summaryrefslogtreecommitdiffstats
path: root/src/go/collectors/go.d.plugin/modules/dnsmasq/collect.go
blob: 2561688d709caf0243be8183dfefc79efdbabe50 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
// SPDX-License-Identifier: GPL-3.0-or-later

package dnsmasq

import (
	"fmt"
	"strconv"
	"strings"

	"github.com/miekg/dns"
)

func (d *Dnsmasq) collect() (map[string]int64, error) {
	r, err := d.queryCacheStatistics()
	if err != nil {
		return nil, err
	}

	ms := make(map[string]int64)
	if err = d.collectResponse(ms, r); err != nil {
		return nil, err
	}

	return ms, nil
}

func (d *Dnsmasq) collectResponse(ms map[string]int64, resp *dns.Msg) error {
	/*
		;; flags: qr aa rd ra; QUERY: 7, ANSWER: 7, AUTHORITY: 0, ADDITIONAL: 0

		;; QUESTION SECTION:
		;cachesize.bind.	CH	 TXT
		;insertions.bind.	CH	 TXT
		;evictions.bind.	CH	 TXT
		;hits.bind.			CH	 TXT
		;misses.bind.		CH	 TXT
		;auth.bind.			CH	 TXT
		;servers.bind.		CH	 TXT

		;; ANSWER SECTION:
		cachesize.bind.		0	CH	TXT	"150"
		insertions.bind.	0	CH	TXT	"1"
		evictions.bind.		0	CH	TXT	"0"
		hits.bind.			0	CH	TXT	"176"
		misses.bind.		0	CH	TXT	"4"
		auth.bind.			0	CH	TXT	"0"
		servers.bind.		0	CH	TXT	"10.0.0.1#53 0 0" "1.1.1.1#53 4 3" "1.0.0.1#53 3 0"
	*/
	for _, a := range resp.Answer {
		txt, ok := a.(*dns.TXT)
		if !ok {
			continue
		}

		idx := strings.IndexByte(txt.Hdr.Name, '.')
		if idx == -1 {
			continue
		}

		switch name := txt.Hdr.Name[:idx]; name {
		case "servers":
			for _, entry := range txt.Txt {
				parts := strings.Fields(entry)
				if len(parts) != 3 {
					return fmt.Errorf("parse %s (%s): unexpected format", txt.Hdr.Name, entry)
				}
				queries, err := strconv.ParseFloat(parts[1], 64)
				if err != nil {
					return fmt.Errorf("parse '%s' (%s): %v", txt.Hdr.Name, entry, err)
				}
				failedQueries, err := strconv.ParseFloat(parts[2], 64)
				if err != nil {
					return fmt.Errorf("parse '%s' (%s): %v", txt.Hdr.Name, entry, err)
				}

				ms["queries"] += int64(queries)
				ms["failed_queries"] += int64(failedQueries)
			}
		case "cachesize", "insertions", "evictions", "hits", "misses", "auth":
			if len(txt.Txt) != 1 {
				return fmt.Errorf("parse '%s' (%v): unexpected format", txt.Hdr.Name, txt.Txt)
			}
			v, err := strconv.ParseFloat(txt.Txt[0], 64)
			if err != nil {
				return fmt.Errorf("parse '%s' (%s): %v", txt.Hdr.Name, txt.Txt[0], err)
			}

			ms[name] = int64(v)
		}
	}
	return nil
}

func (d *Dnsmasq) queryCacheStatistics() (*dns.Msg, error) {
	msg := &dns.Msg{
		MsgHdr: dns.MsgHdr{
			Id:               dns.Id(),
			RecursionDesired: true,
		},
		Question: []dns.Question{
			{Name: "cachesize.bind.", Qtype: dns.TypeTXT, Qclass: dns.ClassCHAOS},
			{Name: "insertions.bind.", Qtype: dns.TypeTXT, Qclass: dns.ClassCHAOS},
			{Name: "evictions.bind.", Qtype: dns.TypeTXT, Qclass: dns.ClassCHAOS},
			{Name: "hits.bind.", Qtype: dns.TypeTXT, Qclass: dns.ClassCHAOS},
			{Name: "misses.bind.", Qtype: dns.TypeTXT, Qclass: dns.ClassCHAOS},
			// TODO: collect auth.bind if available
			// auth.bind query is only supported if dnsmasq has been built
			// to support running as an authoritative name server. See https://github.com/netdata/netdata/issues/13766
			//{Name: "auth.bind.", Qtype: dns.TypeTXT, Qclass: dns.ClassCHAOS},
			{Name: "servers.bind.", Qtype: dns.TypeTXT, Qclass: dns.ClassCHAOS},
		},
	}

	r, _, err := d.dnsClient.Exchange(msg, d.Address)
	if err != nil {
		return nil, err
	}
	if r == nil {
		return nil, fmt.Errorf("'%s' returned an empty response", d.Address)
	}
	if r.Rcode != dns.RcodeSuccess {
		s := dns.RcodeToString[r.Rcode]
		return nil, fmt.Errorf("'%s' returned '%s' (%d) response code", d.Address, s, r.Rcode)
	}
	return r, nil
}