2015-08-20 04:03:56 -07:00
|
|
|
// Copyright 2015 The Prometheus Authors
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
2013-01-07 14:24:26 -08:00
|
|
|
package config
|
|
|
|
|
|
|
|
import (
|
2015-05-13 03:03:31 -07:00
|
|
|
"encoding/json"
|
2013-01-07 14:24:26 -08:00
|
|
|
"fmt"
|
2015-05-07 01:55:03 -07:00
|
|
|
"io/ioutil"
|
2015-06-22 13:35:19 -07:00
|
|
|
"net/url"
|
2015-08-05 09:04:34 -07:00
|
|
|
"path/filepath"
|
2013-04-30 11:20:14 -07:00
|
|
|
"regexp"
|
2015-04-20 03:24:25 -07:00
|
|
|
"strings"
|
2013-01-07 14:24:26 -08:00
|
|
|
"time"
|
2014-12-10 08:46:56 -08:00
|
|
|
|
2015-08-20 08:18:46 -07:00
|
|
|
"github.com/prometheus/common/model"
|
2015-08-22 00:42:45 -07:00
|
|
|
"gopkg.in/yaml.v2"
|
2013-01-07 14:24:26 -08:00
|
|
|
)
|
|
|
|
|
2015-05-13 02:28:04 -07:00
|
|
|
var (
|
|
|
|
patJobName = regexp.MustCompile(`^[a-zA-Z_][a-zA-Z0-9_-]*$`)
|
2015-05-13 03:03:31 -07:00
|
|
|
patFileSDName = regexp.MustCompile(`^[^*]*(\*[^/]*)?\.(json|yml|yaml|JSON|YML|YAML)$`)
|
2015-05-27 22:36:21 -07:00
|
|
|
patRulePath = regexp.MustCompile(`^[^*]*(\*[^/]*)?$`)
|
2016-04-06 20:47:02 -07:00
|
|
|
patAuthLine = regexp.MustCompile(`((?:password|bearer_token|secret_key|client_secret):\s+)(".+"|'.+'|[^\s]+)`)
|
2015-05-13 02:28:04 -07:00
|
|
|
)
|
2013-01-07 14:24:26 -08:00
|
|
|
|
2015-05-07 01:55:03 -07:00
|
|
|
// Load parses the YAML input s into a Config.
|
|
|
|
func Load(s string) (*Config, error) {
|
2015-06-23 10:40:44 -07:00
|
|
|
cfg := &Config{}
|
2015-07-17 07:12:33 -07:00
|
|
|
// If the entire config body is empty the UnmarshalYAML method is
|
|
|
|
// never called. We thus have to set the DefaultConfig at the entry
|
|
|
|
// point as well.
|
|
|
|
*cfg = DefaultConfig
|
|
|
|
|
2015-05-07 01:55:03 -07:00
|
|
|
err := yaml.Unmarshal([]byte(s), cfg)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2015-06-23 10:40:44 -07:00
|
|
|
cfg.original = s
|
2015-05-07 01:55:03 -07:00
|
|
|
return cfg, nil
|
2013-01-07 14:24:26 -08:00
|
|
|
}
|
|
|
|
|
2015-08-05 09:30:37 -07:00
|
|
|
// LoadFile parses the given YAML file into a Config.
|
|
|
|
func LoadFile(filename string) (*Config, error) {
|
2015-05-07 01:55:03 -07:00
|
|
|
content, err := ioutil.ReadFile(filename)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2015-08-05 09:04:34 -07:00
|
|
|
cfg, err := Load(string(content))
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
resolveFilepaths(filepath.Dir(filename), cfg)
|
|
|
|
return cfg, nil
|
2013-01-07 14:24:26 -08:00
|
|
|
}
|
|
|
|
|
2015-05-07 01:55:03 -07:00
|
|
|
// The defaults applied before parsing the respective config sections.
|
|
|
|
var (
|
2015-08-24 06:07:27 -07:00
|
|
|
// DefaultConfig is the default top-level configuration.
|
2015-06-04 08:03:12 -07:00
|
|
|
DefaultConfig = Config{
|
2015-06-07 08:40:22 -07:00
|
|
|
GlobalConfig: DefaultGlobalConfig,
|
2013-04-30 11:20:14 -07:00
|
|
|
}
|
2015-05-07 01:55:03 -07:00
|
|
|
|
2015-08-24 06:07:27 -07:00
|
|
|
// DefaultGlobalConfig is the default global configuration.
|
2015-06-04 08:03:12 -07:00
|
|
|
DefaultGlobalConfig = GlobalConfig{
|
2016-01-29 06:23:11 -08:00
|
|
|
ScrapeInterval: model.Duration(1 * time.Minute),
|
|
|
|
ScrapeTimeout: model.Duration(10 * time.Second),
|
|
|
|
EvaluationInterval: model.Duration(1 * time.Minute),
|
2013-01-07 14:24:26 -08:00
|
|
|
}
|
|
|
|
|
2015-08-24 06:07:27 -07:00
|
|
|
// DefaultScrapeConfig is the default scrape configuration.
|
2015-06-04 08:03:12 -07:00
|
|
|
DefaultScrapeConfig = ScrapeConfig{
|
2015-05-07 01:55:03 -07:00
|
|
|
// ScrapeTimeout and ScrapeInterval default to the
|
|
|
|
// configured globals.
|
|
|
|
MetricsPath: "/metrics",
|
|
|
|
Scheme: "http",
|
2015-06-22 13:35:19 -07:00
|
|
|
HonorLabels: false,
|
2015-04-20 03:24:25 -07:00
|
|
|
}
|
2015-05-07 01:55:03 -07:00
|
|
|
|
2015-08-24 06:07:27 -07:00
|
|
|
// DefaultRelabelConfig is the default Relabel configuration.
|
2015-06-04 08:03:12 -07:00
|
|
|
DefaultRelabelConfig = RelabelConfig{
|
2015-11-16 04:16:13 -08:00
|
|
|
Action: RelabelReplace,
|
|
|
|
Separator: ";",
|
|
|
|
Regex: MustNewRegexp("(.*)"),
|
|
|
|
Replacement: "$1",
|
2015-04-20 03:24:25 -07:00
|
|
|
}
|
|
|
|
|
2015-08-24 06:07:27 -07:00
|
|
|
// DefaultDNSSDConfig is the default DNS SD configuration.
|
2015-06-04 08:03:12 -07:00
|
|
|
DefaultDNSSDConfig = DNSSDConfig{
|
2016-01-29 06:23:11 -08:00
|
|
|
RefreshInterval: model.Duration(30 * time.Second),
|
2015-07-30 01:56:48 -07:00
|
|
|
Type: "SRV",
|
2013-01-07 14:24:26 -08:00
|
|
|
}
|
2015-05-13 02:28:04 -07:00
|
|
|
|
2015-08-24 06:07:27 -07:00
|
|
|
// DefaultFileSDConfig is the default file SD configuration.
|
2015-06-04 08:03:12 -07:00
|
|
|
DefaultFileSDConfig = FileSDConfig{
|
2016-01-29 06:23:11 -08:00
|
|
|
RefreshInterval: model.Duration(5 * time.Minute),
|
2015-05-13 02:28:04 -07:00
|
|
|
}
|
2015-05-14 04:32:11 -07:00
|
|
|
|
2015-08-24 06:07:27 -07:00
|
|
|
// DefaultConsulSDConfig is the default Consul SD configuration.
|
2015-06-04 08:03:12 -07:00
|
|
|
DefaultConsulSDConfig = ConsulSDConfig{
|
2015-05-14 04:32:11 -07:00
|
|
|
TagSeparator: ",",
|
|
|
|
Scheme: "http",
|
|
|
|
}
|
2015-06-09 04:25:30 -07:00
|
|
|
|
2015-08-24 06:07:27 -07:00
|
|
|
// DefaultServersetSDConfig is the default Serverset SD configuration.
|
2015-06-09 04:25:30 -07:00
|
|
|
DefaultServersetSDConfig = ServersetSDConfig{
|
2016-01-29 06:23:11 -08:00
|
|
|
Timeout: model.Duration(10 * time.Second),
|
2015-06-09 04:25:30 -07:00
|
|
|
}
|
2015-07-16 05:02:07 -07:00
|
|
|
|
2016-01-09 15:34:32 -08:00
|
|
|
// DefaultNerveSDConfig is the default Nerve SD configuration.
