Circonus Agent
NOTE: This is an "in development" project. As such, there are a few things to be aware of at this time...
Caveats:
- No target specific packages. (e.g. rpm|deb|pkg)
- No service configurations provided. (e.g. systemd, upstart, init, svc)
- Native plugins (.js) do not work. Unless modified to run
node
independently and follow plugin output guidelines.
The code is changing frequently at this point. Before reporting an issue, please ensure the latest release is being used.
development working release - quick start
Download latest release from GitHub repository.
Example of installing into an existing COSI registered linux system.
cd /opt/circonus
mkdir -p agent/{sbin,etc}
cd agent
ln -s /opt/circonus/nad/etc/node-agent.d plugins
curl -L "https://github.com/circonus-labs/circonus-agent/releases/download/v0.1.2/circonus-agent_0.1.2_linux_64-bit.tar.gz" -o circonus-agent.tgz
tar zxf circonus-agent.tgz
To leverage the existing COSI/NAD installation, create a configuration file /opt/circonus/agent/etc/circonus-agent.toml
(or use the corresponding command line options.)
#debug = true
# set the plugin directory to NAD's
plugin-dir = "/opt/circonus/nad/etc/node-agent.d"
[reverse]
enabled = true
cid = "cosi"
[api]
key = "cosi"
Ensure that NAD is not currently running (e.g. systemctl stop nad
) and start circonus-agent sbin/circonus-agentd
.
development testing (manual build/install from source)
NOTE: See Vagrantfile
for an example which bootstraps a centos7 vm.
- Install and setup go environment
- Install dep
go get -u github.com/golang/dep/cmd/dep
- Clone repo and run dep
cd $GOPATH/src/github.com/circonus-labs
git clone https://github.com/circonus-labs/circonus-agent.git
cd circonus-agent
- Build/Install
dep ensure
go build
mkdir -p /opt/circonus/agent/sbin
cp circonus-agent /opt/circonus/agent/sbin/circonus-agentd
- Run
/opt/circonus/agent/sbin/circonus-agentd -h
for help
- example - on a system where cosi has already been run
- stop nad, if it is running
- run:
/opt/circonus/agent/sbin/circonus-agentd -p /opt/circonus/nad/etc/node-agent.d -r --reverse-cid cosi --api-key cosi --log-pretty
-p
use the existing nad plugins
--api-key cosi
load api credentials from cosi installation
--reverse-cid cosi
load check information from cosi installation
-r
establish a reverse connection
--log-prety
print formatted logging output to the terminal
Options
$ /opt/circonus/agent/sbin/circonus-agentd -h
Plugins
- Go in the
--plugin-dir
.
- Must be regular files or symlinks.
- Must be executable (e.g.
0755
)
- Files are expected to be named matching a pattern of:
<base_name>.<ext>
(e.g. foo.sh
)
- Directories are ignored.
- Configuration files are ignored.
- Configuration files are defined as files with extensions of
.json
or .conf
- A
.json
file is assumed to be a configuration for a plugin with the same base_name
(e.g. foo.json
is a configuration for foo.sh
, foo.elf
, etc.)
- JSON config files are loaded and arguments defined are passed to the plugin instance(s).
- The format for JSON config files is:
{"instance_id": ["arg1", "arg2", ...], ...}
.
- One instance of the plugin will be run for each distinct
instance_id
found in the JSON.
- The format of the resulting metric names would be: plugin`instance_id`metric_name
- A
.conf
file is assumed to be a shell configuration file which is loaded by the plugin itself.
- All other directory entries are ignored.
Output
Output from plugins is expected on stdout
either tab-delimited or json.
Tab delimited
metric_name<TAB>metric_type<TAB>metric_value
JSON
{
"metric_name": {
"_type": "metric_type",
"_value": "metric_value"
}
}
Metric types
Type |
Description |
i |
signed 32-bit integer |
I |
unsigned 32-bit integer |
l |
signed 64-bit integer |
L |
unsigned 64-bit integer |
n |
double/float |
s |
string/text |
Running
When plugins are executed, the current working directory will be set to the --plugin-dir
, for relative path references to find configs or data files. Scripts may safely reference $PWD
. See plugin_test/write_test/wtest1.sh
for example. In plugin_test
, run ln -s write_test/wtest1.sh
, start the agent (e.g. go run main.go -p plugin_test
), then curl localhost:2609/
to see it in action.