mirror of
https://github.com/prometheus/alertmanager
synced 2025-01-03 12:22:11 +00:00
4e424e3cd6
The variable DefaultGlobalConfig was being used to initialize values, but it stored previous information due to which some things were persisting in the newer initialization. In this PR, DefaultGlobalConfig is changed to a function so that it returns a fresh GlobalConfig for initialization. Signed-off-by: Hrishikesh Barman <hrishikeshbman@gmail.com>
729 lines
22 KiB
Go
729 lines
22 KiB
Go
// Copyright 2015 Prometheus Team
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package config
|
|
|
|
import (
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"io/ioutil"
|
|
"net/url"
|
|
"path/filepath"
|
|
"regexp"
|
|
"strings"
|
|
"time"
|
|
|
|
commoncfg "github.com/prometheus/common/config"
|
|
"github.com/prometheus/common/model"
|
|
"gopkg.in/yaml.v2"
|
|
)
|
|
|
|
const secretToken = "<secret>"
|
|
|
|
var secretTokenJSON string
|
|
|
|
func init() {
|
|
b, err := json.Marshal(secretToken)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
secretTokenJSON = string(b)
|
|
}
|
|
|
|
// Secret is a string that must not be revealed on marshaling.
|
|
type Secret string
|
|
|
|
// MarshalYAML implements the yaml.Marshaler interface for Secret.
|
|
func (s Secret) MarshalYAML() (interface{}, error) {
|
|
if s != "" {
|
|
return secretToken, nil
|
|
}
|
|
return nil, nil
|
|
}
|
|
|
|
// UnmarshalYAML implements the yaml.Unmarshaler interface for Secret.
|
|
func (s *Secret) UnmarshalYAML(unmarshal func(interface{}) error) error {
|
|
type plain Secret
|
|
return unmarshal((*plain)(s))
|
|
}
|
|
|
|
// MarshalJSON implements the json.Marshaler interface for Secret.
|
|
func (s Secret) MarshalJSON() ([]byte, error) {
|
|
return json.Marshal(secretToken)
|
|
}
|
|
|
|
// URL is a custom type that represents an HTTP or HTTPS URL and allows validation at configuration load time.
|
|
type URL struct {
|
|
*url.URL
|
|
}
|
|
|
|
// Copy makes a deep-copy of the struct.
|
|
func (u *URL) Copy() *URL {
|
|
v := *u.URL
|
|
return &URL{&v}
|
|
}
|
|
|
|
// MarshalYAML implements the yaml.Marshaler interface for URL.
|
|
func (u URL) MarshalYAML() (interface{}, error) {
|
|
if u.URL != nil {
|
|
return u.URL.String(), nil
|
|
}
|
|
return nil, nil
|
|
}
|
|
|
|
// UnmarshalYAML implements the yaml.Unmarshaler interface for URL.
|
|
func (u *URL) UnmarshalYAML(unmarshal func(interface{}) error) error {
|
|
var s string
|
|
if err := unmarshal(&s); err != nil {
|
|
return err
|
|
}
|
|
urlp, err := parseURL(s)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
u.URL = urlp.URL
|
|
return nil
|
|
}
|
|
|
|
// MarshalJSON implements the json.Marshaler interface for URL.
|
|
func (u URL) MarshalJSON() ([]byte, error) {
|
|
if u.URL != nil {
|
|
return json.Marshal(u.URL.String())
|
|
}
|
|
return nil, nil
|
|
}
|
|
|
|
// UnmarshalJSON implements the json.Marshaler interface for URL.
|
|
func (u *URL) UnmarshalJSON(data []byte) error {
|
|
var s string
|
|
if err := json.Unmarshal(data, &s); err != nil {
|
|
return err
|
|
}
|
|
urlp, err := parseURL(s)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
u.URL = urlp.URL
|
|
return nil
|
|
}
|
|
|
|
// SecretURL is a URL that must not be revealed on marshaling.
|
|
type SecretURL URL
|
|
|
|
// MarshalYAML implements the yaml.Marshaler interface for SecretURL.
