123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618 |
- package otel
- import (
- "context"
- "crypto/tls"
- "crypto/x509"
- "errors"
- "fmt"
- "net/http"
- "os"
- "runtime"
- "strings"
- "sync"
- "time"
- "github.com/felixge/httpsnoop"
- "github.com/shirou/gopsutil/process"
- "github.com/sirupsen/logrus"
- "go.opentelemetry.io/contrib/detectors/aws/ec2"
- "go.opentelemetry.io/contrib/detectors/aws/ecs"
- "go.opentelemetry.io/contrib/detectors/aws/eks"
- "go.opentelemetry.io/contrib/propagators/autoprop"
- "go.opentelemetry.io/contrib/propagators/aws/xray"
- "go.opentelemetry.io/otel"
- "go.opentelemetry.io/otel/attribute"
- "go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetricgrpc"
- "go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetrichttp"
- "go.opentelemetry.io/otel/exporters/otlp/otlptrace"
- "go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc"
- "go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp"
- "go.opentelemetry.io/otel/metric"
- "go.opentelemetry.io/otel/propagation"
- sdkmetric "go.opentelemetry.io/otel/sdk/metric"
- "go.opentelemetry.io/otel/sdk/resource"
- sdktrace "go.opentelemetry.io/otel/sdk/trace"
- semconv "go.opentelemetry.io/otel/semconv/v1.17.0"
- "go.opentelemetry.io/otel/semconv/v1.17.0/httpconv"
- "go.opentelemetry.io/otel/trace"
- "google.golang.org/grpc"
- "google.golang.org/grpc/credentials"
- "github.com/imgproxy/imgproxy/v3/config"
- "github.com/imgproxy/imgproxy/v3/ierrors"
- "github.com/imgproxy/imgproxy/v3/metrics/errformat"
- "github.com/imgproxy/imgproxy/v3/metrics/stats"
- "github.com/imgproxy/imgproxy/v3/version"
- )
- type hasSpanCtxKey struct{}
- type GaugeFunc func() float64
- var (
- enabled bool
- enabledMetrics bool
- tracerProvider *sdktrace.TracerProvider
- tracer trace.Tracer
- meterProvider *sdkmetric.MeterProvider
- meter metric.Meter
- propagator propagation.TextMapPropagator
- bufferSizeHist metric.Int64Histogram
- bufferDefaultSizes = make(map[string]int)
- bufferMaxSizes = make(map[string]int)
- bufferStatsMutex sync.Mutex
- )
- func Init() error {
- if len(config.OpenTelemetryEndpoint) == 0 {
- return nil
- }
- otel.SetErrorHandler(&errorHandler{entry: logrus.WithField("from", "opentelemetry")})
- var (
- traceExporter *otlptrace.Exporter
- metricExporter sdkmetric.Exporter
- err error
- )
- switch config.OpenTelemetryProtocol {
- case "grpc":
- traceExporter, metricExporter, err = buildGRPCExporters()
- case "https":
- traceExporter, metricExporter, err = buildHTTPExporters(false)
- case "http":
- traceExporter, metricExporter, err = buildHTTPExporters(true)
- default:
- return fmt.Errorf("Unknown OpenTelemetry protocol: %s", config.OpenTelemetryProtocol)
- }
- if err != nil {
- return err
- }
- res, _ := resource.Merge(
- resource.Default(),
- resource.NewSchemaless(
- semconv.ServiceNameKey.String(config.OpenTelemetryServiceName),
- semconv.ServiceVersionKey.String(version.Version()),
- ),
- )
- awsRes, _ := resource.Detect(
- context.Background(),
- ec2.NewResourceDetector(),
- ecs.NewResourceDetector(),
- eks.NewResourceDetector(),
- )
- if merged, merr := resource.Merge(awsRes, res); merr == nil {
- res = merged
- } else {
- logrus.Warnf("Can't add AWS attributes to OpenTelemetry: %s", merr)
- }
- opts := []sdktrace.TracerProviderOption{
- sdktrace.WithResource(res),
- sdktrace.WithBatcher(traceExporter),
- }
- if opts, err = addTraceIDRatioSampler(opts); err != nil {
- return err
- }
- switch g := config.OpenTelemetryTraceIDGenerator; g {
- case "xray":
- idg := xray.NewIDGenerator()
- opts = append(opts, sdktrace.WithIDGenerator(idg))
- case "random":
- // Do nothing. OTel uses random generator by default
- default:
- return fmt.Errorf("Unknown Trace ID generator: %s", g)
- }
- tracerProvider = sdktrace.NewTracerProvider(opts...)
