2015-09-26 17:36:40 +02:00
|
|
|
// Copyright 2015 The Prometheus Authors
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
2013-05-07 16:40:10 +02:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
2017-10-14 14:23:42 +02:00
|
|
|
"fmt"
|
2020-11-14 11:53:51 +01:00
|
|
|
stdlog "log"
|
2014-02-18 12:35:11 +01:00
|
|
|
"net/http"
|
2015-03-05 17:02:17 +01:00
|
|
|
_ "net/http/pprof"
|
2019-12-31 17:19:37 +01:00
|
|
|
"os"
|
2021-01-22 23:53:56 +01:00
|
|
|
"os/user"
|
2018-03-29 14:42:44 +02:00
|
|
|
"sort"
|
2014-02-07 17:09:39 +01:00
|
|
|
|
2020-05-01 14:26:51 +02:00
|
|
|
"github.com/prometheus/common/promlog"
|
|
|
|
"github.com/prometheus/common/promlog/flag"
|
|
|
|
|
2020-11-14 11:53:51 +01:00
|
|
|
"github.com/go-kit/log"
|
|
|
|
"github.com/go-kit/log/level"
|
2014-02-18 12:35:11 +01:00
|
|
|
"github.com/prometheus/client_golang/prometheus"
|
2017-01-05 19:30:48 +01:00
|
|
|
"github.com/prometheus/client_golang/prometheus/promhttp"
|
2016-04-30 19:58:17 +02:00
|
|
|
"github.com/prometheus/common/version"
|
2021-01-18 08:20:33 +01:00
|
|
|
"github.com/prometheus/exporter-toolkit/web"
|
2014-02-18 12:35:11 +01:00
|
|
|
"github.com/prometheus/node_exporter/collector"
|
2020-02-20 11:03:33 +01:00
|
|
|
kingpin "gopkg.in/alecthomas/kingpin.v2"
|
2013-05-07 16:40:10 +02:00
|
|
|
)
|
|
|
|
|
2018-11-08 16:26:21 +01:00
|
|
|
// handler wraps an unfiltered http.Handler but uses a filtered handler,
|
|
|
|
// created on the fly, if filtering is requested. Create instances with
|
|
|
|
// newHandler.
|
|
|
|
type handler struct {
|
|
|
|
unfilteredHandler http.Handler
|
|
|
|
// exporterMetricsRegistry is a separate registry for the metrics about
|
|
|
|
// the exporter itself.
|
|
|
|
exporterMetricsRegistry *prometheus.Registry
|
|
|
|
includeExporterMetrics bool
|
2018-11-20 18:11:40 +01:00
|
|
|
maxRequests int
|
2019-12-31 17:19:37 +01:00
|
|
|
logger log.Logger
|
2016-04-30 19:58:17 +02:00
|
|
|
}
|
|
|
|
|
2019-12-31 17:19:37 +01:00
|
|
|
func newHandler(includeExporterMetrics bool, maxRequests int, logger log.Logger) *handler {
|
2018-11-08 16:26:21 +01:00
|
|
|
h := &handler{
|
|
|
|
exporterMetricsRegistry: prometheus.NewRegistry(),
|
|
|
|
includeExporterMetrics: includeExporterMetrics,
|
2018-11-20 18:11:40 +01:00
|
|
|
maxRequests: maxRequests,
|
2019-12-31 17:19:37 +01:00
|
|
|
logger: logger,
|
2018-11-08 16:26:21 +01:00
|
|
|
}
|
|
|
|
if h.includeExporterMetrics {
|
|
|
|
h.exporterMetricsRegistry.MustRegister(
|
|
|
|
prometheus.NewProcessCollector(prometheus.ProcessCollectorOpts{}),
|
|
|
|
prometheus.NewGoCollector(),
|
|
|
|
)
|
|
|
|
}
|
|
|
|
if innerHandler, err := h.innerHandler(); err != nil {
|
2019-12-31 17:19:37 +01:00
|
|
|
panic(fmt.Sprintf("Couldn't create metrics handler: %s", err))
|
2018-11-08 16:26:21 +01:00
|
|
|
} else {
|
|
|
|
h.unfilteredHandler = innerHandler
|
|
|
|
}
|
|
|
|
return h
|
|
|
|
}
|
|
|
|
|
|
|
|
// ServeHTTP implements http.Handler.
|
|
|
|
func (h *handler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
2017-10-14 14:23:42 +02:00
|
|
|
filters := r.URL.Query()["collect[]"]
|
2019-12-31 17:19:37 +01:00
|
|
|
level.Debug(h.logger).Log("msg", "collect query:", "filters", filters)
|
2017-10-14 14:23:42 +02:00
|
|
|
|
2018-11-08 16:26:21 +01:00
|
|
|
if len(filters) == 0 {
|
|
|
|
// No filters, use the prepared unfiltered handler.
