mirror of
https://github.com/KevinMidboe/mktxp-no-cli.git
synced 2025-10-29 17:50:23 +00:00
Merge branch 'akpw:main' into main
This commit is contained in:
@@ -24,20 +24,20 @@ def check_version():
|
||||
print(\
|
||||
'''
|
||||
Mikrotik Prometheus Exporter requires
|
||||
Python version 3.6 or later.
|
||||
Python version 3.8 or later.
|
||||
|
||||
You can create an isolated Python 3.6 environment
|
||||
You can create an isolated Python 3.8 environment
|
||||
with the virtualenv tool:
|
||||
http://docs.python-guide.org/en/latest/dev/virtualenvs
|
||||
|
||||
''')
|
||||
sys.exit(0)
|
||||
elif sys.version_info.major == 3 and sys.version_info.minor < 6:
|
||||
elif sys.version_info.major == 3 and sys.version_info.minor < 8:
|
||||
print(\
|
||||
'''
|
||||
|
||||
Mikrotik Prometheus Exporter requires
|
||||
Python version 3.6 or later.
|
||||
Python version 3.8 or later.
|
||||
|
||||
Please upgrade to the latest Python 3.x version.
|
||||
|
||||
|
||||
@@ -12,7 +12,7 @@
|
||||
|
||||
|
||||
[MKTXP]
|
||||
port = 49090
|
||||
listen = '0.0.0.0:49090' # Space separated list of socket addresses to listen to, both IPV4 and IPV6
|
||||
socket_timeout = 2
|
||||
|
||||
initial_delay_on_failure = 120
|
||||
@@ -20,7 +20,7 @@
|
||||
delay_inc_div = 5
|
||||
|
||||
bandwidth = False # Turns metrics bandwidth metrics collection on / off
|
||||
bandwidth_test_interval = 600 # Interval for colllecting bandwidth metrics
|
||||
bandwidth_test_interval = 600 # Interval for collecting bandwidth metrics
|
||||
minimal_collect_interval = 5 # Minimal metric collection interval
|
||||
|
||||
verbose_mode = False # Set it on for troubleshooting
|
||||
|
||||
@@ -46,6 +46,7 @@ class CollectorKeys:
|
||||
QUEUE_SIMPLE_COLLECTOR = 'QueueSimpleCollector'
|
||||
KID_CONTROL_DEVICE_COLLECTOR = 'KidControlCollector'
|
||||
USER_COLLECTOR = 'UserCollector'
|
||||
BGP_COLLECTOR = 'BGPCollector'
|
||||
MKTXP_COLLECTOR = 'MKTXPCollector'
|
||||
|
||||
|
||||
@@ -56,6 +57,7 @@ class MKTXPConfigKeys:
|
||||
ENABLED_KEY = 'enabled'
|
||||
HOST_KEY = 'hostname'
|
||||
PORT_KEY = 'port'
|
||||
LISTEN_KEY = 'listen'
|
||||
USER_KEY = 'username'
|
||||
PASSWD_KEY = 'password'
|
||||
|
||||
@@ -87,6 +89,8 @@ class MKTXPConfigKeys:
|
||||
|
||||
FE_USER_KEY = 'user'
|
||||
FE_QUEUE_KEY = 'queue'
|
||||
FE_BGP_KEY = 'bgp'
|
||||
|
||||
FE_REMOTE_DHCP_ENTRY = 'remote_dhcp_entry'
|
||||
|
||||
FE_CHECK_FOR_UPDATES = 'check_for_updates'
