2019-07-18 19:36:05 +00:00
|
|
|
package metrics
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"net/http"
|
2024-02-19 14:44:03 +00:00
|
|
|
"slices"
|
2019-07-18 19:36:05 +00:00
|
|
|
"strconv"
|
|
|
|
"strings"
|
|
|
|
"time"
|
|
|
|
"unicode/utf8"
|
|
|
|
|
|
|
|
"github.com/containous/alice"
|
|
|
|
gokitmetrics "github.com/go-kit/kit/metrics"
|
2020-09-16 13:46:04 +00:00
|
|
|
"github.com/traefik/traefik/v2/pkg/log"
|
|
|
|
"github.com/traefik/traefik/v2/pkg/metrics"
|
|
|
|
"github.com/traefik/traefik/v2/pkg/middlewares"
|
2022-09-12 15:10:09 +00:00
|
|
|
"github.com/traefik/traefik/v2/pkg/middlewares/capture"
|
2020-09-16 13:46:04 +00:00
|
|
|
"github.com/traefik/traefik/v2/pkg/middlewares/retry"
|
|
|
|
traefiktls "github.com/traefik/traefik/v2/pkg/tls"
|
2019-07-18 19:36:05 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
protoHTTP = "http"
|
|
|
|
protoSSE = "sse"
|
|
|
|
protoWebsocket = "websocket"
|
|
|
|
typeName = "Metrics"
|
|
|
|
nameEntrypoint = "metrics-entrypoint"
|
2022-10-27 14:08:06 +00:00
|
|
|
nameRouter = "metrics-router"
|
2019-07-18 19:36:05 +00:00
|
|
|
nameService = "metrics-service"
|
|
|
|
)
|
|
|
|
|
|
|
|
type metricsMiddleware struct {
|
|
|
|
next http.Handler
|
2023-03-20 17:06:07 +00:00
|
|
|
reqsCounter metrics.CounterWithHeaders
|
2020-03-05 12:30:05 +00:00
|
|
|
reqsTLSCounter gokitmetrics.Counter
|
2020-03-05 14:10:07 +00:00
|
|
|
reqDurationHistogram metrics.ScalableHistogram
|
2019-07-18 19:36:05 +00:00
|
|
|
openConnsGauge gokitmetrics.Gauge
|
2022-09-12 15:10:09 +00:00
|
|
|
reqsBytesCounter gokitmetrics.Counter
|
|
|
|
respsBytesCounter gokitmetrics.Counter
|
2019-07-18 19:36:05 +00:00
|
|
|
baseLabels []string
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewEntryPointMiddleware creates a new metrics middleware for an Entrypoint.
|
|
|
|
func NewEntryPointMiddleware(ctx context.Context, next http.Handler, registry metrics.Registry, entryPointName string) http.Handler {
|
2019-09-13 17:28:04 +00:00
|
|
|
log.FromContext(middlewares.GetLoggerCtx(ctx, nameEntrypoint, typeName)).Debug("Creating middleware")
|
2019-07-18 19:36:05 +00:00
|
|
|
|
|
|
|
return &metricsMiddleware{
|
|
|
|
next: next,
|
|
|
|
reqsCounter: registry.EntryPointReqsCounter(),
|
2020-03-05 12:30:05 +00:00
|
|
|
reqsTLSCounter: registry.EntryPointReqsTLSCounter(),
|
2019-07-18 19:36:05 +00:00
|
|
|
reqDurationHistogram: registry.EntryPointReqDurationHistogram(),
|
|
|
|
openConnsGauge: registry.EntryPointOpenConnsGauge(),
|
2022-09-12 15:10:09 +00:00
|
|
|
reqsBytesCounter: registry.EntryPointReqsBytesCounter(),
|
|
|
|
respsBytesCounter: registry.EntryPointRespsBytesCounter(),
|
2019-07-18 19:36:05 +00:00
|
|
|
baseLabels: []string{"entrypoint", entryPointName},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-04-30 08:22:04 +00:00
|
|
|
// NewRouterMiddleware creates a new metrics middleware for a Router.
