1
0
Fork 0

Adding upstream version 1.34.4.

Signed-off-by: Daniel Baumann <daniel@debian.org>
This commit is contained in:
Daniel Baumann 2025-05-24 07:26:29 +02:00
parent e393c3af3f
commit 4978089aab
Signed by: daniel
GPG key ID: FBB4F0E80A80222F
4963 changed files with 677545 additions and 0 deletions

View file

@ -0,0 +1,351 @@
package gnmi
import (
"context"
"crypto/tls"
"encoding/json"
"errors"
"fmt"
"io"
"net"
"sort"
"strconv"
"strings"
"time"
"github.com/openconfig/gnmi/proto/gnmi"
"github.com/openconfig/gnmi/proto/gnmi_ext"
"google.golang.org/grpc"
"google.golang.org/grpc/credentials"
"google.golang.org/grpc/credentials/insecure"
"google.golang.org/grpc/keepalive"
"google.golang.org/protobuf/encoding/protojson"
"google.golang.org/protobuf/proto"
"github.com/influxdata/telegraf"
"github.com/influxdata/telegraf/internal/choice"
"github.com/influxdata/telegraf/metric"
"github.com/influxdata/telegraf/plugins/common/yangmodel"
"github.com/influxdata/telegraf/plugins/inputs/gnmi/extensions/jnpr_gnmi_extention"
"github.com/influxdata/telegraf/selfstat"
)
const eidJuniperTelemetryHeader = 1
type handler struct {
host string
port string
aliases map[*pathInfo]string
tagsubs []tagSubscription
maxMsgSize int
emptyNameWarnShown bool
vendorExt []string
tagStore *tagStore
trace bool
canonicalFieldNames bool
trimSlash bool
tagPathPrefix bool
guessPathStrategy string
decoder *yangmodel.Decoder
enforceFirstNamespaceAsOrigin bool
log telegraf.Logger
keepalive.ClientParameters
}
// SubscribeGNMI and extract telemetry data
func (h *handler) subscribeGNMI(ctx context.Context, acc telegraf.Accumulator, tlscfg *tls.Config, request *gnmi.SubscribeRequest) error {
var creds credentials.TransportCredentials
if tlscfg != nil {
creds = credentials.NewTLS(tlscfg)
} else {
creds = insecure.NewCredentials()
}
opts := []grpc.DialOption{
grpc.WithTransportCredentials(creds),
}
if h.maxMsgSize > 0 {
opts = append(opts, grpc.WithDefaultCallOptions(
grpc.MaxCallRecvMsgSize(h.maxMsgSize),
))
}
if h.ClientParameters.Time > 0 {
opts = append(opts, grpc.WithKeepaliveParams(h.ClientParameters))
}
// Used to report the status of the TCP connection to the device. If the
// GNMI connection goes down, but TCP is still up this will still report
// connected until the TCP connection times out.
connectStat := selfstat.Register("gnmi", "grpc_connection_status", map[string]string{"source": h.host})
defer connectStat.Set(0)
address := net.JoinHostPort(h.host, h.port)
client, err := grpc.NewClient(address, opts...)
if err != nil {
return fmt.Errorf("failed to dial: %w", err)
}
defer client.Close()
subscribeClient, err := gnmi.NewGNMIClient(client).Subscribe(ctx)
if err != nil {
return fmt.Errorf("failed to setup subscription: %w", err)
}
// If io.EOF is returned, the stream may have ended and stream status
// can be determined by calling Recv.
if err := subscribeClient.Send(request); err != nil && !errors.Is(err, io.EOF) {
return fmt.Errorf("failed to send subscription request: %w", err)
}
connectStat.Set(1)
h.log.Debugf("Connection to gNMI device %s established", address)
defer h.log.Debugf("Connection to gNMI device %s closed", address)
for ctx.Err() == nil {
var reply *gnmi.SubscribeResponse
if reply, err = subscribeClient.Recv(); err != nil {
if !errors.Is(err, io.EOF) && ctx.Err() == nil {
return fmt.Errorf("aborted gNMI subscription: %w", err)
}
break
}
if h.trace {
buf, err := protojson.Marshal(reply)
if err != nil {
h.log.Debugf("Marshal failed: %v", err)
} else {
t := reply.GetUpdate().GetTimestamp()
h.log.Debugf("Got update_%v: %s", t, string(buf))
}
}
if response, ok := reply.Response.(*gnmi.SubscribeResponse_Update); ok {
h.handleSubscribeResponseUpdate(acc, response, reply.GetExtension())
}
}
return nil
}
// Handle SubscribeResponse_Update message from gNMI and parse contained telemetry data
func (h *handler) handleSubscribeResponseUpdate(acc telegraf.Accumulator, response *gnmi.SubscribeResponse_Update, extension []*gnmi_ext.Extension) {
grouper := metric.NewSeriesGrouper()
timestamp := time.Unix(0, response.Update.Timestamp)
// Extract tags from potential extension in the update notification
headerTags := make(map[string]string)
for _, ext := range extension {
currentExt := ext.GetRegisteredExt().Msg
if currentExt == nil {
break
}
switch ext.GetRegisteredExt().Id {
case eidJuniperTelemetryHeader:
// Juniper Header extension
// Decode it only if user requested it
if choice.Contains("juniper_header", h.vendorExt) {
juniperHeader := &jnpr_gnmi_extention.GnmiJuniperTelemetryHeaderExtension{}
if err := proto.Unmarshal(currentExt, juniperHeader); err != nil {
h.log.Errorf("unmarshal gnmi Juniper Header extension failed: %v", err)
} else {
// Add only relevant Tags from the Juniper Header extension.
// These are required for aggregation
headerTags["component_id"] = strconv.FormatUint(uint64(juniperHeader.GetComponentId()), 10)
headerTags["component"] = juniperHeader.GetComponent()
headerTags["sub_component_id"] = strconv.FormatUint(uint64(juniperHeader.GetSubComponentId()), 10)
