apiserver/plugin/pkg/authenticator/token/oidc/metrics.go

111 lines
3.3 KiB
Go

/*
Copyright 2024 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package oidc
import (
"context"
"crypto/sha256"
"fmt"
"sync"
"time"
"k8s.io/apiserver/pkg/authentication/authenticator"
"k8s.io/component-base/metrics"
"k8s.io/component-base/metrics/legacyregistry"
"k8s.io/utils/clock"
)
const (
namespace = "apiserver"
subsystem = "authentication"
)
var (
jwtAuthenticatorLatencyMetric = metrics.NewHistogramVec(
&metrics.HistogramOpts{
Namespace: namespace,
Subsystem: subsystem,
Name: "jwt_authenticator_latency_seconds",
Help: "Latency of jwt authentication operations in seconds. This is the time spent authenticating a token for cache miss only (i.e. when the token is not found in the cache).",
StabilityLevel: metrics.ALPHA,
// default histogram buckets with a 1ms starting point
Buckets: []float64{.001, .005, .01, .025, .05, .1, .25, .5, 1, 2.5, 5, 10},
},
[]string{"result", "jwt_issuer_hash"},
)
)
var registerMetrics sync.Once
func RegisterMetrics() {
registerMetrics.Do(func() {
legacyregistry.MustRegister(jwtAuthenticatorLatencyMetric)
})
}
func recordAuthenticationLatency(result, jwtIssuerHash string, duration time.Duration) {
jwtAuthenticatorLatencyMetric.WithLabelValues(result, jwtIssuerHash).Observe(duration.Seconds())
}
func getHash(data string) string {
if len(data) > 0 {
return fmt.Sprintf("sha256:%x", sha256.Sum256([]byte(data)))
}
return ""
}
func newInstrumentedAuthenticator(jwtIssuer string, delegate AuthenticatorTokenWithHealthCheck) AuthenticatorTokenWithHealthCheck {
return newInstrumentedAuthenticatorWithClock(jwtIssuer, delegate, clock.RealClock{})
}
func newInstrumentedAuthenticatorWithClock(jwtIssuer string, delegate AuthenticatorTokenWithHealthCheck, clock clock.PassiveClock) *instrumentedAuthenticator {
RegisterMetrics()
return &instrumentedAuthenticator{
jwtIssuerHash: getHash(jwtIssuer),
delegate: delegate,
clock: clock,
}
}
type instrumentedAuthenticator struct {
jwtIssuerHash string
delegate AuthenticatorTokenWithHealthCheck
clock clock.PassiveClock
}
func (a *instrumentedAuthenticator) AuthenticateToken(ctx context.Context, token string) (*authenticator.Response, bool, error) {
start := a.clock.Now()
response, ok, err := a.delegate.AuthenticateToken(ctx, token)
// this only happens when issuer doesn't match the authenticator
// we don't want to record metrics for this case
if !ok && err == nil {
return response, ok, err
}
duration := a.clock.Since(start)
if err != nil {
recordAuthenticationLatency("failure", a.jwtIssuerHash, duration)
} else {
recordAuthenticationLatency("success", a.jwtIssuerHash, duration)
}
return response, ok, err
}
func (a *instrumentedAuthenticator) HealthCheck() error {
return a.delegate.HealthCheck()
}