mirror of
https://github.com/henrygd/beszel.git
synced 2026-03-21 21:26:16 +01:00
155 lines
4.7 KiB
Go
155 lines
4.7 KiB
Go
package agent
|
|
|
|
import (
|
|
"context"
|
|
"crypto/tls"
|
|
"errors"
|
|
"log/slog"
|
|
"net/http"
|
|
"time"
|
|
|
|
"github.com/henrygd/beszel/internal/entities/container"
|
|
|
|
"github.com/luthermonson/go-proxmox"
|
|
)
|
|
|
|
type pveManager struct {
|
|
client *proxmox.Client // Client to query PVE API
|
|
nodeName string // Cluster node name
|
|
cpuCount int // CPU count on node
|
|
nodeStatsMap map[string]*container.PveNodeStats // Keeps track of pve node stats
|
|
}
|
|
|
|
// Returns stats for all running VMs/LXCs
|
|
func (pm *pveManager) getPVEStats() ([]*container.PveNodeStats, error) {
|
|
if pm.client == nil {
|
|
return nil, errors.New("PVE client not configured")
|
|
}
|
|
cluster, err := pm.client.Cluster(context.Background())
|
|
if err != nil {
|
|
slog.Error("Error getting cluster", "err", err)
|
|
return nil, err
|
|
}
|
|
resources, err := cluster.Resources(context.Background(), "vm")
|
|
if err != nil {
|
|
slog.Error("Error getting resources", "err", err, "resources", resources)
|
|
return nil, err
|
|
}
|
|
containersLength := len(resources)
|
|
containerIds := make(map[string]struct{}, containersLength)
|
|
|
|
// only include running vms and lxcs on selected node
|
|
for _, resource := range resources {
|
|
if resource.Node == pm.nodeName && resource.Status == "running" {
|
|
containerIds[resource.ID] = struct{}{}
|
|
}
|
|
}
|
|
// remove invalid container stats
|
|
for id := range pm.nodeStatsMap {
|
|
if _, exists := containerIds[id]; !exists {
|
|
delete(pm.nodeStatsMap, id)
|
|
}
|
|
}
|
|
|
|
// populate stats
|
|
stats := make([]*container.PveNodeStats, 0, len(containerIds))
|
|
for _, resource := range resources {
|
|
if _, exists := containerIds[resource.ID]; !exists {
|
|
continue
|
|
}
|
|
resourceStats, initialized := pm.nodeStatsMap[resource.ID]
|
|
if !initialized {
|
|
resourceStats = &container.PveNodeStats{}
|
|
pm.nodeStatsMap[resource.ID] = resourceStats
|
|
}
|
|
// reset current stats
|
|
resourceStats.Cpu = 0
|
|
resourceStats.Mem = 0
|
|
resourceStats.Bandwidth = [2]uint64{0, 0}
|
|
// Store clean name (no type suffix)
|
|
resourceStats.Name = resource.Name
|
|
// Store resource ID (e.g. "qemu/100") in .Id (cbor key 7, json:"-")
|
|
resourceStats.Id = resource.ID
|
|
// Store type (e.g. "qemu" or "lxc") in .Image (cbor key 8, json:"-")
|
|
resourceStats.Type = resource.Type
|
|
// PVE limits (cbor-only, for pve_vms table)
|
|
resourceStats.MaxCPU = resource.MaxCPU
|
|
resourceStats.MaxMem = resource.MaxMem
|
|
resourceStats.Uptime = resource.Uptime
|
|
// prevent first run from sending all prev sent/recv bytes
|
|
total_sent := uint64(resource.NetOut)
|
|
total_recv := uint64(resource.NetIn)
|
|
var sent_delta, recv_delta float64
|
|
if initialized {
|
|
secondsElapsed := time.Since(resourceStats.PrevReadTime).Seconds()
|
|
sent_delta = float64(total_sent-resourceStats.PrevNet.Sent) / secondsElapsed
|
|
recv_delta = float64(total_recv-resourceStats.PrevNet.Recv) / secondsElapsed
|
|
}
|
|
resourceStats.PrevReadTime = time.Now()
|
|
|
|
// Update final stats values
|
|
resourceStats.Cpu = twoDecimals(100.0 * resource.CPU * float64(resource.MaxCPU) / float64(pm.cpuCount))
|
|
resourceStats.Mem = float64(resource.Mem)
|
|
resourceStats.Bandwidth = [2]uint64{uint64(sent_delta), uint64(recv_delta)}
|
|
|
|
stats = append(stats, resourceStats)
|
|
}
|
|
|
|
return stats, nil
|
|
}
|
|
|
|
// Creates a new PVE manager - may return nil if required environment variables are not set or if there is an error connecting to the API
|
|
func newPVEManager() *pveManager {
|
|
url, exists := GetEnv("PROXMOX_URL")
|
|
if !exists {
|
|
url = "https://localhost:8006/api2/json"
|
|
}
|
|
const nodeEnvVar = "PROXMOX_NODE"
|
|
const tokenIDEnvVar = "PROXMOX_TOKENID"
|
|
const secretEnvVar = "PROXMOX_SECRET"
|
|
|
|
nodeName, nodeNameExists := GetEnv(nodeEnvVar)
|
|
tokenID, tokenIDExists := GetEnv(tokenIDEnvVar)
|
|
secret, secretExists := GetEnv(secretEnvVar)
|
|
|
|
if !nodeNameExists || !tokenIDExists || !secretExists {
|
|
slog.Debug("Proxmox env vars unset", nodeEnvVar, nodeNameExists, tokenIDEnvVar, tokenIDExists, secretEnvVar, secretExists)
|
|
return nil
|
|
}
|
|
|
|
// PROXMOX_INSECURE_TLS defaults to true; set to "false" to enable TLS verification
|
|
insecureTLS := true
|
|
if val, exists := GetEnv("PROXMOX_INSECURE_TLS"); exists {
|
|
insecureTLS = val != "false"
|
|
}
|
|
|
|
httpClient := http.Client{
|
|
Transport: &http.Transport{
|
|
TLSClientConfig: &tls.Config{
|
|
InsecureSkipVerify: insecureTLS,
|
|
},
|
|
},
|
|
}
|
|
client := proxmox.NewClient(url,
|
|
proxmox.WithHTTPClient(&httpClient),
|
|
proxmox.WithAPIToken(tokenID, secret),
|
|
)
|
|
|
|
pveManager := pveManager{
|
|
client: client,
|
|
nodeName: nodeName,
|
|
nodeStatsMap: make(map[string]*container.PveNodeStats),
|
|
}
|
|
|
|
// Retrieve node cpu count
|
|
node, err := client.Node(context.Background(), nodeName)
|
|
if err != nil {
|
|
slog.Error("Error connecting to Proxmox", "err", err)
|
|
return nil
|
|
} else {
|
|
pveManager.cpuCount = node.CPUInfo.CPUs
|
|
}
|
|
|
|
return &pveManager
|
|
}
|