BREAKING CHANGE: this changes configuration schema for custom label values, it provides more flexibility when setting custom labels and also prevents '*' special wildcard value from conflicting with labels, since '*' is a valid label value. Fixes #537
19 KiB
Configuration options
Config file
By default karma will try to read configuration file named karma.yaml from
current directory. Configuration file uses YAML format and
it needs to have .yaml extension.
Custom filename and directory can be passed via command line flags or
environment variables:
--config.fileflag orCONFIG_FILEenv variable - path to the config file
Example with flags:
karma --config.file docs/example.yaml
Example with environment variables:
CONFIG_FILE="docs/example.yaml"
Alertmanagers
alertmanager section allows setting Alertmanager servers that should be
queried for alerts.
You can configure one or more Alertmanager servers, alerts
with identical label set will be deduplicated and labeled with each Alertmanager
server they were observed at. This allows using karma to collect alerts from a
pair of Alertmanager instances running in
HA mode.
Syntax:
alertmanager:
interval: duration
servers:
- name: string
uri: string
timeout: duration
proxy: bool
tls:
ca: string
cert: string
key: string
insecureSkipVerify: bool
headers:
any: string
interval- how often alerts should be refreshed, a string in time.Duration format. If set to1mkarma will query every Alertmanager server once a minute. This is global setting applied to every Alertmanager server. All instances will be queried in parallel. Note that the maximum value for this option is15m. The UI has a watchdog that tracks the timestamp of the last pull. If the UI does not receive updates for more than 15 minutes it will print an error and reload the page.name- name of this Alertmanager server, will be used as a label added to every alert in the UI and for filtering alerts using@alertmanager=NAMEfilteruri- base URI of this Alertmanager server. Supported URI schemes arehttp://,https://andfile://.file://scheme is only useful for testing with JSON files, see mock dir for examples, files in this directory are used for running tests and when running demo instance of karma withmake run. If URI contains basic auth info (https://user:password@alertmanager.example.com) and you don't want it to be visible to users then ensureproxy: trueis also set. Without proxy mode full URI needs to be passed to karma web UI code. With proxy mode all requests will be routed via karma HTTP server and since karma has full URI in the config it only needs Alertmanager name in that request.proxy: truein order to avoid leaking auth information to the browser.timeout- timeout for requests send to this Alertmanager server, a string in time.Duration format.proxy- if enabled requests from user browsers to this Alertmanager will be proxied via karma. This applies to requests made when managing silences via karma (creating or expiring silences).tls:ca- path to CA certificate used to establish TLS connection to this Alertmanager instance (for URIs usinghttps://scheme). If unset or empty string is set then Go will try to find system CA certificates using well known paths.tls:cert- path to a TLS client certificate file to use when establishing TLS connections to this Alertmanager instance if it requires a TLS client authentication. Note that this option requirestls:keyto be also set.tls:key- path to a TLS client key file to use when establishing TLS connections to this Alertmanager instance if it requires a TLS client authentication. Note that this option requirestls:certto be also set.tls:insecureSkipVerify- disable server certificate validation, can be set to allow using self-signed certs, use at your own riskheaders- a map with a list of key: values which are header: value. These custom headers will be sent with every request to the alert manager instance.
Example with two production Alertmanager instances running in HA mode and a staging instance that is also proxied and requires a custom auth header:
alertmanager:
interval: 1m
servers:
- name: production1
uri: https://alertmanager1.prod.example.com
timeout: 20s
proxy: false
- name: production2
uri: https://alertmanager2.prod.example.com
timeout: 20s
proxy: false
- name: staging
uri: https://alertmanager.staging.example.com
timeout: 30s
proxy: true
tls:
ca: /etc/ssl/staging-ca.crt
headers:
X-Auth-Token: aValidToken
- name: protected
uri: https://alertmanager-auth.prod.example.com
timeout: 20s
tls:
cert: /etc/ssl/client.pem
key: /etc/ssl/client.key
- name: self-signed
uri: https://test.example.com
tls:
insecureSkipVerify: true
Defaults:
alertmanager:
interval: 1m
servers: []
There is no default for alertmanager.servers and it's a required option for
setting multiple Alertmanager servers. For cases where only a single server
needs to be configured without a config file see
Simplified Configuration.
Annotations
annotations section allows configuring how alert annotation are displayed in
the UI.
Syntax:
annotations:
default:
hidden: bool
hidden: list of strings
visible: list of strings
keep: list of strings
strip: list of strings
default:hidden- bool, true if all annotations should be hidden by default.hidden- list of annotations that should be hidden by default.visible- list of annotations that should be visible by default whendefault:hiddenis set totrue.keep- list of allowed annotations, if empty all annotations are allowed.strip- list of ignored annotations.
The difference between hidden/visible and keep/strip is that hidden
annotations are still accessible, but they are shown in the UI collapsed by
default (only name is visible, value is shown after clicking), while stripped
annotations are removed entirely and never presented to the user.
