2015-06-15 03:36:32 -07:00
// Copyright 2015 The Prometheus Authors
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
2016-02-17 14:52:44 -08:00
// The main package for the Prometheus server executable.
2015-06-15 03:36:32 -07:00
package main
import (
2015-06-15 03:23:02 -07:00
"fmt"
2017-06-20 09:48:17 -07:00
"net"
2015-06-15 03:36:32 -07:00
_ "net/http/pprof" // Comment this line to disable pprof endpoint.
2017-06-20 09:48:17 -07:00
"net/url"
2015-06-15 03:36:32 -07:00
"os"
"os/signal"
2017-06-20 08:38:01 -07:00
"path/filepath"
2017-06-20 09:48:17 -07:00
"strings"
2015-06-15 03:36:32 -07:00
"syscall"
"time"
2017-06-20 09:48:17 -07:00
"github.com/asaskevich/govalidator"
"github.com/pkg/errors"
2015-06-23 09:04:04 -07:00
"github.com/prometheus/client_golang/prometheus"
2016-05-05 04:46:51 -07:00
"github.com/prometheus/common/log"
2017-06-20 09:48:17 -07:00
"github.com/prometheus/common/model"
2016-05-05 04:46:51 -07:00
"github.com/prometheus/common/version"
promql: Allow per-query contexts.
For Weaveworks' Frankenstein, we need to support multitenancy. In
Frankenstein, we initially solved this without modifying the promql
package at all: we constructed a new promql.Engine for every
query and injected a storage implementation into that engine which would
be primed to only collect data for a given user.
This is problematic to upstream, however. Prometheus assumes that there
is only one engine: the query concurrency gate is part of the engine,
and the engine contains one central cancellable context to shut down all
queries. Also, creating a new engine for every query seems like overkill.
Thus, we want to be able to pass per-query contexts into a single engine.
This change gets rid of the promql.Engine's built-in base context and
allows passing in a per-query context instead. Central cancellation of
all queries is still possible by deriving all passed-in contexts from
one central one, but this is now the responsibility of the caller. The
central query context is now created in main() and passed into the
relevant components (web handler / API, rule manager).
In a next step, the per-query context would have to be passed to the
storage implementation, so that the storage can implement multi-tenancy
or other features based on the contextual information.
2016-09-15 04:52:50 -07:00
"golang.org/x/net/context"
2017-06-20 08:38:01 -07:00
"gopkg.in/alecthomas/kingpin.v2"
promql: Allow per-query contexts.
For Weaveworks' Frankenstein, we need to support multitenancy. In
Frankenstein, we initially solved this without modifying the promql
package at all: we constructed a new promql.Engine for every
query and injected a storage implementation into that engine which would
be primed to only collect data for a given user.
This is problematic to upstream, however. Prometheus assumes that there
is only one engine: the query concurrency gate is part of the engine,
and the engine contains one central cancellable context to shut down all
queries. Also, creating a new engine for every query seems like overkill.
Thus, we want to be able to pass per-query contexts into a single engine.
This change gets rid of the promql.Engine's built-in base context and
allows passing in a per-query context instead. Central cancellation of
all queries is still possible by deriving all passed-in contexts from
one central one, but this is now the responsibility of the caller. The
central query context is now created in main() and passed into the
relevant components (web handler / API, rule manager).
In a next step, the per-query context would have to be passed to the
storage implementation, so that the storage can implement multi-tenancy
or other features based on the contextual information.
