mirror of
https://github.com/netdata/netdata.git
synced 2025-04-16 18:37:50 +00:00

This PR was created to fix #3414, here I am completing the job initiated by Christopher, among the newest features that we are bring we have JSON inside the core - We are bringing to the core the capacity to work with JSON files, this is available either using the JSON-C library case it is present in the system or using JSMN library that was incorporated to our core. The preference is to have JSON-C, because it is a more complete library, but case the user does not have the library installed we are keeping the JSMN for we do not lose the feature. Health LIST - We are bringing more one command to the Health API, now with the LIST it is possible to get in JSON format the alarms active with Netdata. Health reorganized - Previously we had duplicated code in different files, this PR is fixing this (Thanks @cakrit !), the Health is now better organized. Removing memory leak - The first implementation of the json.c was creating SILENCERS without to link it in anywhere. Now it has been linked properly. Script updated - We are bringing some changes to the script that tests the Health. This PR also fixes the race condition created by the previous new position of the SILENCERS creation, I had to move it to daemon/main.c, because after various tests, it was confirmed that the error could happen in different parts of the code, case it was not initialized before the threads starts. Component Name health directory health-cmd Additional Information Fixes #6356 and #3414
1246 lines
50 KiB
C
1246 lines
50 KiB
C
// SPDX-License-Identifier: GPL-3.0-or-later
|
|
|
|
#include "common.h"
|
|
|
|
int netdata_anonymous_statistics_enabled;
|
|
|
|
struct config netdata_config = {
|
|
.sections = NULL,
|
|
.mutex = NETDATA_MUTEX_INITIALIZER,
|
|
.index = {
|
|
.avl_tree = {
|
|
.root = NULL,
|
|
.compar = appconfig_section_compare
|
|
},
|
|
.rwlock = AVL_LOCK_INITIALIZER
|
|
}
|
|
};
|
|
|
|
void netdata_cleanup_and_exit(int ret) {
|
|
// enabling this, is wrong
|
|
// because the threads will be cancelled while cleaning up
|
|
// netdata_exit = 1;
|
|
|
|
error_log_limit_unlimited();
|
|
info("EXIT: netdata prepares to exit with code %d...", ret);
|
|
|
|
send_statistics("EXIT", ret?"ERROR":"OK","-");
|
|
|
|
// cleanup/save the database and exit
|
|
info("EXIT: cleaning up the database...");
|
|
rrdhost_cleanup_all();
|
|
|
|
if(!ret) {
|
|
// exit cleanly
|
|
|
|
// stop everything
|
|
info("EXIT: stopping master threads...");
|
|
cancel_main_threads();
|
|
|
|
// free the database
|
|
info("EXIT: freeing database memory...");
|
|
rrdhost_free_all();
|
|
}
|
|
|
|
// unlink the pid
|
|
if(pidfile[0]) {
|
|
info("EXIT: removing netdata PID file '%s'...", pidfile);
|
|
if(unlink(pidfile) != 0)
|
|
error("EXIT: cannot unlink pidfile '%s'.", pidfile);
|
|
}
|
|
|
|
#ifdef ENABLE_HTTPS
|
|
security_clean_openssl();
|
|
#endif
|
|
|
|
info("EXIT: all done - netdata is now exiting - bye bye...");
|
|
exit(ret);
|
|
}
|
|
|
|
struct netdata_static_thread static_threads[] = {
|
|
|
|
NETDATA_PLUGIN_HOOK_CHECKS
|
|
NETDATA_PLUGIN_HOOK_FREEBSD
|
|
NETDATA_PLUGIN_HOOK_MACOS
|
|
|
|
// linux internal plugins
|
|
NETDATA_PLUGIN_HOOK_LINUX_PROC
|
|
NETDATA_PLUGIN_HOOK_LINUX_DISKSPACE
|
|
NETDATA_PLUGIN_HOOK_LINUX_CGROUPS
|
|
NETDATA_PLUGIN_HOOK_LINUX_TC
|
|
|
|
NETDATA_PLUGIN_HOOK_IDLEJITTER
|
|
NETDATA_PLUGIN_HOOK_STATSD
|
|
|
|
// common plugins for all systems
|
|
{"BACKENDS", NULL, NULL, 1, NULL, NULL, backends_main},
|
|
{"WEB_SERVER[static1]", NULL, NULL, 0, NULL, NULL, socket_listen_main_static_threaded},
|
|
{"STREAM", NULL, NULL, 0, NULL, NULL, rrdpush_sender_thread},
|
|
|
|
NETDATA_PLUGIN_HOOK_PLUGINSD
|
|
NETDATA_PLUGIN_HOOK_HEALTH
|
|
|
|
{NULL, NULL, NULL, 0, NULL, NULL, NULL}
|
|
};
|
|
|
|
void web_server_threading_selection(void) {
|
|
web_server_mode = web_server_mode_id(config_get(CONFIG_SECTION_WEB, "mode", web_server_mode_name(web_server_mode)));
|
|
|
|
int static_threaded = (web_server_mode == WEB_SERVER_MODE_STATIC_THREADED);
|
|
|
|
int i;
|
|
for (i = 0; static_threads[i].name; i++) {
|
|
if (static_threads[i].start_routine == socket_listen_main_static_threaded)
|
|
static_threads[i].enabled = static_threaded;
|
|
}
|
|
}
|
|
|
|
void web_server_config_options(void) {
|
|
web_client_timeout = (int) config_get_number(CONFIG_SECTION_WEB, "disconnect idle clients after seconds", web_client_timeout);
|
|
web_client_first_request_timeout = (int) config_get_number(CONFIG_SECTION_WEB, "timeout for first request", web_client_first_request_timeout);
|
|
web_client_streaming_rate_t = config_get_number(CONFIG_SECTION_WEB, "accept a streaming request every seconds", web_client_streaming_rate_t);
|
|
|
|
respect_web_browser_do_not_track_policy = config_get_boolean(CONFIG_SECTION_WEB, "respect do not track policy", respect_web_browser_do_not_track_policy);
|
|
web_x_frame_options = config_get(CONFIG_SECTION_WEB, "x-frame-options response header", "");
|
|
if(!*web_x_frame_options) web_x_frame_options = NULL;
|
|
|
|
web_allow_connections_from = simple_pattern_create(config_get(CONFIG_SECTION_WEB, "allow connections from", "localhost *"), NULL, SIMPLE_PATTERN_EXACT);
|
|
web_allow_dashboard_from = simple_pattern_create(config_get(CONFIG_SECTION_WEB, "allow dashboard from", "localhost *"), NULL, SIMPLE_PATTERN_EXACT);
|
|
web_allow_badges_from = simple_pattern_create(config_get(CONFIG_SECTION_WEB, "allow badges from", "*"), NULL, SIMPLE_PATTERN_EXACT);
|
|
web_allow_registry_from = simple_pattern_create(config_get(CONFIG_SECTION_REGISTRY, "allow from", "*"), NULL, SIMPLE_PATTERN_EXACT);
|
|
web_allow_streaming_from = simple_pattern_create(config_get(CONFIG_SECTION_WEB, "allow streaming from", "*"), NULL, SIMPLE_PATTERN_EXACT);
|
|
web_allow_netdataconf_from = simple_pattern_create(config_get(CONFIG_SECTION_WEB, "allow netdata.conf from", "localhost fd* 10.* 192.168.* 172.16.* 172.17.* 172.18.* 172.19.* 172.20.* 172.21.* 172.22.* 172.23.* 172.24.* 172.25.* 172.26.* 172.27.* 172.28.* 172.29.* 172.30.* 172.31.*"), NULL, SIMPLE_PATTERN_EXACT);
