This repository has been archived by the owner on Jan 4, 2023. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 1
/
wireguard_exporter.go
72 lines (62 loc) · 3.03 KB
/
wireguard_exporter.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
package main
import (
"fmt"
"net/http"
"os"
"github.com/alecthomas/kong"
"github.com/go-kit/kit/log/level"
"github.com/prometheus/common/promlog"
"github.com/prometheus/common/version"
"github.com/prometheus/node_exporter/https"
"github.com/terrycain/wireguard_exporter/internal/filter_handler"
"github.com/terrycain/wireguard_exporter/internal/friendlynames"
)
var CLI struct {
WebListenAddress string `name:"web.listen-address" default:":9586" help:"Address on which to expose metrics and web interface."`
WebTelemetryPath string `name:"web.telemetry-path" default:"/metrics" help:"Path under which to expose metrics."`
WebDisableExporterMetrics bool `name:"web.disable-exporter-metrics" default:"false" help:"Exclude metrics about the exporter itself (promhttp_*, process_*, go_*)."`
WebConfig string `name:"web.config" default:"" help:"[EXPERIMENTAL] Path to config yaml file that can enable TLS or authentication."`
WebMaxRequests int `name:"web.max-requests" default:"2" help:"Maximum number of parallel scrape requests. Use 0 to disable."`
WireguardFriendlyNameFile string `name:"wireguard.friendly-name-file" help:"Path to public key to name mapping file."`
LogLevel string `name:"log.level" default:"info" enum:"debug,info,warn,error" help:"Only log messages with the given severity or above. One of: [debug, info, warn, error]"`
LogFormat string `name:"log.format" default:"logfmt" enum:"logfmt,json" help:"Output format of log messages. One of: [logfmt, json]"`
Version bool `help:"Show application version."`
}
func main() {
kong.Parse(&CLI)
if CLI.Version {
fmt.Print(version.Print("wireguard_exporter"))
os.Exit(0)
}
logConfig := &promlog.Config{
Level: &promlog.AllowedLevel{},
Format: &promlog.AllowedFormat{},
}
logConfig.Format.Set(CLI.LogFormat)
logConfig.Level.Set(CLI.LogLevel)
logger := promlog.New(logConfig)
level.Info(logger).Log("msg", "Starting wireguard_exporter", "version", version.Info())
level.Info(logger).Log("msg", "Build context", "build_context", version.BuildContext())
fctx := filter_handler.HandlerContext{
MetricsPath: CLI.WebTelemetryPath,
DisableExporterMetrics: CLI.WebDisableExporterMetrics,
MaxRequests: CLI.WebMaxRequests,
Logger: logger,
}
if len(CLI.WireguardFriendlyNameFile) > 0 {
if friendlyNames, err := friendlynames.ParseFriendlyNameFile(CLI.WireguardFriendlyNameFile, logger); err != nil {
level.Error(logger).Log("msg", "Failed to parse friendly name file", "file", CLI.WireguardFriendlyNameFile, "err", err.Error())
} else {
fctx.FriendlyNames = friendlyNames
}
}
fctx.Load()
http.Handle(CLI.WebTelemetryPath, fctx.MetricsHandler)
http.HandleFunc("/", fctx.IndexFunc)
level.Info(logger).Log("msg", "Listening on", "address", CLI.WebListenAddress)
server := &http.Server{Addr: CLI.WebListenAddress}
if err := https.Listen(server, CLI.WebConfig, logger); err != nil {
level.Error(logger).Log("err", err)
os.Exit(1)
}
}