2015-01-21 11:07:45 -08:00
// Copyright 2013 The Prometheus Authors
2012-11-26 11:11:34 -08:00
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
2012-11-24 03:33:34 -08:00
package main
import (
2013-01-22 10:32:56 -08:00
"flag"
2015-04-07 09:51:45 -07:00
"fmt"
2014-12-10 07:16:49 -08:00
_ "net/http/pprof" // Comment this line to disable pprof endpoint.
2013-06-25 05:02:27 -07:00
"os"
"os/signal"
2015-04-07 09:51:45 -07:00
"sort"
"strings"
2014-04-14 16:02:15 -07:00
"sync"
2013-08-14 03:36:55 -07:00
"syscall"
2013-06-25 05:02:27 -07:00
"time"
2015-05-20 09:10:29 -07:00
"github.com/prometheus/log"
2013-06-25 05:02:27 -07:00
2015-03-27 15:43:47 -07:00
clientmodel "github.com/prometheus/client_golang/model"
2014-06-06 02:55:53 -07:00
registry "github.com/prometheus/client_golang/prometheus"
2013-08-13 07:14:18 -07:00
2013-01-27 09:49:45 -08:00
"github.com/prometheus/prometheus/config"
2013-07-30 08:18:07 -07:00
"github.com/prometheus/prometheus/notification"
2015-03-30 10:43:19 -07:00
"github.com/prometheus/prometheus/promql"
2013-01-27 09:49:45 -08:00
"github.com/prometheus/prometheus/retrieval"
2015-03-30 10:43:19 -07:00
"github.com/prometheus/prometheus/rules"
2015-03-14 19:36:15 -07:00
"github.com/prometheus/prometheus/storage"
2014-06-06 02:55:53 -07:00
"github.com/prometheus/prometheus/storage/local"
Add optional sample replication to OpenTSDB.
Prometheus needs long-term storage. Since we don't have enough resources
to build our own timeseries storage from scratch ontop of Riak,
Cassandra or a similar distributed datastore at the moment, we're
planning on using OpenTSDB as long-term storage for Prometheus. It's
data model is roughly compatible with that of Prometheus, with some
caveats.
As a first step, this adds write-only replication from Prometheus to
OpenTSDB, with the following things worth noting:
1)
I tried to keep the integration lightweight, meaning that anything
related to OpenTSDB is isolated to its own package and only main knows
about it (essentially it tees all samples to both the existing storage
and TSDB). It's not touching the existing TieredStorage at all to avoid
more complexity in that area. This might change in the future,
especially if we decide to implement a read path for OpenTSDB through
Prometheus as well.
2)
Backpressure while sending to OpenTSDB is handled by simply dropping
samples on the floor when the in-memory queue of samples destined for
OpenTSDB runs full. Prometheus also only attempts to send samples once,
rather than implementing a complex retry algorithm. Thus, replication to
OpenTSDB is best-effort for now. If needed, this may be extended in the
future.
3)
Samples are sent in batches of limited size to OpenTSDB. The optimal
batch size, timeout parameters, etc. may need to be adjusted in the
future.
4)
OpenTSDB has different rules for legal characters in tag (label) values.
While Prometheus allows any characters in label values, OpenTSDB limits
them to a to z, A to Z, 0 to 9, -, _, . and /. Currently any illegal
characters in Prometheus label values are simply replaced by an
underscore. Especially when integrating OpenTSDB with the read path in
Prometheus, we'll need to reconsider this: either we'll need to
introduce the same limitations for Prometheus labels or escape/encode
illegal characters in OpenTSDB in such a way that they are fully
decodable again when reading through Prometheus, so that corresponding
timeseries in both systems match in their labelsets.
Change-Id: I8394c9c55dbac3946a0fa497f566d5e6e2d600b5
2013-12-09 08:03:49 -08:00
"github.com/prometheus/prometheus/storage/remote"
2015-03-29 17:42:04 -07:00
"github.com/prometheus/prometheus/storage/remote/influxdb"
Add optional sample replication to OpenTSDB.