|
|
web_allow_mgmt_from = simple_pattern_create(config_get(CONFIG_SECTION_WEB, "allow management from", "localhost"), NULL, SIMPLE_PATTERN_EXACT);
|
|
|
|
|
|
#ifdef NETDATA_WITH_ZLIB
|
|
web_enable_gzip = config_get_boolean(CONFIG_SECTION_WEB, "enable gzip compression", web_enable_gzip);
|
|
|
|
char *s = config_get(CONFIG_SECTION_WEB, "gzip compression strategy", "default");
|
|
if(!strcmp(s, "default"))
|
|
web_gzip_strategy = Z_DEFAULT_STRATEGY;
|
|
else if(!strcmp(s, "filtered"))
|
|
web_gzip_strategy = Z_FILTERED;
|
|
else if(!strcmp(s, "huffman only"))
|
|
web_gzip_strategy = Z_HUFFMAN_ONLY;
|
|
else if(!strcmp(s, "rle"))
|
|
web_gzip_strategy = Z_RLE;
|
|
else if(!strcmp(s, "fixed"))
|
|
web_gzip_strategy = Z_FIXED;
|
|
else {
|
|
error("Invalid compression strategy '%s'. Valid strategies are 'default', 'filtered', 'huffman only', 'rle' and 'fixed'. Proceeding with 'default'.", s);
|
|
web_gzip_strategy = Z_DEFAULT_STRATEGY;
|
|
}
|
|
|
|
web_gzip_level = (int)config_get_number(CONFIG_SECTION_WEB, "gzip compression level", 3);
|
|
if(web_gzip_level < 1) {
|
|
error("Invalid compression level %d. Valid levels are 1 (fastest) to 9 (best ratio). Proceeding with level 1 (fastest compression).", web_gzip_level);
|
|
web_gzip_level = 1;
|
|
}
|
|
else if(web_gzip_level > 9) {
|
|
error("Invalid compression level %d. Valid levels are 1 (fastest) to 9 (best ratio). Proceeding with level 9 (best compression).", web_gzip_level);
|
|
web_gzip_level = 9;
|
|
}
|
|
#endif /* NETDATA_WITH_ZLIB */
|
|
}
|
|
|
|
|
|
int killpid(pid_t pid, int signal)
|
|
{
|
|
int ret = -1;
|
|
debug(D_EXIT, "Request to kill pid %d", pid);
|
|
|
|
errno = 0;
|
|
if(kill(pid, 0) == -1) {
|
|
switch(errno) {
|
|
case ESRCH:
|
|
error("Request to kill pid %d, but it is not running.", pid);
|
|
break;
|
|
|
|
case EPERM:
|
|
error("Request to kill pid %d, but I do not have enough permissions.", pid);
|
|
break;
|
|
|
|
default:
|
|
error("Request to kill pid %d, but I received an error.", pid);
|
|
break;
|
|
}
|
|
}
|
|
else {
|
|
errno = 0;
|
|
ret = kill(pid, signal);
|
|
if(ret == -1) {
|
|
switch(errno) {
|
|
case ESRCH:
|
|
error("Cannot kill pid %d, but it is not running.", pid);
|
|
break;
|
|
|
|
case EPERM:
|
|
error("Cannot kill pid %d, but I do not have enough permissions.", pid);
|
|
break;
|
|
|
|
default:
|
|
error("Cannot kill pid %d, but I received an error.", pid);
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
void cancel_main_threads() {
|
|
error_log_limit_unlimited();
|
|
|
|
int i, found = 0;
|
|
usec_t max = 5 * USEC_PER_SEC, step = 100000;
|
|
for (i = 0; static_threads[i].name != NULL ; i++) {
|
|
if(static_threads[i].enabled == NETDATA_MAIN_THREAD_RUNNING) {
|
|
info("EXIT: Stopping master thread: %s", static_threads[i].name);
|
|
netdata_thread_cancel(*static_threads[i].thread);
|
|
found++;
|
|
}
|
|
}
|
|
|
|
netdata_exit = 1;
|
|
|
|
while(found && max > 0) {
|
|
max -= step;
|
|
info("Waiting %d threads to finish...", found);
|
|
sleep_usec(step);
|
|
found = 0;
|
|
for (i = 0; static_threads[i].name != NULL ; i++) {
|
|
if (static_threads[i].enabled != NETDATA_MAIN_THREAD_EXITED)
|
|
found++;
|
|
}
|
|
}
|
|
|
|
if(found) {
|
|
for (i = 0; static_threads[i].name != NULL ; i++) {
|
|
if (static_threads[i].enabled != NETDATA_MAIN_THREAD_EXITED)
|
|
error("Master thread %s takes too long to exit. Giving up...", static_threads[i].name);
|
|
}
|
|
}
|
|
else
|
|
info("All threads finished.");
|
|
}
|
|
|
|
struct option_def option_definitions[] = {
|
|
// opt description arg name default value
|
|
{ 'c', "Configuration file to load.", "filename", CONFIG_DIR "/" CONFIG_FILENAME},
|
|
{ 'D', "Do not fork. Run in the foreground.", NULL, "run in the background"},
|
|
{ 'd', "Fork. Run in the background.", NULL, "run in the background"},
|
|
{ 'h', "Display this help message.", NULL, NULL},
|
|
{ 'P', "File to save a pid while running.", "filename", "do not save pid to a file"},
|
|
{ 'i', "The IP address to listen to.", "IP", "all IP addresses IPv4 and IPv6"},
|
|
{ 'p', "API/Web port to use.", "port", "19999"},
|
|
{ 's', "Prefix for /proc and /sys (for containers).", "path", "no prefix"},
|
|
{ 't', "The internal clock of netdata.", "seconds", "1"},
|
|
{ 'u', "Run as user.", "username", "netdata"},
|
|
{ 'v', "Print netdata version and exit.", NULL, NULL},
|
|
{ 'V', "Print netdata version and exit.", NULL, NULL},
|
|
{ 'W', "See Advanced options below.", "options", NULL},
|
|
};
|
|
|
|
int help(int exitcode) {
|
|
FILE *stream;
|
|
if(exitcode == 0)
|
|
stream = stdout;
|
|
else
|
|
stream = stderr;
|
|
|
|
int num_opts = sizeof(option_definitions) / sizeof(struct option_def);
|
|
int i;
|
|
int max_len_arg = 0;
|
|
|
|
// Compute maximum argument length
|
|
for( i = 0; i < num_opts; i++ ) {
|
|
if(option_definitions[i].arg_name) {
|
|
int len_arg = (int)strlen(option_definitions[i].arg_name);
|
|
if(len_arg > max_len_arg) max_len_arg = len_arg;
|
|
}
|
|
}
|
|
|
|
if(max_len_arg > 30) max_len_arg = 30;
|
|
if(max_len_arg < 20) max_len_arg = 20;
|
|
|
|
fprintf(stream, "%s", "\n"
|
|
" ^\n"
|
|
" |.-. .-. .-. .-. . netdata \n"
|
|
" | '-' '-' '-' '-' real-time performance monitoring, done right! \n"
|
|
" +----+-----+-----+-----+-----+-----+-----+-----+-----+-----+-----+-----+--->\n"
|
|
"\n"
|
|
" Copyright (C) 2016-2017, Costa Tsaousis <costa@tsaousis.gr>\n"
|
|
" Released under GNU General Public License v3 or later.\n"
|
|
" All rights reserved.\n"
|
|
"\n"
|
|
" Home Page : https://my-netdata.io\n"
|
|
" Source Code: https://github.com/netdata/netdata\n"
|
|
" Wiki / Docs: https://github.com/netdata/netdata/wiki\n"
|
|
" Support : https://github.com/netdata/netdata/issues\n"
|
|
" License : https://github.com/netdata/netdata/blob/master/LICENSE.md\n"
|
|
"\n"
|
|
" Twitter : https://twitter.com/linuxnetdata\n"
|
|
" Facebook : https://www.facebook.com/linuxnetdata/\n"
|
|
"\n"
|
|
"\n"
|
|
);
|
|
|
|
fprintf(stream, " SYNOPSIS: netdata [options]\n");
|
|
fprintf(stream, "\n");
|
|
fprintf(stream, " Options:\n\n");
|
|
|
|
// Output options description.
