* Alerting: No longer silence paused alerts during legacy migration Now that we migrate paused legacy alerts to paused UA alert rules, we no longer need to silence them.
393 lines
13 KiB
Go
393 lines
13 KiB
Go
package ualert
|
|
|
|
import (
|
|
"encoding/json"
|
|
"fmt"
|
|
"time"
|
|
|
|
"github.com/grafana/grafana/pkg/components/simplejson"
|
|
"github.com/grafana/grafana/pkg/infra/log"
|
|
legacymodels "github.com/grafana/grafana/pkg/services/alerting/models"
|
|
ngmodels "github.com/grafana/grafana/pkg/services/ngalert/models"
|
|
"github.com/grafana/grafana/pkg/tsdb/graphite"
|
|
)
|
|
|
|
const (
|
|
// ContactLabel is a private label created during migration and used in notification policies.
|
|
// It stores a string array of all contact point names an alert rule should send to.
|
|
// It was created as a means to simplify post-migration notification policies.
|
|
ContactLabel = "__contacts__"
|
|
)
|
|
|
|
type alertRule struct {
|
|
ID int64 `xorm:"pk autoincr 'id'"`
|
|
OrgID int64 `xorm:"org_id"`
|
|
Title string
|
|
Condition string
|
|
Data []alertQuery
|
|
IntervalSeconds int64
|
|
Version int64
|
|
UID string `xorm:"uid"`
|
|
NamespaceUID string `xorm:"namespace_uid"`
|
|
RuleGroup string
|
|
RuleGroupIndex int `xorm:"rule_group_idx"`
|
|
NoDataState string
|
|
ExecErrState string
|
|
For duration
|
|
Updated time.Time
|
|
Annotations map[string]string
|
|
Labels map[string]string
|
|
IsPaused bool
|
|
}
|
|
|
|
type alertRuleVersion struct {
|
|
RuleOrgID int64 `xorm:"rule_org_id"`
|
|
RuleUID string `xorm:"rule_uid"`
|
|
RuleNamespaceUID string `xorm:"rule_namespace_uid"`
|
|
RuleGroup string
|
|
RuleGroupIndex int `xorm:"rule_group_idx"`
|
|
ParentVersion int64
|
|
RestoredFrom int64
|
|
Version int64
|
|
|
|
Created time.Time
|
|
Title string
|
|
Condition string
|
|
Data []alertQuery
|
|
IntervalSeconds int64
|
|
NoDataState string
|
|
ExecErrState string
|
|
// ideally this field should have been apimodels.ApiDuration
|
|
// but this is currently not possible because of circular dependencies
|
|
For duration
|
|
Annotations map[string]string
|
|
Labels map[string]string
|
|
IsPaused bool
|
|
}
|
|
|
|
func (a *alertRule) makeVersion() *alertRuleVersion {
|
|
return &alertRuleVersion{
|
|
RuleOrgID: a.OrgID,
|
|
RuleUID: a.UID,
|
|
RuleNamespaceUID: a.NamespaceUID,
|
|
RuleGroup: a.RuleGroup,
|
|
RuleGroupIndex: a.RuleGroupIndex,
|
|
ParentVersion: 0,
|
|
RestoredFrom: 0,
|
|
Version: 1,
|
|
|
|
Created: time.Now().UTC(),
|
|
Title: a.Title,
|
|
Condition: a.Condition,
|
|
Data: a.Data,
|
|
IntervalSeconds: a.IntervalSeconds,
|
|
NoDataState: a.NoDataState,
|
|
ExecErrState: a.ExecErrState,
|
|
For: a.For,
|
|
Annotations: a.Annotations,
|
|
Labels: map[string]string{},
|
|
IsPaused: a.IsPaused,
|
|
}
|
|
}
|
|
|
|
func addMigrationInfo(da *dashAlert) (map[string]string, map[string]string) {
|
|
tagsMap := simplejson.NewFromAny(da.ParsedSettings.AlertRuleTags).MustMap()
|
|
lbls := make(map[string]string, len(tagsMap))
|
|
|
|
for k, v := range tagsMap {
|
|
lbls[k] = simplejson.NewFromAny(v).MustString()
|
|
}
|
|
|
|
annotations := make(map[string]string, 3)
|
|
annotations[ngmodels.DashboardUIDAnnotation] = da.DashboardUID
|
|
annotations[ngmodels.PanelIDAnnotation] = fmt.Sprintf("%v", da.PanelId)
|
|
annotations["__alertId__"] = fmt.Sprintf("%v", da.Id)
|
|
|
|
return lbls, annotations
|
|
}
|
|
|
|
func (m *migration) makeAlertRule(l log.Logger, cond condition, da dashAlert, folderUID string) (*alertRule, error) {
|
|
lbls, annotations := addMigrationInfo(&da)
|
|
annotations["message"] = da.Message
|
|
var err error
|
|
|
|
data, err := migrateAlertRuleQueries(l, cond.Data)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to migrate alert rule queries: %w", err)
|
|
}
|
|
|
|
uid, err := m.seenUIDs.generateUid()
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to migrate alert rule: %w", err)
|
|
}
|
|
|
|
name := normalizeRuleName(da.Name, uid)
|
|
|
|
isPaused := false
|
|
if da.State == "paused" {
|
|
isPaused = true
|
|
}
|
|
|
|
ar := &alertRule{
|
|
OrgID: da.OrgId,
|
|
Title: name, // TODO: Make sure all names are unique, make new name on constraint insert error.
