| /* |
| Copyright 2014 The Kubernetes Authors. |
| |
| Licensed under the Apache License, Version 2.0 (the "License"); |
| you may not use this file except in compliance with the License. |
| You may obtain a copy of the License at |
| |
| http://www.apache.org/licenses/LICENSE-2.0 |
| |
| Unless required by applicable law or agreed to in writing, software |
| distributed under the License is distributed on an "AS IS" BASIS, |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| See the License for the specific language governing permissions and |
| limitations under the License. |
| */ |
| |
| package server |
| |
| import ( |
| "context" |
| "crypto/tls" |
| "fmt" |
| "io" |
| "net" |
| "net/http" |
| "net/http/pprof" |
| "net/url" |
| "os" |
| "reflect" |
| goruntime "runtime" |
| "strconv" |
| "strings" |
| "time" |
| |
| "github.com/emicklei/go-restful/v3" |
| cadvisormetrics "github.com/google/cadvisor/container" |
| cadvisorapi "github.com/google/cadvisor/info/v1" |
| cadvisorv2 "github.com/google/cadvisor/info/v2" |
| "github.com/google/cadvisor/metrics" |
| "go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful" |
| oteltrace "go.opentelemetry.io/otel/trace" |
| "google.golang.org/grpc" |
| "k8s.io/klog/v2" |
| "k8s.io/kubernetes/pkg/kubelet/metrics/collectors" |
| "k8s.io/utils/clock" |
| netutils "k8s.io/utils/net" |
| |
| v1 "k8s.io/api/core/v1" |
| metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" |
| "k8s.io/apimachinery/pkg/runtime" |
| "k8s.io/apimachinery/pkg/runtime/schema" |
| "k8s.io/apimachinery/pkg/types" |
| "k8s.io/apimachinery/pkg/util/proxy" |
| utilruntime "k8s.io/apimachinery/pkg/util/runtime" |
| "k8s.io/apimachinery/pkg/util/sets" |
| "k8s.io/apiserver/pkg/authentication/authenticator" |
| "k8s.io/apiserver/pkg/authorization/authorizer" |
| "k8s.io/apiserver/pkg/server/healthz" |
| "k8s.io/apiserver/pkg/server/httplog" |
| "k8s.io/apiserver/pkg/server/routes" |
| utilfeature "k8s.io/apiserver/pkg/util/feature" |
| "k8s.io/apiserver/pkg/util/flushwriter" |
| "k8s.io/component-base/configz" |
| "k8s.io/component-base/logs" |
| compbasemetrics "k8s.io/component-base/metrics" |
| metricsfeatures "k8s.io/component-base/metrics/features" |
| "k8s.io/component-base/metrics/legacyregistry" |
| "k8s.io/component-base/metrics/prometheus/slis" |
| runtimeapi "k8s.io/cri-api/pkg/apis/runtime/v1" |
| podresourcesapi "k8s.io/kubelet/pkg/apis/podresources/v1" |
| podresourcesapiv1alpha1 "k8s.io/kubelet/pkg/apis/podresources/v1alpha1" |
| "k8s.io/kubelet/pkg/cri/streaming" |
| "k8s.io/kubelet/pkg/cri/streaming/portforward" |
| remotecommandserver "k8s.io/kubelet/pkg/cri/streaming/remotecommand" |
| kubelettypes "k8s.io/kubelet/pkg/types" |
| "k8s.io/kubernetes/pkg/api/legacyscheme" |
| api "k8s.io/kubernetes/pkg/apis/core" |
| "k8s.io/kubernetes/pkg/apis/core/v1/validation" |
| "k8s.io/kubernetes/pkg/features" |
| kubeletconfiginternal "k8s.io/kubernetes/pkg/kubelet/apis/config" |
| apisgrpc "k8s.io/kubernetes/pkg/kubelet/apis/grpc" |
| "k8s.io/kubernetes/pkg/kubelet/apis/podresources" |
| kubecontainer "k8s.io/kubernetes/pkg/kubelet/container" |
| "k8s.io/kubernetes/pkg/kubelet/prober" |
| servermetrics "k8s.io/kubernetes/pkg/kubelet/server/metrics" |
| "k8s.io/kubernetes/pkg/kubelet/server/stats" |
| "k8s.io/kubernetes/pkg/kubelet/util" |
| ) |
| |
| func init() { |
| utilruntime.Must(metricsfeatures.AddFeatureGates(utilfeature.DefaultMutableFeatureGate)) |
| } |
| |
| const ( |
| metricsPath = "/metrics" |
| cadvisorMetricsPath = "/metrics/cadvisor" |
| resourceMetricsPath = "/metrics/resource" |
| proberMetricsPath = "/metrics/probes" |
| statsPath = "/stats/" |
| logsPath = "/logs/" |
| checkpointPath = "/checkpoint/" |
| pprofBasePath = "/debug/pprof/" |
| debugFlagPath = "/debug/flags/v" |
| ) |
| |
| // Server is a http.Handler which exposes kubelet functionality over HTTP. |
| type Server struct { |
| auth AuthInterface |
| host HostInterface |
| restfulCont containerInterface |
| metricsBuckets sets.String |
| metricsMethodBuckets sets.String |
| resourceAnalyzer stats.ResourceAnalyzer |
| } |
| |
| // TLSOptions holds the TLS options. |
| type TLSOptions struct { |
| Config *tls.Config |
| CertFile string |
| KeyFile string |
| } |
| |
| // containerInterface defines the restful.Container functions used on the root container |
| type containerInterface interface { |
| Add(service *restful.WebService) *restful.Container |
| Handle(path string, handler http.Handler) |
| Filter(filter restful.FilterFunction) |
| ServeHTTP(w http.ResponseWriter, r *http.Request) |
| RegisteredWebServices() []*restful.WebService |
| |
| // RegisteredHandlePaths returns the paths of handlers registered directly with the container (non-web-services) |
| // Used to test filters are being applied on non-web-service handlers |
| RegisteredHandlePaths() []string |
| } |
| |
| // filteringContainer delegates all Handle(...) calls to Container.HandleWithFilter(...), |
| // so we can ensure restful.FilterFunctions are used for all handlers |
| type filteringContainer struct { |
| *restful.Container |
| |
| registeredHandlePaths []string |
| } |
| |
| func (a *filteringContainer) Handle(path string, handler http.Handler) { |
| a.HandleWithFilter(path, handler) |
| a.registeredHandlePaths = append(a.registeredHandlePaths, path) |
| } |
| func (a *filteringContainer) RegisteredHandlePaths() []string { |
| return a.registeredHandlePaths |
| } |
| |
