mirror of
				https://github.com/prometheus/prometheus.git
				synced 2025-11-04 02:11:01 +01:00 
			
		
		
		
	
		
			
				
	
	
		
			768 lines
		
	
	
		
			20 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			768 lines
		
	
	
		
			20 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright 2013 The Prometheus Authors
 | 
						|
// Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
// you may not use this file except in compliance with the License.
 | 
						|
// You may obtain a copy of the License at
 | 
						|
//
 | 
						|
// http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
//
 | 
						|
// Unless required by applicable law or agreed to in writing, software
 | 
						|
// distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
// See the License for the specific language governing permissions and
 | 
						|
// limitations under the License.
 | 
						|
 | 
						|
package notifier
 | 
						|
 | 
						|
import (
 | 
						|
	"bytes"
 | 
						|
	"context"
 | 
						|
	"encoding/json"
 | 
						|
	"fmt"
 | 
						|
	"io"
 | 
						|
	"io/ioutil"
 | 
						|
	"net"
 | 
						|
	"net/http"
 | 
						|
	"net/url"
 | 
						|
	"path"
 | 
						|
	"strings"
 | 
						|
	"sync"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"github.com/go-kit/log"
 | 
						|
	"github.com/go-kit/log/level"
 | 
						|
	"github.com/go-openapi/strfmt"
 | 
						|
	"github.com/pkg/errors"
 | 
						|
	"github.com/prometheus/alertmanager/api/v2/models"
 | 
						|
	"github.com/prometheus/client_golang/prometheus"
 | 
						|
	config_util "github.com/prometheus/common/config"
 | 
						|
	"github.com/prometheus/common/model"
 | 
						|
	"github.com/prometheus/common/version"
 | 
						|
	"go.uber.org/atomic"
 | 
						|
 | 
						|
	"github.com/prometheus/prometheus/config"
 | 
						|
	"github.com/prometheus/prometheus/discovery/targetgroup"
 | 
						|
	"github.com/prometheus/prometheus/pkg/labels"
 | 
						|
	"github.com/prometheus/prometheus/pkg/relabel"
 | 
						|
)
 | 
						|
 | 
						|
const (
 | 
						|
	contentTypeJSON = "application/json"
 | 
						|
)
 | 
						|
 | 
						|
// String constants for instrumentation.
 | 
						|
const (
 | 
						|
	namespace         = "prometheus"
 | 
						|
	subsystem         = "notifications"
 | 
						|
	alertmanagerLabel = "alertmanager"
 | 
						|
)
 | 
						|
 | 
						|
var userAgent = fmt.Sprintf("Prometheus/%s", version.Version)
 | 
						|
 | 
						|
// Alert is a generic representation of an alert in the Prometheus eco-system.
 | 
						|
type Alert struct {
 | 
						|
	// Label value pairs for purpose of aggregation, matching, and disposition
 | 
						|
	// dispatching. This must minimally include an "alertname" label.
 | 
						|
	Labels labels.Labels `json:"labels"`
 | 
						|
 | 
						|
	// Extra key/value information which does not define alert identity.
 | 
						|
	Annotations labels.Labels `json:"annotations"`
 | 
						|
 | 
						|
	// The known time range for this alert. Both ends are optional.
 | 
						|
	StartsAt     time.Time `json:"startsAt,omitempty"`
 | 
						|
	EndsAt       time.Time `json:"endsAt,omitempty"`
 | 
						|
	GeneratorURL string    `json:"generatorURL,omitempty"`
 | 
						|
}
 | 
						|
 | 
						|
// Name returns the name of the alert. It is equivalent to the "alertname" label.
 | 
						|
func (a *Alert) Name() string {
 | 
						|
	return a.Labels.Get(labels.AlertName)
 | 
						|
}
 | 
						|
 | 
						|
// Hash returns a hash over the alert. It is equivalent to the alert labels hash.
 | 
						|
func (a *Alert) Hash() uint64 {
 | 
						|
	return a.Labels.Hash()
 | 
						|
}
 | 
						|
 | 
						|
func (a *Alert) String() string {
 | 
						|
	s := fmt.Sprintf("%s[%s]", a.Name(), fmt.Sprintf("%016x", a.Hash())[:7])
 | 
						|
	if a.Resolved() {
 | 
						|
		return s + "[resolved]"
 | 
						|
	}
 | 
						|
	return s + "[active]"
 | 
						|
}
 | 
						|
 | 
						|
// Resolved returns true iff the activity interval ended in the past.
