fluent-plugin-kubernetes_metadata_filter 2.9.2 → 2.9.3
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/Gemfile.lock +6 -6
- data/README.md +1 -1
- data/fluent-plugin-kubernetes_metadata_filter.gemspec +1 -1
- data/lib/fluent/plugin/filter_kubernetes_metadata.rb +38 -27
- data/lib/fluent/plugin/kubernetes_metadata_cache_strategy.rb +1 -3
- data/lib/fluent/plugin/kubernetes_metadata_common.rb +5 -4
- data/test/plugin/test_cache_strategy.rb +1 -1
- data/test/plugin/test_filter_kubernetes_metadata.rb +56 -22
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: b6344b1f6ff0602b9d78a5cf317ba5b44e54d0040d6172d102edd002a364d1e7
|
4
|
+
data.tar.gz: 421689d196ae7a0c307ac7e8d4d066755464b76357921e7f6c55ad122ca744b0
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 63b03d82fec8888d13f4f752b1ea2519a7c3e594ac45eb0363109d323a35a56174fdd0fa401b787069e5bae84168878ff08baefa899810776b0d710bd55d3c04
|
7
|
+
data.tar.gz: 6368f491a96f30482ded9e12bdc0e80232aebfc26a3a98be75133312c96b1311ff04ce2de5d818a06ba67d2d75274b658471668bfa846db2251202ea92f4b96e
|
data/Gemfile.lock
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
PATH
|
2
2
|
remote: .
|
3
3
|
specs:
|
4
|
-
fluent-plugin-kubernetes_metadata_filter (2.9.
|
4
|
+
fluent-plugin-kubernetes_metadata_filter (2.9.3)
|
5
5
|
fluentd (>= 0.14.0, < 1.15)
|
6
6
|
kubeclient (>= 4.0.0, < 5.0.0)
|
7
7
|
lru_redux
|
@@ -30,10 +30,10 @@ GEM
|
|
30
30
|
ffi-compiler (1.0.1)
|
31
31
|
ffi (>= 1.0.0)
|
32
32
|
rake
|
33
|
-
fluentd (1.14.
|
33
|
+
fluentd (1.14.3)
|
34
34
|
bundler
|
35
35
|
cool.io (>= 1.4.5, < 2.0.0)
|
36
|
-
http_parser.rb (>= 0.5.1, < 0.
|
36
|
+
http_parser.rb (>= 0.5.1, < 0.9.0)
|
37
37
|
msgpack (>= 1.3.1, < 2.0.0)
|
38
38
|
serverengine (>= 2.2.2, < 3.0.0)
|
39
39
|
sigdump (~> 0.2.2)
|
@@ -59,7 +59,7 @@ GEM
|
|
59
59
|
http-form_data (2.3.0)
|
60
60
|
http-parser (1.2.3)
|
61
61
|
ffi-compiler (>= 1.0, < 2.0)
|
62
|
-
http_parser.rb (0.
|
62
|
+
http_parser.rb (0.8.0)
|
63
63
|
jsonpath (1.1.0)
|
64
64
|
multi_json
|
65
65
|
kubeclient (4.9.2)
|
@@ -68,9 +68,9 @@ GEM
|
|
68
68
|
recursive-open-struct (~> 1.1, >= 1.1.1)
|
69
69
|
rest-client (~> 2.0)
|
70
70
|
lru_redux (1.1.0)
|
71
|
-
mime-types (3.
|
71
|
+
mime-types (3.4.1)
|
72
72
|
mime-types-data (~> 3.2015)
|
73
|
-
mime-types-data (3.2021.
