summaryrefslogtreecommitdiffstats
path: root/src/go/collectors/go.d.plugin/modules/k8s_kubelet/kubelet_test.go
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--src/go/collectors/go.d.plugin/modules/k8s_kubelet/kubelet_test.go213
1 files changed, 213 insertions, 0 deletions
diff --git a/src/go/collectors/go.d.plugin/modules/k8s_kubelet/kubelet_test.go b/src/go/collectors/go.d.plugin/modules/k8s_kubelet/kubelet_test.go
new file mode 100644
index 000000000..d4f216908
--- /dev/null
+++ b/src/go/collectors/go.d.plugin/modules/k8s_kubelet/kubelet_test.go
@@ -0,0 +1,213 @@
+// SPDX-License-Identifier: GPL-3.0-or-later
+
+package k8s_kubelet
+
+import (
+ "net/http"
+ "net/http/httptest"
+ "os"
+ "testing"
+
+ "github.com/netdata/netdata/go/go.d.plugin/agent/module"
+
+ "github.com/stretchr/testify/assert"
+ "github.com/stretchr/testify/require"
+)
+
+var (
+ dataConfigJSON, _ = os.ReadFile("testdata/config.json")
+ dataConfigYAML, _ = os.ReadFile("testdata/config.yaml")
+
+ dataMetrics, _ = os.ReadFile("testdata/metrics.txt")
+ dataServiceAccountToken, _ = os.ReadFile("testdata/token.txt")
+)
+
+func Test_testDataIsValid(t *testing.T) {
+ for name, data := range map[string][]byte{
+ "dataConfigJSON": dataConfigJSON,
+ "dataConfigYAML": dataConfigYAML,
+ "dataMetrics": dataMetrics,
+ "dataServiceAccountToken": dataServiceAccountToken,
+ } {
+ require.NotNil(t, data, name)
+ }
+}
+
+func TestKubelet_ConfigurationSerialize(t *testing.T) {
+ module.TestConfigurationSerialize(t, &Kubelet{}, dataConfigJSON, dataConfigYAML)
+}
+
+func TestKubelet_Charts(t *testing.T) {
+ assert.NotNil(t, New().Charts())
+}
+
+func TestKubelet_Cleanup(t *testing.T) {
+ New().Cleanup()
+}
+
+func TestKubelet_Init(t *testing.T) {
+ assert.NoError(t, New().Init())
+}
+
+func TestKubelet_Init_ReadServiceAccountToken(t *testing.T) {
+ job := New()
+ job.TokenPath = "testdata/token.txt"
+
+ assert.NoError(t, job.Init())
+ assert.Equal(t, "Bearer "+string(dataServiceAccountToken), job.Request.Headers["Authorization"])
+}
+
+func TestKubelet_InitErrorOnCreatingClientWrongTLSCA(t *testing.T) {
+ job := New()
+ job.Client.TLSConfig.TLSCA = "testdata/tls"
+
+ assert.Error(t, job.Init())
+}
+
+func TestKubelet_Check(t *testing.T) {
+ ts := httptest.NewServer(
+ http.HandlerFunc(
+ func(w http.ResponseWriter, r *http.Request) {
+ _, _ = w.Write(dataMetrics)
+ }))
+ defer ts.Close()
+
+ job := New()
+ job.URL = ts.URL + "/metrics"
+ require.NoError(t, job.Init())
+ assert.NoError(t, job.Check())
+}
+
+func TestKubelet_Check_ConnectionRefused(t *testing.T) {
+ job := New()
+ job.URL = "http://127.0.0.1:38001/metrics"
+ require.NoError(t, job.Init())
+ assert.Error(t, job.Check())
+}
+
+func TestKubelet_Collect(t *testing.T) {
+ ts := httptest.NewServer(
+ http.HandlerFunc(
+ func(w http.ResponseWriter, r *http.Request) {
+ _, _ = w.Write(dataMetrics)
+ }))
+ defer ts.Close()
+
+ job := New()
+ job.URL = ts.URL + "/metrics"
+ require.NoError(t, job.Init())
+ require.NoError(t, job.Check())
+
+ expected := map[string]int64{
+ "apiserver_audit_requests_rejected_total": 0,
+ "apiserver_storage_data_key_generation_bucket_+Inf": 1,
+ "apiserver_storage_data_key_generation_bucket_10": 1,
+ "apiserver_storage_data_key_generation_bucket_10240": 1,
+ "apiserver_storage_data_key_generation_bucket_1280": 1,
+ "apiserver_storage_data_key_generation_bucket_160": 1,
+ "apiserver_storage_data_key_generation_bucket_20": 1,
+ "apiserver_storage_data_key_generation_bucket_20480": 1,
+ "apiserver_storage_data_key_generation_bucket_2560": 1,
+ "apiserver_storage_data_key_generation_bucket_320": 1,
+ "apiserver_storage_data_key_generation_bucket_40": 1,
+ "apiserver_storage_data_key_generation_bucket_40960": 1,
+ "apiserver_storage_data_key_generation_bucket_5": 6,
+ "apiserver_storage_data_key_generation_bucket_5120": 1,
+ "apiserver_storage_data_key_generation_bucket_640": 1,
+ "apiserver_storage_data_key_generation_bucket_80": 1,
+ "apiserver_storage_data_key_generation_failures_total": 0,