 | 
						|
func (a *Alert) Resolved() bool {
 | 
						|
	return a.ResolvedAt(time.Now())
 | 
						|
}
 | 
						|
 | 
						|
// ResolvedAt returns true iff the activity interval ended before
 | 
						|
// the given timestamp.
 | 
						|
func (a *Alert) ResolvedAt(ts time.Time) bool {
 | 
						|
	if a.EndsAt.IsZero() {
 | 
						|
		return false
 | 
						|
	}
 | 
						|
	return !a.EndsAt.After(ts)
 | 
						|
}
 | 
						|
 | 
						|
// Manager is responsible for dispatching alert notifications to an
 | 
						|
// alert manager service.
 | 
						|
type Manager struct {
 | 
						|
	queue []*Alert
 | 
						|
	opts  *Options
 | 
						|
 | 
						|
	metrics *alertMetrics
 | 
						|
 | 
						|
	more   chan struct{}
 | 
						|
	mtx    sync.RWMutex
 | 
						|
	ctx    context.Context
 | 
						|
	cancel func()
 | 
						|
 | 
						|
	alertmanagers map[string]*alertmanagerSet
 | 
						|
	logger        log.Logger
 | 
						|
}
 | 
						|
 | 
						|
// Options are the configurable parameters of a Handler.
 | 
						|
type Options struct {
 | 
						|
	QueueCapacity  int
 | 
						|
	ExternalLabels labels.Labels
 | 
						|
	RelabelConfigs []*relabel.Config
 | 
						|
	// Used for sending HTTP requests to the Alertmanager.
 | 
						|
	Do func(ctx context.Context, client *http.Client, req *http.Request) (*http.Response, error)
 | 
						|
 | 
						|
	Registerer prometheus.Registerer
 | 
						|
}
 | 
						|
 | 
						|
type alertMetrics struct {
 | 
						|
	latency                 *prometheus.SummaryVec
 | 
						|
	errors                  *prometheus.CounterVec
 | 
						|
	sent                    *prometheus.CounterVec
 | 
						|
	dropped                 prometheus.Counter
 | 
						|
	queueLength             prometheus.GaugeFunc
 | 
						|
	queueCapacity           prometheus.Gauge
 | 
						|
	alertmanagersDiscovered prometheus.GaugeFunc
 | 
						|
}
 | 
						|
 | 
						|
func newAlertMetrics(r prometheus.Registerer, queueCap int, queueLen, alertmanagersDiscovered func() float64) *alertMetrics {
 | 
						|
	m := &alertMetrics{
 | 
						|
		latency: prometheus.NewSummaryVec(prometheus.SummaryOpts{
 | 
						|
			Namespace:  namespace,
 | 
						|
			Subsystem:  subsystem,
 | 
						|
			Name:       "latency_seconds",
 | 
						|
			Help:       "Latency quantiles for sending alert notifications.",
 | 
						|
			Objectives: map[float64]float64{0.5: 0.05, 0.9: 0.01, 0.99: 0.001},
 | 
						|
		},
 | 
						|
			[]string{alertmanagerLabel},
 | 
						|
		),
 | 
						|
		errors: prometheus.NewCounterVec(prometheus.CounterOpts{
 | 
						|
			Namespace: namespace,
 | 
						|
			Subsystem: subsystem,
 | 
						|
			Name:      "errors_total",
 | 
						|
			Help:      "Total number of errors sending alert notifications.",
 | 
						|
		},
 | 
						|
			[]string{alertmanagerLabel},
 | 
						|
		),
 | 
						|
		sent: prometheus.NewCounterVec(prometheus.CounterOpts{
 | 
						|
			Namespace: namespace,
 | 
						|
			Subsystem: subsystem,
 | 
						|
			Name:      "sent_total",
 | 
						|
			Help:      "Total number of alerts sent.",
 | 
						|
		},
 | 
						|
			[]string{alertmanagerLabel},
 | 
						|
		),
 | 
						|
		dropped: prometheus.NewCounter(prometheus.CounterOpts{
 | 
						|
			Namespace: namespace,
 | 
						|
			Subsystem: subsystem,
 | 
						|
			Name:      "dropped_total",
 | 
						|
			Help:      "Total number of alerts dropped due to errors when sending to Alertmanager.",
 | 
						|
		}),
 | 
						|
		queueLength: prometheus.NewGaugeFunc(prometheus.GaugeOpts{
 | 
						|
			Namespace: namespace,
 | 
						|
			Subsystem: subsystem,
 | 
						|
			Name:      "queue_length",
 | 
						|
			Help:      "The number of alert notifications in the queue.",
