-
Notifications
You must be signed in to change notification settings - Fork 0
/
prometheus.go
85 lines (71 loc) 路 2.76 KB
/
prometheus.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
package metrics
import (
"github.com/prometheus/client_golang/prometheus"
"github.com/prometheus/client_golang/prometheus/promhttp"
"github.com/valyala/fasthttp"
"github.com/yildizozan/gandalf/cmd/adaptor"
"net/http"
)
var r = prometheus.NewRegistry()
var ActiveHttpRequests = prometheus.NewGaugeVec(
prometheus.GaugeOpts{
Name: "gandalf_http_requests_active",
Help: "Number of active http requests.",
}, []string{})
var HttpRequestsTotal = prometheus.NewCounterVec(
prometheus.CounterOpts{
Name: "gandalf_http_requests_total",
Help: "Number of total http requests.",
}, []string{"app", "scheme", "code"})
var HttpRequestsTotalVulnerable = prometheus.NewCounterVec(
prometheus.CounterOpts{
Name: "gandalf_http_requests_total_vulnerable",
Help: "Number of total vulnerable http requests.",
}, []string{"app", "scheme", "code"})
var HttpRequestsSQLInjectionVulnerable = prometheus.NewCounterVec(
prometheus.CounterOpts{
Name: "gandalf_http_requests_sqlinjection_vulnerable",
Help: "Number of total vulnerable http requests.",
}, []string{"app", "scheme", "code"})
var HttpRequestsXSSVulnerable = prometheus.NewCounterVec(
prometheus.CounterOpts{
Name: "gandalf_http_requests_xss_vulnerable",
Help: "Number of total vulnerable http requests.",
}, []string{"app", "scheme", "code"})
var HttpRequestsIpWhitelist = prometheus.NewCounterVec(
prometheus.CounterOpts{
Name: "gandalf_http_requests_ip_whitelist",
Help: "Number of total vulnerable http requests.",
}, []string{"app", "scheme", "code"})
var HttpRequestsIpBlacklist = prometheus.NewCounterVec(
prometheus.CounterOpts{
Name: "gandalf_http_requests_ip_blacklist",
Help: "Number of total vulnerable http requests.",
}, []string{"app", "scheme", "code"})
var HttpRequestsHeaderFilter = prometheus.NewCounterVec(
prometheus.CounterOpts{
Name: "gandalf_http_requests_header_filter",
Help: "Number of total vulnerable http requests.",
}, []string{"app", "scheme", "code"})
var HttpRequestsPathFiler = prometheus.NewCounterVec(
prometheus.CounterOpts{
Name: "gandalf_http_requests_path_filter",
Help: "Number of total vulnerable http requests.",
}, []string{"app", "scheme", "code"})
func Init() {
r.MustRegister(HttpRequestsTotal)
r.MustRegister(HttpRequestsTotalVulnerable)
r.MustRegister(ActiveHttpRequests)
r.MustRegister(HttpRequestsSQLInjectionVulnerable)
r.MustRegister(HttpRequestsXSSVulnerable)
r.MustRegister(HttpRequestsIpWhitelist)
r.MustRegister(HttpRequestsIpBlacklist)
r.MustRegister(HttpRequestsHeaderFilter)
r.MustRegister(HttpRequestsPathFiler)
}
func NetHttpHandle() {
http.Handle("/metrics", promhttp.HandlerFor(r, promhttp.HandlerOpts{}))
}
func FastHttpHandle() fasthttp.RequestHandler {
return adaptor.NewFastHTTPHandler(promhttp.HandlerFor(r, promhttp.HandlerOpts{}))
}