|
|
func (s SecretURL) MarshalYAML() (interface{}, error) {
|
|
if s.URL != nil {
|
|
return secretToken, nil
|
|
}
|
|
return nil, nil
|
|
}
|
|
|
|
// UnmarshalYAML implements the yaml.Unmarshaler interface for SecretURL.
|
|
func (s *SecretURL) UnmarshalYAML(unmarshal func(interface{}) error) error {
|
|
var str string
|
|
if err := unmarshal(&str); err != nil {
|
|
return err
|
|
}
|
|
// In order to deserialize a previously serialized configuration (eg from
|
|
// the Alertmanager API with amtool), `<secret>` needs to be treated
|
|
// specially, as it isn't a valid URL.
|
|
if str == secretToken {
|
|
s.URL = &url.URL{}
|
|
return nil
|
|
}
|
|
return unmarshal((*URL)(s))
|
|
}
|
|
|
|
// MarshalJSON implements the json.Marshaler interface for SecretURL.
|
|
func (s SecretURL) MarshalJSON() ([]byte, error) {
|
|
return json.Marshal(secretToken)
|
|
}
|
|
|
|
// UnmarshalJSON implements the json.Marshaler interface for SecretURL.
|
|
func (s *SecretURL) UnmarshalJSON(data []byte) error {
|
|
// In order to deserialize a previously serialized configuration (eg from
|
|
// the Alertmanager API with amtool), `<secret>` needs to be treated
|
|
// specially, as it isn't a valid URL.
|
|
if string(data) == secretToken || string(data) == secretTokenJSON {
|
|
s.URL = &url.URL{}
|
|
return nil
|
|
}
|
|
return json.Unmarshal(data, (*URL)(s))
|
|
}
|
|
|
|
// Load parses the YAML input s into a Config.
|
|
func Load(s string) (*Config, error) {
|
|
cfg := &Config{}
|
|
err := yaml.UnmarshalStrict([]byte(s), cfg)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
// Check if we have a root route. We cannot check for it in the
|
|
// UnmarshalYAML method because it won't be called if the input is empty
|
|
// (e.g. the config file is empty or only contains whitespace).
|
|
if cfg.Route == nil {
|
|
return nil, errors.New("no route provided in config")
|
|
}
|
|
|
|
// Check if continue in root route.
|
|
if cfg.Route.Continue {
|
|
return nil, errors.New("cannot have continue in root route")
|
|
}
|
|
|
|
cfg.original = s
|
|
return cfg, nil
|
|
}
|
|
|
|
// LoadFile parses the given YAML file into a Config.
|
|
func LoadFile(filename string) (*Config, []byte, error) {
|
|
content, err := ioutil.ReadFile(filename)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
cfg, err := Load(string(content))
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
resolveFilepaths(filepath.Dir(filename), cfg)
|
|
return cfg, content, nil
|
|
}
|
|
|
|
// resolveFilepaths joins all relative paths in a configuration
|
|
// with a given base directory.
|
|
func resolveFilepaths(baseDir string, cfg *Config) {
|
|
join := func(fp string) string {
|
|
if len(fp) > 0 && !filepath.IsAbs(fp) {
|
|
fp = filepath.Join(baseDir, fp)
|
|
}
|
|
return fp
|
|
}
|
|
|
|
for i, tf := range cfg.Templates {
|
|
cfg.Templates[i] = join(tf)
|
|
}
|
|
}
|
|
|
|
// Config is the top-level configuration for Alertmanager's config files.
|
|
type Config struct {
|
|
Global *GlobalConfig `yaml:"global,omitempty" json:"global,omitempty"`
|
|
Route *Route `yaml:"route,omitempty" json:"route,omitempty"`
|
|
InhibitRules []*InhibitRule `yaml:"inhibit_rules,omitempty" json:"inhibit_rules,omitempty"`
|
|
Receivers []*Receiver `yaml:"receivers,omitempty" json:"receivers,omitempty"`
|
|
Templates []string `yaml:"templates" json:"templates"`
|
|
|
|
// original is the input from which the config was parsed.