|
|
for( i = 0; i < num_opts; i++ ) {
|
|
fprintf(stream, " -%c %-*s %s", option_definitions[i].val, max_len_arg, option_definitions[i].arg_name ? option_definitions[i].arg_name : "", option_definitions[i].description);
|
|
if(option_definitions[i].default_value) {
|
|
fprintf(stream, "\n %c %-*s Default: %s\n", ' ', max_len_arg, "", option_definitions[i].default_value);
|
|
} else {
|
|
fprintf(stream, "\n");
|
|
}
|
|
fprintf(stream, "\n");
|
|
}
|
|
|
|
fprintf(stream, "\n Advanced options:\n\n"
|
|
" -W stacksize=N Set the stacksize (in bytes).\n\n"
|
|
" -W debug_flags=N Set runtime tracing to debug.log.\n\n"
|
|
" -W unittest Run internal unittests and exit.\n\n"
|
|
" -W createdataset=N Create a DB engine dataset of N seconds and exit.\n\n"
|
|
" -W set section option value\n"
|
|
" set netdata.conf option from the command line.\n\n"
|
|
" -W simple-pattern pattern string\n"
|
|
" Check if string matches pattern and exit.\n\n"
|
|
);
|
|
|
|
fprintf(stream, "\n Signals netdata handles:\n\n"
|
|
" - HUP Close and reopen log files.\n"
|
|
" - USR1 Save internal DB to disk.\n"
|
|
" - USR2 Reload health configuration.\n"
|
|
"\n"
|
|
);
|
|
|
|
fflush(stream);
|
|
return exitcode;
|
|
}
|
|
|
|
// TODO: Remove this function with the nix major release.
|
|
void remove_option(int opt_index, int *argc, char **argv) {
|
|
int i;
|
|
|
|
// remove the options.
|
|
do {
|
|
*argc = *argc - 1;
|
|
for(i = opt_index; i < *argc; i++) {
|
|
argv[i] = argv[i+1];
|
|
}
|
|
i = opt_index;
|
|
} while(argv[i][0] != '-' && opt_index >= *argc);
|
|
}
|
|
|
|
static const char *verify_required_directory(const char *dir) {
|
|
if(chdir(dir) == -1)
|
|
fatal("Cannot cd to directory '%s'", dir);
|
|
|
|
DIR *d = opendir(dir);
|
|
if(!d)
|
|
fatal("Cannot examine the contents of directory '%s'", dir);
|
|
closedir(d);
|
|
|
|
return dir;
|
|
}
|
|
|
|
#ifdef ENABLE_HTTPS
|
|
static void security_init(){
|
|
char filename[FILENAME_MAX + 1];
|
|
snprintfz(filename, FILENAME_MAX, "%s/ssl/key.pem",netdata_configured_user_config_dir);
|
|
security_key = config_get(CONFIG_SECTION_WEB, "ssl key", filename);
|
|
|
|
snprintfz(filename, FILENAME_MAX, "%s/ssl/cert.pem",netdata_configured_user_config_dir);
|
|
security_cert = config_get(CONFIG_SECTION_WEB, "ssl certificate", filename);
|
|
|
|
security_openssl_library();
|
|
}
|
|
#endif
|
|
|
|
static void log_init(void) {
|
|
char filename[FILENAME_MAX + 1];
|
|
snprintfz(filename, FILENAME_MAX, "%s/debug.log", netdata_configured_log_dir);
|
|
stdout_filename = config_get(CONFIG_SECTION_GLOBAL, "debug log", filename);
|
|
|
|
snprintfz(filename, FILENAME_MAX, "%s/error.log", netdata_configured_log_dir);
|
|
stderr_filename = config_get(CONFIG_SECTION_GLOBAL, "error log", filename);
|
|
|
|
snprintfz(filename, FILENAME_MAX, "%s/access.log", netdata_configured_log_dir);
|
|
stdaccess_filename = config_get(CONFIG_SECTION_GLOBAL, "access log", filename);
|
|
|
|
char deffacility[8];
|
|
snprintfz(deffacility,7,"%s","daemon");
|
|
facility_log = config_get(CONFIG_SECTION_GLOBAL, "facility log", deffacility);
|
|
|
|
error_log_throttle_period = config_get_number(CONFIG_SECTION_GLOBAL, "errors flood protection period", error_log_throttle_period);
|
|
error_log_errors_per_period = (unsigned long)config_get_number(CONFIG_SECTION_GLOBAL, "errors to trigger flood protection", (long long int)error_log_errors_per_period);
|
|
error_log_errors_per_period_backup = error_log_errors_per_period;
|
|
|
|
setenv("NETDATA_ERRORS_THROTTLE_PERIOD", config_get(CONFIG_SECTION_GLOBAL, "errors flood protection period" , ""), 1);
|
|
setenv("NETDATA_ERRORS_PER_PERIOD", config_get(CONFIG_SECTION_GLOBAL, "errors to trigger flood protection", ""), 1);
|
|
}
|
|
|
|
static void backwards_compatible_config() {
|
|
// move [global] options to the [web] section
|
|
config_move(CONFIG_SECTION_GLOBAL, "http port listen backlog",
|
|
CONFIG_SECTION_WEB, "listen backlog");
|
|
|
|
config_move(CONFIG_SECTION_GLOBAL, "bind socket to IP",
|
|
CONFIG_SECTION_WEB, "bind to");
|
|
|
|
config_move(CONFIG_SECTION_GLOBAL, "bind to",
|
|
CONFIG_SECTION_WEB, "bind to");
|
|
|
|
config_move(CONFIG_SECTION_GLOBAL, "port",
|
|
CONFIG_SECTION_WEB, "default port");
|
|
|
|
config_move(CONFIG_SECTION_GLOBAL, "default port",
|
|
CONFIG_SECTION_WEB, "default port");
|
|
|
|
config_move(CONFIG_SECTION_GLOBAL, "disconnect idle web clients after seconds",
|
|
CONFIG_SECTION_WEB, "disconnect idle clients after seconds");
|
|
|
|
config_move(CONFIG_SECTION_GLOBAL, "respect web browser do not track policy",
|
|
CONFIG_SECTION_WEB, "respect do not track policy");
|
|
|
|
config_move(CONFIG_SECTION_GLOBAL, "web x-frame-options header",
|
|
CONFIG_SECTION_WEB, "x-frame-options response header");
|
|
|
|
config_move(CONFIG_SECTION_GLOBAL, "enable web responses gzip compression",
|
|
CONFIG_SECTION_WEB, "enable gzip compression");
|
|
|
|
config_move(CONFIG_SECTION_GLOBAL, "web compression strategy",
|
|
CONFIG_SECTION_WEB, "gzip compression strategy");
|
|
|
|
config_move(CONFIG_SECTION_GLOBAL, "web compression level",
|
|
CONFIG_SECTION_WEB, "gzip compression level");
|
|
|
|
config_move(CONFIG_SECTION_GLOBAL, "web files owner",
|
|
CONFIG_SECTION_WEB, "web files owner");
|
|
|
|
config_move(CONFIG_SECTION_GLOBAL, "web files group",
|
|
CONFIG_SECTION_WEB, "web files group");
|
|
|
|
config_move(CONFIG_SECTION_BACKEND, "opentsdb host tags",
|
|
CONFIG_SECTION_BACKEND, "host tags");
|
|
}
|
|
|
|
static void get_netdata_configured_variables() {
|
|
backwards_compatible_config();
|
|
|
|
// ------------------------------------------------------------------------
|
|
// get the hostname
|
|
|
|