| // ListenAndServeKubeletServer initializes a server to respond to HTTP network requests on the Kubelet. |
| func ListenAndServeKubeletServer( |
| host HostInterface, |
| resourceAnalyzer stats.ResourceAnalyzer, |
| kubeCfg *kubeletconfiginternal.KubeletConfiguration, |
| tlsOptions *TLSOptions, |
| auth AuthInterface, |
| tp oteltrace.TracerProvider) { |
| |
| address := netutils.ParseIPSloppy(kubeCfg.Address) |
| port := uint(kubeCfg.Port) |
| klog.InfoS("Starting to listen", "address", address, "port", port) |
| handler := NewServer(host, resourceAnalyzer, auth, tp, kubeCfg) |
| s := &http.Server{ |
| Addr: net.JoinHostPort(address.String(), strconv.FormatUint(uint64(port), 10)), |
| Handler: &handler, |
| IdleTimeout: 90 * time.Second, // matches http.DefaultTransport keep-alive timeout |
| ReadTimeout: 4 * 60 * time.Minute, |
| WriteTimeout: 4 * 60 * time.Minute, |
| MaxHeaderBytes: 1 << 20, |
| } |
| |
| if tlsOptions != nil { |
| s.TLSConfig = tlsOptions.Config |
| // Passing empty strings as the cert and key files means no |
| // cert/keys are specified and GetCertificate in the TLSConfig |
| // should be called instead. |
| if err := s.ListenAndServeTLS(tlsOptions.CertFile, tlsOptions.KeyFile); err != nil { |
| klog.ErrorS(err, "Failed to listen and serve") |
| os.Exit(1) |
| } |
| } else if err := s.ListenAndServe(); err != nil { |
| klog.ErrorS(err, "Failed to listen and serve") |
| os.Exit(1) |
| } |
| } |
| |
| // ListenAndServeKubeletReadOnlyServer initializes a server to respond to HTTP network requests on the Kubelet. |
| func ListenAndServeKubeletReadOnlyServer( |
| host HostInterface, |
| resourceAnalyzer stats.ResourceAnalyzer, |
| address net.IP, |
| port uint) { |
| klog.InfoS("Starting to listen read-only", "address", address, "port", port) |
| // TODO: https://github.com/kubernetes/kubernetes/issues/109829 tracer should use WithPublicEndpoint |
| s := NewServer(host, resourceAnalyzer, nil, oteltrace.NewNoopTracerProvider(), nil) |
| |
| server := &http.Server{ |
| Addr: net.JoinHostPort(address.String(), strconv.FormatUint(uint64(port), 10)), |
| Handler: &s, |
| IdleTimeout: 90 * time.Second, // matches http.DefaultTransport keep-alive timeout |
| ReadTimeout: 4 * 60 * time.Minute, |
| WriteTimeout: 4 * 60 * time.Minute, |
| MaxHeaderBytes: 1 << 20, |
| } |
| |
| if err := server.ListenAndServe(); err != nil { |
| klog.ErrorS(err, "Failed to listen and serve") |
| os.Exit(1) |
| } |
| } |
| |
| // ListenAndServePodResources initializes a gRPC server to serve the PodResources service |
| func ListenAndServePodResources(endpoint string, providers podresources.PodResourcesProviders) { |
| server := grpc.NewServer(apisgrpc.WithRateLimiter("podresources", podresources.DefaultQPS, podresources.DefaultBurstTokens)) |
| |
| podresourcesapiv1alpha1.RegisterPodResourcesListerServer(server, podresources.NewV1alpha1PodResourcesServer(providers)) |
| podresourcesapi.RegisterPodResourcesListerServer(server, podresources.NewV1PodResourcesServer(providers)) |
| |
| l, err := util.CreateListener(endpoint) |
| if err != nil { |
| klog.ErrorS(err, "Failed to create listener for podResources endpoint") |
| os.Exit(1) |
| } |
| |
| klog.InfoS("Starting to serve the podresources API", "endpoint", endpoint) |
| if err := server.Serve(l); err != nil { |
| klog.ErrorS(err, "Failed to serve") |
| os.Exit(1) |
| } |
| } |
| |
| // AuthInterface contains all methods required by the auth filters |
| type AuthInterface interface { |
| authenticator.Request |
| authorizer.RequestAttributesGetter |
| authorizer.Authorizer |
| } |
| |
| // HostInterface contains all the kubelet methods required by the server. |
| // For testability. |
| type HostInterface interface { |
| stats.Provider |
| GetVersionInfo() (*cadvisorapi.VersionInfo, error) |
| GetCachedMachineInfo() (*cadvisorapi.MachineInfo, error) |
| GetRunningPods(ctx context.Context) ([]*v1.Pod, error) |
| RunInContainer(ctx context.Context, name string, uid types.UID, container string, cmd []string) ([]byte, error) |
| CheckpointContainer(ctx context.Context, podUID types.UID, podFullName, containerName string, options *runtimeapi.CheckpointContainerRequest) error |
| GetKubeletContainerLogs(ctx context.Context, podFullName, containerName string, logOptions *v1.PodLogOptions, stdout, stderr io.Writer) error |
| ServeLogs(w http.ResponseWriter, req *http.Request) |
| ResyncInterval() time.Duration |
| GetHostname() string |
| LatestLoopEntryTime() time.Time |
| GetExec(ctx context.Context, podFullName string, podUID types.UID, containerName string, cmd []string, streamOpts remotecommandserver.Options) (*url.URL, error) |
| GetAttach(ctx context.Context, podFullName string, podUID types.UID, containerName string, streamOpts remotecommandserver.Options) (*url.URL, error) |
| GetPortForward(ctx context.Context, podName, podNamespace string, podUID types.UID, portForwardOpts portforward.V4Options) (*url.URL, error) |
| ListMetricDescriptors(ctx context.Context) ([]*runtimeapi.MetricDescriptor, error) |
| ListPodSandboxMetrics(ctx context.Context) ([]*runtimeapi.PodSandboxMetrics, error) |
| } |
| |
| // NewServer initializes and configures a kubelet.Server object to handle HTTP requests. |
| func NewServer( |
| host HostInterface, |
| resourceAnalyzer stats.ResourceAnalyzer, |
| auth AuthInterface, |
| tp oteltrace.TracerProvider, |
| kubeCfg *kubeletconfiginternal.KubeletConfiguration) Server { |
| |
| server := Server{ |
| host: host, |