2016-09-15 04:52:50 -07:00
2015-06-15 03:36:32 -07:00
"github.com/prometheus/prometheus/config"
2016-03-01 03:37:22 -08:00
"github.com/prometheus/prometheus/notifier"
2015-06-15 03:36:32 -07:00
"github.com/prometheus/prometheus/promql"
"github.com/prometheus/prometheus/retrieval"
"github.com/prometheus/prometheus/rules"
2016-12-29 00:27:30 -08:00
"github.com/prometheus/prometheus/storage/tsdb"
2015-06-15 03:36:32 -07:00
"github.com/prometheus/prometheus/web"
)
2017-06-20 09:48:17 -07:00
var (
configSuccess = prometheus . NewGauge ( prometheus . GaugeOpts {
Namespace : "prometheus" ,
Name : "config_last_reload_successful" ,
Help : "Whether the last configuration reload attempt was successful." ,
} )
configSuccessTime = prometheus . NewGauge ( prometheus . GaugeOpts {
Namespace : "prometheus" ,
Name : "config_last_reload_success_timestamp_seconds" ,
Help : "Timestamp of the last successful configuration reload." ,
} )
)
func init ( ) {
prometheus . MustRegister ( version . NewCollector ( "prometheus" ) )
}
2015-06-15 03:36:32 -07:00
func main ( ) {
2017-06-20 09:48:17 -07:00
cfg := struct {
printVersion bool
configFile string
localStoragePath string
notifier notifier . Options
notifierTimeout model . Duration
queryEngine promql . EngineOptions
web web . Options
tsdb tsdb . Options
lookbackDelta model . Duration
webTimeout model . Duration
queryTimeout model . Duration
prometheusURL string
logFormat string
logLevel string
} {
notifier : notifier . Options {
Registerer : prometheus . DefaultRegisterer ,
} ,
}
2017-06-20 08:38:01 -07:00
a := kingpin . New ( filepath . Base ( os . Args [ 0 ] ) , "The Prometheus monitoring server" )
a . Version ( version . Print ( "prometheus" ) )
a . HelpFlag . Short ( 'h' )
a . Flag ( "log.level" ,
"Only log messages with the given severity or above. One of: [debug, info, warn, error, fatal]" ) .
Default ( "info" ) . StringVar ( & cfg . logLevel )
a . Flag ( "log.format" ,
` Set the log target and format. Example: "logger:syslog?appname=bob&local=7" or "logger:stdout?json=true" ` ) .
Default ( "logger:stderr" ) . StringVar ( & cfg . logFormat )
a . Flag ( "config.file" , "Prometheus configuration file path." ) .
Default ( "prometheus.yml" ) . StringVar ( & cfg . configFile )
a . Flag ( "web.listen-address" , "Address to listen on for UI, API, and telemtry." ) .
Default ( "0.0.0.0:9090" ) . StringVar ( & cfg . web . ListenAddress )
a . Flag ( "web.read-timeout" ,
"Maximum duration before timing out read of the request, and closing idle connections." ) .
Default ( "5m" ) . SetValue ( & cfg . webTimeout )
a . Flag ( "web.max-connections" , "Maximum number of simultaneous connections." ) .
Default ( "512" ) . IntVar ( & cfg . web . MaxConnections )
a . Flag ( "web.external-url" ,
"The URL under which Prometheus is externally reachable (for example, if Prometheus is served via a reverse proxy). Used for generating relative and absolute links back to Prometheus itself. If the URL has a path portion, it will be used to prefix all HTTP endpoints served by Prometheus. If omitted, relevant URL components will be derived automatically." ) .
PlaceHolder ( "<URL>" ) . StringVar ( & cfg . prometheusURL )
a . Flag ( "web.route-prefix" ,
"Prefix for the internal routes of web endpoints. Defaults to path of --web.external-url." ) .
PlaceHolder ( "<path>" ) . StringVar ( & cfg . web . RoutePrefix )
a . Flag ( "web.user-assets" , "Path to static asset directory, available at /user." ) .
PlaceHolder ( "<path>" ) . StringVar ( & cfg . web . UserAssetsPath )
a . Flag ( "web.enable-remote-shutdown" , "Enable shutdown via HTTP request." ) .
Default ( "false" ) . BoolVar ( & cfg . web . EnableQuit )
a . Flag ( "web.console.templates" , "Path to the console template directory, available at /consoles." ) .