|
|
UID: uid,
|
|
Condition: cond.Condition,
|
|
Data: data,
|
|
IntervalSeconds: ruleAdjustInterval(da.Frequency),
|
|
Version: 1,
|
|
NamespaceUID: folderUID, // Folder already created, comes from env var.
|
|
RuleGroup: name,
|
|
For: duration(da.For),
|
|
Updated: time.Now().UTC(),
|
|
Annotations: annotations,
|
|
Labels: lbls,
|
|
RuleGroupIndex: 1,
|
|
IsPaused: isPaused,
|
|
NoDataState: transNoData(l, da.ParsedSettings.NoDataState),
|
|
ExecErrState: transExecErr(l, da.ParsedSettings.ExecutionErrorState),
|
|
}
|
|
|
|
// Label for routing and silences.
|
|
n, v := getLabelForSilenceMatching(ar.UID)
|
|
ar.Labels[n] = v
|
|
|
|
if err := m.addErrorSilence(da, ar); err != nil {
|
|
m.mg.Logger.Error("alert migration error: failed to create silence for Error", "rule_name", ar.Title, "err", err)
|
|
}
|
|
|
|
if err := m.addNoDataSilence(da, ar); err != nil {
|
|
m.mg.Logger.Error("alert migration error: failed to create silence for NoData", "rule_name", ar.Title, "err", err)
|
|
}
|
|
|
|
return ar, nil
|
|
}
|
|
|
|
// migrateAlertRuleQueries attempts to fix alert rule queries so they can work in unified alerting. Queries of some data sources are not compatible with unified alerting.
|
|
func migrateAlertRuleQueries(l log.Logger, data []alertQuery) ([]alertQuery, error) {
|
|
result := make([]alertQuery, 0, len(data))
|
|
for _, d := range data {
|
|
// queries that are expression are not relevant, skip them.
|
|
if d.DatasourceUID == expressionDatasourceUID {
|
|
result = append(result, d)
|
|
continue
|
|
}
|
|
var fixedData map[string]json.RawMessage
|
|
err := json.Unmarshal(d.Model, &fixedData)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
// remove hidden tag from the query (if exists)
|
|
delete(fixedData, "hide")
|
|
fixedData = fixGraphiteReferencedSubQueries(fixedData)
|
|
fixedData = fixPrometheusBothTypeQuery(l, fixedData)
|
|
updatedModel, err := json.Marshal(fixedData)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
d.Model = updatedModel
|
|
result = append(result, d)
|
|
}
|
|
return result, nil
|
|
}
|
|
|
|
// fixGraphiteReferencedSubQueries attempts to fix graphite referenced sub queries, given unified alerting does not support this.
|
|
// targetFull of Graphite data source contains the expanded version of field 'target', so let's copy that.
|
|
func fixGraphiteReferencedSubQueries(queryData map[string]json.RawMessage) map[string]json.RawMessage {
|
|
fullQuery, ok := queryData[graphite.TargetFullModelField]
|
|
if ok {
|
|
delete(queryData, graphite.TargetFullModelField)
|
|
queryData[graphite.TargetModelField] = fullQuery
|
|
}
|
|
|
|
return queryData
|
|
}
|
|
|
|
// fixPrometheusBothTypeQuery converts Prometheus 'Both' type queries to range queries.