| resourceAnalyzer: resourceAnalyzer, |
| auth: auth, |
| restfulCont: &filteringContainer{Container: restful.NewContainer()}, |
| metricsBuckets: sets.NewString(), |
| metricsMethodBuckets: sets.NewString("OPTIONS", "GET", "HEAD", "POST", "PUT", "DELETE", "TRACE", "CONNECT"), |
| } |
| if auth != nil { |
| server.InstallAuthFilter() |
| } |
| if utilfeature.DefaultFeatureGate.Enabled(features.KubeletTracing) { |
| server.InstallTracingFilter(tp) |
| } |
| server.InstallDefaultHandlers() |
| if kubeCfg != nil && kubeCfg.EnableDebuggingHandlers { |
| server.InstallDebuggingHandlers() |
| // To maintain backward compatibility serve logs and pprof only when enableDebuggingHandlers is also enabled |
| // see https://github.com/kubernetes/kubernetes/pull/87273 |
| server.InstallSystemLogHandler(kubeCfg.EnableSystemLogHandler, kubeCfg.EnableSystemLogQuery) |
| server.InstallProfilingHandler(kubeCfg.EnableProfilingHandler, kubeCfg.EnableContentionProfiling) |
| server.InstallDebugFlagsHandler(kubeCfg.EnableDebugFlagsHandler) |
| } else { |
| server.InstallDebuggingDisabledHandlers() |
| } |
| return server |
| } |
| |
| // InstallAuthFilter installs authentication filters with the restful Container. |
| func (s *Server) InstallAuthFilter() { |
| s.restfulCont.Filter(func(req *restful.Request, resp *restful.Response, chain *restful.FilterChain) { |
| // Authenticate |
| info, ok, err := s.auth.AuthenticateRequest(req.Request) |
| if err != nil { |
| klog.ErrorS(err, "Unable to authenticate the request due to an error") |
| resp.WriteErrorString(http.StatusUnauthorized, "Unauthorized") |
| return |
| } |
| if !ok { |
| resp.WriteErrorString(http.StatusUnauthorized, "Unauthorized") |
| return |
| } |
| |
| // Get authorization attributes |
| attrs := s.auth.GetRequestAttributes(info.User, req.Request) |
| |
| // Authorize |
| decision, _, err := s.auth.Authorize(req.Request.Context(), attrs) |
| if err != nil { |
| klog.ErrorS(err, "Authorization error", "user", attrs.GetUser().GetName(), "verb", attrs.GetVerb(), "resource", attrs.GetResource(), "subresource", attrs.GetSubresource()) |
| msg := fmt.Sprintf("Authorization error (user=%s, verb=%s, resource=%s, subresource=%s)", attrs.GetUser().GetName(), attrs.GetVerb(), attrs.GetResource(), attrs.GetSubresource()) |
| resp.WriteErrorString(http.StatusInternalServerError, msg) |
| return |
| } |
| if decision != authorizer.DecisionAllow { |
| klog.V(2).InfoS("Forbidden", "user", attrs.GetUser().GetName(), "verb", attrs.GetVerb(), "resource", attrs.GetResource(), "subresource", attrs.GetSubresource()) |
| msg := fmt.Sprintf("Forbidden (user=%s, verb=%s, resource=%s, subresource=%s)", attrs.GetUser().GetName(), attrs.GetVerb(), attrs.GetResource(), attrs.GetSubresource()) |
| resp.WriteErrorString(http.StatusForbidden, msg) |
| return |
| } |
| |
| // Continue |
| chain.ProcessFilter(req, resp) |
| }) |
| } |
| |
| // InstallTracingFilter installs OpenTelemetry tracing filter with the restful Container. |
| func (s *Server) InstallTracingFilter(tp oteltrace.TracerProvider) { |
| s.restfulCont.Filter(otelrestful.OTelFilter("kubelet", otelrestful.WithTracerProvider(tp))) |
| } |
| |
| // addMetricsBucketMatcher adds a regexp matcher and the relevant bucket to use when |
| // it matches. Please be aware this is not thread safe and should not be used dynamically |
| func (s *Server) addMetricsBucketMatcher(bucket string) { |
| s.metricsBuckets.Insert(bucket) |
| } |
| |
| // getMetricBucket find the appropriate metrics reporting bucket for the given path |
| func (s *Server) getMetricBucket(path string) string { |
| root := getURLRootPath(path) |
| if s.metricsBuckets.Has(root) { |
| return root |
| } |
| return "other" |
| } |
| |
| // getMetricMethodBucket checks for unknown or invalid HTTP verbs |
| func (s *Server) getMetricMethodBucket(method string) string { |
| if s.metricsMethodBuckets.Has(method) { |
| return method |
| } |
| return "other" |
| } |
| |
| // InstallDefaultHandlers registers the default set of supported HTTP request |
| // patterns with the restful Container. |
| func (s *Server) InstallDefaultHandlers() { |
| s.addMetricsBucketMatcher("healthz") |
| healthz.InstallHandler(s.restfulCont, |
| healthz.PingHealthz, |
| healthz.LogHealthz, |
| healthz.NamedCheck("syncloop", s.syncLoopHealthCheck), |
| ) |
| |
| slis.SLIMetricsWithReset{}.Install(s.restfulCont) |
| |
| s.addMetricsBucketMatcher("pods") |
| ws := new(restful.WebService) |
| ws. |
| Path("/pods"). |
| Produces(restful.MIME_JSON) |
| ws.Route(ws.GET(""). |
| To(s.getPods). |
| Operation("getPods")) |
| s.restfulCont.Add(ws) |
| |
| s.addMetricsBucketMatcher("stats") |
| s.restfulCont.Add(stats.CreateHandlers(statsPath, s.host, s.resourceAnalyzer)) |
| |
| s.addMetricsBucketMatcher("metrics") |
| s.addMetricsBucketMatcher("metrics/cadvisor") |
| s.addMetricsBucketMatcher("metrics/probes") |
| s.addMetricsBucketMatcher("metrics/resource") |
| s.restfulCont.Handle(metricsPath, legacyregistry.Handler()) |
| |
| includedMetrics := cadvisormetrics.MetricSet{ |
| cadvisormetrics.CpuUsageMetrics: struct{}{}, |
| cadvisormetrics.MemoryUsageMetrics: struct{}{}, |
| cadvisormetrics.CpuLoadMetrics: struct{}{}, |
| cadvisormetrics.DiskIOMetrics: struct{}{}, |
| cadvisormetrics.DiskUsageMetrics: struct{}{}, |
| cadvisormetrics.NetworkUsageMetrics: struct{}{}, |
| cadvisormetrics.AppMetrics: struct{}{}, |
| cadvisormetrics.ProcessMetrics: struct{}{}, |