Prometheus needs long-term storage. Since we don't have enough resources
to build our own timeseries storage from scratch ontop of Riak,
Cassandra or a similar distributed datastore at the moment, we're
planning on using OpenTSDB as long-term storage for Prometheus. It's
data model is roughly compatible with that of Prometheus, with some
caveats.
As a first step, this adds write-only replication from Prometheus to
OpenTSDB, with the following things worth noting:
1)
I tried to keep the integration lightweight, meaning that anything
related to OpenTSDB is isolated to its own package and only main knows
about it (essentially it tees all samples to both the existing storage
and TSDB). It's not touching the existing TieredStorage at all to avoid
more complexity in that area. This might change in the future,
especially if we decide to implement a read path for OpenTSDB through
Prometheus as well.
2)
Backpressure while sending to OpenTSDB is handled by simply dropping
samples on the floor when the in-memory queue of samples destined for
OpenTSDB runs full. Prometheus also only attempts to send samples once,
rather than implementing a complex retry algorithm. Thus, replication to
OpenTSDB is best-effort for now. If needed, this may be extended in the
future.
3)
Samples are sent in batches of limited size to OpenTSDB. The optimal
batch size, timeout parameters, etc. may need to be adjusted in the
future.
4)
OpenTSDB has different rules for legal characters in tag (label) values.
While Prometheus allows any characters in label values, OpenTSDB limits
them to a to z, A to Z, 0 to 9, -, _, . and /. Currently any illegal
characters in Prometheus label values are simply replaced by an
underscore. Especially when integrating OpenTSDB with the read path in
Prometheus, we'll need to reconsider this: either we'll need to
introduce the same limitations for Prometheus labels or escape/encode
illegal characters in OpenTSDB in such a way that they are fully
decodable again when reading through Prometheus, so that corresponding
timeseries in both systems match in their labelsets.
Change-Id: I8394c9c55dbac3946a0fa497f566d5e6e2d600b5
2013-12-09 08:03:49 -08:00
"github.com/prometheus/prometheus/storage/remote/opentsdb"
2013-02-08 05:49:55 -08:00
"github.com/prometheus/prometheus/web"
2015-06-04 09:24:04 -07:00
"github.com/prometheus/prometheus/web/api/legacy"
"github.com/prometheus/prometheus/web/api/v1"
2012-11-24 03:33:34 -08:00
)
2013-06-25 05:02:27 -07:00
const deletionBatchSize = 100
2013-05-13 01:53:24 -07:00
2013-01-22 10:32:56 -08:00
// Commandline flags.
var (
2015-05-20 10:24:27 -07:00
configFile = flag . String ( "config.file" , "prometheus.yml" , "Prometheus configuration file name." )
2013-08-13 04:58:19 -07:00
2014-11-20 12:03:51 -08:00
alertmanagerURL = flag . String ( "alertmanager.url" , "" , "The URL of the alert manager to send notifications to." )
notificationQueueCapacity = flag . Int ( "alertmanager.notification-queue-capacity" , 100 , "The capacity of the queue for pending alert manager notifications." )
2013-08-13 04:58:19 -07:00
2015-06-11 06:24:24 -07:00
persistenceStoragePath = flag . String ( "storage.local.path" , "data" , "Base path for metrics storage." )
2013-08-13 04:43:37 -07:00
2015-04-02 11:20:00 -07:00
opentsdbURL = flag . String ( "storage.remote.opentsdb-url" , "" , "The URL of the remote OpenTSDB server to send samples to. None, if empty." )
influxdbURL = flag . String ( "storage.remote.influxdb-url" , "" , "The URL of the remote InfluxDB server to send samples to. None, if empty." )
2015-03-29 17:42:04 -07:00
remoteStorageTimeout = flag . Duration ( "storage.remote.timeout" , 30 * time . Second , "The timeout to use when sending samples to the remote storage." )
Add optional sample replication to OpenTSDB.