|
|
|
|
h.unfilteredHandler.ServeHTTP(w, r)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
// To serve filtered metrics, we create a filtering handler on the fly.
|
|
|
|
filteredHandler, err := h.innerHandler(filters...)
|
2017-10-14 14:23:42 +02:00
|
|
|
if err != nil {
|
2019-12-31 17:19:37 +01:00
|
|
|
level.Warn(h.logger).Log("msg", "Couldn't create filtered metrics handler:", "err", err)
|
2017-10-14 14:23:42 +02:00
|
|
|
w.WriteHeader(http.StatusBadRequest)
|
2018-11-08 16:26:21 +01:00
|
|
|
w.Write([]byte(fmt.Sprintf("Couldn't create filtered metrics handler: %s", err)))
|
2017-10-14 14:23:42 +02:00
|
|
|
return
|
|
|
|
}
|
2018-11-08 16:26:21 +01:00
|
|
|
filteredHandler.ServeHTTP(w, r)
|
|
|
|
}
|
2017-10-14 14:23:42 +02:00
|
|
|
|
2019-12-31 17:19:37 +01:00
|
|
|
// innerHandler is used to create both the one unfiltered http.Handler to be
|
2018-11-08 16:26:21 +01:00
|
|
|
// wrapped by the outer handler and also the filtered handlers created on the
|
|
|
|
// fly. The former is accomplished by calling innerHandler without any arguments
|
|
|
|
// (in which case it will log all the collectors enabled via command-line
|
|
|
|
// flags).
|
|
|
|
func (h *handler) innerHandler(filters ...string) (http.Handler, error) {
|
2019-12-31 17:19:37 +01:00
|
|
|
nc, err := collector.NewNodeCollector(h.logger, filters...)
|
2017-10-14 14:23:42 +02:00
|
|
|
if err != nil {
|
2018-11-08 16:26:21 +01:00
|
|
|
return nil, fmt.Errorf("couldn't create collector: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Only log the creation of an unfiltered handler, which should happen
|
|
|
|
// only once upon startup.
|
|
|
|
if len(filters) == 0 {
|
2019-12-31 17:19:37 +01:00
|
|
|
level.Info(h.logger).Log("msg", "Enabled collectors")
|
2018-11-08 16:26:21 +01:00
|
|
|
collectors := []string{}
|
|
|
|
for n := range nc.Collectors {
|
|
|
|
collectors = append(collectors, n)
|
|
|
|
}
|
|
|
|
sort.Strings(collectors)
|
2019-12-31 17:19:37 +01:00
|
|
|
for _, c := range collectors {
|
|
|
|
level.Info(h.logger).Log("collector", c)
|
2018-11-08 16:26:21 +01:00
|
|
|
}
|
2017-10-14 14:23:42 +02:00
|
|
|
}
|
|
|
|
|
2018-11-08 16:26:21 +01:00
|
|
|
r := prometheus.NewRegistry()
|
|
|
|
r.MustRegister(version.NewCollector("node_exporter"))
|
|
|
|
if err := r.Register(nc); err != nil {
|
|
|
|
return nil, fmt.Errorf("couldn't register node collector: %s", err)
|
2017-10-14 14:23:42 +02:00
|
|
|
}
|
2018-11-08 16:26:21 +01:00
|
|
|
handler := promhttp.HandlerFor(
|
|
|
|
prometheus.Gatherers{h.exporterMetricsRegistry, r},
|
|
|
|
promhttp.HandlerOpts{
|
2020-11-14 11:53:51 +01:00
|
|
|
ErrorLog: stdlog.New(log.NewStdlibAdapter(level.Error(h.logger)), "", 0),
|
2018-11-20 18:11:40 +01:00
|
|
|
ErrorHandling: promhttp.ContinueOnError,
|
|
|
|
MaxRequestsInFlight: h.maxRequests,
|
2019-07-28 10:37:10 +02:00
|
|
|
Registry: h.exporterMetricsRegistry,
|
2018-11-08 16:26:21 +01:00
|
|
|
},
|
2018-02-19 15:44:59 +01:00
|
|
|
)
|
2018-11-08 16:26:21 +01:00
|
|
|
if h.includeExporterMetrics {
|
|
|
|
// Note that we have to use h.exporterMetricsRegistry here to
|
|
|
|
// use the same promhttp metrics for all expositions.
