mirror of
https://github.com/prymitive/karma
synced 2026-05-19 04:26:41 +00:00
644 lines
18 KiB
Go
644 lines
18 KiB
Go
package main
|
|
|
|
import (
|
|
"bytes"
|
|
"compress/gzip"
|
|
"encoding/base64"
|
|
"encoding/json"
|
|
"fmt"
|
|
"io"
|
|
"net/http"
|
|
"sort"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/prymitive/karma/internal/alertmanager"
|
|
"github.com/prymitive/karma/internal/config"
|
|
"github.com/prymitive/karma/internal/filters"
|
|
"github.com/prymitive/karma/internal/models"
|
|
"github.com/prymitive/karma/internal/slices"
|
|
"github.com/prymitive/karma/internal/transform"
|
|
|
|
"github.com/rs/zerolog/log"
|
|
)
|
|
|
|
func noCache(w http.ResponseWriter) {
|
|
w.Header().Set("Cache-Control", "no-cache, no-store, must-revalidate")
|
|
}
|
|
|
|
func mimeJSON(w http.ResponseWriter) {
|
|
w.Header().Set("Content-Type", "application/json")
|
|
}
|
|
|
|
func badRequestJSON(w http.ResponseWriter, error string) {
|
|
mimeJSON(w)
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
out, _ := json.Marshal(map[string]string{"error": error})
|
|
_, _ = w.Write(out)
|
|
}
|
|
|
|
func pong(w http.ResponseWriter, r *http.Request) {
|
|
_, _ = w.Write([]byte("Pong\n"))
|
|
}
|
|
|
|
func robots(w http.ResponseWriter, r *http.Request) {
|
|
_, _ = w.Write([]byte("User-agent: *\nDisallow: /\n"))
|
|
}
|
|
|
|
func compressResponse(data []byte, gz io.WriteCloser) ([]byte, error) {
|
|
var b bytes.Buffer
|
|
|
|
if gz == nil {
|
|
// this only fails if we pass unsupported level (3 is valid)
|
|
gz, _ = gzip.NewWriterLevel(&b, 3)
|
|
}
|
|
|
|
_, err := gz.Write(data)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to compress data: %s", err.Error())
|
|
}
|
|
|
|
if err = gz.Close(); err != nil {
|
|
return nil, fmt.Errorf("failed to close compression writer: %s", err.Error())
|
|
}
|
|
|
|
compressed := b.Bytes()
|
|
ratio := fmt.Sprintf("%.5f", float64(len(compressed))/float64(len(data)))
|
|
log.Debug().
|
|
Int("original", len(data)).
|
|
Int("compressed", len(compressed)).
|
|
Str("ratio", ratio).
|
|
Msg("Compressed response")
|
|
|
|
return compressed, nil
|
|
}
|
|
|
|
func decompressCachedResponse(r io.Reader) ([]byte, error) {
|
|
z, err := gzip.NewReader(r)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to created new compression reader: %s", err.Error())
|
|
}
|
|
p, err := io.ReadAll(z)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to decompress data: %s", err.Error())
|
|
}
|
|
z.Close()
|
|
return p, nil
|
|
}
|
|
|
|
func pushPath(w http.ResponseWriter, path string) {
|
|
if pusher, ok := w.(http.Pusher); ok {
|
|
if err := pusher.Push(path, nil); err != nil {
|
|
log.Debug().Err(err).Str("path", path).Msg("Failed to push server path via HTTP/2")
|
|
}
|
|
}
|
|
}
|
|
|
|
func redirectIndex(w http.ResponseWriter, r *http.Request) {
|
|
http.Redirect(w, r, r.URL.Path+"/", http.StatusMovedPermanently)
|
|
}
|
|
|
|
func index(w http.ResponseWriter, r *http.Request) {
|
|
noCache(w)
|
|
pushPath(w, getViewURL("/custom.css"))
|
|
pushPath(w, getViewURL("/custom.js"))
|
|
|
|
filtersJSON, _ := json.Marshal(config.Config.Filters.Default)
|
|
filtersB64 := base64.StdEncoding.EncodeToString(filtersJSON)
|
|
|
|