Prometheus needs long-term storage. Since we don't have enough resources
to build our own timeseries storage from scratch ontop of Riak,
Cassandra or a similar distributed datastore at the moment, we're
planning on using OpenTSDB as long-term storage for Prometheus. It's
data model is roughly compatible with that of Prometheus, with some
caveats.
As a first step, this adds write-only replication from Prometheus to
OpenTSDB, with the following things worth noting:
1)
I tried to keep the integration lightweight, meaning that anything
related to OpenTSDB is isolated to its own package and only main knows
about it (essentially it tees all samples to both the existing storage
and TSDB). It's not touching the existing TieredStorage at all to avoid
more complexity in that area. This might change in the future,
especially if we decide to implement a read path for OpenTSDB through
Prometheus as well.
2)
Backpressure while sending to OpenTSDB is handled by simply dropping
samples on the floor when the in-memory queue of samples destined for
OpenTSDB runs full. Prometheus also only attempts to send samples once,
rather than implementing a complex retry algorithm. Thus, replication to
OpenTSDB is best-effort for now. If needed, this may be extended in the
future.
3)
Samples are sent in batches of limited size to OpenTSDB. The optimal
batch size, timeout parameters, etc. may need to be adjusted in the
future.
4)
OpenTSDB has different rules for legal characters in tag (label) values.
While Prometheus allows any characters in label values, OpenTSDB limits
them to a to z, A to Z, 0 to 9, -, _, . and /. Currently any illegal
characters in Prometheus label values are simply replaced by an
underscore. Especially when integrating OpenTSDB with the read path in
Prometheus, we'll need to reconsider this: either we'll need to
introduce the same limitations for Prometheus labels or escape/encode
illegal characters in OpenTSDB in such a way that they are fully
decodable again when reading through Prometheus, so that corresponding
timeseries in both systems match in their labelsets.
Change-Id: I8394c9c55dbac3946a0fa497f566d5e6e2d600b5
2013-12-09 08:03:49 -08:00
2014-11-20 12:03:51 -08:00
numMemoryChunks = flag . Int ( "storage.local.memory-chunks" , 1024 * 1024 , "How many chunks to keep in memory. While the size of a chunk is 1kiB, the total memory usage will be significantly higher than this value * 1kiB. Furthermore, for various reasons, more chunks might have to be kept in memory temporarily." )
2013-05-13 01:53:24 -07:00
2015-02-06 05:54:53 -08:00
persistenceRetentionPeriod = flag . Duration ( "storage.local.retention" , 15 * 24 * time . Hour , "How long to retain samples in the local storage." )
2015-03-18 11:36:41 -07:00
maxChunksToPersist = flag . Int ( "storage.local.max-chunks-to-persist" , 1024 * 1024 , "How many chunks can be waiting for persistence before sample ingestion will stop. Many chunks waiting to be persisted will increase the checkpoint size." )
2013-05-14 08:50:52 -07:00
2015-03-08 18:33:10 -07:00
checkpointInterval = flag . Duration ( "storage.local.checkpoint-interval" , 5 * time . Minute , "The period at which the in-memory metrics and the chunks not yet persisted to series files are checkpointed." )