 | 
						|
		}, queueLen),
 | 
						|
		queueCapacity: prometheus.NewGauge(prometheus.GaugeOpts{
 | 
						|
			Namespace: namespace,
 | 
						|
			Subsystem: subsystem,
 | 
						|
			Name:      "queue_capacity",
 | 
						|
			Help:      "The capacity of the alert notifications queue.",
 | 
						|
		}),
 | 
						|
		alertmanagersDiscovered: prometheus.NewGaugeFunc(prometheus.GaugeOpts{
 | 
						|
			Name: "prometheus_notifications_alertmanagers_discovered",
 | 
						|
			Help: "The number of alertmanagers discovered and active.",
 | 
						|
		}, alertmanagersDiscovered),
 | 
						|
	}
 | 
						|
 | 
						|
	m.queueCapacity.Set(float64(queueCap))
 | 
						|
 | 
						|
	if r != nil {
 | 
						|
		r.MustRegister(
 | 
						|
			m.latency,
 | 
						|
			m.errors,
 | 
						|
			m.sent,
 | 
						|
			m.dropped,
 | 
						|
			m.queueLength,
 | 
						|
			m.queueCapacity,
 | 
						|
			m.alertmanagersDiscovered,
 | 
						|
		)
 | 
						|
	}
 | 
						|
 | 
						|
	return m
 | 
						|
}
 | 
						|
 | 
						|
func do(ctx context.Context, client *http.Client, req *http.Request) (*http.Response, error) {
 | 
						|
	if client == nil {
 | 
						|
		client = http.DefaultClient
 | 
						|
	}
 | 
						|
	return client.Do(req.WithContext(ctx))
 | 
						|
}
 | 
						|
 | 
						|
// NewManager is the manager constructor.
 | 
						|
func NewManager(o *Options, logger log.Logger) *Manager {
 | 
						|
	ctx, cancel := context.WithCancel(context.Background())
 | 
						|
 | 
						|
	if o.Do == nil {
 | 
						|
		o.Do = do
 | 
						|
	}
 | 
						|
	if logger == nil {
 | 
						|
		logger = log.NewNopLogger()
 | 
						|
	}
 | 
						|
 | 
						|
	n := &Manager{
 | 
						|
		queue:  make([]*Alert, 0, o.QueueCapacity),
 | 
						|
		ctx:    ctx,
 | 
						|
		cancel: cancel,
 | 
						|
		more:   make(chan struct{}, 1),
 | 
						|
		opts:   o,
 | 
						|
		logger: logger,
 | 
						|
	}
 | 
						|
 | 
						|
	queueLenFunc := func() float64 { return float64(n.queueLen()) }
 | 
						|
	alertmanagersDiscoveredFunc := func() float64 { return float64(len(n.Alertmanagers())) }
 | 
						|
 | 
						|
	n.metrics = newAlertMetrics(
 | 
						|
		o.Registerer,
 | 
						|
		o.QueueCapacity,
 | 
						|
		queueLenFunc,
 | 
						|
		alertmanagersDiscoveredFunc,
 | 
						|
	)
 | 
						|
 | 
						|
	return n
 | 
						|
}
 | 
						|
 | 
						|
// ApplyConfig updates the status state as the new config requires.
 | 
						|
func (n *Manager) ApplyConfig(conf *config.Config) error {
 | 
						|
	n.mtx.Lock()
 | 
						|
	defer n.mtx.Unlock()
 | 
						|
 | 
						|
	n.opts.ExternalLabels = conf.GlobalConfig.ExternalLabels
 | 
						|
	n.opts.RelabelConfigs = conf.AlertingConfig.AlertRelabelConfigs
 | 
						|
 | 
						|
	amSets := make(map[string]*alertmanagerSet)
 | 
						|
 | 
						|
	for k, cfg := range conf.AlertingConfig.AlertmanagerConfigs.ToMap() {
 | 
						|
		ams, err := newAlertmanagerSet(cfg, n.logger, n.metrics)
 | 
						|
		if err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
 | 
						|
		amSets[k] = ams
 | 
						|
	}
 | 
						|
 | 
						|
	n.alertmanagers = amSets
 | 
						|
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
const maxBatchSize = 64
 | 
						|
 | 
						|
func (n *Manager) queueLen() int {
 | 
						|
	n.mtx.RLock()
 | 
						|
	defer n.mtx.RUnlock()
 | 
						|
 | 
						|
	return len(n.queue)
 | 
						|
}
 | 
						|
 | 
						|
func (n *Manager) nextBatch() []*Alert {
 | 
						|
	n.mtx.Lock()
 | 
						|
	defer n.mtx.Unlock()
 | 
						|
 | 
						|
	var alerts []*Alert
 | 
						|
 | 
						|
	if len(n.queue) > maxBatchSize {
 | 
						|
		alerts = append(make([]*Alert, 0, maxBatchSize), n.queue[:maxBatchSize]...)