}
}
default:
continue
}
}
// Extract the path part valid for the whole set of updates if any
prefix := newInfoFromPath(response.Update.Prefix)
if h.enforceFirstNamespaceAsOrigin {
prefix.enforceFirstNamespaceAsOrigin()
}
// Add info to the tags
headerTags["source"] = h.host
if !prefix.empty() {
headerTags["path"] = prefix.fullPath()
}
// Process and remove tag-updates from the response first so we can
// add all available tags to the metrics later.
var valueFields []updateField
for _, update := range response.Update.Update {
fullPath := prefix.append(update.Path)
if h.enforceFirstNamespaceAsOrigin {
prefix.enforceFirstNamespaceAsOrigin()
}
if update.Path.Origin != "" {
fullPath.origin = update.Path.Origin
}
fields, err := h.newFieldsFromUpdate(fullPath, update)
if err != nil {
h.log.Errorf("Processing update %v failed: %v", update, err)
}
// Prepare tags from prefix
tags := make(map[string]string, len(headerTags))
for key, val := range headerTags {
tags[key] = val
}
for key, val := range fullPath.tags(h.tagPathPrefix) {
tags[key] = val
}
// TODO: Handle each field individually to allow in-JSON tags
var tagUpdate bool
for _, tagSub := range h.tagsubs {
if !fullPath.equalsPathNoKeys(tagSub.fullPath) {
continue
}
h.log.Debugf("Tag-subscription update for %q: %+v", tagSub.Name, update)
if err := h.tagStore.insert(tagSub, fullPath, fields, tags); err != nil {
h.log.Errorf("Inserting tag failed: %v", err)
}
tagUpdate = true
break
}
if !tagUpdate {
valueFields = append(valueFields, fields...)
}
}
// Some devices do not provide a prefix, so do some guesswork based
// on the paths of the fields
if headerTags["path"] == "" && h.guessPathStrategy == "common path" {
if prefixPath := guessPrefixFromUpdate(valueFields); prefixPath != "" {
headerTags["path"] = prefixPath
}
}
// Parse individual update message and create measurements
for _, field := range valueFields {
if field.path.empty() {
continue
}
// Prepare tags from prefix
fieldTags := field.path.tags(h.tagPathPrefix)
tags := make(map[string]string, len(headerTags)+len(fieldTags))
for key, val := range headerTags {
tags[key] = val
}
for key, val := range fieldTags {
tags[key] = val
}
// Add the tags derived via tag-subscriptions
for k, v := range h.tagStore.lookup(field.path, tags) {
tags[k] = v
}
// Lookup alias for the metric
aliasPath, name := h.lookupAlias(field.path)
if name == "" {
h.log.Debugf("No measurement alias for gNMI path: %s", field.path)
if !h.emptyNameWarnShown {
if buf, err := json.Marshal(response); err == nil {
h.log.Warnf(emptyNameWarning, field.path, string(buf))
} else {
h.log.Warnf(emptyNameWarning, field.path, response.Update)
}
h.emptyNameWarnShown = true
}
}
aliasInfo := newInfoFromString(aliasPath)
if h.enforceFirstNamespaceAsOrigin {
aliasInfo.enforceFirstNamespaceAsOrigin()
}
if tags["path"] == "" && h.guessPathStrategy == "subscription" {
tags["path"] = aliasInfo.String()
}
// Group metrics
var key string
if h.canonicalFieldNames {
// Strip the origin is any for the field names
field.path.origin = ""
key = field.path.String()
key = strings.ReplaceAll(key, "-", "_")
} else {
// If the alias is a subpath of the field path and the alias is
// shorter than the full path to avoid an empty key, then strip the
// common part of the field is prefixed with the alias path. Note
// the origins can match or be empty and be considered equal.
if relative := aliasInfo.relative(field.path, true); relative != "" {
key = relative
} else {
// Otherwise use the last path element as the field key
key = field.path.base()
}
key = strings.ReplaceAll(key, "-", "_")
}
if h.trimSlash {
key = strings.TrimLeft(key, "/.")
}
if key == "" {
h.log.Errorf("Invalid empty path %q with alias %q", field.path.String(), aliasPath)
continue
}
grouper.Add(name, tags, timestamp, key, field.value)
}
// Add grouped measurements
for _, metricToAdd := range grouper.Metrics() {
acc.AddMetric(metricToAdd)
}
}
// Try to find the alias for the given path
type aliasCandidate struct {
path, alias string
}
func (h *handler) lookupAlias(info *pathInfo) (aliasPath, alias string) {
candidates := make([]aliasCandidate, 0)
for i, a := range h.aliases {
if !i.isSubPathOf(info) {
continue
}
candidates = append(candidates, aliasCandidate{i.String(), a})
}
if len(candidates) == 0 {
return "", ""
}
// Reverse sort the candidates by path length so we can use the longest match
sort.SliceStable(candidates, func(i, j int) bool {
return len(candidates[i].path) > len(candidates[j].path)
})
return candidates[0].path, candidates[0].alias
}
func guessPrefixFromUpdate(fields []updateField) string {
if len(fields) == 0 {
return ""
}
if len(fields) == 1 {
return fields[0].path.dir()
}
segments := make([]segment, 0, len(fields[0].path.segments))
commonPath := &pathInfo{
origin: fields[0].path.origin,
segments: append(segments, fields[0].path.segments...),
}
for _, f := range fields[1:] {
commonPath.keepCommonPart(f.path)
}
if commonPath.empty() {
return ""
}
return commonPath.String()
}