2015-01-08 11:15:58 -08:00
checkpointDirtySeriesLimit = flag . Int ( "storage.local.checkpoint-dirty-series-limit" , 5000 , "If approx. that many time series are in a state that would require a recovery operation after a crash, a checkpoint is triggered, even if the checkpoint interval hasn't passed yet. A recovery operation requires a disk seek. The default limit intends to keep the recovery time below 1min even on spinning disks. With SSD, recovery is much faster, so you might want to increase this value in that case to avoid overly frequent checkpoints." )
2015-03-19 07:41:50 -07:00
seriesSyncStrategy = flag . String ( "storage.local.series-sync-strategy" , "adaptive" , "When to sync series files after modification. Possible values: 'never', 'always', 'adaptive'. Sync'ing slows down storage performance but reduces the risk of data loss in case of an OS crash. With the 'adaptive' strategy, series files are sync'd for as long as the storage is not too much behind on chunk persistence." )
2013-07-30 08:18:07 -07:00
2015-03-19 04:03:09 -07:00
storageDirty = flag . Bool ( "storage.local.dirty" , false , "If set, the local storage layer will perform crash recovery even if the last shutdown appears to be clean." )
storagePedanticChecks = flag . Bool ( "storage.local.pedantic-checks" , false , "If set, a crash recovery will perform checks on each series file. This might take a very long time." )
2013-08-13 04:52:24 -07:00
2015-06-01 03:23:13 -07:00
pathPrefix = flag . String ( "web.path-prefix" , "" , "Prefix for all web paths." )
2015-03-24 14:04:38 -07:00
2014-11-20 12:03:51 -08:00
printVersion = flag . Bool ( "version" , false , "Print version information." )
2013-01-22 10:32:56 -08:00
)
2014-04-14 16:02:15 -07:00
2013-04-29 02:17:56 -07:00
type prometheus struct {
2015-03-30 10:43:19 -07:00
queryEngine * promql . Engine
2015-04-29 01:26:49 -07:00
ruleManager * rules . Manager
2015-04-20 03:24:25 -07:00
targetManager * retrieval . TargetManager
2014-10-10 05:19:02 -07:00
notificationHandler * notification . NotificationHandler
2015-06-02 04:07:46 -07:00
statusHandler * web . PrometheusStatusHandler
2014-10-10 05:19:02 -07:00
storage local . Storage
2015-04-02 11:20:00 -07:00
remoteStorageQueues [ ] * remote . StorageQueueManager
2013-08-13 08:19:13 -07:00
2014-10-10 05:19:02 -07:00
webService * web . WebService
2014-04-14 16:02:15 -07:00
closeOnce sync . Once
2013-04-29 02:17:56 -07:00
}
2014-10-10 05:19:02 -07:00
// NewPrometheus creates a new prometheus object based on flag values.
// Call Serve() to start serving and Close() for clean shutdown.
func NewPrometheus ( ) * prometheus {
2014-11-10 10:42:55 -08:00
notificationHandler := notification . NewNotificationHandler ( * alertmanagerURL , * notificationQueueCapacity )
2014-10-10 05:19:02 -07:00
2015-03-19 07:41:50 -07:00
var syncStrategy local . SyncStrategy
switch * seriesSyncStrategy {
case "never" :
syncStrategy = local . Never
case "always" :
syncStrategy = local . Always
case "adaptive" :
syncStrategy = local . Adaptive
default :
2015-05-20 09:10:29 -07:00
log . Errorf ( "Invalid flag value for 'storage.local.series-sync-strategy': %s\n" , * seriesSyncStrategy )
2015-04-07 09:51:45 -07:00
os . Exit ( 2 )