|
||||
@@ -133,7 +137,7 @@ class MKTXPConfigKeys:
|
||||
|
||||
|
||||
BOOLEAN_KEYS_NO = {ENABLED_KEY, SSL_KEY, NO_SSL_CERTIFICATE, FE_CHECK_FOR_UPDATES, FE_KID_CONTROL_DEVICE,
|
||||
SSL_CERTIFICATE_VERIFY, FE_IPV6_FIREWALL_KEY, FE_IPV6_NEIGHBOR_KEY, FE_CONNECTION_STATS_KEY}
|
||||
SSL_CERTIFICATE_VERIFY, FE_IPV6_FIREWALL_KEY, FE_IPV6_NEIGHBOR_KEY, FE_CONNECTION_STATS_KEY, FE_BGP_KEY}
|
||||
|
||||
# Feature keys enabled by default
|
||||
BOOLEAN_KEYS_YES = {FE_DHCP_KEY, FE_PACKAGE_KEY, FE_DHCP_LEASE_KEY, FE_DHCP_POOL_KEY, FE_IP_CONNECTIONS_KEY, FE_INTERFACE_KEY, FE_FIREWALL_KEY,
|
||||
@@ -150,7 +154,7 @@ class MKTXPConfigKeys:
|
||||
MKTXP_INC_DIV, MKTXP_BANDWIDTH_TEST_INTERVAL, MKTXP_MIN_COLLECT_INTERVAL,
|
||||
MKTXP_MAX_WORKER_THREADS, MKTXP_MAX_SCRAPE_DURATION, MKTXP_TOTAL_MAX_SCRAPE_DURATION)
|
||||
|
||||
# MKTXP config entry nane
|
||||
# MKTXP config entry name
|
||||
MKTXP_CONFIG_ENTRY_NAME = 'MKTXP'
|
||||
|
||||
|
||||
@@ -162,9 +166,9 @@ class ConfigEntry:
|
||||
MKTXPConfigKeys.FE_FIREWALL_KEY, MKTXPConfigKeys.FE_MONITOR_KEY, MKTXPConfigKeys.FE_ROUTE_KEY, MKTXPConfigKeys.FE_WIRELESS_KEY, MKTXPConfigKeys.FE_WIRELESS_CLIENTS_KEY,
|
||||
MKTXPConfigKeys.FE_IP_CONNECTIONS_KEY, MKTXPConfigKeys.FE_CONNECTION_STATS_KEY, MKTXPConfigKeys.FE_CAPSMAN_KEY, MKTXPConfigKeys.FE_CAPSMAN_CLIENTS_KEY, MKTXPConfigKeys.FE_POE_KEY, MKTXPConfigKeys.FE_NETWATCH_KEY,
|
||||
MKTXPConfigKeys.MKTXP_USE_COMMENTS_OVER_NAMES, MKTXPConfigKeys.FE_PUBLIC_IP_KEY, MKTXPConfigKeys.FE_IPV6_FIREWALL_KEY, MKTXPConfigKeys.FE_IPV6_NEIGHBOR_KEY,
|
||||
MKTXPConfigKeys.FE_USER_KEY, MKTXPConfigKeys.FE_QUEUE_KEY, MKTXPConfigKeys.FE_REMOTE_DHCP_ENTRY, MKTXPConfigKeys.FE_CHECK_FOR_UPDATES, MKTXPConfigKeys.FE_KID_CONTROL_DEVICE,
|
||||
MKTXPConfigKeys.FE_USER_KEY, MKTXPConfigKeys.FE_QUEUE_KEY, MKTXPConfigKeys.FE_REMOTE_DHCP_ENTRY, MKTXPConfigKeys.FE_CHECK_FOR_UPDATES, MKTXPConfigKeys.FE_KID_CONTROL_DEVICE, MKTXPConfigKeys.FE_BGP_KEY,
|
||||
])
|
||||
MKTXPSystemEntry = namedtuple('MKTXPSystemEntry', [MKTXPConfigKeys.PORT_KEY, MKTXPConfigKeys.MKTXP_SOCKET_TIMEOUT,
|
||||
MKTXPSystemEntry = namedtuple('MKTXPSystemEntry', [MKTXPConfigKeys.PORT_KEY, MKTXPConfigKeys.LISTEN_KEY, MKTXPConfigKeys.MKTXP_SOCKET_TIMEOUT,
|
||||
MKTXPConfigKeys.MKTXP_INITIAL_DELAY, MKTXPConfigKeys.MKTXP_MAX_DELAY,
|
||||
MKTXPConfigKeys.MKTXP_INC_DIV, MKTXPConfigKeys.MKTXP_BANDWIDTH_KEY,
|
||||
MKTXPConfigKeys.MKTXP_VERBOSE_MODE, MKTXPConfigKeys.MKTXP_BANDWIDTH_TEST_INTERVAL,
