diff options
Diffstat (limited to 'tests/monitor.py')
-rw-r--r-- | tests/monitor.py | 65 |
1 files changed, 59 insertions, 6 deletions
diff --git a/tests/monitor.py b/tests/monitor.py index 9e489865..caf4c321 100644 --- a/tests/monitor.py +++ b/tests/monitor.py @@ -8,16 +8,23 @@ ############################################################################## import argparse +from datetime import datetime import json +import os import requests import socket +import sys import time +from congressclient.v1 import client +from keystoneclient import session as ksc_session +from keystoneclient.auth.identity import v2 # NOTE: icmp message with all zero data (checksum = 0xf7ff) # see https://tools.ietf.org/html/rfc792 ICMP_ECHO_MESSAGE = '\x08\x00\xf7\xff\x00\x00\x00\x00' +SUPPORTED_INSPECTOR_TYPES = ['sample', 'congress'] class DoctorMonitorSample(object): @@ -26,10 +33,30 @@ class DoctorMonitorSample(object): event_type = "compute.host.down" def __init__(self, args): + if args.inspector_type not in SUPPORTED_INSPECTOR_TYPES: + raise Exception("Inspector type '%s' not supported", args.inspector_type) + self.hostname = args.hostname - self.inspector = args.inspector + self.inspector_url = args.inspector_url + self.inspector_type = args.inspector_type self.ip_addr = args.ip or socket.gethostbyname(self.hostname) + if self.inspector_type == 'congress': + auth = v2.Password(auth_url=os.environ['OS_AUTH_URL'], + username=os.environ['OS_USERNAME'], + password=os.environ['OS_PASSWORD'], + tenant_name=os.environ['OS_TENANT_NAME']) + self.session = ksc_session.Session(auth=auth) + + congress = client.Client(session=self.session, service_type='policy') + ds = congress.list_datasources()['results'] + doctor_ds = next((item for item in ds if item['driver'] == 'doctor'), + None) + + congress_endpoint = congress.httpclient.get_endpoint(auth=auth) + self.inspector_url = ('%s/v1/data-sources/%s/tables/events/rows' % + (congress_endpoint, doctor_ds['id'])) + def start_loop(self): print "start ping to host %(h)s (ip=%(i)s)" % {'h': self.hostname, 'i': self.ip_addr} @@ -48,10 +75,33 @@ class DoctorMonitorSample(object): time.sleep(self.interval) def report_error(self): - payload = {"type": self.event_type, "hostname": self.hostname} - data = json.dumps(payload) - headers = {'content-type': 'application/json'} - requests.post(self.inspector, data=data, headers=headers) + if self.inspector_type == 'sample': + payload = {"type": self.event_type, "hostname": self.hostname} + data = json.dumps(payload) + headers = {'content-type': 'application/json'} + requests.post(self.inspector_url, data=data, headers=headers) + elif self.inspector_type == 'congress': + data = [ + { + 'id': 'monitor_sample_id1', + 'time': datetime.now().isoformat(), + 'type': self.event_type, + 'details': { + 'hostname': self.hostname, + 'status': 'down', + 'monitor': 'monitor_sample', + 'monitor_event_id': 'monitor_sample_event1' + }, + }, + ] + + headers = { + 'Content-Type': 'application/json', + 'Accept': 'application/json', + 'X-Auth-Token':self.session.get_token(), + } + + requests.put(self.inspector_url, data=json.dumps(data), headers=headers) def get_args(): @@ -60,7 +110,10 @@ def get_args(): help='a hostname to monitor connectivity') parser.add_argument('ip', metavar='IP', type=str, nargs='?', help='an IP address to monitor connectivity') - parser.add_argument('inspector', metavar='INSPECTOR', type=str, nargs='?', + parser.add_argument('inspector_type', metavar='INSPECTOR_TYPE', type=str, nargs='?', + help='inspector to report', + default='sample') + parser.add_argument('inspector_url', metavar='INSPECTOR_URL', type=str, nargs='?', help='inspector url to report error', default='http://127.0.0.1:12345/events') return parser.parse_args() |