|
|
func fixPrometheusBothTypeQuery(l log.Logger, queryData map[string]json.RawMessage) map[string]json.RawMessage {
|
|
// There is the possibility to support this functionality by:
|
|
// - Splitting the query into two: one for instant and one for range.
|
|
// - Splitting the condition into two: one for each query, separated by OR.
|
|
// However, relying on a 'Both' query instead of multiple conditions to do this in legacy is likely
|
|
// to be unintentional. In addition, this would require more robust operator precedence in classic conditions.
|
|
// Given these reasons, we opt to convert them to range queries and log a warning.
|
|
|
|
var instant bool
|
|
if instantRaw, ok := queryData["instant"]; ok {
|
|
if err := json.Unmarshal(instantRaw, &instant); err != nil {
|
|
// Nothing to do here, we can't parse the instant field.
|
|
if isPrometheus, _ := isPrometheusQuery(queryData); isPrometheus {
|
|
l.Info("Failed to parse instant field on Prometheus query", "instant", string(instantRaw), "err", err)
|
|
}
|
|
return queryData
|
|
}
|
|
}
|
|
var rng bool
|
|
if rangeRaw, ok := queryData["range"]; ok {
|
|
if err := json.Unmarshal(rangeRaw, &rng); err != nil {
|
|
// Nothing to do here, we can't parse the range field.
|
|
if isPrometheus, _ := isPrometheusQuery(queryData); isPrometheus {
|
|
l.Info("Failed to parse range field on Prometheus query", "range", string(rangeRaw), "err", err)
|
|
}
|
|
return queryData
|
|
}
|
|
}
|
|
|
|
if !instant || !rng {
|
|
// Only apply this fix to 'Both' type queries.
|
|
return queryData
|
|
}
|
|
|
|
isPrometheus, err := isPrometheusQuery(queryData)
|
|
if err != nil {
|
|
l.Info("Unable to convert alert rule that resembles a Prometheus 'Both' type query to 'Range'", "err", err)
|
|
return queryData
|
|
}
|
|
if !isPrometheus {
|
|
// Only apply this fix to Prometheus.
|
|
return queryData
|
|
}
|
|
|
|
// Convert 'Both' type queries to `Range` queries by disabling the `Instant` portion.
|
|
l.Warn("Prometheus 'Both' type queries are not supported in unified alerting. Converting to range query.")
|
|
queryData["instant"] = []byte("false")
|
|
|
|
return queryData
|
|
}
|
|
|
|
// isPrometheusQuery checks if the query is for Prometheus.
|
|
func isPrometheusQuery(queryData map[string]json.RawMessage) (bool, error) {
|
|
ds, ok := queryData["datasource"]
|
|
if !ok {
|
|
return false, fmt.Errorf("missing datasource field")
|
|
}
|
|
var datasource struct {
|
|
Type string `json:"type"`
|
|
}
|
|
if err := json.Unmarshal(ds, &datasource); err != nil {
|
|
return false, fmt.Errorf("failed to parse datasource '%s': %w", string(ds), err)
|
|
}
|
|
if datasource.Type == "" {
|
|
return false, fmt.Errorf("missing type field '%s'", string(ds))
|
|
}
|
|
return datasource.Type == "prometheus", nil
|
|
}
|
|
|
|
type alertQuery struct {
|
|
// RefID is the unique identifier of the query, set by the frontend call.
|
|
RefID string `json:"refId"`
|
|
|
|
// QueryType is an optional identifier for the type of query.
|
|
// It can be used to distinguish different types of queries.
|
|
QueryType string `json:"queryType"`
|
|
|
|
// RelativeTimeRange is the relative Start and End of the query as sent by the frontend.
|
|
RelativeTimeRange relativeTimeRange `json:"relativeTimeRange"`
|
|
|
|
DatasourceUID string `json:"datasourceUid"`
|
|
|
|
// JSON is the raw JSON query and includes the above properties as well as custom properties.