|
|
|
|
DefaultNerveSDConfig = NerveSDConfig{
|
2016-01-29 06:23:11 -08:00
|
|
|
Timeout: model.Duration(10 * time.Second),
|
2016-01-09 15:34:32 -08:00
|
|
|
}
|
|
|
|
|
2015-07-16 05:02:07 -07:00
|
|
|
// DefaultMarathonSDConfig is the default Marathon SD configuration.
|
|
|
|
DefaultMarathonSDConfig = MarathonSDConfig{
|
2016-01-29 06:23:11 -08:00
|
|
|
RefreshInterval: model.Duration(30 * time.Second),
|
2015-07-16 05:02:07 -07:00
|
|
|
}
|
2015-07-18 14:23:58 -07:00
|
|
|
|
2015-08-24 06:07:27 -07:00
|
|
|
// DefaultKubernetesSDConfig is the default Kubernetes SD configuration
|
2015-07-18 14:23:58 -07:00
|
|
|
DefaultKubernetesSDConfig = KubernetesSDConfig{
|
|
|
|
KubeletPort: 10255,
|
2016-01-29 06:23:11 -08:00
|
|
|
RequestTimeout: model.Duration(10 * time.Second),
|
|
|
|
RetryInterval: model.Duration(1 * time.Second),
|
2015-07-18 14:23:58 -07:00
|
|
|
}
|
2015-09-21 11:49:19 -07:00
|
|
|
|
|
|
|
// DefaultEC2SDConfig is the default EC2 SD configuration.
|
|
|
|
DefaultEC2SDConfig = EC2SDConfig{
|
|
|
|
Port: 80,
|
2016-01-29 06:23:11 -08:00
|
|
|
RefreshInterval: model.Duration(60 * time.Second),
|
2015-09-21 11:49:19 -07:00
|
|
|
}
|
2016-04-06 20:47:02 -07:00
|
|
|
|
|
|
|
// DefaultAzureSDConfig is the default Azure SD configuration.
|
|
|
|
DefaultAzureSDConfig = AzureSDConfig{
|
|
|
|
Port: 80,
|
|
|
|
RefreshInterval: model.Duration(5 * time.Minute),
|
|
|
|
}
|
2015-05-07 01:55:03 -07:00
|
|
|
)
|
|
|
|
|
2015-08-24 06:07:27 -07:00
|
|
|
// URL is a custom URL type that allows validation at configuration load time.
|
2015-08-06 09:12:55 -07:00
|
|
|
type URL struct {
|
|
|
|
*url.URL
|
|
|
|
}
|
|
|
|
|
|
|
|
// UnmarshalYAML implements the yaml.Unmarshaler interface for URLs.
|
|
|
|
func (u *URL) UnmarshalYAML(unmarshal func(interface{}) error) error {
|
|
|
|
var s string
|
|
|
|
if err := unmarshal(&s); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
urlp, err := url.Parse(s)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
u.URL = urlp
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// MarshalYAML implements the yaml.Marshaler interface for URLs.
|
|
|
|
func (u URL) MarshalYAML() (interface{}, error) {
|
|
|
|
if u.URL != nil {
|
|
|
|
return u.String(), nil
|
|
|
|
}
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
2015-05-07 01:55:03 -07:00
|
|
|
// Config is the top-level configuration for Prometheus's config files.
|
|
|
|
type Config struct {
|
2015-06-07 08:40:22 -07:00
|
|
|
GlobalConfig GlobalConfig `yaml:"global"`
|
2015-06-04 08:03:12 -07:00
|
|
|
RuleFiles []string `yaml:"rule_files,omitempty"`
|
|
|
|
ScrapeConfigs []*ScrapeConfig `yaml:"scrape_configs,omitempty"`
|
2015-05-07 01:55:03 -07:00
|
|
|
|
2015-06-12 04:39:59 -07:00
|
|
|
// Catches all undefined fields and must be empty after parsing.
|
|
|
|
XXX map[string]interface{} `yaml:",inline"`
|
|
|
|
|
2015-05-07 01:55:03 -07:00
|
|
|
// original is the input from which the config was parsed.
|
|
|
|
original string
|
|
|
|
}
|
|
|
|
|
2015-08-05 09:04:34 -07:00
|
|
|
// resolveFilepaths joins all relative paths in a configuration
|
|
|
|
// with a given base directory.
|
|
|
|
func resolveFilepaths(baseDir string, cfg *Config) {
|
|
|
|
join := func(fp string) string {
|
|
|
|
if len(fp) > 0 && !filepath.IsAbs(fp) {
|
|
|
|
fp = filepath.Join(baseDir, fp)
|
|
|
|
}
|
|
|
|
return fp
|
|
|
|
}
|
|
|
|
|
|
|
|
for i, rf := range cfg.RuleFiles {
|
|
|
|
cfg.RuleFiles[i] = join(rf)
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, scfg := range cfg.ScrapeConfigs {
|
|
|
|
scfg.BearerTokenFile = join(scfg.BearerTokenFile)
|
2015-09-06 16:07:44 -07:00
|
|
|
scfg.TLSConfig.CAFile = join(scfg.TLSConfig.CAFile)
|
|
|
|
scfg.TLSConfig.CertFile = join(scfg.TLSConfig.CertFile)
|
|
|
|
scfg.TLSConfig.KeyFile = join(scfg.TLSConfig.KeyFile)
|
|
|
|
|
|
|
|
for _, kcfg := range scfg.KubernetesSDConfigs {
|
|
|
|
kcfg.BearerTokenFile = join(kcfg.BearerTokenFile)
|
|
|
|
kcfg.TLSConfig.CAFile = join(kcfg.TLSConfig.CAFile)
|
|
|
|
kcfg.TLSConfig.CertFile = join(kcfg.TLSConfig.CertFile)
|
|
|
|
kcfg.TLSConfig.KeyFile = join(kcfg.TLSConfig.KeyFile)
|
2015-08-05 09:04:34 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-06-12 04:39:59 -07:00
|
|
|
func checkOverflow(m map[string]interface{}, ctx string) error {
|
|
|
|
if len(m) > 0 {
|
|
|
|
var keys []string
|
|
|
|
for k := range m {
|
|
|
|
keys = append(keys, k)
|
|
|
|
}
|
|
|
|
return fmt.Errorf("unknown fields in %s: %s", ctx, strings.Join(keys, ", "))
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-05-07 07:47:18 -07:00
|
|
|
func (c Config) String() string {
|
2015-07-06 05:25:20 -07:00
|
|
|
var s string
|
2015-05-07 01:55:03 -07:00
|
|
|
if c.original != "" {
|
2015-07-06 05:25:20 -07:00
|
|
|
s = c.original
|
|
|
|
} else {
|
|
|
|
b, err := yaml.Marshal(c)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Sprintf("<error creating config string: %s>", err)
|
|
|
|
}
|
|
|
|
s = string(b)
|
2013-01-07 14:24:26 -08:00
|
|
|
}
|
2015-07-06 05:25:20 -07:00
|
|
|
return patAuthLine.ReplaceAllString(s, "${1}<hidden>")
|
2015-05-07 01:55:03 -07:00
|
|
|
}
|
2013-04-30 11:20:14 -07:00
|
|
|
|
2015-05-27 18:12:42 -07:00
|
|
|
// UnmarshalYAML implements the yaml.Unmarshaler interface.
|
2015-05-07 01:55:03 -07:00
|
|
|
func (c *Config) UnmarshalYAML(unmarshal func(interface{}) error) error {
|
2015-06-04 08:03:12 -07:00
|
|
|
*c = DefaultConfig
|
|
|
|
// We want to set c to the defaults and then overwrite it with the input.
|
|
|
|
// To make unmarshal fill the plain data struct rather than calling UnmarshalYAML
|
|
|
|
// again, we have to hide it using a type indirection.
|
|
|
|
type plain Config
|
|
|
|
if err := unmarshal((*plain)(c)); err != nil {
|
2015-05-07 01:55:03 -07:00
|
|
|
return err
|
|
|
|
}
|
2015-07-17 10:58:34 -07:00
|
|
|
// If a global block was open but empty the default global config is overwritten.