- tracer = tracerProvider.Tracer("imgproxy")
- if len(config.OpenTelemetryPropagators) > 0 {
- propagator, err = autoprop.TextMapPropagator(config.OpenTelemetryPropagators...)
- if err != nil {
- return err
- }
- }
- enabled = true
- if metricExporter == nil {
- return nil
- }
- metricReader := sdkmetric.NewPeriodicReader(
- metricExporter,
- sdkmetric.WithInterval(5*time.Second),
- )
- meterProvider = sdkmetric.NewMeterProvider(
- sdkmetric.WithResource(res),
- sdkmetric.WithReader(metricReader),
- )
- meter = meterProvider.Meter("imgproxy")
- if err = addDefaultMetrics(); err != nil {
- return err
- }
- enabledMetrics = true
- return nil
- }
- func buildGRPCExporters() (*otlptrace.Exporter, sdkmetric.Exporter, error) {
- tracerOpts := []otlptracegrpc.Option{
- otlptracegrpc.WithEndpoint(config.OpenTelemetryEndpoint),
- otlptracegrpc.WithDialOption(grpc.WithBlock()),
- }
- meterOpts := []otlpmetricgrpc.Option{
- otlpmetricgrpc.WithEndpoint(config.OpenTelemetryEndpoint),
- otlpmetricgrpc.WithDialOption(grpc.WithBlock()),
- }
- tlsConf, err := buildTLSConfig()
- if err != nil {
- return nil, nil, err
- }
- if tlsConf != nil {
- creds := credentials.NewTLS(tlsConf)
- tracerOpts = append(tracerOpts, otlptracegrpc.WithTLSCredentials(creds))
- meterOpts = append(meterOpts, otlpmetricgrpc.WithTLSCredentials(creds))
- } else if config.OpenTelemetryGRPCInsecure {
- tracerOpts = append(tracerOpts, otlptracegrpc.WithInsecure())
- meterOpts = append(meterOpts, otlpmetricgrpc.WithInsecure())
- }
- trctx, trcancel := context.WithTimeout(
- context.Background(),
- time.Duration(config.OpenTelemetryConnectionTimeout)*time.Second,
- )
- defer trcancel()
- traceExporter, err := otlptracegrpc.New(trctx, tracerOpts...)
- if err != nil {
- err = fmt.Errorf("Can't connect to OpenTelemetry collector: %s", err)
- }
- if !config.OpenTelemetryEnableMetrics {
- return traceExporter, nil, err
- }
- mtctx, mtcancel := context.WithTimeout(
- context.Background(),
- time.Duration(config.OpenTelemetryConnectionTimeout)*time.Second,
- )
- defer mtcancel()
- metricExporter, err := otlpmetricgrpc.New(mtctx, meterOpts...)
- if err != nil {
- err = fmt.Errorf("Can't connect to OpenTelemetry collector: %s", err)
- }
- return traceExporter, metricExporter, err
- }
- func buildHTTPExporters(insecure bool) (*otlptrace.Exporter, sdkmetric.Exporter, error) {
- tracerOpts := []otlptracehttp.Option{
- otlptracehttp.WithEndpoint(config.OpenTelemetryEndpoint),
- }
- meterOpts := []otlpmetrichttp.Option{
- otlpmetrichttp.WithEndpoint(config.OpenTelemetryEndpoint),
- }
- if insecure {
- tracerOpts = append(tracerOpts, otlptracehttp.WithInsecure())
- meterOpts = append(meterOpts, otlpmetrichttp.WithInsecure())
- } else {
- tlsConf, err := buildTLSConfig()
- if err != nil {
- return nil, nil, err
- }
- if tlsConf != nil {
- tracerOpts = append(tracerOpts, otlptracehttp.WithTLSClientConfig(tlsConf))
- meterOpts = append(meterOpts, otlpmetrichttp.WithTLSClientConfig(tlsConf))
- }
- }
- trctx, trcancel := context.WithTimeout(
- context.Background(),
- time.Duration(config.OpenTelemetryConnectionTimeout)*time.Second,
- )
- defer trcancel()
- traceExporter, err := otlptracehttp.New(trctx, tracerOpts...)
