mirror of
https://github.com/prometheus/prometheus.git
synced 2024-11-12 16:44:05 -08:00
01f652cb4c
This was initially motivated by wanting to distribute the rule checker tool under `tools/rule_checker`. However, this was not possible without also distributing the LevelDB dynamic libraries because the tool transitively depended on Levigo: rule checker -> query layer -> tiered storage layer -> leveldb This change separates external storage interfaces from the implementation (tiered storage, leveldb storage, memory storage) by putting them into separate packages: - storage/metric: public, implementation-agnostic interfaces - storage/metric/tiered: tiered storage implementation, including memory and LevelDB storage. I initially also considered splitting up the implementation into separate packages for tiered storage, memory storage, and LevelDB storage, but these are currently so intertwined that it would be another major project in itself. The query layers and most other parts of Prometheus now have notion of the storage implementation anymore and just use whatever implementation they get passed in via interfaces. The rule_checker is now a static binary :) Change-Id: I793bbf631a8648ca31790e7e772ecf9c2b92f7a0
211 lines
4.9 KiB
Go
211 lines
4.9 KiB
Go
// Copyright 2013 Prometheus Team
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package rules
|
|
|
|
import (
|
|
"fmt"
|
|
"sync"
|
|
"time"
|
|
|
|
"github.com/golang/glog"
|
|
"github.com/prometheus/client_golang/extraction"
|
|
|
|
clientmodel "github.com/prometheus/client_golang/model"
|
|
|
|
"github.com/prometheus/prometheus/config"
|
|
"github.com/prometheus/prometheus/notification"
|
|
"github.com/prometheus/prometheus/storage/metric"
|
|
)
|
|
|
|
type RuleManager interface {
|
|
// Load and add rules from rule files specified in the configuration.
|
|
AddRulesFromConfig(config config.Config) error
|
|
// Start the rule manager's periodic rule evaluation.
|
|
Run()
|
|
// Stop the rule manager's rule evaluation cycles.
|
|
Stop()
|
|
// Return all rules.
|
|
Rules() []Rule
|
|
// Return all alerting rules.
|
|
AlertingRules() []*AlertingRule
|
|
}
|
|
|
|
type ruleManager struct {
|
|
// Protects the rules list.
|
|
sync.Mutex
|
|
rules []Rule
|
|
|
|
done chan bool
|
|
|
|
interval time.Duration
|
|
storage metric.PreloadingPersistence
|
|
|
|
results chan<- *extraction.Result
|
|
notifications chan<- notification.NotificationReqs
|
|
|
|
prometheusUrl string
|
|
}
|
|
|
|
type RuleManagerOptions struct {
|
|
EvaluationInterval time.Duration
|
|
Storage metric.PreloadingPersistence
|
|
|
|
Notifications chan<- notification.NotificationReqs
|
|
Results chan<- *extraction.Result
|
|
|
|
PrometheusUrl string
|
|
}
|
|
|
|
func NewRuleManager(o *RuleManagerOptions) RuleManager {
|
|
manager := &ruleManager{
|
|
rules: []Rule{},
|
|
done: make(chan bool),
|
|
|
|
interval: o.EvaluationInterval,
|
|
storage: o.Storage,
|
|
results: o.Results,
|
|
notifications: o.Notifications,
|
|
prometheusUrl: o.PrometheusUrl,
|
|
}
|
|
return manager
|
|
}
|
|
|
|
func (m *ruleManager) Run() {
|
|
ticker := time.NewTicker(m.interval)
|
|
defer ticker.Stop()
|
|
|
|
for {
|
|
select {
|
|
case <-ticker.C:
|
|
start := time.Now()
|
|
m.runIteration(m.results)
|
|
iterationDuration.Add(map[string]string{intervalLabel: m.interval.String()}, float64(time.Since(start)/time.Millisecond))
|
|
case <-m.done:
|
|
glog.Info("Rule manager exiting...")