|
|
|
|
// We have to restore it here.
|
|
|
|
if c.GlobalConfig.isZero() {
|
|
|
|
c.GlobalConfig = DefaultGlobalConfig
|
|
|
|
}
|
|
|
|
|
2015-05-27 22:36:21 -07:00
|
|
|
for _, rf := range c.RuleFiles {
|
|
|
|
if !patRulePath.MatchString(rf) {
|
|
|
|
return fmt.Errorf("invalid rule file path %q", rf)
|
|
|
|
}
|
|
|
|
}
|
2015-05-07 01:55:03 -07:00
|
|
|
// Do global overrides and validate unique names.
|
2015-04-25 03:59:05 -07:00
|
|
|
jobNames := map[string]struct{}{}
|
2015-05-07 01:55:03 -07:00
|
|
|
for _, scfg := range c.ScrapeConfigs {
|
2016-02-15 02:08:49 -08:00
|
|
|
// First set the correct scrape interval, then check that the timeout
|
|
|
|
// (inferred or explicit) is not greater than that.
|
2015-05-07 01:55:03 -07:00
|
|
|
if scfg.ScrapeInterval == 0 {
|
|
|
|
scfg.ScrapeInterval = c.GlobalConfig.ScrapeInterval
|
|
|
|
}
|
2016-02-12 03:51:55 -08:00
|
|
|
if scfg.ScrapeTimeout > scfg.ScrapeInterval {
|
|
|
|
return fmt.Errorf("scrape timeout greater than scrape interval for scrape config with job name %q", scfg.JobName)
|
|
|
|
}
|
2016-02-15 02:08:49 -08:00
|
|
|
if scfg.ScrapeTimeout == 0 {
|
|
|
|
if c.GlobalConfig.ScrapeTimeout > scfg.ScrapeInterval {
|
|
|
|
scfg.ScrapeTimeout = scfg.ScrapeInterval
|
|
|
|
} else {
|
|
|
|
scfg.ScrapeTimeout = c.GlobalConfig.ScrapeTimeout
|
|
|
|
}
|
|
|
|
}
|
2013-01-07 14:24:26 -08:00
|
|
|
|
2015-05-07 01:55:03 -07:00
|
|
|
if _, ok := jobNames[scfg.JobName]; ok {
|
|
|
|
return fmt.Errorf("found multiple scrape configs with job name %q", scfg.JobName)
|
2013-02-22 12:07:35 -08:00
|
|
|
}
|
2015-05-07 01:55:03 -07:00
|
|
|
jobNames[scfg.JobName] = struct{}{}
|
2013-02-22 12:07:35 -08:00
|
|
|
}
|
2015-06-12 04:39:59 -07:00
|
|
|
return checkOverflow(c.XXX, "config")
|
2013-02-22 12:07:35 -08:00
|
|
|
}
|
|
|
|
|
2015-05-07 07:47:18 -07:00
|
|
|
// GlobalConfig configures values that are used across other configuration
|
2015-05-07 01:55:03 -07:00
|
|
|
// objects.
|
|
|
|
type GlobalConfig struct {
|
|
|
|
// How frequently to scrape targets by default.
|
2016-01-29 06:23:11 -08:00
|
|
|
ScrapeInterval model.Duration `yaml:"scrape_interval,omitempty"`
|
2015-05-07 01:55:03 -07:00
|
|
|
// The default timeout when scraping targets.
|
2016-01-29 06:23:11 -08:00
|
|
|
ScrapeTimeout model.Duration `yaml:"scrape_timeout,omitempty"`
|
2015-05-07 01:55:03 -07:00
|
|
|
// How frequently to evaluate rules by default.
|
2016-01-29 06:23:11 -08:00
|
|
|
EvaluationInterval model.Duration `yaml:"evaluation_interval,omitempty"`
|
2015-05-07 01:55:03 -07:00
|
|
|
// The labels to add to any timeseries that this Prometheus instance scrapes.
|
2015-09-29 08:51:03 -07:00
|
|
|
ExternalLabels model.LabelSet `yaml:"external_labels,omitempty"`
|
2015-06-12 04:39:59 -07:00
|
|
|
|
|
|
|
// Catches all undefined fields and must be empty after parsing.
|
|
|
|
XXX map[string]interface{} `yaml:",inline"`
|
2013-01-07 14:24:26 -08:00
|
|
|
}
|
|
|
|
|
2015-05-27 18:12:42 -07:00
|
|
|
// UnmarshalYAML implements the yaml.Unmarshaler interface.
|
2015-06-04 08:03:12 -07:00
|
|
|
func (c *GlobalConfig) UnmarshalYAML(unmarshal func(interface{}) error) error {
|
2016-02-15 05:08:25 -08:00
|
|
|
// Create a clean global config as the previous one was already populated
|
|
|
|
// by the default due to the YAML parser behavior for empty blocks.
|
|
|
|
gc := &GlobalConfig{}
|
|
|
|
type plain GlobalConfig
|
|
|
|
if err := unmarshal((*plain)(gc)); err != nil {
|
2015-05-07 01:55:03 -07:00
|
|
|
return err
|
|
|
|
}
|
2016-02-15 02:08:49 -08:00
|
|
|
// First set the correct scrape interval, then check that the timeout
|
|
|
|
// (inferred or explicit) is not greater than that.
|
2016-02-15 05:08:25 -08:00
|
|
|
if gc.ScrapeInterval == 0 {
|
|
|
|
gc.ScrapeInterval = DefaultGlobalConfig.ScrapeInterval
|
2016-02-15 02:08:49 -08:00
|
|
|
}
|
2016-02-15 05:08:25 -08:00
|
|
|
if gc.ScrapeTimeout > gc.ScrapeInterval {
|
2016-02-15 02:08:49 -08:00
|
|
|
return fmt.Errorf("global scrape timeout greater than scrape interval")
|
|
|
|
}
|
2016-02-15 05:08:25 -08:00
|
|
|
if gc.ScrapeTimeout == 0 {
|
|
|
|
if DefaultGlobalConfig.ScrapeTimeout > gc.ScrapeInterval {
|
|
|
|
gc.ScrapeTimeout = gc.ScrapeInterval
|
2016-02-15 02:08:49 -08:00
|
|
|
} else {
|
2016-02-15 05:08:25 -08:00
|
|
|
gc.ScrapeTimeout = DefaultGlobalConfig.ScrapeTimeout
|
2016-02-15 02:08:49 -08:00
|
|
|
}
|
|
|
|
}
|
2016-02-15 05:08:25 -08:00
|
|
|
if gc.EvaluationInterval == 0 {
|
|
|
|
gc.EvaluationInterval = DefaultGlobalConfig.EvaluationInterval
|
2016-02-15 02:08:49 -08:00
|
|
|
}
|
2016-02-15 05:08:25 -08:00
|
|
|
*c = *gc
|
|
|
|
|
2015-06-12 04:39:59 -07:00
|
|
|
return checkOverflow(c.XXX, "global config")
|
2013-01-07 14:24:26 -08:00
|
|
|
}
|
2013-08-16 09:17:48 -07:00
|
|
|
|
2015-07-17 10:58:34 -07:00
|
|
|
// isZero returns true iff the global config is the zero value.
|
|
|
|
func (c *GlobalConfig) isZero() bool {
|
2015-09-29 08:51:03 -07:00
|
|
|
return c.ExternalLabels == nil &&
|
2015-07-17 10:58:34 -07:00
|
|
|
c.ScrapeInterval == 0 &&
|
|
|
|
c.ScrapeTimeout == 0 &&
|
|
|
|
c.EvaluationInterval == 0
|
|
|
|
}
|
|
|
|
|
2015-09-06 16:07:44 -07:00
|
|
|
// TLSConfig configures the options for TLS connections.
|
|
|
|
type TLSConfig struct {
|
|
|
|
// The CA cert to use for the targets.
|
|
|
|
CAFile string `yaml:"ca_file,omitempty"`
|
|
|
|
// The client cert file for the targets.