|
73
|
+
mime-types-data (3.2021.1115)
|
74
74
|
mini_mime (1.1.2)
|
75
75
|
minitest (4.7.5)
|
76
76
|
msgpack (1.4.2)
|
data/README.md
CHANGED
@@ -76,7 +76,7 @@ payload. The following configuration options are removed:
|
|
76
76
|
|
77
77
|
One way of preserving JSON logs can be through the [parser plugin](https://docs.fluentd.org/filter/parser)
|
78
78
|
|
79
|
-
**NOTE** As of
|
79
|
+
**NOTE** As of release v2.1.4, the use of `use_journal` is **DEPRECATED**. If this setting is not present, the plugin will
|
80
80
|
attempt to figure out the source of the metadata fields from the following:
|
81
81
|
- If `lookup_from_k8s_field true` (the default) and the following fields are present in the record:
|
82
82
|
`docker.container_id`, `kubernetes.namespace_name`, `kubernetes.pod_name`, `kubernetes.container_name`,
|
@@ -5,7 +5,7 @@ $LOAD_PATH.unshift(lib) unless $LOAD_PATH.include?(lib)
|
|
5
5
|
|
6
6
|
Gem::Specification.new do |gem|
|
7
7
|
gem.name = 'fluent-plugin-kubernetes_metadata_filter'
|
8
|
-
gem.version = '2.9.
|
8
|
+
gem.version = '2.9.3'
|
9
9
|
gem.authors = ['Jimmi Dyson']
|
10
10
|
gem.email = ['jimmidyson@gmail.com']
|
11
11
|
gem.description = 'Filter plugin to add Kubernetes metadata'
|
@@ -51,9 +51,17 @@ module Fluent::Plugin
|
|
51
51
|
config_param :client_key, :string, default: nil
|
52
52
|
config_param :ca_file, :string, default: nil
|
53
53
|
config_param :verify_ssl, :bool, default: true
|
54
|
-
|
55
|
-
|
56
|
-
|
54
|
+
|
55
|
+
REGEX_VAR_LOG_PODS = '(?<prefix>var\.log\.pods)\.(?<namespace>[^_]+)_(?<pod_name>[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*)_(?<pod_uuid>[a-z0-9-]*)\.(?<container_name>.+)\..*\.log$'
|
56
|
+
REGEX_VAR_LOG_CONTAINERS = '(?<prefix>var\.log\.containers)\.(?<pod_name>[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*)_(?<namespace>[^_]+)_(?<container_name>.+)-(?<docker_id>[a-z0-9]{64})\.log$'
|
57
|
+
|
58
|
+
#tag_to_kubernetes_name_regexp which must include named capture groups:
|
59
|
+
# namespace - The namespace in which the pod is deployed
|
60
|
+
# pod_name - The pod name
|
61
|
+
# container_name - The name of the container
|
62
|
+
# pod_uuid (/var/log/pods) | docker_id (/var/log/containers) - Unique identifier used in caching of either pod_uuid or the container hash
|
63
|
+
config_param :tag_to_kubernetes_name_regexp, :string, default: "(#{REGEX_VAR_LOG_PODS}|#{REGEX_VAR_LOG_CONTAINERS})"
|
64
|
+
|
57
65
|
config_param :bearer_token_file, :string, default: nil
|
58
66
|
config_param :secret_dir, :string, default: '/var/run/secrets/kubernetes.io/serviceaccount'
|
59
67
|
config_param :de_dot, :bool, default: true
|
@@ -100,15 +108,15 @@ module Fluent::Plugin
|
|
100
108
|
config_param :watch_retry_max_times, :integer, default: 10
|
101
109
|
|
102
110
|
def fetch_pod_metadata(namespace_name, pod_name)
|
103
|
-
log.trace("fetching pod metadata: #{namespace_name}/#{pod_name}")
|
111
|
+
log.trace("fetching pod metadata: #{namespace_name}/#{pod_name}")
|
104
112
|
options = {
|
105
113
|
resource_version: '0' # Fetch from API server cache instead of etcd quorum read
|
106
114
|
}
|
107
115
|
pod_object = @client.get_pod(pod_name, namespace_name, options)
|
108
|
-
log.trace("raw metadata for #{namespace_name}/#{pod_name}: #{pod_object}")
|
116
|
+
log.trace("raw metadata for #{namespace_name}/#{pod_name}: #{pod_object}")
|
109
117
|
metadata = parse_pod_metadata(pod_object)
|
110
118
|
@stats.bump(:pod_cache_api_updates)
|
111
|
-
log.trace("parsed metadata for #{namespace_name}/#{pod_name}: #{metadata}")
