/VictoriaMetrics/VictoriaMetrics/lib/netutil"
|
"github.com/VictoriaMetrics/VictoriaMetrics/lib/netutil"
|
||||||
|
@ -9,7 +11,10 @@ import (
|
||||||
"github.com/VictoriaMetrics/metrics"
|
"github.com/VictoriaMetrics/metrics"
|
||||||
)
|
)
|
||||||
|
|
||||||
func statDial(addr string) (conn net.Conn, err error) {
|
func statDial(network, addr string) (conn net.Conn, err error) {
|
||||||
|
if !strings.HasPrefix(network, "tcp") {
|
||||||
|
return nil, fmt.Errorf("unexpected network passed to statDial: %q; it must start from `tcp`", network)
|
||||||
|
}
|
||||||
if netutil.TCP6Enabled() {
|
if netutil.TCP6Enabled() {
|
||||||
conn, err = fasthttp.DialDualStack(addr)
|
conn, err = fasthttp.DialDualStack(addr)
|
||||||
} else {
|
} else {
|
||||||
|
|
Loading…
Reference in a new issue