2015-01-21 11:07:45 -08:00
|
|
|
// Copyright 2013 The Prometheus Authors
|
2013-02-08 05:49:55 -08:00
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package web
|
|
|
|
|
|
|
|
import (
|
2019-11-04 00:17:50 -08:00
|
|
|
"bytes"
|
2017-10-24 21:21:42 -07:00
|
|
|
"context"
|
2015-06-16 05:57:30 -07:00
|
|
|
"encoding/json"
|
2013-04-05 04:41:52 -07:00
|
|
|
"fmt"
|
2015-06-15 03:50:53 -07:00
|
|
|
"io"
|
2014-07-29 09:28:48 -07:00
|
|
|
"io/ioutil"
|
2017-08-11 11:45:52 -07:00
|
|
|
stdlog "log"
|
2018-03-21 09:08:37 -07:00
|
|
|
"math"
|
2015-06-30 05:38:01 -07:00
|
|
|
"net"
|
2013-02-08 05:49:55 -08:00
|
|
|
"net/http"
|
2017-08-22 16:00:56 -07:00
|
|
|
"net/http/pprof"
|
2015-06-15 03:50:53 -07:00
|
|
|
"net/url"
|
2013-08-09 09:09:44 -07:00
|
|
|
"os"
|
2017-05-22 05:15:02 -07:00
|
|
|
"path"
|
2015-06-15 03:50:53 -07:00
|
|
|
"path/filepath"
|
2019-01-17 07:01:06 -08:00
|
|
|
"regexp"
|
2018-03-07 07:14:46 -08:00
|
|
|
"runtime"
|
2015-06-15 03:50:53 -07:00
|
|
|
"sort"
|
2015-07-08 07:14:57 -07:00
|
|
|
"strings"
|
2015-06-15 03:50:53 -07:00
|
|
|
"sync"
|
2017-07-25 17:47:45 -07:00
|
|
|
"sync/atomic"
|
2015-06-23 08:46:50 -07:00
|
|
|
template_text "text/template"
|
2019-03-25 16:01:12 -07:00
|
|
|
"time"
|
2013-06-28 01:19:16 -07:00
|
|
|
|
2020-02-18 03:25:36 -08:00
|
|
|
"github.com/alecthomas/units"
|
2017-08-11 11:45:52 -07:00
|
|
|
"github.com/go-kit/kit/log"
|
|
|
|
"github.com/go-kit/kit/log/level"
|
2019-03-25 16:01:12 -07:00
|
|
|
conntrack "github.com/mwitkow/go-conntrack"
|
2017-05-02 16:49:29 -07:00
|
|
|
"github.com/opentracing-contrib/go-stdlib/nethttp"
|
2019-03-25 16:01:12 -07:00
|
|
|
opentracing "github.com/opentracing/opentracing-go"
|
|
|
|
"github.com/pkg/errors"
|
2013-06-28 01:19:16 -07:00
|
|
|
"github.com/prometheus/client_golang/prometheus"
|
2018-03-21 01:16:16 -07:00
|
|
|
"github.com/prometheus/client_golang/prometheus/promhttp"
|
2019-03-25 16:01:12 -07:00
|
|
|
io_prometheus_client "github.com/prometheus/client_model/go"
|
2015-08-20 08:18:46 -07:00
|
|
|
"github.com/prometheus/common/model"
|
2015-09-24 08:07:11 -07:00
|
|
|
"github.com/prometheus/common/route"
|
2019-05-09 08:10:15 -07:00
|
|
|
"github.com/prometheus/common/server"
|
2019-08-13 01:34:14 -07:00
|
|
|
"github.com/prometheus/prometheus/tsdb"
|
2019-11-04 18:06:13 -08:00
|
|
|
"github.com/prometheus/prometheus/tsdb/index"
|
2019-04-04 02:55:32 -07:00
|
|
|
"github.com/soheilhy/cmux"
|
2016-12-06 01:45:59 -08:00
|
|
|
"golang.org/x/net/netutil"
|
2019-03-25 16:01:12 -07:00
|
|
|
"google.golang.org/grpc"
|
2013-06-28 01:19:16 -07:00
|
|
|
|
2015-06-15 03:50:53 -07:00
|
|
|
"github.com/prometheus/prometheus/config"
|
2016-11-23 09:23:09 -08:00
|
|
|
"github.com/prometheus/prometheus/notifier"
|
2015-06-15 03:50:53 -07:00
|
|
|
"github.com/prometheus/prometheus/promql"
|
|
|
|
"github.com/prometheus/prometheus/rules"
|
2018-02-01 01:55:07 -08:00
|
|
|
"github.com/prometheus/prometheus/scrape"
|
2017-10-24 21:21:42 -07:00
|
|
|
"github.com/prometheus/prometheus/storage"
|
2015-06-15 03:50:53 -07:00
|
|
|
"github.com/prometheus/prometheus/template"
|
2015-09-17 05:49:50 -07:00
|
|
|
"github.com/prometheus/prometheus/util/httputil"
|
2016-06-23 08:14:32 -07:00
|
|
|
api_v1 "github.com/prometheus/prometheus/web/api/v1"
|
2017-07-10 06:44:29 -07:00
|
|
|
api_v2 "github.com/prometheus/prometheus/web/api/v2"
|
2015-11-11 07:31:09 -08:00
|
|
|
"github.com/prometheus/prometheus/web/ui"
|
2013-02-08 05:49:55 -08:00
|
|
|
)
|
|
|
|
|
2020-02-17 09:19:15 -08:00
|
|
|
// Paths that are handled by the React / Reach router that should all be served the main React app's index.html.
|
|
|
|
var reactRouterPaths = []string{
|
|
|
|
"/",
|
|
|
|
"/alerts",
|
|
|
|
"/config",
|
|
|
|
"/flags",
|
|
|
|
"/graph",
|
|
|
|
"/rules",
|
|
|
|
"/service-discovery",
|
|
|
|
"/status",
|
|
|
|
"/targets",
|
|
|
|
"/tsdb-status",
|
|
|
|
"/version",
|
|
|
|
}
|
2015-05-18 03:16:25 -07:00
|
|
|
|
2018-11-20 05:25:03 -08:00
|
|
|
// withStackTrace logs the stack trace in case the request panics. The function
|
|
|
|
// will re-raise the error which will then be handled by the net/http package.
|
|
|
|
// It is needed because the go-kit log package doesn't manage properly the
|
|
|
|
// panics from net/http (see https://github.com/go-kit/kit/issues/233).
|
|
|
|
func withStackTracer(h http.Handler, l log.Logger) http.Handler {
|
|
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
defer func() {
|
|
|
|
if err := recover(); err != nil {
|
|
|
|
const size = 64 << 10
|
|
|
|
buf := make([]byte, size)
|
|
|
|
buf = buf[:runtime.Stack(buf, false)]
|
|
|
|
level.Error(l).Log("msg", "panic while serving request", "client", r.RemoteAddr, "url", r.URL, "err", err, "stack", buf)
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
h.ServeHTTP(w, r)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2019-06-24 06:48:15 -07:00
|
|
|
type metrics struct {
|
|
|
|
requestCounter *prometheus.CounterVec
|
|
|
|
requestDuration *prometheus.HistogramVec
|
|
|
|
responseSize *prometheus.HistogramVec
|
|
|
|
}
|
|
|
|
|
|
|
|
func newMetrics(r prometheus.Registerer) *metrics {
|
|
|
|
m := &metrics{
|
|
|
|
requestCounter: prometheus.NewCounterVec(
|
|
|
|
prometheus.CounterOpts{
|
|
|
|
Name: "prometheus_http_requests_total",
|
|
|
|
Help: "Counter of HTTP requests.",
|
|
|
|
},
|
|
|
|
[]string{"handler", "code"},
|
|
|
|
),
|
|
|
|
requestDuration: prometheus.NewHistogramVec(
|
|
|
|
prometheus.HistogramOpts{
|
|
|
|
Name: "prometheus_http_request_duration_seconds",
|
|
|
|
Help: "Histogram of latencies for HTTP requests.",
|
|
|
|
Buckets: []float64{.1, .2, .4, 1, 3, 8, 20, 60, 120},
|
|
|
|
},
|
|
|
|
[]string{"handler"},
|
|
|
|
),
|
|
|
|
responseSize: prometheus.NewHistogramVec(
|
|
|
|
prometheus.HistogramOpts{
|
|
|
|
Name: "prometheus_http_response_size_bytes",
|
|
|
|
Help: "Histogram of response size for HTTP requests.",
|
|
|
|
Buckets: prometheus.ExponentialBuckets(100, 10, 8),
|
|
|
|
},
|
|
|
|
[]string{"handler"},
|
|
|
|
),
|
|
|
|
}
|
2018-03-21 01:16:16 -07:00
|
|
|
|
2019-06-24 06:48:15 -07:00
|
|
|
if r != nil {
|
|
|
|
r.MustRegister(m.requestCounter, m.requestDuration, m.responseSize)
|
2020-04-06 01:05:01 -07:00
|
|
|
registerFederationMetrics(r)
|
2019-06-24 06:48:15 -07:00
|
|
|
}
|
|
|
|
return m
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *metrics) instrumentHandlerWithPrefix(prefix string) func(handlerName string, handler http.HandlerFunc) http.HandlerFunc {
|
|
|
|
return func(handlerName string, handler http.HandlerFunc) http.HandlerFunc {
|
|
|
|
return m.instrumentHandler(prefix+handlerName, handler)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *metrics) instrumentHandler(handlerName string, handler http.HandlerFunc) http.HandlerFunc {
|
|
|
|
return promhttp.InstrumentHandlerCounter(
|
|
|
|
m.requestCounter.MustCurryWith(prometheus.Labels{"handler": handlerName}),
|
|
|
|
promhttp.InstrumentHandlerDuration(
|
|
|
|
m.requestDuration.MustCurryWith(prometheus.Labels{"handler": handlerName}),
|
|
|
|
promhttp.InstrumentHandlerResponseSize(
|
|
|
|
m.responseSize.MustCurryWith(prometheus.Labels{"handler": handlerName}),
|
|
|
|
handler,
|
|
|
|
),
|
|
|
|
),
|
|
|
|
)
|
2018-03-21 01:16:16 -07:00
|
|
|
}
|
|
|
|
|
2019-11-02 08:53:32 -07:00
|
|
|
// PrometheusVersion contains build information about Prometheus.