|
|
|
|
CertFile string `yaml:"cert_file,omitempty"`
|
|
|
|
// The client key file for the targets.
|
|
|
|
KeyFile string `yaml:"key_file,omitempty"`
|
|
|
|
// Disable target certificate validation.
|
|
|
|
InsecureSkipVerify bool `yaml:"insecure_skip_verify"`
|
2015-10-24 08:12:34 -07:00
|
|
|
|
|
|
|
// Catches all undefined fields and must be empty after parsing.
|
|
|
|
XXX map[string]interface{} `yaml:",inline"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// UnmarshalYAML implements the yaml.Unmarshaler interface.
|
|
|
|
func (c *TLSConfig) UnmarshalYAML(unmarshal func(interface{}) error) error {
|
|
|
|
type plain TLSConfig
|
|
|
|
if err := unmarshal((*plain)(c)); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return checkOverflow(c.XXX, "TLS config")
|
2015-09-06 16:07:44 -07:00
|
|
|
}
|
|
|
|
|
2015-06-04 08:03:12 -07:00
|
|
|
// ScrapeConfig configures a scraping unit for Prometheus.
|
|
|
|
type ScrapeConfig struct {
|
2015-05-07 01:55:03 -07:00
|
|
|
// The job name to which the job label is set by default.
|
|
|
|
JobName string `yaml:"job_name"`
|
2015-06-22 13:35:19 -07:00
|
|
|
// Indicator whether the scraped metrics should remain unmodified.
|
|
|
|
HonorLabels bool `yaml:"honor_labels,omitempty"`
|
|
|
|
// A set of query parameters with which the target is scraped.
|
|
|
|
Params url.Values `yaml:"params,omitempty"`
|
2015-05-07 01:55:03 -07:00
|
|
|
// How frequently to scrape the targets of this scrape config.
|
2016-01-29 06:23:11 -08:00
|
|
|
ScrapeInterval model.Duration `yaml:"scrape_interval,omitempty"`
|
2015-05-07 01:55:03 -07:00
|
|
|
// The timeout for scraping targets of this config.
|
2016-01-29 06:23:11 -08:00
|
|
|
ScrapeTimeout model.Duration `yaml:"scrape_timeout,omitempty"`
|
2015-05-07 01:55:03 -07:00
|
|
|
// The HTTP resource path on which to fetch metrics from targets.
|
2015-05-07 07:47:18 -07:00
|
|
|
MetricsPath string `yaml:"metrics_path,omitempty"`
|
2015-05-07 01:55:03 -07:00
|
|
|
// The URL scheme with which to fetch metrics from targets.
|
2015-05-07 07:47:18 -07:00
|
|
|
Scheme string `yaml:"scheme,omitempty"`
|
2015-05-15 03:47:50 -07:00
|
|
|
// The HTTP basic authentication credentials for the targets.
|
2015-06-12 04:39:59 -07:00
|
|
|
BasicAuth *BasicAuth `yaml:"basic_auth,omitempty"`
|
2015-07-22 08:48:22 -07:00
|
|
|
// The bearer token for the targets.
|
|
|
|
BearerToken string `yaml:"bearer_token,omitempty"`
|
|
|
|
// The bearer token file for the targets.
|
|
|
|
BearerTokenFile string `yaml:"bearer_token_file,omitempty"`
|
2015-08-06 09:12:55 -07:00
|
|
|
// HTTP proxy server to use to connect to the targets.
|
|
|
|
ProxyURL URL `yaml:"proxy_url,omitempty"`
|
2015-09-09 05:08:05 -07:00
|
|
|
// TLSConfig to use to connect to the targets.
|
2015-09-06 16:07:44 -07:00
|
|
|
TLSConfig TLSConfig `yaml:"tls_config,omitempty"`
|
2015-05-07 01:55:03 -07:00
|
|
|
|
|
|
|
// List of labeled target groups for this job.
|
|
|
|
TargetGroups []*TargetGroup `yaml:"target_groups,omitempty"`
|
|
|
|
// List of DNS service discovery configurations.
|
2015-05-07 07:47:18 -07:00
|
|
|
DNSSDConfigs []*DNSSDConfig `yaml:"dns_sd_configs,omitempty"`
|
2015-05-13 02:28:04 -07:00
|
|
|
// List of file service discovery configurations.
|
|
|
|
FileSDConfigs []*FileSDConfig `yaml:"file_sd_configs,omitempty"`
|
2015-05-14 04:32:11 -07:00
|
|
|
// List of Consul service discovery configurations.
|
|
|
|
ConsulSDConfigs []*ConsulSDConfig `yaml:"consul_sd_configs,omitempty"`
|
2015-06-09 04:25:30 -07:00
|
|
|
// List of Serverset service discovery configurations.
|
|
|
|
ServersetSDConfigs []*ServersetSDConfig `yaml:"serverset_sd_configs,omitempty"`
|
2016-01-09 15:34:32 -08:00
|
|
|
// NerveSDConfigs is a list of Nerve service discovery configurations.
|
|
|
|
NerveSDConfigs []*NerveSDConfig `yaml:"nerve_sd_configs,omitempty"`
|
2015-07-16 05:02:07 -07:00
|
|
|
// MarathonSDConfigs is a list of Marathon service discovery configurations.
|
|
|
|
MarathonSDConfigs []*MarathonSDConfig `yaml:"marathon_sd_configs,omitempty"`
|
2015-07-18 14:23:58 -07:00
|
|
|
// List of Kubernetes service discovery configurations.
|
|
|
|
KubernetesSDConfigs []*KubernetesSDConfig `yaml:"kubernetes_sd_configs,omitempty"`
|
2015-09-21 11:49:19 -07:00
|
|
|
// List of EC2 service discovery configurations.
|
|
|
|
EC2SDConfigs []*EC2SDConfig `yaml:"ec2_sd_configs,omitempty"`
|
2016-04-06 20:47:02 -07:00
|
|
|
// List of Azure service discovery configurations.
|
|
|
|
AzureSDConfigs []*AzureSDConfig `yaml:"azure_sd_configs,omitempty"`
|
2015-06-09 04:25:30 -07:00
|
|
|
|
2015-06-12 14:16:13 -07:00
|
|
|
// List of target relabel configurations.
|
2015-05-07 01:55:03 -07:00
|
|
|
RelabelConfigs []*RelabelConfig `yaml:"relabel_configs,omitempty"`
|
2015-06-12 14:16:13 -07:00
|
|
|
// List of metric relabel configurations.
|
|
|
|
MetricRelabelConfigs []*RelabelConfig `yaml:"metric_relabel_configs,omitempty"`
|
2015-06-12 04:39:59 -07:00
|
|
|
|
|
|
|
// Catches all undefined fields and must be empty after parsing.
|
|
|
|
XXX map[string]interface{} `yaml:",inline"`
|
2013-08-16 09:17:48 -07:00
|
|
|
}
|
2015-04-20 03:24:25 -07:00
|
|
|
|
2015-06-04 08:03:12 -07:00
|
|
|
// UnmarshalYAML implements the yaml.Unmarshaler interface.
|
|
|
|
func (c *ScrapeConfig) UnmarshalYAML(unmarshal func(interface{}) error) error {
|
|
|
|
*c = DefaultScrapeConfig
|
|
|
|
type plain ScrapeConfig
|
|
|
|
err := unmarshal((*plain)(c))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if !patJobName.MatchString(c.JobName) {
|
|
|
|
return fmt.Errorf("%q is not a valid job name", c.JobName)
|
|
|
|
}
|
2015-07-22 08:48:22 -07:00
|
|
|
if len(c.BearerToken) > 0 && len(c.BearerTokenFile) > 0 {
|
|
|
|
return fmt.Errorf("at most one of bearer_token & bearer_token_file must be configured")
|
|
|
|
}
|
|
|
|
if c.BasicAuth != nil && (len(c.BearerToken) > 0 || len(c.BearerTokenFile) > 0) {
|
|
|
|
return fmt.Errorf("at most one of basic_auth, bearer_token & bearer_token_file must be configured")
|
|
|
|
}
|
2015-11-07 06:25:51 -08:00
|
|
|
// Check for users putting URLs in target groups.