- if err != nil {
- err = fmt.Errorf("Can't connect to OpenTelemetry collector: %s", err)
- }
- if !config.OpenTelemetryEnableMetrics {
- return traceExporter, nil, err
- }
- mtctx, mtcancel := context.WithTimeout(
- context.Background(),
- time.Duration(config.OpenTelemetryConnectionTimeout)*time.Second,
- )
- defer mtcancel()
- metricExporter, err := otlpmetrichttp.New(mtctx, meterOpts...)
- if err != nil {
- err = fmt.Errorf("Can't connect to OpenTelemetry collector: %s", err)
- }
- return traceExporter, metricExporter, err
- }
- func buildTLSConfig() (*tls.Config, error) {
- if len(config.OpenTelemetryServerCert) == 0 {
- return nil, nil
- }
- certPool := x509.NewCertPool()
- if !certPool.AppendCertsFromPEM(prepareKeyCert(config.OpenTelemetryServerCert)) {
- return nil, errors.New("Can't load OpenTelemetry server cert")
- }
- tlsConf := tls.Config{RootCAs: certPool}
- if len(config.OpenTelemetryClientCert) > 0 && len(config.OpenTelemetryClientKey) > 0 {
- cert, err := tls.X509KeyPair(
- prepareKeyCert(config.OpenTelemetryClientCert),
- prepareKeyCert(config.OpenTelemetryClientKey),
- )
- if err != nil {
- return nil, fmt.Errorf("Can't load OpenTelemetry client cert/key pair: %s", err)
- }
- tlsConf.Certificates = []tls.Certificate{cert}
- }
- return &tlsConf, nil
- }
- func prepareKeyCert(str string) []byte {
- return []byte(strings.ReplaceAll(str, `\n`, "\n"))
- }
- func Stop() {
- if enabled {
- trctx, trcancel := context.WithTimeout(context.Background(), 5*time.Second)
- defer trcancel()
- tracerProvider.Shutdown(trctx)
- if meterProvider != nil {
- mtctx, mtcancel := context.WithTimeout(context.Background(), 5*time.Second)
- defer mtcancel()
- meterProvider.Shutdown(mtctx)
- }
- }
- }
- func Enabled() bool {
- return enabled
- }
- func StartRootSpan(ctx context.Context, rw http.ResponseWriter, r *http.Request) (context.Context, context.CancelFunc, http.ResponseWriter) {
- if !enabled {
- return ctx, func() {}, rw
- }
- if propagator != nil {
- ctx = propagator.Extract(ctx, propagation.HeaderCarrier(r.Header))
- }
- ctx, span := tracer.Start(
- ctx, "/request",
- trace.WithSpanKind(trace.SpanKindServer),
- trace.WithAttributes(httpconv.ServerRequest("imgproxy", r)...),
- )
- ctx = context.WithValue(ctx, hasSpanCtxKey{}, struct{}{})
- newRw := httpsnoop.Wrap(rw, httpsnoop.Hooks{
- WriteHeader: func(next httpsnoop.WriteHeaderFunc) httpsnoop.WriteHeaderFunc {
- return func(statusCode int) {
- span.SetStatus(httpconv.ServerStatus(statusCode))
- span.SetAttributes(semconv.HTTPStatusCode(statusCode))
- next(statusCode)
- }
- },
- })
- cancel := func() { span.End() }
- return ctx, cancel, newRw
- }
- func StartSpan(ctx context.Context, name string) context.CancelFunc {
- if !enabled {
- return func() {}
- }
- if ctx.Value(hasSpanCtxKey{}) != nil {
- _, span := tracer.Start(ctx, name, trace.WithSpanKind(trace.SpanKindInternal))
- return func() { span.End() }
- }
- return func() {}
- }
- func SendError(ctx context.Context, errType string, err error) {
- if !enabled {
- return
- }
- span := trace.SpanFromContext(ctx)
- attributes := []attribute.KeyValue{
- semconv.ExceptionTypeKey.String(errformat.FormatErrType(errType, err)),
- semconv.ExceptionMessageKey.String(err.Error()),
- }
- if ierr, ok := err.(*ierrors.Error); ok {
- if stack := ierr.FormatStack(); len(stack) != 0 {
- attributes = append(attributes, semconv.ExceptionStacktraceKey.String(stack))
- }
- }
- span.AddEvent(semconv.ExceptionEventName, trace.WithAttributes(attributes...))