Default ( "consoles" ) . StringVar ( & cfg . web . ConsoleTemplatesPath )
a . Flag ( "web.console.libraries" , "Path to the console library directory." ) .
Default ( "console_libraries" ) . StringVar ( & cfg . web . ConsoleLibrariesPath )
a . Flag ( "storage.tsdb.path" , "Base path for metrics storage." ) .
Default ( "data/" ) . StringVar ( & cfg . localStoragePath )
a . Flag ( "storage.tsdb.min-block-duration" , "Minimum duration of a data block before being persisted." ) .
Default ( "2h" ) . SetValue ( & cfg . tsdb . MinBlockDuration )
a . Flag ( "storage.tsdb.max-block-duration" ,
"Maximum duration compacted blocks may span. (Defaults to 10% of the retention period)" ) .
PlaceHolder ( "<duration>" ) . SetValue ( & cfg . tsdb . MaxBlockDuration )
a . Flag ( "storage.tsdb.retention" , "How long to retain samples in the storage." ) .
Default ( "15d" ) . SetValue ( & cfg . tsdb . Retention )
2017-06-22 06:02:10 -07:00
a . Flag ( "storage.tsdb.no-lockfile" , "Do not create lockfile in data directory." ) .
Default ( "false" ) . BoolVar ( & cfg . tsdb . NoLockfile )
2017-06-20 08:38:01 -07:00
a . Flag ( "alertmanager.notification-queue-capacity" , "The capacity of the queue for pending alert manager notifications." ) .
Default ( "10000" ) . IntVar ( & cfg . notifier . QueueCapacity )
a . Flag ( "alertmanager.timeout" , "Timeout for sending alerts to Alertmanager" ) .
2017-06-20 09:48:17 -07:00
Default ( "10s" ) . SetValue ( & cfg . notifierTimeout )
2017-06-20 08:38:01 -07:00
a . Flag ( "query.lookback-delta" , "The delta difference allowed for retrieving metrics during expression evaluations." ) .
Default ( "5m" ) . SetValue ( & cfg . lookbackDelta )
a . Flag ( "query.timeout" , "Maximum time a query may take before being aborted." ) .
2017-06-20 09:48:17 -07:00
Default ( "2m" ) . SetValue ( & cfg . queryTimeout )
2017-06-20 08:38:01 -07:00
a . Flag ( "query.max-concurrency" , "Maximum number of queries executed concurrently." ) .
Default ( "20" ) . IntVar ( & cfg . queryEngine . MaxConcurrentQueries )
2017-06-20 09:48:17 -07:00
_ , err := a . Parse ( os . Args [ 1 : ] )
if err != nil {
2017-06-20 08:38:01 -07:00
a . Usage ( os . Args [ 1 : ] )
os . Exit ( 2 )
}
2017-06-20 09:48:17 -07:00
cfg . web . ExternalURL , err = computeExternalURL ( cfg . prometheusURL , cfg . web . ListenAddress )
if err != nil {
fmt . Fprintln ( os . Stderr , errors . Wrapf ( err , "parse external URL %q" , cfg . prometheusURL ) )
2017-06-20 08:38:01 -07:00
os . Exit ( 2 )
}
2017-06-20 09:48:17 -07:00
cfg . web . ReadTimeout = time . Duration ( cfg . webTimeout )
// Default -web.route-prefix to path of -web.external-url.
if cfg . web . RoutePrefix == "" {
cfg . web . RoutePrefix = cfg . web . ExternalURL . Path
}
// RoutePrefix must always be at least '/'.