|
|
|
|
type PrometheusVersion = api_v1.PrometheusVersion
|
|
|
|
|
2015-06-15 03:50:53 -07:00
|
|
|
// Handler serves various HTTP endpoints of the Prometheus server
|
|
|
|
type Handler struct {
|
2017-08-11 11:45:52 -07:00
|
|
|
logger log.Logger
|
|
|
|
|
2019-06-24 06:48:15 -07:00
|
|
|
gatherer prometheus.Gatherer
|
|
|
|
metrics *metrics
|
|
|
|
|
2018-02-01 02:06:24 -08:00
|
|
|
scrapeManager *scrape.Manager
|
2016-05-13 08:59:59 -07:00
|
|
|
ruleManager *rules.Manager
|
|
|
|
queryEngine *promql.Engine
|
2020-02-09 15:58:23 -08:00
|
|
|
lookbackDelta time.Duration
|
2016-09-15 15:58:06 -07:00
|
|
|
context context.Context
|
2017-09-18 03:32:17 -07:00
|
|
|
tsdb func() *tsdb.DB
|
2016-12-29 00:27:30 -08:00
|
|
|
storage storage.Storage
|
2020-04-07 08:42:42 -07:00
|
|
|
localStorage storage.Storage
|
2018-01-30 09:45:37 -08:00
|
|
|
notifier *notifier.Manager
|
2015-06-15 03:50:53 -07:00
|
|
|
|
2016-06-23 08:14:32 -07:00
|
|
|
apiV1 *api_v1.API
|
2015-06-15 03:50:53 -07:00
|
|
|
|
2019-01-04 05:47:38 -08:00
|
|
|
router *route.Router
|
|
|
|
quitCh chan struct{}
|
|
|
|
reloadCh chan chan error
|
|
|
|
options *Options
|
|
|
|
config *config.Config
|
|
|
|
versionInfo *PrometheusVersion
|
|
|
|
birth time.Time
|
|
|
|
cwd string
|
|
|
|
flagsMap map[string]string
|
|
|
|
|
|
|
|
mtx sync.RWMutex
|
|
|
|
now func() model.Time
|
2017-07-25 17:47:45 -07:00
|
|
|
|
|
|
|
ready uint32 // ready is uint32 rather than boolean to be able to use atomic functions.
|
2015-09-01 09:47:48 -07:00
|
|
|
}
|
|
|
|
|
2017-05-11 08:09:24 -07:00
|
|
|
// ApplyConfig updates the config field of the Handler struct
|
2016-07-11 07:24:54 -07:00
|
|
|
func (h *Handler) ApplyConfig(conf *config.Config) error {
|
2015-09-01 09:47:48 -07:00
|
|
|
h.mtx.Lock()
|
|
|
|
defer h.mtx.Unlock()
|
|
|
|
|
2017-05-11 08:09:24 -07:00
|
|
|
h.config = conf
|
2015-09-01 09:47:48 -07:00
|
|
|
|
2016-07-11 07:24:54 -07:00
|
|
|
return nil
|
2015-06-15 03:50:53 -07:00
|
|
|
}
|
2013-02-08 06:38:50 -08:00
|
|
|
|
2015-06-15 03:50:53 -07:00
|
|
|
// Options for the web Handler.
|
|
|
|
type Options struct {
|
2020-02-18 03:25:36 -08:00
|
|
|
Context context.Context
|
|
|
|
TSDB func() *tsdb.DB
|
|
|
|
TSDBRetentionDuration model.Duration
|
|
|
|
TSDBMaxBytes units.Base2Bytes
|
|
|
|
Storage storage.Storage
|
|
|
|
QueryEngine *promql.Engine
|
|
|
|
LookbackDelta time.Duration
|
|
|
|
ScrapeManager *scrape.Manager
|
|
|
|
RuleManager *rules.Manager
|
|
|
|
Notifier *notifier.Manager
|
|
|
|
Version *PrometheusVersion
|
|
|
|
Flags map[string]string
|
2016-09-15 15:58:06 -07:00
|
|
|
|
2018-09-25 12:07:34 -07:00
|
|
|
ListenAddress string
|
2019-01-17 07:01:06 -08:00
|
|
|
CORSOrigin *regexp.Regexp
|
2018-09-25 12:07:34 -07:00
|
|
|
ReadTimeout time.Duration
|
|
|
|
MaxConnections int
|
|
|
|
ExternalURL *url.URL
|
|
|
|
RoutePrefix string
|
|
|
|
UseLocalAssets bool
|
|
|
|
UserAssetsPath string
|
|
|
|
ConsoleTemplatesPath string
|
|
|
|
ConsoleLibrariesPath string
|
|
|
|
EnableLifecycle bool
|
|
|
|
EnableAdminAPI bool
|
2018-11-20 20:45:06 -08:00
|
|
|
PageTitle string
|
2018-09-25 12:07:34 -07:00
|
|
|
RemoteReadSampleLimit int
|
|
|
|
RemoteReadConcurrencyLimit int
|
2019-08-19 13:16:10 -07:00
|
|
|
RemoteReadBytesInFrame int
|
2015-06-15 03:50:53 -07:00
|
|
|
|
2019-06-24 06:48:15 -07:00
|
|
|
Gatherer prometheus.Gatherer
|
|
|
|
Registerer prometheus.Registerer
|
2018-03-21 01:16:16 -07:00
|
|
|
}
|
|
|
|
|
2015-06-15 03:50:53 -07:00
|
|
|
// New initializes a new web Handler.
|
2017-08-11 11:45:52 -07:00
|
|
|
func New(logger log.Logger, o *Options) *Handler {
|
2019-06-24 06:48:15 -07:00
|
|
|
if logger == nil {
|
|
|
|
logger = log.NewNopLogger()
|
|
|
|
}
|
|
|
|
|
|
|
|
m := newMetrics(o.Registerer)
|
2020-01-10 04:56:36 -08:00
|
|
|
router := route.New().
|
2020-01-18 16:07:10 -08:00
|
|
|
WithInstrumentation(m.instrumentHandler).