|
||||
@@ -288,10 +292,10 @@ class MKTXPConfigHandler:
|
||||
def _read_from_disk(self):
|
||||
''' (Force-)Read conf data from disk
|
||||
'''
|
||||
self.config = ConfigObj(self.usr_conf_data_path)
|
||||
self.config = ConfigObj(self.usr_conf_data_path, indent_type = ' ')
|
||||
self.config.preserve_comments = True
|
||||
|
||||
self._config = ConfigObj(self.mktxp_conf_path)
|
||||
self._config = ConfigObj(self.mktxp_conf_path, indent_type = ' ')
|
||||
self._config.preserve_comments = True
|
||||
|
||||
def _create_os_path(self, os_path, resource_path):
|
||||
@@ -360,7 +364,8 @@ class MKTXPConfigHandler:
|
||||
system_entry_reader[key] = self._config[entry_name].as_int(key)
|
||||
else:
|
||||
system_entry_reader[key] = self._default_value_for_key(key)
|
||||
new_keys.append(key) # read from disk next time
|
||||
if key not in (MKTXPConfigKeys.PORT_KEY): # Port key has been depricated
|
||||
new_keys.append(key) # read from disk next time
|
||||
|
||||
for key in MKTXPConfigKeys.SYSTEM_BOOLEAN_KEYS_NO.union(MKTXPConfigKeys.SYSTEM_BOOLEAN_KEYS_YES):
|
||||
if self._config[entry_name].get(key) is not None:
|
||||
@@ -369,9 +374,17 @@ class MKTXPConfigHandler:
|
||||
system_entry_reader[key] = True if key in MKTXPConfigKeys.SYSTEM_BOOLEAN_KEYS_YES else False
|
||||
new_keys.append(key) # read from disk next time
|
||||
|
||||
# listen
|
||||
if self._config[entry_name].get(MKTXPConfigKeys.LISTEN_KEY):
|
||||
system_entry_reader[MKTXPConfigKeys.LISTEN_KEY] = self._config[entry_name].get(MKTXPConfigKeys.LISTEN_KEY)
|
||||
else:
|
||||
system_entry_reader[MKTXPConfigKeys.LISTEN_KEY] = f'0.0.0.0:{system_entry_reader[MKTXPConfigKeys.PORT_KEY]}'
|
||||
new_keys.append(MKTXPConfigKeys.LISTEN_KEY) # read from disk next time
|
||||
|
||||
if new_keys:
|
||||
self._config[entry_name] = system_entry_reader
|
||||
try:
|
||||
self._config[entry_name].pop(MKTXPConfigKeys.PORT_KEY, None) # Port key has been depricated
|
||||
self._config.write()
|
||||
if self._config[entry_name].as_bool(MKTXPConfigKeys.MKTXP_VERBOSE_MODE):
|
||||
print(f'Updated system entry {entry_name} with new system keys {new_keys}')
|
||||
|
||||
@@ -52,6 +52,8 @@
|
||||
|
||||
user = True # Active Users metrics
|
||||
queue = True # Queues metrics
|
||||
|
||||
bgp = False # BGP sessions metrics
|
||||
|
||||
remote_dhcp_entry = None # An MKTXP entry for remote DHCP info resolution (capsman/wireless)