|
|
|
|
func NewRouterMiddleware(ctx context.Context, next http.Handler, registry metrics.Registry, routerName string, serviceName string) http.Handler {
|
2022-10-27 14:08:06 +00:00
|
|
|
log.FromContext(middlewares.GetLoggerCtx(ctx, nameRouter, typeName)).Debug("Creating middleware")
|
2021-04-30 08:22:04 +00:00
|
|
|
|
|
|
|
return &metricsMiddleware{
|
|
|
|
next: next,
|
|
|
|
reqsCounter: registry.RouterReqsCounter(),
|
|
|
|
reqsTLSCounter: registry.RouterReqsTLSCounter(),
|
|
|
|
reqDurationHistogram: registry.RouterReqDurationHistogram(),
|
|
|
|
openConnsGauge: registry.RouterOpenConnsGauge(),
|
2022-09-12 15:10:09 +00:00
|
|
|
reqsBytesCounter: registry.RouterReqsBytesCounter(),
|
|
|
|
respsBytesCounter: registry.RouterRespsBytesCounter(),
|
2021-04-30 08:22:04 +00:00
|
|
|
baseLabels: []string{"router", routerName, "service", serviceName},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-07-18 19:36:05 +00:00
|
|
|
// NewServiceMiddleware creates a new metrics middleware for a Service.
|
|
|
|
func NewServiceMiddleware(ctx context.Context, next http.Handler, registry metrics.Registry, serviceName string) http.Handler {
|
2019-09-13 17:28:04 +00:00
|
|
|
log.FromContext(middlewares.GetLoggerCtx(ctx, nameService, typeName)).Debug("Creating middleware")
|
2019-07-18 19:36:05 +00:00
|
|
|
|
|
|
|
return &metricsMiddleware{
|
|
|
|
next: next,
|
|
|
|
reqsCounter: registry.ServiceReqsCounter(),
|
2020-03-05 12:30:05 +00:00
|
|
|
reqsTLSCounter: registry.ServiceReqsTLSCounter(),
|
2019-07-18 19:36:05 +00:00
|
|
|
reqDurationHistogram: registry.ServiceReqDurationHistogram(),
|
|
|
|
openConnsGauge: registry.ServiceOpenConnsGauge(),
|
2022-09-12 15:10:09 +00:00
|
|
|
reqsBytesCounter: registry.ServiceReqsBytesCounter(),
|
|
|
|
respsBytesCounter: registry.ServiceRespsBytesCounter(),
|
2019-07-18 19:36:05 +00:00
|
|
|
baseLabels: []string{"service", serviceName},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// WrapEntryPointHandler Wraps metrics entrypoint to alice.Constructor.
|
|
|
|
func WrapEntryPointHandler(ctx context.Context, registry metrics.Registry, entryPointName string) alice.Constructor {
|
|
|
|
return func(next http.Handler) (http.Handler, error) {
|
|
|
|
return NewEntryPointMiddleware(ctx, next, registry, entryPointName), nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-04-30 08:22:04 +00:00
|
|
|
// WrapRouterHandler Wraps metrics router to alice.Constructor.
|
|
|
|
func WrapRouterHandler(ctx context.Context, registry metrics.Registry, routerName string, serviceName string) alice.Constructor {
|
|
|
|
return func(next http.Handler) (http.Handler, error) {
|
|
|
|
return NewRouterMiddleware(ctx, next, registry, routerName, serviceName), nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-07-18 19:36:05 +00:00
|
|
|
// WrapServiceHandler Wraps metrics service to alice.Constructor.
|
|
|
|
func WrapServiceHandler(ctx context.Context, registry metrics.Registry, serviceName string) alice.Constructor {
|
|
|
|
return func(next http.Handler) (http.Handler, error) {
|
|
|
|
return NewServiceMiddleware(ctx, next, registry, serviceName), nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *metricsMiddleware) ServeHTTP(rw http.ResponseWriter, req *http.Request) {
|
2020-02-11 15:40:05 +00:00
|
|
|
var labels []string
|
2019-07-18 19:36:05 +00:00
|
|
|
labels = append(labels, m.baseLabels...)