cfg . web . RoutePrefix = "/" + strings . Trim ( cfg . web . RoutePrefix , "/" )
2015-06-15 03:36:32 -07:00
2017-06-20 09:48:17 -07:00
if cfg . tsdb . MaxBlockDuration == 0 {
cfg . tsdb . MaxBlockDuration = cfg . tsdb . Retention / 10
}
2015-09-01 10:18:39 -07:00
2017-06-20 09:48:17 -07:00
promql . LookbackDelta = time . Duration ( cfg . lookbackDelta )
cfg . queryEngine . Timeout = time . Duration ( cfg . queryTimeout )
2016-05-05 04:46:51 -07:00
2017-06-16 03:22:44 -07:00
logger := log . NewLogger ( os . Stdout )
logger . SetLevel ( cfg . logLevel )
logger . SetFormat ( cfg . logFormat )
logger . Infoln ( "Starting prometheus" , version . Info ( ) )
logger . Infoln ( "Build context" , version . BuildContext ( ) )
logger . Infoln ( "Host details" , Uname ( ) )
2016-05-05 04:46:51 -07:00
2015-06-15 03:36:32 -07:00
var (
2016-12-29 00:27:30 -08:00
// sampleAppender = storage.Fanout{}
reloadables [ ] Reloadable
2015-06-15 03:36:32 -07:00
)
2016-08-29 09:48:20 -07:00
2017-05-09 09:00:54 -07:00
// Make sure that sighup handler is registered with a redirect to the channel before the potentially
// long and synchronous tsdb init.
hup := make ( chan os . Signal )
hupReady := make ( chan bool )
signal . Notify ( hup , syscall . SIGHUP )
2017-06-16 03:22:44 -07:00
logger . Infoln ( "Starting tsdb" )
2017-02-28 00:33:14 -08:00
localStorage , err := tsdb . Open ( cfg . localStoragePath , prometheus . DefaultRegisterer , & cfg . tsdb )
2016-12-23 04:51:59 -08:00
if err != nil {
log . Errorf ( "Opening storage failed: %s" , err )
2017-06-20 09:48:17 -07:00
os . Exit ( 1 )
2016-12-29 00:27:30 -08:00
}
2017-06-16 03:22:44 -07:00
logger . Infoln ( "tsdb started" )
2016-12-29 00:27:30 -08:00
2017-02-28 00:43:16 -08:00
// remoteStorage := &remote.Storage{}
// sampleAppender = append(sampleAppender, remoteStorage)
// reloadables = append(reloadables, remoteStorage)
2016-09-19 13:47:51 -07:00
2017-06-16 03:22:44 -07:00
cfg . queryEngine . Logger = logger
2015-06-25 16:32:44 -07:00
var (
2017-06-16 03:22:44 -07:00
notifier = notifier . New ( & cfg . notifier , logger )
targetManager = retrieval . NewTargetManager ( localStorage , logger )
2016-09-15 15:58:06 -07:00
queryEngine = promql . NewEngine ( localStorage , & cfg . queryEngine )
ctx , cancelCtx = context . WithCancel ( context . Background ( ) )
2015-06-25 16:32:44 -07:00
)
2015-06-15 03:36:32 -07:00
ruleManager := rules . NewManager ( & rules . ManagerOptions {
2017-01-13 05:48:01 -08:00
Appendable : localStorage ,
Notifier : notifier ,
QueryEngine : queryEngine ,
Context : ctx ,
ExternalURL : cfg . web . ExternalURL ,
2017-06-16 03:22:44 -07:00
Logger : logger ,
2015-06-15 03:36:32 -07:00
} )
2016-09-15 15:58:06 -07:00
cfg . web . Context = ctx
cfg . web . Storage = localStorage
cfg . web . QueryEngine = queryEngine
cfg . web . TargetManager = targetManager
cfg . web . RuleManager = ruleManager
2016-11-23 09:23:09 -08:00
cfg . web . Notifier = notifier
2015-06-15 03:36:32 -07:00
