2016-07-01 03:17:17 -07:00
|
|
|
// Copyright 2016 The Prometheus Authors
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package kubernetes
|
|
|
|
|
|
|
|
import (
|
2017-10-24 21:21:42 -07:00
|
|
|
"context"
|
2022-06-03 04:47:14 -07:00
|
|
|
"errors"
|
|
|
|
"fmt"
|
2016-07-01 03:17:17 -07:00
|
|
|
"net"
|
|
|
|
"strconv"
|
|
|
|
"strings"
|
|
|
|
|
2021-06-11 09:17:59 -07:00
|
|
|
"github.com/go-kit/log"
|
|
|
|
"github.com/go-kit/log/level"
|
2016-07-01 03:17:17 -07:00
|
|
|
"github.com/prometheus/common/model"
|
2018-07-03 00:37:22 -07:00
|
|
|
apiv1 "k8s.io/api/core/v1"
|
2018-04-06 15:27:39 -07:00
|
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
2017-05-11 01:29:10 -07:00
|
|
|
"k8s.io/client-go/tools/cache"
|
2018-04-09 09:35:14 -07:00
|
|
|
"k8s.io/client-go/util/workqueue"
|
2017-10-24 21:21:42 -07:00
|
|
|
|
Refactor SD configuration to remove `config` dependency (#3629)
* refactor: move targetGroup struct and CheckOverflow() to their own package
* refactor: move auth and security related structs to a utility package, fix import error in utility package
* refactor: Azure SD, remove SD struct from config
* refactor: DNS SD, remove SD struct from config into dns package
* refactor: ec2 SD, move SD struct from config into the ec2 package
* refactor: file SD, move SD struct from config to file discovery package
* refactor: gce, move SD struct from config to gce discovery package
* refactor: move HTTPClientConfig and URL into util/config, fix import error in httputil
* refactor: consul, move SD struct from config into consul discovery package
* refactor: marathon, move SD struct from config into marathon discovery package
* refactor: triton, move SD struct from config to triton discovery package, fix test
* refactor: zookeeper, move SD structs from config to zookeeper discovery package
* refactor: openstack, remove SD struct from config, move into openstack discovery package
* refactor: kubernetes, move SD struct from config into kubernetes discovery package
* refactor: notifier, use targetgroup package instead of config
* refactor: tests for file, marathon, triton SD - use targetgroup package instead of config.TargetGroup
* refactor: retrieval, use targetgroup package instead of config.TargetGroup
* refactor: storage, use config util package
* refactor: discovery manager, use targetgroup package instead of config.TargetGroup
* refactor: use HTTPClient and TLS config from configUtil instead of config
* refactor: tests, use targetgroup package instead of config.TargetGroup
* refactor: fix tagetgroup.Group pointers that were removed by mistake
* refactor: openstack, kubernetes: drop prefixes
* refactor: remove import aliases forced due to vscode bug
* refactor: move main SD struct out of config into discovery/config
* refactor: rename configUtil to config_util
* refactor: rename yamlUtil to yaml_config
* refactor: kubernetes, remove prefixes
* refactor: move the TargetGroup package to discovery/
* refactor: fix order of imports
2017-12-29 12:01:34 -08:00
|
|
|
"github.com/prometheus/prometheus/discovery/targetgroup"
|
2017-10-24 21:21:42 -07:00
|
|
|
"github.com/prometheus/prometheus/util/strutil"
|
2016-07-01 03:17:17 -07:00
|
|
|
)
|
|
|
|
|
2022-03-10 06:33:34 -08:00
|
|
|
const nodeIndex = "node"
|
|
|
|
|
2020-02-06 07:52:58 -08:00
|
|
|
var (
|
|
|
|
podAddCount = eventCount.WithLabelValues("pod", "add")
|
|
|
|
podUpdateCount = eventCount.WithLabelValues("pod", "update")
|
|
|
|
podDeleteCount = eventCount.WithLabelValues("pod", "delete")
|
|
|
|
)
|
|
|
|
|
2016-10-07 05:53:11 -07:00
|
|
|
// Pod discovers new pod targets.