|
119
|
+
log.trace("parsed metadata for #{namespace_name}/#{pod_name}: #{metadata}")
|
112
120
|
@cache[metadata['pod_id']] = metadata
|
113
121
|
rescue StandardError => e
|
114
122
|
@stats.bump(:pod_cache_api_nil_error)
|
@@ -132,15 +140,15 @@ module Fluent::Plugin
|
|
132
140
|
end
|
133
141
|
|
134
142
|
def fetch_namespace_metadata(namespace_name)
|
135
|
-
log.trace("fetching namespace metadata: #{namespace_name}")
|
143
|
+
log.trace("fetching namespace metadata: #{namespace_name}")
|
136
144
|
options = {
|
137
145
|
resource_version: '0' # Fetch from API server cache instead of etcd quorum read
|
138
146
|
}
|
139
147
|
namespace_object = @client.get_namespace(namespace_name, nil, options)
|
140
|
-
log.trace("raw metadata for #{namespace_name}: #{namespace_object}")
|
148
|
+
log.trace("raw metadata for #{namespace_name}: #{namespace_object}")
|
141
149
|
metadata = parse_namespace_metadata(namespace_object)
|
142
150
|
@stats.bump(:namespace_cache_api_updates)
|
143
|
-
log.trace("parsed metadata for #{namespace_name}: #{metadata}")
|
151
|
+
log.trace("parsed metadata for #{namespace_name}: #{metadata}")
|
144
152
|
@namespace_cache[metadata['namespace_id']] = metadata
|
145
153
|
rescue StandardError => e
|
146
154
|
@stats.bump(:namespace_cache_api_nil_error)
|
@@ -156,10 +164,6 @@ module Fluent::Plugin
|
|
156
164
|
def configure(conf)
|
157
165
|
super
|
158
166
|
|
159
|
-
def log.trace?
|
160
|
-
level == Fluent::Log::LEVEL_TRACE
|
161
|
-
end
|
162
|
-
|
163
167
|
require 'kubeclient'
|
164
168
|
require 'lru_redux'
|
165
169
|
@stats = KubernetesMetadata::Stats.new
|
@@ -187,6 +191,7 @@ module Fluent::Plugin
|
|
187
191
|
@namespace_cache = LruRedux::TTL::ThreadSafeCache.new(@cache_size, @cache_ttl)
|
188
192
|
|
189
193
|
@tag_to_kubernetes_name_regexp_compiled = Regexp.compile(@tag_to_kubernetes_name_regexp)
|
194
|
+
|
190
195
|
@container_name_to_kubernetes_regexp_compiled = Regexp.compile(@container_name_to_kubernetes_regexp)
|
191
196
|
|
192
197
|
# Use Kubernetes default service account if we're in a pod.
|
@@ -300,40 +305,47 @@ module Fluent::Plugin
|
|
300
305
|
end
|
301
306
|
end
|
302
307
|
|
303
|
-
def get_metadata_for_record(namespace_name, pod_name, container_name,
|
308
|
+
def get_metadata_for_record(source, namespace_name, pod_name, container_name, cache_key, create_time, batch_miss_cache)
|
304
309
|
metadata = {
|
305
|
-
'docker' => { 'container_id' =>
|
310
|
+
'docker' => { 'container_id' => "" },
|
306
311
|
'kubernetes' => {
|
307
312
|
'container_name' => container_name,
|
308
313
|
'namespace_name' => namespace_name,
|
309
314
|
'pod_name' => pod_name
|
310
315
|
}
|
311
316
|
}
|
317
|
+
metadata['docker']['container_id'] = cache_key unless source == 'var.log.pods'
|
318
|
+
container_cache_key = container_name
|
312
319
|
if present?(@kubernetes_url)
|
313
|
-
pod_metadata = get_pod_metadata(
|
314
|
-
|
315
|
-
|
316
|
-
metadata['kubernetes']['
|
317
|
-
metadata['
|
320
|
+
pod_metadata = get_pod_metadata(cache_key, namespace_name, pod_name, create_time, batch_miss_cache)
|
321
|
+
if (pod_metadata.include? 'containers') && (pod_metadata['containers'].include? container_cache_key) && !@skip_container_metadata
|
322
|
+
metadata['kubernetes']['container_image'] = pod_metadata['containers'][container_cache_key]['image']
|
323
|
+
metadata['kubernetes']['container_image_id'] = pod_metadata['containers'][container_cache_key]['image_id'] unless pod_metadata['containers'][container_cache_key]['image_id'].empty?
