2020-04-27 23:19:27 +02:00
package main
import (
"context"
"flag"
"fmt"
"net/http"
"net/url"
"os"
2020-06-21 12:32:46 +02:00
"strconv"
2020-04-27 23:19:27 +02:00
"strings"
"time"
"github.com/VictoriaMetrics/VictoriaMetrics/app/vmalert/datasource"
"github.com/VictoriaMetrics/VictoriaMetrics/app/vmalert/notifier"
"github.com/VictoriaMetrics/VictoriaMetrics/app/vmalert/remotewrite"
"github.com/VictoriaMetrics/VictoriaMetrics/lib/buildinfo"
"github.com/VictoriaMetrics/VictoriaMetrics/lib/envflag"
2020-05-14 21:01:51 +02:00
"github.com/VictoriaMetrics/VictoriaMetrics/lib/fasttime"
2020-04-27 23:19:27 +02:00
"github.com/VictoriaMetrics/VictoriaMetrics/lib/flagutil"
"github.com/VictoriaMetrics/VictoriaMetrics/lib/httpserver"
"github.com/VictoriaMetrics/VictoriaMetrics/lib/logger"
"github.com/VictoriaMetrics/VictoriaMetrics/lib/procutil"
"github.com/VictoriaMetrics/metrics"
)
var (
rulePath = flagutil . NewArray ( "rule" , ` Path to the file with alert rules .
Supports patterns . Flag can be specified multiple times .
Examples :
- rule / path / to / file . Path to a single file with alerting rules
- rule dir / * . yaml - rule / * . yaml . Relative path to all . yaml files in "dir" folder ,
absolute path to all . yaml files in root . ` )
2020-06-06 22:27:09 +02:00
validateTemplates = flag . Bool ( "rule.validateTemplates" , true , "Whether to validate annotation and label templates" )
validateExpressions = flag . Bool ( "rule.validateExpressions" , true , "Whether to validate rules expressions via MetricsQL engine" )
httpListenAddr = flag . String ( "httpListenAddr" , ":8880" , "Address to listen for http connections" )
2020-05-04 23:51:22 +02:00
datasourceURL = flag . String ( "datasource.url" , "" , "Victoria Metrics or VMSelect url. Required parameter." +
" E.g. http://127.0.0.1:8428" )
basicAuthUsername = flag . String ( "datasource.basicAuth.username" , "" , "Optional basic auth username for -datasource.url" )
basicAuthPassword = flag . String ( "datasource.basicAuth.password" , "" , "Optional basic auth password for -datasource.url" )
2020-05-13 19:58:56 +02:00
remoteWriteURL = flag . String ( "remoteWrite.url" , "" , "Optional URL to Victoria Metrics or VMInsert where to persist alerts state" +
2020-06-09 14:21:20 +02:00
" and recording rules results in form of timeseries. E.g. http://127.0.0.1:8428" )
2020-05-13 20:32:21 +02:00
remoteWriteUsername = flag . String ( "remoteWrite.basicAuth.username" , "" , "Optional basic auth username for -remoteWrite.url" )
remoteWritePassword = flag . String ( "remoteWrite.basicAuth.password" , "" , "Optional basic auth password for -remoteWrite.url" )
2020-06-01 12:46:37 +02:00
remoteWriteMaxQueueSize = flag . Int ( "remoteWrite.maxQueueSize" , 1e5 , "Defines the max number of pending datapoints to remote write endpoint" )
remoteWriteMaxBatchSize = flag . Int ( "remoteWrite.maxBatchSize" , 1e3 , "Defines defines max number of timeseries to be flushed at once" )
2020-06-09 14:21:20 +02:00
remoteWriteConcurrency = flag . Int ( "remoteWrite.concurrency" , 1 , "Defines number of writers for concurrent writing into remote storage" )
2020-05-04 23:51:22 +02:00
2020-05-13 19:58:56 +02:00
remoteReadURL = flag . String ( "remoteRead.url" , "" , "Optional URL to Victoria Metrics or VMSelect that will be used to restore alerts" +
2020-05-13 20:32:21 +02:00
" state. This configuration makes sense only if `vmalert` was configured with `remoteWrite.url` before and has been successfully persisted its state." +
2020-05-04 23:51:22 +02:00
" E.g. http://127.0.0.1:8428" )
2020-05-13 20:32:21 +02:00
remoteReadUsername = flag . String ( "remoteRead.basicAuth.username" , "" , "Optional basic auth username for -remoteRead.url" )
remoteReadPassword = flag . String ( "remoteRead.basicAuth.password" , "" , "Optional basic auth password for -remoteRead.url" )
2020-05-13 19:58:56 +02:00
remoteReadLookBack = flag . Duration ( "remoteRead.lookback" , time . Hour , "Lookback defines how far to look into past for alerts timeseries." +
2020-05-04 23:51:22 +02:00
" For example, if lookback=1h then range from now() to now()-1h will be scanned." )
2020-06-21 12:32:46 +02:00
evaluationInterval = flag . Duration ( "evaluationInterval" , time . Minute , "How often to evaluate the rules" )
notifierURL = flag . String ( "notifier.url" , "" , "Prometheus alertmanager URL. Required parameter. e.g. http://127.0.0.1:9093" )
externalURL = flag . String ( "external.url" , "" , "External URL is used as alert's source for sent alerts to the notifier" )
externalAlertSource = flag . String ( "external.alert.source" , "" , ` External Alert Source allows to override the Source link for alerts sent to AlertManager for cases where you want to build a custom link to Grafana , Prometheus or any other service .