|
||||
|
||||
|
||||
80
mktxp/collector/bgp_collector.py
Normal file
80
mktxp/collector/bgp_collector.py
Normal file
@@ -0,0 +1,80 @@
|
||||
# coding=utf8
|
||||
## Copyright (c) 2020 Arseniy Kuznetsov
|
||||
##
|
||||
## This program is free software; you can redistribute it and/or
|
||||
## modify it under the terms of the GNU General Public License
|
||||
## as published by the Free Software Foundation; either version 2
|
||||
## of the License, or (at your option) any later version.
|
||||
##
|
||||
## This program is distributed in the hope that it will be useful,
|
||||
## but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
## MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
## GNU General Public License for more details.
|
||||
|
||||
|
||||
from mktxp.collector.base_collector import BaseCollector
|
||||
from mktxp.flow.processor.output import BaseOutputProcessor
|
||||
from mktxp.datasource.bgp_ds import BGPMetricsDataSource
|
||||
|
||||
|
||||
class BGPCollector(BaseCollector):
|
||||
'''BGP collector'''
|
||||
@staticmethod
|
||||
def collect(router_entry):
|
||||
if not router_entry.config_entry.bgp:
|
||||
return
|
||||
|
||||
bgp_labels = ['name', 'remote_address', 'remote_as', 'local_as', 'remote_afi', 'local_afi', 'remote_messages', 'remote_bytes', 'local_messages', 'local_bytes', 'prefix_count', 'established', 'uptime']
|
||||
bgp_records = BGPMetricsDataSource.metric_records(router_entry, metric_labels=bgp_labels)
|
||||
|
||||
|
||||
if bgp_records:
|
||||
# translate records to appropriate values
|
||||
translated_fields = ['established', 'uptime']
|
||||
for bgp_record in bgp_records:
|
||||
for translated_field in translated_fields:
|
||||
value = bgp_record.get(translated_field, None)
|
||||
if value:
|
||||
bgp_record[translated_field] = BGPCollector._translated_values(translated_field, value)
|
||||
|
||||
session_info_labes = ['name', 'remote_address', 'remote_as', 'local_as', 'remote_afi', 'local_afi']
|
||||
bgp_sessions_metrics = BaseCollector.info_collector('bgp_sessions_info', 'BGP sessions info', bgp_records, session_info_labes)
|
||||
yield bgp_sessions_metrics
|
||||
|
||||
session_id_labes = ['name']
|
||||
remote_messages_metrics = BaseCollector.counter_collector('bgp_remote_messages', 'Number of remote messages', bgp_records, 'remote_messages', session_id_labes)
|
||||
yield remote_messages_metrics
|
||||
|
||||
|
||||
local_messages_metrics = BaseCollector.counter_collector('bgp_local_messages', 'Number of local messages', bgp_records, 'local_messages', session_id_labes)
|
||||
yield local_messages_metrics
|
||||
|
||||
|
||||
remote_bytes_metrics = BaseCollector.counter_collector('bgp_remote_bytes', 'Number of remote bytes', bgp_records, 'remote_bytes', session_id_labes)
|
||||
yield remote_bytes_metrics
|
||||
|
||||
|
||||
local_bytes_metrics = BaseCollector.counter_collector('bgp_local_bytes', 'Number of local bytes', bgp_records, 'local_bytes', session_id_labes)
|
||||
yield local_bytes_metrics
|
||||
|
||||
|
||||
prefix_count_metrics = BaseCollector.gauge_collector('bgp_prefix_count', 'BGP prefix count', bgp_records, 'prefix_count', session_id_labes)
|
||||
yield prefix_count_metrics
|
||||
|
||||
|
||||
established_metrics = BaseCollector.gauge_collector('bgp_established', 'BGP established', bgp_records, 'established', session_id_labes)
|
||||
yield established_metrics
|
||||
|
||||
|
||||
uptime_metrics = BaseCollector.gauge_collector('bgp_uptime', 'BGP uptime in milliseconds', bgp_records, 'uptime', session_id_labes)
|
||||
yield uptime_metrics
|
||||
|
||||
|
||||
# Helpers
|
||||
@staticmethod
|
||||
def _translated_values(translated_field, value):
|
||||
return {
|
||||
'established': lambda value: '1' if value=='true' else '0',
|
||||