|
324
|
+
metadata['docker']['container_id'] = pod_metadata['containers'][container_cache_key]['containerID'] unless pod_metadata['containers'][container_cache_key]['containerID'].empty?
|
318
325
|
end
|
319
326
|
|
320
327
|
metadata['kubernetes'].merge!(pod_metadata) if pod_metadata
|
321
328
|
metadata['kubernetes'].delete('containers')
|
322
329
|
end
|
330
|
+
metadata.delete('docker') if metadata['docker'] && (metadata['docker']['container_id'].nil? || metadata['docker']['container_id'].empty?)
|
323
331
|
metadata
|
324
332
|
end
|
325
333
|
|
326
334
|
def filter_stream(tag, es)
|
327
335
|
return es if (es.respond_to?(:empty?) && es.empty?) || !es.is_a?(Fluent::EventStream)
|
328
|
-
|
329
336
|
new_es = Fluent::MultiEventStream.new
|
330
337
|
tag_match_data = tag.match(@tag_to_kubernetes_name_regexp_compiled) unless @use_journal
|
331
338
|
tag_metadata = nil
|
332
339
|
batch_miss_cache = {}
|
333
340
|
es.each do |time, record|
|
334
341
|
if tag_match_data && tag_metadata.nil?
|
335
|
-
|
336
|
-
|
342
|
+
cache_key = if tag_match_data.names.include?('pod_uuid') && !tag_match_data['pod_uuid'].nil?
|
343
|
+
tag_match_data['pod_uuid']
|
344
|
+
else
|
345
|
+
tag_match_data['docker_id']
|
346
|
+
end
|
347
|
+
tag_metadata = get_metadata_for_record(tag_match_data['prefix'], tag_match_data['namespace'], tag_match_data['pod_name'], tag_match_data['container_name'],
|
348
|
+
cache_key, create_time_from_record(record, time), batch_miss_cache)
|
337
349
|
end
|
338
350
|
metadata = Marshal.load(Marshal.dump(tag_metadata)) if tag_metadata
|
339
351
|
if (@use_journal || @use_journal.nil?) &&
|
@@ -346,12 +358,11 @@ module Fluent::Plugin
|
|
346
358
|
record['kubernetes'].key?('pod_name') &&
|
347
359
|
record['kubernetes'].key?('container_name') &&
|
348
360
|
record['docker'].key?('container_id') &&
|
349
|
-
(k_metadata = get_metadata_for_record(record['kubernetes']['namespace_name'], record['kubernetes']['pod_name'],
|
361
|
+
(k_metadata = get_metadata_for_record(tag_match_data['prefix'], record['kubernetes']['namespace_name'], record['kubernetes']['pod_name'],
|
350
362
|
record['kubernetes']['container_name'], record['docker']['container_id'],
|
351
363
|
create_time_from_record(record, time), batch_miss_cache))
|
352
364
|
metadata = k_metadata
|
353
365
|
end
|
354
|
-
|
355
366
|
record = record.merge(metadata) if metadata
|
356
367
|
new_es.add(time, record)
|
357
368
|
end
|
@@ -363,8 +374,8 @@ module Fluent::Plugin
|
|
363
374
|
metadata = nil
|
364
375
|
if record.key?('CONTAINER_NAME') && record.key?('CONTAINER_ID_FULL')
|
365
376
|
metadata = record['CONTAINER_NAME'].match(@container_name_to_kubernetes_regexp_compiled) do |match_data|
|
366
|
-
get_metadata_for_record(match_data['namespace'], match_data['pod_name'], match_data['container_name'],
|
367
|
-
|
377
|
+
get_metadata_for_record(match_data['name_prefix'], match_data['namespace'], match_data['pod_name'], match_data['container_name'],
|
378
|
+
record['CONTAINER_ID_FULL'], create_time_from_record(record, time), batch_miss_cache)
|
368
379
|
end
|
369
380
|
unless metadata
|
370
381
|
log.debug "Error: could not match CONTAINER_NAME from record #{record}"
|
@@ -24,8 +24,6 @@ module KubernetesMetadata
|
|
24
24
|
metadata = {}
|
25
25
|
ids = @id_cache[key]
|
26
26
|
if ids.nil?