char buf[HOSTNAME_MAX + 1];
|
|
if(gethostname(buf, HOSTNAME_MAX) == -1){
|
|
error("Cannot get machine hostname.");
|
|
}
|
|
|
|
netdata_configured_hostname = config_get(CONFIG_SECTION_GLOBAL, "hostname", buf);
|
|
debug(D_OPTIONS, "hostname set to '%s'", netdata_configured_hostname);
|
|
|
|
// ------------------------------------------------------------------------
|
|
// get default database size
|
|
|
|
default_rrd_history_entries = (int) config_get_number(CONFIG_SECTION_GLOBAL, "history", align_entries_to_pagesize(default_rrd_memory_mode, RRD_DEFAULT_HISTORY_ENTRIES));
|
|
|
|
long h = align_entries_to_pagesize(default_rrd_memory_mode, default_rrd_history_entries);
|
|
if(h != default_rrd_history_entries) {
|
|
config_set_number(CONFIG_SECTION_GLOBAL, "history", h);
|
|
default_rrd_history_entries = (int)h;
|
|
}
|
|
|
|
if(default_rrd_history_entries < 5 || default_rrd_history_entries > RRD_HISTORY_ENTRIES_MAX) {
|
|
error("Invalid history entries %d given. Defaulting to %d.", default_rrd_history_entries, RRD_DEFAULT_HISTORY_ENTRIES);
|
|
default_rrd_history_entries = RRD_DEFAULT_HISTORY_ENTRIES;
|
|
}
|
|
|
|
// ------------------------------------------------------------------------
|
|
// get default database update frequency
|
|
|
|
default_rrd_update_every = (int) config_get_number(CONFIG_SECTION_GLOBAL, "update every", UPDATE_EVERY);
|
|
if(default_rrd_update_every < 1 || default_rrd_update_every > 600) {
|
|
error("Invalid data collection frequency (update every) %d given. Defaulting to %d.", default_rrd_update_every, UPDATE_EVERY_MAX);
|
|
default_rrd_update_every = UPDATE_EVERY;
|
|
}
|
|
|
|
// ------------------------------------------------------------------------
|
|
// get system paths
|
|
|
|
netdata_configured_user_config_dir = config_get(CONFIG_SECTION_GLOBAL, "config directory", netdata_configured_user_config_dir);
|
|
netdata_configured_stock_config_dir = config_get(CONFIG_SECTION_GLOBAL, "stock config directory", netdata_configured_stock_config_dir);
|
|
netdata_configured_log_dir = config_get(CONFIG_SECTION_GLOBAL, "log directory", netdata_configured_log_dir);
|
|
netdata_configured_web_dir = config_get(CONFIG_SECTION_GLOBAL, "web files directory", netdata_configured_web_dir);
|
|
netdata_configured_cache_dir = config_get(CONFIG_SECTION_GLOBAL, "cache directory", netdata_configured_cache_dir);
|
|
netdata_configured_varlib_dir = config_get(CONFIG_SECTION_GLOBAL, "lib directory", netdata_configured_varlib_dir);
|
|
netdata_configured_home_dir = config_get(CONFIG_SECTION_GLOBAL, "home directory", netdata_configured_home_dir);
|
|
|
|
{
|
|
pluginsd_initialize_plugin_directories();
|
|
netdata_configured_primary_plugins_dir = plugin_directories[PLUGINSD_STOCK_PLUGINS_DIRECTORY_PATH];
|
|
}
|
|
|
|
// ------------------------------------------------------------------------
|
|
// get default memory mode for the database
|
|
|
|
default_rrd_memory_mode = rrd_memory_mode_id(config_get(CONFIG_SECTION_GLOBAL, "memory mode", rrd_memory_mode_name(default_rrd_memory_mode)));
|
|
|
|
#ifdef ENABLE_DBENGINE
|
|
// ------------------------------------------------------------------------
|
|
// get default Database Engine page cache size in MiB
|
|
|
|
default_rrdeng_page_cache_mb = (int) config_get_number(CONFIG_SECTION_GLOBAL, "page cache size", default_rrdeng_page_cache_mb);
|
|
if(default_rrdeng_page_cache_mb < RRDENG_MIN_PAGE_CACHE_SIZE_MB) {
|
|
error("Invalid page cache size %d given. Defaulting to %d.", default_rrdeng_page_cache_mb, RRDENG_MIN_PAGE_CACHE_SIZE_MB);
|
|
default_rrdeng_page_cache_mb = RRDENG_MIN_PAGE_CACHE_SIZE_MB;
|
|
}
|
|
|
|
// ------------------------------------------------------------------------
|
|
// get default Database Engine disk space quota in MiB
|
|
|
|
default_rrdeng_disk_quota_mb = (int) config_get_number(CONFIG_SECTION_GLOBAL, "dbengine disk space", default_rrdeng_disk_quota_mb);
|
|
if(default_rrdeng_disk_quota_mb < RRDENG_MIN_DISK_SPACE_MB) {
|
|
error("Invalid dbengine disk space %d given. Defaulting to %d.", default_rrdeng_disk_quota_mb, RRDENG_MIN_DISK_SPACE_MB);
|
|
default_rrdeng_disk_quota_mb = RRDENG_MIN_DISK_SPACE_MB;
|
|
}
|
|
#endif
|
|
// ------------------------------------------------------------------------
|
|
|
|
netdata_configured_host_prefix = config_get(CONFIG_SECTION_GLOBAL, "host access prefix", "");
|
|
verify_netdata_host_prefix();
|
|
|
|
// --------------------------------------------------------------------
|
|
// get KSM settings
|
|
|
|
#ifdef MADV_MERGEABLE
|
|
enable_ksm = config_get_boolean(CONFIG_SECTION_GLOBAL, "memory deduplication (ksm)", enable_ksm);
|
|
#endif
|
|
|
|
// --------------------------------------------------------------------
|
|
// get various system parameters
|
|
|
|
get_system_HZ();
|
|
get_system_cpus();
|
|
get_system_pid_max();
|
|
}
|
|
|
|
static void get_system_timezone(void) {
|
|
// avoid flood calls to stat(/etc/localtime)
|
|
// http://stackoverflow.com/questions/4554271/how-to-avoid-excessive-stat-etc-localtime-calls-in-strftime-on-linux
|
|
const char *tz = getenv("TZ");
|
|
if(!tz || !*tz)
|
|
setenv("TZ", config_get(CONFIG_SECTION_GLOBAL, "TZ environment variable", ":/etc/localtime"), 0);
|
|
|
|
char buffer[FILENAME_MAX + 1] = "";
|
|
const char *timezone = NULL;
|
|
ssize_t ret;
|
|
|
|
// use the TZ variable
|
|
if(tz && *tz && *tz != ':') {
|
|
timezone = tz;
|
|
// info("TIMEZONE: using TZ variable '%s'", timezone);
|
|
}
|
|
|
|
// use the contents of /etc/timezone
|
|
if(!timezone && !read_file("/etc/timezone", buffer, FILENAME_MAX)) {
|
|
timezone = buffer;
|
|
// info("TIMEZONE: using the contents of /etc/timezone: '%s'", timezone);
|
|
}
|