|
|
|
|
type Pod struct {
|
2022-03-10 06:33:34 -08:00
|
|
|
podInf cache.SharedIndexInformer
|
2021-12-23 01:50:00 -08:00
|
|
|
nodeInf cache.SharedInformer
|
|
|
|
withNodeMetadata bool
|
|
|
|
store cache.Store
|
|
|
|
logger log.Logger
|
|
|
|
queue *workqueue.Type
|
2016-07-01 03:17:17 -07:00
|
|
|
}
|
|
|
|
|
2016-10-17 02:05:13 -07:00
|
|
|
// NewPod creates a new pod discovery.
|
2022-03-10 06:33:34 -08:00
|
|
|
func NewPod(l log.Logger, pods cache.SharedIndexInformer, nodes cache.SharedInformer) *Pod {
|
2017-08-11 11:45:52 -07:00
|
|
|
if l == nil {
|
|
|
|
l = log.NewNopLogger()
|
|
|
|
}
|
2022-03-10 06:33:34 -08:00
|
|
|
|
2018-04-09 09:35:14 -07:00
|
|
|
p := &Pod{
|
2021-12-23 01:50:00 -08:00
|
|
|
podInf: pods,
|
|
|
|
nodeInf: nodes,
|
|
|
|
withNodeMetadata: nodes != nil,
|
|
|
|
store: pods.GetStore(),
|
|
|
|
logger: l,
|
|
|
|
queue: workqueue.NewNamed("pod"),
|
2016-07-01 03:17:17 -07:00
|
|
|
}
|
2022-12-14 01:43:53 -08:00
|
|
|
_, err := p.podInf.AddEventHandler(cache.ResourceEventHandlerFuncs{
|
2018-04-09 09:35:14 -07:00
|
|
|
AddFunc: func(o interface{}) {
|
2020-02-06 07:52:58 -08:00
|
|
|
podAddCount.Inc()
|
2018-04-09 09:35:14 -07:00
|
|
|
p.enqueue(o)
|
|
|
|
},
|
|
|
|
DeleteFunc: func(o interface{}) {
|
2020-02-06 07:52:58 -08:00
|
|
|
podDeleteCount.Inc()
|
2018-04-09 09:35:14 -07:00
|
|
|
p.enqueue(o)
|
|
|
|
},
|
|
|
|
UpdateFunc: func(_, o interface{}) {
|
2020-02-06 07:52:58 -08:00
|
|
|
podUpdateCount.Inc()
|
2018-04-09 09:35:14 -07:00
|
|
|
p.enqueue(o)
|
|
|
|
},
|
|
|
|
})
|
2022-12-14 01:43:53 -08:00
|
|
|
if err != nil {
|
|
|
|
level.Error(l).Log("msg", "Error adding pods event handler.", "err", err)
|
|
|
|
}
|
2021-12-23 01:50:00 -08:00
|
|
|
|
|
|
|
if p.withNodeMetadata {
|
2022-12-14 01:43:53 -08:00
|
|
|
_, err = p.nodeInf.AddEventHandler(cache.ResourceEventHandlerFuncs{
|
2021-12-23 01:50:00 -08:00
|
|
|
AddFunc: func(o interface{}) {
|
|
|
|
node := o.(*apiv1.Node)
|
|
|
|
p.enqueuePodsForNode(node.Name)
|
|
|
|
},
|
|
|
|
UpdateFunc: func(_, o interface{}) {
|
|
|
|
node := o.(*apiv1.Node)
|
|
|
|
p.enqueuePodsForNode(node.Name)
|
|
|
|
},
|
|
|
|
DeleteFunc: func(o interface{}) {
|
|
|
|
node := o.(*apiv1.Node)
|
|
|
|
p.enqueuePodsForNode(node.Name)
|
|
|
|
},
|
|
|
|
})
|
2022-12-14 01:43:53 -08:00
|
|
|
if err != nil {
|
|
|
|
level.Error(l).Log("msg", "Error adding pods event handler.", "err", err)
|
|
|
|
}
|
2021-12-23 01:50:00 -08:00
|
|
|
}
|
|
|
|
|
2018-04-09 09:35:14 -07:00
|
|
|
return p
|
|
|
|
}
|
|
|
|
|
2018-07-17 21:07:33 -07:00
|
|
|
func (p *Pod) enqueue(obj interface{}) {
|
2018-04-09 09:35:14 -07:00
|
|
|
key, err := cache.DeletionHandlingMetaNamespaceKeyFunc(obj)
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-07-17 21:07:33 -07:00
|
|
|
p.queue.Add(key)
|
2016-10-07 05:53:11 -07:00
|
|
|
}
|
2016-07-01 03:17:17 -07:00
|
|
|
|
2018-01-08 15:59:18 -08:00
|
|
|
// Run implements the Discoverer interface.