|
27
|
-
# FAST PATH
|
28
|
-
# Cache hit, fetch metadata from the cache
|
29
27
|
@stats.bump(:id_cache_miss)
|
30
28
|
return batch_miss_cache["#{namespace_name}_#{pod_name}"] if batch_miss_cache.key?("#{namespace_name}_#{pod_name}")
|
31
29
|
|
@@ -65,7 +63,7 @@ module KubernetesMetadata
|
|
65
63
|
@stats.bump(:id_cache_orphaned_record)
|
66
64
|
end
|
67
65
|
if @allow_orphans
|
68
|
-
log.trace("orphaning message for: #{namespace_name}/#{pod_name} ")
|
66
|
+
log.trace("orphaning message for: #{namespace_name}/#{pod_name} ")
|
69
67
|
metadata = {
|
70
68
|
'orphaned_namespace' => namespace_name,
|
71
69
|
'namespace_name' => @orphaned_namespace_name,
|
@@ -78,9 +78,9 @@ module KubernetesMetadata
|
|
78
78
|
container_meta = {}
|
79
79
|
begin
|
80
80
|
pod_object[:status][:containerStatuses].each do |container_status|
|
81
|
-
|
82
|
-
|
83
|
-
container_meta[
|
81
|
+
container_id = (container_status[:containerID]||"").sub(%r{^[-_a-zA-Z0-9]+://}, '')
|
82
|
+
key = container_status[:name]
|
83
|
+
container_meta[key] = if @skip_container_metadata
|
84
84
|
{
|
85
85
|
'name' => container_status[:name]
|
86
86
|
}
|
@@ -88,7 +88,8 @@ module KubernetesMetadata
|
|
88
88
|
{
|
89
89
|
'name' => container_status[:name],
|
90
90
|
'image' => container_status[:image],
|
91
|
-
'image_id' => container_status[:imageID]
|
91
|
+
'image_id' => container_status[:imageID],
|
92
|
+
:containerID => container_id
|
92
93
|
}
|
93
94
|
end
|
94
95
|
end if pod_object[:status] && pod_object[:status][:containerStatuses]
|
@@ -28,7 +28,8 @@ class KubernetesMetadataFilterTest < Test::Unit::TestCase
|
|
28
28
|
@time = Fluent::Engine.now
|
29
29
|
end
|
30
30
|
|
31
|
-
|
31
|
+
VAR_LOG_CONTAINER_TAG = 'var.log.containers.fabric8-console-controller-98rqc_default_fabric8-console-container-49095a2894da899d3b327c5fde1e056a81376cc9a8f8b09a195f2a92bceed459.log'
|
32
|
+
VAR_LOG_POD_TAG = 'var.log.pods.default_fabric8-console-controller-98rqc_c76927af-f563-11e4-b32d-54ee7527188d.fabric8-console-container.0.log'
|
32
33
|
|
33
34
|
def create_driver(conf = '')
|
34
35
|
Test::Driver::Filter.new(Plugin::KubernetesMetadataFilter).configure(conf)
|
@@ -45,7 +46,6 @@ class KubernetesMetadataFilterTest < Test::Unit::TestCase
|
|
45
46
|
assert_equal('KubernetesMetadata::TestApiAdapter', d.instance.test_api_adapter)
|
46
47
|
end
|
47
48
|
|
48
|
-
|
49
49
|
test 'kubernetes url' do
|
50
50
|
VCR.use_cassette('valid_kubernetes_api_server') do
|
51
51
|
d = create_driver('
|
@@ -138,7 +138,7 @@ class KubernetesMetadataFilterTest < Test::Unit::TestCase
|
|
138
138
|
cache_size 1
|
139
139
|
', d: nil)
|
140
140
|
d = create_driver(config) if d.nil?