Example where all annotations except summary are hidden by default. If there
are additional annotation keys user will need to click on the + icon to see
them.
annotations:
default:
hidden: true
hidden: []
visible:
- summary
keep: []
strip:
- help
- verylong
Example where all annotations except details are visible by default. If
details annotation is present on any alert user will need to click on the +
icon to see it. Additionally secret annotation is stripped and never shown
in the UI.
annotations:
default:
hidden: false
hidden:
- details
visible: []
keep: []
strip:
- secret
Defaults:
annotations:
default:
hidden: false
hidden: []
visible: []
Filters
filters section allows configuring default set of filters used in the UI.
Syntax:
filters:
default: list of strings
default- list of filters to use by default when user navigates to karma web UI. Visit/helppage in karma for details on available filters. Note that if a string starts with@YAML requires to wrap it in quotes.
Example:
filters:
default:
- "@state=active"
- severity=critical
Defaults:
filters:
default: []
Grid
grid section allows customizing how alert grid is rendered in the UI.
Sorting configuration can be overridden by each user via UI settings.
Syntax:
grid:
sorting:
order: string
reverse: bool
label: string
customValues:
labels: dict
sorting:order- default sort order for alert grid, valid values are:disabled- no sorting, alert groups are rendered in the order they are returned by the APIstartsAt- sort by alert timestamps, most recent alert in each group will be used when comparing each grouplabel- sort by labels, if the label used for sorting is not shared by all alerts in a group then the first alert in the group will be queried for it
sorting:reverse- default value for reversed sort ordersorting:label- label name for sorting whengrid:sorting:orderis set tolabel. Labels can be assigned custom values used only by sorting viasorting:customValues:labels.sorting:customValues:labels- when sorting using alert labels values are compared as strings, which work for labels likecluster=A,cluster=B&cluster=C, but not forcluster=prod,cluster=staging&cluster=dev. Alphabetic sort would order the second case as follows:dev,prod,staging. To allow for more natural sortingsorting:valueMappingcan be used to map label values to integer values which will be used for sorting instead of original string values. Note: this option is not available via environment variables, you can only set it via the config file.
Defaults:
grid:
sorting:
order: startsAt
reverse: true
label: alertname
customValues:
labels: {}
Example with sorting using severity label and value mappings for it:
grid:
sorting:
order: label
reverse: false
label: severity
customValues:
labels:
severity:
critical: 1
warning: 2
info: 3
Labels
labels section allows configuring how alert labels will be rendered in the
UI.
All labels will be parsed when collecting alerts from Alertmanager API and
used when deduplicating alerts, but some labels aren't useful to users and so
can be removed from the UI, this is controlled by keep and strip options.
colors section allows configuring which labels should have colors applied
to label background in the UI. Colors can help visually identify alerts
with shared labels, for example coloring hostname label will allow to quickly
spot all alerts for the same host.
Syntax:
labels:
color:
static: list of strings
unique: list of strings
custom:
foo:
- value: string
value_re: string
color: string
keep: list of strings
strip: list of strings
-
color:static- list of label names that will all have the same color applied (different than the default label color). This allows to quickly spot a specific label that can have high range of values, but it's important when reading the dashboard. For example coloring the instance label allows to quickly learn which instance is affected by given alert. -
color:unique- list of label names that should have unique colors generated in the UI. -
color:custom- nested map of label names and value with colors - this allows to configure a set of labels with custom predefined colors applied to them rather than generated. Value is a mapping withlabel name->list of dicts, each dict object allows setting:value- the exact value of the label to match againstvalue_re- Go compatible regular expression to match againstcolor: color to apply if eithervalueorvalue_rematches
Either
valueorvalue_reis required, both can be set in which casevaluewith be tested first. Entries are evaluated in the order they appear in the config file. Note: this option is not available via environment variables, you can only set it via the config file. -
keep- list of allowed labels, if empty all labels are allowed. -
strip- list of ignored labels.
Example with static color for the job label (every job label will have the
same color regardless of the value) and unique color for the @receiver label
(every @receiver label will have color unique for each value).
labels:
color:
static:
- job
unique:
- "@receiver"
Example where task_id label is ignored by karma:
labels:
keep: []
strip:
- task_id
Example where all but instance and alertname labels are allowed:
labels:
keep:
- alertname
- instance
strip: []
Example where severity label will have a red color for critical, yellow
for warning and blue for info:
labels:
color:
custom:
"@alertmanager":
- value: prod
color: "#e6e"
severity:
- value: info
color: "#87c4e0"
- value: warning
color: "#ffae42"
- value: critical
color: "#ff220c"
Example with a regex value, info, warning and critical will get colors
as below, but any value not matching those 3 values will use the color from
.*:
labels:
color:
custom:
severity:
- value: info
color: "#87c4e0"
- value: warning
color: "#ffae42"
- value: critical
color: "#ff220c"
- value_re: ".*"
color: "#736598"
Note: be sure to set fallback values at the end of the list, so they're only evaluated if there's no exact value match
Defaults:
labels:
color:
static: []
unique: []
custom: {}
keep: []
strip: []
Listen
listen section allows configuring karma web server behavior.
Syntax:
listen:
address: string
port: integer
prefix: string
address- Hostname or IP to listen on.port- HTTP port to listen on.prefix- URL root for karma, you can use to if you wish to serve it from location other than/. This option is mostly useful when using karma behind reverse proxy with other services on the same IP but different URL root.