| cadvisormetrics.OOMMetrics: struct{}{}, |
| } |
| // cAdvisor metrics are exposed under the secured handler as well |
| r := compbasemetrics.NewKubeRegistry() |
| r.RawMustRegister(metrics.NewPrometheusMachineCollector(prometheusHostAdapter{s.host}, includedMetrics)) |
| if utilfeature.DefaultFeatureGate.Enabled(features.PodAndContainerStatsFromCRI) { |
| r.CustomRegister(collectors.NewCRIMetricsCollector(context.TODO(), s.host.ListPodSandboxMetrics, s.host.ListMetricDescriptors)) |
| } else { |
| cadvisorOpts := cadvisorv2.RequestOptions{ |
| IdType: cadvisorv2.TypeName, |
| Count: 1, |
| Recursive: true, |
| } |
| r.RawMustRegister(metrics.NewPrometheusCollector(prometheusHostAdapter{s.host}, containerPrometheusLabelsFunc(s.host), includedMetrics, clock.RealClock{}, cadvisorOpts)) |
| } |
| s.restfulCont.Handle(cadvisorMetricsPath, |
| compbasemetrics.HandlerFor(r, compbasemetrics.HandlerOpts{ErrorHandling: compbasemetrics.ContinueOnError}), |
| ) |
| |
| s.addMetricsBucketMatcher("metrics/resource") |
| resourceRegistry := compbasemetrics.NewKubeRegistry() |
| resourceRegistry.CustomMustRegister(collectors.NewResourceMetricsCollector(s.resourceAnalyzer)) |
| s.restfulCont.Handle(resourceMetricsPath, |
| compbasemetrics.HandlerFor(resourceRegistry, compbasemetrics.HandlerOpts{ErrorHandling: compbasemetrics.ContinueOnError}), |
| ) |
| |
| // prober metrics are exposed under a different endpoint |
| |
| s.addMetricsBucketMatcher("metrics/probes") |
| p := compbasemetrics.NewKubeRegistry() |
| _ = compbasemetrics.RegisterProcessStartTime(p.Register) |
| p.MustRegister(prober.ProberResults) |
| p.MustRegister(prober.ProberDuration) |
| s.restfulCont.Handle(proberMetricsPath, |
| compbasemetrics.HandlerFor(p, compbasemetrics.HandlerOpts{ErrorHandling: compbasemetrics.ContinueOnError}), |
| ) |
| |
| // Only enable checkpoint API if the feature is enabled |
| if utilfeature.DefaultFeatureGate.Enabled(features.ContainerCheckpoint) { |
| s.addMetricsBucketMatcher("checkpoint") |
| ws = &restful.WebService{} |
| ws.Path(checkpointPath).Produces(restful.MIME_JSON) |
| ws.Route(ws.POST("/{podNamespace}/{podID}/{containerName}"). |
| To(s.checkpoint). |
| Operation("checkpoint")) |
| s.restfulCont.Add(ws) |
| } |
| } |
| |
| // InstallDebuggingHandlers registers the HTTP request patterns that serve logs or run commands/containers |
| func (s *Server) InstallDebuggingHandlers() { |
| klog.InfoS("Adding debug handlers to kubelet server") |
| |
| s.addMetricsBucketMatcher("run") |
| ws := new(restful.WebService) |
| ws. |
| Path("/run") |
| ws.Route(ws.POST("/{podNamespace}/{podID}/{containerName}"). |
| To(s.getRun). |
| Operation("getRun")) |
| ws.Route(ws.POST("/{podNamespace}/{podID}/{uid}/{containerName}"). |
| To(s.getRun). |
| Operation("getRun")) |
| s.restfulCont.Add(ws) |
| |
| s.addMetricsBucketMatcher("exec") |
| ws = new(restful.WebService) |
| ws. |
| Path("/exec") |
| ws.Route(ws.GET("/{podNamespace}/{podID}/{containerName}"). |
| To(s.getExec). |
| Operation("getExec")) |
| ws.Route(ws.POST("/{podNamespace}/{podID}/{containerName}"). |
| To(s.getExec). |
| Operation("getExec")) |
| ws.Route(ws.GET("/{podNamespace}/{podID}/{uid}/{containerName}"). |
| To(s.getExec). |
| Operation("getExec")) |
| ws.Route(ws.POST("/{podNamespace}/{podID}/{uid}/{containerName}"). |
| To(s.getExec). |
| Operation("getExec")) |
| s.restfulCont.Add(ws) |
| |
| s.addMetricsBucketMatcher("attach") |
| ws = new(restful.WebService) |
| ws. |
| Path("/attach") |
| ws.Route(ws.GET("/{podNamespace}/{podID}/{containerName}"). |
| To(s.getAttach). |
| Operation("getAttach")) |
| ws.Route(ws.POST("/{podNamespace}/{podID}/{containerName}"). |
| To(s.getAttach). |
| Operation("getAttach")) |
| ws.Route(ws.GET("/{podNamespace}/{podID}/{uid}/{containerName}"). |
| To(s.getAttach). |
| Operation("getAttach")) |
| ws.Route(ws.POST("/{podNamespace}/{podID}/{uid}/{containerName}"). |
| To(s.getAttach). |
| Operation("getAttach")) |
| s.restfulCont.Add(ws) |
| |
| s.addMetricsBucketMatcher("portForward") |
| ws = new(restful.WebService) |
| ws. |
| Path("/portForward") |
| ws.Route(ws.GET("/{podNamespace}/{podID}"). |
| To(s.getPortForward). |
| Operation("getPortForward")) |
| ws.Route(ws.POST("/{podNamespace}/{podID}"). |
| To(s.getPortForward). |
| Operation("getPortForward")) |
| ws.Route(ws.GET("/{podNamespace}/{podID}/{uid}"). |
| To(s.getPortForward). |
| Operation("getPortForward")) |
| ws.Route(ws.POST("/{podNamespace}/{podID}/{uid}"). |
| To(s.getPortForward). |
| Operation("getPortForward")) |
| s.restfulCont.Add(ws) |
| |
| s.addMetricsBucketMatcher("containerLogs") |
| ws = new(restful.WebService) |
| ws. |
| Path("/containerLogs") |
| ws.Route(ws.GET("/{podNamespace}/{podID}/{containerName}"). |
| To(s.getContainerLogs). |
| Operation("getContainerLogs")) |
| s.restfulCont.Add(ws) |
| |
| s.addMetricsBucketMatcher("configz") |
| configz.InstallHandler(s.restfulCont) |
| |
| // The /runningpods endpoint is used for testing only. |
| s.addMetricsBucketMatcher("runningpods") |
| ws = new(restful.WebService) |
| ws. |
| Path("/runningpods/"). |
| Produces(restful.MIME_JSON) |
| ws.Route(ws.GET(""). |
| To(s.getRunningPods). |
| Operation("getRunningPods")) |
| s.restfulCont.Add(ws) |
| } |
| |
| // InstallDebuggingDisabledHandlers registers the HTTP request patterns that provide better error message |
| func (s *Server) InstallDebuggingDisabledHandlers() { |
| h := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { |
| http.Error(w, "Debug endpoints are disabled.", http.StatusMethodNotAllowed) |
| }) |
| |
| s.addMetricsBucketMatcher("run") |
| s.addMetricsBucketMatcher("exec") |
| s.addMetricsBucketMatcher("attach") |
| s.addMetricsBucketMatcher("portForward") |
| s.addMetricsBucketMatcher("containerLogs") |
| s.addMetricsBucketMatcher("runningpods") |
| s.addMetricsBucketMatcher("pprof") |
| s.addMetricsBucketMatcher("logs") |
| paths := []string{ |
| "/run/", "/exec/", "/attach/", "/portForward/", "/containerLogs/", |
| "/runningpods/", pprofBasePath, logsPath} |
| for _, p := range paths { |
| s.restfulCont.Handle(p, h) |
| } |
| } |
| |
| // InstallSystemLogHandler registers the HTTP request patterns for logs endpoint. |
| func (s *Server) InstallSystemLogHandler(enableSystemLogHandler bool, enableSystemLogQuery bool) { |
| s.addMetricsBucketMatcher("logs") |
| if enableSystemLogHandler { |
| ws := new(restful.WebService) |
| ws.Path(logsPath) |
| ws.Route(ws.GET(""). |
| To(s.getLogs). |
| Operation("getLogs")) |
| if !enableSystemLogQuery { |
| ws.Route(ws.GET("/{logpath:*}"). |
| To(s.getLogs). |
| Operation("getLogs"). |
| Param(ws.PathParameter("logpath", "path to the log").DataType("string"))) |
| } else { |
| ws.Route(ws.GET("/{logpath:*}"). |
| To(s.getLogs). |
| Operation("getLogs"). |
| Param(ws.PathParameter("logpath", "path to the log").DataType("string")). |
| Param(ws.QueryParameter("query", "query specifies services(s) or files from which to return logs").DataType("string")). |
| Param(ws.QueryParameter("sinceTime", "sinceTime is an RFC3339 timestamp from which to show logs").DataType("string")). |
| Param(ws.QueryParameter("untilTime", "untilTime is an RFC3339 timestamp until which to show logs").DataType("string")). |
| Param(ws.QueryParameter("tailLines", "tailLines is used to retrieve the specified number of lines from the end of the log").DataType("string")). |
| Param(ws.QueryParameter("pattern", "pattern filters log entries by the provided regex pattern").DataType("string")). |
| Param(ws.QueryParameter("boot", "boot show messages from a specific system boot").DataType("string"))) |
| } |
| s.restfulCont.Add(ws) |
| } else { |
| s.restfulCont.Handle(logsPath, getHandlerForDisabledEndpoint("logs endpoint is disabled.")) |
| } |
| } |
| |
| func getHandlerForDisabledEndpoint(errorMessage string) http.HandlerFunc { |
| return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { |
| http.Error(w, errorMessage, http.StatusMethodNotAllowed) |
| }) |
| } |
| |
| // InstallDebugFlagsHandler registers the HTTP request patterns for /debug/flags/v endpoint. |
| func (s *Server) InstallDebugFlagsHandler(enableDebugFlagsHandler bool) { |
| if enableDebugFlagsHandler { |
| // Setup flags handlers. |
| // so far, only logging related endpoints are considered valid to add for these debug flags. |
| s.restfulCont.Handle(debugFlagPath, routes.StringFlagPutHandler(logs.GlogSetter)) |
| } else { |
| s.restfulCont.Handle(debugFlagPath, getHandlerForDisabledEndpoint("flags endpoint is disabled.")) |
| return |
| } |
| } |
| |
| // InstallProfilingHandler registers the HTTP request patterns for /debug/pprof endpoint. |
| func (s *Server) InstallProfilingHandler(enableProfilingLogHandler bool, enableContentionProfiling bool) { |
| s.addMetricsBucketMatcher("debug") |
| if !enableProfilingLogHandler { |
| s.restfulCont.Handle(pprofBasePath, getHandlerForDisabledEndpoint("profiling endpoint is disabled.")) |
| return |
| } |
| |
| handlePprofEndpoint := func(req *restful.Request, resp *restful.Response) { |
| name := strings.TrimPrefix(req.Request.URL.Path, pprofBasePath) |
| switch name { |
| case "profile": |
| pprof.Profile(resp, req.Request) |
| case "symbol": |
| pprof.Symbol(resp, req.Request) |
| case "cmdline": |
| pprof.Cmdline(resp, req.Request) |
| case "trace": |
| pprof.Trace(resp, req.Request) |
| default: |
| pprof.Index(resp, req.Request) |
| } |
| } |
| |
| // Setup pprof handlers. |
| ws := new(restful.WebService).Path(pprofBasePath) |
| ws.Route(ws.GET("/{subpath:*}").To(handlePprofEndpoint)).Doc("pprof endpoint") |
| s.restfulCont.Add(ws) |
| |
| if enableContentionProfiling { |
| goruntime.SetBlockProfileRate(1) |
| } |
| } |
| |
| // Checks if kubelet's sync loop that updates containers is working. |
| func (s *Server) syncLoopHealthCheck(req *http.Request) error { |
| duration := s.host.ResyncInterval() * 2 |
| minDuration := time.Minute * 5 |
| if duration < minDuration { |
| duration = minDuration |
| } |
| enterLoopTime := s.host.LatestLoopEntryTime() |
| if !enterLoopTime.IsZero() && time.Now().After(enterLoopTime.Add(duration)) { |
| return fmt.Errorf("sync Loop took longer than expected") |
| } |
| return nil |
| } |
| |
| // getContainerLogs handles containerLogs request against the Kubelet |
| func (s *Server) getContainerLogs(request *restful.Request, response *restful.Response) { |
| podNamespace := request.PathParameter("podNamespace") |
| podID := request.PathParameter("podID") |
| containerName := request.PathParameter("containerName") |
| ctx := request.Request.Context() |
| |
| if len(podID) == 0 { |
| // TODO: Why return JSON when the rest return plaintext errors? |
| // TODO: Why return plaintext errors? |
| response.WriteError(http.StatusBadRequest, fmt.Errorf(`{"message": "Missing podID."}`)) |
| return |
| } |
| if len(containerName) == 0 { |
| // TODO: Why return JSON when the rest return plaintext errors? |
