config::update_self_signed_cert(false)?;
+ proxmox_backup::rrd::create_rrdb_dir()?;
+
if let Err(err) = generate_auth_key() {
bail!("unable to generate auth key - {}", err);
}
let config = server::ApiConfig::new(
buildcfg::JS_DIR, &proxmox_backup::api2::ROUTER, RpcEnvironmentType::PRIVILEGED)?;
-
+
let rest_server = RestServer::new(config);
// http server future:
proxmox_backup::server::last_worker_future().await?;
log::info!("done - exit server");
-
+
Ok(())
}
}
start_task_scheduler();
+ start_stat_generator();
server.await?;
log::info!("server shutting down, waiting for active workers to complete");
Ok(())
}
+fn start_stat_generator() {
+ let abort_future = server::shutdown_future();
+ let future = Box::pin(run_stat_generator());
+ let task = futures::future::select(future, abort_future);
+ tokio::spawn(task.map(|_| ()));
+}
+
fn start_task_scheduler() {
let abort_future = server::shutdown_future();
let future = Box::pin(run_task_scheduler());
}
}
}
+
+async fn run_stat_generator() {
+
+ loop {
+ let delay_target = Instant::now() + Duration::from_secs(10);
+
+ generate_host_stats().await;
+
+ tokio::time::delay_until(tokio::time::Instant::from_std(delay_target)).await;
+ }
+
+}
+
+async fn generate_host_stats() {
+ use proxmox::sys::linux::procfs::read_proc_stat;
+ use proxmox_backup::rrd;
+
+ match read_proc_stat() {
+ Ok(stat) => {
+ if let Err(err) = rrd::update_value("host/cpu", stat.cpu) {
+ eprintln!("rrd::update_value 'host/cpu' failed - {}", err);
+ }
+ }
+ Err(err) => {
+ eprintln!("read_proc_stat failed - {}", err);
+ }
+ }
+}