/
cluster.go
154 lines (134 loc) · 7.36 KB
/
cluster.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
package collector
import (
"context"
"encoding/json"
"github.com/rs/zerolog/log"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime/schema"
"k8s.io/client-go/discovery"
"k8s.io/client-go/discovery/cached/memory"
"k8s.io/client-go/dynamic"
"k8s.io/client-go/restmapper"
)
const CLUSTER_COLLECTOR_NAME = "Cluster"
type ClusterCollector struct {
*commonCollector
*kubeCollector
clientSet dynamic.Interface
additionalResources []schema.GroupVersionResource
additionalAnnotations []string
}
type ClusterOpts struct {
Kubeconfig string
KubeContext string
ClientSet dynamic.Interface
DiscoveryClient discovery.DiscoveryInterface
}
func NewClusterCollector(opts *ClusterOpts, additionalKinds []string, additionalAnnotations []string, userAgent string) (
*ClusterCollector, error) {
kubeCollector, err := newKubeCollector(opts.Kubeconfig, opts.KubeContext, opts.DiscoveryClient, userAgent)
if err != nil {
return nil, err
}
collector := &ClusterCollector{
kubeCollector: kubeCollector,
commonCollector: newCommonCollector(CLUSTER_COLLECTOR_NAME),
additionalAnnotations: additionalAnnotations,
}
if opts.ClientSet == nil {
collector.clientSet, err = dynamic.NewForConfig(kubeCollector.GetRestConfig())
if err != nil {
return nil, err
}
} else {
collector.clientSet = opts.ClientSet
}
mapper := restmapper.NewDeferredDiscoveryRESTMapper(memory.NewMemCacheClient(collector.discoveryClient))
for _, ar := range additionalKinds {
gvk, _ := schema.ParseKindArg(ar)
gvrMap, err := mapper.RESTMapping(gvk.GroupKind(), gvk.Version)
if err != nil {
log.Warn().Msgf("Failed to map %s Kind to resource: %s", gvk.Kind, err)
continue
}
collector.additionalResources = append(collector.additionalResources, gvrMap.Resource)
}
return collector, nil
}
func (c *ClusterCollector) Get() ([]map[string]interface{}, error) {
gvrs := []schema.GroupVersionResource{
schema.GroupVersionResource{Group: "apps", Version: "v1", Resource: "daemonsets"},
schema.GroupVersionResource{Group: "apps", Version: "v1", Resource: "deployments"},
schema.GroupVersionResource{Group: "apps", Version: "v1", Resource: "replicasets"},
schema.GroupVersionResource{Group: "apps", Version: "v1", Resource: "statefulsets"},
schema.GroupVersionResource{Group: "networking.k8s.io", Version: "v1", Resource: "networkpolicies"},
schema.GroupVersionResource{Group: "policy", Version: "v1beta1", Resource: "podsecuritypolicies"},
schema.GroupVersionResource{Group: "networking.k8s.io", Version: "v1", Resource: "ingresses"},
schema.GroupVersionResource{Group: "networking.k8s.io", Version: "v1", Resource: "ingressclasses"},
schema.GroupVersionResource{Group: "storage.k8s.io", Version: "v1", Resource: "csidrivers"},
schema.GroupVersionResource{Group: "storage.k8s.io", Version: "v1", Resource: "csinodes"},
schema.GroupVersionResource{Group: "storage.k8s.io", Version: "v1", Resource: "storageclasses"},
schema.GroupVersionResource{Group: "storage.k8s.io", Version: "v1", Resource: "volumeattachments"},
schema.GroupVersionResource{Group: "storage.k8s.io", Version: "v1", Resource: "csistoragecapacities"},
schema.GroupVersionResource{Group: "scheduling.k8s.io", Version: "v1", Resource: "priorityclasses"},
schema.GroupVersionResource{Group: "rbac.authorization.k8s.io", Version: "v1", Resource: "clusterroles"},
schema.GroupVersionResource{Group: "rbac.authorization.k8s.io", Version: "v1", Resource: "clusterrolebindings"},
schema.GroupVersionResource{Group: "rbac.authorization.k8s.io", Version: "v1", Resource: "roles"},
schema.GroupVersionResource{Group: "rbac.authorization.k8s.io", Version: "v1", Resource: "rolebindings"},
