Skip to content

Commit

Permalink
Create nil cgroups reader for processor, improve error handling (#41198)
Browse files Browse the repository at this point in the history
* create nil reader, improve error handling

* add test, clean up

* linter

(cherry picked from commit 764ba96)

# Conflicts:
#	filebeat/autodiscover/defaults_aix.go
#	libbeat/processors/add_docker_metadata/add_docker_metadata.go
#	libbeat/processors/add_process_metadata/add_process_metadata.go
#	libbeat/processors/add_process_metadata/add_process_metadata_test.go
#	libbeat/processors/add_process_metadata/gosigar_cid_provider.go
  • Loading branch information
fearful-symmetry authored and mergify[bot] committed Oct 11, 2024
1 parent 406aa55 commit 0b886fc
Show file tree
Hide file tree
Showing 5 changed files with 100 additions and 2 deletions.
18 changes: 18 additions & 0 deletions filebeat/autodiscover/defaults_aix.go
Original file line number Diff line number Diff line change
Expand Up @@ -17,9 +17,27 @@

//go:build aix

<<<<<<< HEAD:filebeat/autodiscover/defaults_aix.go

Check failure on line 20 in filebeat/autodiscover/defaults_aix.go

View workflow job for this annotation

GitHub Actions / lint (darwin)

expected 'package', found '<<' (typecheck)
package autodiscover
=======
import (
"io/fs"

"github.com/elastic/elastic-agent-system-metrics/metric/system/cgroup"
"github.com/elastic/elastic-agent-system-metrics/metric/system/resolve"
)
>>>>>>> 764ba96d34 (Create nil cgroups reader for processor, improve error handling (#41198)):libbeat/processors/cgroups.go

// InitializeModule initializes this module.
func InitializeModule() {
// does nothing on aix
}

// NilCGReader does nothing
type NilCGReader struct {
}

// ProcessCgroupPaths returns a blank pathLists and fs.ErrNotExist
func (*NilCGReader) ProcessCgroupPaths(_ int) (cgroup.PathList, error) {
return cgroup.PathList{}, fs.ErrNotExist
}
18 changes: 17 additions & 1 deletion libbeat/processors/add_docker_metadata/add_docker_metadata.go
Original file line number Diff line number Diff line change
Expand Up @@ -110,6 +110,16 @@ func buildDockerMetadataProcessor(log *logp.Logger, cfg *conf.C, watcherConstruc
}
}

<<<<<<< HEAD

Check failure on line 113 in libbeat/processors/add_docker_metadata/add_docker_metadata.go

View workflow job for this annotation

GitHub Actions / lint (darwin)

expected statement, found '<<' (typecheck)
=======
reader, err := initCgroupPaths(resolve.NewTestResolver(config.HostFS), false)
if errors.Is(err, cgroup.ErrCgroupsMissing) {
reader = &processors.NilCGReader{}
} else if err != nil {
return nil, fmt.Errorf("error creating cgroup reader: %w", err)
}

>>>>>>> 764ba96d34 (Create nil cgroups reader for processor, improve error handling (#41198))

Check failure on line 122 in libbeat/processors/add_docker_metadata/add_docker_metadata.go

View workflow job for this annotation

GitHub Actions / lint (darwin)

expected statement, found '>>' (typecheck)
return &addDockerMetadata{

Check failure on line 123 in libbeat/processors/add_docker_metadata/add_docker_metadata.go

View workflow job for this annotation

GitHub Actions / lint (darwin)

missing ',' in argument list (typecheck)
log: log,
watcher: watcher,
Expand Down Expand Up @@ -277,11 +287,17 @@ func (d *addDockerMetadata) getProcessCgroups(pid int) (cgroup.PathList, error)
return cgroups, nil
}

<<<<<<< HEAD
cgroups, err := processCgroupPaths(d.hostFS, pid)
=======
cgroups, err := d.cgreader.ProcessCgroupPaths(pid)
>>>>>>> 764ba96d34 (Create nil cgroups reader for processor, improve error handling (#41198))
if err != nil {
return cgroups, fmt.Errorf("failed to read cgroups for pid=%v: %w", pid, err)
}

if len(cgroups.Flatten()) == 0 {
return cgroup.PathList{}, fs.ErrNotExist
}
d.cgroups.Put(pid, cgroups)
return cgroups, nil
}
Expand Down
10 changes: 10 additions & 0 deletions libbeat/processors/add_process_metadata/add_process_metadata.go
Original file line number Diff line number Diff line change
Expand Up @@ -160,6 +160,16 @@ func newProcessMetadataProcessorWithProvider(config config, provider processMeta
}
}