'uptime': lambda value: BaseOutputProcessor.parse_timedelta_milliseconds(value)
|
||||
}[translated_field](value)
|
||||
|
||||
@@ -23,15 +23,14 @@ class BaseDSProcessor:
|
||||
if metric_labels is None:
|
||||
metric_labels = []
|
||||
if translation_table is None:
|
||||
translation_table = {}
|
||||
dash2_ = lambda x : x.replace('-', '_')
|
||||
translation_table = {}
|
||||
if len(metric_labels) == 0 and len(router_records) > 0:
|
||||
metric_labels = [dash2_(key) for key in router_records[0].keys()]
|
||||
metric_labels = [BaseDSProcessor._normalise_keys(key) for key in router_records[0].keys()]
|
||||
metric_labels = set(metric_labels)
|
||||
|
||||
labeled_records = []
|
||||
for router_record in router_records:
|
||||
translated_record = {dash2_(key): value for (key, value) in router_record.items() if dash2_(key) in metric_labels}
|
||||
translated_record = {BaseDSProcessor._normalise_keys(key): value for (key, value) in router_record.items() if BaseDSProcessor._normalise_keys(key) in metric_labels}
|
||||
|
||||
if add_router_id:
|
||||
for key, value in router_entry.router_id.items():
|
||||
@@ -43,3 +42,13 @@ class BaseDSProcessor:
|
||||
labeled_records.append(translated_record)
|
||||
|
||||
return labeled_records
|
||||
|
||||
|
||||
@staticmethod
|
||||
def _normalise_keys(key):
|
||||
chars = ".-"
|
||||
for chr in chars:
|
||||
if chr in key:
|
||||
key = key.replace(chr, "_")
|
||||
return key
|
||||
|
||||
|
||||
31
mktxp/datasource/bgp_ds.py
Normal file
31
mktxp/datasource/bgp_ds.py
Normal file
@@ -0,0 +1,31 @@
|
||||
# coding=utf8
|
||||
## Copyright (c) 2020 Arseniy Kuznetsov
|
||||
##
|
||||
## This program is free software; you can redistribute it and/or
|
||||
## modify it under the terms of the GNU General Public License
|
||||
## as published by the Free Software Foundation; either version 2
|
||||
## of the License, or (at your option) any later version.
|
||||
##
|
||||
## This program is distributed in the hope that it will be useful,
|
||||
## but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
## MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
## GNU General Public License for more details.
|
||||
|
||||
|
||||
from mktxp.datasource.base_ds import BaseDSProcessor
|
||||
|
||||
|
||||
class BGPMetricsDataSource:
|
||||
''' Wireless Metrics data provider
|
||||
'''
|
||||
@staticmethod
|
||||
def metric_records(router_entry, *, metric_labels = None, add_router_id = True):
|
||||
if metric_labels is None:
|
||||
metric_labels = []
|
||||
try:
|
||||
bgp_records = router_entry.api_connection.router_api().get_resource('/routing/bgp/session').get()
|
||||
return BaseDSProcessor.trimmed_records(router_entry, router_records = bgp_records, metric_labels = metric_labels, add_router_id = add_router_id)
|
||||
except Exception as exc:
|
||||
print(f'Error getting BGP sessions info from router{router_entry.router_name}@{router_entry.config_entry.hostname}: {exc}')
|
||||
return None
|
||||
|
||||
@@ -37,6 +37,7 @@ from mktxp.collector.user_collector import UserCollector
|
||||
from mktxp.collector.queue_collector import QueueTreeCollector
|
||||
from mktxp.collector.queue_collector import QueueSimpleCollector
|
||||
from mktxp.collector.kid_control_device_collector import KidDeviceCollector
|
||||
from mktxp.collector.bgp_collector import BGPCollector
|
||||
|
||||
class CollectorRegistry:
|
||||
''' MKTXP Collectors Registry
|
||||
@@ -74,6 +75,8 @@ class CollectorRegistry:
|
||||
self.register(CollectorKeys.QUEUE_SIMPLE_COLLECTOR, QueueSimpleCollector.collect)
|
||||
|
||||
self.register(CollectorKeys.KID_CONTROL_DEVICE_COLLECTOR, KidDeviceCollector.collect)
|
||||
self.register(CollectorKeys.BGP_COLLECTOR, BGPCollector.collect)
|
||||
|
||||
|
||||
self.register(CollectorKeys.MKTXP_COLLECTOR, MKTXPCollector.collect)