|
2020-02-11 15:40:05 +00:00
|
|
|
labels = append(labels, "method", getMethod(req), "protocol", getRequestProtocol(req))
|
2019-07-18 19:36:05 +00:00
|
|
|
|
2022-07-07 16:00:09 +00:00
|
|
|
openConnsGauge := m.openConnsGauge.With(labels...)
|
|
|
|
openConnsGauge.Add(1)
|
|
|
|
defer openConnsGauge.Add(-1)
|
2019-07-18 19:36:05 +00:00
|
|
|
|
2020-03-05 12:30:05 +00:00
|
|
|
// TLS metrics
|
|
|
|
if req.TLS != nil {
|
|
|
|
var tlsLabels []string
|
|
|
|
tlsLabels = append(tlsLabels, m.baseLabels...)
|
2021-01-20 03:08:03 +00:00
|
|
|
tlsLabels = append(tlsLabels, "tls_version", traefiktls.GetVersion(req.TLS), "tls_cipher", traefiktls.GetCipherName(req.TLS))
|
2020-03-05 12:30:05 +00:00
|
|
|
|
|
|
|
m.reqsTLSCounter.With(tlsLabels...).Add(1)
|
|
|
|
}
|
|
|
|
|
2022-09-12 15:10:09 +00:00
|
|
|
ctx := req.Context()
|
2022-10-27 14:08:06 +00:00
|
|
|
|
2022-09-12 15:10:09 +00:00
|
|
|
capt, err := capture.FromContext(ctx)
|
|
|
|
if err != nil {
|
2024-05-27 07:46:08 +00:00
|
|
|
ctxMetrics := req.Context()
|
2022-10-27 14:08:06 +00:00
|
|
|
for i := 0; i < len(m.baseLabels); i += 2 {
|
2024-05-27 07:46:08 +00:00
|
|
|
//nolint:fatcontext // false positive
|
|
|
|
ctxMetrics = log.With(ctxMetrics, log.Str(m.baseLabels[i], m.baseLabels[i+1]))
|
2022-10-27 14:08:06 +00:00
|
|
|
}
|
2024-05-27 07:46:08 +00:00
|
|
|
log.FromContext(ctxMetrics).WithError(err).Errorf("Could not get Capture")
|
2022-09-12 15:10:09 +00:00
|
|
|
return
|
|
|
|
}
|
2020-02-11 15:40:05 +00:00
|
|
|
|
2022-10-27 14:08:06 +00:00
|
|
|
next := m.next
|
|
|
|
if capt.NeedsReset(rw) {
|
|
|
|
next = capt.Reset(m.next)
|
|
|
|
}
|
|
|
|
|
|
|
|
start := time.Now()
|
|
|
|
next.ServeHTTP(rw, req)
|
|
|
|
|
2022-09-12 15:10:09 +00:00
|
|
|
labels = append(labels, "code", strconv.Itoa(capt.StatusCode()))
|
2022-07-07 16:00:09 +00:00
|
|
|
m.reqDurationHistogram.With(labels...).ObserveFromStart(start)
|
2023-03-20 17:06:07 +00:00
|
|
|
m.reqsCounter.With(req.Header, labels...).Add(1)
|
2022-09-12 15:10:09 +00:00
|
|
|
m.respsBytesCounter.With(labels...).Add(float64(capt.ResponseSize()))
|
|
|
|
m.reqsBytesCounter.With(labels...).Add(float64(capt.RequestSize()))
|
2019-07-18 19:36:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func getRequestProtocol(req *http.Request) string {
|
|
|
|
switch {
|
|
|
|
case isWebsocketRequest(req):
|
|
|
|
return protoWebsocket
|
|
|
|
case isSSERequest(req):
|
|
|
|
return protoSSE
|
|
|
|
default:
|
|
|
|
return protoHTTP
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// isWebsocketRequest determines if the specified HTTP request is a websocket handshake request.