2015-03-19 07:41:50 -07:00
}
2014-09-16 06:47:24 -07:00
o := & local . MemorySeriesStorageOptions {
2014-11-13 11:50:25 -08:00
MemoryChunks : * numMemoryChunks ,
2015-03-18 11:36:41 -07:00
MaxChunksToPersist : * maxChunksToPersist ,
2015-02-06 05:54:53 -08:00
PersistenceStoragePath : * persistenceStoragePath ,
PersistenceRetentionPeriod : * persistenceRetentionPeriod ,
2014-10-24 11:27:27 -07:00
CheckpointInterval : * checkpointInterval ,
2015-01-08 11:15:58 -08:00
CheckpointDirtySeriesLimit : * checkpointDirtySeriesLimit ,
2015-03-19 04:59:26 -07:00
Dirty : * storageDirty ,
PedanticChecks : * storagePedanticChecks ,
2015-03-19 07:41:50 -07:00
SyncStrategy : syncStrategy ,
2014-06-06 02:55:53 -07:00
}
2015-05-18 10:26:28 -07:00
memStorage := local . NewMemorySeriesStorage ( o )
2013-07-30 08:18:07 -07:00
2015-03-14 19:36:15 -07:00
var sampleAppender storage . SampleAppender
2015-04-02 11:20:00 -07:00
var remoteStorageQueues [ ] * remote . StorageQueueManager
if * opentsdbURL == "" && * influxdbURL == "" {
2015-05-20 09:10:29 -07:00
log . Warnf ( "No remote storage URLs provided; not sending any samples to long-term storage" )
2015-03-14 19:36:15 -07:00
sampleAppender = memStorage
} else {
2015-04-02 11:20:00 -07:00
fanout := storage . Fanout { memStorage }
addRemoteStorage := func ( c remote . StorageClient ) {
qm := remote . NewStorageQueueManager ( c , 100 * 1024 )
fanout = append ( fanout , qm )
remoteStorageQueues = append ( remoteStorageQueues , qm )
2015-03-29 17:42:04 -07:00
}
2015-04-02 11:20:00 -07:00
if * opentsdbURL != "" {
addRemoteStorage ( opentsdb . NewClient ( * opentsdbURL , * remoteStorageTimeout ) )
2015-03-14 19:36:15 -07:00
}
2015-04-02 11:20:00 -07:00
if * influxdbURL != "" {
addRemoteStorage ( influxdb . NewClient ( * influxdbURL , * remoteStorageTimeout ) )
2015-03-14 19:36:15 -07:00
}
2015-04-02 11:20:00 -07:00
sampleAppender = fanout
2015-03-14 19:36:15 -07:00
}
2015-05-12 07:52:56 -07:00
targetManager := retrieval . NewTargetManager ( sampleAppender )
2015-03-14 19:36:15 -07:00
2015-03-30 10:43:19 -07:00
queryEngine := promql . NewEngine ( memStorage )
2015-04-29 01:26:49 -07:00
ruleManager := rules . NewManager ( & rules . ManagerOptions {
2015-03-14 19:36:15 -07:00
SampleAppender : sampleAppender ,
2014-10-10 05:19:02 -07:00
NotificationHandler : notificationHandler ,
2015-03-30 10:43:19 -07:00
QueryEngine : queryEngine ,
2015-03-24 14:04:38 -07:00
PrometheusURL : web . MustBuildServerURL ( * pathPrefix ) ,
PathPrefix : * pathPrefix ,
2013-08-20 06:42:06 -07:00
} )
2013-06-11 02:00:55 -07:00
2013-05-14 02:21:27 -07:00
flags := map [ string ] string { }
flag . VisitAll ( func ( f * flag . Flag ) {
flags [ f . Name ] = f . Value . String ( )
} )
2013-08-13 08:19:13 -07:00
prometheusStatus := & web . PrometheusStatusHandler {
BuildInfo : BuildInfo ,
RuleManager : ruleManager ,
2015-04-20 03:24:25 -07:00
TargetPools : targetManager . Pools ,
2013-08-13 08:19:13 -07:00
Flags : flags ,
Birth : time . Now ( ) ,
2015-03-24 14:04:38 -07:00
PathPrefix : * pathPrefix ,
2013-05-05 10:32:04 -07:00
}
2013-06-13 07:10:05 -07:00
alertsHandler := & web . AlertsHandler {
RuleManager : ruleManager ,
2015-03-24 14:04:38 -07:00
PathPrefix : * pathPrefix ,
2013-06-13 07:10:05 -07:00