defaults, _ := json.Marshal(config.Config.UI)
|
|
defaultsB64 := base64.StdEncoding.EncodeToString(defaults)
|
|
|
|
w.Header().Set("Content-Type", "text/html; charset=utf-8")
|
|
_ = indexTemplate.Execute(w, map[string]string{
|
|
"KarmaName": config.Config.Karma.Name,
|
|
"Version": version,
|
|
"SentryDSN": config.Config.Sentry.Public,
|
|
"DefaultFilter": filtersB64,
|
|
"Defaults": defaultsB64,
|
|
})
|
|
}
|
|
|
|
func populateAPIFilters(matchFilters []filters.FilterT) []models.Filter {
|
|
apiFilters := []models.Filter{}
|
|
for _, filter := range matchFilters {
|
|
af := models.Filter{
|
|
Text: filter.GetRawText(),
|
|
Name: filter.GetName(),
|
|
Matcher: filter.GetMatcher(),
|
|
Value: filter.GetValue(),
|
|
Hits: filter.GetHits(),
|
|
IsValid: filter.GetIsValid(),
|
|
}
|
|
if af.Text != "" {
|
|
apiFilters = append(apiFilters, af)
|
|
}
|
|
}
|
|
return apiFilters
|
|
}
|
|
|
|
// alerts endpoint, json, JS will query this via AJAX call
|
|
func alerts(w http.ResponseWriter, r *http.Request) {
|
|
noCache(w)
|
|
start := time.Now()
|
|
ts, _ := start.UTC().MarshalText()
|
|
|
|
var username string
|
|
if config.Config.Authentication.Enabled {
|
|
username = getUserFromContext(r)
|
|
}
|
|
|
|
upstreams := getUpstreams()
|
|
|
|
// initialize response object, set fields that don't require any locking
|
|
resp := models.AlertsResponse{}
|
|
resp.Status = "success"
|
|
resp.Timestamp = string(ts)
|
|
resp.Version = version
|
|
resp.Upstreams = upstreams
|
|
resp.Settings = models.Settings{
|
|
Sorting: models.SortSettings{
|
|
Grid: models.GridSettings{
|
|
Order: config.Config.Grid.Sorting.Order,
|
|
Reverse: config.Config.Grid.Sorting.Reverse,
|
|
Label: config.Config.Grid.Sorting.Label,
|
|
},
|
|
ValueMapping: map[string]map[string]string{},
|
|
},
|
|
StaticColorLabels: config.Config.Labels.Color.Static,
|
|
AnnotationsDefaultHidden: config.Config.Annotations.Default.Hidden,
|
|
AnnotationsHidden: config.Config.Annotations.Hidden,
|
|
AnnotationsVisible: config.Config.Annotations.Visible,
|
|
AnnotationsAllowHTML: config.Config.Annotations.EnableInsecureHTML,
|
|
SilenceForm: models.SilenceFormSettings{
|
|
Strip: models.SilenceFormStripSettings{
|
|
Labels: config.Config.SilenceForm.Strip.Labels,
|
|
},
|
|
},
|
|
AlertAcknowledgement: models.AlertAcknowledgementSettings{
|
|
Enabled: config.Config.AlertAcknowledgement.Enabled,
|
|
DurationSeconds: int(config.Config.AlertAcknowledgement.Duration.Seconds()),
|
|
Author: config.Config.AlertAcknowledgement.Author,
|
|
Comment: config.Config.AlertAcknowledgement.Comment,
|
|
},
|
|
HistoryEnabled: config.Config.History.Enabled,
|
|
}
|
|
resp.Authentication = models.AuthenticationInfo{
|
|
Enabled: config.Config.Authentication.Enabled,
|
|
Username: username,
|
|
}
|
|
|
|
if config.Config.Grid.Sorting.CustomValues.Labels != nil {
|
|
resp.Settings.Sorting.ValueMapping = config.Config.Grid.Sorting.CustomValues.Labels
|
|
}
|
|
|
|
// use full URI (including query args) as cache key
|
|
cacheKey := r.RequestURI
|
|
|
|
data, found := apiCache.Get(cacheKey)
|
|
if found {
|
|
r := bytes.NewReader(data.([]byte))
|
|
rawData, _ := decompressCachedResponse(r)
|
|
// need to overwrite settings as they can have user specific data