|
|
|
|
if len(c.RelabelConfigs) == 0 {
|
|
|
|
for _, tg := range c.TargetGroups {
|
|
|
|
for _, t := range tg.Targets {
|
|
|
|
if err = CheckTargetAddress(t[model.AddressLabel]); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2015-06-12 04:39:59 -07:00
|
|
|
return checkOverflow(c.XXX, "scrape_config")
|
2015-06-04 08:03:12 -07:00
|
|
|
}
|
|
|
|
|
2015-11-07 06:25:51 -08:00
|
|
|
// CheckTargetAddress checks if target address is valid.
|
|
|
|
func CheckTargetAddress(address model.LabelValue) error {
|
|
|
|
// For now check for a URL, we may want to expand this later.
|
|
|
|
if strings.Contains(string(address), "/") {
|
|
|
|
return fmt.Errorf("%q is not a valid hostname", address)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-05-15 03:47:50 -07:00
|
|
|
// BasicAuth contains basic HTTP authentication credentials.
|
|
|
|
type BasicAuth struct {
|
|
|
|
Username string `yaml:"username"`
|
|
|
|
Password string `yaml:"password"`
|
2015-06-12 04:39:59 -07:00
|
|
|
|
|
|
|
// Catches all undefined fields and must be empty after parsing.
|
|
|
|
XXX map[string]interface{} `yaml:",inline"`
|
|
|
|
}
|
|
|
|
|
2015-07-22 08:48:22 -07:00
|
|
|
// ClientCert contains client cert credentials.
|
|
|
|
type ClientCert struct {
|
|
|
|
Cert string `yaml:"cert"`
|
|
|
|
Key string `yaml:"key"`
|
|
|
|
|
|
|
|
// Catches all undefined fields and must be empty after parsing.
|
|
|
|
XXX map[string]interface{} `yaml:",inline"`
|
|
|
|
}
|
|
|
|
|
2015-06-12 04:39:59 -07:00
|
|
|
// UnmarshalYAML implements the yaml.Unmarshaler interface.
|
|
|
|
func (a *BasicAuth) UnmarshalYAML(unmarshal func(interface{}) error) error {
|
|
|
|
type plain BasicAuth
|
|
|
|
err := unmarshal((*plain)(a))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return checkOverflow(a.XXX, "basic_auth")
|
2015-05-15 03:47:50 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
// TargetGroup is a set of targets with a common label set.
|
2015-05-07 01:55:03 -07:00
|
|
|
type TargetGroup struct {
|
|
|
|
// Targets is a list of targets identified by a label set. Each target is
|
|
|
|
// uniquely identifiable in the group by its address label.
|
2015-08-20 08:18:46 -07:00
|
|
|
Targets []model.LabelSet
|
2015-05-07 01:55:03 -07:00
|
|
|
// Labels is a set of labels that is common across all targets in the group.
|
2015-08-20 08:18:46 -07:00
|
|
|
Labels model.LabelSet
|
2015-05-07 01:55:03 -07:00
|
|
|
|
|
|
|
// Source is an identifier that describes a group of targets.
|
2015-06-02 09:13:01 -07:00
|
|
|
Source string
|
2015-04-25 03:59:05 -07:00
|
|
|
}
|
|
|
|
|
2015-05-07 07:47:18 -07:00
|
|
|
func (tg TargetGroup) String() string {
|
2015-05-07 01:55:03 -07:00
|
|
|
return tg.Source
|
|
|
|
}
|
2015-04-25 03:59:05 -07:00
|
|
|
|
2015-05-27 18:12:42 -07:00
|
|
|
// UnmarshalYAML implements the yaml.Unmarshaler interface.
|
2015-05-07 01:55:03 -07:00
|
|
|
func (tg *TargetGroup) UnmarshalYAML(unmarshal func(interface{}) error) error {
|
|
|
|
g := struct {
|
2015-06-12 04:39:59 -07:00
|
|
|
Targets []string `yaml:"targets"`
|
2015-08-20 08:18:46 -07:00
|
|
|
Labels model.LabelSet `yaml:"labels"`
|
2015-06-12 04:39:59 -07:00
|
|
|
XXX map[string]interface{} `yaml:",inline"`
|
2015-05-07 01:55:03 -07:00
|
|
|
}{}
|
|
|
|
if err := unmarshal(&g); err != nil {
|
|
|
|
return err
|
2015-04-25 03:59:05 -07:00
|
|
|
}
|
2015-08-20 08:18:46 -07:00
|
|
|
tg.Targets = make([]model.LabelSet, 0, len(g.Targets))
|
2015-05-07 01:55:03 -07:00
|
|
|
for _, t := range g.Targets {
|
2015-08-20 08:18:46 -07:00
|
|
|
tg.Targets = append(tg.Targets, model.LabelSet{
|
|
|
|
model.AddressLabel: model.LabelValue(t),
|
2015-05-07 01:55:03 -07:00
|
|
|
})
|
2015-04-25 03:59:05 -07:00
|
|
|
}
|
2015-05-07 01:55:03 -07:00
|
|
|
tg.Labels = g.Labels
|
2015-06-12 04:39:59 -07:00
|
|
|
return checkOverflow(g.XXX, "target_group")
|
2015-05-07 01:55:03 -07:00
|
|
|
}
|
|
|
|
|
2015-05-27 18:12:42 -07:00
|
|
|
// MarshalYAML implements the yaml.Marshaler interface.
|
2015-05-07 07:47:18 -07:00
|
|
|
func (tg TargetGroup) MarshalYAML() (interface{}, error) {
|
|
|
|
g := &struct {
|
2015-08-20 08:18:46 -07:00
|
|
|
Targets []string `yaml:"targets"`
|
|
|
|
Labels model.LabelSet `yaml:"labels,omitempty"`
|
2015-05-07 07:47:18 -07:00
|
|
|
}{
|
|
|
|
Targets: make([]string, 0, len(tg.Targets)),
|
|
|
|
Labels: tg.Labels,
|
|
|
|
}
|
|
|
|
for _, t := range tg.Targets {
|
2015-08-20 08:18:46 -07:00
|
|
|
g.Targets = append(g.Targets, string(t[model.AddressLabel]))
|
2015-05-07 07:47:18 -07:00
|
|
|
}
|
|
|
|
return g, nil
|
|
|
|
}
|
|
|
|
|
2015-05-27 18:12:42 -07:00
|
|
|
// UnmarshalJSON implements the json.Unmarshaler interface.
|
2015-05-13 03:03:31 -07:00
|
|
|
func (tg *TargetGroup) UnmarshalJSON(b []byte) error {
|
|
|
|
g := struct {
|
2015-08-20 08:18:46 -07:00
|
|
|
Targets []string `json:"targets"`
|
|
|
|
Labels model.LabelSet `json:"labels"`
|
2015-05-13 03:03:31 -07:00
|
|
|
}{}
|
|
|
|
if err := json.Unmarshal(b, &g); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2015-08-20 08:18:46 -07:00
|
|
|
tg.Targets = make([]model.LabelSet, 0, len(g.Targets))
|
2015-05-13 03:03:31 -07:00
|
|
|
for _, t := range g.Targets {
|
|
|
|
if strings.Contains(t, "/") {
|
|
|
|
return fmt.Errorf("%q is not a valid hostname", t)
|
|
|
|
}
|
2015-08-20 08:18:46 -07:00
|
|
|
tg.Targets = append(tg.Targets, model.LabelSet{
|
|
|
|
model.AddressLabel: model.LabelValue(t),
|
2015-05-13 03:03:31 -07:00
|
|
|
})
|
|
|
|
}
|
|
|
|
tg.Labels = g.Labels
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-05-07 07:47:18 -07:00
|
|
|
// DNSSDConfig is the configuration for DNS based service discovery.
|
|
|
|
type DNSSDConfig struct {
|
2016-01-29 06:23:11 -08:00
|
|
|
Names []string `yaml:"names"`
|
|
|
|
RefreshInterval model.Duration `yaml:"refresh_interval,omitempty"`
|
|
|
|
Type string `yaml:"type"`
|
|
|
|
Port int `yaml:"port"` // Ignored for SRV records
|
2015-06-12 04:39:59 -07:00
|
|
|
// Catches all undefined fields and must be empty after parsing.
