OpenTelemetry Prometheus sidecar
This repository contains a sidecar for the
Prometheus Server that sends metrics data to
an OpenTelemetry Metrics Protocol endpoint. This
software is derived from the Stackdriver Prometheus
Sidecar.
Repository Status (11/18/2020)
This repository will be archived after the 0.2 release. We are
moving this
repository
into the OpenTelemetry
organization and will continue
development on a public fork of the upstream Stackdriver Prometheus
sidecar
repository.
This code base is 100% OpenTelemetry and Prometheus, not a Lightstep
project.
OpenTelemetry Design
A key difference between the OpenTelemetry Metrics data model and the
Prometheus or OpenMetrics data models is the introduction of a
Resource concept
to describe the unit of computation or the entity responsible for
producing a batch of metric data.
The function of this sidecar is to read data collected and written by
Prometheus, convert into the OpenTelemetry data model, attach Resource
attributes, and write to an OpenTelemetry endpoint.
This sidecar sends OpenTelemetry Protocol version 0.5 (or later versions) over gRPC.
Prometheus Design
The Prometheus server consists of a number of interacting parts that
relate to the sidecar.
- Service discovery. Prometheus has over 15 builtin service discovery strategies, which serve to fetch and dynamically update the set of targets.
- Job configuration. A Prometheus job is identified by the name of its confuration, which includes service dicovery, followed by target relabeling, followed by general relabeling.
- Label discovery and relabeling. Service discovery-specific labels, prefixed by
__meta_
, are made available for use during relabeling rules. Prometheus relabeling configurations must choose which meta-labels to output through relabeling, otherwise no __
-prefixed keys are kept. All timeseries have job
and instance
labels.
- In-memory metadata database. The Prometheus server maintains metadata about both active targets and active metric instruments in memory, including the "discovered" meta-labels.
- Write-ahead log. After targets discovered, their meta-labels are synthesized, and relabeling steps are taken, the output following each collection is written to a write-ahead log. Other Prometheus components consume this log.
Critically, the Prometheus write-ahead log does not include timeseries metadata that the Prometheus server expects will be collected again soon, including whether the timeseries represents a counter or a gauge. Prometheus can be configured to write its write-ahead-log to a remote destination, but systems built on this mechanism must refer back to Prometheus servers or otherwise obtain metadata about the kind of data that is in the log. Note that Prometheus is taking efforts to add metadata to its write-ahead-log, though it appears unlikely to make it into the 2.23 release.
Sidecar design
The sidecar includes:
- Prometheus write-ahead log reader
- Target cache that tracks active targets by their identifying labels
- Metadata cache that tracks active instruments, by target
- Configured settings:
- Extra resource labels to apply to all metric timeseries
- Renaming and prefixing to change the name of metric timeseries
- Filters to avoid reporting specific metric timeseries
- Specify whether to use use int64 (optional) vs. double (default) protocol encoding
- Whether to include all meta-labels as resource labels.
The sidecar operates by continually (and concurrently) reading the
log, refreshing its view of targets and instrument metadata,
transforming the data into OpenTelemetry Protocol metrics, and sending
over gRPC to an OpenTelemetry metrics service.
Target label discovery
The sidecar uses Prometheus server HTTP api/v1/targets/metadata
API
to obtain metadata about active collection targets and metric
instruments. The result of target metadata retrieval includes:
- The set of identifying target labels, which include the application
metric labels plus those applied during Prometheus relabeling rules; this always includes
job
and instance
- The set of "discovered" target labels, which includes Prometheus metadata (e.g.,
__scheme__
, __address__
) and the service-discovery meta-labels (e.g., __meta_kubernetes_pod_name
).
When reporting timeseries to output destination, the identifying
target labels are included as OpenTelemetry resource attributes. The
--destination.attribute
flag can be used to add addional constant
labels as resource attributes. The --opentelemetry.use-meta-labels
flag
can be used to add all meta labels as resource attribuets. Otherwise,
labels beginning with __
are dropped.
Installation
Lightstep publishes Docker images of this binary named
lightstep/opentelemetry-prometheus-sidecar:${VERSION}
, with the
latest release always tagged latest
.
To build from source, please clone this repository. You will build a
Docker image, push it to a private container registry, and then run
the container as described below. To test and build a Docker image
for the current operating system, simply:
export DOCKER_IMAGE_NAME=my.image.reposito.ry/opentelemetry/prometheus-sidecar
export DOCKER_IMAGE_TAG=$(cat ./VERSION)
make docker
docker push ${DOCKER_IMAGE_NAME}:${DOCKER_IMAGE_TAG}
Deployment
The sidecar is deployed next to an already running Prometheus server.