|
|
|
|
handler = promhttp.InstrumentMetricHandler(
|
|
|
|
h.exporterMetricsRegistry, handler,
|
|
|
|
)
|
|
|
|
}
|
|
|
|
return handler, nil
|
2017-10-14 14:23:42 +02:00
|
|
|
}
|
|
|
|
|
2013-05-07 16:40:10 +02:00
|
|
|
func main() {
|
2016-02-05 02:24:16 +01:00
|
|
|
var (
|
2018-11-08 16:26:21 +01:00
|
|
|
listenAddress = kingpin.Flag(
|
|
|
|
"web.listen-address",
|
|
|
|
"Address on which to expose metrics and web interface.",
|
|
|
|
).Default(":9100").String()
|
|
|
|
metricsPath = kingpin.Flag(
|
|
|
|
"web.telemetry-path",
|
|
|
|
"Path under which to expose metrics.",
|
|
|
|
).Default("/metrics").String()
|
|
|
|
disableExporterMetrics = kingpin.Flag(
|
|
|
|
"web.disable-exporter-metrics",
|
|
|
|
"Exclude metrics about the exporter itself (promhttp_*, process_*, go_*).",
|
|
|
|
).Bool()
|
2018-11-20 18:11:40 +01:00
|
|
|
maxRequests = kingpin.Flag(
|
|
|
|
"web.max-requests",
|
|
|
|
"Maximum number of parallel scrape requests. Use 0 to disable.",
|
|
|
|
).Default("40").Int()
|
2020-02-20 11:03:33 +01:00
|
|
|
disableDefaultCollectors = kingpin.Flag(
|
|
|
|
"collector.disable-defaults",
|
|
|
|
"Set all collectors to disabled by default.",
|
|
|
|
).Default("false").Bool()
|
2019-11-16 00:12:57 +01:00
|
|
|
configFile = kingpin.Flag(
|
|
|
|
"web.config",
|
2020-02-20 13:42:47 +01:00
|
|
|
"[EXPERIMENTAL] Path to config yaml file that can enable TLS or authentication.",
|
2019-11-16 00:12:57 +01:00
|
|
|
).Default("").String()
|
2016-02-05 02:24:16 +01:00
|
|
|
)
|
2015-04-16 05:51:09 +02:00
|
|
|
|
2019-12-31 17:19:37 +01:00
|
|
|
promlogConfig := &promlog.Config{}
|
|
|
|
flag.AddFlags(kingpin.CommandLine, promlogConfig)
|
2017-08-12 15:07:24 +02:00
|
|
|
kingpin.Version(version.Print("node_exporter"))
|
2021-05-11 16:19:34 +02:00
|
|
|
kingpin.CommandLine.UsageWriter(os.Stdout)
|
2017-08-12 15:07:24 +02:00
|
|
|
kingpin.HelpFlag.Short('h')
|
|
|
|
kingpin.Parse()
|
2019-12-31 17:19:37 +01:00
|
|
|
logger := promlog.New(promlogConfig)
|
2016-04-30 19:58:17 +02:00
|
|
|
|
2020-02-20 11:03:33 +01:00
|
|
|
if *disableDefaultCollectors {
|
|
|
|
collector.DisableDefaultCollectors()
|
|
|
|
}
|
2019-12-31 17:19:37 +01:00
|
|
|
level.Info(logger).Log("msg", "Starting node_exporter", "version", version.Info())
|
|
|
|
level.Info(logger).Log("msg", "Build context", "build_context", version.BuildContext())
|
2021-01-22 23:53:56 +01:00
|
|
|
if user, err := user.Current(); err == nil && user.Uid == "0" {
|
|
|
|
level.Warn(logger).Log("msg", "Node Exporter is running as root user. This exporter is designed to run as unpriviledged user, root is not required.")
|
|
|
|
}
|
2016-04-30 19:58:17 +02:00
|
|
|
|
2019-12-31 17:19:37 +01:00
|
|
|
http.Handle(*metricsPath, newHandler(!*disableExporterMetrics, *maxRequests, logger))
|
2015-03-05 17:02:17 +01:00
|
|
|
http.HandleFunc("/", func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
w.Write([]byte(`<html>
|
|
|
|
<head><title>Node Exporter</title></head>
|
|
|
|
<body>
|
|
|
|
<h1>Node Exporter</h1>
|
|
|
|
<p><a href="` + *metricsPath + `">Metrics</a></p>
|
|
|
|
</body>
|
|
|
|
</html>`))
|
|
|
|
})
|
2015-04-16 05:51:09 +02:00
|
|
|
|
2019-12-31 17:19:37 +01:00
|
|
|
level.Info(logger).Log("msg", "Listening on", "address", *listenAddress)
|
2019-11-16 00:12:57 +01:00
|
|
|
server := &http.Server{Addr: *listenAddress}
|
2021-01-18 08:20:33 +01:00
|
|
|
if err := web.ListenAndServe(server, *configFile, logger); err != nil {
|
2019-12-31 17:19:37 +01:00
|
|
|
level.Error(logger).Log("err", err)
|
|
|
|
os.Exit(1)
|
2015-03-05 17:02:17 +01:00
|
|
|
}
|
2014-02-18 12:35:11 +01:00
|
|
|
}
|