|
|
|
// read the link /etc/localtime
|
|
if(!timezone) {
|
|
ret = readlink("/etc/localtime", buffer, FILENAME_MAX);
|
|
|
|
if(ret > 0) {
|
|
buffer[ret] = '\0';
|
|
|
|
char *cmp = "/usr/share/zoneinfo/";
|
|
size_t cmp_len = strlen(cmp);
|
|
|
|
char *s = strstr(buffer, cmp);
|
|
if (s && s[cmp_len]) {
|
|
timezone = &s[cmp_len];
|
|
// info("TIMEZONE: using the link of /etc/localtime: '%s'", timezone);
|
|
}
|
|
}
|
|
else
|
|
buffer[0] = '\0';
|
|
}
|
|
|
|
// find the timezone from strftime()
|
|
if(!timezone) {
|
|
time_t t;
|
|
struct tm *tmp, tmbuf;
|
|
|
|
t = now_realtime_sec();
|
|
tmp = localtime_r(&t, &tmbuf);
|
|
|
|
if (tmp != NULL) {
|
|
if(strftime(buffer, FILENAME_MAX, "%Z", tmp) == 0)
|
|
buffer[0] = '\0';
|
|
else {
|
|
buffer[FILENAME_MAX] = '\0';
|
|
timezone = buffer;
|
|
// info("TIMEZONE: using strftime(): '%s'", timezone);
|
|
}
|
|
}
|
|
}
|
|
|
|
if(timezone && *timezone) {
|
|
// make sure it does not have illegal characters
|
|
// info("TIMEZONE: fixing '%s'", timezone);
|
|
|
|
size_t len = strlen(timezone);
|
|
char tmp[len + 1];
|
|
char *d = tmp;
|
|
*d = '\0';
|
|
|
|
while(*timezone) {
|
|
if(isalnum(*timezone) || *timezone == '_' || *timezone == '/')
|
|
*d++ = *timezone++;
|
|
else
|
|
timezone++;
|
|
}
|
|
*d = '\0';
|
|
strncpyz(buffer, tmp, len);
|
|
timezone = buffer;
|
|
// info("TIMEZONE: fixed as '%s'", timezone);
|
|
}
|
|
|
|
if(!timezone || !*timezone)
|
|
timezone = "unknown";
|
|
|
|
netdata_configured_timezone = config_get(CONFIG_SECTION_GLOBAL, "timezone", timezone);
|
|
}
|
|
|
|
void set_global_environment() {
|
|
{
|
|
char b[16];
|
|
snprintfz(b, 15, "%d", default_rrd_update_every);
|
|
setenv("NETDATA_UPDATE_EVERY", b, 1);
|
|
}
|
|
|
|
setenv("NETDATA_VERSION" , program_version, 1);
|
|
setenv("NETDATA_HOSTNAME" , netdata_configured_hostname, 1);
|
|
setenv("NETDATA_CONFIG_DIR" , verify_required_directory(netdata_configured_user_config_dir), 1);
|
|
setenv("NETDATA_USER_CONFIG_DIR" , verify_required_directory(netdata_configured_user_config_dir), 1);
|
|
setenv("NETDATA_STOCK_CONFIG_DIR" , verify_required_directory(netdata_configured_stock_config_dir), 1);
|
|
setenv("NETDATA_PLUGINS_DIR" , verify_required_directory(netdata_configured_primary_plugins_dir), 1);
|
|
setenv("NETDATA_WEB_DIR" , verify_required_directory(netdata_configured_web_dir), 1);
|
|
setenv("NETDATA_CACHE_DIR" , verify_required_directory(netdata_configured_cache_dir), 1);
|
|
setenv("NETDATA_LIB_DIR" , verify_required_directory(netdata_configured_varlib_dir), 1);
|
|
setenv("NETDATA_LOG_DIR" , verify_required_directory(netdata_configured_log_dir), 1);
|
|
setenv("HOME" , verify_required_directory(netdata_configured_home_dir), 1);
|
|
setenv("NETDATA_HOST_PREFIX" , netdata_configured_host_prefix, 1);
|
|
|
|
get_system_timezone();
|
|
|
|
// set the path we need
|
|
char path[1024 + 1], *p = getenv("PATH");
|
|
if(!p) p = "/bin:/usr/bin";
|
|
snprintfz(path, 1024, "%s:%s", p, "/sbin:/usr/sbin:/usr/local/bin:/usr/local/sbin");
|
|
setenv("PATH", config_get(CONFIG_SECTION_PLUGINS, "PATH environment variable", path), 1);
|
|
|
|
// python options
|
|
p = getenv("PYTHONPATH");
|
|
if(!p) p = "";
|
|
setenv("PYTHONPATH", config_get(CONFIG_SECTION_PLUGINS, "PYTHONPATH environment variable", p), 1);
|
|
|
|
// disable buffering for python plugins
|
|
setenv("PYTHONUNBUFFERED", "1", 1);
|
|
|
|
// switch to standard locale for plugins
|
|
setenv("LC_ALL", "C", 1);
|
|
}
|
|
|
|
static int load_netdata_conf(char *filename, char overwrite_used) {
|
|
errno = 0;
|
|
|
|
int ret = 0;
|
|
|
|
if(filename && *filename) {
|
|
ret = config_load(filename, overwrite_used);
|
|
if(!ret)
|
|
error("CONFIG: cannot load config file '%s'.", filename);
|
|
}
|
|
else {
|
|
filename = strdupz_path_subpath(netdata_configured_user_config_dir, "netdata.conf");
|
|
|
|
ret = config_load(filename, overwrite_used);
|
|
if(!ret) {
|
|
info("CONFIG: cannot load user config '%s'. Will try the stock version.", filename);
|
|
freez(filename);
|
|
|
|
filename = strdupz_path_subpath(netdata_configured_stock_config_dir, "netdata.conf");
|
|
ret = config_load(filename, overwrite_used);
|
|
if(!ret)
|
|
info("CONFIG: cannot load stock config '%s'. Running with internal defaults.", filename);
|
|
}
|
|
|
|
freez(filename);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
int get_system_info(struct rrdhost_system_info *system_info) {
|
|
char *script;
|
|
script = mallocz(sizeof(char) * (strlen(netdata_configured_primary_plugins_dir) + strlen("system-info.sh") + 2));
|
|
sprintf(script, "%s/%s", netdata_configured_primary_plugins_dir, "system-info.sh");
|
|
if (unlikely(access(script, R_OK) != 0)) {
|
|
info("System info script %s not found.",script);
|
|
freez(script);
|
|
return 1;
|
|
}
|
|
|
|
pid_t command_pid;
|
|
|
|
info("Executing %s", script);
|
|
|
|
FILE *fp = mypopen(script, &command_pid);
|
|
if(fp) {
|
|
char buffer[200 + 1];
|
|
while (fgets(buffer, 200, fp) != NULL) {
|
|
char *name=buffer;
|
|
char *value=buffer;
|
|
while (*value && *value != '=') value++;
|
|
if (*value=='=') {
|
|
*value='\0';
|
|
value++;
|
|
if (strlen(value)>1) {
|
|
char *newline = value + strlen(value) - 1;
|
|
(*newline) = '\0';
|
|
}
|
|
char n[51], v[101];
|
|
snprintfz(n, 50,"%s",name);
|
|
snprintfz(v, 101,"%s",value);
|
|
if(unlikely(rrdhost_set_system_info_variable(system_info, n, v))) {
|
|
info("Unexpected environment variable %s=%s", n, v);
|
|
}
|
|
else {
|
|
info("%s=%s", n, v);
|
|
setenv(n, v, 1);
|
|
}
|
|
}
|
|
}
|
|
mypclose(fp, command_pid);
|
|
}
|
|
freez(script);
|
|
return 0;
|
|
}
|
|
|
|
void send_statistics( const char *action, const char *action_result, const char *action_data) {