|
|
Model json.RawMessage `json:"model"`
|
|
}
|
|
|
|
// RelativeTimeRange is the per query start and end time
|
|
// for requests.
|
|
type relativeTimeRange struct {
|
|
From duration `json:"from"`
|
|
To duration `json:"to"`
|
|
}
|
|
|
|
// duration is a type used for marshalling durations.
|
|
type duration time.Duration
|
|
|
|
func (d duration) String() string {
|
|
return time.Duration(d).String()
|
|
}
|
|
|
|
func (d duration) MarshalJSON() ([]byte, error) {
|
|
return json.Marshal(time.Duration(d).Seconds())
|
|
}
|
|
|
|
func (d *duration) UnmarshalJSON(b []byte) error {
|
|
var v interface{}
|
|
if err := json.Unmarshal(b, &v); err != nil {
|
|
return err
|
|
}
|
|
switch value := v.(type) {
|
|
case float64:
|
|
*d = duration(time.Duration(value) * time.Second)
|
|
return nil
|
|
default:
|
|
return fmt.Errorf("invalid duration %v", v)
|
|
}
|
|
}
|
|
|
|
func ruleAdjustInterval(freq int64) int64 {
|
|
// 10 corresponds to the SchedulerCfg, but TODO not worrying about fetching for now.
|
|
var baseFreq int64 = 10
|
|
if freq <= baseFreq {
|
|
return 10
|
|
}
|
|
return freq - (freq % baseFreq)
|
|
}
|
|
|
|
func transNoData(l log.Logger, s string) string {
|
|
switch legacymodels.NoDataOption(s) {
|
|
case legacymodels.NoDataSetOK:
|
|
return string(ngmodels.OK) // values from ngalert/models/rule
|
|
case "", legacymodels.NoDataSetNoData:
|
|
return string(ngmodels.NoData)
|
|
case legacymodels.NoDataSetAlerting:
|
|
return string(ngmodels.Alerting)
|
|
case legacymodels.NoDataKeepState:
|
|
return string(ngmodels.NoData) // "keep last state" translates to no data because we now emit a special alert when the state is "noData". The result is that the evaluation will not return firing and instead we'll raise the special alert.
|
|
default:
|
|
l.Warn("Unable to translate execution of NoData state. Using default execution", "old", s, "new", ngmodels.NoData)
|
|
return string(ngmodels.NoData)
|
|
}
|
|
}
|
|
|
|
func transExecErr(l log.Logger, s string) string {
|
|
switch legacymodels.ExecutionErrorOption(s) {
|
|
case "", legacymodels.ExecutionErrorSetAlerting:
|
|
return string(ngmodels.AlertingErrState)
|
|
case legacymodels.ExecutionErrorKeepState:
|
|
// Keep last state is translated to error as we now emit a
|
|
// DatasourceError alert when the state is error
|
|
return string(ngmodels.ErrorErrState)
|
|
case legacymodels.ExecutionErrorSetOk:
|
|
return string(ngmodels.OkErrState)
|
|
default:
|
|
l.Warn("Unable to translate execution of Error state. Using default execution", "old", s, "new", ngmodels.ErrorErrState)
|
|
return string(ngmodels.ErrorErrState)
|
|
}
|
|
}
|
|
|
|
func normalizeRuleName(daName string, uid string) string {
|
|
// If we have to truncate, we're losing data and so there is higher risk of uniqueness conflicts.
|
|
// Append the UID to the suffix to forcibly break any collisions.
|
|
if len(daName) > DefaultFieldMaxLength {
|
|
trunc := DefaultFieldMaxLength - 1 - len(uid)
|
|
daName = daName[:trunc] + "_" + uid
|
|
}
|
|
|
|
return daName
|
|
}
|
|
|
|
func extractChannelIDs(d dashAlert) (channelUids []uidOrID) {
|
|
// Extracting channel UID/ID.
|
|
for _, ui := range d.ParsedSettings.Notifications {
|
|
if ui.UID != "" {
|
|
channelUids = append(channelUids, ui.UID)
|
|
continue
|
|
}
|
|
// In certain circumstances, id is used instead of uid.
|
|
// We add this if there was no uid.
|
|
if ui.ID > 0 {
|
|
channelUids = append(channelUids, ui.ID)
|
|
}
|
|
}
|
|
|
|
return channelUids
|
|
}
|