}
2014-05-28 10:44:54 -07:00
consolesHandler := & web . ConsolesHandler {
2015-03-30 10:43:19 -07:00
QueryEngine : queryEngine ,
PathPrefix : * pathPrefix ,
2015-03-24 14:04:38 -07:00
}
graphsHandler := & web . GraphsHandler {
PathPrefix : * pathPrefix ,
2013-05-14 02:21:27 -07:00
}
2013-05-05 10:32:04 -07:00
2015-06-04 09:24:04 -07:00
apiLegacy := & legacy . API {
2015-03-30 10:43:19 -07:00
Now : clientmodel . Now ,
Storage : memStorage ,
QueryEngine : queryEngine ,
2013-05-05 10:32:04 -07:00
}
2015-06-04 09:24:04 -07:00
apiv1 := & v1 . API {
Storage : memStorage ,
QueryEngine : queryEngine ,
}
2015-06-02 04:07:46 -07:00
webService := web . NewWebService ( & web . WebServiceOptions {
PathPrefix : * pathPrefix ,
2014-06-06 02:55:53 -07:00
StatusHandler : prometheusStatus ,
2015-06-04 09:24:04 -07:00
APILegacy : apiLegacy ,
APIv1 : apiv1 ,
2014-06-06 02:55:53 -07:00
ConsolesHandler : consolesHandler ,
AlertsHandler : alertsHandler ,
2015-03-24 14:04:38 -07:00
GraphsHandler : graphsHandler ,
2015-06-02 04:07:46 -07:00
} )
2013-05-14 02:21:27 -07:00
2014-10-10 05:19:02 -07:00
p := & prometheus {
2015-03-30 10:43:19 -07:00
queryEngine : queryEngine ,
2014-10-10 05:19:02 -07:00
ruleManager : ruleManager ,
targetManager : targetManager ,
notificationHandler : notificationHandler ,
2015-06-02 04:07:46 -07:00
statusHandler : prometheusStatus ,
2014-10-10 05:19:02 -07:00
storage : memStorage ,
2015-04-02 11:20:00 -07:00
remoteStorageQueues : remoteStorageQueues ,
2013-05-13 01:53:24 -07:00
2014-10-10 05:19:02 -07:00
webService : webService ,
2013-04-29 02:17:56 -07:00
}
2015-05-12 07:52:56 -07:00
2015-05-18 10:26:28 -07:00
if ! p . reloadConfig ( ) {
os . Exit ( 1 )
}
2015-05-12 07:52:56 -07:00
2014-10-10 05:19:02 -07:00
return p
}
2014-04-14 16:02:15 -07:00
2015-05-18 10:26:28 -07:00
func ( p * prometheus ) reloadConfig ( ) bool {
2015-05-20 09:10:29 -07:00
log . Infof ( "Loading configuration file %s" , * configFile )
2015-05-12 07:52:56 -07:00
conf , err := config . LoadFromFile ( * configFile )
if err != nil {
2015-05-20 09:10:29 -07:00
log . Errorf ( "Couldn't load configuration (-config.file=%s): %v" , * configFile , err )
2015-06-01 09:36:11 -07:00
log . Errorf ( "Note: The configuration format has changed with version 0.14. Please see the documentation (http://prometheus.io/docs/operating/configuration/) and the provided configuration migration tool (https://github.com/prometheus/migrate)." )
2015-05-18 10:26:28 -07:00
return false
2015-05-12 07:52:56 -07:00
}
2015-06-02 09:44:41 -07:00
success := true
2015-05-12 07:52:56 -07:00
2015-06-02 04:07:46 -07:00
success = success && p . statusHandler . ApplyConfig ( conf )
2015-06-02 09:44:41 -07:00
success = success && p . targetManager . ApplyConfig ( conf )
success = success && p . ruleManager . ApplyConfig ( conf )
2015-05-18 10:26:28 -07:00
2015-06-02 09:44:41 -07:00
return success
2015-05-12 07:52:56 -07:00
}
2014-10-10 05:19:02 -07:00
// Serve starts the Prometheus server. It returns after the server has been shut
// down. The method installs an interrupt handler, allowing to trigger a
// shutdown by sending SIGTERM to the process.
func ( p * prometheus ) Serve ( ) {
2015-05-19 05:38:50 -07:00
// Start all components.
