Add metrics for iptables operations (#323)
* Add metrics for iptables operations * Update pkg/iptables/metrics.go Co-authored-by: leonnicolas <60091705+leonnicolas@users.noreply.github.com> * Reorg imports * pass registerer via controller option * Update pkg/iptables/metrics.go Co-authored-by: leonnicolas <60091705+leonnicolas@users.noreply.github.com> * move registerer check into metrics wrapper method * Register all metrics in Co-authored-by: leonnicolas <60091705+leonnicolas@users.noreply.github.com> Co-authored-by: Clive Jevons <clive@jevons-it.net>
This commit is contained in:
parent
cb238c85a1
commit
1921c6a212
@ -245,13 +245,11 @@ func runRoot(_ *cobra.Command, _ []string) error {
|
|||||||
if port < 1 || port > 1<<16-1 {
|
if port < 1 || port > 1<<16-1 {
|
||||||
return fmt.Errorf("invalid port: port mus be in range [%d:%d], but got %d", 1, 1<<16-1, port)
|
return fmt.Errorf("invalid port: port mus be in range [%d:%d], but got %d", 1, 1<<16-1, port)
|
||||||
}
|
}
|
||||||
m, err := mesh.New(b, enc, gr, hostname, port, s, local, cni, cniPath, iface, cleanUpIface, createIface, mtu, resyncPeriod, prioritisePrivateAddr, iptablesForwardRule, log.With(logger, "component", "kilo"))
|
m, err := mesh.New(b, enc, gr, hostname, port, s, local, cni, cniPath, iface, cleanUpIface, createIface, mtu, resyncPeriod, prioritisePrivateAddr, iptablesForwardRule, log.With(logger, "component", "kilo"), registry)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("failed to create Kilo mesh: %v", err)
|
return fmt.Errorf("failed to create Kilo mesh: %v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
m.RegisterMetrics(registry)
|
|
||||||
|
|
||||||
var g run.Group
|
var g run.Group
|
||||||
{
|
{
|
||||||
h := internalserver.NewHandler(
|
h := internalserver.NewHandler(
|
||||||
|
@ -25,6 +25,7 @@ import (
|
|||||||
"github.com/coreos/go-iptables/iptables"
|
"github.com/coreos/go-iptables/iptables"
|
||||||
"github.com/go-kit/kit/log"
|
"github.com/go-kit/kit/log"
|
||||||
"github.com/go-kit/kit/log/level"
|
"github.com/go-kit/kit/log/level"
|
||||||
|
"github.com/prometheus/client_golang/prometheus"
|
||||||
)
|
)
|
||||||
|
|
||||||
const ipv6ModuleDisabledPath = "/sys/module/ipv6/parameters/disable"
|
const ipv6ModuleDisabledPath = "/sys/module/ipv6/parameters/disable"
|
||||||
@ -220,6 +221,7 @@ type Controller struct {
|
|||||||
errors chan error
|
errors chan error
|
||||||
logger log.Logger
|
logger log.Logger
|
||||||
resyncPeriod time.Duration
|
resyncPeriod time.Duration
|
||||||
|
registerer prometheus.Registerer
|
||||||
|
|
||||||
sync.Mutex
|
sync.Mutex
|
||||||
rules []Rule
|
rules []Rule
|
||||||
@ -251,6 +253,12 @@ func WithClients(v4, v6 Client) ControllerOption {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func WithRegisterer(registerer prometheus.Registerer) ControllerOption {
|
||||||
|
return func(c *Controller) {
|
||||||
|
c.registerer = registerer
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// New generates a new iptables rules controller.
|
// New generates a new iptables rules controller.
|
||||||
// If no options are given, IPv4 and IPv6 clients
|
// If no options are given, IPv4 and IPv6 clients
|
||||||
// will be instantiated using the regular iptables backend.
|
// will be instantiated using the regular iptables backend.
|
||||||
@ -267,7 +275,7 @@ func New(opts ...ControllerOption) (*Controller, error) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("failed to create iptables IPv4 client: %v", err)
|
return nil, fmt.Errorf("failed to create iptables IPv4 client: %v", err)
|
||||||
}
|
}
|
||||||
c.v4 = v4
|
c.v4 = wrapWithMetrics(v4, "IPv4", c.registerer)
|
||||||
}
|
}
|
||||||
if c.v6 == nil {
|
if c.v6 == nil {
|
||||||
disabled, err := ipv6Disabled()
|
disabled, err := ipv6Disabled()
|
||||||
@ -282,7 +290,7 @@ func New(opts ...ControllerOption) (*Controller, error) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("failed to create iptables IPv6 client: %v", err)
|
return nil, fmt.Errorf("failed to create iptables IPv6 client: %v", err)
|
||||||
}
|
}
|
||||||
c.v6 = v6
|
c.v6 = wrapWithMetrics(v6, "IPv6", c.registerer)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
return c, nil
|
return c, nil
|
||||||
|
115
pkg/iptables/metrics.go
Normal file
115
pkg/iptables/metrics.go
Normal file
@ -0,0 +1,115 @@
|
|||||||
|
// Copyright 2022 the Kilo authors
|
||||||
|
//
|
||||||
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
// you may not use this file except in compliance with the License.