|
141
|
-
d.run(default_tag:
|
141
|
+
d.run(default_tag: VAR_LOG_CONTAINER_TAG) do
|
142
142
|
d.feed(@time, msg)
|
143
143
|
end
|
144
144
|
d.filtered.map(&:last)
|
@@ -165,8 +165,8 @@ class KubernetesMetadataFilterTest < Test::Unit::TestCase
|
|
165
165
|
plugin.filter_stream('tag', Fluent::MultiEventStream.new)
|
166
166
|
end
|
167
167
|
|
168
|
-
sub_test_case 'parsing_pod_metadata' do
|
169
|
-
test '
|
168
|
+
sub_test_case 'parsing_pod_metadata when container_status is missing from the pod status' do
|
169
|
+
test 'using the tag_to_kubernetes_name_regexp for /var/log/containers ' do
|
170
170
|
VCR.use_cassettes(
|
171
171
|
[
|
172
172
|
{ name: 'valid_kubernetes_api_server' },
|
@@ -174,16 +174,49 @@ class KubernetesMetadataFilterTest < Test::Unit::TestCase
|
|
174
174
|
{ name: 'kubernetes_get_namespace_default' },
|
175
175
|
{ name: 'kubernetes_get_pod_container_init' }
|
176
176
|
]) do
|
177
|
-
filtered = emit({},
|
177
|
+
filtered = emit({}, "
|
178
178
|
kubernetes_url https://localhost:8443
|
179
179
|
watch false
|
180
180
|
cache_size 1
|
181
|
-
|
181
|
+
")
|
182
182
|
expected_kube_metadata = {
|
183
183
|
'docker' => {
|
184
184
|
'container_id' => '49095a2894da899d3b327c5fde1e056a81376cc9a8f8b09a195f2a92bceed459'
|
185
185
|
},
|
186
186
|
'kubernetes' => {
|
187
|
+
'container_image'=>'fabric8/hawtio-kubernetes:latest',
|
188
|
+
'container_name'=>'fabric8-console-container',
|
189
|
+
'host' => 'jimmi-redhat.localnet',
|
190
|
+
'pod_name' => 'fabric8-console-controller-98rqc',
|
191
|
+
'namespace_id' => '898268c8-4a36-11e5-9d81-42010af0194c',
|
192
|
+
'namespace_name' => 'default',
|
193
|
+
'pod_id' => 'c76927af-f563-11e4-b32d-54ee7527188d',
|
194
|
+
'pod_ip' => '172.17.0.8',
|
195
|
+
'master_url' => 'https://localhost:8443',
|
196
|
+
'labels' => {
|
197
|
+
'component' => 'fabric8Console'
|
198
|
+
}
|
199
|
+
}
|
200
|
+
}
|
201
|
+
assert_equal(expected_kube_metadata, filtered[0])
|
202
|
+
end
|
203
|
+
end
|
204
|
+
test 'using the tag_to_kubernetes_name_regexp for /var/log/pods' do
|
205
|
+
VCR.use_cassettes(
|
206
|
+
[
|
207
|
+
{ name: 'valid_kubernetes_api_server' },
|
208
|
+
{ name: 'kubernetes_get_api_v1' },
|
209
|
+
{ name: 'kubernetes_get_namespace_default' },
|
210
|
+
{ name: 'kubernetes_get_pod_container_init' }
|
211
|
+
]) do
|
212
|
+
filtered = emit_with_tag(VAR_LOG_POD_TAG,{}, "
|
213
|
+
kubernetes_url https://localhost:8443
|
214
|
+
watch false
|
215
|
+
cache_size 1
|
216
|
+
")
|
217
|
+
expected_kube_metadata = {
|
218
|
+
'kubernetes' => {
|
219
|
+
'container_image'=>'fabric8/hawtio-kubernetes:latest',
|
187
220
|
'container_name'=>'fabric8-console-container',
|
188
221
|
'host' => 'jimmi-redhat.localnet',
|
189
222
|
'pod_name' => 'fabric8-console-controller-98rqc',
|
@@ -214,8 +247,8 @@ class KubernetesMetadataFilterTest < Test::Unit::TestCase
|
|
214
247
|
filtered = emit({ 'time' => '2015-05-08T09:22:01Z' }, '', d: driver)