|
|
|
|
WithInstrumentation(setPathWithPrefix(""))
|
2016-12-03 15:37:59 -08:00
|
|
|
|
2019-06-24 06:48:15 -07:00
|
|
|
cwd, err := os.Getwd()
|
2016-12-03 15:37:59 -08:00
|
|
|
if err != nil {
|
|
|
|
cwd = "<error retrieving current working directory>"
|
|
|
|
}
|
|
|
|
|
2015-06-15 03:50:53 -07:00
|
|
|
h := &Handler{
|
2019-06-24 06:48:15 -07:00
|
|
|
logger: logger,
|
|
|
|
|
|
|
|
gatherer: o.Gatherer,
|
|
|
|
metrics: m,
|
|
|
|
|
2015-08-20 09:23:57 -07:00
|
|
|
router: router,
|
|
|
|
quitCh: make(chan struct{}),
|
2016-07-11 07:24:54 -07:00
|
|
|
reloadCh: make(chan chan error),
|
2015-08-20 09:23:57 -07:00
|
|
|
options: o,
|
2016-09-15 15:58:06 -07:00
|
|
|
versionInfo: o.Version,
|
2020-03-29 09:35:39 -07:00
|
|
|
birth: time.Now().UTC(),
|
2016-12-03 15:37:59 -08:00
|
|
|
cwd: cwd,
|
2016-09-15 15:58:06 -07:00
|
|
|
flagsMap: o.Flags,
|
2015-06-15 03:50:53 -07:00
|
|
|
|
2016-09-15 15:58:06 -07:00
|
|
|
context: o.Context,
|
2017-11-25 05:13:54 -08:00
|
|
|
scrapeManager: o.ScrapeManager,
|
2016-09-15 15:58:06 -07:00
|
|
|
ruleManager: o.RuleManager,
|
|
|
|
queryEngine: o.QueryEngine,
|
2020-02-09 15:58:23 -08:00
|
|
|
lookbackDelta: o.LookbackDelta,
|
2017-09-18 03:32:17 -07:00
|
|
|
tsdb: o.TSDB,
|
|
|
|
storage: o.Storage,
|
2020-04-07 08:42:42 -07:00
|
|
|
localStorage: o.TSDB(),
|
2016-11-23 09:23:09 -08:00
|
|
|
notifier: o.Notifier,
|
2015-06-15 03:50:53 -07:00
|
|
|
|
2017-05-11 08:09:24 -07:00
|
|
|
now: model.Now,
|
2017-07-25 17:47:45 -07:00
|
|
|
|
|
|
|
ready: 0,
|
2015-06-02 04:07:46 -07:00
|
|
|
}
|
2013-05-06 00:56:32 -07:00
|
|
|
|
2020-04-16 01:30:47 -07:00
|
|
|
factoryTr := func(_ context.Context) api_v1.TargetRetriever {
|
|
|
|
return h.scrapeManager
|
|
|
|
}
|
|
|
|
h.apiV1 = api_v1.NewAPI(h.queryEngine, h.storage, factoryTr, h.notifier,
|
2017-05-11 08:09:24 -07:00
|
|
|
func() config.Config {
|
|
|
|
h.mtx.RLock()
|
|
|
|
defer h.mtx.RUnlock()
|
|
|
|
return *h.config
|
|
|
|
},
|
api: Added v1/status/flags endpoint. (#3864)
Endpoint URL: /api/v1/status/flags
Example Output:
```json
{
"status": "success",
"data": {
"alertmanager.notification-queue-capacity": "10000",
"alertmanager.timeout": "10s",
"completion-bash": "false",
"completion-script-bash": "false",
"completion-script-zsh": "false",
"config.file": "my_cool_prometheus.yaml",
"help": "false",
"help-long": "false",
"help-man": "false",
"log.level": "info",
"query.lookback-delta": "5m",
"query.max-concurrency": "20",
"query.timeout": "2m",
"storage.tsdb.max-block-duration": "36h",
"storage.tsdb.min-block-duration": "2h",
"storage.tsdb.no-lockfile": "false",
"storage.tsdb.path": "data/",
"storage.tsdb.retention": "15d",
"version": "false",
"web.console.libraries": "console_libraries",
"web.console.templates": "consoles",
"web.enable-admin-api": "false",
"web.enable-lifecycle": "false",
"web.external-url": "",
"web.listen-address": "0.0.0.0:9090",
"web.max-connections": "512",
"web.read-timeout": "5m",
"web.route-prefix": "/",
"web.user-assets": ""
}
}
```
Signed-off-by: Bartek Plotka <bwplotka@gmail.com>
2018-02-21 00:49:02 -08:00
|
|
|
o.Flags,
|
2020-02-17 09:19:15 -08:00
|
|
|
api_v1.GlobalURLOptions{
|
|
|
|
ListenAddress: o.ListenAddress,
|
|
|
|
Host: o.ExternalURL.Host,
|
|
|
|
Scheme: o.ExternalURL.Scheme,
|
|
|
|
},
|
2017-10-06 08:20:20 -07:00
|
|
|
h.testReady,
|
2018-11-15 05:22:16 -08:00
|
|
|
func() api_v1.TSDBAdmin {
|
2019-03-12 09:25:46 -07:00
|
|
|
return h.options.TSDB()
|
2018-11-15 05:22:16 -08:00
|
|
|
},
|
2017-12-02 21:07:05 -08:00
|
|
|
h.options.EnableAdminAPI,
|
2018-07-06 10:44:45 -07:00
|
|
|
logger,
|
2018-03-25 09:50:34 -07:00
|
|
|
h.ruleManager,
|
2018-09-25 12:07:34 -07:00
|
|
|
h.options.RemoteReadSampleLimit,
|
|
|
|
h.options.RemoteReadConcurrencyLimit,
|
2019-08-19 13:16:10 -07:00
|
|
|
h.options.RemoteReadBytesInFrame,
|
2019-01-17 07:01:06 -08:00
|
|
|
h.options.CORSOrigin,
|
2019-11-02 08:53:32 -07:00
|
|
|
h.runtimeInfo,
|
|
|
|
h.versionInfo,
|
2017-05-11 08:09:24 -07:00
|
|
|
)
|
2017-07-06 05:38:40 -07:00
|
|
|
|
2016-07-05 06:05:43 -07:00
|
|
|
if o.RoutePrefix != "/" {
|
2015-06-15 03:50:53 -07:00
|
|
|
// If the prefix is missing for the root path, prepend it.
|
2015-06-02 23:38:50 -07:00
|
|
|
router.Get("/", func(w http.ResponseWriter, r *http.Request) {
|
2016-07-05 06:05:43 -07:00
|
|
|
http.Redirect(w, r, o.RoutePrefix, http.StatusFound)
|
2015-06-02 23:38:50 -07:00
|
|
|
})
|
2016-07-05 06:05:43 -07:00
|
|
|
router = router.WithPrefix(o.RoutePrefix)
|
2015-06-02 23:38:50 -07:00
|
|
|
}
|
|
|
|
|
2017-07-25 17:47:45 -07:00
|
|
|
readyf := h.testReady
|
2015-06-02 23:38:50 -07:00
|
|
|
|
2015-08-28 01:53:13 -07:00
|
|
|
router.Get("/", func(w http.ResponseWriter, r *http.Request) {
|
2017-08-19 11:44:15 -07:00
|
|
|
http.Redirect(w, r, path.Join(o.ExternalURL.Path, "/graph"), http.StatusFound)
|
2015-08-28 01:53:13 -07:00
|
|
|
})
|
|
|
|
|
2018-03-21 01:16:16 -07:00
|
|
|
router.Get("/alerts", readyf(h.alerts))
|
|
|
|
router.Get("/graph", readyf(h.graph))
|
|
|
|
router.Get("/status", readyf(h.status))
|
|
|
|
router.Get("/flags", readyf(h.flags))
|
|
|
|
router.Get("/config", readyf(h.serveConfig))
|
|
|
|
router.Get("/rules", readyf(h.rules))
|
|
|
|
router.Get("/targets", readyf(h.targets))
|
|
|
|
router.Get("/version", readyf(h.version))
|
|
|
|
router.Get("/service-discovery", readyf(h.serviceDiscovery))
|
2015-06-02 23:38:50 -07:00
|
|
|
|
2018-03-21 01:16:16 -07:00
|
|
|
router.Get("/metrics", promhttp.Handler().ServeHTTP)
|
2015-06-04 09:24:04 -07:00
|
|
|
|
2018-03-21 01:16:16 -07:00
|
|
|
router.Get("/federate", readyf(httputil.CompressionHandler{
|
2015-09-18 07:51:53 -07:00
|
|
|
Handler: http.HandlerFunc(h.federation),
|
2018-03-21 01:16:16 -07:00
|
|
|
}.ServeHTTP))
|
2015-09-17 07:33:14 -07:00
|
|
|
|
2018-03-21 01:16:16 -07:00
|
|
|
router.Get("/consoles/*filepath", readyf(h.consoles))
|
2015-06-02 23:38:50 -07:00
|
|
|
|
2018-08-24 00:03:10 -07:00
|
|
|
router.Get("/static/*filepath", func(w http.ResponseWriter, r *http.Request) {
|
2018-09-19 00:20:53 -07:00
|
|
|
r.URL.Path = path.Join("/static", route.Param(r.Context(), "filepath"))
|
2019-05-09 08:10:15 -07:00
|
|
|
fs := server.StaticFileServer(ui.Assets)
|
2018-08-24 00:03:10 -07:00
|
|
|
fs.ServeHTTP(w, r)
|
|
|
|
})
|
2013-02-08 05:49:55 -08:00
|
|
|
|
2019-11-14 05:58:22 -08:00
|
|
|
// Make sure that "<path-prefix>/new" is redirected to "<path-prefix>/new/" and
|
|
|
|
// not just the naked "/new/", which would be the default behavior of the router
|
|
|
|
// with the "RedirectTrailingSlash" option (https://godoc.org/github.com/julienschmidt/httprouter#Router.RedirectTrailingSlash),
|
|
|
|
// and which breaks users with a --web.route-prefix that deviates from the path derived
|
|
|
|
// from the external URL.
|
|
|
|
router.Get("/new", func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
http.Redirect(w, r, path.Join(o.ExternalURL.Path, "new")+"/", http.StatusFound)
|
|
|
|
})
|
|
|
|
|
2019-10-28 02:45:53 -07:00
|
|
|
router.Get("/new/*filepath", func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
p := route.Param(r.Context(), "filepath")
|
|
|
|
|
2019-11-04 00:17:50 -08:00
|
|
|
// For paths that the React/Reach router handles, we want to serve the
|
|
|
|
// index.html, but with replaced path prefix placeholder.
|
|
|
|
for _, rp := range reactRouterPaths {
|
|
|
|
if p != rp {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
f, err := ui.Assets.Open("/static/react/index.html")
|
|
|
|
if err != nil {
|
|
|
|
w.WriteHeader(http.StatusInternalServerError)
|
|
|
|
fmt.Fprintf(w, "Error opening React index.html: %v", err)
|
|
|
|
return
|
2019-10-28 02:45:53 -07:00
|
|
|
}
|
2019-11-04 00:17:50 -08:00
|
|
|
idx, err := ioutil.ReadAll(f)
|
|
|
|
if err != nil {
|
|
|
|
w.WriteHeader(http.StatusInternalServerError)
|
|
|
|
fmt.Fprintf(w, "Error reading React index.html: %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
prefixedIdx := bytes.ReplaceAll(idx, []byte("PATH_PREFIX_PLACEHOLDER"), []byte(o.ExternalURL.Path))
|
2020-02-08 02:00:48 -08:00
|
|
|
prefixedIdx = bytes.ReplaceAll(prefixedIdx, []byte("CONSOLES_LINK_PLACEHOLDER"), []byte(h.consolesPath()))
|
2019-11-04 00:17:50 -08:00
|
|
|
w.Write(prefixedIdx)
|
|
|
|
return
|
2019-10-28 02:45:53 -07:00
|
|
|
}
|
|
|
|
|
2019-11-04 00:17:50 -08:00
|
|
|
// For all other paths, serve auxiliary assets.
