-
Notifications
You must be signed in to change notification settings - Fork 345
/
collector.go
123 lines (107 loc) · 3.65 KB
/
collector.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
package service
import (
"fmt"
"strconv"
corev1 "k8s.io/api/core/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
v1 "github.com/jaegertracing/jaeger-operator/pkg/apis/jaegertracing/v1"
"github.com/jaegertracing/jaeger-operator/pkg/util"
"github.com/spf13/viper"
)
// NewCollectorServices returns a new Kubernetes service for Jaeger Collector backed by the pods matching the selector
func NewCollectorServices(jaeger *v1.Jaeger, selector map[string]string) []*corev1.Service {
return []*corev1.Service{
headlessCollectorService(jaeger, selector),
clusteripCollectorService(jaeger, selector),
}
}
func headlessCollectorService(jaeger *v1.Jaeger, selector map[string]string) *corev1.Service {
svc := collectorService(jaeger, selector)
svc.Name = GetNameForHeadlessCollectorService(jaeger)
svc.Annotations = map[string]string{
"prometheus.io/scrape": "false",
"service.beta.openshift.io/serving-cert-secret-name": fmt.Sprintf("%s-tls", svc.Name),
}
svc.Spec.ClusterIP = "None"
return svc
}
func clusteripCollectorService(jaeger *v1.Jaeger, selector map[string]string) *corev1.Service {
return collectorService(jaeger, selector)
}
func collectorService(jaeger *v1.Jaeger, selector map[string]string) *corev1.Service {
trueVar := true
return &corev1.Service{
TypeMeta: metav1.TypeMeta{
Kind: "Service",
APIVersion: "v1",
},
ObjectMeta: metav1.ObjectMeta{
Name: GetNameForCollectorService(jaeger),
Namespace: jaeger.Namespace,
Labels: util.Labels(GetNameForCollectorService(jaeger), "service-collector", *jaeger),
OwnerReferences: []metav1.OwnerReference{{
APIVersion: jaeger.APIVersion,
Kind: jaeger.Kind,
Name: jaeger.Name,
UID: jaeger.UID,
Controller: &trueVar,
}},
},
Spec: corev1.ServiceSpec{
Selector: selector,
ClusterIP: "",
Ports: []corev1.ServicePort{
{
Name: "http-zipkin",
Port: 9411,
},
{
Name: GetPortNameForGRPC(jaeger),
Port: 14250,
},
{
Name: "c-tchan-trft",
Port: 14267,
},
{
Name: "http-c-binary-trft",
Port: 14268,
},
},
},
}
}
// GetNameForCollectorService returns the service name for the collector in this Jaeger instance
func GetNameForCollectorService(jaeger *v1.Jaeger) string {
return util.DNSName(util.Truncate("%s-collector", 63, jaeger.Name))
}
// GetNameForHeadlessCollectorService returns the headless service name for the collector in this Jaeger instance
func GetNameForHeadlessCollectorService(jaeger *v1.Jaeger) string {
return util.DNSName(util.Truncate("%s-collector-headless", 63, jaeger.Name))
}
// GetPortNameForGRPC returns the port name for 'grpc'. It may either be http-grpc or https-grpc, based on whether
// TLS is enabled for the agent-collector gRPC communication
func GetPortNameForGRPC(jaeger *v1.Jaeger) string {
if viper.GetString("platform") == v1.FlagPlatformOpenShift {
// we always have TLS certs when running on OpenShift, so, TLS is always enabled
return "https-grpc"
}
// if we don't have a jaeger provided, it's certainly not TLS...
if nil == jaeger {
return "http-grpc"
}
// perhaps the user has provisioned the certs and configured the CR manually?
// for that, we check whether the CLI option `collector.grpc.tls.enabled` was set for the collector
if val, ok := jaeger.Spec.Collector.Options.Map()["collector.grpc.tls.enabled"]; ok {
enabled, err := strconv.ParseBool(val)
if err != nil {
return "http-grpc" // not "true", defaults to false
}
if enabled {
return "https-grpc" // explicit true
}
return "http-grpc" // explicit false
}
// doesn't look like we have TLS enabled
return "http-grpc"
}