eg . ' explore ? orgId = 1 & left = [ \ "now-1h\",\"now\",\"VictoriaMetrics\",{\"expr\": \"{{$expr|quotesEscape|pathEscape}}\"},{\"mode\":\"Metrics\"},{\"ui\":[true,true,true,\"none\" ] } ] ' . If empty ' / api / v1 / : groupID / alertID / status ' is used ` )
2020-04-27 23:19:27 +02:00
)
func main ( ) {
2020-05-16 10:59:30 +02:00
// Write flags and help message to stdout, since it is easier to grep or pipe.
flag . CommandLine . SetOutput ( os . Stdout )
2020-06-05 09:42:56 +02:00
flag . Usage = usage
2020-04-27 23:19:27 +02:00
envflag . Parse ( )
buildinfo . Init ( )
logger . Init ( )
checkFlags ( )
ctx , cancel := context . WithCancel ( context . Background ( ) )
2020-04-27 23:33:55 +02:00
eu , err := getExternalURL ( * externalURL , * httpListenAddr , false )
2020-04-27 23:19:27 +02:00
if err != nil {
2020-05-10 18:58:17 +02:00
logger . Fatalf ( "can not get external url: %s " , err )
2020-04-27 23:19:27 +02:00
}
notifier . InitTemplateFunc ( eu )
2020-06-21 12:32:46 +02:00
aug , err := getAlertURLGenerator ( eu , * externalAlertSource , * validateTemplates )
if err != nil {
logger . Fatalf ( "URL generator error: %s" , err )
}
2020-04-27 23:19:27 +02:00
2020-05-10 18:58:17 +02:00
manager := & manager {
2020-06-21 12:32:46 +02:00
groups : make ( map [ uint64 ] * Group ) ,
storage : datasource . NewVMStorage ( * datasourceURL , * basicAuthUsername , * basicAuthPassword , & http . Client { } ) ,
notifier : notifier . NewAlertManager ( * notifierURL , aug , & http . Client { } ) ,
2020-04-27 23:19:27 +02:00
}
if * remoteWriteURL != "" {
c , err := remotewrite . NewClient ( ctx , remotewrite . Config {
Addr : * remoteWriteURL ,
2020-06-01 12:46:37 +02:00
Concurrency : * remoteWriteConcurrency ,
2020-05-13 19:58:56 +02:00
MaxQueueSize : * remoteWriteMaxQueueSize ,
2020-06-01 12:46:37 +02:00
MaxBatchSize : * remoteWriteMaxBatchSize ,
2020-04-27 23:19:27 +02:00
FlushInterval : * evaluationInterval ,
2020-05-04 23:51:22 +02:00
BasicAuthUser : * remoteWriteUsername ,
BasicAuthPass : * remoteWritePassword ,
2020-04-27 23:19:27 +02:00
} )
if err != nil {
logger . Fatalf ( "failed to init remotewrite client: %s" , err )
}
2020-05-10 18:58:17 +02:00
manager . rw = c
2020-04-27 23:19:27 +02:00
}
2020-05-04 23:51:22 +02:00
if * remoteReadURL != "" {
2020-05-10 18:58:17 +02:00
manager . rr = datasource . NewVMStorage ( * remoteReadURL , * remoteReadUsername , * remoteReadPassword , & http . Client { } )
2020-05-04 23:51:22 +02:00
}
2020-06-06 22:27:09 +02:00
if err := manager . start ( ctx , * rulePath , * validateTemplates , * validateExpressions ) ; err != nil {
2020-05-10 18:58:17 +02:00
logger . Fatalf ( "failed to start: %s" , err )
}
2020-05-09 11:32:12 +02:00
2020-05-10 18:58:17 +02:00
go func ( ) {
// init reload metrics with positive values to improve alerting conditions
configSuccess . Set ( 1 )
2020-05-14 21:01:51 +02:00
configTimestamp . Set ( fasttime . UnixTimestamp ( ) )
2020-05-10 18:58:17 +02:00
sigHup := procutil . NewSighupChan ( )
for {
<- sigHup
configReloads . Inc ( )
logger . Infof ( "SIGHUP received. Going to reload rules %q ..." , * rulePath )
2020-06-06 22:27:09 +02:00
if err := manager . update ( ctx , * rulePath , * validateTemplates , * validateExpressions , false ) ; err != nil {
2020-05-10 18:58:17 +02:00