|
Refactor SD configuration to remove `config` dependency (#3629)
* refactor: move targetGroup struct and CheckOverflow() to their own package
* refactor: move auth and security related structs to a utility package, fix import error in utility package
* refactor: Azure SD, remove SD struct from config
* refactor: DNS SD, remove SD struct from config into dns package
* refactor: ec2 SD, move SD struct from config into the ec2 package
* refactor: file SD, move SD struct from config to file discovery package
* refactor: gce, move SD struct from config to gce discovery package
* refactor: move HTTPClientConfig and URL into util/config, fix import error in httputil
* refactor: consul, move SD struct from config into consul discovery package
* refactor: marathon, move SD struct from config into marathon discovery package
* refactor: triton, move SD struct from config to triton discovery package, fix test
* refactor: zookeeper, move SD structs from config to zookeeper discovery package
* refactor: openstack, remove SD struct from config, move into openstack discovery package
* refactor: kubernetes, move SD struct from config into kubernetes discovery package
* refactor: notifier, use targetgroup package instead of config
* refactor: tests for file, marathon, triton SD - use targetgroup package instead of config.TargetGroup
* refactor: retrieval, use targetgroup package instead of config.TargetGroup
* refactor: storage, use config util package
* refactor: discovery manager, use targetgroup package instead of config.TargetGroup
* refactor: use HTTPClient and TLS config from configUtil instead of config
* refactor: tests, use targetgroup package instead of config.TargetGroup
* refactor: fix tagetgroup.Group pointers that were removed by mistake
* refactor: openstack, kubernetes: drop prefixes
* refactor: remove import aliases forced due to vscode bug
* refactor: move main SD struct out of config into discovery/config
* refactor: rename configUtil to config_util
* refactor: rename yamlUtil to yaml_config
* refactor: kubernetes, remove prefixes
* refactor: move the TargetGroup package to discovery/
* refactor: fix order of imports
2017-12-29 12:01:34 -08:00
|
|
|
func (p *Pod) Run(ctx context.Context, ch chan<- []*targetgroup.Group) {
|
2018-04-09 09:35:14 -07:00
|
|
|
defer p.queue.ShutDown()
|
2016-07-01 03:17:17 -07:00
|
|
|
|
2021-12-23 01:50:00 -08:00
|
|
|
cacheSyncs := []cache.InformerSynced{p.podInf.HasSynced}
|
|
|
|
if p.withNodeMetadata {
|
|
|
|
cacheSyncs = append(cacheSyncs, p.nodeInf.HasSynced)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !cache.WaitForCacheSync(ctx.Done(), cacheSyncs...) {
|
2022-06-03 04:47:14 -07:00
|
|
|
if !errors.Is(ctx.Err(), context.Canceled) {
|
2019-10-09 02:51:38 -07:00
|
|
|
level.Error(p.logger).Log("msg", "pod informer unable to sync cache")
|
|
|
|
}
|
2016-07-01 03:17:17 -07:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-04-09 09:35:14 -07:00
|
|
|
go func() {
|
2018-04-10 01:53:00 -07:00
|
|
|
for p.process(ctx, ch) {
|
2018-04-09 09:35:14 -07:00
|
|
|
}
|
|
|
|
}()
|
2016-07-01 03:17:17 -07:00
|
|
|
|
2016-10-07 05:53:11 -07:00
|
|
|
// Block until the target provider is explicitly canceled.