|
|
|
|
r.URL.Path = path.Join("/static/react/", p)
|
2019-10-28 02:45:53 -07:00
|
|
|
fs := server.StaticFileServer(ui.Assets)
|
|
|
|
fs.ServeHTTP(w, r)
|
|
|
|
})
|
|
|
|
|
2015-06-15 03:50:53 -07:00
|
|
|
if o.UserAssetsPath != "" {
|
2018-03-21 01:16:16 -07:00
|
|
|
router.Get("/user/*filepath", route.FileServe(o.UserAssetsPath))
|
2013-05-23 06:47:00 -07:00
|
|
|
}
|
|
|
|
|
2017-07-10 06:44:29 -07:00
|
|
|
if o.EnableLifecycle {
|
2015-06-15 03:50:53 -07:00
|
|
|
router.Post("/-/quit", h.quit)
|
2019-03-20 10:33:45 -07:00
|
|
|
router.Put("/-/quit", h.quit)
|
2017-07-10 06:44:29 -07:00
|
|
|
router.Post("/-/reload", h.reload)
|
2019-03-20 10:33:45 -07:00
|
|
|
router.Put("/-/reload", h.reload)
|
2017-07-10 06:44:29 -07:00
|
|
|
} else {
|
2019-09-25 02:48:36 -07:00
|
|
|
forbiddenAPINotEnabled := func(w http.ResponseWriter, _ *http.Request) {
|
2017-07-10 06:44:29 -07:00
|
|
|
w.WriteHeader(http.StatusForbidden)
|
2019-09-25 02:50:39 -07:00
|
|
|
w.Write([]byte("Lifecycle API is not enabled."))
|
2019-09-25 02:48:36 -07:00
|
|
|
}
|
|
|
|
router.Post("/-/quit", forbiddenAPINotEnabled)
|
|
|
|
router.Put("/-/quit", forbiddenAPINotEnabled)
|
|
|
|
router.Post("/-/reload", forbiddenAPINotEnabled)
|
|
|
|
router.Put("/-/reload", forbiddenAPINotEnabled)
|
2015-03-24 14:04:38 -07:00
|
|
|
}
|
2017-07-10 06:44:29 -07:00
|
|
|
router.Get("/-/quit", func(w http.ResponseWriter, _ *http.Request) {
|
|
|
|
w.WriteHeader(http.StatusMethodNotAllowed)
|
2019-03-20 10:33:45 -07:00
|
|
|
w.Write([]byte("Only POST or PUT requests allowed"))
|
2017-07-10 06:44:29 -07:00
|
|
|
})
|
|
|
|
router.Get("/-/reload", func(w http.ResponseWriter, _ *http.Request) {
|
2016-11-07 07:14:22 -08:00
|
|
|
w.WriteHeader(http.StatusMethodNotAllowed)
|
2019-03-20 10:33:45 -07:00
|
|
|
w.Write([]byte("Only POST or PUT requests allowed"))
|
2016-11-07 07:14:22 -08:00
|
|
|
})
|
2015-08-26 08:42:25 -07:00
|
|
|
|
2017-09-18 03:32:17 -07:00
|
|
|
router.Get("/debug/*subpath", serveDebug)
|
|
|
|
router.Post("/debug/*subpath", serveDebug)
|
2017-07-25 17:47:45 -07:00
|
|
|
|
|
|
|
router.Get("/-/healthy", func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
w.WriteHeader(http.StatusOK)
|
|
|
|
fmt.Fprintf(w, "Prometheus is Healthy.\n")
|
|
|
|
})
|
|
|
|
router.Get("/-/ready", readyf(func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
w.WriteHeader(http.StatusOK)
|
|
|
|
fmt.Fprintf(w, "Prometheus is Ready.\n")
|
|
|
|
}))
|
2015-07-21 15:27:55 -07:00
|
|
|
|
2015-06-15 03:50:53 -07:00
|
|
|
return h
|
|
|
|
}
|
|
|
|
|
2017-08-22 16:00:56 -07:00
|
|
|
func serveDebug(w http.ResponseWriter, req *http.Request) {
|
|
|
|
ctx := req.Context()
|
|
|
|
subpath := route.Param(ctx, "subpath")
|
|
|
|
|
2017-09-01 04:12:51 -07:00
|
|
|
if subpath == "/pprof" {
|
|
|
|
http.Redirect(w, req, req.URL.Path+"/", http.StatusMovedPermanently)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-09-07 07:24:12 -07:00
|
|
|
if !strings.HasPrefix(subpath, "/pprof/") {
|
|
|
|
http.NotFound(w, req)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
subpath = strings.TrimPrefix(subpath, "/pprof/")
|
|
|
|
|
|
|
|
switch subpath {
|
|
|
|
case "cmdline":
|
2017-08-22 16:00:56 -07:00
|
|
|
pprof.Cmdline(w, req)
|
2017-09-07 07:24:12 -07:00
|
|
|
case "profile":
|
2017-08-22 16:00:56 -07:00
|
|
|
pprof.Profile(w, req)
|
2017-09-07 07:24:12 -07:00
|
|
|
case "symbol":
|
2017-08-22 16:00:56 -07:00
|
|
|
pprof.Symbol(w, req)
|
2017-09-07 07:24:12 -07:00
|
|
|
case "trace":
|
2017-08-22 16:00:56 -07:00
|
|
|
pprof.Trace(w, req)
|
2017-09-07 07:24:12 -07:00
|
|
|
default:
|
2017-09-01 04:12:51 -07:00
|
|
|
req.URL.Path = "/debug/pprof/" + subpath
|
2017-09-07 07:24:12 -07:00
|
|
|
pprof.Index(w, req)
|
2017-08-22 16:00:56 -07:00
|
|
|
}
|
|
|
|
}
|
2015-06-15 03:50:53 -07:00
|
|
|
|
2017-07-25 17:47:45 -07:00
|
|
|
// Ready sets Handler to be ready.
|
|
|
|
func (h *Handler) Ready() {
|
|
|
|
atomic.StoreUint32(&h.ready, 1)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verifies whether the server is ready or not.
|
|
|
|
func (h *Handler) isReady() bool {
|
|
|
|
ready := atomic.LoadUint32(&h.ready)
|
2018-02-25 23:58:10 -08:00
|
|
|
return ready > 0
|
2017-07-25 17:47:45 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
// Checks if server is ready, calls f if it is, returns 503 if it is not.
|
|
|
|
func (h *Handler) testReady(f http.HandlerFunc) http.HandlerFunc {
|
|
|
|
return func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
if h.isReady() {
|
|
|
|
f(w, r)
|
|
|
|
} else {
|
|
|
|
w.WriteHeader(http.StatusServiceUnavailable)
|
|
|
|
fmt.Fprintf(w, "Service Unavailable")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-10-04 22:38:07 -07:00
|
|
|
// Checks if server is ready, calls f if it is, returns 503 if it is not.
|
|
|
|
func (h *Handler) testReadyHandler(f http.Handler) http.HandlerFunc {
|
|
|
|
return h.testReady(f.ServeHTTP)
|
|
|
|
}
|
|
|
|
|
2015-06-15 03:50:53 -07:00
|
|
|
// Quit returns the receive-only quit channel.
|
|
|
|
func (h *Handler) Quit() <-chan struct{} {
|
|
|
|
return h.quitCh
|
2015-06-02 04:07:46 -07:00
|
|
|
}
|
|
|
|
|
2015-08-20 09:23:57 -07:00
|
|
|
// Reload returns the receive-only channel that signals configuration reload requests.
|
2016-07-11 07:24:54 -07:00
|
|
|
func (h *Handler) Reload() <-chan chan error {
|
2015-08-11 00:08:17 -07:00
|
|
|
return h.reloadCh
|
|
|
|
}
|
|
|
|
|
2015-06-02 04:07:46 -07:00
|
|
|
// Run serves the HTTP endpoints.
|
2017-07-06 05:38:40 -07:00
|
|
|
func (h *Handler) Run(ctx context.Context) error {
|
2017-08-11 11:45:52 -07:00
|
|
|
level.Info(h.logger).Log("msg", "Start listening for connections", "address", h.options.ListenAddress)
|
2017-07-06 05:38:40 -07:00
|
|
|
|
2017-10-06 03:22:19 -07:00
|
|
|
listener, err := net.Listen("tcp", h.options.ListenAddress)
|
2017-07-06 05:38:40 -07:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2017-10-06 03:22:19 -07:00
|
|
|
listener = netutil.LimitListener(listener, h.options.MaxConnections)
|
|
|
|
|
|
|
|
// Monitor incoming connections with conntrack.