 | 
						|
		n.queue = n.queue[maxBatchSize:]
 | 
						|
	} else {
 | 
						|
		alerts = append(make([]*Alert, 0, len(n.queue)), n.queue...)
 | 
						|
		n.queue = n.queue[:0]
 | 
						|
	}
 | 
						|
 | 
						|
	return alerts
 | 
						|
}
 | 
						|
 | 
						|
// Run dispatches notifications continuously.
 | 
						|
func (n *Manager) Run(tsets <-chan map[string][]*targetgroup.Group) {
 | 
						|
 | 
						|
	for {
 | 
						|
		select {
 | 
						|
		case <-n.ctx.Done():
 | 
						|
			return
 | 
						|
		case ts := <-tsets:
 | 
						|
			n.reload(ts)
 | 
						|
		case <-n.more:
 | 
						|
		}
 | 
						|
		alerts := n.nextBatch()
 | 
						|
 | 
						|
		if !n.sendAll(alerts...) {
 | 
						|
			n.metrics.dropped.Add(float64(len(alerts)))
 | 
						|
		}
 | 
						|
		// If the queue still has items left, kick off the next iteration.
 | 
						|
		if n.queueLen() > 0 {
 | 
						|
			n.setMore()
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func (n *Manager) reload(tgs map[string][]*targetgroup.Group) {
 | 
						|
	n.mtx.Lock()
 | 
						|
	defer n.mtx.Unlock()
 | 
						|
 | 
						|
	for id, tgroup := range tgs {
 | 
						|
		am, ok := n.alertmanagers[id]
 | 
						|
		if !ok {
 | 
						|
			level.Error(n.logger).Log("msg", "couldn't sync alert manager set", "err", fmt.Sprintf("invalid id:%v", id))
 | 
						|
			continue
 | 
						|
		}
 | 
						|
		am.sync(tgroup)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// Send queues the given notification requests for processing.
 | 
						|
// Panics if called on a handler that is not running.
 | 
						|
func (n *Manager) Send(alerts ...*Alert) {
 | 
						|
	n.mtx.Lock()
 | 
						|
	defer n.mtx.Unlock()
 | 
						|
 | 
						|
	// Attach external labels before relabelling and sending.
 | 
						|
	for _, a := range alerts {
 | 
						|
		lb := labels.NewBuilder(a.Labels)
 | 
						|
 | 
						|
		for _, l := range n.opts.ExternalLabels {
 | 
						|
			if a.Labels.Get(l.Name) == "" {
 | 
						|
				lb.Set(l.Name, l.Value)
 | 
						|
			}
 | 
						|
		}
 | 
						|
 | 
						|
		a.Labels = lb.Labels()
 | 
						|
	}
 | 
						|
 | 
						|
	alerts = n.relabelAlerts(alerts)
 | 
						|
	if len(alerts) == 0 {
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	// Queue capacity should be significantly larger than a single alert
 | 
						|
	// batch could be.
 | 
						|
	if d := len(alerts) - n.opts.QueueCapacity; d > 0 {
 | 
						|
		alerts = alerts[d:]
 | 
						|
 | 
						|
		level.Warn(n.logger).Log("msg", "Alert batch larger than queue capacity, dropping alerts", "num_dropped", d)
 | 
						|
		n.metrics.dropped.Add(float64(d))
 | 
						|
	}
 | 
						|
 | 
						|
	// If the queue is full, remove the oldest alerts in favor
 | 
						|
	// of newer ones.
 | 
						|
	if d := (len(n.queue) + len(alerts)) - n.opts.QueueCapacity; d > 0 {
 | 
						|
		n.queue = n.queue[d:]
 | 
						|
 | 
						|
		level.Warn(n.logger).Log("msg", "Alert notification queue full, dropping alerts", "num_dropped", d)
 | 
						|
		n.metrics.dropped.Add(float64(d))
 | 
						|
	}
 | 
						|
	n.queue = append(n.queue, alerts...)
 | 
						|
 | 
						|
	// Notify sending goroutine that there are alerts to be processed.