|
||||||
|
// You may obtain a copy of the License at
|
||||||
|
//
|
||||||
|
// http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
//
|
||||||
|
// Unless required by applicable law or agreed to in writing, software
|
||||||
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
// See the License for the specific language governing permissions and
|
||||||
|
// limitations under the License.
|
||||||
|
|
||||||
|
package iptables
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/prometheus/client_golang/prometheus"
|
||||||
|
)
|
||||||
|
|
||||||
|
type metricsClientWrapper struct {
|
||||||
|
client Client
|
||||||
|
operationCounter *prometheus.CounterVec
|
||||||
|
}
|
||||||
|
|
||||||
|
func wrapWithMetrics(client Client, protocol string, registerer prometheus.Registerer) Client {
|
||||||
|
if registerer == nil {
|
||||||
|
return client
|
||||||
|
}
|
||||||
|
|
||||||
|
labelNames := []string{
|
||||||
|
"operation",
|
||||||
|
"table",
|
||||||
|
"chain",
|
||||||
|
}
|
||||||
|
counter := prometheus.NewCounterVec(prometheus.CounterOpts{
|
||||||
|
Name: "kilo_iptables_operations_total",
|
||||||
|
Help: "Number of iptables operations.",
|
||||||
|
ConstLabels: prometheus.Labels{"protocol": protocol},
|
||||||
|
}, labelNames)
|
||||||
|
registerer.MustRegister(counter)
|
||||||
|
return &metricsClientWrapper{client, counter}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *metricsClientWrapper) AppendUnique(table string, chain string, rule ...string) error {
|
||||||
|
m.operationCounter.With(prometheus.Labels{
|
||||||
|
"operation": "AppendUnique",
|
||||||
|
"table": table,
|
||||||
|
"chain": chain,
|
||||||
|
}).Inc()
|
||||||
|
return m.client.AppendUnique(table, chain, rule...)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *metricsClientWrapper) Delete(table string, chain string, rule ...string) error {
|
||||||
|
m.operationCounter.With(prometheus.Labels{
|
||||||
|
"operation": "Delete",
|
||||||
|
"table": table,
|
||||||
|
"chain": chain,
|
||||||
|
}).Inc()
|
||||||
|
return m.client.Delete(table, chain, rule...)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *metricsClientWrapper) Exists(table string, chain string, rule ...string) (bool, error) {
|
||||||
|
m.operationCounter.With(prometheus.Labels{
|
||||||
|
"operation": "Exists",
|
||||||
|
"table": table,
|
||||||
|
"chain": chain,
|
||||||
|
}).Inc()
|
||||||
|
return m.client.Exists(table, chain, rule...)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *metricsClientWrapper) List(table string, chain string) ([]string, error) {
|
||||||
|
m.operationCounter.With(prometheus.Labels{
|
||||||
|
"operation": "List",
|
||||||
|
"table": table,
|
||||||
|
"chain": chain,
|
||||||
|
}).Inc()
|
||||||
|
return m.client.List(table, chain)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *metricsClientWrapper) ClearChain(table string, chain string) error {
|
||||||
|
m.operationCounter.With(prometheus.Labels{
|
||||||
|
"operation": "ClearChain",
|
||||||
|
"table": table,
|
||||||
|
"chain": chain,
|
||||||
|
}).Inc()
|
||||||
|
return m.client.ClearChain(table, chain)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *metricsClientWrapper) DeleteChain(table string, chain string) error {
|
||||||
|
m.operationCounter.With(prometheus.Labels{
|
||||||
|
"operation": "DeleteChain",
|
||||||
|
"table": table,
|
||||||
|
"chain": chain,
|
||||||
|
}).Inc()
|
||||||
|
return m.client.DeleteChain(table, chain)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *metricsClientWrapper) NewChain(table string, chain string) error {
|
||||||
|
m.operationCounter.With(prometheus.Labels{
|
||||||
|
"operation": "NewChain",
|
||||||
|
"table": table,
|
||||||
|
"chain": chain,
|
||||||
|
}).Inc()
|
||||||
|
return m.client.NewChain(table, chain)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *metricsClientWrapper) ListChains(table string) ([]string, error) {
|
||||||
|
m.operationCounter.With(prometheus.Labels{
|
||||||
|
"operation": "ListChains",
|
||||||
|
"table": table,
|
||||||
|
"chain": "*",
|
||||||
|
}).Inc()
|
||||||
|
return m.client.ListChains(table)
|
||||||
|
}
|
@ -88,7 +88,7 @@ type Mesh struct {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// New returns a new Mesh instance.