|
|
original string
|
|
}
|
|
|
|
func (c Config) String() string {
|
|
b, err := yaml.Marshal(c)
|
|
if err != nil {
|
|
return fmt.Sprintf("<error creating config string: %s>", err)
|
|
}
|
|
return string(b)
|
|
}
|
|
|
|
// UnmarshalYAML implements the yaml.Unmarshaler interface for Config.
|
|
func (c *Config) UnmarshalYAML(unmarshal func(interface{}) error) error {
|
|
// We want to set c to the defaults and then overwrite it with the input.
|
|
// To make unmarshal fill the plain data struct rather than calling UnmarshalYAML
|
|
// again, we have to hide it using a type indirection.
|
|
type plain Config
|
|
if err := unmarshal((*plain)(c)); err != nil {
|
|
return err
|
|
}
|
|
|
|
// If a global block was open but empty the default global config is overwritten.
|
|
// We have to restore it here.
|
|
if c.Global == nil {
|
|
c.Global = &GlobalConfig{}
|
|
*c.Global = DefaultGlobalConfig()
|
|
}
|
|
|
|
names := map[string]struct{}{}
|
|
|
|
for _, rcv := range c.Receivers {
|
|
if _, ok := names[rcv.Name]; ok {
|
|
return fmt.Errorf("notification config name %q is not unique", rcv.Name)
|
|
}
|
|
for _, wh := range rcv.WebhookConfigs {
|
|
if wh.HTTPConfig == nil {
|
|
wh.HTTPConfig = c.Global.HTTPConfig
|
|
}
|
|
}
|
|
for _, ec := range rcv.EmailConfigs {
|
|
if ec.Smarthost == "" {
|
|
if c.Global.SMTPSmarthost == "" {
|
|
return fmt.Errorf("no global SMTP smarthost set")
|
|
}
|
|
ec.Smarthost = c.Global.SMTPSmarthost
|
|
}
|
|
if ec.From == "" {
|
|
if c.Global.SMTPFrom == "" {
|
|
return fmt.Errorf("no global SMTP from set")
|
|
}
|
|
ec.From = c.Global.SMTPFrom
|
|
}
|
|
if ec.Hello == "" {
|
|
ec.Hello = c.Global.SMTPHello
|
|
}
|
|
if ec.AuthUsername == "" {
|
|
ec.AuthUsername = c.Global.SMTPAuthUsername
|
|
}
|
|
if ec.AuthPassword == "" {
|
|
ec.AuthPassword = c.Global.SMTPAuthPassword
|
|
}
|
|
if ec.AuthSecret == "" {
|
|
ec.AuthSecret = c.Global.SMTPAuthSecret
|
|
}
|
|
if ec.AuthIdentity == "" {
|
|
ec.AuthIdentity = c.Global.SMTPAuthIdentity
|
|
}
|
|
if ec.RequireTLS == nil {
|
|
ec.RequireTLS = new(bool)
|
|
*ec.RequireTLS = c.Global.SMTPRequireTLS
|
|
}
|
|
}
|
|
for _, sc := range rcv.SlackConfigs {
|
|
if sc.HTTPConfig == nil {
|
|
sc.HTTPConfig = c.Global.HTTPConfig
|
|
}
|
|
if sc.APIURL == nil {
|
|
if c.Global.SlackAPIURL == nil {
|
|
return fmt.Errorf("no global Slack API URL set")
|
|
}
|
|
sc.APIURL = c.Global.SlackAPIURL
|
|
}
|
|
}
|
|
for _, hc := range rcv.HipchatConfigs {
|
|
if hc.HTTPConfig == nil {
|
|
hc.HTTPConfig = c.Global.HTTPConfig
|
|
}
|
|
if hc.APIURL == nil {
|
|
if c.Global.HipchatAPIURL == nil {
|
|
return fmt.Errorf("no global Hipchat API URL set")
|
|
}
|
|
hc.APIURL = c.Global.HipchatAPIURL
|
|
}
|