+ "apiserver_storage_envelope_transformation_cache_misses_total": 0,
+ "kubelet_docker_operations_create_container": 19,
+ "kubelet_docker_operations_errors_inspect_container": 14,
+ "kubelet_docker_operations_errors_remove_container": 4,
+ "kubelet_docker_operations_info": 2,
+ "kubelet_docker_operations_inspect_container": 223,
+ "kubelet_docker_operations_inspect_image": 110,
+ "kubelet_docker_operations_list_containers": 5157,
+ "kubelet_docker_operations_list_images": 195,
+ "kubelet_docker_operations_remove_container": 23,
+ "kubelet_docker_operations_start_container": 19,
+ "kubelet_docker_operations_stop_container": 23,
+ "kubelet_docker_operations_version": 472,
+ "kubelet_log_file_system_usage_kube-system_coredns-86c58d9df4-d22hv": 28672,
+ "kubelet_log_file_system_usage_kube-system_coredns-86c58d9df4-ks5dj": 28672,
+ "kubelet_log_file_system_usage_kube-system_etcd-minikube": 36864,
+ "kubelet_log_file_system_usage_kube-system_kube-addon-manager-minikube": 45056,
+ "kubelet_log_file_system_usage_kube-system_kube-apiserver-minikube": 36864,
+ "kubelet_log_file_system_usage_kube-system_kube-controller-manager-minikube": 57344,
+ "kubelet_log_file_system_usage_kube-system_kube-proxy-q2fvs": 28672,
+ "kubelet_log_file_system_usage_kube-system_kube-scheduler-minikube": 40960,
+ "kubelet_log_file_system_usage_kube-system_storage-provisioner": 24576,
+ "kubelet_node_config_error": 1,
+ "kubelet_pleg_relist_interval_05": 1013125,
+ "kubelet_pleg_relist_interval_09": 1016820,
+ "kubelet_pleg_relist_interval_099": 1032022,
+ "kubelet_pleg_relist_latency_05": 12741,
+ "kubelet_pleg_relist_latency_09": 16211,
+ "kubelet_pleg_relist_latency_099": 31234,
+ "kubelet_running_container": 9,
+ "kubelet_running_pod": 9,
+ "kubelet_runtime_operations_container_status": 90,
+ "kubelet_runtime_operations_create_container": 10,
+ "kubelet_runtime_operations_errors_container_status": 14,
+ "kubelet_runtime_operations_errors_remove_container": 4,
+ "kubelet_runtime_operations_exec_sync": 138,
+ "kubelet_runtime_operations_image_status": 25,
+ "kubelet_runtime_operations_list_containers": 2586,
+ "kubelet_runtime_operations_list_images": 195,
+ "kubelet_runtime_operations_list_podsandbox": 2562,
+ "kubelet_runtime_operations_podsandbox_status": 77,
+ "kubelet_runtime_operations_remove_container": 14,
+ "kubelet_runtime_operations_run_podsandbox": 9,
+ "kubelet_runtime_operations_start_container": 10,
+ "kubelet_runtime_operations_status": 279,
+ "kubelet_runtime_operations_stop_podsandbox": 14,
+ "kubelet_runtime_operations_version": 190,
+ "rest_client_requests_200": 177,
+ "rest_client_requests_201": 43,
+ "rest_client_requests_403": 2,
+ "rest_client_requests_409": 1,
+ "rest_client_requests_<error>": 8,
+ "rest_client_requests_GET": 37,
+ "rest_client_requests_PATCH": 177,
+ "rest_client_requests_POST": 8,
+ "token_count": 0,
+ "token_fail_count": 0,
+ "volume_manager_plugin_kubernetes.io/configmap_state_actual": 3,
+ "volume_manager_plugin_kubernetes.io/configmap_state_desired": 3,
+ "volume_manager_plugin_kubernetes.io/host-path_state_actual": 15,
+ "volume_manager_plugin_kubernetes.io/host-path_state_desired": 15,
+ "volume_manager_plugin_kubernetes.io/secret_state_actual": 4,
+ "volume_manager_plugin_kubernetes.io/secret_state_desired": 4,
+ }
+
+ assert.Equal(t, expected, job.Collect())
+}
+
+func TestKubelet_Collect_ReceiveInvalidResponse(t *testing.T) {
+ ts := httptest.NewServer(
+ http.HandlerFunc(
+ func(w http.ResponseWriter, r *http.Request) {
+ _, _ = w.Write([]byte("hello and goodbye"))
+ }))
+ defer ts.Close()
+
+ job := New()
+ job.URL = ts.URL + "/metrics"
+ require.NoError(t, job.Init())
+ assert.Error(t, job.Check())
+}
+
+func TestKubelet_Collect_Receive404(t *testing.T) {
+ ts := httptest.NewServer(
+ http.HandlerFunc(
+ func(w http.ResponseWriter, r *http.Request) {
+ w.WriteHeader(http.StatusNotFound)
+ }))
+ defer ts.Close()
+
+ job := New()
+ job.URL = ts.URL + "/metrics"
+ require.NoError(t, job.Init())
+ assert.Error(t, job.Check())
+}