|
|
|
|
func isWebsocketRequest(req *http.Request) bool {
|
|
|
|
return containsHeader(req, "Connection", "upgrade") && containsHeader(req, "Upgrade", "websocket")
|
|
|
|
}
|
|
|
|
|
|
|
|
// isSSERequest determines if the specified HTTP request is a request for an event subscription.
|
|
|
|
func isSSERequest(req *http.Request) bool {
|
|
|
|
return containsHeader(req, "Accept", "text/event-stream")
|
|
|
|
}
|
|
|
|
|
|
|
|
func containsHeader(req *http.Request, name, value string) bool {
|
|
|
|
items := strings.Split(req.Header.Get(name), ",")
|
2024-02-19 14:44:03 +00:00
|
|
|
|
|
|
|
return slices.ContainsFunc(items, func(item string) bool {
|
|
|
|
return value == strings.ToLower(strings.TrimSpace(item))
|
|
|
|
})
|
2019-07-18 19:36:05 +00:00
|
|
|
}
|
|
|
|
|
2022-02-09 08:58:08 +00:00
|
|
|
// getMethod returns the request's method.
|
|
|
|
// It checks whether the method is a valid UTF-8 string.
|
|
|
|
// To restrict the (potentially infinite) number of accepted values for the method,
|
|
|
|
// and avoid unbounded memory issues,
|
|
|
|
// values that are not part of the set of HTTP verbs are replaced with EXTENSION_METHOD.
|
|
|
|
// See https://developer.mozilla.org/en-US/docs/Web/HTTP/Methods
|
|
|
|
// https://datatracker.ietf.org/doc/html/rfc2616/#section-5.1.1.
|
2022-08-31 06:24:08 +00:00
|
|
|
//
|
|
|
|
//nolint:usestdlibvars
|
2019-07-18 19:36:05 +00:00
|
|
|
func getMethod(r *http.Request) string {
|
|
|
|
if !utf8.ValidString(r.Method) {
|
2022-02-09 08:58:08 +00:00
|
|
|
log.WithoutContext().Warnf("Invalid HTTP method encoding: %s", r.Method)
|
2019-07-18 19:36:05 +00:00
|
|
|
return "NON_UTF8_HTTP_METHOD"
|
|
|
|
}
|
2022-02-09 08:58:08 +00:00
|
|
|
|
|
|
|
switch r.Method {
|
|
|
|
case "HEAD", "GET", "POST", "PUT", "DELETE", "CONNECT", "OPTIONS", "TRACE", // https://datatracker.ietf.org/doc/html/rfc7231#section-4
|
|
|
|
"PATCH", // https://datatracker.ietf.org/doc/html/rfc5789#section-2
|
|
|
|
"PRI": // https://datatracker.ietf.org/doc/html/rfc7540#section-11.6
|
|
|
|
return r.Method
|
|
|
|
default:
|
|
|
|
return "EXTENSION_METHOD"
|
|
|
|
}
|
2019-07-18 19:36:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type retryMetrics interface {
|
|
|
|
ServiceRetriesCounter() gokitmetrics.Counter
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewRetryListener instantiates a MetricsRetryListener with the given retryMetrics.
|
|
|
|
func NewRetryListener(retryMetrics retryMetrics, serviceName string) retry.Listener {
|
|
|
|
return &RetryListener{retryMetrics: retryMetrics, serviceName: serviceName}
|
|
|
|
}
|
|
|
|
|
|
|
|
// RetryListener is an implementation of the RetryListener interface to
|
|
|
|
// record RequestMetrics about retry attempts.
|
|
|
|
type RetryListener struct {
|
|
|
|
retryMetrics retryMetrics
|
|
|
|
serviceName string
|
|
|
|
}
|
|
|
|
|
|
|
|
// Retried tracks the retry in the RequestMetrics implementation.
|
2022-09-12 15:10:09 +00:00
|
|
|
func (m *RetryListener) Retried(_ *http.Request, _ int) {
|
2019-07-18 19:36:05 +00:00
|
|
|
m.retryMetrics.ServiceRetriesCounter().With("service", m.serviceName).Add(1)
|
|
|
|
}
|