|
// New returns a new Mesh instance.
|
||||||
func New(backend Backend, enc encapsulation.Encapsulator, granularity Granularity, hostname string, port int, subnet *net.IPNet, local, cni bool, cniPath, iface string, cleanUpIface bool, createIface bool, mtu uint, resyncPeriod time.Duration, prioritisePrivateAddr, iptablesForwardRule bool, logger log.Logger) (*Mesh, error) {
|
func New(backend Backend, enc encapsulation.Encapsulator, granularity Granularity, hostname string, port int, subnet *net.IPNet, local, cni bool, cniPath, iface string, cleanUpIface bool, createIface bool, mtu uint, resyncPeriod time.Duration, prioritisePrivateAddr, iptablesForwardRule bool, logger log.Logger, registerer prometheus.Registerer) (*Mesh, error) {
|
||||||
if err := os.MkdirAll(kiloPath, 0700); err != nil {
|
if err := os.MkdirAll(kiloPath, 0700); err != nil {
|
||||||
return nil, fmt.Errorf("failed to create directory to store configuration: %v", err)
|
return nil, fmt.Errorf("failed to create directory to store configuration: %v", err)
|
||||||
}
|
}
|
||||||
@ -156,11 +156,11 @@ func New(backend Backend, enc encapsulation.Encapsulator, granularity Granularit
|
|||||||
externalIP = publicIP
|
externalIP = publicIP
|
||||||
}
|
}
|
||||||
level.Debug(logger).Log("msg", fmt.Sprintf("using %s as the public IP address", publicIP.String()))
|
level.Debug(logger).Log("msg", fmt.Sprintf("using %s as the public IP address", publicIP.String()))
|
||||||
ipTables, err := iptables.New(iptables.WithLogger(log.With(logger, "component", "iptables")), iptables.WithResyncPeriod(resyncPeriod))
|
ipTables, err := iptables.New(iptables.WithRegisterer(registerer), iptables.WithLogger(log.With(logger, "component", "iptables")), iptables.WithResyncPeriod(resyncPeriod))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("failed to IP tables controller: %v", err)
|
return nil, fmt.Errorf("failed to IP tables controller: %v", err)
|
||||||
}
|
}
|
||||||
return &Mesh{
|
mesh := Mesh{
|
||||||
Backend: backend,
|
Backend: backend,
|
||||||
cleanUpIface: cleanUpIface,
|
cleanUpIface: cleanUpIface,
|
||||||
cni: cni,
|
cni: cni,
|
||||||
@ -205,7 +205,15 @@ func New(backend Backend, enc encapsulation.Encapsulator, granularity Granularit
|
|||||||
Help: "Number of reconciliation attempts.",
|
Help: "Number of reconciliation attempts.",
|
||||||
}),
|
}),
|
||||||
logger: logger,
|
logger: logger,
|
||||||
}, nil
|
}
|
||||||
|
registerer.MustRegister(
|
||||||
|
mesh.errorCounter,
|
||||||
|
mesh.leaderGuage,
|
||||||
|
mesh.nodesGuage,
|
||||||
|
mesh.peersGuage,
|
||||||
|
mesh.reconcileCounter,
|
||||||
|
)
|
||||||
|
return &mesh, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Run starts the mesh.
|
// Run starts the mesh.
|
||||||
@ -575,18 +583,6 @@ func (m *Mesh) applyTopology() {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// RegisterMetrics registers Prometheus metrics on the given Prometheus
|
|
||||||
// registerer.
|
|
||||||
func (m *Mesh) RegisterMetrics(r prometheus.Registerer) {
|
|
||||||
r.MustRegister(
|
|
||||||
m.errorCounter,
|
|
||||||
m.leaderGuage,
|
|
||||||
m.nodesGuage,
|
|
||||||
m.peersGuage,
|
|
||||||
m.reconcileCounter,
|
|
||||||
)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (m *Mesh) cleanUp() {
|
func (m *Mesh) cleanUp() {
|
||||||
if err := m.ipTables.CleanUp(); err != nil {
|
if err := m.ipTables.CleanUp(); err != nil {
|
||||||
level.Error(m.logger).Log("error", fmt.Sprintf("failed to clean up IP tables: %v", err))
|
level.Error(m.logger).Log("error", fmt.Sprintf("failed to clean up IP tables: %v", err))
|
||||||
|
Loading…
Reference in New Issue
Block a user