An example command-line:
opentelemetry-prometheus-sidecar \
--destination.endpoint=${DESTINATION} \
--destination.header="Custom-Header=${VALUE}" \
--destination.attribute="service.name=${SERVICE}" \
--prometheus.wal=${WAL} \
--prometheus.endpoint=${PROMETHEUS} \
where:
DESTINATION
: Destination address https://host:port
VALUE
: Value for the Custom-Header
request header
SERVICE
: Value for the service.name
resource attribute
WAL
: Prometheus' WAL directory, defaults to data/wal
PROMETHEUS
: URL of the Prometheus UI.
Settings can also be passed through a configuration file, for example:
destination:
endpoint: https://otlp.io:443
headers:
Custom-Header: custom-value
attributes:
service.name: my-service-name
prometheus:
wal: /prometheus/wal
endpoint: http://192.168.10.10:9191
The sidecar requires write access to the directory to store its progress between restarts.
Kubernetes and Helm setup
To configure the sidecar for a Prometheus server installed using the
Prometheus Community Helm Charts,
add the following definition to your custom values.yaml
:
server:
sidecarContainers:
- name: otel-sidecar
image: lightstep/opentelemetry-prometheus-sidecar
imagePullPolicy: Always
args:
- --prometheus.wal=/data/wal
- --destination.endpoint=${DESTINATION}
- --destination.header=Access-Token=AAAAAAAAAAAAAAAA
- --diagnostics.endpoint=${DIAGNOSTICS_DESTINATION}
- --diagnostics.header=Access-Token=BBBBBBBBBBBBBBBB
volumeMounts:
- name: storage-volume
mountPath: /data
The upstream Stackdriver Prometheus sidecar Kubernetes
README
contains more examples of how to patch an existing Prometheus
deployment or deploy the sidecar without using Helm.
Configuration
Most sidecar configuration settings can be set through flags or a yaml
configuration file. To see all available flags, run
opentelemetry-prometheus-sidecar --help
. The printed usage is shown
below:
$ ./opentelemetry-prometheus-sidecar -h
usage: opentelemetry-prometheus-sidecar [<flags>]
The OpenTelemetry Prometheus sidecar runs alongside the Prometheus (https://prometheus.io/)
Server and sends metrics data to an OpenTelemetry (https://opentelemetry.io) Protocol endpoint.
Flags:
-h, --help Show context-sensitive help (also try --help-long and
--help-man).
--version Show application version.
--config-file=CONFIG-FILE A configuration file.
--destination.endpoint=DESTINATION.ENDPOINT
Destination address of a OpenTelemetry Metrics protocol gRPC
endpoint (e.g., https://host:port). Use "http" (not "https")
for an insecure connection.
--destination.attribute=DESTINATION.ATTRIBUTE ...
Destination resource attributes attached to OTLP data (e.g.,
MyResource=Value1). May be repeated.
--destination.header=DESTINATION.HEADER ...
Destination headers used for OTLP requests (e.g.,
MyHeader=Value1). May be repeated.
--diagnostics.endpoint=DIAGNOSTICS.ENDPOINT
Diagnostics address of a OpenTelemetry Metrics protocol gRPC
endpoint (e.g., https://host:port). Use "http" (not "https")
for an insecure connection.
--diagnostics.attribute=DIAGNOSTICS.ATTRIBUTE ...
Diagnostics resource attributes attached to OTLP data (e.g.,
MyResource=Value1). May be repeated.
--diagnostics.header=DIAGNOSTICS.HEADER ...
Diagnostics headers used for OTLP requests (e.g.,
MyHeader=Value1). May be repeated.
--prometheus.wal=PROMETHEUS.WAL
Directory from where to read the Prometheus TSDB WAL. Default:
data/wal
--prometheus.endpoint=PROMETHEUS.ENDPOINT
Endpoint where Prometheus hosts its UI, API, and serves its
own metrics. Default: http://127.0.0.1:9090/
--admin.listen-address=ADMIN.LISTEN-ADDRESS
Administrative HTTP address this process listens on. Default:
0.0.0.0:9091
--security.root-certificate=SECURITY.ROOT-CERTIFICATE ...
Root CA certificate to use for TLS connections, in PEM format
(e.g., root.crt). May be repeated.
--opentelemetry.metrics-prefix=OPENTELEMETRY.METRICS-PREFIX
Customized prefix for exporter metrics. If not set, none will
be used
--opentelemetry.use-meta-labels
Prometheus target labels prefixed with __meta_ map into
labels.