|
215
248
|
expected_kube_metadata = {
|
216
249
|
'time' => '2015-05-08T09:22:01Z',
|
217
|
-
'docker'
|
218
|
-
'container_id'
|
250
|
+
'docker'=>{
|
251
|
+
'container_id'=>'49095a2894da899d3b327c5fde1e056a81376cc9a8f8b09a195f2a92bceed459'
|
219
252
|
},
|
220
253
|
'kubernetes' => {
|
221
254
|
'pod_name' => 'fabric8-console-controller-98rqc',
|
@@ -302,6 +335,7 @@ class KubernetesMetadataFilterTest < Test::Unit::TestCase
|
|
302
335
|
end
|
303
336
|
|
304
337
|
test 'with docker & kubernetes metadata' do
|
338
|
+
|
305
339
|
VCR.use_cassettes([{ name: 'valid_kubernetes_api_server' }, { name: 'kubernetes_get_api_v1' }, { name: 'kubernetes_get_pod' }, { name: 'kubernetes_get_namespace_default' }]) do
|
306
340
|
filtered = emit({ 'time' => '2015-05-08T09:22:01Z' })
|
307
341
|
expected_kube_metadata = {
|
@@ -398,8 +432,8 @@ class KubernetesMetadataFilterTest < Test::Unit::TestCase
|
|
398
432
|
test 'with docker & kubernetes metadata but no configured api server' do
|
399
433
|
filtered = emit({}, '')
|
400
434
|
expected_kube_metadata = {
|
401
|
-
'docker'
|
402
|
-
'container_id'
|
435
|
+
'docker'=>{
|
436
|
+
'container_id'=>'49095a2894da899d3b327c5fde1e056a81376cc9a8f8b09a195f2a92bceed459'
|
403
437
|
},
|
404
438
|
'kubernetes' => {
|
405
439
|
'pod_name' => 'fabric8-console-controller-98rqc',
|
@@ -420,8 +454,8 @@ class KubernetesMetadataFilterTest < Test::Unit::TestCase
|
|
420
454
|
stub_request(:any, 'https://localhost:8443/api/v1/namespaces/default').to_timeout
|
421
455
|
filtered = emit
|
422
456
|
expected_kube_metadata = {
|
423
|
-
'docker'
|
424
|
-
'container_id'
|
457
|
+
'docker'=>{
|
458
|
+
'container_id'=>'49095a2894da899d3b327c5fde1e056a81376cc9a8f8b09a195f2a92bceed459'
|
425
459
|
},
|
426
460
|
'kubernetes' => {
|
427
461
|
'pod_name' => 'fabric8-console-controller-98rqc',
|
@@ -443,8 +477,8 @@ class KubernetesMetadataFilterTest < Test::Unit::TestCase
|
|
443
477
|
stub_request(:any, 'https://localhost:8443/api/v1/namespaces/default/pods/fabric8-console-controller.98rqc').to_timeout
|
444
478
|
filtered = emit_with_tag('var.log.containers.fabric8-console-controller.98rqc_default_fabric8-console-container-49095a2894da899d3b327c5fde1e056a81376cc9a8f8b09a195f2a92bceed459.log', {}, '')
|
445
479
|
expected_kube_metadata = {
|
446
|
-
'docker'
|
447
|
-
'container_id'
|
480
|
+
'docker'=>{
|
481
|
+
'container_id'=>'49095a2894da899d3b327c5fde1e056a81376cc9a8f8b09a195f2a92bceed459'
|
448
482
|
},
|
449
483
|
'kubernetes' => {
|
450
484
|
'pod_name' => 'fabric8-console-controller.98rqc',
|
@@ -736,7 +770,6 @@ class KubernetesMetadataFilterTest < Test::Unit::TestCase
|
|
736
770
|
|
737
771
|
test 'uses metadata from tag if use_journal false and lookup_from_k8s_field false' do
|
738
772
|
# with use_journal unset, should still use the journal fields instead of tag fields
|
739
|
-
tag = 'var.log.containers.fabric8-console-controller-98rqc_default_fabric8-console-container-49095a2894da899d3b327c5fde1e056a81376cc9a8f8b09a195f2a92bceed459.log'