2015-05-18 10:26:28 -07:00
if err := p . storage . Start ( ) ; err != nil {
2015-05-23 03:03:14 -07:00
log . Errorln ( "Error opening memory series storage:" , err )
2015-05-18 10:26:28 -07:00
os . Exit ( 1 )
}
2015-05-23 03:03:14 -07:00
defer func ( ) {
if err := p . storage . Stop ( ) ; err != nil {
log . Errorln ( "Error stopping storage:" , err )
}
} ( )
2015-05-19 05:38:50 -07:00
// The storage has to be fully initialized before registering Prometheus.
registry . MustRegister ( p )
2015-04-02 11:20:00 -07:00
for _ , q := range p . remoteStorageQueues {
go q . Run ( )
2015-05-19 05:38:50 -07:00
defer q . Stop ( )
2014-04-14 16:02:15 -07:00
}
2015-05-18 10:26:28 -07:00
2014-10-10 05:19:02 -07:00
go p . ruleManager . Run ( )
2015-05-19 05:38:50 -07:00
defer p . ruleManager . Stop ( )
2014-10-10 05:19:02 -07:00
go p . notificationHandler . Run ( )
2015-05-19 05:38:50 -07:00
defer p . notificationHandler . Stop ( )
2015-04-20 03:24:25 -07:00
go p . targetManager . Run ( )
2015-05-19 05:38:50 -07:00
defer p . targetManager . Stop ( )
2013-04-29 02:17:56 -07:00
2015-05-19 05:38:50 -07:00
defer p . queryEngine . Stop ( )
2013-05-07 08:14:04 -07:00
2015-06-02 04:07:46 -07:00
go p . webService . Run ( )
2013-01-04 08:55:58 -08:00
2015-05-19 05:38:50 -07:00
// Wait for reload or termination signals.
2015-05-12 07:52:56 -07:00
hup := make ( chan os . Signal )
signal . Notify ( hup , syscall . SIGHUP )
go func ( ) {
for range hup {
p . reloadConfig ( )
}
} ( )
term := make ( chan os . Signal )
signal . Notify ( term , os . Interrupt , syscall . SIGTERM )
2015-03-14 19:36:15 -07:00
select {
2015-05-12 07:52:56 -07:00
case <- term :
2015-05-20 09:10:29 -07:00
log . Warn ( "Received SIGTERM, exiting gracefully..." )
2015-03-14 19:36:15 -07:00
case <- p . webService . QuitChan :
2015-05-20 09:10:29 -07:00
log . Warn ( "Received termination request via web service, exiting gracefully..." )
2012-11-24 03:33:34 -08:00
}
2014-10-09 03:30:34 -07:00
2015-05-12 07:52:56 -07:00
close ( hup )
2015-05-20 09:10:29 -07:00
log . Info ( "See you next time!" )
2012-11-24 03:33:34 -08:00
}
2014-10-10 05:19:02 -07:00
2014-11-10 10:42:55 -08:00
// Describe implements registry.Collector.
func ( p * prometheus ) Describe ( ch chan <- * registry . Desc ) {
p . notificationHandler . Describe ( ch )
p . storage . Describe ( ch )
2015-04-02 11:20:00 -07:00
for _ , q := range p . remoteStorageQueues {
q . Describe ( ch )
2014-11-10 10:42:55 -08:00
}
}
// Collect implements registry.Collector.