configReloadErrors . Inc ( )
configSuccess . Set ( 0 )
logger . Errorf ( "error while reloading rules: %s" , err )
continue
}
configSuccess . Set ( 1 )
2020-05-14 21:01:51 +02:00
configTimestamp . Set ( fasttime . UnixTimestamp ( ) )
2020-05-10 18:58:17 +02:00
logger . Infof ( "Rules reloaded successfully from %q" , * rulePath )
}
} ( )
2020-05-09 11:32:12 +02:00
2020-05-10 18:58:17 +02:00
rh := & requestHandler { m : manager }
2020-05-18 10:55:16 +02:00
go httpserver . Serve ( * httpListenAddr , rh . handler )
2020-04-27 23:19:27 +02:00
sig := procutil . WaitForSigterm ( )
logger . Infof ( "service received signal %s" , sig )
if err := httpserver . Stop ( * httpListenAddr ) ; err != nil {
logger . Fatalf ( "cannot stop the webservice: %s" , err )
}
cancel ( )
2020-05-10 18:58:17 +02:00
manager . close ( )
2020-04-27 23:19:27 +02:00
}
var (
2020-05-10 18:58:17 +02:00
configReloads = metrics . NewCounter ( ` vmalert_config_last_reload_total ` )
configReloadErrors = metrics . NewCounter ( ` vmalert_config_last_reload_errors_total ` )
configSuccess = metrics . NewCounter ( ` vmalert_config_last_reload_successful ` )
configTimestamp = metrics . NewCounter ( ` vmalert_config_last_reload_success_timestamp_seconds ` )
2020-04-27 23:19:27 +02:00
)
func getExternalURL ( externalURL , httpListenAddr string , isSecure bool ) ( * url . URL , error ) {
if externalURL != "" {
return url . Parse ( externalURL )
}
hname , err := os . Hostname ( )
if err != nil {
return nil , err
}
port := ""
if ipport := strings . Split ( httpListenAddr , ":" ) ; len ( ipport ) > 1 {
port = ":" + ipport [ 1 ]
}
schema := "http://"
if isSecure {
schema = "https://"
}
return url . Parse ( fmt . Sprintf ( "%s%s%s" , schema , hname , port ) )
}
2020-06-21 12:32:46 +02:00
func getAlertURLGenerator ( externalURL * url . URL , externalAlertSource string , validateTemplate bool ) ( notifier . AlertURLGenerator , error ) {
if externalAlertSource == "" {
return func ( alert notifier . Alert ) string {
return fmt . Sprintf ( "%s/api/v1/%s/%s/status" , externalURL , strconv . FormatUint ( alert . GroupID , 10 ) , strconv . FormatUint ( alert . ID , 10 ) )
} , nil
}
if validateTemplate {
if err := notifier . ValidateTemplates ( map [ string ] string {
"tpl" : externalAlertSource ,
} ) ; err != nil {
return nil , fmt . Errorf ( "error validating source template %s:%w" , externalAlertSource , err )
}
}
m := map [ string ] string {
"tpl" : externalAlertSource ,
}
return func ( alert notifier . Alert ) string {
templated , err := alert . ExecTemplate ( m )
if err != nil {
logger . Errorf ( "can not exec source template %s" , err )
}
return fmt . Sprintf ( "%s/%s" , externalURL , templated [ "tpl" ] )
} , nil
}
2020-04-27 23:19:27 +02:00
func checkFlags ( ) {
if * notifierURL == "" {
flag . PrintDefaults ( )
logger . Fatalf ( "notifier.url is empty" )
}
if * datasourceURL == "" {
flag . PrintDefaults ( )
logger . Fatalf ( "datasource.url is empty" )
}
}
2020-06-05 09:42:56 +02:00
func usage ( ) {
const s = `
vmalert processes alerts and recording rules .
See the docs at https : //github.com/VictoriaMetrics/VictoriaMetrics/blob/master/app/vmalert/README.md .
`
f := flag . CommandLine . Output ( )
fmt . Fprintf ( f , "%s\n" , s )
flag . PrintDefaults ( )
}