--filter=INCLUDE ... PromQL metric and label matcher which must pass for a series
to be forwarded to OpenTelemetry. If repeated, the series must
pass any of the filter sets to be forwarded.
--startup.delay=STARTUP.DELAY
Delay at startup to allow Prometheus its initial scrape.
Default: 1m0s
--log.level=LOG.LEVEL Only log messages with the given severity or above. One of:
[debug, info, warn, error]
--log.format=LOG.FORMAT Output format of log messages. One of: [logfmt, json]
Two kinds of sidecar customization are available only through the
configuration file. An example sidecar yaml configuration documents
the available options.
Command-line and configuration files can be used at the same time,
where command-line parameter values override configuration-file
parameter values, with one exception. Configurations that support
a map from string to string, including both request headers and
resource attributes, are combined from both sources.
Resources
Use the --destination.attribute=KEY=VALUE
flag to add additional resource attributes to all exported timeseries.
Use the --opentelemetry.use-meta-labels
flag to add discovery meta-labels to all exported timeseries.
Diagnostics
The sidecar is instrumented with the OpenTelemetry-Go SDK and runs
with standard instrumentation packages, including runtime and host
metrics and gRPC and HTTP tracing. Configure diagnostics output OTLP
settings similar to configuring the primary destination, for example:
diagnostics:
endpoint: https://otel-collector:443
headers:
Custom-Header: custom-value
attributes:
extra.resource: extra-value
Likewise, these fields can be accessed using --diagnostics.endpoint
,
--diagnostics.header
, and --diagnostics.attribute
.
Filters
The --filter
flag allows to provide filters which all series have to pass before being sent to the destination. Filters use the same syntax as Prometheus instant vector selectors, e.g.:
opentelemetry-prometheus-sidecar --filter='{__name__!~"cadvisor_.+",job="k8s"}' ...
This drops all series which do not have a job
label k8s
and all metrics that have a name starting with cadvisor_
.
For equality filter on metric name you can use the simpler notation, e.g. --filter='metric_name{label="foo"}'
.
The flag may be repeated to provide several sets of filters, in which case the metric will be forwarded if it matches at least one of them.
Metric renames
To change the name of a metric as it is exported, use the
metric_renames
section in the configuration file:
metric_renames:
- from: original_metric_name
to: new_metric_name
# - ...
To change the output type, value type, or description of a metric
instrument as it is exported, use the static_metadata
section in the
configuration file:
static_metadata:
- metric: some_metric_name
type: counter # or gauge, or histogram
value_type: double # or int64
help: an arbitrary help string
# - ...
Note:
- All
static_metadata
entries must have type
specified.
- If
value_type
is specified, it will override the default value type for counters and gauges. All Prometheus metrics have a default type of double.
Upstream
This repository was copied into a private reposotitory from this upstream fork of stackdriver-prometheus-sidecar
, dated July 31, 2020.
Changes relative to Stackdriver
Changes relative to stackdriver-prometheus-sidecar
included in the initial release of opentelemetry-prometheus-sidecar
:
- Replace Stackdriver monitoring protocol with OTLP v0.5; this was straightforward since these are similar protocols
- Add
--destination.header
support for adding gRPC metadata
- Remove "Resource Map" code, used for generating "Monitored Resource" concept in Stackdriver; OpenTelemetry is less restrictive, this code is replaced by
--destination.attribute
and --opentelemetry.use-meta-labels
support
- Remove GCP/GKE-specific automatic resources; these can be applied using
--destination.attribute
- Remove "Counter Aggregator" support, which pre-aggregates labels; there are other ways this could be implemented, if the OpenTelemetry-Go SDK were used to generate OTLP instead of the dedicated code in this repository
- Add
--security.root-certificate
support for supplying the root certificate used in TLS connection setup.
Compatibility
The matrix below lists the versions of Prometheus Server and other dependencies that have been qualified to work with releases of opentelemetry-prometheus-sidecar
. If the matrix does not list whether they are compatible, please assume they are not verified yet but can be compatible. Feel free to contribute to the matrix if you have run the end-to-end test between a version of opentelemetry-prometheus-sidecar
and Prometheus server.
Sidecar Version |
Compatible Prometheus Server Version(s) |
Incompatible Prometheus Server Version(s) |
0.1.x |
2.10, 2.11, 2.13, 2.15, 2.16, 2.18, 2.19, 2.21, 2.22 |
2.5 |