2016-09-15 15:58:06 -07:00
cfg . web . Version = & web . PrometheusVersion {
2016-05-05 04:46:51 -07:00
Version : version . Version ,
Revision : version . Revision ,
Branch : version . Branch ,
BuildUser : version . BuildUser ,
BuildDate : version . BuildDate ,
GoVersion : version . GoVersion ,
}
2016-09-15 15:58:06 -07:00
cfg . web . Flags = map [ string ] string { }
2017-06-20 08:38:01 -07:00
for _ , f := range a . Model ( ) . Flags {
2016-09-15 15:58:06 -07:00
cfg . web . Flags [ f . Name ] = f . Value . String ( )
2017-06-20 08:38:01 -07:00
}
2016-09-15 15:58:06 -07:00
webHandler := web . New ( & cfg . web )
2015-06-15 03:36:32 -07:00
2016-05-13 08:59:59 -07:00
reloadables = append ( reloadables , targetManager , ruleManager , webHandler , notifier )
2015-09-01 09:47:48 -07:00
2017-06-16 03:22:44 -07:00
if err := reloadConfig ( cfg . configFile , logger , reloadables ... ) ; err != nil {
logger . Errorf ( "Error loading config: %s" , err )
2017-06-20 09:48:17 -07:00
os . Exit ( 1 )
2015-06-15 03:36:32 -07:00
}
// Wait for reload or termination signals. Start the handler for SIGHUP as
// early as possible, but ignore it until we are ready to handle reloading
// our config.
go func ( ) {
<- hupReady
2015-08-11 00:08:17 -07:00
for {
select {
case <- hup :
2017-06-16 03:22:44 -07:00
if err := reloadConfig ( cfg . configFile , logger , reloadables ... ) ; err != nil {
logger . Errorf ( "Error reloading config: %s" , err )
2016-07-11 07:24:54 -07:00
}
case rc := <- webHandler . Reload ( ) :
2017-06-16 03:22:44 -07:00
if err := reloadConfig ( cfg . configFile , logger , reloadables ... ) ; err != nil {
logger . Errorf ( "Error reloading config: %s" , err )
2016-07-11 07:24:54 -07:00
rc <- err
} else {
rc <- nil
}
2015-08-11 00:08:17 -07:00
}
2015-06-15 03:36:32 -07:00
}
} ( )
2016-01-18 07:47:31 -08:00
// Start all components. The order is NOT arbitrary.
2015-06-15 03:36:32 -07:00
defer func ( ) {
2016-12-29 00:27:30 -08:00
if err := localStorage . Close ( ) ; err != nil {
2017-06-16 03:22:44 -07:00
logger . Errorln ( "Error stopping storage:" , err )
2015-06-15 03:36:32 -07:00
}
} ( )
2017-02-28 00:43:16 -08:00
// defer remoteStorage.Stop()
2016-09-19 13:47:51 -07:00
2015-09-01 10:18:39 -07:00
prometheus . MustRegister ( configSuccess )
prometheus . MustRegister ( configSuccessTime )
2015-06-15 03:36:32 -07:00
2016-09-21 13:59:25 -07:00
// The notifier is a dependency of the rule manager. It has to be
2016-01-18 07:47:31 -08:00
// started before and torn down afterwards.
2016-03-01 03:37:22 -08:00
go notifier . Run ( )
defer notifier . Stop ( )
2015-06-15 03:36:32 -07:00
2016-01-18 07:47:31 -08:00
go ruleManager . Run ( )
defer ruleManager . Stop ( )
2015-06-15 03:36:32 -07:00
go targetManager . Run ( )
defer targetManager . Stop ( )
2016-01-18 07:47:31 -08:00
// Shutting down the query engine before the rule manager will cause pending queries
// to be canceled and ensures a quick shutdown of the rule manager.