|
|
newResp := models.AlertsResponse{}
|
|
_ = json.Unmarshal(rawData, &newResp)
|
|
newResp.Settings = resp.Settings
|
|
newResp.Timestamp = string(ts)
|
|
newResp.Authentication = resp.Authentication
|
|
newData, _ := json.Marshal(&newResp)
|
|
mimeJSON(w)
|
|
w.WriteHeader(http.StatusOK)
|
|
_, _ = w.Write(newData)
|
|
return
|
|
}
|
|
|
|
gridLabel, _ := lookupQueryString(r, "gridLabel")
|
|
q, _ := lookupQueryStringSlice(r, "q")
|
|
matchFilters := getFiltersFromQuery(q)
|
|
|
|
grids := map[string]models.APIGrid{}
|
|
colors := models.LabelsColorMap{}
|
|
counters := map[string]map[string]int{}
|
|
|
|
dedupedAlerts := alertmanager.DedupAlerts()
|
|
dedupedColors := alertmanager.DedupColors()
|
|
|
|
silences := map[string]map[string]models.Silence{}
|
|
for _, am := range alertmanager.GetAlertmanagers() {
|
|
key := am.ClusterName()
|
|
if _, found := silences[key]; !found {
|
|
silences[key] = map[string]models.Silence{}
|
|
}
|
|
}
|
|
|
|
allReceivers := map[string]bool{}
|
|
|
|
filtered := filterAlerts(dedupedAlerts, matchFilters)
|
|
|
|
if gridLabel == "@auto" {
|
|
gridLabel = autoGridLabel(filtered)
|
|
log.Debug().Str("label", gridLabel).Msg("Selected automatic grid label")
|
|
}
|
|
|
|
var matches int
|
|
for _, ag := range filtered {
|
|
perGridAlertGroup := map[string]*models.AlertGroup{}
|
|
|
|
for _, alert := range ag.Alerts {
|
|
alert := alert // scopelint pin
|
|
|
|
allReceivers[alert.Receiver] = true
|
|
|
|
matches++
|
|
|
|
alertGridLabelValues := map[string]bool{}
|
|
switch gridLabel {
|
|
case "@receiver":
|
|
alertGridLabelValues[alert.Receiver] = true
|
|
case "@alertmanager":
|
|
for _, am := range alert.Alertmanager {
|
|
alertGridLabelValues[am.Name] = true
|
|
}
|
|
case "@cluster":
|
|
for _, am := range alert.Alertmanager {
|
|
alertGridLabelValues[am.Cluster] = true
|
|
}
|
|
default:
|
|
alertGridLabelValues[alert.Labels[gridLabel]] = true
|
|
}
|
|
|
|
for alertGridLabelValue := range alertGridLabelValues {
|
|
// we need to update fingerprints since we've modified some fields in dedup
|
|
// and agCopy.ContentFingerprint() depends on per alert fingerprint
|
|
// we update it here rather than in dedup since here we can apply it
|
|
// only for alerts left after filtering
|
|
alert.UpdateFingerprints()
|
|
|
|
agCopy, found := perGridAlertGroup[alertGridLabelValue]
|
|
if !found {
|
|
agCopy = &models.AlertGroup{
|
|
ID: ag.ID,
|
|
Receiver: ag.Receiver,
|
|
Labels: ag.Labels,
|
|
LatestStartsAt: ag.LatestStartsAt,
|
|
Alerts: []models.Alert{},
|
|
AlertmanagerCount: map[string]int{},
|
|
StateCount: map[string]int{},
|
|
}
|
|
for _, s := range models.AlertStateList {
|
|
agCopy.StateCount[s] = 0
|
|
}
|
|
perGridAlertGroup[alertGridLabelValue] = agCopy
|
|
}
|
|
|
|
stateCount := map[string]int{}
|
|
for _, s := range models.AlertStateList {
|
|
stateCount[s] = 0
|
|
}
|
|
switch gridLabel {
|
|
case "@alertmanager":
|
|
ams := []models.AlertmanagerInstance{}
|
|
for _, am := range alert.Alertmanager {
|
|
if am.Name == alertGridLabelValue {
|
|
ams = append(ams, am)
|
|
stateCount[am.State]++
|
|
}
|
|
}
|
|
alert.Alertmanager = ams
|
|
case "@cluster":
|
|
ams := []models.AlertmanagerInstance{}
|
|