 | 
						|
	n.setMore()
 | 
						|
}
 | 
						|
 | 
						|
func (n *Manager) relabelAlerts(alerts []*Alert) []*Alert {
 | 
						|
	var relabeledAlerts []*Alert
 | 
						|
 | 
						|
	for _, alert := range alerts {
 | 
						|
		labels := relabel.Process(alert.Labels, n.opts.RelabelConfigs...)
 | 
						|
		if labels != nil {
 | 
						|
			alert.Labels = labels
 | 
						|
			relabeledAlerts = append(relabeledAlerts, alert)
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return relabeledAlerts
 | 
						|
}
 | 
						|
 | 
						|
// setMore signals that the alert queue has items.
 | 
						|
func (n *Manager) setMore() {
 | 
						|
	// If we cannot send on the channel, it means the signal already exists
 | 
						|
	// and has not been consumed yet.
 | 
						|
	select {
 | 
						|
	case n.more <- struct{}{}:
 | 
						|
	default:
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// Alertmanagers returns a slice of Alertmanager URLs.
 | 
						|
func (n *Manager) Alertmanagers() []*url.URL {
 | 
						|
	n.mtx.RLock()
 | 
						|
	amSets := n.alertmanagers
 | 
						|
	n.mtx.RUnlock()
 | 
						|
 | 
						|
	var res []*url.URL
 | 
						|
 | 
						|
	for _, ams := range amSets {
 | 
						|
		ams.mtx.RLock()
 | 
						|
		for _, am := range ams.ams {
 | 
						|
			res = append(res, am.url())
 | 
						|
		}
 | 
						|
		ams.mtx.RUnlock()
 | 
						|
	}
 | 
						|
 | 
						|
	return res
 | 
						|
}
 | 
						|
 | 
						|
// DroppedAlertmanagers returns a slice of Alertmanager URLs.
 | 
						|
func (n *Manager) DroppedAlertmanagers() []*url.URL {
 | 
						|
	n.mtx.RLock()
 | 
						|
	amSets := n.alertmanagers
 | 
						|
	n.mtx.RUnlock()
 | 
						|
 | 
						|
	var res []*url.URL
 | 
						|
 | 
						|
	for _, ams := range amSets {
 | 
						|
		ams.mtx.RLock()
 | 
						|
		for _, dam := range ams.droppedAms {
 | 
						|
			res = append(res, dam.url())
 | 
						|
		}
 | 
						|
		ams.mtx.RUnlock()
 | 
						|
	}
 | 
						|
 | 
						|
	return res
 | 
						|
}
 | 
						|
 | 
						|
// sendAll sends the alerts to all configured Alertmanagers concurrently.
 | 
						|
// It returns true if the alerts could be sent successfully to at least one Alertmanager.
 | 
						|
func (n *Manager) sendAll(alerts ...*Alert) bool {
 | 
						|
	if len(alerts) == 0 {
 | 
						|
		return true
 | 
						|
	}
 | 
						|
 | 
						|
	begin := time.Now()
 | 
						|
 | 
						|
	// v1Payload and v2Payload represent 'alerts' marshaled for Alertmanager API
 | 
						|
	// v1 or v2. Marshaling happens below. Reference here is for caching between
 | 
						|
	// for loop iterations.
 | 
						|
	var v1Payload, v2Payload []byte
 | 
						|
 | 
						|
	n.mtx.RLock()
 | 
						|
	amSets := n.alertmanagers
 | 
						|
	n.mtx.RUnlock()
 | 
						|
 | 
						|
	var (
 | 
						|
		wg         sync.WaitGroup
 | 
						|
		numSuccess atomic.Uint64
 | 
						|
	)
 | 
						|
	for _, ams := range amSets {
 | 
						|
		var (
 | 
						|
			payload []byte
 | 
						|
			err     error
 | 
						|
		)
 | 
						|
 | 
						|
		ams.mtx.RLock()
 | 
						|
 | 
						|
		switch ams.cfg.APIVersion {
 | 
						|
		case config.AlertmanagerAPIVersionV1:
 | 
						|
			{
 | 
						|
				if v1Payload == nil {
 | 
						|
					v1Payload, err = json.Marshal(alerts)
 | 
						|
					if err != nil {
 | 
						|
						level.Error(n.logger).Log("msg", "Encoding alerts for Alertmanager API v1 failed", "err", err)
 | 
						|
						ams.mtx.RUnlock()
 | 
						|
						return false
 | 
						|
					}
 | 
						|
				}
 | 
						|
 | 
						|
				payload = v1Payload
 | 
						|
			}
 | 
						|
		case config.AlertmanagerAPIVersionV2:
 | 
						|
			{
 | 
						|
				if v2Payload == nil {
 | 
						|
					openAPIAlerts := alertsToOpenAPIAlerts(alerts)
 | 
						|
 | 
						|
					v2Payload, err = json.Marshal(openAPIAlerts)
 | 
						|
					if err != nil {
 | 
						|
						level.Error(n.logger).Log("msg", "Encoding alerts for Alertmanager API v2 failed", "err", err)
 | 
						|
						ams.mtx.RUnlock()
 | 
						|
						return false
 | 
						|
					}
 | 
						|
				}
 | 
						|
 | 
						|
				payload = v2Payload
 | 
						|
			}
 | 
						|
		default:
 | 
						|
			{
 | 
						|
				level.Error(n.logger).Log(
 | 
						|
					"msg", fmt.Sprintf("Invalid Alertmanager API version '%v', expected one of '%v'", ams.cfg.APIVersion, config.SupportedAlertmanagerAPIVersions),
 | 
						|
					"err", err,
 | 
						|
				)
 | 
						|
				ams.mtx.RUnlock()
 | 
						|
				return false
 | 
						|
			}
 | 
						|
		}
 | 
						|
 | 
						|
		for _, am := range ams.ams {
 | 
						|
			wg.Add(1)
 | 
						|
 | 
						|
			ctx, cancel := context.WithTimeout(n.ctx, time.Duration(ams.cfg.Timeout))
 | 
						|
			defer cancel()
 | 
						|
 | 
						|
			go func(client *http.Client, url string) {
 | 
						|
				if err := n.sendOne(ctx, client, url, payload); err != nil {
 | 
						|
					level.Error(n.logger).Log("alertmanager", url, "count", len(alerts), "msg", "Error sending alert", "err", err)
 | 
						|
					n.metrics.errors.WithLabelValues(url).Inc()
 | 
						|
				} else {
 | 
						|
					numSuccess.Inc()
 | 
						|
				}
 | 
						|
				n.metrics.latency.WithLabelValues(url).Observe(time.Since(begin).Seconds())
 | 
						|
				n.metrics.sent.WithLabelValues(url).Add(float64(len(alerts)))
 | 
						|
 | 
						|
				wg.Done()
 | 
						|
			}(ams.client, am.url().String())
 | 
						|
		}
 | 
						|
 | 
						|
		ams.mtx.RUnlock()
 | 
						|
	}
 | 
						|
 | 
						|
	wg.Wait()
 | 
						|
 | 
						|
	return numSuccess.Load() > 0
 | 
						|
}
 | 
						|
 | 
						|
func alertsToOpenAPIAlerts(alerts []*Alert) models.PostableAlerts {
 | 
						|
	openAPIAlerts := models.PostableAlerts{}
 | 
						|
	for _, a := range alerts {
 | 
						|
		start := strfmt.DateTime(a.StartsAt)
 | 
						|
		end := strfmt.DateTime(a.EndsAt)
 | 
						|
		openAPIAlerts = append(openAPIAlerts, &models.PostableAlert{
 | 
						|
			Annotations: labelsToOpenAPILabelSet(a.Annotations),
 | 
						|
			EndsAt:      end,
 | 
						|
			StartsAt:    start,
 | 
						|
			Alert: models.Alert{
 | 
						|
				GeneratorURL: strfmt.URI(a.GeneratorURL),
 | 
						|
				Labels:       labelsToOpenAPILabelSet(a.Labels),
 | 
						|
			},
 | 
						|
		})
 | 
						|
	}
 | 
						|
 | 
						|
	return openAPIAlerts
 | 
						|
}
 | 
						|
 | 
						|
func labelsToOpenAPILabelSet(modelLabelSet labels.Labels) models.LabelSet {
 | 
						|
	apiLabelSet := models.LabelSet{}
 | 
						|
	for _, label := range modelLabelSet {
 | 
						|
		apiLabelSet[label.Name] = label.Value
 | 
						|
	}
 | 
						|
 | 
						|
	return apiLabelSet
 | 
						|
}
 | 
						|
 | 
						|
func (n *Manager) sendOne(ctx context.Context, c *http.Client, url string, b []byte) error {
 | 
						|
	req, err := http.NewRequest("POST", url, bytes.NewReader(b))
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
	req.Header.Set("User-Agent", userAgent)
 | 
						|
	req.Header.Set("Content-Type", contentTypeJSON)
 | 
						|
	resp, err := n.opts.Do(ctx, c, req)
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
	defer func() {
 | 
						|
		io.Copy(ioutil.Discard, resp.Body)
 | 
						|
		resp.Body.Close()
 | 
						|
	}()
 | 
						|
 | 
						|
	// Any HTTP status 2xx is OK.