|
|
|
|
<-ctx.Done()
|
2016-07-01 03:17:17 -07:00
|
|
|
}
|
|
|
|
|
2018-04-10 01:53:00 -07:00
|
|
|
func (p *Pod) process(ctx context.Context, ch chan<- []*targetgroup.Group) bool {
|
2018-04-09 09:35:14 -07:00
|
|
|
keyObj, quit := p.queue.Get()
|
|
|
|
if quit {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
defer p.queue.Done(keyObj)
|
|
|
|
key := keyObj.(string)
|
|
|
|
|
|
|
|
namespace, name, err := cache.SplitMetaNamespaceKey(key)
|
|
|
|
if err != nil {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
o, exists, err := p.store.GetByKey(key)
|
|
|
|
if err != nil {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
if !exists {
|
2020-02-18 08:36:57 -08:00
|
|
|
send(ctx, ch, &targetgroup.Group{Source: podSourceFromNamespaceAndName(namespace, name)})
|
2018-04-09 09:35:14 -07:00
|
|
|
return true
|
|
|
|
}
|
2021-02-10 04:17:04 -08:00
|
|
|
pod, err := convertToPod(o)
|
2018-04-09 09:35:14 -07:00
|
|
|
if err != nil {
|
|
|
|
level.Error(p.logger).Log("msg", "converting to Pod object failed", "err", err)
|
|
|
|
return true
|
|
|
|
}
|
2021-02-10 04:17:04 -08:00
|
|
|
send(ctx, ch, p.buildPod(pod))
|
2018-04-09 09:35:14 -07:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2016-11-14 07:21:38 -08:00
|
|
|
func convertToPod(o interface{}) (*apiv1.Pod, error) {
|
2017-09-04 04:10:44 -07:00
|
|
|
pod, ok := o.(*apiv1.Pod)
|
|
|
|
if ok {
|
|
|
|
return pod, nil
|
2016-11-14 07:21:38 -08:00
|
|
|
}
|
|
|
|
|
2022-06-03 04:47:14 -07:00
|
|
|
return nil, fmt.Errorf("received unexpected object: %v", o)
|
2016-11-14 07:21:38 -08:00
|
|
|
}
|
|
|
|
|
2016-10-07 05:53:11 -07:00
|
|
|
const (
|
|
|
|
podNameLabel = metaLabelPrefix + "pod_name"
|
|
|
|
podIPLabel = metaLabelPrefix + "pod_ip"
|
|
|
|
podContainerNameLabel = metaLabelPrefix + "pod_container_name"
|
2022-07-18 05:31:45 -07:00
|
|
|
podContainerImageLabel = metaLabelPrefix + "pod_container_image"
|
2016-10-07 05:53:11 -07:00
|
|
|
podContainerPortNameLabel = metaLabelPrefix + "pod_container_port_name"
|
|
|
|
podContainerPortNumberLabel = metaLabelPrefix + "pod_container_port_number"
|
|
|
|
podContainerPortProtocolLabel = metaLabelPrefix + "pod_container_port_protocol"
|
2019-05-29 06:20:29 -07:00
|
|
|
podContainerIsInit = metaLabelPrefix + "pod_container_init"
|
2016-10-07 05:53:11 -07:00
|
|
|
podReadyLabel = metaLabelPrefix + "pod_ready"
|
2018-11-06 06:40:24 -08:00
|
|
|
podPhaseLabel = metaLabelPrefix + "pod_phase"
|
2016-10-07 05:53:11 -07:00
|
|
|
podLabelPrefix = metaLabelPrefix + "pod_label_"
|
2019-04-10 05:21:42 -07:00
|
|
|
podLabelPresentPrefix = metaLabelPrefix + "pod_labelpresent_"
|
2016-10-07 05:53:11 -07:00
|
|
|
podAnnotationPrefix = metaLabelPrefix + "pod_annotation_"
|
2019-04-10 05:21:42 -07:00
|
|
|
podAnnotationPresentPrefix = metaLabelPrefix + "pod_annotationpresent_"
|
2016-10-07 05:53:11 -07:00
|
|
|
podNodeNameLabel = metaLabelPrefix + "pod_node_name"
|
|
|
|
