mirror of
https://github.com/VictoriaMetrics/VictoriaMetrics.git
synced 2024-12-20 23:46:23 +01:00
f325410c26
- Return meta-labels for the discovered targets via promutils.Labels instead of map[string]string. This improves the speed of generating meta-labels for discovered targets by up to 5x. - Remove memory allocations in hot paths during ScrapeWork generation. The ScrapeWork contains scrape settings for a single discovered target. This improves the service discovery speed by up to 2x.
115 lines
3.2 KiB
Go
115 lines
3.2 KiB
Go
package docker
|
|
|
|
import (
|
|
"encoding/json"
|
|
"fmt"
|
|
"strconv"
|
|
|
|
"github.com/VictoriaMetrics/VictoriaMetrics/lib/promscrape/discoveryutils"
|
|
"github.com/VictoriaMetrics/VictoriaMetrics/lib/promutils"
|
|
)
|
|
|
|
// See https://github.com/moby/moby/blob/314759dc2f4745925d8dec6d15acc7761c6e5c92/docs/api/v1.41.yaml#L4024
|
|
type container struct {
|
|
ID string
|
|
Names []string
|
|
Labels map[string]string
|
|
Ports []struct {
|
|
IP string
|
|
PrivatePort int
|
|
PublicPort int
|
|
Type string
|
|
}
|
|
HostConfig struct {
|
|
NetworkMode string
|
|
}
|
|
NetworkSettings struct {
|
|
Networks map[string]struct {
|
|
IPAddress string
|
|
NetworkID string
|
|
}
|
|
}
|
|
}
|
|
|
|
func getContainersLabels(cfg *apiConfig) ([]*promutils.Labels, error) {
|
|
networkLabels, err := getNetworksLabelsByNetworkID(cfg)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
containers, err := getContainers(cfg)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return addContainersLabels(containers, networkLabels, cfg.port, cfg.hostNetworkingHost), nil
|
|
}
|
|
|
|
func getContainers(cfg *apiConfig) ([]container, error) {
|
|
resp, err := cfg.getAPIResponse("/containers/json")
|
|
if err != nil {
|
|
return nil, fmt.Errorf("cannot query dockerd api for containers: %w", err)
|
|
}
|
|
return parseContainers(resp)
|
|
}
|
|
|
|
func parseContainers(data []byte) ([]container, error) {
|
|
var containers []container
|
|
if err := json.Unmarshal(data, &containers); err != nil {
|
|
return nil, fmt.Errorf("cannot parse containers: %w", err)
|
|
}
|
|
return containers, nil
|
|
}
|
|
|
|
func addContainersLabels(containers []container, networkLabels map[string]*promutils.Labels, defaultPort int, hostNetworkingHost string) []*promutils.Labels {
|
|
var ms []*promutils.Labels
|
|
for i := range containers {
|
|
c := &containers[i]
|
|
if len(c.Names) == 0 {
|
|
continue
|
|
}
|
|
for _, n := range c.NetworkSettings.Networks {
|
|
var added bool
|
|
for _, p := range c.Ports {
|
|
if p.Type != "tcp" {
|
|
continue
|
|
}
|
|
m := promutils.NewLabels(16)
|
|
m.Add("__address__", discoveryutils.JoinHostPort(n.IPAddress, p.PrivatePort))
|
|
m.Add("__meta_docker_network_ip", n.IPAddress)
|
|
m.Add("__meta_docker_port_private", strconv.Itoa(p.PrivatePort))
|
|
if p.PublicPort > 0 {
|
|
m.Add("__meta_docker_port_public", strconv.Itoa(p.PublicPort))
|
|
m.Add("__meta_docker_port_public_ip", p.IP)
|
|
}
|
|
addCommonLabels(m, c, networkLabels[n.NetworkID])
|
|
m.RemoveDuplicates()
|
|
ms = append(ms, m)
|
|
added = true
|
|
}
|
|
if !added {
|
|
// Use fallback port when no exposed ports are available or if all are non-TCP
|
|
addr := hostNetworkingHost
|
|
if c.HostConfig.NetworkMode != "host" {
|
|
addr = discoveryutils.JoinHostPort(n.IPAddress, defaultPort)
|
|
}
|
|
m := promutils.NewLabels(16)
|
|
m.Add("__address__", addr)
|
|
m.Add("__meta_docker_network_ip", n.IPAddress)
|
|
addCommonLabels(m, c, networkLabels[n.NetworkID])
|
|
m.RemoveDuplicates()
|
|
ms = append(ms, m)
|
|
}
|
|
}
|
|
}
|
|
return ms
|
|
}
|
|
|
|
func addCommonLabels(m *promutils.Labels, c *container, networkLabels *promutils.Labels) {
|
|
m.Add("__meta_docker_container_id", c.ID)
|
|
m.Add("__meta_docker_container_name", c.Names[0])
|
|
m.Add("__meta_docker_container_network_mode", c.HostConfig.NetworkMode)
|
|
for k, v := range c.Labels {
|
|
m.Add(discoveryutils.SanitizeLabelName("__meta_docker_container_label_"+k), v)
|
|
}
|
|
m.AddFrom(networkLabels)
|
|
}
|