|
|
|
|
listener = conntrack.NewListener(listener,
|
|
|
|
conntrack.TrackWithName("http"),
|
|
|
|
conntrack.TrackWithTracing())
|
2017-07-06 05:38:40 -07:00
|
|
|
|
|
|
|
var (
|
2019-04-04 02:55:32 -07:00
|
|
|
m = cmux.New(listener)
|
|
|
|
// See https://github.com/grpc/grpc-go/issues/2636 for why we need to use MatchWithWriters().
|
|
|
|
grpcl = m.MatchWithWriters(cmux.HTTP2MatchHeaderFieldSendSettings("content-type", "application/grpc"))
|
2017-07-06 05:38:40 -07:00
|
|
|
httpl = m.Match(cmux.HTTP1Fast())
|
|
|
|
grpcSrv = grpc.NewServer()
|
|
|
|
)
|
2017-07-10 06:44:29 -07:00
|
|
|
av2 := api_v2.New(
|
2017-09-18 03:32:17 -07:00
|
|
|
h.options.TSDB,
|
2017-07-10 00:29:41 -07:00
|
|
|
h.options.EnableAdminAPI,
|
2017-07-06 05:38:40 -07:00
|
|
|
)
|
|
|
|
av2.RegisterGRPC(grpcSrv)
|
|
|
|
|
2019-01-15 06:32:05 -08:00
|
|
|
hh, err := av2.HTTPHandler(ctx, h.options.ListenAddress)
|
2017-07-06 05:38:40 -07:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2017-10-04 22:38:07 -07:00
|
|
|
hhFunc := h.testReadyHandler(hh)
|
|
|
|
|
2017-05-02 16:49:29 -07:00
|
|
|
operationName := nethttp.OperationNameFunc(func(r *http.Request) string {
|
|
|
|
return fmt.Sprintf("%s %s", r.Method, r.URL.Path)
|
|
|
|
})
|
2017-07-06 05:38:40 -07:00
|
|
|
mux := http.NewServeMux()
|
|
|
|
mux.Handle("/", h.router)
|
|
|
|
|
2017-09-06 05:41:07 -07:00
|
|
|
apiPath := "/api"
|
|
|
|
if h.options.RoutePrefix != "/" {
|
|
|
|
apiPath = h.options.RoutePrefix + apiPath
|
2020-04-11 01:22:18 -07:00
|
|
|
level.Info(h.logger).Log("msg", "Router prefix", "prefix", h.options.RoutePrefix)
|
2017-09-06 05:41:07 -07:00
|
|
|
}
|
2020-01-10 04:56:36 -08:00
|
|
|
av1 := route.New().
|
2020-01-18 16:07:10 -08:00
|
|
|
WithInstrumentation(h.metrics.instrumentHandlerWithPrefix("/api/v1")).
|
|
|
|
WithInstrumentation(setPathWithPrefix(apiPath + "/v1"))
|
2020-01-10 04:56:36 -08:00
|
|
|
h.apiV1.Register(av1)
|
2017-09-06 05:41:07 -07:00
|
|
|
|
|
|
|
mux.Handle(apiPath+"/v1/", http.StripPrefix(apiPath+"/v1", av1))
|
2017-07-06 05:38:40 -07:00
|
|
|
|
2017-10-04 04:32:32 -07:00
|
|
|
mux.Handle(apiPath+"/", http.StripPrefix(apiPath,
|
2017-07-06 05:38:40 -07:00
|
|
|
http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
2019-01-17 07:01:06 -08:00
|
|
|
httputil.SetCORS(w, h.options.CORSOrigin, r)
|
2017-10-04 22:38:07 -07:00
|
|
|
hhFunc(w, r)
|
2017-07-06 05:38:40 -07:00
|
|
|
}),
|
|
|
|
))
|
|
|
|
|
2017-08-11 11:45:52 -07:00
|
|
|
errlog := stdlog.New(log.NewStdlibAdapter(level.Error(h.logger)), "", 0)
|
|
|
|
|
2017-07-06 05:38:40 -07:00
|
|
|
httpSrv := &http.Server{
|
2018-11-20 05:25:03 -08:00
|
|
|
Handler: withStackTracer(nethttp.Middleware(opentracing.GlobalTracer(), mux, operationName), h.logger),
|
2017-08-11 11:45:52 -07:00
|
|
|
ErrorLog: errlog,
|
2016-12-01 05:29:45 -08:00
|
|
|
ReadTimeout: h.options.ReadTimeout,
|
2016-05-25 04:13:22 -07:00
|
|
|
}
|
2017-07-06 05:38:40 -07:00
|
|
|
|
2018-03-25 02:05:59 -07:00
|
|
|
errCh := make(chan error)
|
2017-08-10 05:48:31 -07:00
|
|
|
go func() {
|
2018-03-25 02:05:59 -07:00
|
|
|
errCh <- httpSrv.Serve(httpl)
|
2017-08-10 05:48:31 -07:00
|
|
|
}()
|
|
|
|
go func() {
|
2018-03-25 02:05:59 -07:00
|
|
|
errCh <- grpcSrv.Serve(grpcl)
|
2017-08-10 05:48:31 -07:00
|
|
|
}()
|
2017-11-11 04:06:13 -08:00
|
|
|
go func() {
|
|
|
|
errCh <- m.Serve()
|
|
|
|
}()
|
|
|
|
|
|
|
|
select {
|
|
|
|
case e := <-errCh:
|
|
|
|
return e
|
|
|
|
case <-ctx.Done():
|
|
|
|
httpSrv.Shutdown(ctx)
|
|
|
|
grpcSrv.GracefulStop()
|
|
|
|
return nil
|
|
|
|
}
|
2013-02-08 05:49:55 -08:00
|
|
|
}
|
2013-03-27 09:40:01 -07:00
|
|
|
|
2015-06-15 03:50:53 -07:00
|
|
|
func (h *Handler) alerts(w http.ResponseWriter, r *http.Request) {
|
2019-05-14 14:14:27 -07:00
|
|
|
|
|
|
|
var groups []*rules.Group
|
|
|
|
for _, group := range h.ruleManager.RuleGroups() {
|
|
|
|
if group.HasAlertingRules() {
|
|
|
|
groups = append(groups, group)
|
|
|
|
}
|
|
|
|
}
|
2015-06-15 03:50:53 -07:00
|
|
|
|
|
|
|
alertStatus := AlertStatus{
|
2019-05-14 14:14:27 -07:00
|
|
|
Groups: groups,
|
2015-06-15 03:50:53 -07:00
|
|
|
AlertStateToRowClass: map[rules.AlertState]string{
|
|
|
|
rules.StateInactive: "success",
|
|
|
|
rules.StatePending: "warning",
|
|
|
|
rules.StateFiring: "danger",
|
|
|
|
},
|
2019-10-29 03:09:53 -07:00
|
|
|
Counts: alertCounts(groups),
|
2015-06-15 03:50:53 -07:00
|
|
|
}
|
2015-11-11 07:31:09 -08:00
|
|
|
h.executeTemplate(w, "alerts.html", alertStatus)
|
2015-06-15 03:50:53 -07:00
|
|
|
}
|
|
|
|
|
2019-10-29 03:09:53 -07:00
|
|
|
func alertCounts(groups []*rules.Group) AlertByStateCount {
|
|
|
|
result := AlertByStateCount{}
|
|
|
|
|
|
|
|
for _, group := range groups {
|
|
|
|
for _, alert := range group.AlertingRules() {
|
|
|
|
switch alert.State() {
|
|
|
|
case rules.StateInactive:
|
|
|
|
result.Inactive++
|
|
|
|
case rules.StatePending:
|
|
|
|
result.Pending++
|
|
|
|
case rules.StateFiring:
|
|
|
|
result.Firing++
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return result
|
|
|
|
}
|
|
|
|
|
2015-06-15 03:50:53 -07:00
|
|
|
func (h *Handler) consoles(w http.ResponseWriter, r *http.Request) {
|
2017-05-02 16:49:29 -07:00
|
|
|
ctx := r.Context()
|
2015-06-15 03:50:53 -07:00
|
|
|
name := route.Param(ctx, "filepath")
|
|
|
|
|
|
|
|
file, err := http.Dir(h.options.ConsoleTemplatesPath).Open(name)
|
|
|
|
if err != nil {
|
|
|
|
http.Error(w, err.Error(), http.StatusNotFound)
|
|
|
|
return
|
|
|
|
}
|
2018-11-27 05:58:27 -08:00
|
|
|
defer file.Close()
|
2015-06-15 03:50:53 -07:00
|
|
|
text, err := ioutil.ReadAll(file)
|
|
|
|
if err != nil {
|
|
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-02-18 06:52:29 -08:00
|
|
|
ctx = httputil.ContextFromRequest(ctx, r)
|
2020-01-10 04:56:36 -08:00
|
|
|
|
2015-06-15 03:50:53 -07:00
|
|
|
// Provide URL parameters as a map for easy use. Advanced users may have need for
|
|
|
|
// parameters beyond the first, so provide RawParams.
|
|
|
|
rawParams, err := url.ParseQuery(r.URL.RawQuery)
|
|
|
|
if err != nil {
|
|
|
|
http.Error(w, err.Error(), http.StatusBadRequest)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
params := map[string]string{}
|
|
|
|
for k, v := range rawParams {
|
|
|
|
params[k] = v[0]
|
|
|
|
}
|
2018-12-17 11:16:28 -08:00
|
|
|
|
2019-04-15 09:52:58 -07:00
|
|
|
externalLabels := map[string]string{}
|
|
|
|
h.mtx.RLock()
|
|
|
|
els := h.config.GlobalConfig.ExternalLabels
|
|
|
|
h.mtx.RUnlock()
|
|
|
|
for _, el := range els {
|
|
|
|
externalLabels[el.Name] = el.Value
|
2018-12-17 11:16:28 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
// Inject some convenience variables that are easier to remember for users
|
|
|
|
// who are not used to Go's templating system.