<<<<<<< HEAD
=======
reader, err := initCgroupPaths(resolve.NewTestResolver(config.HostPath), false)
if errors.Is(err, cgroup.ErrCgroupsMissing) {
reader = &processors.NilCGReader{}
} else if err != nil {
return nil, fmt.Errorf("error creating cgroup reader: %w", err)
}

>>>>>>> 764ba96d34 (Create nil cgroups reader for processor, improve error handling (#41198))
// don't use cgroup.ProcessCgroupPaths to save it from doing the work when container id disabled
if ok := containsValue(mappings, "container.id"); ok {
if withCache && config.CgroupCacheExpireTime != 0 {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -38,6 +38,55 @@ import (
"github.com/elastic/elastic-agent-system-metrics/metric/system/resolve"
)

<<<<<<< HEAD
=======
type testCGRsolver struct {
res func(pid int) (cgroup.PathList, error)
}

func (t testCGRsolver) ProcessCgroupPaths(pid int) (cgroup.PathList, error) {
return t.res(pid)
}

func newCGHandlerBuilder(handler testCGRsolver) processors.InitCgroupHandler {
return func(_ resolve.Resolver, _ bool) (processors.CGReader, error) {
return handler, nil
}
}

func TestNilProcessor(t *testing.T) {
initCgroupPaths = func(rootfsMountpoint resolve.Resolver, ignoreRootCgroups bool) (processors.CGReader, error) {
return &processors.NilCGReader{}, nil
}

proc, err := newProcessMetadataProcessorWithProvider(defaultConfig(), &procCache, false)
require.NoError(t, err)

// make sure a nil cgroup reader doesn't blow anything up
unwrapped, _ := proc.(*addProcessMetadata)
metadata, err := unwrapped.provider.GetProcessMetadata(os.Getpid())
require.NoError(t, err)
require.NotNil(t, metadata)

}

func TestDefaultProcessorStartup(t *testing.T) {
// set initCgroupPaths to system non-test defaults
initCgroupPaths = func(rootfsMountpoint resolve.Resolver, ignoreRootCgroups bool) (processors.CGReader, error) {
return cgroup.NewReader(rootfsMountpoint, ignoreRootCgroups)
}

proc, err := newProcessMetadataProcessorWithProvider(defaultConfig(), &procCache, false)
require.NoError(t, err)

// ensure the underlying provider has been initialized properly
unwrapped, _ := proc.(*addProcessMetadata)
metadata, err := unwrapped.provider.GetProcessMetadata(os.Getpid())
require.NoError(t, err)
require.NotNil(t, metadata.fields)
}

>>>>>>> 764ba96d34 (Create nil cgroups reader for processor, improve error handling (#41198))
func TestAddProcessMetadata(t *testing.T) {
logp.TestingSetup(logp.WithSelectors(processorName))

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -58,7 +58,7 @@ func (p gosigarCidProvider) GetCid(pid int) (result string, err error) {

cgroups, err := p.getProcessCgroups(pid)
if err != nil {
p.log.Debugf("failed to get cgroups for pid=%v: %v", pid, err)
return "", fmt.Errorf("failed to get cgroups for pid=%v: %w", pid, err)
}

cid = p.getContainerID(cgroups)
Expand All @@ -84,7 +84,12 @@ func newCidProvider(hostPath resolve.Resolver, cgroupPrefixes []string, cgroupRe
// getProcessCgroups returns a mapping of cgroup subsystem name to path. It
// returns an error if it failed to retrieve the cgroup info.
func (p gosigarCidProvider) getProcessCgroups(pid int) (cgroup.PathList, error) {
<<<<<<< HEAD
pathList, err := p.processCgroupPaths(p.hostPath, pid)
=======
//return nil if we aren't supporting cgroups
pathList, err := p.processCgroupPaths.ProcessCgroupPaths(pid)
>>>>>>> 764ba96d34 (Create nil cgroups reader for processor, improve error handling (#41198))
if err != nil {
var pathError *fs.PathError
if errors.As(err, &pathError) {
Expand Down

0 comments on commit 0b886fc

Please sign in to comment.