Skip to main content

使用 Python 和 Prometheus 跟踪天气 | Linux 中国

开源监控系统 Prometheus 集成了跟踪多种类型的时间序列数据,但如果没有集成你想要的数据,那么很容易构建一个。一个经常使用的例子使用云端提供商的自定义集成,它使用提供商的 API 抓取特定的指标。但是,在这个例子中,我们将与最大云端提供商集成:地球。
幸运的是,美国政府已经测量了天气并为集成提供了一个简单的 API。获取红帽总部下一个小时的天气预报很简单。
  1. import requests
  2. HOURLY_RED_HAT = ""
  3. def get_temperature():
  4. result = requests.get(HOURLY_RED_HAT)
  5. return result.json()["properties"]["periods"][0]["temperature"]
现在我们已经完成了与地球的集成,现在是确保 Prometheus 能够理解我们想要内容的时候了。我们可以使用 Prometheus Python 库中的 gauge 创建一个注册项:红帽总部的温度。
  1. from prometheus_client import CollectorRegistry, Gauge
  2. def prometheus_temperature(num):
  3. registry = CollectorRegistry()
  4. g = Gauge("red_hat_temp", "Temperature at Red Hat HQ", registry=registry)
  5. g.set(num)
  6. return registry
最后,我们需要以某种方式将它连接到 Prometheus。这有点依赖 Prometheus 的网络拓扑:是 Prometheus 与我们的服务通信更容易,还是反向更容易。
第一种是通常建议的情况,如果可能的话,我们需要构建一个公开注册入口的 Web 服务器,并配置 Prometheus 收刮(scrape)它。
我们可以使用 Pyramid 构建一个简单的 Web 服务器。
  1. from pyramid.config import Configurator
  2. from pyramid.response import Response
  3. from prometheus_client import generate_latest, CONTENT_TYPE_LATEST
  4. def metrics_web(request):
  5. registry = prometheus_temperature(get_temperature())
  6. return Response(generate_latest(registry),
  7. content_type=CONTENT_TYPE_LATEST)
  8. config = Configurator()
  9. config.add_route('metrics', '/metrics')
  10. config.add_view(metrics_web, route_name='metrics')
  11. app = config.make_wsgi_app()
这可以使用任何 Web 网关接口(WSGI)服务器运行。例如,假设我们将代码放在 earth.py中,我们可以使用 python -m twisted web --wsgi earth.app 来运行它。
或者,如果我们的代码连接到 Prometheus 更容易,我们可以定期将其推送到 Prometheus 的推送网关
  1. import time
  2. from prometheus_client import push_to_gateway
  3. def push_temperature(url):
  4. while True:
  5. registry = prometheus_temperature(get_temperature())
  6. push_to_gateway(url, "temperature collector", registry)
  7. time.sleep(60*60)
这里的 URL 是推送网关的 URL。它通常以 :9091 结尾。
祝你构建自定义 Prometheus 集成成功,以便跟踪一切!

via: https://opensource.com/article/19/4/weather-python-prometheus

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...