podHostIPLabel = metaLabelPrefix + "pod_host_ip"
|
2017-11-07 08:24:23 -08:00
|
|
|
podUID = metaLabelPrefix + "pod_uid"
|
2018-04-06 15:27:39 -07:00
|
|
|
podControllerKind = metaLabelPrefix + "pod_controller_kind"
|
|
|
|
podControllerName = metaLabelPrefix + "pod_controller_name"
|
2016-10-07 05:53:11 -07:00
|
|
|
)
|
2016-07-01 03:17:17 -07:00
|
|
|
|
2018-04-06 15:27:39 -07:00
|
|
|
// GetControllerOf returns a pointer to a copy of the controllerRef if controllee has a controller
|
|
|
|
// https://github.com/kubernetes/apimachinery/blob/cd2cae2b39fa57e8063fa1f5f13cfe9862db3d41/pkg/apis/meta/v1/controller_ref.go
|
|
|
|
func GetControllerOf(controllee metav1.Object) *metav1.OwnerReference {
|
|
|
|
for _, ref := range controllee.GetOwnerReferences() {
|
|
|
|
if ref.Controller != nil && *ref.Controller {
|
|
|
|
return &ref
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-10-07 05:53:11 -07:00
|
|
|
func podLabels(pod *apiv1.Pod) model.LabelSet {
|
|
|
|
ls := model.LabelSet{
|
|
|
|
podNameLabel: lv(pod.ObjectMeta.Name),
|
|
|
|
podIPLabel: lv(pod.Status.PodIP),
|
|
|
|
podReadyLabel: podReady(pod),
|
2018-11-06 06:40:24 -08:00
|
|
|
podPhaseLabel: lv(string(pod.Status.Phase)),
|
2016-10-07 05:53:11 -07:00
|
|
|
podNodeNameLabel: lv(pod.Spec.NodeName),
|
|
|
|
podHostIPLabel: lv(pod.Status.HostIP),
|
2017-11-07 08:24:23 -08:00
|
|
|
podUID: lv(string(pod.ObjectMeta.UID)),
|
2016-07-01 03:17:17 -07:00
|
|
|
}
|
|
|
|
|
2018-04-06 15:27:39 -07:00
|
|
|
createdBy := GetControllerOf(pod)
|
|
|
|
if createdBy != nil {
|
|
|
|
if createdBy.Kind != "" {
|
|
|
|
ls[podControllerKind] = lv(createdBy.Kind)
|
|
|
|
}
|
|
|
|
if createdBy.Name != "" {
|
|
|
|
ls[podControllerName] = lv(createdBy.Name)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-10-07 05:53:11 -07:00
|
|
|
for k, v := range pod.Labels {
|
2019-04-10 05:21:42 -07:00
|
|
|
ln := strutil.SanitizeLabelName(k)
|
2019-04-15 11:04:50 -07:00
|
|
|
ls[model.LabelName(podLabelPrefix+ln)] = lv(v)
|
2019-04-10 05:21:42 -07:00
|
|
|
ls[model.LabelName(podLabelPresentPrefix+ln)] = presentValue
|
2016-07-01 03:17:17 -07:00
|
|
|
}
|
|
|
|
|
2016-10-07 05:53:11 -07:00
|
|
|
for k, v := range pod.Annotations {
|
2019-04-10 05:21:42 -07:00
|
|
|
ln := strutil.SanitizeLabelName(k)
|
|
|
|
ls[model.LabelName(podAnnotationPrefix+ln)] = lv(v)
|
|
|
|
ls[model.LabelName(podAnnotationPresentPrefix+ln)] = presentValue
|
2016-07-01 03:17:17 -07:00
|
|
|
}
|
|
|
|
|
2016-10-07 05:53:11 -07:00
|
|
|
return ls
|
2016-07-01 03:17:17 -07:00
|
|
|
}
|
|
|
|
|
Refactor SD configuration to remove `config` dependency (#3629)
* refactor: move targetGroup struct and CheckOverflow() to their own package
* refactor: move auth and security related structs to a utility package, fix import error in utility package
* refactor: Azure SD, remove SD struct from config
* refactor: DNS SD, remove SD struct from config into dns package