|
if !strings.HasSuffix(hc.APIURL.Path, "/") {
|
|
hc.APIURL.Path += "/"
|
|
}
|
|
if hc.AuthToken == "" {
|
|
if c.Global.HipchatAuthToken == "" {
|
|
return fmt.Errorf("no global Hipchat Auth Token set")
|
|
}
|
|
hc.AuthToken = c.Global.HipchatAuthToken
|
|
}
|
|
}
|
|
for _, poc := range rcv.PushoverConfigs {
|
|
if poc.HTTPConfig == nil {
|
|
poc.HTTPConfig = c.Global.HTTPConfig
|
|
}
|
|
}
|
|
for _, pdc := range rcv.PagerdutyConfigs {
|
|
if pdc.HTTPConfig == nil {
|
|
pdc.HTTPConfig = c.Global.HTTPConfig
|
|
}
|
|
if pdc.URL == nil {
|
|
if c.Global.PagerdutyURL == nil {
|
|
return fmt.Errorf("no global PagerDuty URL set")
|
|
}
|
|
pdc.URL = c.Global.PagerdutyURL
|
|
}
|
|
}
|
|
for _, ogc := range rcv.OpsGenieConfigs {
|
|
if ogc.HTTPConfig == nil {
|
|
ogc.HTTPConfig = c.Global.HTTPConfig
|
|
}
|
|
if ogc.APIURL == nil {
|
|
if c.Global.OpsGenieAPIURL == nil {
|
|
return fmt.Errorf("no global OpsGenie URL set")
|
|
}
|
|
ogc.APIURL = c.Global.OpsGenieAPIURL
|
|
}
|
|
if !strings.HasSuffix(ogc.APIURL.Path, "/") {
|
|
ogc.APIURL.Path += "/"
|
|
}
|
|
if ogc.APIKey == "" {
|
|
if c.Global.OpsGenieAPIKey == "" {
|
|
return fmt.Errorf("no global OpsGenie API Key set")
|
|
}
|
|
ogc.APIKey = c.Global.OpsGenieAPIKey
|
|
}
|
|
}
|
|
for _, wcc := range rcv.WechatConfigs {
|
|
if wcc.HTTPConfig == nil {
|
|
wcc.HTTPConfig = c.Global.HTTPConfig
|
|
}
|
|
|
|
if wcc.APIURL == nil {
|
|
if c.Global.WeChatAPIURL == nil {
|
|
return fmt.Errorf("no global Wechat URL set")
|
|
}
|
|
wcc.APIURL = c.Global.WeChatAPIURL
|
|
}
|
|
|
|
if wcc.APISecret == "" {
|
|
if c.Global.WeChatAPISecret == "" {
|
|
return fmt.Errorf("no global Wechat ApiSecret set")
|
|
}
|
|
wcc.APISecret = c.Global.WeChatAPISecret
|
|
}
|
|
|
|
if wcc.CorpID == "" {
|
|
if c.Global.WeChatAPICorpID == "" {
|
|
return fmt.Errorf("no global Wechat CorpID set")
|
|
}
|
|
wcc.CorpID = c.Global.WeChatAPICorpID
|
|
}
|
|
|
|
if !strings.HasSuffix(wcc.APIURL.Path, "/") {
|
|
wcc.APIURL.Path += "/"
|
|
}
|
|
}
|
|
for _, voc := range rcv.VictorOpsConfigs {
|
|
if voc.HTTPConfig == nil {
|
|
voc.HTTPConfig = c.Global.HTTPConfig
|
|
}
|
|
if voc.APIURL == nil {
|
|
if c.Global.VictorOpsAPIURL == nil {
|
|
return fmt.Errorf("no global VictorOps URL set")
|
|
}
|
|
voc.APIURL = c.Global.VictorOpsAPIURL
|
|
}
|
|
if !strings.HasSuffix(voc.APIURL.Path, "/") {
|
|
voc.APIURL.Path += "/"
|
|
}
|
|
if voc.APIKey == "" {
|
|
if c.Global.VictorOpsAPIKey == "" {
|
|
return fmt.Errorf("no global VictorOps API Key set")
|
|
}
|
|
voc.APIKey = c.Global.VictorOpsAPIKey
|
|
}
|
|
}
|
|
names[rcv.Name] = struct{}{}
|
|
}
|
|
|
|
// The root route must not have any matchers as it is the fallback node
|
|
// for all alerts.