func ( p * prometheus ) Collect ( ch chan <- registry . Metric ) {
p . notificationHandler . Collect ( ch )
p . storage . Collect ( ch )
2015-04-02 11:20:00 -07:00
for _ , q := range p . remoteStorageQueues {
q . Collect ( ch )
2014-11-10 10:42:55 -08:00
}
}
2015-04-07 09:51:45 -07:00
func usage ( ) {
groups := make ( map [ string ] [ ] * flag . Flag )
// Set a default group for ungrouped flags.
groups [ "." ] = make ( [ ] * flag . Flag , 0 )
// Bucket flags into groups based on the first of their dot-separated levels.
flag . VisitAll ( func ( fl * flag . Flag ) {
parts := strings . SplitN ( fl . Name , "." , 2 )
if len ( parts ) == 1 {
groups [ "." ] = append ( groups [ "." ] , fl )
} else {
name := parts [ 0 ]
groups [ name ] = append ( groups [ name ] , fl )
}
} )
groupsOrdered := make ( sort . StringSlice , 0 , len ( groups ) )
for groupName := range groups {
groupsOrdered = append ( groupsOrdered , groupName )
}
sort . Sort ( groupsOrdered )
2015-04-08 14:36:15 -07:00
fmt . Fprintf ( os . Stderr , "Usage: %s [options ...]:\n\n" , os . Args [ 0 ] )
2015-04-07 09:51:45 -07:00
const (
maxLineLength = 80
lineSep = "\n "
)
for _ , groupName := range groupsOrdered {
if groupName != "." {
fmt . Fprintf ( os . Stderr , "\n%s:\n" , strings . Title ( groupName ) )
}
for _ , fl := range groups [ groupName ] {
2015-04-08 14:02:22 -07:00
format := " -%s=%s"
2015-04-07 09:51:45 -07:00
if strings . Contains ( fl . DefValue , " " ) || fl . DefValue == "" {
2015-04-08 14:02:22 -07:00
format = " -%s=%q"
2015-04-07 09:51:45 -07:00
}
2015-04-08 14:02:22 -07:00
flagUsage := fmt . Sprintf ( format + lineSep , fl . Name , fl . DefValue )
2015-04-07 09:51:45 -07:00
// Format the usage text to not exceed maxLineLength characters per line.
words := strings . SplitAfter ( fl . Usage , " " )
2015-04-08 14:02:22 -07:00
lineLength := len ( lineSep ) - 1
2015-04-07 09:51:45 -07:00
for _ , w := range words {
if lineLength + len ( w ) > maxLineLength {
flagUsage += lineSep
lineLength = len ( lineSep ) - 1
}
flagUsage += w
lineLength += len ( w )
}
fmt . Fprintf ( os . Stderr , "%s\n" , flagUsage )
}
}
}
2014-10-10 05:19:02 -07:00
func main ( ) {
2015-04-07 09:51:45 -07:00
flag . CommandLine . Init ( os . Args [ 0 ] , flag . ContinueOnError )
flag . CommandLine . Usage = usage
if err := flag . CommandLine . Parse ( os . Args [ 1 : ] ) ; err != nil {
if err != flag . ErrHelp {
2015-05-20 09:10:29 -07:00
log . Errorf ( "Invalid command line arguments. Help: %s -h" , os . Args [ 0 ] )
2015-04-07 09:51:45 -07:00
}
os . Exit ( 2 )
}
2015-03-24 14:04:38 -07:00
2015-06-01 03:23:13 -07:00
* pathPrefix = strings . TrimRight ( * pathPrefix , "/" )
if * pathPrefix != "" && ! strings . HasPrefix ( * pathPrefix , "/" ) {
2015-03-24 14:04:38 -07:00
* pathPrefix = "/" + * pathPrefix
}
2014-10-10 05:19:02 -07:00
versionInfoTmpl . Execute ( os . Stdout , BuildInfo )
if * printVersion {
os . Exit ( 0 )
}
2014-11-10 10:42:55 -08:00
p := NewPrometheus ( )
p . Serve ( )
2012-11-24 03:33:34 -08:00
}