|
2019-04-15 09:52:58 -07:00
|
|
|
defs := []string{
|
|
|
|
"{{$rawParams := .RawParams }}",
|
|
|
|
"{{$params := .Params}}",
|
|
|
|
"{{$path := .Path}}",
|
|
|
|
"{{$externalLabels := .ExternalLabels}}",
|
|
|
|
}
|
2018-12-17 11:16:28 -08:00
|
|
|
|
2015-06-15 03:50:53 -07:00
|
|
|
data := struct {
|
2018-12-17 11:16:28 -08:00
|
|
|
RawParams url.Values
|
|
|
|
Params map[string]string
|
|
|
|
Path string
|
|
|
|
ExternalLabels map[string]string
|
2015-06-15 03:50:53 -07:00
|
|
|
}{
|
2018-12-17 11:16:28 -08:00
|
|
|
RawParams: rawParams,
|
|
|
|
Params: params,
|
|
|
|
Path: strings.TrimLeft(name, "/"),
|
2019-04-15 09:52:58 -07:00
|
|
|
ExternalLabels: externalLabels,
|
2015-06-15 03:50:53 -07:00
|
|
|
}
|
|
|
|
|
2017-11-23 04:04:54 -08:00
|
|
|
tmpl := template.NewTemplateExpander(
|
2020-01-10 04:56:36 -08:00
|
|
|
ctx,
|
2019-04-15 09:52:58 -07:00
|
|
|
strings.Join(append(defs, string(text)), ""),
|
2017-11-23 04:04:54 -08:00
|
|
|
"__console_"+name,
|
|
|
|
data,
|
|
|
|
h.now(),
|
2018-01-09 08:44:23 -08:00
|
|
|
template.QueryFunc(rules.EngineQueryFunc(h.queryEngine, h.storage)),
|
2017-11-23 04:04:54 -08:00
|
|
|
h.options.ExternalURL,
|
|
|
|
)
|
2015-06-15 03:50:53 -07:00
|
|
|
filenames, err := filepath.Glob(h.options.ConsoleLibrariesPath + "/*.lib")
|
|
|
|
if err != nil {
|
|
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
result, err := tmpl.ExpandHTML(filenames)
|
|
|
|
if err != nil {
|
|
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
io.WriteString(w, result)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (h *Handler) graph(w http.ResponseWriter, r *http.Request) {
|
2015-11-11 07:31:09 -08:00
|
|
|
h.executeTemplate(w, "graph.html", nil)
|
2015-06-15 03:50:53 -07:00
|
|
|
}
|
|
|
|
|
2015-06-16 05:57:30 -07:00
|
|
|
func (h *Handler) status(w http.ResponseWriter, r *http.Request) {
|
2018-03-21 09:08:37 -07:00
|
|
|
status := struct {
|
|
|
|
Birth time.Time
|
|
|
|
CWD string
|
|
|
|
Version *PrometheusVersion
|
|
|
|
Alertmanagers []*url.URL
|
|
|
|
GoroutineCount int
|
|
|
|
GOMAXPROCS int
|
|
|
|
GOGC string
|
2019-03-18 04:10:13 -07:00
|
|
|
GODEBUG string
|
2018-03-21 09:08:37 -07:00
|
|
|
CorruptionCount int64
|
|
|
|
ChunkCount int64
|
|
|
|
TimeSeriesCount int64
|
|
|
|
LastConfigTime time.Time
|
|
|
|
ReloadConfigSuccess bool
|
2019-03-11 10:18:57 -07:00
|
|
|
StorageRetention string
|
2019-11-04 18:06:13 -08:00
|
|
|
NumSeries uint64
|
|
|
|
MaxTime int64
|
|
|
|
MinTime int64
|
|
|
|
Stats *index.PostingsStats
|
|
|
|
Duration string
|
2015-06-15 03:23:02 -07:00
|
|
|
}{
|
2018-03-07 07:14:46 -08:00
|
|
|
Birth: h.birth,
|
|
|
|
CWD: h.cwd,
|
|
|
|
Version: h.versionInfo,
|
|
|
|
Alertmanagers: h.notifier.Alertmanagers(),
|
|
|
|
GoroutineCount: runtime.NumGoroutine(),
|
|
|
|
GOMAXPROCS: runtime.GOMAXPROCS(0),
|
|
|
|
GOGC: os.Getenv("GOGC"),
|
2019-03-18 04:10:13 -07:00
|
|
|
GODEBUG: os.Getenv("GODEBUG"),
|
2018-03-21 09:08:37 -07:00
|
|
|
}
|
2019-03-11 10:18:57 -07:00
|
|
|
|
2020-02-18 03:25:36 -08:00
|
|
|
if h.options.TSDBRetentionDuration != 0 {
|
|
|
|
status.StorageRetention = h.options.TSDBRetentionDuration.String()
|
2019-03-11 10:18:57 -07:00
|
|
|
}
|
2020-02-18 03:25:36 -08:00
|
|
|
if h.options.TSDBMaxBytes != 0 {
|
2019-03-11 10:18:57 -07:00
|
|
|
if status.StorageRetention != "" {
|
|
|
|
status.StorageRetention = status.StorageRetention + " or "
|
|
|
|
}
|
2020-02-18 03:25:36 -08:00
|
|
|
status.StorageRetention = status.StorageRetention + h.options.TSDBMaxBytes.String()
|
2019-03-11 10:18:57 -07:00
|
|
|
}
|
|
|
|
|
2019-06-24 06:48:15 -07:00
|
|
|
metrics, err := h.gatherer.Gather()
|
2018-03-21 09:08:37 -07:00
|
|
|
if err != nil {
|
|
|
|
http.Error(w, fmt.Sprintf("error gathering runtime status: %s", err), http.StatusInternalServerError)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
for _, mF := range metrics {
|
|
|
|
switch *mF.Name {
|
|
|
|
case "prometheus_tsdb_head_chunks":
|
|
|
|
status.ChunkCount = int64(toFloat64(mF))
|
|
|
|
case "prometheus_tsdb_head_series":
|
|
|
|
status.TimeSeriesCount = int64(toFloat64(mF))
|
|
|
|
case "prometheus_tsdb_wal_corruptions_total":
|
|
|
|
status.CorruptionCount = int64(toFloat64(mF))
|
|
|
|
case "prometheus_config_last_reload_successful":
|
|
|
|
status.ReloadConfigSuccess = toFloat64(mF) != 0
|
|
|
|
case "prometheus_config_last_reload_success_timestamp_seconds":
|
2020-03-29 09:35:39 -07:00
|
|
|
status.LastConfigTime = time.Unix(int64(toFloat64(mF)), 0).UTC()
|
2018-03-21 09:08:37 -07:00
|
|
|
}
|
|
|
|
}
|
2019-11-04 18:06:13 -08:00
|
|
|
db := h.tsdb()
|
|
|
|
startTime := time.Now().UnixNano()
|
|
|
|
status.Stats = db.Head().PostingsCardinalityStats("__name__")
|
|
|
|
status.Duration = fmt.Sprintf("%.3f", float64(time.Now().UnixNano()-startTime)/float64(1e9))
|
|
|
|
status.NumSeries = db.Head().NumSeries()
|
|
|
|
status.MaxTime = db.Head().MaxTime()
|
|
|
|
status.MinTime = db.Head().MaxTime()
|
|
|
|
|
2018-03-21 09:08:37 -07:00
|
|
|
h.executeTemplate(w, "status.html", status)
|
|
|
|
}
|
|
|
|
|
2019-11-02 08:53:32 -07:00
|
|
|
func (h *Handler) runtimeInfo() (api_v1.RuntimeInfo, error) {
|
|
|
|
status := api_v1.RuntimeInfo{
|
|
|
|
StartTime: h.birth,
|
|
|
|
CWD: h.cwd,
|
|
|
|
GoroutineCount: runtime.NumGoroutine(),
|
|
|
|
GOMAXPROCS: runtime.GOMAXPROCS(0),
|
|
|
|
GOGC: os.Getenv("GOGC"),
|
|
|
|
GODEBUG: os.Getenv("GODEBUG"),
|
|
|
|
}
|
|
|
|
|
2020-02-18 03:25:36 -08:00
|
|
|
if h.options.TSDBRetentionDuration != 0 {
|
|
|
|
status.StorageRetention = h.options.TSDBRetentionDuration.String()
|
2019-11-02 08:53:32 -07:00
|
|
|
}
|
2020-02-18 03:25:36 -08:00
|
|
|
if h.options.TSDBMaxBytes != 0 {
|
2019-11-02 08:53:32 -07:00
|
|
|