|
|
if c.Route == nil {
|
|
return fmt.Errorf("no routes provided")
|
|
}
|
|
if len(c.Route.Receiver) == 0 {
|
|
return fmt.Errorf("root route must specify a default receiver")
|
|
}
|
|
if len(c.Route.Match) > 0 || len(c.Route.MatchRE) > 0 {
|
|
return fmt.Errorf("root route must not have any matchers")
|
|
}
|
|
|
|
// Validate that all receivers used in the routing tree are defined.
|
|
return checkReceiver(c.Route, names)
|
|
}
|
|
|
|
// checkReceiver returns an error if a node in the routing tree
|
|
// references a receiver not in the given map.
|
|
func checkReceiver(r *Route, receivers map[string]struct{}) error {
|
|
if r.Receiver == "" {
|
|
return nil
|
|
}
|
|
if _, ok := receivers[r.Receiver]; !ok {
|
|
return fmt.Errorf("undefined receiver %q used in route", r.Receiver)
|
|
}
|
|
for _, sr := range r.Routes {
|
|
if err := checkReceiver(sr, receivers); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// DefaultGlobalConfig returns GlobalConfig with default values.
|
|
func DefaultGlobalConfig() GlobalConfig {
|
|
return GlobalConfig{
|
|
ResolveTimeout: model.Duration(5 * time.Minute),
|
|
HTTPConfig: &commoncfg.HTTPClientConfig{},
|
|
|
|
SMTPHello: "localhost",
|
|
SMTPRequireTLS: true,
|
|
PagerdutyURL: mustParseURL("https://events.pagerduty.com/v2/enqueue"),
|
|
HipchatAPIURL: mustParseURL("https://api.hipchat.com/"),
|
|
OpsGenieAPIURL: mustParseURL("https://api.opsgenie.com/"),
|
|
WeChatAPIURL: mustParseURL("https://qyapi.weixin.qq.com/cgi-bin/"),
|
|
VictorOpsAPIURL: mustParseURL("https://alert.victorops.com/integrations/generic/20131114/alert/"),
|
|
}
|
|
}
|
|
|
|
func mustParseURL(s string) *URL {
|
|
u, err := parseURL(s)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
return u
|
|
}
|
|
|
|
func parseURL(s string) (*URL, error) {
|
|
u, err := url.Parse(s)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if u.Scheme != "http" && u.Scheme != "https" {
|
|
return nil, fmt.Errorf("unsupported scheme %q for URL", u.Scheme)
|
|
}
|
|
if u.Host == "" {
|
|
return nil, fmt.Errorf("missing host for URL")
|
|
}
|
|
return &URL{u}, nil
|
|
}
|
|
|
|
// GlobalConfig defines configuration parameters that are valid globally
|
|
// unless overwritten.
|
|
type GlobalConfig struct {
|
|
// ResolveTimeout is the time after which an alert is declared resolved
|
|
// if it has not been updated.