for _, am := range alert.Alertmanager {
|
|
if am.Cluster == alertGridLabelValue {
|
|
ams = append(ams, am)
|
|
stateCount[am.State]++
|
|
}
|
|
}
|
|
alert.Alertmanager = ams
|
|
default:
|
|
for _, am := range alert.Alertmanager {
|
|
stateCount[am.State]++
|
|
}
|
|
}
|
|
|
|
if stateCount[models.AlertStateActive] > 0 {
|
|
alert.State = models.AlertStateActive
|
|
} else if stateCount[models.AlertStateSuppressed] > 0 {
|
|
alert.State = models.AlertStateSuppressed
|
|
} else {
|
|
alert.State = models.AlertStateUnprocessed
|
|
}
|
|
|
|
agCopy.Alerts = append(agCopy.Alerts, alert)
|
|
|
|
if len(upstreams.Clusters) > 1 {
|
|
clusters := map[string]bool{}
|
|
for _, am := range alert.Alertmanager {
|
|
clusters[am.Cluster] = true
|
|
}
|
|
for cluster := range clusters {
|
|
countLabel(counters, "@cluster", cluster)
|
|
}
|
|
}
|
|
|
|
countLabel(counters, "@state", alert.State)
|
|
|
|
countLabel(counters, "@receiver", alert.Receiver)
|
|
if ck, foundKey := dedupedColors["@receiver"]; foundKey {
|
|
if cv, foundVal := ck[alert.Receiver]; foundVal {
|
|
if _, found := colors["@receiver"]; !found {
|
|
colors["@receiver"] = map[string]models.LabelColors{}
|
|
}
|
|
colors["@receiver"][alert.Receiver] = cv
|
|
}
|
|
}
|
|
|
|
if ck, foundKey := dedupedColors["@alertmanager"]; foundKey {
|
|
for _, am := range alert.Alertmanager {
|
|
if cv, foundVal := ck[am.Name]; foundVal {
|
|
if _, found := colors["@alertmanager"]; !found {
|
|
colors["@alertmanager"] = map[string]models.LabelColors{}
|
|
}
|
|
colors["@alertmanager"][am.Name] = cv
|
|
}
|
|
}
|
|
}
|
|
|
|
if ck, foundKey := dedupedColors["@cluster"]; foundKey {
|
|
for _, am := range alert.Alertmanager {
|
|
if cv, foundVal := ck[am.Cluster]; foundVal {
|
|
if _, found := colors["@cluster"]; !found {
|
|
colors["@cluster"] = map[string]models.LabelColors{}
|
|
}
|
|
colors["@cluster"][am.Cluster] = cv
|
|
}
|
|
}
|
|
}
|
|
|
|
agCopy.StateCount[alert.State]++
|
|
|
|
for _, am := range alert.Alertmanager {
|
|
if _, found := agCopy.AlertmanagerCount[am.Name]; !found {
|
|
agCopy.AlertmanagerCount[am.Name] = 1
|
|
} else {
|
|
agCopy.AlertmanagerCount[am.Name]++
|
|
}
|
|
}
|
|
|
|
for key, value := range alert.Labels {
|
|
if keyMap, foundKey := dedupedColors[key]; foundKey {
|
|
if color, foundColor := keyMap[value]; foundColor {
|
|
if _, found := colors[key]; !found {
|
|
colors[key] = map[string]models.LabelColors{}
|
|
}
|
|
colors[key][value] = color
|
|
}
|
|
}
|
|
countLabel(counters, key, value)
|
|
}
|
|
}
|
|
}
|
|
|
|
for gridLabelValue, ag := range perGridAlertGroup {
|
|
if len(ag.Alerts) > 0 {
|
|
for _, alert := range ag.Alerts {
|
|
for _, am := range alert.Alertmanager {
|
|
for _, silence := range am.Silences {
|
|
if _, found := silences[am.Cluster][silence.ID]; !found {
|
|
silences[am.Cluster][silence.ID] = *silence
|
|
}
|
|
}
|
|
}
|
|
}
|
|
sort.Sort(ag.Alerts)
|
|
ag.LatestStartsAt = ag.FindLatestStartsAt()
|
|
ag.Hash = ag.ContentFingerprint()
|
|
apiAG := models.APIAlertGroup{AlertGroup: *ag}
|
|
apiAG.DedupSharedMaps()
|
|
resp.TotalAlerts += len(ag.Alerts)
|
|
|
|
grid, found := grids[gridLabelValue]
|
|
if !found {
|
|
grid = models.APIGrid{
|
|
LabelName: gridLabel,
|
|
LabelValue: gridLabelValue,