| response.WriteError(http.StatusBadRequest, fmt.Errorf(`{"message": "Missing container name."}`)) |
| return |
| } |
| if len(podNamespace) == 0 { |
| // TODO: Why return JSON when the rest return plaintext errors? |
| response.WriteError(http.StatusBadRequest, fmt.Errorf(`{"message": "Missing podNamespace."}`)) |
| return |
| } |
| |
| query := request.Request.URL.Query() |
| // backwards compatibility for the "tail" query parameter |
| if tail := request.QueryParameter("tail"); len(tail) > 0 { |
| query["tailLines"] = []string{tail} |
| // "all" is the same as omitting tail |
| if tail == "all" { |
| delete(query, "tailLines") |
| } |
| } |
| // container logs on the kubelet are locked to the v1 API version of PodLogOptions |
| logOptions := &v1.PodLogOptions{} |
| if err := legacyscheme.ParameterCodec.DecodeParameters(query, v1.SchemeGroupVersion, logOptions); err != nil { |
| response.WriteError(http.StatusBadRequest, fmt.Errorf(`{"message": "Unable to decode query."}`)) |
| return |
| } |
| logOptions.TypeMeta = metav1.TypeMeta{} |
| if errs := validation.ValidatePodLogOptions(logOptions); len(errs) > 0 { |
| response.WriteError(http.StatusUnprocessableEntity, fmt.Errorf(`{"message": "Invalid request."}`)) |
| return |
| } |
| |
| pod, ok := s.host.GetPodByName(podNamespace, podID) |
| if !ok { |
| response.WriteError(http.StatusNotFound, fmt.Errorf("pod %q does not exist", podID)) |
| return |
| } |
| // Check if containerName is valid. |
| if kubecontainer.GetContainerSpec(pod, containerName) == nil { |
| response.WriteError(http.StatusNotFound, fmt.Errorf("container %q not found in pod %q", containerName, podID)) |
| return |
| } |
| |
| if _, ok := response.ResponseWriter.(http.Flusher); !ok { |
| response.WriteError(http.StatusInternalServerError, fmt.Errorf("unable to convert %v into http.Flusher, cannot show logs", reflect.TypeOf(response))) |
| return |
| } |
| fw := flushwriter.Wrap(response.ResponseWriter) |
| response.Header().Set("Transfer-Encoding", "chunked") |
| if err := s.host.GetKubeletContainerLogs(ctx, kubecontainer.GetPodFullName(pod), containerName, logOptions, fw, fw); err != nil { |
| response.WriteError(http.StatusBadRequest, err) |
| return |
| } |
| } |
| |
| // encodePods creates an v1.PodList object from pods and returns the encoded |
| // PodList. |
| func encodePods(pods []*v1.Pod) (data []byte, err error) { |
| podList := new(v1.PodList) |
| for _, pod := range pods { |
| podList.Items = append(podList.Items, *pod) |
| } |
| // TODO: this needs to be parameterized to the kubelet, not hardcoded. Depends on Kubelet |
| // as API server refactor. |
| // TODO: Locked to v1, needs to be made generic |
| codec := legacyscheme.Codecs.LegacyCodec(schema.GroupVersion{Group: v1.GroupName, Version: "v1"}) |
| return runtime.Encode(codec, podList) |
| } |
| |
| // getPods returns a list of pods bound to the Kubelet and their spec. |
| func (s *Server) getPods(request *restful.Request, response *restful.Response) { |
| pods := s.host.GetPods() |
| data, err := encodePods(pods) |
| if err != nil { |
| response.WriteError(http.StatusInternalServerError, err) |
| return |
| } |
| writeJSONResponse(response, data) |
| } |
| |
| // getRunningPods returns a list of pods running on Kubelet. The list is |
| // provided by the container runtime, and is different from the list returned |
| // by getPods, which is a set of desired pods to run. |
| func (s *Server) getRunningPods(request *restful.Request, response *restful.Response) { |
| ctx := request.Request.Context() |
| pods, err := s.host.GetRunningPods(ctx) |
| if err != nil { |
| response.WriteError(http.StatusInternalServerError, err) |
| return |
| } |
| data, err := encodePods(pods) |
| if err != nil { |
| response.WriteError(http.StatusInternalServerError, err) |
| return |
| } |
| writeJSONResponse(response, data) |
| } |
| |
| // getLogs handles logs requests against the Kubelet. |
| func (s *Server) getLogs(request *restful.Request, response *restful.Response) { |
| s.host.ServeLogs(response, request.Request) |
| } |
| |
| type execRequestParams struct { |
| podNamespace string |
| podName string |
| podUID types.UID |
| containerName string |
| cmd []string |
| } |
| |
| func getExecRequestParams(req *restful.Request) execRequestParams { |
| return execRequestParams{ |
| podNamespace: req.PathParameter("podNamespace"), |
| podName: req.PathParameter("podID"), |
| podUID: types.UID(req.PathParameter("uid")), |
| containerName: req.PathParameter("containerName"), |
| cmd: req.Request.URL.Query()[api.ExecCommandParam], |
| } |
| } |
| |
| type portForwardRequestParams struct { |
| podNamespace string |
| podName string |
| podUID types.UID |
| } |
| |
| func getPortForwardRequestParams(req *restful.Request) portForwardRequestParams { |
| return portForwardRequestParams{ |
| podNamespace: req.PathParameter("podNamespace"), |
| podName: req.PathParameter("podID"), |
| podUID: types.UID(req.PathParameter("uid")), |
| } |
| } |
| |
| type responder struct{} |
| |
| func (r *responder) Error(w http.ResponseWriter, req *http.Request, err error) { |
| klog.ErrorS(err, "Error while proxying request") |
| http.Error(w, err.Error(), http.StatusInternalServerError) |
| } |
| |
| // proxyStream proxies stream to url. |
| func proxyStream(w http.ResponseWriter, r *http.Request, url *url.URL) { |
| // TODO(random-liu): Set MaxBytesPerSec to throttle the stream. |
