/* * * Copyright 2024 gRPC authors. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * */ // Binary server is a server for the CSM Observability example. package main import ( "context" "flag" "log" "net" "net/http" "google.golang.org/grpc" "google.golang.org/grpc/credentials/insecure" xdscreds "google.golang.org/grpc/credentials/xds" pb "google.golang.org/grpc/examples/helloworld/helloworld" "google.golang.org/grpc/stats/opentelemetry" "google.golang.org/grpc/stats/opentelemetry/csm" "google.golang.org/grpc/xds" "github.com/prometheus/client_golang/prometheus/promhttp" "go.opentelemetry.io/otel/exporters/prometheus" "go.opentelemetry.io/otel/sdk/metric" ) var ( port = flag.String("port", "50051", "the server address to connect to") prometheusEndpoint = flag.String("prometheus_endpoint", ":9464", "the Prometheus exporter endpoint") ) // server is used to implement helloworld.GreeterServer. type server struct { pb.UnimplementedGreeterServer addr string } // SayHello implements helloworld.GreeterServer func (s *server) SayHello(_ context.Context, in *pb.HelloRequest) (*pb.HelloReply, error) { return &pb.HelloReply{Message: "Hello " + in.GetName()}, nil } func main() { flag.Parse() exporter, err := prometheus.New() if err != nil { log.Fatalf("Failed to start prometheus exporter: %v", err) } provider := metric.NewMeterProvider(metric.WithReader(exporter)) go http.ListenAndServe(*prometheusEndpoint, promhttp.Handler()) cleanup := csm.EnableObservability(context.Background(), opentelemetry.Options{MetricsOptions: opentelemetry.MetricsOptions{MeterProvider: provider}}) defer cleanup() lis, err := net.Listen("tcp4", "0.0.0.0:"+*port) if err != nil { log.Fatalf("Failed to listen: %v", err) } // Set up xds credentials that fall back to insecure as described in: // https://cloud.google.com/service-mesh/docs/service-routing/security-proxyless-setup#workloads_are_unable_to_communicate_in_the_security_setup. creds, err := xdscreds.NewServerCredentials(xdscreds.ServerOptions{FallbackCreds: insecure.NewCredentials()}) if err != nil { log.Fatalf("Failed to create xDS credentials: %v", err) } s, err := xds.NewGRPCServer(grpc.Creds(creds)) if err != nil { log.Fatalf("Failed to start xDS Server: %v", err) } pb.RegisterGreeterServer(s, &server{addr: ":" + *port}) log.Printf("Serving on %s\n", *port) if err := s.Serve(lis); err != nil { log.Fatalf("Failed to serve: %v", err) } }