mirror of
https://github.com/ribbybibby/ssl_exporter.git
synced 2024-11-24 08:22:17 +02:00
3a594bc445
* Bump modules and Go version * Bump go version in github actions
169 lines
4.8 KiB
Go
169 lines
4.8 KiB
Go
package main
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"net/http"
|
|
"os"
|
|
"strconv"
|
|
"time"
|
|
|
|
"github.com/alecthomas/kingpin/v2"
|
|
"github.com/go-kit/log"
|
|
"github.com/go-kit/log/level"
|
|
"github.com/prometheus/client_golang/prometheus"
|
|
"github.com/prometheus/client_golang/prometheus/promhttp"
|
|
"github.com/prometheus/common/promlog"
|
|
promlogflag "github.com/prometheus/common/promlog/flag"
|
|
"github.com/prometheus/common/version"
|
|
"github.com/ribbybibby/ssl_exporter/v2/config"
|
|
"github.com/ribbybibby/ssl_exporter/v2/prober"
|
|
)
|
|
|
|
const (
|
|
namespace = "ssl"
|
|
)
|
|
|
|
func probeHandler(logger log.Logger, w http.ResponseWriter, r *http.Request, conf *config.Config) {
|
|
moduleName := r.URL.Query().Get("module")
|
|
if moduleName == "" {
|
|
moduleName = conf.DefaultModule
|
|
if moduleName == "" {
|
|
http.Error(w, "Module parameter must be set", http.StatusBadRequest)
|
|
return
|
|
}
|
|
}
|
|
module, ok := conf.Modules[moduleName]
|
|
if !ok {
|
|
http.Error(w, fmt.Sprintf("Unknown module %q", moduleName), http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
timeout := module.Timeout
|
|
if timeout == 0 {
|
|
// The following timeout block was taken wholly from the blackbox exporter
|
|
// https://github.com/prometheus/blackbox_exporter/blob/master/main.go
|
|
var timeoutSeconds float64
|
|
if v := r.Header.Get("X-Prometheus-Scrape-Timeout-Seconds"); v != "" {
|
|
var err error
|
|
timeoutSeconds, err = strconv.ParseFloat(v, 64)
|
|
if err != nil {
|
|
http.Error(w, fmt.Sprintf("Failed to parse timeout from Prometheus header: %s", err), http.StatusInternalServerError)
|
|
return
|
|
}
|
|
} else {
|
|
timeoutSeconds = 10
|
|
}
|
|
if timeoutSeconds == 0 {
|
|
timeoutSeconds = 10
|
|
}
|
|
|
|
timeout = time.Duration((timeoutSeconds) * 1e9)
|
|
}
|
|
|
|
ctx, cancel := context.WithTimeout(r.Context(), timeout)
|
|
defer cancel()
|
|
|
|
target := module.Target
|
|
if target == "" {
|
|
target = r.URL.Query().Get("target")
|
|
if target == "" {
|
|
http.Error(w, "Target parameter is missing", http.StatusBadRequest)
|
|
return
|
|
}
|
|
}
|
|
|
|
probeFunc, ok := prober.Probers[module.Prober]
|
|
if !ok {
|
|
http.Error(w, fmt.Sprintf("Unknown prober %q", module.Prober), http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
var (
|
|
probeSuccess = prometheus.NewGauge(
|
|
prometheus.GaugeOpts{
|
|
Name: prometheus.BuildFQName(namespace, "", "probe_success"),
|
|
Help: "If the probe was a success",
|
|
},
|
|
)
|
|
proberType = prometheus.NewGaugeVec(
|
|
prometheus.GaugeOpts{
|
|
Name: prometheus.BuildFQName(namespace, "", "prober"),
|
|
Help: "The prober used by the exporter to connect to the target",
|
|
},
|
|
[]string{"prober"},
|
|
)
|
|
)
|
|
|
|
registry := prometheus.NewRegistry()
|
|
registry.MustRegister(probeSuccess, proberType)
|
|
proberType.WithLabelValues(module.Prober).Set(1)
|
|
|
|
logger = log.With(logger, "target", target, "prober", module.Prober, "timeout", timeout)
|
|
|
|
err := probeFunc(ctx, logger, target, module, registry)
|
|
if err != nil {
|
|
level.Error(logger).Log("msg", err)
|
|
probeSuccess.Set(0)
|
|
} else {
|
|
probeSuccess.Set(1)
|
|
}
|
|
|
|
// Serve
|
|
h := promhttp.HandlerFor(registry, promhttp.HandlerOpts{})
|
|
h.ServeHTTP(w, r)
|
|
}
|
|
|
|
func init() {
|
|
prometheus.MustRegister(version.NewCollector(namespace + "_exporter"))
|
|
}
|
|
|
|
func main() {
|
|
var (
|
|
listenAddress = kingpin.Flag("web.listen-address", "Address to listen on for web interface and telemetry.").Default(":9219").String()
|
|
metricsPath = kingpin.Flag("web.metrics-path", "Path under which to expose metrics").Default("/metrics").String()
|
|
probePath = kingpin.Flag("web.probe-path", "Path under which to expose the probe endpoint").Default("/probe").String()
|
|
configFile = kingpin.Flag("config.file", "SSL exporter configuration file").Default("").String()
|
|
promlogConfig = promlog.Config{}
|
|
err error
|
|
)
|
|
|
|
promlogflag.AddFlags(kingpin.CommandLine, &promlogConfig)
|
|
kingpin.Version(version.Print(namespace + "_exporter"))
|
|
kingpin.HelpFlag.Short('h')
|
|
kingpin.Parse()
|
|
|
|
logger := promlog.New(&promlogConfig)
|
|
|
|
conf := config.DefaultConfig
|
|
if *configFile != "" {
|
|
conf, err = config.LoadConfig(*configFile)
|
|
if err != nil {
|
|
level.Error(logger).Log("msg", err)
|
|
os.Exit(1)
|
|
}
|
|
}
|
|
|
|
level.Info(logger).Log("msg", fmt.Sprintf("Starting %s_exporter %s", namespace, version.Info()))
|
|
level.Info(logger).Log("msg", fmt.Sprintf("Build context %s", version.BuildContext()))
|
|
|
|
http.Handle(*metricsPath, promhttp.Handler())
|
|
http.HandleFunc(*probePath, func(w http.ResponseWriter, r *http.Request) {
|
|
probeHandler(logger, w, r, conf)
|
|
})
|
|
http.HandleFunc("/", func(w http.ResponseWriter, r *http.Request) {
|
|
_, _ = w.Write([]byte(`<html>
|
|
<head><title>SSL Exporter</title></head>
|
|
<body>
|
|
<h1>SSL Exporter</h1>
|
|
<p><a href="` + *probePath + `?target=example.com:443">Probe example.com:443 for SSL cert metrics</a></p>
|
|
<p><a href='` + *metricsPath + `'>Metrics</a></p>
|
|
</body>
|
|
</html>`))
|
|
})
|
|
|
|
level.Info(logger).Log("msg", fmt.Sprintf("Listening on %s", *listenAddress))
|
|
level.Error(logger).Log("msg", http.ListenAndServe(*listenAddress, nil))
|
|
os.Exit(1)
|
|
}
|