| handler := proxy.NewUpgradeAwareHandler(url, nil /*transport*/, false /*wrapTransport*/, true /*upgradeRequired*/, &responder{}) |
| handler.ServeHTTP(w, r) |
| } |
| |
| // getAttach handles requests to attach to a container. |
| func (s *Server) getAttach(request *restful.Request, response *restful.Response) { |
| params := getExecRequestParams(request) |
| streamOpts, err := remotecommandserver.NewOptions(request.Request) |
| if err != nil { |
| utilruntime.HandleError(err) |
| response.WriteError(http.StatusBadRequest, err) |
| return |
| } |
| pod, ok := s.host.GetPodByName(params.podNamespace, params.podName) |
| if !ok { |
| response.WriteError(http.StatusNotFound, fmt.Errorf("pod does not exist")) |
| return |
| } |
| |
| podFullName := kubecontainer.GetPodFullName(pod) |
| url, err := s.host.GetAttach(request.Request.Context(), podFullName, params.podUID, params.containerName, *streamOpts) |
| if err != nil { |
| streaming.WriteError(err, response.ResponseWriter) |
| return |
| } |
| |
| proxyStream(response.ResponseWriter, request.Request, url) |
| } |
| |
| // getExec handles requests to run a command inside a container. |
| func (s *Server) getExec(request *restful.Request, response *restful.Response) { |
| params := getExecRequestParams(request) |
| streamOpts, err := remotecommandserver.NewOptions(request.Request) |
| if err != nil { |
| utilruntime.HandleError(err) |
| response.WriteError(http.StatusBadRequest, err) |
| return |
| } |
| pod, ok := s.host.GetPodByName(params.podNamespace, params.podName) |
| if !ok { |
| response.WriteError(http.StatusNotFound, fmt.Errorf("pod does not exist")) |
| return |
| } |
| |
| podFullName := kubecontainer.GetPodFullName(pod) |
| url, err := s.host.GetExec(request.Request.Context(), podFullName, params.podUID, params.containerName, params.cmd, *streamOpts) |
| if err != nil { |
| streaming.WriteError(err, response.ResponseWriter) |
| return |
| } |
| proxyStream(response.ResponseWriter, request.Request, url) |
| } |
| |
| // getRun handles requests to run a command inside a container. |
| func (s *Server) getRun(request *restful.Request, response *restful.Response) { |
| params := getExecRequestParams(request) |
| pod, ok := s.host.GetPodByName(params.podNamespace, params.podName) |
| if !ok { |
| response.WriteError(http.StatusNotFound, fmt.Errorf("pod does not exist")) |
| return |
| } |
| |
| // For legacy reasons, run uses different query param than exec. |
| params.cmd = strings.Split(request.QueryParameter("cmd"), " ") |
| data, err := s.host.RunInContainer(request.Request.Context(), kubecontainer.GetPodFullName(pod), params.podUID, params.containerName, params.cmd) |
| if err != nil { |
| response.WriteError(http.StatusInternalServerError, err) |
| return |
| } |
| writeJSONResponse(response, data) |
| } |
| |
| // Derived from go-restful writeJSON. |
| func writeJSONResponse(response *restful.Response, data []byte) { |
| if data == nil { |
| response.WriteHeader(http.StatusOK) |
| // do not write a nil representation |
| return |
| } |
| response.Header().Set(restful.HEADER_ContentType, restful.MIME_JSON) |
| response.WriteHeader(http.StatusOK) |
| if _, err := response.Write(data); err != nil { |
| klog.ErrorS(err, "Error writing response") |
| } |
| } |
| |
| // getPortForward handles a new restful port forward request. It determines the |
| // pod name and uid and then calls ServePortForward. |
| func (s *Server) getPortForward(request *restful.Request, response *restful.Response) { |
| params := getPortForwardRequestParams(request) |
| |
| portForwardOptions, err := portforward.NewV4Options(request.Request) |
| if err != nil { |
| utilruntime.HandleError(err) |
| response.WriteError(http.StatusBadRequest, err) |
| return |
| } |
| pod, ok := s.host.GetPodByName(params.podNamespace, params.podName) |
| if !ok { |
| response.WriteError(http.StatusNotFound, fmt.Errorf("pod does not exist")) |
| return |
| } |
| if len(params.podUID) > 0 && pod.UID != params.podUID { |
| response.WriteError(http.StatusNotFound, fmt.Errorf("pod not found")) |
| return |
| } |
| |
| url, err := s.host.GetPortForward(request.Request.Context(), pod.Name, pod.Namespace, pod.UID, *portForwardOptions) |
| if err != nil { |
| streaming.WriteError(err, response.ResponseWriter) |
| return |
| } |
| proxyStream(response.ResponseWriter, request.Request, url) |
| } |
| |
| // checkpoint handles the checkpoint API request. It checks if the requested |
| // podNamespace, pod and container actually exist and only then calls out |
| // to the runtime to actually checkpoint the container. |
| func (s *Server) checkpoint(request *restful.Request, response *restful.Response) { |
| ctx := request.Request.Context() |
| pod, ok := s.host.GetPodByName(request.PathParameter("podNamespace"), request.PathParameter("podID")) |
| if !ok { |
| response.WriteError(http.StatusNotFound, fmt.Errorf("pod does not exist")) |
| return |
| } |
| |
| containerName := request.PathParameter("containerName") |
| |
| found := false |
| for _, container := range pod.Spec.Containers { |
| if container.Name == containerName { |
| found = true |
| break |
| } |
| } |
| if !found { |
| for _, container := range pod.Spec.InitContainers { |
| if container.Name == containerName { |
| found = true |
| break |
| } |
| } |
| } |
| if !found { |
| for _, container := range pod.Spec.EphemeralContainers { |
| if container.Name == containerName { |
| found = true |
| break |
| } |
| } |
| } |
| if !found { |