|
|
AlertGroups: []models.APIAlertGroup{},
|
|
StateCount: map[string]int{},
|
|
}
|
|
for _, s := range models.AlertStateList {
|
|
grid.StateCount[s] = 0
|
|
}
|
|
grids[gridLabelValue] = grid
|
|
}
|
|
grid.AlertGroups = append(grid.AlertGroups, apiAG)
|
|
for k, v := range apiAG.StateCount {
|
|
grid.StateCount[k] += v
|
|
}
|
|
grids[gridLabelValue] = grid
|
|
}
|
|
}
|
|
}
|
|
|
|
for _, filter := range matchFilters {
|
|
if filter.GetValue() != "" && filter.GetMatcher() == "=" {
|
|
transform.ColorLabel(colors, filter.GetName(), filter.GetValue())
|
|
}
|
|
}
|
|
|
|
//resp.AlertGroups = sortAlertGroups(c, alerts)
|
|
v, _ := lookupQueryString(r, "gridSortReverse")
|
|
gridSortReverse := v == "1"
|
|
|
|
receivers := []string{}
|
|
for k := range allReceivers {
|
|
k := k
|
|
receivers = append(receivers, k)
|
|
}
|
|
sort.Strings(receivers)
|
|
|
|
resp.Grids = sortGrids(r, gridLabel, grids, gridSortReverse)
|
|
resp.Silences = silences
|
|
resp.Colors = colors
|
|
resp.Counters = countersToLabelStats(counters)
|
|
resp.Filters = populateAPIFilters(matchFilters)
|
|
resp.Receivers = receivers
|
|
|
|
data, _ = json.Marshal(resp)
|
|
compressedData, _ := compressResponse(data.([]byte), nil)
|
|
_ = apiCache.Add(cacheKey, compressedData)
|
|
|
|
mimeJSON(w)
|
|
w.WriteHeader(http.StatusOK)
|
|
_, _ = w.Write(data.([]byte))
|
|
}
|
|
|
|
// autocomplete endpoint, json, used for filter autocomplete hints
|
|
func autocomplete(w http.ResponseWriter, r *http.Request) {
|
|
noCache(w)
|
|
|
|
cacheKey := r.RequestURI
|
|
|
|
data, found := apiCache.Get(cacheKey)
|
|
if found {
|
|
mimeJSON(w)
|
|
w.WriteHeader(http.StatusOK)
|
|
_, _ = w.Write(data.([]byte))
|
|
return
|
|
}
|
|
|
|
term, found := lookupQueryString(r, "term")
|
|
if !found || term == "" {
|
|
badRequestJSON(w, "missing term=<token> parameter")
|
|
return
|
|
}
|
|
|
|
acData := sort.StringSlice{}
|
|
|
|
dedupedAutocomplete := alertmanager.DedupAutocomplete()
|
|
|
|
for _, hint := range dedupedAutocomplete {
|
|
if strings.HasPrefix(strings.ToLower(hint.Value), strings.ToLower(term)) {
|
|
acData = append(acData, hint.Value)
|
|
} else {
|
|
for _, token := range hint.Tokens {
|
|
if strings.HasPrefix(strings.ToLower(token), strings.ToLower(term)) {
|
|
acData = append(acData, hint.Value)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
sort.Sort(sort.Reverse(acData))
|
|
data, _ = json.Marshal(acData)
|
|
|
|
_ = apiCache.Add(cacheKey, data)
|
|
|
|
mimeJSON(w)
|
|
w.WriteHeader(http.StatusOK)
|
|
_, _ = w.Write(data.([]byte))
|
|
}
|
|
|
|
func silences(w http.ResponseWriter, r *http.Request) {
|
|
noCache(w)
|
|
|
|
cacheKey := r.RequestURI
|
|
|
|
data, found := apiCache.Get(cacheKey)
|
|
if found {
|
|
mimeJSON(w)
|
|
w.WriteHeader(http.StatusOK)
|
|
_, _ = w.Write(data.([]byte))
|
|
return
|
|
}
|
|
|
|
dedupedSilences := []models.ManagedSilence{}
|
|
|
|
showExpired := false
|
|
showExpiredValue, found := lookupQueryString(r, "showExpired")
|
|
if found && showExpiredValue == "1" {
|
|
showExpired = true
|
|
}
|
|
|
|
searchTerm := ""
|
|
searchTermValue, found := lookupQueryString(r, "searchTerm")
|
|
if found && searchTermValue != "" {
|
|
searchTerm = strings.ToLower(searchTermValue)