|
|
static char *as_script;
|
|
if (netdata_anonymous_statistics_enabled == -1) {
|
|
char *optout_file = mallocz(sizeof(char) * (strlen(netdata_configured_user_config_dir) +strlen(".opt-out-from-anonymous-statistics") + 2));
|
|
sprintf(optout_file, "%s/%s", netdata_configured_user_config_dir, ".opt-out-from-anonymous-statistics");
|
|
if (likely(access(optout_file, R_OK) != 0)) {
|
|
as_script = mallocz(sizeof(char) * (strlen(netdata_configured_primary_plugins_dir) + strlen("anonymous-statistics.sh") + 2));
|
|
sprintf(as_script, "%s/%s", netdata_configured_primary_plugins_dir, "anonymous-statistics.sh");
|
|
if (unlikely(access(as_script, R_OK) != 0)) {
|
|
netdata_anonymous_statistics_enabled=0;
|
|
info("Anonymous statistics script %s not found.",as_script);
|
|
freez(as_script);
|
|
} else {
|
|
netdata_anonymous_statistics_enabled=1;
|
|
}
|
|
} else {
|
|
netdata_anonymous_statistics_enabled = 0;
|
|
as_script = NULL;
|
|
}
|
|
freez(optout_file);
|
|
}
|
|
if(!netdata_anonymous_statistics_enabled) return;
|
|
if (!action) return;
|
|
if (!action_result) action_result="";
|
|
if (!action_data) action_data="";
|
|
char *command_to_run=mallocz(sizeof(char) * (strlen(action) + strlen(action_result) + strlen(action_data) + strlen(as_script) + 10));
|
|
pid_t command_pid;
|
|
|
|
sprintf(command_to_run,"%s '%s' '%s' '%s'", as_script, action, action_result, action_data);
|
|
info("%s", command_to_run);
|
|
|
|
FILE *fp = mypopen(command_to_run, &command_pid);
|
|
if(fp) {
|
|
char buffer[100 + 1];
|
|
while (fgets(buffer, 100, fp) != NULL);
|
|
mypclose(fp, command_pid);
|
|
}
|
|
freez(command_to_run);
|
|
}
|
|
|
|
void set_silencers_filename() {
|
|
char filename[FILENAME_MAX + 1];
|
|
snprintfz(filename, FILENAME_MAX, "%s/health.silencers.json", netdata_configured_varlib_dir);
|
|
silencers_filename = config_get(CONFIG_SECTION_HEALTH, "silencers file", filename);
|
|
}
|
|
|
|
int main(int argc, char **argv) {
|
|
int i;
|
|
int config_loaded = 0;
|
|
int dont_fork = 0;
|
|
size_t default_stacksize;
|
|
|
|
netdata_ready=0;
|
|
// set the name for logging
|
|
program_name = "netdata";
|
|
|
|
// parse depercated options
|
|
// TODO: Remove this block with the next major release.
|
|
{
|
|
i = 1;
|
|
while(i < argc) {
|
|
if(strcmp(argv[i], "-pidfile") == 0 && (i+1) < argc) {
|
|
strncpyz(pidfile, argv[i+1], FILENAME_MAX);
|
|
fprintf(stderr, "%s: deprecated option -- %s -- please use -P instead.\n", argv[0], argv[i]);
|
|
remove_option(i, &argc, argv);
|
|
}
|
|
else if(strcmp(argv[i], "-nodaemon") == 0 || strcmp(argv[i], "-nd") == 0) {
|
|
dont_fork = 1;
|
|
fprintf(stderr, "%s: deprecated option -- %s -- please use -D instead.\n ", argv[0], argv[i]);
|
|
remove_option(i, &argc, argv);
|
|
}
|
|
else if(strcmp(argv[i], "-ch") == 0 && (i+1) < argc) {
|
|
config_set(CONFIG_SECTION_GLOBAL, "host access prefix", argv[i+1]);
|
|
fprintf(stderr, "%s: deprecated option -- %s -- please use -s instead.\n", argv[0], argv[i]);
|
|
remove_option(i, &argc, argv);
|
|
}
|
|
else if(strcmp(argv[i], "-l") == 0 && (i+1) < argc) {
|
|
config_set(CONFIG_SECTION_GLOBAL, "history", argv[i+1]);
|
|
fprintf(stderr, "%s: deprecated option -- %s -- This option will be removed with V2.*.\n", argv[0], argv[i]);
|
|
remove_option(i, &argc, argv);
|
|
}
|
|
else i++;
|
|
}
|
|
}
|
|
|
|
// parse options
|
|
{
|
|
int num_opts = sizeof(option_definitions) / sizeof(struct option_def);
|
|
char optstring[(num_opts * 2) + 1];
|
|
|
|
int string_i = 0;
|
|
for( i = 0; i < num_opts; i++ ) {
|
|
optstring[string_i] = option_definitions[i].val;
|
|
string_i++;
|
|
if(option_definitions[i].arg_name) {
|
|
optstring[string_i] = ':';
|
|
string_i++;
|
|
}
|
|
}
|
|
// terminate optstring
|
|
optstring[string_i] ='\0';
|
|
optstring[(num_opts *2)] ='\0';
|
|
|
|
int opt;
|
|
while( (opt = getopt(argc, argv, optstring)) != -1 ) {
|
|
switch(opt) {
|
|
case 'c':
|
|
if(load_netdata_conf(optarg, 1) != 1) {
|
|
error("Cannot load configuration file %s.", optarg);
|
|
return 1;
|
|
}
|
|
else {
|
|
debug(D_OPTIONS, "Configuration loaded from %s.", optarg);
|
|
config_loaded = 1;
|
|
}
|
|
break;
|
|
case 'D':
|
|
dont_fork = 1;
|
|
break;
|
|
case 'd':
|
|
dont_fork = 0;
|
|
break;
|
|
case 'h':
|
|
return help(0);
|
|
case 'i':
|
|
config_set(CONFIG_SECTION_WEB, "bind to", optarg);
|
|
break;
|
|
case 'P':
|
|
strncpy(pidfile, optarg, FILENAME_MAX);
|
|
pidfile[FILENAME_MAX] = '\0';
|
|
break;
|
|
case 'p':
|
|
config_set(CONFIG_SECTION_GLOBAL, "default port", optarg);
|
|
break;
|
|
case 's':
|
|
config_set(CONFIG_SECTION_GLOBAL, "host access prefix", optarg);
|
|
break;
|
|
case 't':
|
|
config_set(CONFIG_SECTION_GLOBAL, "update every", optarg);
|
|
break;
|
|
case 'u':
|
|
config_set(CONFIG_SECTION_GLOBAL, "run as user", optarg);
|
|
break;
|
|
case 'v':
|
|
case 'V':
|
|
printf("%s %s\n", program_name, program_version);
|
|
return 0;
|
|
case 'W':
|
|
{
|
|
char* stacksize_string = "stacksize=";
|
|
char* debug_flags_string = "debug_flags=";
|
|
char* createdataset_string = "createdataset=";
|
|
|
|
if(strcmp(optarg, "unittest") == 0) {
|
|
if(unit_test_buffer()) return 1;
|
|
if(unit_test_str2ld()) return 1;
|
|
get_netdata_configured_variables();
|
|
default_rrd_update_every = 1;
|
|
default_rrd_memory_mode = RRD_MEMORY_MODE_RAM;
|
|
default_health_enabled = 0;
|
|
rrd_init("unittest", NULL);
|
|
default_rrdpush_enabled = 0;
|
|
if(run_all_mockup_tests()) return 1;
|
|
if(unit_test_storage()) return 1;
|
|
#ifdef ENABLE_DBENGINE
|
|
if(test_dbengine()) return 1;
|
|
#endif
|
|
fprintf(stderr, "\n\nALL TESTS PASSED\n\n");
|
|
return 0;
|
|
}
|
|