 | 
						|
	if resp.StatusCode/100 != 2 {
 | 
						|
		return errors.Errorf("bad response status %s", resp.Status)
 | 
						|
	}
 | 
						|
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
// Stop shuts down the notification handler.
 | 
						|
func (n *Manager) Stop() {
 | 
						|
	level.Info(n.logger).Log("msg", "Stopping notification manager...")
 | 
						|
	n.cancel()
 | 
						|
}
 | 
						|
 | 
						|
// alertmanager holds Alertmanager endpoint information.
 | 
						|
type alertmanager interface {
 | 
						|
	url() *url.URL
 | 
						|
}
 | 
						|
 | 
						|
type alertmanagerLabels struct{ labels.Labels }
 | 
						|
 | 
						|
const pathLabel = "__alerts_path__"
 | 
						|
 | 
						|
func (a alertmanagerLabels) url() *url.URL {
 | 
						|
	return &url.URL{
 | 
						|
		Scheme: a.Get(model.SchemeLabel),
 | 
						|
		Host:   a.Get(model.AddressLabel),
 | 
						|
		Path:   a.Get(pathLabel),
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// alertmanagerSet contains a set of Alertmanagers discovered via a group of service
 | 
						|
// discovery definitions that have a common configuration on how alerts should be sent.
 | 
						|
type alertmanagerSet struct {
 | 
						|
	cfg    *config.AlertmanagerConfig
 | 
						|
	client *http.Client
 | 
						|
 | 
						|
	metrics *alertMetrics
 | 
						|
 | 
						|
	mtx        sync.RWMutex
 | 
						|
	ams        []alertmanager
 | 
						|
	droppedAms []alertmanager
 | 
						|
	logger     log.Logger
 | 
						|
}
 | 
						|
 | 
						|
func newAlertmanagerSet(cfg *config.AlertmanagerConfig, logger log.Logger, metrics *alertMetrics) (*alertmanagerSet, error) {
 | 
						|
	client, err := config_util.NewClientFromConfig(cfg.HTTPClientConfig, "alertmanager", config_util.WithHTTP2Disabled())
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
	s := &alertmanagerSet{
 | 
						|
		client:  client,
 | 
						|
		cfg:     cfg,
 | 
						|
		logger:  logger,
 | 
						|
		metrics: metrics,
 | 
						|
	}
 | 
						|
	return s, nil
 | 
						|
}
 | 
						|
 | 
						|
// sync extracts a deduplicated set of Alertmanager endpoints from a list
 | 
						|
// of target groups definitions.
 | 
						|
func (s *alertmanagerSet) sync(tgs []*targetgroup.Group) {
 | 
						|
	allAms := []alertmanager{}
 | 
						|
	allDroppedAms := []alertmanager{}
 | 
						|
 | 
						|
	for _, tg := range tgs {
 | 
						|
		ams, droppedAms, err := alertmanagerFromGroup(tg, s.cfg)
 | 
						|
		if err != nil {
 | 
						|
			level.Error(s.logger).Log("msg", "Creating discovered Alertmanagers failed", "err", err)
 | 
						|
			continue
 | 
						|
		}
 | 
						|
		allAms = append(allAms, ams...)
 | 
						|
		allDroppedAms = append(allDroppedAms, droppedAms...)
 | 
						|
	}
 | 
						|
 | 
						|
	s.mtx.Lock()
 | 
						|
	defer s.mtx.Unlock()
 | 
						|
	// Set new Alertmanagers and deduplicate them along their unique URL.
 | 
						|
	s.ams = []alertmanager{}
 | 
						|
	s.droppedAms = []alertmanager{}
 | 
						|
	s.droppedAms = append(s.droppedAms, allDroppedAms...)
 | 
						|
	seen := map[string]struct{}{}
 | 
						|
 | 
						|
	for _, am := range allAms {
 | 
						|
		us := am.url().String()
 | 
						|
		if _, ok := seen[us]; ok {
 | 
						|
			continue
 | 
						|
		}
 | 
						|
 | 
						|
		// This will initialize the Counters for the AM to 0.