|
||||
|
||||
|
||||
@@ -12,10 +12,9 @@
|
||||
## GNU General Public License for more details.
|
||||
|
||||
|
||||
from http.server import HTTPServer
|
||||
from datetime import datetime
|
||||
from prometheus_client.core import REGISTRY
|
||||
from prometheus_client import MetricsHandler
|
||||
from prometheus_client import make_wsgi_app
|
||||
|
||||
from mktxp.cli.config.config import config_handler
|
||||
from mktxp.flow.collector_handler import CollectorHandler
|
||||
@@ -27,6 +26,8 @@ from mktxp.cli.output.wifi_out import WirelessOutput
|
||||
from mktxp.cli.output.dhcp_out import DHCPOutput
|
||||
from mktxp.cli.output.conn_stats_out import ConnectionsStatsOutput
|
||||
|
||||
from waitress import serve
|
||||
|
||||
|
||||
class ExportProcessor:
|
||||
''' Base Export Processing
|
||||
@@ -34,16 +35,9 @@ class ExportProcessor:
|
||||
@staticmethod
|
||||
def start():
|
||||
REGISTRY.register(CollectorHandler(RouterEntriesHandler(), CollectorRegistry()))
|
||||
ExportProcessor.run(port=config_handler.system_entry().port)
|
||||
|
||||
@staticmethod
|
||||
def run(server_class=HTTPServer, handler_class=MetricsHandler, port=None):
|
||||
server_address = ('', port)
|
||||
httpd = server_class(server_address, handler_class)
|
||||
current_time = datetime.now().strftime("%Y-%m-%d %H:%M:%S")
|
||||
print(f'{current_time} Running HTTP metrics server on port {port}')
|
||||
httpd.serve_forever()
|
||||
|
||||
print(f'{current_time} Running HTTP metrics server on: {config_handler.system_entry().listen}')
|
||||
serve(make_wsgi_app(), listen = config_handler.system_entry().listen)
|
||||
|
||||
class OutputProcessor:
|
||||
''' Base CLI Processing
|
||||
|
||||
@@ -117,7 +117,7 @@ class BaseOutputProcessor:
|
||||
def parse_timedelta(time):
|
||||
duration_interval_rgx = config_handler.re_compiled.get('duration_interval_rgx')
|
||||
if not duration_interval_rgx:
|
||||
duration_interval_rgx = re.compile(r'((?P<weeks>\d+)w)?((?P<days>\d+)d)?((?P<hours>\d+)h)?((?P<minutes>\d+)m)?((?P<seconds>\d+)s)?')
|
||||
duration_interval_rgx = re.compile(r'((?P<weeks>\d+)w)?((?P<days>\d+)d)?((?P<hours>\d+)h)?((?P<minutes>\d+)m)?((?P<seconds>\d+)s)?((?P<milliseconds>\d+)ms)?')
|
||||
config_handler.re_compiled['duration_interval_rgx'] = duration_interval_rgx
|
||||
time_dict = duration_interval_rgx.match(time).groupdict()
|
||||
return timedelta(**{key: int(value) for key, value in time_dict.items() if value})
|
||||
@@ -126,6 +126,10 @@ class BaseOutputProcessor:
|
||||
def parse_timedelta_seconds(time):
|
||||
return BaseOutputProcessor.parse_timedelta(time).total_seconds()
|
||||
|
||||
@staticmethod
|
||||
def parse_timedelta_milliseconds(time):
|
||||
return BaseOutputProcessor.parse_timedelta(time) / timedelta(milliseconds=1)
|
||||
|
||||
@staticmethod
|
||||
def parse_signal_strength(signal_strength):
|
||||
wifi_signal_strength_rgx = config_handler.re_compiled.get('wifi_signal_strength_rgx')
|
||||
|
||||
@@ -66,6 +66,7 @@ class RouterEntry:
|
||||
CollectorKeys.QUEUE_SIMPLE_COLLECTOR: 0,
|
||||
CollectorKeys.KID_CONTROL_DEVICE_COLLECTOR: 0,
|
||||
CollectorKeys.USER_COLLECTOR: 0,
|
||||
CollectorKeys.BGP_COLLECTOR: 0,
|
||||
CollectorKeys.MKTXP_COLLECTOR: 0
|
||||
}
|
||||
self._dhcp_entry = None
|
||||
|
||||
Reference in New Issue
Block a user