- }
- func addDefaultMetrics() error {
- proc, err := process.NewProcess(int32(os.Getpid()))
- if err != nil {
- return fmt.Errorf("Can't initialize process data for OpenTelemetry: %s", err)
- }
- processResidentMemory, err := meter.Int64ObservableGauge(
- "process_resident_memory_bytes",
- metric.WithUnit("By"),
- metric.WithDescription("Resident memory size in bytes."),
- )
- if err != nil {
- return fmt.Errorf("Can't add process_resident_memory_bytes gauge to OpenTelemetry: %s", err)
- }
- processVirtualMemory, err := meter.Int64ObservableGauge(
- "process_virtual_memory_bytes",
- metric.WithUnit("By"),
- metric.WithDescription("Virtual memory size in bytes."),
- )
- if err != nil {
- return fmt.Errorf("Can't add process_virtual_memory_bytes gauge to OpenTelemetry: %s", err)
- }
- goMemstatsSys, err := meter.Int64ObservableGauge(
- "go_memstats_sys_bytes",
- metric.WithUnit("By"),
- metric.WithDescription("Number of bytes obtained from system."),
- )
- if err != nil {
- return fmt.Errorf("Can't add go_memstats_sys_bytes gauge to OpenTelemetry: %s", err)
- }
- goMemstatsHeapIdle, err := meter.Int64ObservableGauge(
- "go_memstats_heap_idle_bytes",
- metric.WithUnit("By"),
- metric.WithDescription("Number of heap bytes waiting to be used."),
- )
- if err != nil {
- return fmt.Errorf("Can't add go_memstats_heap_idle_bytes gauge to OpenTelemetry: %s", err)
- }
- goMemstatsHeapInuse, err := meter.Int64ObservableGauge(
- "go_memstats_heap_inuse_bytes",
- metric.WithUnit("By"),
- metric.WithDescription("Number of heap bytes that are in use."),
- )
- if err != nil {
- return fmt.Errorf("Can't add go_memstats_heap_inuse_bytes gauge to OpenTelemetry: %s", err)
- }
- goGoroutines, err := meter.Int64ObservableGauge(
- "go_goroutines",
- metric.WithUnit("1"),
- metric.WithDescription("Number of goroutines that currently exist."),
- )
- if err != nil {
- return fmt.Errorf("Can't add go_goroutines gauge to OpenTelemetry: %s", err)
- }
- goThreads, err := meter.Int64ObservableGauge(
- "go_threads",
- metric.WithUnit("1"),
- metric.WithDescription("Number of OS threads created."),
- )
- if err != nil {
- return fmt.Errorf("Can't add go_threads gauge to OpenTelemetry: %s", err)
- }
- requestsInProgressGauge, err := meter.Float64ObservableGauge(
- "requests_in_progress",
- metric.WithUnit("1"),
- metric.WithDescription("A gauge of the number of requests currently being in progress."),
- )
- if err != nil {
- return fmt.Errorf("Can't add requests_in_progress gauge to OpenTelemetry: %s", err)
- }
- imagesInProgressGauge, err := meter.Float64ObservableGauge(
- "images_in_progress",
- metric.WithUnit("1"),
- metric.WithDescription("A gauge of the number of images currently being in progress."),
- )
- if err != nil {
- return fmt.Errorf("Can't add images_in_progress gauge to OpenTelemetry: %s", err)
- }
- bufferDefaultSizeGauge, err := meter.Int64ObservableGauge(
- "buffer_default_size_bytes",
- metric.WithUnit("By"),
- metric.WithDescription("A gauge of the buffer default size in bytes."),
- )
- if err != nil {
- return fmt.Errorf("Can't add buffer_default_size_bytes gauge to OpenTelemetry: %s", err)
- }
- bufferMaxSizeGauge, err := meter.Int64ObservableGauge(