|
|
ResolveTimeout model.Duration `yaml:"resolve_timeout" json:"resolve_timeout"`
|
|
|
|
HTTPConfig *commoncfg.HTTPClientConfig `yaml:"http_config,omitempty" json:"http_config,omitempty"`
|
|
|
|
SMTPFrom string `yaml:"smtp_from,omitempty" json:"smtp_from,omitempty"`
|
|
SMTPHello string `yaml:"smtp_hello,omitempty" json:"smtp_hello,omitempty"`
|
|
SMTPSmarthost string `yaml:"smtp_smarthost,omitempty" json:"smtp_smarthost,omitempty"`
|
|
SMTPAuthUsername string `yaml:"smtp_auth_username,omitempty" json:"smtp_auth_username,omitempty"`
|
|
SMTPAuthPassword Secret `yaml:"smtp_auth_password,omitempty" json:"smtp_auth_password,omitempty"`
|
|
SMTPAuthSecret Secret `yaml:"smtp_auth_secret,omitempty" json:"smtp_auth_secret,omitempty"`
|
|
SMTPAuthIdentity string `yaml:"smtp_auth_identity,omitempty" json:"smtp_auth_identity,omitempty"`
|
|
SMTPRequireTLS bool `yaml:"smtp_require_tls,omitempty" json:"smtp_require_tls,omitempty"`
|
|
SlackAPIURL *SecretURL `yaml:"slack_api_url,omitempty" json:"slack_api_url,omitempty"`
|
|
PagerdutyURL *URL `yaml:"pagerduty_url,omitempty" json:"pagerduty_url,omitempty"`
|
|
HipchatAPIURL *URL `yaml:"hipchat_api_url,omitempty" json:"hipchat_api_url,omitempty"`
|
|
HipchatAuthToken Secret `yaml:"hipchat_auth_token,omitempty" json:"hipchat_auth_token,omitempty"`
|
|
OpsGenieAPIURL *URL `yaml:"opsgenie_api_url,omitempty" json:"opsgenie_api_url,omitempty"`
|
|
OpsGenieAPIKey Secret `yaml:"opsgenie_api_key,omitempty" json:"opsgenie_api_key,omitempty"`
|
|
WeChatAPIURL *URL `yaml:"wechat_api_url,omitempty" json:"wechat_api_url,omitempty"`
|
|
WeChatAPISecret Secret `yaml:"wechat_api_secret,omitempty" json:"wechat_api_secret,omitempty"`
|
|
WeChatAPICorpID string `yaml:"wechat_api_corp_id,omitempty" json:"wechat_api_corp_id,omitempty"`
|
|
VictorOpsAPIURL *URL `yaml:"victorops_api_url,omitempty" json:"victorops_api_url,omitempty"`
|
|
VictorOpsAPIKey Secret `yaml:"victorops_api_key,omitempty" json:"victorops_api_key,omitempty"`
|
|
}
|
|
|
|
// UnmarshalYAML implements the yaml.Unmarshaler interface for GlobalConfig.
|
|
func (c *GlobalConfig) UnmarshalYAML(unmarshal func(interface{}) error) error {
|
|
*c = DefaultGlobalConfig()
|
|
type plain GlobalConfig
|
|
return unmarshal((*plain)(c))
|
|
}
|
|
|
|
// A Route is a node that contains definitions of how to handle alerts.
|
|
type Route struct {
|
|
Receiver string `yaml:"receiver,omitempty" json:"receiver,omitempty"`
|
|
|
|
GroupByStr []string `yaml:"group_by,omitempty" json:"group_by,omitempty"`
|
|
GroupBy []model.LabelName `yaml:"-" json:"-"`
|
|
GroupByAll bool `yaml:"-" json:"-"`
|
|
|
|
Match map[string]string `yaml:"match,omitempty" json:"match,omitempty"`
|
|
MatchRE map[string]Regexp `yaml:"match_re,omitempty" json:"match_re,omitempty"`
|
|
Continue bool `yaml:"continue,omitempty" json:"continue,omitempty"`
|
|
Routes []*Route `yaml:"routes,omitempty" json:"routes,omitempty"`
|
|
|
|
GroupWait *model.Duration `yaml:"group_wait,omitempty" json:"group_wait,omitempty"`
|
|
GroupInterval *model.Duration `yaml:"group_interval,omitempty" json:"group_interval,omitempty"`
|
|
RepeatInterval *model.Duration `yaml:"repeat_interval,omitempty" json:"repeat_interval,omitempty"`
|
|
}
|
|
|
|
// UnmarshalYAML implements the yaml.Unmarshaler interface for Route.