|
|
|
|
XXX map[string]interface{} `yaml:",inline"`
|
2015-05-07 01:55:03 -07:00
|
|
|
}
|
|
|
|
|
2015-05-27 18:12:42 -07:00
|
|
|
// UnmarshalYAML implements the yaml.Unmarshaler interface.
|
2015-05-07 07:47:18 -07:00
|
|
|
func (c *DNSSDConfig) UnmarshalYAML(unmarshal func(interface{}) error) error {
|
2015-06-04 08:03:12 -07:00
|
|
|
*c = DefaultDNSSDConfig
|
|
|
|
type plain DNSSDConfig
|
|
|
|
err := unmarshal((*plain)(c))
|
2015-05-07 01:55:03 -07:00
|
|
|
if err != nil {
|
|
|
|
return err
|
2015-04-25 03:59:05 -07:00
|
|
|
}
|
2015-05-07 01:55:03 -07:00
|
|
|
if len(c.Names) == 0 {
|
2015-05-13 02:28:04 -07:00
|
|
|
return fmt.Errorf("DNS-SD config must contain at least one SRV record name")
|
2015-04-28 15:08:58 -07:00
|
|
|
}
|
2015-07-30 01:56:48 -07:00
|
|
|
switch strings.ToUpper(c.Type) {
|
|
|
|
case "SRV":
|
|
|
|
case "A", "AAAA":
|
|
|
|
if c.Port == 0 {
|
|
|
|
return fmt.Errorf("a port is required in DNS-SD configs for all record types except SRV")
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
return fmt.Errorf("invalid DNS-SD records type %s", c.Type)
|
|
|
|
}
|
2015-06-12 04:39:59 -07:00
|
|
|
return checkOverflow(c.XXX, "dns_sd_config")
|
2015-04-25 03:59:05 -07:00
|
|
|
}
|
|
|
|
|
2015-05-13 02:28:04 -07:00
|
|
|
// FileSDConfig is the configuration for file based discovery.
|
|
|
|
type FileSDConfig struct {
|
2016-01-29 06:23:11 -08:00
|
|
|
Names []string `yaml:"names"`
|
|
|
|
RefreshInterval model.Duration `yaml:"refresh_interval,omitempty"`
|
2015-06-12 04:39:59 -07:00
|
|
|
|
|
|
|
// Catches all undefined fields and must be empty after parsing.
|
|
|
|
XXX map[string]interface{} `yaml:",inline"`
|
2015-05-13 02:28:04 -07:00
|
|
|
}
|
|
|
|
|
2015-05-27 18:12:42 -07:00
|
|
|
// UnmarshalYAML implements the yaml.Unmarshaler interface.
|
2015-05-13 02:28:04 -07:00
|
|
|
func (c *FileSDConfig) UnmarshalYAML(unmarshal func(interface{}) error) error {
|
2015-06-04 08:03:12 -07:00
|
|
|
*c = DefaultFileSDConfig
|
|
|
|
type plain FileSDConfig
|
|
|
|
err := unmarshal((*plain)(c))
|
2015-05-13 02:28:04 -07:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if len(c.Names) == 0 {
|
2015-05-13 03:03:31 -07:00
|
|
|
return fmt.Errorf("file service discovery config must contain at least one path name")
|
2015-05-13 02:28:04 -07:00
|
|
|
}
|
|
|
|
for _, name := range c.Names {
|
|
|
|
if !patFileSDName.MatchString(name) {
|
|
|
|
return fmt.Errorf("path name %q is not valid for file discovery", name)
|
|
|
|
}
|
|
|
|
}
|
2015-06-12 04:39:59 -07:00
|
|
|
return checkOverflow(c.XXX, "file_sd_config")
|
2015-05-13 02:28:04 -07:00
|
|
|
}
|
|
|
|
|
2015-05-14 04:32:11 -07:00
|
|
|
// ConsulSDConfig is the configuration for Consul service discovery.
|
|
|
|
type ConsulSDConfig struct {
|
2015-06-04 08:03:12 -07:00
|
|
|
Server string `yaml:"server"`
|
2015-06-24 07:22:52 -07:00
|
|
|
Token string `yaml:"token,omitempty"`
|
|
|
|
Datacenter string `yaml:"datacenter,omitempty"`
|
|
|
|
TagSeparator string `yaml:"tag_separator,omitempty"`
|
|
|
|
Scheme string `yaml:"scheme,omitempty"`
|
|
|
|
Username string `yaml:"username,omitempty"`
|
|
|
|
Password string `yaml:"password,omitempty"`
|
2015-06-04 08:03:12 -07:00
|
|
|
// The list of services for which targets are discovered.
|
2015-08-14 08:39:41 -07:00
|
|
|
// Defaults to all services if empty.
|
2015-06-04 08:03:12 -07:00
|
|
|
Services []string `yaml:"services"`
|
2015-06-12 04:39:59 -07:00
|
|
|
|
|
|
|
// Catches all undefined fields and must be empty after parsing.
|
|
|
|
XXX map[string]interface{} `yaml:",inline"`
|
2015-05-14 04:32:11 -07:00
|
|
|
}
|
|
|
|
|
2015-05-27 18:12:42 -07:00
|
|
|
// UnmarshalYAML implements the yaml.Unmarshaler interface.
|
2015-05-14 04:32:11 -07:00
|
|
|
func (c *ConsulSDConfig) UnmarshalYAML(unmarshal func(interface{}) error) error {
|
2015-06-04 08:03:12 -07:00
|
|
|
*c = DefaultConsulSDConfig
|
|
|
|
type plain ConsulSDConfig
|
|
|
|
err := unmarshal((*plain)(c))
|
2015-05-14 04:32:11 -07:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if strings.TrimSpace(c.Server) == "" {
|
|
|
|
return fmt.Errorf("Consul SD configuration requires a server address")
|
|
|
|
}
|
2015-06-12 04:39:59 -07:00
|
|
|
return checkOverflow(c.XXX, "consul_sd_config")
|
2015-05-14 04:32:11 -07:00
|
|
|
}
|
|
|
|
|
2015-06-09 04:25:30 -07:00
|
|
|
// ServersetSDConfig is the configuration for Twitter serversets in Zookeeper based discovery.
|
|
|
|
type ServersetSDConfig struct {
|
2016-01-29 06:23:11 -08:00
|
|
|
Servers []string `yaml:"servers"`
|
|
|
|
Paths []string `yaml:"paths"`
|
|
|
|
Timeout model.Duration `yaml:"timeout,omitempty"`
|
2015-07-13 17:46:00 -07:00
|
|
|
|
|
|
|
// Catches all undefined fields and must be empty after parsing.
|
|
|
|
XXX map[string]interface{} `yaml:",inline"`
|
2015-06-09 04:25:30 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
// UnmarshalYAML implements the yaml.Unmarshaler interface.
|
|
|
|
func (c *ServersetSDConfig) UnmarshalYAML(unmarshal func(interface{}) error) error {
|
|
|
|
*c = DefaultServersetSDConfig
|
|
|
|
type plain ServersetSDConfig
|
|
|
|
err := unmarshal((*plain)(c))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if len(c.Servers) == 0 {
|
|
|
|
return fmt.Errorf("serverset SD config must contain at least one Zookeeper server")
|
|
|
|
}
|
|
|
|
if len(c.Paths) == 0 {
|
|
|
|
return fmt.Errorf("serverset SD config must contain at least one path")
|
|
|
|
}
|
|
|
|
for _, path := range c.Paths {
|
|
|
|
if !strings.HasPrefix(path, "/") {
|
|
|
|
return fmt.Errorf("serverset SD config paths must begin with '/': %s", path)
|
|
|
|
}
|
|
|
|
}
|
2015-07-13 17:46:00 -07:00
|
|
|
return checkOverflow(c.XXX, "serverset_sd_config")
|
2015-06-09 04:25:30 -07:00
|
|
|
}
|
|
|
|
|
2016-01-09 15:34:32 -08:00
|
|
|
// NerveSDConfig is the configuration for AirBnB's Nerve in Zookeeper based discovery.