- "buffer_max_size_bytes",
- metric.WithUnit("By"),
- metric.WithDescription("A gauge of the buffer max size in bytes."),
- )
- if err != nil {
- return fmt.Errorf("Can't add buffer_max_size_bytes gauge to OpenTelemetry: %s", err)
- }
- _, err = meter.RegisterCallback(
- func(ctx context.Context, o metric.Observer) error {
- memStats, merr := proc.MemoryInfo()
- if merr != nil {
- return merr
- }
- o.ObserveInt64(processResidentMemory, int64(memStats.RSS))
- o.ObserveInt64(processVirtualMemory, int64(memStats.VMS))
- goMemStats := &runtime.MemStats{}
- runtime.ReadMemStats(goMemStats)
- o.ObserveInt64(goMemstatsSys, int64(goMemStats.Sys))
- o.ObserveInt64(goMemstatsHeapIdle, int64(goMemStats.HeapIdle))
- o.ObserveInt64(goMemstatsHeapInuse, int64(goMemStats.HeapInuse))
- threadsNum, _ := runtime.ThreadCreateProfile(nil)
- o.ObserveInt64(goGoroutines, int64(runtime.NumGoroutine()))
- o.ObserveInt64(goThreads, int64(threadsNum))
- o.ObserveFloat64(requestsInProgressGauge, stats.RequestsInProgress())
- o.ObserveFloat64(imagesInProgressGauge, stats.ImagesInProgress())
- bufferStatsMutex.Lock()
- defer bufferStatsMutex.Unlock()
- for t, v := range bufferDefaultSizes {
- o.ObserveInt64(bufferDefaultSizeGauge, int64(v), metric.WithAttributes(attribute.String("type", t)))
- }
- for t, v := range bufferMaxSizes {
- o.ObserveInt64(bufferMaxSizeGauge, int64(v), metric.WithAttributes(attribute.String("type", t)))
- }
- return nil
- },
- processResidentMemory,
- processVirtualMemory,
- goMemstatsSys,
- goMemstatsHeapIdle,
- goMemstatsHeapInuse,
- goGoroutines,
- goThreads,
- requestsInProgressGauge,
- imagesInProgressGauge,
- bufferDefaultSizeGauge,
- bufferMaxSizeGauge,
- )
- if err != nil {
- return fmt.Errorf("Can't register OpenTelemetry callbacks: %s", err)
- }
- bufferSizeHist, err = meter.Int64Histogram(
- "buffer_size_bytes",
- metric.WithUnit("By"),
- metric.WithDescription("A histogram of the buffer size in bytes."),
- )
- if err != nil {
- return fmt.Errorf("Can't add buffer_size_bytes histogram to OpenTelemetry: %s", err)
- }
- return nil
- }
- func AddGaugeFunc(name, desc, u string, f GaugeFunc) {
- if meter == nil {
- return
- }
- _, err := meter.Float64ObservableGauge(
- name,
- metric.WithUnit(u),
- metric.WithDescription(desc),
- metric.WithFloat64Callback(func(_ context.Context, obsrv metric.Float64Observer) error {
- obsrv.Observe(f())
- return nil
- }),
- )
- if err != nil {
- logrus.Warnf("Can't add %s gauge to OpenTelemetry: %s", name, err)
- }
- }
- func ObserveBufferSize(t string, size int) {
- if enabledMetrics {
- bufferSizeHist.Record(context.Background(), int64(size), metric.WithAttributes(attribute.String("type", t)))
- }
- }
- func SetBufferDefaultSize(t string, size int) {
- if enabledMetrics {
- bufferStatsMutex.Lock()
- defer bufferStatsMutex.Unlock()
- bufferDefaultSizes[t] = size
- }
- }
- func SetBufferMaxSize(t string, size int) {
- if enabledMetrics {
- bufferStatsMutex.Lock()
- defer bufferStatsMutex.Unlock()
- bufferMaxSizes[t] = size
- }
- }
- type errorHandler struct {
- entry *logrus.Entry
- }
- func (h *errorHandler) Handle(err error) {
- h.entry.Warn(err.Error())
- }
|