summaryrefslogtreecommitdiffstats
path: root/tests/monitor.py
diff options
context:
space:
mode:
Diffstat (limited to 'tests/monitor.py')
-rw-r--r--tests/monitor.py65
1 files changed, 59 insertions, 6 deletions
diff --git a/tests/monitor.py b/tests/monitor.py
index 9e489865..caf4c321 100644
--- a/tests/monitor.py
+++ b/tests/monitor.py
@@ -8,16 +8,23 @@
##############################################################################
import argparse
+from datetime import datetime
import json
+import os
import requests
import socket
+import sys
import time
+from congressclient.v1 import client
+from keystoneclient import session as ksc_session
+from keystoneclient.auth.identity import v2
# NOTE: icmp message with all zero data (checksum = 0xf7ff)
# see https://tools.ietf.org/html/rfc792
ICMP_ECHO_MESSAGE = '\x08\x00\xf7\xff\x00\x00\x00\x00'
+SUPPORTED_INSPECTOR_TYPES = ['sample', 'congress']
class DoctorMonitorSample(object):
@@ -26,10 +33,30 @@ class DoctorMonitorSample(object):
event_type = "compute.host.down"
def __init__(self, args):
+ if args.inspector_type not in SUPPORTED_INSPECTOR_TYPES:
+ raise Exception("Inspector type '%s' not supported", args.inspector_type)
+
self.hostname = args.hostname
- self.inspector = args.inspector
+ self.inspector_url = args.inspector_url
+ self.inspector_type = args.inspector_type
self.ip_addr = args.ip or socket.gethostbyname(self.hostname)
+ if self.inspector_type == 'congress':
+ auth = v2.Password(auth_url=os.environ['OS_AUTH_URL'],
+ username=os.environ['OS_USERNAME'],
+ password=os.environ['OS_PASSWORD'],
+ tenant_name=os.environ['OS_TENANT_NAME'])
+ self.session = ksc_session.Session(auth=auth)
+
+ congress = client.Client(session=self.session, service_type='policy')
+ ds = congress.list_datasources()['results']
+ doctor_ds = next((item for item in ds if item['driver'] == 'doctor'),
+ None)
+
+ congress_endpoint = congress.httpclient.get_endpoint(auth=auth)
+ self.inspector_url = ('%s/v1/data-sources/%s/tables/events/rows' %
+ (congress_endpoint, doctor_ds['id']))
+
def start_loop(self):
print "start ping to host %(h)s (ip=%(i)s)" % {'h': self.hostname,
'i': self.ip_addr}
@@ -48,10 +75,33 @@ class DoctorMonitorSample(object):
time.sleep(self.interval)
def report_error(self):
- payload = {"type": self.event_type, "hostname": self.hostname}
- data = json.dumps(payload)
- headers = {'content-type': 'application/json'}
- requests.post(self.inspector, data=data, headers=headers)
+ if self.inspector_type == 'sample':
+ payload = {"type": self.event_type, "hostname": self.hostname}
+ data = json.dumps(payload)
+ headers = {'content-type': 'application/json'}
+ requests.post(self.inspector_url, data=data, headers=headers)
+ elif self.inspector_type == 'congress':
+ data = [
+ {
+ 'id': 'monitor_sample_id1',
+ 'time': datetime.now().isoformat(),
+ 'type': self.event_type,
+ 'details': {
+ 'hostname': self.hostname,
+ 'status': 'down',
+ 'monitor': 'monitor_sample',
+ 'monitor_event_id': 'monitor_sample_event1'
+ },
+ },
+ ]
+
+ headers = {
+ 'Content-Type': 'application/json',
+ 'Accept': 'application/json',
+ 'X-Auth-Token':self.session.get_token(),
+ }
+
+ requests.put(self.inspector_url, data=json.dumps(data), headers=headers)
def get_args():
@@ -60,7 +110,10 @@ def get_args():
help='a hostname to monitor connectivity')
parser.add_argument('ip', metavar='IP', type=str, nargs='?',
help='an IP address to monitor connectivity')
- parser.add_argument('inspector', metavar='INSPECTOR', type=str, nargs='?',
+ parser.add_argument('inspector_type', metavar='INSPECTOR_TYPE', type=str, nargs='?',
+ help='inspector to report',
+ default='sample')
+ parser.add_argument('inspector_url', metavar='INSPECTOR_URL', type=str, nargs='?',
help='inspector url to report error',
default='http://127.0.0.1:12345/events')
return parser.parse_args()