Example where karma would listen for HTTP requests on http://1.2.3.4:80/karma/
listen:
address: 1.2.3.4
port: 80
prefix: /karma/
Defaults:
listen:
address: "0.0.0.0"
port: 8080
prefix: /
Log
log section allows configuring logging subsystem.
Syntax:
log:
config: bool
level: string
config- if set totruekarma will log used configuration on startuplevel- log level to set for karma, possible values are debug, info, warning, error, fatal and panic.
Defaults:
log:
config: true
level: info
JIRA
jira section allows specifying a list of regex rules for finding links to Jira
issues in silence comments. If a string inside a comment matches one of the
rules it will be rendered as a link.
Syntax:
jira:
- regex: string
- uri: string
regex- regular expression for matching Jira issue ID.uri- base URL for Jira instance,/browse/FOO-1will be appended to it (whereFOO-1is example issue ID).
Example where a string DEVOPS-123 inside a comment would be rendered as a link
to https://jira.example.com/browse/DEVOPS-123.
jira:
- regex: DEVOPS-[0-9]+
uri: https://jira.example.com
Defaults:
jira: []
Receivers
receivers section allows configuring how alerts from different receivers are
handled by karma. If alerts are routed to multiple receivers they can be
duplicated in the UI, each instance will have different value for @receiver.
Syntax:
receivers:
keep: list of strings
strip: list of strings
keep- list of receivers name that are allowed, if empty all receivers are allowed.strip- list of receiver names that will not be shown in the UI.
Example where alerts that are routed to the alertmanage2es receiver are
ignored by karma.
receivers:
strip:
- alertmanage2es
Defaults:
receivers:
strip: []
Sentry
sentry section allows configuring Sentry integration. See
Sentry documentation for
details.
Syntax:
sentry:
private: string
public: string
private- Sentry DSN for Go exceptions, this value is only used by karma binary and never exposed to the user.public- Sentry DSN for JavaScript exceptions, this value will be exposed to the user browser.
Example:
sentry:
private: https://<key>:<secret>@sentry.io/<project>
public: https://<key>:<secret>@sentry.io/<project>
Customizing karma
In order to keep the core code simple karma doesn't support any way of extending provided functionality. There is however possibility to inject custom CSS & JavaScript code, which can be used to either override built in CSS styles or integrate with extra services, for example using error handlers other than Sentry.
custom:
css: string
js: string
css- path to a CSS filejs- path to JavaScript file
Example:
custom:
css: /theme/custom.css
js: /assets/custom.js
Use at your own risk and be aware that used CSS class names might change without warning. This feature is provided as is without any guarantees.
There is an example dark.css file providing a dark theme. It's included in the
docker image as /themes/dark.css and can be enabled by passing environment
variable via docker:
-e CUSTOM_CSS=/themes/dark.css
Command line flags
Config file options are mapped to command line flags, so alertmanager:interval
config file key is accessible as --alertmanager.interval flag, run
karma --help to see a full list.
Exceptions for passing flags:
jira- this option is a list of maps and it's only available when using config file.
There's no support for configuring multiple Alertmanager servers using flags, but it's possible to configure a single Alertmanager instance this way, see the Simplified Configuration section.
Environment variables
Environment variables are mapped in a similar way as command line flags,
alertmanager:interval is accessible as ALERTMANAGER_INTERVAL env.
Exceptions for passing flags:
HOST- used by gin webserver, same effect as settinglisten:addressconfig optionPORT- used by gin webserver, same effect as settinglisten:portconfig optionSENTRY_DSN- is used by Sentry itself, same effect as passing value tosentry:privateconfig option.
There's no support for configuring multiple alertmanager servers using environment variables, but it's possible to configure a single Alertmanager instance this way, see the Simplified Configuration section.
Simplified Configuration
To configure multiple Alertmanager instances karma requires a config file, but
for a single Alertmanager instance cases it's possible to configure all
Alertmanager server options that are set for alertmanager.servers config
section using only flags or environment variables.
Alertmanager URI
To set the uri key from alertmanager.servers map ALERTMANAGER_URI env or
--alertmanager.uri flag can be used.
Examples:
ALERTMANAGER_URI=https://alertmanager.example.com karma
karma --alertmanager.uri https://alertmanager.example.com
Alertmanager name
To set the name key from alertmanager.servers map ALERTMANAGER_NAME env or
--alertmanager.name flag can be used.
Examples:
ALERTMANAGER_NAME=single karma
karma --alertmanager.name single
Alertmanager timeout
To set the timeout key from alertmanager.servers map ALERTMANAGER_TIMEOUT
env or --alertmanager.timeout flag can be used.
Examples:
ALERTMANAGER_TIMEOUT=10s karma
karma --alertmanager.timeout 10s
Alertmanager request proxy
To set the proxy key from alertmanager.servers map ALERTMANAGER_PROXY
env or --alertmanager.proxy flag can be used.
Examples:
ALERTMANAGER_PROXY=true karma
karma --alertmanager.proxy