mirror of
https://github.com/OneUptime/oneuptime
synced 2024-11-21 22:59:07 +00:00
0de8e2d818
This commit adds the hostname field to the server monitor report in order to include the hostname of the server in the collected metrics. This information is useful for identifying and distinguishing between different servers in the monitoring system.
151 lines
3.5 KiB
Go
151 lines
3.5 KiB
Go
package main
|
|
|
|
import (
|
|
"encoding/json"
|
|
"log/slog"
|
|
"oneuptime-infrastructure-agent/model"
|
|
"oneuptime-infrastructure-agent/utils"
|
|
"os"
|
|
"time"
|
|
|
|
"github.com/go-co-op/gocron/v2"
|
|
"github.com/gookit/greq"
|
|
)
|
|
|
|
type Agent struct {
|
|
SecretKey string
|
|
OneUptimeURL string
|
|
scheduler gocron.Scheduler
|
|
mainJob gocron.Job
|
|
shutdownHook Hook
|
|
}
|
|
|
|
func NewAgent(secretKey string, url string) *Agent {
|
|
ag := &Agent{
|
|
SecretKey: secretKey,
|
|
OneUptimeURL: url,
|
|
}
|
|
slog.Info("Starting agent...")
|
|
slog.Info("Agent configuration:")
|
|
slog.Info("Secret key: " + ag.SecretKey)
|
|
slog.Info("OneUptime URL: " + ag.OneUptimeURL)
|
|
if ag.SecretKey == "" || ag.OneUptimeURL == "" {
|
|
slog.Error("Secret key and OneUptime URL are required")
|
|
os.Exit(1)
|
|
return ag
|
|
}
|
|
|
|
// check if secret key is valid
|
|
if !checkIfSecretKeyIsValid(ag.SecretKey, ag.OneUptimeURL) {
|
|
slog.Error("Secret key is invalid")
|
|
os.Exit(1)
|
|
return ag
|
|
}
|
|
|
|
scheduler, err := gocron.NewScheduler()
|
|
if err != nil {
|
|
slog.Error(err.Error())
|
|
os.Exit(1)
|
|
return ag
|
|
}
|
|
|
|
job, err := scheduler.NewJob(gocron.DurationJob(time.Minute), gocron.NewTask(collectMetricsJob, ag.SecretKey, ag.OneUptimeURL))
|
|
if err != nil {
|
|
slog.Error(err.Error())
|
|
os.Exit(1)
|
|
return ag
|
|
}
|
|
|
|
ag.scheduler = scheduler
|
|
ag.mainJob = job
|
|
|
|
return ag
|
|
}
|
|
|
|
func (ag *Agent) Start() {
|
|
ag.scheduler.Start()
|
|
err := ag.mainJob.RunNow()
|
|
if err != nil {
|
|
slog.Info(err.Error())
|
|
os.Exit(1)
|
|
return
|
|
}
|
|
}
|
|
|
|
func (ag *Agent) Close() {
|
|
err := ag.scheduler.Shutdown()
|
|
if err != nil {
|
|
slog.Error(err.Error())
|
|
}
|
|
}
|
|
|
|
func collectMetricsJob(secretKey string, oneuptimeURL string) {
|
|
memMetrics := utils.GetMemoryMetrics()
|
|
if memMetrics == nil {
|
|
slog.Warn("Failed to get memory metrics")
|
|
}
|
|
|
|
cpuMetrics := utils.GetCpuMetrics()
|
|
if cpuMetrics == nil {
|
|
slog.Warn("Failed to get CPU metrics")
|
|
}
|
|
|
|
diskMetrics := utils.ListDiskMetrics()
|
|
if diskMetrics == nil {
|
|
slog.Warn("Failed to get disk metrics")
|
|
}
|
|
|
|
servProcesses := utils.GetServerProcesses()
|
|
if servProcesses == nil {
|
|
slog.Warn("Failed to get server processes")
|
|
}
|
|
|
|
metricsReport := &model.ServerMonitorReport{
|
|
SecretKey: secretKey,
|
|
BasicInfrastructureMetrics: &model.BasicInfrastructureMetrics{
|
|
MemoryMetrics: memMetrics,
|
|
CpuMetrics: cpuMetrics,
|
|
DiskMetrics: diskMetrics,
|
|
},
|
|
RequestReceivedAt: time.Now().UTC().Format("2006-01-02T15:04:05.000Z"),
|
|
OnlyCheckRequestReceivedAt: false,
|
|
Processes: servProcesses,
|
|
Hostname: utils.GetHostname(),
|
|
}
|
|
|
|
reqData := struct {
|
|
ServerMonitorResponse *model.ServerMonitorReport `json:"serverMonitorResponse"`
|
|
}{
|
|
ServerMonitorResponse: metricsReport,
|
|
}
|
|
postBuilder := greq.New(oneuptimeURL).Post("/server-monitor/response/ingest/" + secretKey).
|
|
JSONType().JSONBody(reqData)
|
|
resp, err := postBuilder.Do()
|
|
if err != nil {
|
|
slog.Error(err.Error())
|
|
}
|
|
if resp.IsFail() {
|
|
slog.Error("Failed to ingest metrics with status code ", resp.StatusCode)
|
|
respJson, _ := json.Marshal(resp)
|
|
slog.Error("Response: ", string(respJson))
|
|
}
|
|
slog.Info("1 minute metrics have been sent to OneUptime.")
|
|
}
|
|
|
|
func checkIfSecretKeyIsValid(secretKey string, baseUrl string) bool {
|
|
if secretKey == "" {
|
|
slog.Error("Secret key is empty")
|
|
return false
|
|
}
|
|
resp, err := greq.New(baseUrl).JSONType().GetDo("/server-monitor/secret-key/verify/" + secretKey)
|
|
if err != nil {
|
|
slog.Error(err.Error())
|
|
return false
|
|
}
|
|
if resp.StatusCode != 200 {
|
|
slog.Error("Secret key verification failed with status code ", resp.StatusCode)
|
|
return false
|
|
}
|
|
return true
|
|
}
|