if status.StorageRetention != "" {
|
|
|
|
status.StorageRetention = status.StorageRetention + " or "
|
|
|
|
}
|
2020-02-18 03:25:36 -08:00
|
|
|
status.StorageRetention = status.StorageRetention + h.options.TSDBMaxBytes.String()
|
2019-11-02 08:53:32 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
metrics, err := h.gatherer.Gather()
|
|
|
|
if err != nil {
|
|
|
|
return status, errors.Errorf("error gathering runtime status: %s", err)
|
|
|
|
}
|
|
|
|
for _, mF := range metrics {
|
|
|
|
switch *mF.Name {
|
|
|
|
case "prometheus_tsdb_head_chunks":
|
|
|
|
status.ChunkCount = int64(toFloat64(mF))
|
|
|
|
case "prometheus_tsdb_head_series":
|
|
|
|
status.TimeSeriesCount = int64(toFloat64(mF))
|
|
|
|
case "prometheus_tsdb_wal_corruptions_total":
|
|
|
|
status.CorruptionCount = int64(toFloat64(mF))
|
|
|
|
case "prometheus_config_last_reload_successful":
|
|
|
|
status.ReloadConfigSuccess = toFloat64(mF) != 0
|
|
|
|
case "prometheus_config_last_reload_success_timestamp_seconds":
|
2020-03-29 09:35:39 -07:00
|
|
|
status.LastConfigTime = time.Unix(int64(toFloat64(mF)), 0).UTC()
|
2019-11-02 08:53:32 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return status, nil
|
|
|
|
}
|
|
|
|
|
2018-03-21 09:08:37 -07:00
|
|
|
func toFloat64(f *io_prometheus_client.MetricFamily) float64 {
|
|
|
|
m := *f.Metric[0]
|
|
|
|
if m.Gauge != nil {
|
|
|
|
return m.Gauge.GetValue()
|
|
|
|
}
|
|
|
|
if m.Counter != nil {
|
|
|
|
return m.Counter.GetValue()
|
|
|
|
}
|
|
|
|
if m.Untyped != nil {
|
|
|
|
return m.Untyped.GetValue()
|
|
|
|
}
|
|
|
|
return math.NaN()
|
2015-06-15 03:50:53 -07:00
|
|
|
}
|
2014-04-14 16:02:15 -07:00
|
|
|
|
2016-05-13 08:59:59 -07:00
|
|
|
func (h *Handler) flags(w http.ResponseWriter, r *http.Request) {
|
|
|
|
h.executeTemplate(w, "flags.html", h.flagsMap)
|
|
|
|
}
|
|
|
|
|
2017-05-11 08:09:24 -07:00
|
|
|
func (h *Handler) serveConfig(w http.ResponseWriter, r *http.Request) {
|
2016-05-13 08:59:59 -07:00
|
|
|
h.mtx.RLock()
|
|
|
|
defer h.mtx.RUnlock()
|
|
|
|
|
2017-05-11 08:09:24 -07:00
|
|
|
h.executeTemplate(w, "config.html", h.config.String())
|
2016-05-13 08:59:59 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
func (h *Handler) rules(w http.ResponseWriter, r *http.Request) {
|
|
|
|
h.executeTemplate(w, "rules.html", h.ruleManager)
|
|
|
|
}
|
|
|
|
|
2017-12-04 07:12:28 -08:00
|
|
|
func (h *Handler) serviceDiscovery(w http.ResponseWriter, r *http.Request) {
|
|
|
|
var index []string
|
2018-04-09 07:18:25 -07:00
|
|
|
targets := h.scrapeManager.TargetsAll()
|
2017-12-04 07:12:28 -08:00
|
|
|
for job := range targets {
|
|
|
|
index = append(index, job)
|
|
|
|
}
|
|
|
|
sort.Strings(index)
|
|
|
|
scrapeConfigData := struct {
|
|
|
|
Index []string
|
2018-02-01 01:55:07 -08:00
|
|
|
Targets map[string][]*scrape.Target
|
2018-06-05 02:20:32 -07:00
|
|
|
Active []int
|
|
|
|
Dropped []int
|
|
|
|
Total []int
|
2017-12-04 07:12:28 -08:00
|
|
|
}{
|
|
|
|
Index: index,
|
2018-06-05 02:20:32 -07:00
|
|
|
Targets: make(map[string][]*scrape.Target),
|
|
|
|
Active: make([]int, len(index)),
|
|
|
|
Dropped: make([]int, len(index)),
|
|
|
|
Total: make([]int, len(index)),
|
2017-12-04 07:12:28 -08:00
|
|
|
}
|
2018-06-05 02:20:32 -07:00
|
|
|
for i, job := range scrapeConfigData.Index {
|
|
|
|
scrapeConfigData.Targets[job] = make([]*scrape.Target, 0, len(targets[job]))
|
|
|
|
scrapeConfigData.Total[i] = len(targets[job])
|
|
|
|
for _, target := range targets[job] {
|
|
|
|
// Do not display more than 100 dropped targets per job to avoid
|
|
|
|
// returning too much data to the clients.
|
|
|
|
if target.Labels().Len() == 0 {
|
|
|
|
scrapeConfigData.Dropped[i]++
|
|
|
|
if scrapeConfigData.Dropped[i] > 100 {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
scrapeConfigData.Active[i]++
|
|
|
|
}
|
|
|
|
scrapeConfigData.Targets[job] = append(scrapeConfigData.Targets[job], target)
|
|
|
|
}
|
2017-12-04 07:12:28 -08:00
|
|
|
}
|
2018-06-05 02:20:32 -07:00
|
|
|
|
2017-12-04 07:12:28 -08:00
|
|
|
h.executeTemplate(w, "service-discovery.html", scrapeConfigData)
|
|
|
|
}
|
|
|
|
|
2016-05-13 08:59:59 -07:00
|
|
|
func (h *Handler) targets(w http.ResponseWriter, r *http.Request) {
|
2018-09-26 02:20:56 -07:00
|
|
|
tps := h.scrapeManager.TargetsActive()
|
2017-03-30 13:45:18 -07:00
|
|
|
for _, targets := range tps {
|
|
|
|
sort.Slice(targets, func(i, j int) bool {
|
2019-02-01 00:54:12 -08:00
|
|
|
iJobLabel := targets[i].Labels().Get(model.JobLabel)
|
|
|
|
jJobLabel := targets[j].Labels().Get(model.JobLabel)
|
|
|
|
if iJobLabel == jJobLabel {
|
|
|
|
return targets[i].Labels().Get(model.InstanceLabel) < targets[j].Labels().Get(model.InstanceLabel)
|
|
|
|
}
|
|
|
|
return iJobLabel < jJobLabel
|
2017-03-30 13:45:18 -07:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2016-11-23 09:23:09 -08:00
|
|
|
h.executeTemplate(w, "targets.html", struct {
|
2018-02-01 01:55:07 -08:00
|
|
|
TargetPools map[string][]*scrape.Target
|
2016-11-23 09:23:09 -08:00
|
|
|
}{
|
2016-12-02 04:28:58 -08:00
|
|
|
TargetPools: tps,
|
2016-11-23 09:23:09 -08:00
|
|
|
})
|
2016-05-13 08:59:59 -07:00
|
|
|
}
|
|
|
|
|
2015-06-16 05:57:30 -07:00
|
|
|
func (h *Handler) version(w http.ResponseWriter, r *http.Request) {
|
|
|
|
dec := json.NewEncoder(w)
|
2016-05-05 04:46:51 -07:00
|
|
|
if err := dec.Encode(h.versionInfo); err != nil {
|
2015-06-16 05:57:30 -07:00
|
|
|
http.Error(w, fmt.Sprintf("error encoding JSON: %s", err), http.StatusInternalServerError)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-06-15 03:50:53 -07:00
|
|
|
func (h *Handler) quit(w http.ResponseWriter, r *http.Request) {
|
|
|
|
fmt.Fprintf(w, "Requesting termination... Goodbye!")