|
|
func (r *Route) UnmarshalYAML(unmarshal func(interface{}) error) error {
|
|
type plain Route
|
|
if err := unmarshal((*plain)(r)); err != nil {
|
|
return err
|
|
}
|
|
|
|
for k := range r.Match {
|
|
if !model.LabelNameRE.MatchString(k) {
|
|
return fmt.Errorf("invalid label name %q", k)
|
|
}
|
|
}
|
|
|
|
for k := range r.MatchRE {
|
|
if !model.LabelNameRE.MatchString(k) {
|
|
return fmt.Errorf("invalid label name %q", k)
|
|
}
|
|
}
|
|
for _, l := range r.GroupByStr {
|
|
if l == "..." {
|
|
r.GroupByAll = true
|
|
} else {
|
|
labelName := model.LabelName(l)
|
|
if !labelName.IsValid() {
|
|
return fmt.Errorf("invalid label name %q in group_by list", l)
|
|
}
|
|
r.GroupBy = append(r.GroupBy, labelName)
|
|
}
|
|
}
|
|
|
|
if len(r.GroupBy) > 0 && r.GroupByAll {
|
|
return fmt.Errorf("cannot have wildcard group_by (`...`) and other other labels at the same time")
|
|
}
|
|
|
|
groupBy := map[model.LabelName]struct{}{}
|
|
|
|
for _, ln := range r.GroupBy {
|
|
if _, ok := groupBy[ln]; ok {
|
|
return fmt.Errorf("duplicated label %q in group_by", ln)
|
|
}
|
|
groupBy[ln] = struct{}{}
|
|
}
|
|
|
|
if r.GroupInterval != nil && time.Duration(*r.GroupInterval) == time.Duration(0) {
|
|
return fmt.Errorf("group_interval cannot be zero")
|
|
}
|
|
if r.RepeatInterval != nil && time.Duration(*r.RepeatInterval) == time.Duration(0) {
|
|
return fmt.Errorf("repeat_interval cannot be zero")
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// InhibitRule defines an inhibition rule that mutes alerts that match the
|
|
// target labels if an alert matching the source labels exists.
|
|
// Both alerts have to have a set of labels being equal.
|
|
type InhibitRule struct {
|
|
// SourceMatch defines a set of labels that have to equal the given
|
|
// value for source alerts.
|
|
SourceMatch map[string]string `yaml:"source_match,omitempty" json:"source_match,omitempty"`
|
|
// SourceMatchRE defines pairs like SourceMatch but does regular expression
|
|
// matching.
|
|
SourceMatchRE map[string]Regexp `yaml:"source_match_re,omitempty" json:"source_match_re,omitempty"`
|
|
// TargetMatch defines a set of labels that have to equal the given
|
|
// value for target alerts.
|
|
TargetMatch map[string]string `yaml:"target_match,omitempty" json:"target_match,omitempty"`
|
|
// TargetMatchRE defines pairs like TargetMatch but does regular expression
|
|
// matching.
|
|
TargetMatchRE map[string]Regexp `yaml:"target_match_re,omitempty" json:"target_match_re,omitempty"`
|
|
// A set of labels that must be equal between the source and target alert
|
|
// for them to be a match.
|
|
Equal model.LabelNames `yaml:"equal,omitempty" json:"equal,omitempty"`
|
|
}
|
|
|
|
// UnmarshalYAML implements the yaml.Unmarshaler interface for InhibitRule.
|
|
func (r *InhibitRule) UnmarshalYAML(unmarshal func(interface{}) error) error {
|
|
type plain InhibitRule
|
|
if err := unmarshal((*plain)(r)); err != nil {
|
|
return err
|
|
}
|
|
|
|
for k := range r.SourceMatch {
|
|
if !model.LabelNameRE.MatchString(k) {
|
|
return fmt.Errorf("invalid label name %q", k)
|
|
}
|
|
}
|
|
|
|
for k := range r.SourceMatchRE {
|
|
if !model.LabelNameRE.MatchString(k) {
|
|
return fmt.Errorf("invalid label name %q", k)
|
|
}
|
|
}
|
|
|
|
for k := range r.TargetMatch {
|
|
if !model.LabelNameRE.MatchString(k) {
|
|
return fmt.Errorf("invalid label name %q", k)
|
|
}
|
|
}
|
|
|
|
for k := range r.TargetMatchRE {
|
|
if !model.LabelNameRE.MatchString(k) {
|
|
return fmt.Errorf("invalid label name %q", k)
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// Receiver configuration provides configuration on how to contact a receiver.