else if(strncmp(optarg, createdataset_string, strlen(createdataset_string)) == 0) {
|
|
optarg += strlen(createdataset_string);
|
|
#ifdef ENABLE_DBENGINE
|
|
unsigned history_seconds = (unsigned )strtoull(optarg, NULL, 0);
|
|
generate_dbengine_dataset(history_seconds);
|
|
#endif
|
|
return 0;
|
|
}
|
|
else if(strcmp(optarg, "simple-pattern") == 0) {
|
|
if(optind + 2 > argc) {
|
|
fprintf(stderr, "%s", "\nUSAGE: -W simple-pattern 'pattern' 'string'\n\n"
|
|
" Checks if 'pattern' matches the given 'string'.\n"
|
|
" - 'pattern' can be one or more space separated words.\n"
|
|
" - each 'word' can contain one or more asterisks.\n"
|
|
" - words starting with '!' give negative matches.\n"
|
|
" - words are processed left to right\n"
|
|
"\n"
|
|
"Examples:\n"
|
|
"\n"
|
|
" > match all veth interfaces, except veth0:\n"
|
|
"\n"
|
|
" -W simple-pattern '!veth0 veth*' 'veth12'\n"
|
|
"\n"
|
|
"\n"
|
|
" > match all *.ext files directly in /path/:\n"
|
|
" (this will not match *.ext files in a subdir of /path/)\n"
|
|
"\n"
|
|
" -W simple-pattern '!/path/*/*.ext /path/*.ext' '/path/test.ext'\n"
|
|
"\n"
|
|
);
|
|
return 1;
|
|
}
|
|
|
|
const char *heystack = argv[optind];
|
|
const char *needle = argv[optind + 1];
|
|
size_t len = strlen(needle) + 1;
|
|
char wildcarded[len];
|
|
|
|
SIMPLE_PATTERN *p = simple_pattern_create(heystack, NULL, SIMPLE_PATTERN_EXACT);
|
|
int ret = simple_pattern_matches_extract(p, needle, wildcarded, len);
|
|
simple_pattern_free(p);
|
|
|
|
if(ret) {
|
|
fprintf(stdout, "RESULT: MATCHED - pattern '%s' matches '%s', wildcarded '%s'\n", heystack, needle, wildcarded);
|
|
return 0;
|
|
}
|
|
else {
|
|
fprintf(stdout, "RESULT: NOT MATCHED - pattern '%s' does not match '%s', wildcarded '%s'\n", heystack, needle, wildcarded);
|
|
return 1;
|
|
}
|
|
}
|
|
else if(strncmp(optarg, stacksize_string, strlen(stacksize_string)) == 0) {
|
|
optarg += strlen(stacksize_string);
|
|
config_set(CONFIG_SECTION_GLOBAL, "pthread stack size", optarg);
|
|
}
|
|
else if(strncmp(optarg, debug_flags_string, strlen(debug_flags_string)) == 0) {
|
|
optarg += strlen(debug_flags_string);
|
|
config_set(CONFIG_SECTION_GLOBAL, "debug flags", optarg);
|
|
debug_flags = strtoull(optarg, NULL, 0);
|
|
}
|
|
else if(strcmp(optarg, "set") == 0) {
|
|
if(optind + 3 > argc) {
|
|
fprintf(stderr, "%s", "\nUSAGE: -W set 'section' 'key' 'value'\n\n"
|
|
" Overwrites settings of netdata.conf.\n"
|
|
"\n"
|
|
" These options interact with: -c netdata.conf\n"
|
|
" If -c netdata.conf is given on the command line,\n"
|
|
" before -W set... the user may overwrite command\n"
|
|
" line parameters at netdata.conf\n"
|
|
" If -c netdata.conf is given after (or missing)\n"
|
|
" -W set... the user cannot overwrite the command line\n"
|
|
" parameters."
|
|
"\n"
|
|
);
|
|
return 1;
|
|
}
|
|
const char *section = argv[optind];
|
|
const char *key = argv[optind + 1];
|
|
const char *value = argv[optind + 2];
|
|
optind += 3;
|
|
|
|
// set this one as the default
|
|
// only if it is not already set in the config file
|
|
// so the caller can use -c netdata.conf before or
|
|
// after this parameter to prevent or allow overwriting
|
|
// variables at netdata.conf
|
|
config_set_default(section, key, value);
|
|
|
|
// fprintf(stderr, "SET section '%s', key '%s', value '%s'\n", section, key, value);
|
|
}
|
|
else if(strcmp(optarg, "get") == 0) {
|
|
if(optind + 3 > argc) {
|
|
fprintf(stderr, "%s", "\nUSAGE: -W get 'section' 'key' 'value'\n\n"
|
|
" Prints settings of netdata.conf.\n"
|
|
"\n"
|
|
" These options interact with: -c netdata.conf\n"
|
|
" -c netdata.conf has to be given before -W get.\n"
|
|
"\n"
|
|
);
|
|
return 1;
|
|
}
|
|
|
|
if(!config_loaded) {
|
|
fprintf(stderr, "warning: no configuration file has been loaded. Use -c CONFIG_FILE, before -W get. Using default config.\n");
|
|
load_netdata_conf(NULL, 0);
|
|
}
|
|
|
|
get_netdata_configured_variables();
|
|
|
|
const char *section = argv[optind];
|
|
const char *key = argv[optind + 1];
|
|
const char *def = argv[optind + 2];
|
|
const char *value = config_get(section, key, def);
|
|
printf("%s\n", value);
|
|
return 0;
|
|
}
|
|
else {
|
|
fprintf(stderr, "Unknown -W parameter '%s'\n", optarg);
|
|
return help(1);
|
|
}
|
|
}
|
|
break;
|
|
|
|
default: /* ? */
|
|
fprintf(stderr, "Unknown parameter '%c'\n", opt);
|
|
return help(1);
|
|
}
|
|
}
|
|
}
|
|
|
|
#ifdef _SC_OPEN_MAX
|
|
// close all open file descriptors, except the standard ones
|
|
// the caller may have left open files (lxc-attach has this issue)
|
|
{
|
|
int fd;
|
|
for(fd = (int) (sysconf(_SC_OPEN_MAX) - 1); fd > 2; fd--)
|
|
if(fd_is_valid(fd)) close(fd);
|
|
}
|
|
#endif
|
|
|
|
if(!config_loaded)
|
|
load_netdata_conf(NULL, 0);
|
|
|
|
// ------------------------------------------------------------------------
|
|
// initialize netdata
|
|
{
|
|
char *pmax = config_get(CONFIG_SECTION_GLOBAL, "glibc malloc arena max for plugins", "1");
|
|
if(pmax && *pmax)
|
|
setenv("MALLOC_ARENA_MAX", pmax, 1);
|
|
|
|
#if defined(HAVE_C_MALLOPT)
|
|
i = (int)config_get_number(CONFIG_SECTION_GLOBAL, "glibc malloc arena max for netdata", 1);
|
|
if(i > 0)
|
|
mallopt(M_ARENA_MAX, 1);
|
|
#endif
|
|
test_clock_boottime();
|
|
|
|
// prepare configuration environment variables for the plugins
|
|
|
|
get_netdata_configured_variables();
|
|
set_global_environment();
|
|
|
|
// work while we are cd into config_dir
|
|
// to allow the plugins refer to their config
|
|
// files using relative filenames
|
|
if(chdir(netdata_configured_user_config_dir) == -1)
|
|
fatal("Cannot cd to '%s'", netdata_configured_user_config_dir);
|
|
}
|
|
|
|
char *user = NULL;
|
|
|
|
{
|
|