| response.WriteError( |
| http.StatusNotFound, |
| fmt.Errorf("container %v does not exist", containerName), |
| ) |
| return |
| } |
| |
| options := &runtimeapi.CheckpointContainerRequest{} |
| // Query parameter to select an optional timeout. Without the timeout parameter |
| // the checkpoint command will use the default CRI timeout. |
| timeouts := request.Request.URL.Query()["timeout"] |
| if len(timeouts) > 0 { |
| // If the user specified one or multiple values for timeouts we |
| // are using the last available value. |
| timeout, err := strconv.ParseInt(timeouts[len(timeouts)-1], 10, 64) |
| if err != nil { |
| response.WriteError( |
| http.StatusNotFound, |
| fmt.Errorf("cannot parse value of timeout parameter"), |
| ) |
| return |
| } |
| options.Timeout = timeout |
| } |
| |
| if err := s.host.CheckpointContainer(ctx, pod.UID, kubecontainer.GetPodFullName(pod), containerName, options); err != nil { |
| response.WriteError( |
| http.StatusInternalServerError, |
| fmt.Errorf( |
| "checkpointing of %v/%v/%v failed (%v)", |
| request.PathParameter("podNamespace"), |
| request.PathParameter("podID"), |
| containerName, |
| err, |
| ), |
| ) |
| return |
| } |
| writeJSONResponse( |
| response, |
| []byte(fmt.Sprintf("{\"items\":[\"%s\"]}", options.Location)), |
| ) |
| } |
| |
| // getURLRootPath trims a URL path. |
| // For paths in the format of "/metrics/xxx", "metrics/xxx" is returned; |
| // For all other paths, the first part of the path is returned. |
| func getURLRootPath(path string) string { |
| parts := strings.SplitN(strings.TrimPrefix(path, "/"), "/", 3) |
| if len(parts) == 0 { |
| return path |
| } |
| |
| if parts[0] == "metrics" && len(parts) > 1 { |
| return fmt.Sprintf("%s/%s", parts[0], parts[1]) |
| |
| } |
| return parts[0] |
| } |
| |
| var longRunningRequestPathMap = map[string]bool{ |
| "exec": true, |
| "attach": true, |
| "portforward": true, |
| "debug": true, |
| } |
| |
| // isLongRunningRequest determines whether the request is long-running or not. |
| func isLongRunningRequest(path string) bool { |
| _, ok := longRunningRequestPathMap[path] |
| return ok |
| } |
| |
| var statusesNoTracePred = httplog.StatusIsNot( |
| http.StatusOK, |
| http.StatusFound, |
| http.StatusMovedPermanently, |
| http.StatusTemporaryRedirect, |
| http.StatusBadRequest, |
| http.StatusNotFound, |
| http.StatusSwitchingProtocols, |
| ) |
| |
| // ServeHTTP responds to HTTP requests on the Kubelet. |
| func (s *Server) ServeHTTP(w http.ResponseWriter, req *http.Request) { |
| handler := httplog.WithLogging(s.restfulCont, statusesNoTracePred) |
| |
| // monitor http requests |
| var serverType string |
| if s.auth == nil { |
| serverType = "readonly" |
| } else { |
| serverType = "readwrite" |
| } |
| |
| method, path := s.getMetricMethodBucket(req.Method), s.getMetricBucket(req.URL.Path) |
| |
| longRunning := strconv.FormatBool(isLongRunningRequest(path)) |
| |
| servermetrics.HTTPRequests.WithLabelValues(method, path, serverType, longRunning).Inc() |
| |
| servermetrics.HTTPInflightRequests.WithLabelValues(method, path, serverType, longRunning).Inc() |
| defer servermetrics.HTTPInflightRequests.WithLabelValues(method, path, serverType, longRunning).Dec() |
| |
| startTime := time.Now() |
| defer servermetrics.HTTPRequestsDuration.WithLabelValues(method, path, serverType, longRunning).Observe(servermetrics.SinceInSeconds(startTime)) |
| |
| handler.ServeHTTP(w, req) |
| } |
| |
| // prometheusHostAdapter adapts the HostInterface to the interface expected by the |
| // cAdvisor prometheus collector. |
| type prometheusHostAdapter struct { |
| host HostInterface |
| } |
| |
| func (a prometheusHostAdapter) GetRequestedContainersInfo(containerName string, options cadvisorv2.RequestOptions) (map[string]*cadvisorapi.ContainerInfo, error) { |
| return a.host.GetRequestedContainersInfo(containerName, options) |
| } |
| func (a prometheusHostAdapter) GetVersionInfo() (*cadvisorapi.VersionInfo, error) { |
| return a.host.GetVersionInfo() |
| } |
| func (a prometheusHostAdapter) GetMachineInfo() (*cadvisorapi.MachineInfo, error) { |
| return a.host.GetCachedMachineInfo() |
| } |
| |
| func containerPrometheusLabelsFunc(s stats.Provider) metrics.ContainerLabelsFunc { |
| // containerPrometheusLabels maps cAdvisor labels to prometheus labels. |
| return func(c *cadvisorapi.ContainerInfo) map[string]string { |
| // Prometheus requires that all metrics in the same family have the same labels, |
| // so we arrange to supply blank strings for missing labels |
| var name, image, podName, namespace, containerName string |
| if len(c.Aliases) > 0 { |
| name = c.Aliases[0] |
| } |
| image = c.Spec.Image |
| if v, ok := c.Spec.Labels[kubelettypes.KubernetesPodNameLabel]; ok { |
| podName = v |
| } |
| if v, ok := c.Spec.Labels[kubelettypes.KubernetesPodNamespaceLabel]; ok { |
| namespace = v |
| } |
| if v, ok := c.Spec.Labels[kubelettypes.KubernetesContainerNameLabel]; ok { |
| containerName = v |
| } |
| // Associate pod cgroup with pod so we have an accurate accounting of sandbox |
| if podName == "" && namespace == "" { |
| if pod, found := s.GetPodByCgroupfs(c.Name); found { |
| podName = pod.Name |
| namespace = pod.Namespace |
| } |
| } |
| set := map[string]string{ |
| metrics.LabelID: c.Name, |
| metrics.LabelName: name, |
| metrics.LabelImage: image, |
| "pod": podName, |
| "namespace": namespace, |
| "container": containerName, |
| } |
| return set |
| } |
| } |