* refactor: ec2 SD, move SD struct from config into the ec2 package
* refactor: file SD, move SD struct from config to file discovery package
* refactor: gce, move SD struct from config to gce discovery package
* refactor: move HTTPClientConfig and URL into util/config, fix import error in httputil
* refactor: consul, move SD struct from config into consul discovery package
* refactor: marathon, move SD struct from config into marathon discovery package
* refactor: triton, move SD struct from config to triton discovery package, fix test
* refactor: zookeeper, move SD structs from config to zookeeper discovery package
* refactor: openstack, remove SD struct from config, move into openstack discovery package
* refactor: kubernetes, move SD struct from config into kubernetes discovery package
* refactor: notifier, use targetgroup package instead of config
* refactor: tests for file, marathon, triton SD - use targetgroup package instead of config.TargetGroup
* refactor: retrieval, use targetgroup package instead of config.TargetGroup
* refactor: storage, use config util package
* refactor: discovery manager, use targetgroup package instead of config.TargetGroup
* refactor: use HTTPClient and TLS config from configUtil instead of config
* refactor: tests, use targetgroup package instead of config.TargetGroup
* refactor: fix tagetgroup.Group pointers that were removed by mistake
* refactor: openstack, kubernetes: drop prefixes
* refactor: remove import aliases forced due to vscode bug
* refactor: move main SD struct out of config into discovery/config
* refactor: rename configUtil to config_util
* refactor: rename yamlUtil to yaml_config
* refactor: kubernetes, remove prefixes
* refactor: move the TargetGroup package to discovery/
* refactor: fix order of imports
2017-12-29 12:01:34 -08:00
|
|
|
func (p *Pod) buildPod(pod *apiv1.Pod) *targetgroup.Group {
|
|
|
|
tg := &targetgroup.Group{
|
2016-10-07 05:53:11 -07:00
|
|
|
Source: podSource(pod),
|
2016-07-01 03:17:17 -07:00
|
|
|
}
|
2018-02-14 05:23:52 -08:00
|
|
|
// PodIP can be empty when a pod is starting or has been evicted.
|
|
|
|
if len(pod.Status.PodIP) == 0 {
|
|
|
|
return tg
|
|
|
|
}
|
|
|
|
|
2016-10-07 05:53:11 -07:00
|
|
|
tg.Labels = podLabels(pod)
|
|
|
|
tg.Labels[namespaceLabel] = lv(pod.Namespace)
|
2021-12-23 01:50:00 -08:00
|
|
|
if p.withNodeMetadata {
|
2022-05-27 02:45:09 -07:00
|
|
|
tg.Labels = addNodeLabels(tg.Labels, p.nodeInf, p.logger, &pod.Spec.NodeName)
|
2021-12-23 01:50:00 -08:00
|
|
|
}
|
2016-10-07 05:53:11 -07:00
|
|
|
|
2019-05-26 12:31:52 -07:00
|
|
|
containers := append(pod.Spec.Containers, pod.Spec.InitContainers...)
|
2019-05-27 08:46:39 -07:00
|
|
|
for i, c := range containers {
|
2019-05-29 02:22:10 -07:00
|
|
|
isInit := i >= len(pod.Spec.Containers)
|
2019-05-27 08:46:39 -07:00
|
|
|
|
2016-10-07 05:53:11 -07:00
|
|
|
// If no ports are defined for the container, create an anonymous
|
|
|
|
// target per container.