|
|
}
|
|
|
|
clusters := []string{}
|
|
if searchTerm != "" {
|
|
upstreams := getUpstreams()
|
|
for _, u := range upstreams.Instances {
|
|
if strings.ToLower(u.Name) == searchTerm || strings.ToLower(u.Cluster) == searchTerm {
|
|
if !slices.StringInSlice(clusters, u.Cluster) {
|
|
clusters = append(clusters, strings.ToLower(u.Cluster))
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
for _, silence := range alertmanager.DedupSilences() {
|
|
if silence.IsExpired && !showExpired {
|
|
continue
|
|
}
|
|
if searchTerm != "" {
|
|
isMatch := false
|
|
if strings.ToLower(silence.Silence.ID) == searchTerm {
|
|
isMatch = true
|
|
} else if fmt.Sprintf("@cluster=%s", strings.ToLower(silence.Cluster)) == searchTerm {
|
|
isMatch = true
|
|
} else if slices.StringInSlice(clusters, strings.ToLower(silence.Cluster)) {
|
|
isMatch = true
|
|
} else if strings.Contains(strings.ToLower(silence.Silence.Comment), searchTerm) {
|
|
isMatch = true
|
|
} else if strings.Contains(strings.ToLower(silence.Silence.CreatedBy), searchTerm) {
|
|
isMatch = true
|
|
} else {
|
|
for _, match := range silence.Silence.Matchers {
|
|
eq := "="
|
|
if match.IsRegex {
|
|
eq = "=~"
|
|
}
|
|
if searchTerm == fmt.Sprintf("%s%s\"%s\"", strings.ToLower(match.Name), eq, strings.ToLower(match.Value)) {
|
|
isMatch = true
|
|
} else if strings.Contains(strings.ToLower(fmt.Sprintf("%s%s%s", match.Name, eq, match.Value)), searchTerm) {
|
|
isMatch = true
|
|
}
|
|
}
|
|
}
|
|
if !isMatch {
|
|
continue
|
|
}
|
|
}
|
|
dedupedSilences = append(dedupedSilences, silence)
|
|
}
|
|
|
|
recentFirst := true
|
|
sortReverse, found := lookupQueryString(r, "sortReverse")
|
|
if found && sortReverse == "1" {
|
|
recentFirst = false
|
|
}
|
|
|
|
sort.Slice(dedupedSilences, func(i int, j int) bool {
|
|
if dedupedSilences[i].Silence.EndsAt.Equal(dedupedSilences[j].Silence.EndsAt) {
|
|
if dedupedSilences[i].Silence.StartsAt.Equal(dedupedSilences[j].Silence.StartsAt) {
|
|
return dedupedSilences[i].Silence.ID < dedupedSilences[j].Silence.ID
|
|
}
|
|
return dedupedSilences[i].Silence.StartsAt.After(dedupedSilences[j].Silence.StartsAt) == recentFirst
|
|
}
|
|
return dedupedSilences[i].Silence.EndsAt.Before(dedupedSilences[j].Silence.EndsAt) == recentFirst
|
|
})
|
|
|
|
silenceCounters := make(map[string]int, len(dedupedSilences))
|
|
for _, silence := range dedupedSilences {
|
|
silenceCounters[silence.Silence.ID] = 0
|
|
}
|
|
for _, alertGroup := range alertmanager.DedupAlerts() {
|
|
for _, alert := range alertGroup.Alerts {
|
|
clustersDone := map[string]bool{}
|
|
for _, am := range alert.Alertmanager {
|
|
for _, sID := range am.SilencedBy {
|
|
if _, found := clustersDone[am.Cluster]; !found {
|
|
if _, ok := silenceCounters[sID]; ok {
|
|
silenceCounters[sID]++
|
|
clustersDone[am.Cluster] = true
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
for i := range dedupedSilences {
|
|
if counter, ok := silenceCounters[dedupedSilences[i].Silence.ID]; ok {
|
|
dedupedSilences[i].AlertCount = counter
|
|
}
|
|
}
|
|
|
|
data, _ = json.Marshal(dedupedSilences)
|
|
|
|
_ = apiCache.Add(cacheKey, data)
|
|
|
|
mimeJSON(w)
|
|
w.WriteHeader(http.StatusOK)
|
|
_, _ = w.Write(data.([]byte))
|
|
}
|