|
|
return
|
|
}
|
|
}
|
|
}
|
|
|
|
func (m *ruleManager) Stop() {
|
|
select {
|
|
case m.done <- true:
|
|
default:
|
|
}
|
|
}
|
|
|
|
func (m *ruleManager) queueAlertNotifications(rule *AlertingRule) {
|
|
activeAlerts := rule.ActiveAlerts()
|
|
if len(activeAlerts) == 0 {
|
|
return
|
|
}
|
|
|
|
notifications := make(notification.NotificationReqs, 0, len(activeAlerts))
|
|
for _, aa := range activeAlerts {
|
|
if aa.State != FIRING {
|
|
// BUG: In the future, make AlertManager support pending alerts?
|
|
continue
|
|
}
|
|
|
|
notifications = append(notifications, ¬ification.NotificationReq{
|
|
Summary: rule.Summary,
|
|
Description: rule.Description,
|
|
Labels: aa.Labels.Merge(clientmodel.LabelSet{
|
|
AlertNameLabel: clientmodel.LabelValue(rule.Name()),
|
|
}),
|
|
Value: aa.Value,
|
|
ActiveSince: aa.ActiveSince.Time(),
|
|
RuleString: rule.String(),
|
|
GeneratorUrl: m.prometheusUrl + ConsoleLinkForExpression(rule.vector.String()),
|
|
})
|
|
}
|
|
m.notifications <- notifications
|
|
}
|
|
|
|
func (m *ruleManager) runIteration(results chan<- *extraction.Result) {
|
|
now := clientmodel.Now()
|
|
wg := sync.WaitGroup{}
|
|
|
|
m.Lock()
|
|
rules := make([]Rule, len(m.rules))
|
|
copy(rules, m.rules)
|
|
m.Unlock()
|
|
|
|
for _, rule := range rules {
|
|
wg.Add(1)
|
|
// BUG(julius): Look at fixing thundering herd.
|
|
go func(rule Rule) {
|
|
defer wg.Done()
|
|
|
|
start := time.Now()
|
|
vector, err := rule.Eval(now, m.storage)
|
|
duration := time.Since(start)
|
|
|
|
samples := make(clientmodel.Samples, len(vector))
|
|
copy(samples, vector)
|
|
m.results <- &extraction.Result{
|
|
Samples: samples,
|
|
Err: err,
|
|
}
|
|
|
|
switch r := rule.(type) {
|
|
case *AlertingRule:
|
|
m.queueAlertNotifications(r)
|
|
recordOutcome(alertingRuleType, duration)
|
|
case *RecordingRule:
|
|
recordOutcome(recordingRuleType, duration)
|
|
default:
|
|
panic(fmt.Sprintf("Unknown rule type: %T", rule))
|
|
}
|
|
}(rule)
|
|
}
|
|
|
|
wg.Wait()
|
|
}
|
|
|
|
func (m *ruleManager) AddRulesFromConfig(config config.Config) error {
|
|
for _, ruleFile := range config.Global.RuleFile {
|
|
newRules, err := LoadRulesFromFile(ruleFile)
|
|
if err != nil {
|
|
return fmt.Errorf("%s: %s", ruleFile, err)
|
|
}
|
|
m.Lock()
|
|
m.rules = append(m.rules, newRules...)
|
|
m.Unlock()
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (m *ruleManager) Rules() []Rule {
|
|
m.Lock()
|
|
defer m.Unlock()
|
|
|
|
rules := make([]Rule, len(m.rules))
|
|
copy(rules, m.rules)
|
|
return rules
|
|
}
|
|
|
|
func (m *ruleManager) AlertingRules() []*AlertingRule {
|
|
m.Lock()
|
|
defer m.Unlock()
|
|
|
|
alerts := []*AlertingRule{}
|
|
for _, rule := range m.rules {
|
|
if alertingRule, ok := rule.(*AlertingRule); ok {
|
|
alerts = append(alerts, alertingRule)
|
|
}
|
|
}
|
|
return alerts
|
|
}
|