|
740
773
|
msg = {
|
741
774
|
'CONTAINER_NAME' => 'k8s_journald-container-name.db89db89_journald-pod-name_journald-namespace-name_c76927af-f563-11e4-b32d-54ee7527188d_89db89db',
|
742
775
|
'CONTAINER_ID_FULL' => '838350c64bacba968d39a30a50789b2795291fceca6ccbff55298671d46b0e3b',
|
@@ -751,13 +784,13 @@ class KubernetesMetadataFilterTest < Test::Unit::TestCase
|
|
751
784
|
VCR.use_cassettes([{ name: 'valid_kubernetes_api_server' }, { name: 'kubernetes_get_api_v1' }, { name: 'kubernetes_get_pod' },
|
752
785
|
{ name: 'kubernetes_get_namespace_default', options: { allow_playback_repeats: true } },
|
753
786
|
{ name: 'metadata_from_tag_and_journald_fields' }]) do
|
754
|
-
es = emit_with_tag(
|
787
|
+
es = emit_with_tag(VAR_LOG_CONTAINER_TAG, msg, "
|
755
788
|
kubernetes_url https://localhost:8443
|
756
789
|
watch false
|
757
790
|
cache_size 1
|
758
791
|
lookup_from_k8s_field false
|
759
792
|
use_journal false
|
760
|
-
|
793
|
+
")
|
761
794
|
expected_kube_metadata = {
|
762
795
|
'docker' => {
|
763
796
|
'container_id' => '49095a2894da899d3b327c5fde1e056a81376cc9a8f8b09a195f2a92bceed459'
|
@@ -991,7 +1024,8 @@ class KubernetesMetadataFilterTest < Test::Unit::TestCase
|
|
991
1024
|
end
|
992
1025
|
|
993
1026
|
test 'processes all events when reading from MessagePackEventStream' do
|
994
|
-
VCR.use_cassettes([{ name: 'valid_kubernetes_api_server' },
|
1027
|
+
VCR.use_cassettes([{ name: 'valid_kubernetes_api_server' },
|
1028
|
+
{ name: 'kubernetes_get_api_v1' },
|
995
1029
|
{ name: 'kubernetes_get_pod' },
|
996
1030
|
{ name: 'kubernetes_get_namespace_default' }]) do
|
997
1031
|
entries = [[@time, { 'time' => '2015-05-08T09:22:01Z' }], [@time, { 'time' => '2015-05-08T09:22:01Z' }]]
|
@@ -1004,7 +1038,7 @@ class KubernetesMetadataFilterTest < Test::Unit::TestCase
|
|
1004
1038
|
cache_size 1
|
1005
1039
|
')
|
1006
1040
|
d.run do
|
1007
|
-
d.feed(
|
1041
|
+
d.feed(VAR_LOG_CONTAINER_TAG, msgpack_stream)
|
1008
1042
|
end
|
1009
1043
|
filtered = d.filtered.map(&:last)
|
1010
1044
|
|
@@ -1048,8 +1082,8 @@ class KubernetesMetadataFilterTest < Test::Unit::TestCase
|
|
1048
1082
|
skip_namespace_metadata true
|
1049
1083
|
')
|
1050
1084
|
expected_kube_metadata = {
|
1051
|
-
'docker'
|
1052
|
-
'container_id'
|
1085
|
+
'docker'=>{
|
1086
|
+
'container_id'=>'49095a2894da899d3b327c5fde1e056a81376cc9a8f8b09a195f2a92bceed459'
|
1053
1087
|
},
|
1054
1088
|
'kubernetes' => {
|
1055
1089
|
'host' => 'jimmi-redhat.localnet',
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: fluent-plugin-kubernetes_metadata_filter
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 2.9.
|
4
|
+
version: 2.9.3
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Jimmi Dyson
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2021-
|
11
|
+
date: 2021-12-06 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: fluentd
|