|
|
|
|
type NerveSDConfig struct {
|
2016-01-29 06:23:11 -08:00
|
|
|
Servers []string `yaml:"servers"`
|
|
|
|
Paths []string `yaml:"paths"`
|
|
|
|
Timeout model.Duration `yaml:"timeout,omitempty"`
|
2016-01-09 15:34:32 -08:00
|
|
|
|
|
|
|
// Catches all undefined fields and must be empty after parsing.
|
|
|
|
XXX map[string]interface{} `yaml:",inline"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// UnmarshalYAML implements the yaml.Unmarshaler interface.
|
|
|
|
func (c *NerveSDConfig) UnmarshalYAML(unmarshal func(interface{}) error) error {
|
|
|
|
*c = DefaultNerveSDConfig
|
|
|
|
type plain NerveSDConfig
|
|
|
|
err := unmarshal((*plain)(c))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if len(c.Servers) == 0 {
|
|
|
|
return fmt.Errorf("nerve SD config must contain at least one Zookeeper server")
|
|
|
|
}
|
|
|
|
if len(c.Paths) == 0 {
|
|
|
|
return fmt.Errorf("nerve SD config must contain at least one path")
|
|
|
|
}
|
|
|
|
for _, path := range c.Paths {
|
|
|
|
if !strings.HasPrefix(path, "/") {
|
|
|
|
return fmt.Errorf("nerve SD config paths must begin with '/': %s", path)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return checkOverflow(c.XXX, "nerve_sd_config")
|
|
|
|
}
|
|
|
|
|
2015-07-16 05:02:07 -07:00
|
|
|
// MarathonSDConfig is the configuration for services running on Marathon.
|
|
|
|
type MarathonSDConfig struct {
|
2016-01-29 06:23:11 -08:00
|
|
|
Servers []string `yaml:"servers,omitempty"`
|
|
|
|
RefreshInterval model.Duration `yaml:"refresh_interval,omitempty"`
|
2015-07-16 05:02:07 -07:00
|
|
|
|
|
|
|
// Catches all undefined fields and must be empty after parsing.
|
|
|
|
XXX map[string]interface{} `yaml:",inline"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// UnmarshalYAML implements the yaml.Unmarshaler interface.
|
|
|
|
func (c *MarathonSDConfig) UnmarshalYAML(unmarshal func(interface{}) error) error {
|
|
|
|
*c = DefaultMarathonSDConfig
|
|
|
|
type plain MarathonSDConfig
|
2015-09-02 06:08:37 -07:00
|
|
|
err := unmarshal((*plain)(c))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2015-07-18 14:23:58 -07:00
|
|
|
if len(c.Servers) == 0 {
|
|
|
|
return fmt.Errorf("Marathon SD config must contain at least one Marathon server")
|
|
|
|
}
|
|
|
|
|
|
|
|
return checkOverflow(c.XXX, "marathon_sd_config")
|
|
|
|
}
|
|
|
|
|
2015-10-23 08:47:10 -07:00
|
|
|
// KubernetesSDConfig is the configuration for Kubernetes service discovery.
|
|
|
|
type KubernetesSDConfig struct {
|
2016-01-29 06:23:11 -08:00
|
|
|
APIServers []URL `yaml:"api_servers"`
|
|
|
|
KubeletPort int `yaml:"kubelet_port,omitempty"`
|
|
|
|
InCluster bool `yaml:"in_cluster,omitempty"`
|
|
|
|
BasicAuth *BasicAuth `yaml:"basic_auth,omitempty"`
|
|
|
|
BearerToken string `yaml:"bearer_token,omitempty"`
|
|
|
|
BearerTokenFile string `yaml:"bearer_token_file,omitempty"`
|
|
|
|
RetryInterval model.Duration `yaml:"retry_interval,omitempty"`
|
|
|
|
RequestTimeout model.Duration `yaml:"request_timeout,omitempty"`
|
|
|
|
TLSConfig TLSConfig `yaml:"tls_config,omitempty"`
|
2015-10-23 08:47:10 -07:00
|
|
|
|
|
|
|
// Catches all undefined fields and must be empty after parsing.
|
|
|
|
XXX map[string]interface{} `yaml:",inline"`
|
|
|
|
}
|
|
|
|
|
2015-08-24 06:07:27 -07:00
|
|
|
// UnmarshalYAML implements the yaml.Unmarshaler interface.
|
2015-07-18 14:23:58 -07:00
|
|
|
func (c *KubernetesSDConfig) UnmarshalYAML(unmarshal func(interface{}) error) error {
|
|
|
|
*c = DefaultKubernetesSDConfig
|
|
|
|
type plain KubernetesSDConfig
|
2015-07-16 05:02:07 -07:00
|
|
|
err := unmarshal((*plain)(c))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2015-10-24 06:41:14 -07:00
|
|
|
if len(c.APIServers) == 0 {
|
|
|
|
return fmt.Errorf("Kubernetes SD configuration requires at least one Kubernetes API server")
|
2015-07-18 14:23:58 -07:00
|
|
|
}
|
2015-10-23 08:47:10 -07:00
|
|
|
if len(c.BearerToken) > 0 && len(c.BearerTokenFile) > 0 {
|
|
|
|
return fmt.Errorf("at most one of bearer_token & bearer_token_file must be configured")
|
|
|
|
}
|
|
|
|
if c.BasicAuth != nil && (len(c.BearerToken) > 0 || len(c.BearerTokenFile) > 0) {
|
|
|
|
return fmt.Errorf("at most one of basic_auth, bearer_token & bearer_token_file must be configured")
|
2015-07-18 14:23:58 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
return checkOverflow(c.XXX, "kubernetes_sd_config")
|
2015-07-16 05:02:07 -07:00
|
|
|
}
|
|
|
|
|
2015-09-21 11:49:19 -07:00
|
|
|
// EC2SDConfig is the configuration for EC2 based service discovery.
|
|
|
|
type EC2SDConfig struct {
|
2016-01-29 06:23:11 -08:00
|
|
|
Region string `yaml:"region"`
|
|
|
|
AccessKey string `yaml:"access_key,omitempty"`
|
|
|
|
SecretKey string `yaml:"secret_key,omitempty"`
|
|
|
|
RefreshInterval model.Duration `yaml:"refresh_interval,omitempty"`
|
|
|
|
Port int `yaml:"port"`
|
2015-09-21 11:49:19 -07:00
|
|
|
// Catches all undefined fields and must be empty after parsing.
|
|
|
|
XXX map[string]interface{} `yaml:",inline"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// UnmarshalYAML implements the yaml.Unmarshaler interface.
|
|
|
|
func (c *EC2SDConfig) UnmarshalYAML(unmarshal func(interface{}) error) error {
|
|
|
|
*c = DefaultEC2SDConfig
|
|
|
|
type plain EC2SDConfig
|
|
|
|
err := unmarshal((*plain)(c))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if c.Region == "" {
|
|
|
|
return fmt.Errorf("EC2 SD configuration requires a region")
|
|
|
|
}
|
|
|
|
return checkOverflow(c.XXX, "ec2_sd_config")
|
|
|
|
}
|
|
|
|
|
2016-04-06 20:47:02 -07:00
|
|
|
// AzureSDConfig is the configuration for Azure based service discovery.
|
|
|
|
type AzureSDConfig struct {
|
|
|
|
Port int `yaml:"port"`
|
|
|
|
SubscriptionID string `yaml:"subscription_id"`
|
|
|
|
TenantID string `yaml:"tenant_id,omitempty"`
|
|
|
|
ClientID string `yaml:"client_id,omitempty"`
|
|
|
|
ClientSecret string `yaml:"client_secret,omitempty"`
|
|
|
|
RefreshInterval model.Duration `yaml:"refresh_interval,omitempty"`
|
|
|
|
// Catches all undefined fields and must be empty after parsing.
|
|
|
|
XXX map[string]interface{} `yaml:",inline"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// UnmarshalYAML implements the yaml.Unmarshaler interface.
|
|
|
|
func (c *AzureSDConfig) UnmarshalYAML(unmarshal func(interface{}) error) error {
|
|
|
|
*c = DefaultAzureSDConfig
|
|
|
|
type plain AzureSDConfig
|
|
|
|
err := unmarshal((*plain)(c))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return checkOverflow(c.XXX, "azure_sd_config")
|
|
|
|
}
|
|
|
|
|
2015-05-07 01:55:03 -07:00
|
|
|
// RelabelAction is the action to be performed on relabeling.