2016-09-15 15:58:06 -07:00
defer cancelCtx ( )
2015-06-15 03:36:32 -07:00
go webHandler . Run ( )
// Wait for reload or termination signals.
close ( hupReady ) // Unblock SIGHUP handler.
term := make ( chan os . Signal )
signal . Notify ( term , os . Interrupt , syscall . SIGTERM )
select {
case <- term :
2017-06-16 03:22:44 -07:00
logger . Warn ( "Received SIGTERM, exiting gracefully..." )
2015-06-15 03:36:32 -07:00
case <- webHandler . Quit ( ) :
2017-06-16 03:22:44 -07:00
logger . Warn ( "Received termination request via web service, exiting gracefully..." )
2015-08-20 09:23:57 -07:00
case err := <- webHandler . ListenError ( ) :
2017-06-16 03:22:44 -07:00
logger . Errorln ( "Error starting web server, exiting gracefully:" , err )
2015-06-15 03:36:32 -07:00
}
2017-06-16 03:22:44 -07:00
logger . Info ( "See you next time!" )
2015-06-15 03:36:32 -07:00
}
// Reloadable things can change their internal state to match a new config
// and handle failure gracefully.
type Reloadable interface {
2016-07-11 07:24:54 -07:00
ApplyConfig ( * config . Config ) error
2015-06-15 03:36:32 -07:00
}
2017-06-16 03:22:44 -07:00
func reloadConfig ( filename string , logger log . Logger , rls ... Reloadable ) ( err error ) {
logger . Infof ( "Loading configuration file %s" , filename )
2015-09-01 10:18:39 -07:00
defer func ( ) {
2016-07-11 07:24:54 -07:00
if err == nil {
2015-09-01 10:18:39 -07:00
configSuccess . Set ( 1 )
configSuccessTime . Set ( float64 ( time . Now ( ) . Unix ( ) ) )
} else {
configSuccess . Set ( 0 )
}
} ( )
2015-06-15 03:36:32 -07:00
2015-08-05 09:30:37 -07:00
conf , err := config . LoadFile ( filename )
2015-06-15 03:36:32 -07:00
if err != nil {
2016-07-11 07:24:54 -07:00
return fmt . Errorf ( "couldn't load configuration (-config.file=%s): %v" , filename , err )
2015-06-15 03:36:32 -07:00
}
2016-08-11 18:23:18 -07:00
failed := false
2015-06-15 03:36:32 -07:00
for _ , rl := range rls {
2016-08-11 18:23:18 -07:00
if err := rl . ApplyConfig ( conf ) ; err != nil {
2017-06-16 03:22:44 -07:00
logger . Error ( "Failed to apply configuration: " , err )
2016-08-11 18:23:18 -07:00
failed = true
2016-07-11 07:24:54 -07:00
}
2015-06-15 03:36:32 -07:00
}
2016-08-11 18:23:18 -07:00
if failed {
2016-09-14 20:23:28 -07:00
return fmt . Errorf ( "one or more errors occurred while applying the new configuration (-config.file=%s)" , filename )
2016-08-11 18:23:18 -07:00
}
return nil
2015-06-15 03:36:32 -07:00
}
2017-06-20 09:48:17 -07:00
// computeExternalURL computes a sanitized external URL from a raw input. It infers unset
// URL parts from the OS and the given listen address.
func computeExternalURL ( u , listenAddr string ) ( * url . URL , error ) {
if u == "" {
hostname , err := os . Hostname ( )
if err != nil {
return nil , err
}
_ , port , err := net . SplitHostPort ( listenAddr )
if err != nil {
return nil , err
}
u = fmt . Sprintf ( "http://%s:%s/" , hostname , port )
}
if ok := govalidator . IsURL ( u ) ; ! ok {
return nil , fmt . Errorf ( "invalid external URL %q" , u )
}
eu , err := url . Parse ( u )
if err != nil {
return nil , err
}
ppref := strings . TrimRight ( eu . Path , "/" )
if ppref != "" && ! strings . HasPrefix ( ppref , "/" ) {
ppref = "/" + ppref
}
eu . Path = ppref
return eu , nil
}