|
|
type Receiver struct {
|
|
// A unique identifier for this receiver.
|
|
Name string `yaml:"name" json:"name"`
|
|
|
|
EmailConfigs []*EmailConfig `yaml:"email_configs,omitempty" json:"email_configs,omitempty"`
|
|
PagerdutyConfigs []*PagerdutyConfig `yaml:"pagerduty_configs,omitempty" json:"pagerduty_configs,omitempty"`
|
|
HipchatConfigs []*HipchatConfig `yaml:"hipchat_configs,omitempty" json:"hipchat_configs,omitempty"`
|
|
SlackConfigs []*SlackConfig `yaml:"slack_configs,omitempty" json:"slack_configs,omitempty"`
|
|
WebhookConfigs []*WebhookConfig `yaml:"webhook_configs,omitempty" json:"webhook_configs,omitempty"`
|
|
OpsGenieConfigs []*OpsGenieConfig `yaml:"opsgenie_configs,omitempty" json:"opsgenie_configs,omitempty"`
|
|
WechatConfigs []*WechatConfig `yaml:"wechat_configs,omitempty" json:"wechat_configs,omitempty"`
|
|
PushoverConfigs []*PushoverConfig `yaml:"pushover_configs,omitempty" json:"pushover_configs,omitempty"`
|
|
VictorOpsConfigs []*VictorOpsConfig `yaml:"victorops_configs,omitempty" json:"victorops_configs,omitempty"`
|
|
}
|
|
|
|
// UnmarshalYAML implements the yaml.Unmarshaler interface for Receiver.
|
|
func (c *Receiver) UnmarshalYAML(unmarshal func(interface{}) error) error {
|
|
type plain Receiver
|
|
if err := unmarshal((*plain)(c)); err != nil {
|
|
return err
|
|
}
|
|
if c.Name == "" {
|
|
return fmt.Errorf("missing name in receiver")
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Regexp encapsulates a regexp.Regexp and makes it YAML marshalable.
|
|
type Regexp struct {
|
|
*regexp.Regexp
|
|
}
|
|
|
|
// UnmarshalYAML implements the yaml.Unmarshaler interface for Regexp.
|
|
func (re *Regexp) UnmarshalYAML(unmarshal func(interface{}) error) error {
|
|
var s string
|
|
if err := unmarshal(&s); err != nil {
|
|
return err
|
|
}
|
|
regex, err := regexp.Compile("^(?:" + s + ")$")
|
|
if err != nil {
|
|
return err
|
|
}
|
|
re.Regexp = regex
|
|
return nil
|
|
}
|
|
|
|
// MarshalYAML implements the yaml.Marshaler interface for Regexp.
|
|
func (re Regexp) MarshalYAML() (interface{}, error) {
|
|
if re.Regexp != nil {
|
|
return re.String(), nil
|
|
}
|
|
return nil, nil
|
|
}
|
|
|
|
// UnmarshalJSON implements the json.Marshaler interface for Regexp
|
|
func (re *Regexp) UnmarshalJSON(data []byte) error {
|
|
var s string
|
|
if err := json.Unmarshal(data, &s); err != nil {
|
|
return err
|
|
}
|
|
regex, err := regexp.Compile("^(?:" + s + ")$")
|
|
if err != nil {
|
|
return err
|
|
}
|
|
re.Regexp = regex
|
|
return nil
|
|
}
|
|
|
|
// MarshalJSON implements the json.Marshaler interface for Regexp.
|
|
func (re Regexp) MarshalJSON() ([]byte, error) {
|
|
if re.Regexp != nil {
|
|
return json.Marshal(re.String())
|
|
}
|
|
return nil, nil
|
|
}
|