|
|
|
|
type RelabelAction string
|
|
|
|
|
|
|
|
const (
|
2015-08-24 06:07:27 -07:00
|
|
|
// RelabelReplace performs a regex replacement.
|
2015-05-07 01:55:03 -07:00
|
|
|
RelabelReplace RelabelAction = "replace"
|
2015-08-24 06:07:27 -07:00
|
|
|
// RelabelKeep drops targets for which the input does not match the regex.
|
2015-06-24 00:07:17 -07:00
|
|
|
RelabelKeep RelabelAction = "keep"
|
2015-08-24 06:07:27 -07:00
|
|
|
// RelabelDrop drops targets for which the input does match the regex.
|
2015-06-24 00:07:17 -07:00
|
|
|
RelabelDrop RelabelAction = "drop"
|
2015-08-24 06:07:27 -07:00
|
|
|
// RelabelHashMod sets a label to the modulus of a hash of labels.
|
2015-06-24 00:07:17 -07:00
|
|
|
RelabelHashMod RelabelAction = "hashmod"
|
2015-08-24 06:07:27 -07:00
|
|
|
// RelabelLabelMap copies labels to other labelnames based on a regex.
|
2015-08-12 02:21:20 -07:00
|
|
|
RelabelLabelMap RelabelAction = "labelmap"
|
2015-05-07 01:55:03 -07:00
|
|
|
)
|
|
|
|
|
2015-05-27 18:12:42 -07:00
|
|
|
// UnmarshalYAML implements the yaml.Unmarshaler interface.
|
2015-05-07 01:55:03 -07:00
|
|
|
func (a *RelabelAction) UnmarshalYAML(unmarshal func(interface{}) error) error {
|
|
|
|
var s string
|
|
|
|
if err := unmarshal(&s); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
switch act := RelabelAction(strings.ToLower(s)); act {
|
2015-09-21 12:41:19 -07:00
|
|
|
case RelabelReplace, RelabelKeep, RelabelDrop, RelabelHashMod, RelabelLabelMap:
|
2015-05-07 01:55:03 -07:00
|
|
|
*a = act
|
|
|
|
return nil
|
2015-04-28 15:08:58 -07:00
|
|
|
}
|
2015-05-07 01:55:03 -07:00
|
|
|
return fmt.Errorf("unknown relabel action %q", s)
|
2015-04-28 15:08:58 -07:00
|
|
|
}
|
|
|
|
|
2015-05-07 01:55:03 -07:00
|
|
|
// RelabelConfig is the configuration for relabeling of target label sets.
|
|
|
|
type RelabelConfig struct {
|
|
|
|
// A list of labels from which values are taken and concatenated
|
|
|
|
// with the configured separator in order.
|
2015-08-20 08:18:46 -07:00
|
|
|
SourceLabels model.LabelNames `yaml:"source_labels,flow"`
|
2015-05-07 01:55:03 -07:00
|
|
|
// Separator is the string between concatenated values from the source labels.
|
2015-05-07 07:47:18 -07:00
|
|
|
Separator string `yaml:"separator,omitempty"`
|
2015-05-07 01:55:03 -07:00
|
|
|
// Regex against which the concatenation is matched.
|
2015-11-16 04:16:13 -08:00
|
|
|
Regex Regexp `yaml:"regex,omitempty"`
|
2015-06-24 00:07:17 -07:00
|
|
|
// Modulus to take of the hash of concatenated values from the source labels.
|
|
|
|
Modulus uint64 `yaml:"modulus,omitempty"`
|
2015-05-07 01:55:03 -07:00
|
|
|
// The label to which the resulting string is written in a replacement.
|
2015-08-20 08:18:46 -07:00
|
|
|
TargetLabel model.LabelName `yaml:"target_label,omitempty"`
|
2015-05-07 01:55:03 -07:00
|
|
|
// Replacement is the regex replacement pattern to be used.
|
|
|
|
Replacement string `yaml:"replacement,omitempty"`
|
|
|
|
// Action is the action to be performed for the relabeling.
|
2015-05-07 07:47:18 -07:00
|
|
|
Action RelabelAction `yaml:"action,omitempty"`
|
2015-06-12 04:39:59 -07:00
|
|
|
|
|
|
|
// Catches all undefined fields and must be empty after parsing.
|
|
|
|
XXX map[string]interface{} `yaml:",inline"`
|
2015-04-25 03:59:05 -07:00
|
|
|
}
|
|
|
|
|
2015-06-04 08:03:12 -07:00
|
|
|
// UnmarshalYAML implements the yaml.Unmarshaler interface.
|
|
|
|
func (c *RelabelConfig) UnmarshalYAML(unmarshal func(interface{}) error) error {
|
|
|
|
*c = DefaultRelabelConfig
|
|
|
|
type plain RelabelConfig
|
2015-06-10 14:40:39 -07:00
|
|
|
if err := unmarshal((*plain)(c)); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2015-06-24 00:07:17 -07:00
|
|
|
if c.Modulus == 0 && c.Action == RelabelHashMod {
|
|
|
|
return fmt.Errorf("relabel configuration for hashmod requires non-zero modulus")
|
|
|
|
}
|
2015-06-12 04:39:59 -07:00
|
|
|
return checkOverflow(c.XXX, "relabel_config")
|
2015-06-04 08:03:12 -07:00
|
|
|
}
|
|
|
|
|
2015-05-07 01:55:03 -07:00
|
|
|
// Regexp encapsulates a regexp.Regexp and makes it YAML marshallable.
|
|
|
|
type Regexp struct {
|
2015-11-16 04:16:13 -08:00
|
|
|
*regexp.Regexp
|
2015-09-01 06:05:14 -07:00
|
|
|
original string
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewRegexp creates a new anchored Regexp and returns an error if the
|
|
|
|
// passed-in regular expression does not compile.
|
2015-11-16 04:16:13 -08:00
|
|
|
func NewRegexp(s string) (Regexp, error) {
|
2015-09-01 06:05:14 -07:00
|
|
|
regex, err := regexp.Compile("^(?:" + s + ")$")
|
2015-11-16 04:16:13 -08:00
|
|
|
return Regexp{
|
|
|
|
Regexp: regex,
|
2015-09-01 06:05:14 -07:00
|
|
|
original: s,
|
2015-11-16 04:16:13 -08:00
|
|
|
}, err
|
2015-09-01 06:05:14 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
// MustNewRegexp works like NewRegexp, but panics if the regular expression does not compile.
|
2015-11-16 04:16:13 -08:00
|
|
|
func MustNewRegexp(s string) Regexp {
|
2015-09-01 06:05:14 -07:00
|
|
|
re, err := NewRegexp(s)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
return re
|
2015-04-28 15:08:58 -07:00
|
|
|
}
|
|
|
|
|
2015-05-27 18:12:42 -07:00
|
|
|
// UnmarshalYAML implements the yaml.Unmarshaler interface.
|
2015-05-07 01:55:03 -07:00
|
|
|
func (re *Regexp) UnmarshalYAML(unmarshal func(interface{}) error) error {
|
|
|
|
var s string
|
|
|
|
if err := unmarshal(&s); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2015-09-01 06:05:14 -07:00
|
|
|
r, err := NewRegexp(s)
|
2015-05-07 01:55:03 -07:00
|
|
|
if err != nil {
|
|
|
|
return err
|
2015-04-28 15:08:58 -07:00
|
|
|
}
|
2015-11-16 04:16:13 -08:00
|
|
|
*re = r
|
2015-04-28 15:08:58 -07:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-05-27 18:12:42 -07:00
|
|
|
// MarshalYAML implements the yaml.Marshaler interface.
|
2015-11-16 04:16:13 -08:00
|
|
|
func (re Regexp) MarshalYAML() (interface{}, error) {
|
|
|
|
if re.original != "" {
|
2015-09-01 06:05:14 -07:00
|
|
|
return re.original, nil
|
2015-06-24 00:07:17 -07:00
|
|
|
}
|
|
|
|
return nil, nil
|
2015-04-20 03:24:25 -07:00
|
|
|
}
|