// --------------------------------------------------------------------
|
|
// get the debugging flags from the configuration file
|
|
|
|
char *flags = config_get(CONFIG_SECTION_GLOBAL, "debug flags", "0x0000000000000000");
|
|
setenv("NETDATA_DEBUG_FLAGS", flags, 1);
|
|
|
|
debug_flags = strtoull(flags, NULL, 0);
|
|
debug(D_OPTIONS, "Debug flags set to '0x%" PRIX64 "'.", debug_flags);
|
|
|
|
if(debug_flags != 0) {
|
|
struct rlimit rl = { RLIM_INFINITY, RLIM_INFINITY };
|
|
if(setrlimit(RLIMIT_CORE, &rl) != 0)
|
|
error("Cannot request unlimited core dumps for debugging... Proceeding anyway...");
|
|
|
|
#ifdef HAVE_SYS_PRCTL_H
|
|
prctl(PR_SET_DUMPABLE, 1, 0, 0, 0);
|
|
#endif
|
|
}
|
|
|
|
|
|
// --------------------------------------------------------------------
|
|
// get log filenames and settings
|
|
log_init();
|
|
error_log_limit_unlimited();
|
|
|
|
// --------------------------------------------------------------------
|
|
// get the certificate and start security
|
|
#ifdef ENABLE_HTTPS
|
|
security_init();
|
|
#endif
|
|
|
|
// --------------------------------------------------------------------
|
|
// This is the safest place to start the SILENCERS structure
|
|
set_silencers_filename();
|
|
health_initialize_global_silencers();
|
|
|
|
// --------------------------------------------------------------------
|
|
// setup process signals
|
|
|
|
// block signals while initializing threads.
|
|
// this causes the threads to block signals.
|
|
signals_block();
|
|
|
|
// setup the signals we want to use
|
|
signals_init();
|
|
|
|
// setup threads configs
|
|
default_stacksize = netdata_threads_init();
|
|
|
|
|
|
// --------------------------------------------------------------------
|
|
// check which threads are enabled and initialize them
|
|
|
|
for (i = 0; static_threads[i].name != NULL ; i++) {
|
|
struct netdata_static_thread *st = &static_threads[i];
|
|
|
|
if(st->config_name)
|
|
st->enabled = config_get_boolean(st->config_section, st->config_name, st->enabled);
|
|
|
|
if(st->enabled && st->init_routine)
|
|
st->init_routine();
|
|
}
|
|
|
|
|
|
// --------------------------------------------------------------------
|
|
// get the user we should run
|
|
|
|
// IMPORTANT: this is required before web_files_uid()
|
|
if(getuid() == 0) {
|
|
user = config_get(CONFIG_SECTION_GLOBAL, "run as user", NETDATA_USER);
|
|
}
|
|
else {
|
|
struct passwd *passwd = getpwuid(getuid());
|
|
user = config_get(CONFIG_SECTION_GLOBAL, "run as user", (passwd && passwd->pw_name)?passwd->pw_name:"");
|
|
}
|
|
|
|
|
|
// --------------------------------------------------------------------
|
|
// create the listening sockets
|
|
|
|
web_client_api_v1_init();
|
|
web_server_threading_selection();
|
|
|
|
if(web_server_mode != WEB_SERVER_MODE_NONE)
|
|
api_listen_sockets_setup();
|
|
}
|
|
|
|
// initialize the log files
|
|
open_all_log_files();
|
|
|
|
#ifdef NETDATA_INTERNAL_CHECKS
|
|
if(debug_flags != 0) {
|
|
struct rlimit rl = { RLIM_INFINITY, RLIM_INFINITY };
|
|
if(setrlimit(RLIMIT_CORE, &rl) != 0)
|
|
error("Cannot request unlimited core dumps for debugging... Proceeding anyway...");
|
|
#ifdef HAVE_SYS_PRCTL_H
|
|
prctl(PR_SET_DUMPABLE, 1, 0, 0, 0);
|
|
#endif
|
|
}
|
|
#endif /* NETDATA_INTERNAL_CHECKS */
|
|
|
|
// get the max file limit
|
|
if(getrlimit(RLIMIT_NOFILE, &rlimit_nofile) != 0)
|
|
error("getrlimit(RLIMIT_NOFILE) failed");
|
|
else
|
|
info("resources control: allowed file descriptors: soft = %zu, max = %zu", (size_t)rlimit_nofile.rlim_cur, (size_t)rlimit_nofile.rlim_max);
|
|
|
|
// fork, switch user, create pid file, set process priority
|
|
if(become_daemon(dont_fork, user) == -1)
|
|
fatal("Cannot daemonize myself.");
|
|
|
|
info("netdata started on pid %d.", getpid());
|
|
|
|
// IMPORTANT: these have to run once, while single threaded
|
|
// but after we have switched user
|
|
web_files_uid();
|
|
web_files_gid();
|
|
|
|
netdata_threads_init_after_fork((size_t)config_get_number(CONFIG_SECTION_GLOBAL, "pthread stack size", (long)default_stacksize));
|
|
|
|
// ------------------------------------------------------------------------
|
|
// initialize rrd, registry, health, rrdpush, etc.
|
|
|
|
netdata_anonymous_statistics_enabled=-1;
|
|
struct rrdhost_system_info *system_info = calloc(1, sizeof(struct rrdhost_system_info));
|
|
get_system_info(system_info);
|
|
|
|
rrd_init(netdata_configured_hostname, system_info);
|
|
// ------------------------------------------------------------------------
|
|
// enable log flood protection
|
|
|
|
error_log_limit_reset();
|
|
|
|
// ------------------------------------------------------------------------
|
|
// spawn the threads
|
|
|
|
web_server_config_options();
|
|
|
|
for (i = 0; static_threads[i].name != NULL ; i++) {
|
|
struct netdata_static_thread *st = &static_threads[i];
|
|
|
|
if(st->enabled) {
|
|
st->thread = mallocz(sizeof(netdata_thread_t));
|
|
debug(D_SYSTEM, "Starting thread %s.", st->name);
|
|
netdata_thread_create(st->thread, st->name, NETDATA_THREAD_OPTION_DEFAULT, st->start_routine, st);
|
|
}
|
|
else debug(D_SYSTEM, "Not starting thread %s.", st->name);
|
|
}
|
|
|
|
info("netdata initialization completed. Enjoy real-time performance monitoring!");
|
|
netdata_ready = 1;
|
|
|
|
send_statistics("START", "-", "-");
|
|
|
|
// ------------------------------------------------------------------------
|
|
// unblock signals
|
|
|
|
signals_unblock();
|
|
|
|
// ------------------------------------------------------------------------
|
|
// Handle signals
|
|
|
|
signals_handle();
|
|
|
|
// should never reach this point
|
|
// but we need it for rpmlint #2752
|
|
return 1;
|
|
}
|