schema.GroupVersionResource{Group: "coordination.k8s.io", Version: "v1", Resource: "leases"},
schema.GroupVersionResource{Group: "authorization.k8s.io", Version: "v1", Resource: "subjectaccessreviews"},
schema.GroupVersionResource{Group: "authorization.k8s.io", Version: "v1", Resource: "selfsubjectaccessreviews"},
schema.GroupVersionResource{Group: "authorization.k8s.io", Version: "v1", Resource: "localsubjectaccessreviews"},
schema.GroupVersionResource{Group: "authentication.k8s.io", Version: "v1", Resource: "tokenreviews"},
schema.GroupVersionResource{Group: "certificates.k8s.io", Version: "v1", Resource: "certificatesigningrequests"},
schema.GroupVersionResource{Group: "apiregistration.k8s.io", Version: "v1", Resource: "apiservices"},
schema.GroupVersionResource{Group: "apiextensions.k8s.io", Version: "v1", Resource: "customresourcedefinitions"},
schema.GroupVersionResource{Group: "admissionregistration.k8s.io", Version: "v1", Resource: "mutatingwebhookconfigurations"},
schema.GroupVersionResource{Group: "admissionregistration.k8s.io", Version: "v1", Resource: "validatingwebhookconfigurations"},
schema.GroupVersionResource{Group: "node.k8s.io", Version: "v1", Resource: "runtimeclasses"},
schema.GroupVersionResource{Group: "policy", Version: "v1", Resource: "poddisruptionbudgets"},
schema.GroupVersionResource{Group: "policy", Version: "v1beta1", Resource: "podsecuritypolicies"},
schema.GroupVersionResource{Group: "discovery.k8s.io", Version: "v1", Resource: "endpointslices"},
schema.GroupVersionResource{Group: "batch", Version: "v1", Resource: "cronjobs"},
schema.GroupVersionResource{Group: "autoscaling", Version: "v2", Resource: "horizontalpodautoscalers"},
schema.GroupVersionResource{Group: "snapshot.storage.k8s.io", Version: "v1", Resource: "volumesnapshots"},
schema.GroupVersionResource{Group: "snapshot.storage.k8s.io", Version: "v1", Resource: "volumesnapshotclasses"},
schema.GroupVersionResource{Group: "snapshot.storage.k8s.io", Version: "v1", Resource: "volumesnapshotcontents"},
schema.GroupVersionResource{Group: "flowcontrol.apiserver.k8s.io", Version: "v1beta2", Resource: "flowschemas"},
schema.GroupVersionResource{Group: "flowcontrol.apiserver.k8s.io", Version: "v1beta2", Resource: "prioritylevelconfigurations"},
schema.GroupVersionResource{Group: "flowcontrol.apiserver.k8s.io", Version: "v1beta3", Resource: "flowschemas"},
schema.GroupVersionResource{Group: "flowcontrol.apiserver.k8s.io", Version: "v1beta3", Resource: "prioritylevelconfigurations"},
}
gvrs = append(gvrs, c.additionalResources...)
var results []map[string]interface{}
for _, g := range gvrs {
ri := c.clientSet.Resource(g)
log.Debug().Msgf("Retrieving: %s.%s.%s", g.Resource, g.Version, g.Group)
rs, err := ri.List(context.Background(), metav1.ListOptions{})
if err != nil {
log.Debug().Msgf("Failed to retrieve: %s: %s", g, err)
continue
}
for _, r := range rs.Items {
if jsonManifest, ok := c.getLastAppliedConfig(r.GetAnnotations()); ok {
var manifest map[string]interface{}
err := json.Unmarshal([]byte(jsonManifest), &manifest)
if err != nil {
log.Warn().Msgf("failed to parse 'last-applied-configuration' annotation of resource %s/%s: %v", r.GetNamespace(), r.GetName(), err)
continue
}
results = append(results, manifest)
}
}
}
return results, nil
}
func (c *ClusterCollector) getLastAppliedConfig(resourceAnnotations map[string]string) (string, bool) {
annotations := append([]string{"kubectl.kubernetes.io/last-applied-configuration"}, c.additionalAnnotations...)
for _, annotation := range annotations {
if jsonManifest, ok := resourceAnnotations[annotation]; ok {
return jsonManifest, ok
}
}
return "", false
}