|
|
|
|
if len(c.Ports) == 0 {
|
|
|
|
// We don't have a port so we just set the address label to the pod IP.
|
|
|
|
// The user has to add a port manually.
|
|
|
|
tg.Targets = append(tg.Targets, model.LabelSet{
|
2022-07-18 05:31:45 -07:00
|
|
|
model.AddressLabel: lv(pod.Status.PodIP),
|
|
|
|
podContainerNameLabel: lv(c.Name),
|
|
|
|
podContainerImageLabel: lv(c.Image),
|
|
|
|
podContainerIsInit: lv(strconv.FormatBool(isInit)),
|
2016-10-07 05:53:11 -07:00
|
|
|
})
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
// Otherwise create one target for each container/port combination.
|
|
|
|
for _, port := range c.Ports {
|
2016-10-17 02:05:13 -07:00
|
|
|
ports := strconv.FormatUint(uint64(port.ContainerPort), 10)
|
2016-10-07 05:53:11 -07:00
|
|
|
addr := net.JoinHostPort(pod.Status.PodIP, ports)
|
2016-07-01 03:17:17 -07:00
|
|
|
|
2016-10-07 05:53:11 -07:00
|
|
|
tg.Targets = append(tg.Targets, model.LabelSet{
|
|
|
|
model.AddressLabel: lv(addr),
|
|
|
|
podContainerNameLabel: lv(c.Name),
|
2022-07-18 05:31:45 -07:00
|
|
|
podContainerImageLabel: lv(c.Image),
|
2016-10-07 05:53:11 -07:00
|
|
|
podContainerPortNumberLabel: lv(ports),
|
|
|
|
podContainerPortNameLabel: lv(port.Name),
|
|
|
|
podContainerPortProtocolLabel: lv(string(port.Protocol)),
|
2019-05-29 02:22:10 -07:00
|
|
|
podContainerIsInit: lv(strconv.FormatBool(isInit)),
|
2016-10-07 05:53:11 -07:00
|
|
|
})
|
2016-07-01 03:17:17 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return tg
|
|
|
|
}
|
|
|
|
|
2021-12-23 01:50:00 -08:00
|
|
|
func (p *Pod) enqueuePodsForNode(nodeName string) {
|
2022-03-10 06:33:34 -08:00
|
|
|
pods, err := p.podInf.GetIndexer().ByIndex(nodeIndex, nodeName)
|
|
|
|
if err != nil {
|
|
|
|
level.Error(p.logger).Log("msg", "Error getting pods for node", "node", nodeName, "err", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, pod := range pods {
|
|
|
|
p.enqueue(pod.(*apiv1.Pod))
|
2021-12-23 01:50:00 -08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-10-07 05:53:11 -07:00
|
|
|
func podSource(pod *apiv1.Pod) string {
|
2018-04-25 09:36:22 -07:00
|
|
|
return podSourceFromNamespaceAndName(pod.Namespace, pod.Name)
|
2016-07-01 03:17:17 -07:00
|
|
|
}
|
|
|
|
|
2018-04-09 09:35:14 -07:00
|
|
|
func podSourceFromNamespaceAndName(namespace, name string) string {
|
|
|
|
return "pod/" + namespace + "/" + name
|
|
|
|
}
|
|
|
|
|
2016-10-07 05:53:11 -07:00
|
|
|
func podReady(pod *apiv1.Pod) model.LabelValue {
|
|
|
|
for _, cond := range pod.Status.Conditions {
|
|
|
|
if cond.Type == apiv1.PodReady {
|
|
|
|
return lv(strings.ToLower(string(cond.Status)))
|
2016-07-01 03:17:17 -07:00
|
|
|
}
|
|
|
|
}
|
2018-07-03 00:37:22 -07:00
|
|
|
return lv(strings.ToLower(string(apiv1.ConditionUnknown)))
|
2016-07-01 03:17:17 -07:00
|
|
|
}
|