internal/commands/profiling/continuous/set.go (124 lines of code) (raw):

// Licensed to Apache Software Foundation (ASF) under one or more contributor // license agreements. See the NOTICE file distributed with // this work for additional information regarding copyright // ownership. Apache Software Foundation (ASF) licenses this file to you under // the Apache License, Version 2.0 (the "License"); you may // not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, // software distributed under the License is distributed on an // "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY // KIND, either express or implied. See the License for the // specific language governing permissions and limitations // under the License. package continuous import ( "fmt" "os" "github.com/apache/skywalking-cli/internal/commands/interceptor" "github.com/apache/skywalking-cli/internal/flags" "github.com/apache/skywalking-cli/pkg/display" "github.com/apache/skywalking-cli/pkg/display/displayable" "github.com/apache/skywalking-cli/pkg/graphql/profiling" "github.com/urfave/cli/v2" "gopkg.in/yaml.v2" api "skywalking.apache.org/repo/goapi/query" ) type PolicyConfig struct { Policies []*PolicyTarget `yaml:"policy"` } type PolicyTarget struct { Type string `yaml:"type"` Checkers []*PolicyItem `yaml:"checkers"` } type PolicyItem struct { Type string `yaml:"type"` Threshold string `yaml:"threshold"` Period int `yaml:"period"` Count int `yaml:"count"` URIList []string `yaml:"uriList"` URIRegex string `yaml:"uriRegex"` } var SetPolicyCommand = &cli.Command{ Name: "set", Aliases: []string{"s"}, Usage: "Set the continuous profiling policy to service", UsageText: `Set the continuous profiling policy to service Examples: 1. Set the service continuous profiling policy $ swctl profiling continuous set --service-name=abc --config=/path/to/config.yaml`, Flags: flags.Flags( flags.ServiceFlags, []cli.Flag{ &cli.StringFlag{ Name: "config", Usage: "the `config` file define the service policy configuration, if not provide then make the service policy is empty", Required: false, }, }, ), Before: interceptor.BeforeChain( interceptor.ParseService(true), ), Action: func(ctx *cli.Context) error { serviceID := ctx.String("service-id") configFile := ctx.String("config") targets := make([]*api.ContinuousProfilingPolicyTargetCreation, 0) if configFile != "" { config, err := os.ReadFile(configFile) if err != nil { return err } r := &PolicyConfig{} if e := yaml.Unmarshal(config, r); e != nil { return err } targets, err = parsingPolicyConfig(r) if err != nil { return err } } request := &api.ContinuousProfilingPolicyCreation{ ServiceID: serviceID, Targets: targets, } result, err := profiling.SetContinuousProfilingPolicy(ctx.Context, request) if err != nil { return err } return display.Display(ctx.Context, &displayable.Displayable{Data: result, Condition: request}) }, } func parsingPolicyConfig(conf *PolicyConfig) ([]*api.ContinuousProfilingPolicyTargetCreation, error) { result := make([]*api.ContinuousProfilingPolicyTargetCreation, 0) if len(conf.Policies) == 0 { return result, nil } for _, t := range conf.Policies { var realTarget api.ContinuousProfilingTargetType for _, targetType := range api.AllContinuousProfilingTargetType { if t.Type == targetType.String() { realTarget = targetType break } } if realTarget == "" { return nil, fmt.Errorf("cannot found the target: %s", t.Type) } target := &api.ContinuousProfilingPolicyTargetCreation{ TargetType: realTarget, } for _, c := range t.Checkers { var realMonitorType api.ContinuousProfilingMonitorType for _, monitorType := range api.AllContinuousProfilingMonitorType { if c.Type == monitorType.String() { realMonitorType = monitorType break } } if realMonitorType == "" { return nil, fmt.Errorf("cannot fount the monitor type: %s", c.Type) } item := &api.ContinuousProfilingPolicyItemCreation{ Type: realMonitorType, Threshold: c.Threshold, Period: c.Period, Count: c.Count, URIList: c.URIList, } if c.URIRegex != "" { item.URIRegex = &c.URIRegex } target.CheckItems = append(target.CheckItems, item) } result = append(result, target) } return result, nil }