|
|
|
|
close(h.quitCh)
|
2014-04-14 16:02:15 -07:00
|
|
|
}
|
|
|
|
|
2015-08-11 00:08:17 -07:00
|
|
|
func (h *Handler) reload(w http.ResponseWriter, r *http.Request) {
|
2016-07-11 07:24:54 -07:00
|
|
|
rc := make(chan error)
|
|
|
|
h.reloadCh <- rc
|
|
|
|
if err := <-rc; err != nil {
|
|
|
|
http.Error(w, fmt.Sprintf("failed to reload config: %s", err), http.StatusInternalServerError)
|
|
|
|
}
|
2015-08-11 00:08:17 -07:00
|
|
|
}
|
|
|
|
|
2015-06-30 05:38:01 -07:00
|
|
|
func (h *Handler) consolesPath() string {
|
2015-06-15 03:50:53 -07:00
|
|
|
if _, err := os.Stat(h.options.ConsoleTemplatesPath + "/index.html"); !os.IsNotExist(err) {
|
2015-06-30 05:38:01 -07:00
|
|
|
return h.options.ExternalURL.Path + "/consoles/index.html"
|
2014-10-02 07:44:47 -07:00
|
|
|
}
|
2015-06-15 03:50:53 -07:00
|
|
|
if h.options.UserAssetsPath != "" {
|
|
|
|
if _, err := os.Stat(h.options.UserAssetsPath + "/index.html"); !os.IsNotExist(err) {
|
2015-06-30 05:38:01 -07:00
|
|
|
return h.options.ExternalURL.Path + "/user/index.html"
|
2014-10-02 07:44:47 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
2015-06-30 05:38:01 -07:00
|
|
|
func tmplFuncs(consolesPath string, opts *Options) template_text.FuncMap {
|
|
|
|
return template_text.FuncMap{
|
2016-06-08 11:23:54 -07:00
|
|
|
"since": func(t time.Time) time.Duration {
|
|
|
|
return time.Since(t) / time.Millisecond * time.Millisecond
|
|
|
|
},
|
2015-06-30 05:38:01 -07:00
|
|
|
"consolesPath": func() string { return consolesPath },
|
2018-06-12 05:07:09 -07:00
|
|
|
"pathPrefix": func() string { return opts.ExternalURL.Path },
|
2018-11-20 20:45:06 -08:00
|
|
|
"pageTitle": func() string { return opts.PageTitle },
|
2017-03-18 13:38:35 -07:00
|
|
|
"buildVersion": func() string { return opts.Version.Revision },
|
2015-06-22 13:57:32 -07:00
|
|
|
"globalURL": func(u *url.URL) *url.URL {
|
2015-06-30 05:38:01 -07:00
|
|
|
host, port, err := net.SplitHostPort(u.Host)
|
|
|
|
if err != nil {
|
|
|
|
return u
|
|
|
|
}
|
2020-02-17 09:19:15 -08:00
|
|
|
for _, lhr := range api_v1.LocalhostRepresentations {
|
2015-06-30 05:38:01 -07:00
|
|
|
if host == lhr {
|
|
|
|
_, ownPort, err := net.SplitHostPort(opts.ListenAddress)
|
|
|
|
if err != nil {
|
|
|
|
return u
|
|
|
|
}
|
|
|
|
|
|
|
|
if port == ownPort {
|
|
|
|
// Only in the case where the target is on localhost and its port is
|
|
|
|
// the same as the one we're listening on, we know for sure that
|
|
|
|
// we're monitoring our own process and that we need to change the
|
|
|
|
// scheme, hostname, and port to the externally reachable ones as
|
|
|
|
// well. We shouldn't need to touch the path at all, since if a
|
|
|
|
// path prefix is defined, the path under which we scrape ourselves
|
|
|
|
// should already contain the prefix.
|
|
|
|
u.Scheme = opts.ExternalURL.Scheme
|
|
|
|
u.Host = opts.ExternalURL.Host
|
|
|
|
} else {
|
|
|
|
// Otherwise, we only know that localhost is not reachable
|
|
|
|
// externally, so we replace only the hostname by the one in the
|
|
|
|
// external URL. It could be the wrong hostname for the service on
|
|
|
|
// this port, but it's still the best possible guess.
|
|
|
|
host, _, err := net.SplitHostPort(opts.ExternalURL.Host)
|
|
|
|
if err != nil {
|
|
|
|
return u
|
|
|
|
}
|
|
|
|
u.Host = host + ":" + port
|
|
|
|
}
|
|
|
|
break
|
2015-06-22 13:57:32 -07:00
|
|
|
}
|
2015-05-18 03:16:25 -07:00
|
|
|
}
|
2015-06-22 13:57:32 -07:00
|
|
|
return u
|
2015-05-18 03:16:25 -07:00
|
|
|
},
|
2018-02-01 01:55:07 -08:00
|
|
|
"numHealthy": func(pool []*scrape.Target) int {
|
2017-08-09 08:10:30 -07:00
|
|
|
alive := len(pool)
|
|
|
|
for _, p := range pool {
|
2018-02-01 01:55:07 -08:00
|
|
|
if p.Health() != scrape.HealthGood {
|
2017-08-09 08:10:30 -07:00
|
|
|
alive--
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return alive
|
|
|
|
},
|
2018-08-06 15:33:45 -07:00
|
|
|
"targetHealthToClass": func(th scrape.TargetHealth) string {
|
2015-06-15 03:50:53 -07:00
|
|
|
switch th {
|
2018-02-01 01:55:07 -08:00
|
|
|
case scrape.HealthUnknown:
|
2015-06-15 03:50:53 -07:00
|
|
|
return "warning"
|
2018-02-01 01:55:07 -08:00
|
|
|
case scrape.HealthGood:
|
2015-06-15 03:50:53 -07:00
|
|
|
return "success"
|
|
|
|
default:
|
|
|
|
return "danger"
|
|
|
|
}
|
|
|
|
},
|
2018-08-06 15:33:45 -07:00
|
|
|
"ruleHealthToClass": func(rh rules.RuleHealth) string {
|
|
|
|
switch rh {
|
|
|
|
case rules.HealthUnknown:
|
|
|
|
return "warning"
|
|
|
|
case rules.HealthGood:
|
|
|
|
return "success"
|
|
|
|
default:
|
|
|
|
return "danger"
|
|
|
|
}
|
|
|
|
},
|
2015-06-23 08:46:50 -07:00
|
|
|
"alertStateToClass": func(as rules.AlertState) string {
|
|
|
|
switch as {
|
|
|
|
case rules.StateInactive:
|
|
|
|
return "success"
|
|
|
|
case rules.StatePending:
|
|
|
|
return "warning"
|
|
|
|
case rules.StateFiring:
|
|
|
|
return "danger"
|
|
|
|
default:
|
|
|
|
panic("unknown alert state")
|
|
|
|
}
|
|
|
|
},
|
2015-06-30 05:38:01 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-11-11 07:31:09 -08:00
|
|
|
func (h *Handler) getTemplate(name string) (string, error) {
|
2018-08-24 00:03:10 -07:00
|
|
|
var tmpl string
|
|
|
|
|
|
|
|
appendf := func(name string) error {
|
2018-09-19 00:20:53 -07:00
|
|
|
f, err := ui.Assets.Open(path.Join("/templates", name))
|
2018-08-24 00:03:10 -07:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer f.Close()
|
|
|
|
b, err := ioutil.ReadAll(f)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
tmpl += string(b)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
err := appendf("_base.html")
|
2015-11-11 07:31:09 -08:00
|
|
|
if err != nil {
|
2019-03-25 16:01:12 -07:00
|
|
|
return "", errors.Wrap(err, "error reading base template")
|
2015-11-11 07:31:09 -08:00
|
|
|
}
|
2018-08-24 00:03:10 -07:00
|
|
|
err = appendf(name)
|
2015-11-11 07:31:09 -08:00
|
|
|
if err != nil {
|
2019-03-25 16:01:12 -07:00
|
|
|
return "", errors.Wrapf(err, "error reading page template %s", name)
|
2015-11-11 07:31:09 -08:00
|
|
|
}
|
2018-08-24 00:03:10 -07:00
|
|
|
|
|
|
|
return tmpl, nil
|
2015-11-11 07:31:09 -08:00
|
|
|
}
|
|
|
|
|
2015-06-30 05:38:01 -07:00
|
|
|
func (h *Handler) executeTemplate(w http.ResponseWriter, name string, data interface{}) {
|
|
|
|
text, err := h.getTemplate(name)
|
|
|
|
if err != nil {
|
|
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
|
|
}
|
|
|
|
|
2017-11-23 04:04:54 -08:00
|
|
|
tmpl := template.NewTemplateExpander(
|
|
|
|
h.context,
|
|
|
|
text,
|
|
|
|
name,
|
|
|
|
data,
|
|
|
|
h.now(),
|
2018-01-09 08:44:23 -08:00
|
|
|
template.QueryFunc(rules.EngineQueryFunc(h.queryEngine, h.storage)),
|
2017-11-23 04:04:54 -08:00
|
|
|
h.options.ExternalURL,
|
|
|
|
)
|
2015-06-30 05:38:01 -07:00
|
|
|
tmpl.Funcs(tmplFuncs(h.consolesPath(), h.options))
|
2015-05-18 03:16:25 -07:00
|
|
|
|
2015-06-23 08:46:50 -07:00
|
|
|
result, err := tmpl.ExpandHTML(nil)
|
2013-03-27 09:40:01 -07:00
|
|
|
if err != nil {
|
2015-06-23 08:46:50 -07:00
|
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
2013-03-27 09:40:01 -07:00
|
|
|
return
|
|
|
|
}
|
2015-06-23 08:46:50 -07:00
|
|
|
io.WriteString(w, result)
|
2013-03-27 09:40:01 -07:00
|
|
|
}
|
2013-08-09 09:09:44 -07:00
|
|
|
|
2015-06-15 03:50:53 -07:00
|
|
|
// AlertStatus bundles alerting rules and the mapping of alert states to row classes.
|
|
|
|
type AlertStatus struct {
|
2019-05-14 14:14:27 -07:00
|
|
|
Groups []*rules.Group
|
2015-06-15 03:50:53 -07:00
|
|
|
AlertStateToRowClass map[rules.AlertState]string
|
2019-10-29 03:09:53 -07:00
|
|
|
Counts AlertByStateCount
|
|
|
|
}
|
|
|
|
|
|
|
|
type AlertByStateCount struct {
|
|
|
|
Inactive int32
|
|
|
|
Pending int32
|
|
|
|
Firing int32
|
2013-08-09 09:09:44 -07:00
|
|
|
}
|
2020-01-10 04:56:36 -08:00
|
|
|
|
|
|
|
func setPathWithPrefix(prefix string) func(handlerName string, handler http.HandlerFunc) http.HandlerFunc {
|
|
|
|
return func(handlerName string, handler http.HandlerFunc) http.HandlerFunc {
|
|
|
|
return func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
handler(w, r.WithContext(httputil.ContextWithPath(r.Context(), prefix+r.URL.Path)))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|