 | 
						|
		s.metrics.sent.WithLabelValues(us)
 | 
						|
		s.metrics.errors.WithLabelValues(us)
 | 
						|
 | 
						|
		seen[us] = struct{}{}
 | 
						|
		s.ams = append(s.ams, am)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func postPath(pre string, v config.AlertmanagerAPIVersion) string {
 | 
						|
	alertPushEndpoint := fmt.Sprintf("/api/%v/alerts", string(v))
 | 
						|
	return path.Join("/", pre, alertPushEndpoint)
 | 
						|
}
 | 
						|
 | 
						|
// alertmanagerFromGroup extracts a list of alertmanagers from a target group
 | 
						|
// and an associated AlertmanagerConfig.
 | 
						|
func alertmanagerFromGroup(tg *targetgroup.Group, cfg *config.AlertmanagerConfig) ([]alertmanager, []alertmanager, error) {
 | 
						|
	var res []alertmanager
 | 
						|
	var droppedAlertManagers []alertmanager
 | 
						|
 | 
						|
	for _, tlset := range tg.Targets {
 | 
						|
		lbls := make([]labels.Label, 0, len(tlset)+2+len(tg.Labels))
 | 
						|
 | 
						|
		for ln, lv := range tlset {
 | 
						|
			lbls = append(lbls, labels.Label{Name: string(ln), Value: string(lv)})
 | 
						|
		}
 | 
						|
		// Set configured scheme as the initial scheme label for overwrite.
 | 
						|
		lbls = append(lbls, labels.Label{Name: model.SchemeLabel, Value: cfg.Scheme})
 | 
						|
		lbls = append(lbls, labels.Label{Name: pathLabel, Value: postPath(cfg.PathPrefix, cfg.APIVersion)})
 | 
						|
 | 
						|
		// Combine target labels with target group labels.
 | 
						|
		for ln, lv := range tg.Labels {
 | 
						|
			if _, ok := tlset[ln]; !ok {
 | 
						|
				lbls = append(lbls, labels.Label{Name: string(ln), Value: string(lv)})
 | 
						|
			}
 | 
						|
		}
 | 
						|
 | 
						|
		lset := relabel.Process(labels.New(lbls...), cfg.RelabelConfigs...)
 | 
						|
		if lset == nil {
 | 
						|
			droppedAlertManagers = append(droppedAlertManagers, alertmanagerLabels{lbls})
 | 
						|
			continue
 | 
						|
		}
 | 
						|
 | 
						|
		lb := labels.NewBuilder(lset)
 | 
						|
 | 
						|
		// addPort checks whether we should add a default port to the address.
 | 
						|
		// If the address is not valid, we don't append a port either.
 | 
						|
		addPort := func(s string) bool {
 | 
						|
			// If we can split, a port exists and we don't have to add one.
 | 
						|
			if _, _, err := net.SplitHostPort(s); err == nil {
 | 
						|
				return false
 | 
						|
			}
 | 
						|
			// If adding a port makes it valid, the previous error
 | 
						|
			// was not due to an invalid address and we can append a port.
 | 
						|
			_, _, err := net.SplitHostPort(s + ":1234")
 | 
						|
			return err == nil
 | 
						|
		}
 | 
						|
		addr := lset.Get(model.AddressLabel)
 | 
						|
		// If it's an address with no trailing port, infer it based on the used scheme.
 | 
						|
		if addPort(addr) {
 | 
						|
			// Addresses reaching this point are already wrapped in [] if necessary.
 | 
						|
			switch lset.Get(model.SchemeLabel) {
 | 
						|
			case "http", "":
 | 
						|
				addr = addr + ":80"
 | 
						|
			case "https":
 | 
						|
				addr = addr + ":443"
 | 
						|
			default:
 | 
						|
				return nil, nil, errors.Errorf("invalid scheme: %q", cfg.Scheme)
 | 
						|
			}
 | 
						|
			lb.Set(model.AddressLabel, addr)
 | 
						|
		}
 | 
						|
 | 
						|
		if err := config.CheckTargetAddress(model.LabelValue(addr)); err != nil {
 | 
						|
			return nil, nil, err
 | 
						|
		}
 | 
						|
 | 
						|
		// Meta labels are deleted after relabelling. Other internal labels propagate to
 | 
						|
		// the target which decides whether they will be part of their label set.
 | 
						|
		for _, l := range lset {
 | 
						|
			if strings.HasPrefix(l.Name, model.MetaLabelPrefix) {
 | 
						|
				lb.Del(l.Name)
 | 
						|
			}
 | 
						|
		}
 | 
						|
 | 
						|
		res = append(res, alertmanagerLabels{lset})
 | 
						|
	}
 | 
						|
	return res, droppedAlertManagers, nil
 | 
						|
}
 |