You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
213 lines
5.7 KiB
213 lines
5.7 KiB
local defaults = {
|
|
local defaults = self,
|
|
namespace: error 'must provide namespace',
|
|
image: error 'must provide image',
|
|
version: error 'must provide version',
|
|
resources: {
|
|
limits: { cpu: '100m', memory: '100Mi' },
|
|
requests: { cpu: '4m', memory: '100Mi' },
|
|
},
|
|
commonLabels:: {
|
|
'app.kubernetes.io/name': 'alertmanager',
|
|
'app.kubernetes.io/version': defaults.version,
|
|
'app.kubernetes.io/component': 'alert-router',
|
|
'app.kubernetes.io/part-of': 'kube-prometheus',
|
|
},
|
|
selectorLabels:: {
|
|
[labelName]: defaults.commonLabels[labelName]
|
|
for labelName in std.objectFields(defaults.commonLabels)
|
|
if !std.setMember(labelName, ['app.kubernetes.io/version'])
|
|
},
|
|
name: error 'must provide name',
|
|
config: {
|
|
global: {
|
|
resolve_timeout: '5m',
|
|
},
|
|
inhibit_rules: [{
|
|
source_match: {
|
|
severity: 'critical',
|
|
},
|
|
target_match_re: {
|
|
severity: 'warning|info',
|
|
},
|
|
equal: ['namespace', 'alertname'],
|
|
}, {
|
|
source_match: {
|
|
severity: 'warning',
|
|
},
|
|
target_match_re: {
|
|
severity: 'info',
|
|
},
|
|
equal: ['namespace', 'alertname'],
|
|
}],
|
|
route: {
|
|
group_by: ['namespace'],
|
|
group_wait: '30s',
|
|
group_interval: '5m',
|
|
repeat_interval: '12h',
|
|
receiver: 'Default',
|
|
routes: [
|
|
{ receiver: 'Watchdog', match: { alertname: 'Watchdog' } },
|
|
{ receiver: 'Critical', match: { severity: 'critical' } },
|
|
],
|
|
},
|
|
receivers: [
|
|
{ name: 'Default' },
|
|
{ name: 'Watchdog' },
|
|
{ name: 'Critical' },
|
|
],
|
|
},
|
|
replicas: 3,
|
|
mixin: {
|
|
ruleLabels: {},
|
|
_config: {
|
|
alertmanagerName: '{{ $labels.namespace }}/{{ $labels.pod}}',
|
|
alertmanagerClusterLabels: 'namespace,service',
|
|
alertmanagerSelector: 'job="alertmanager-' + defaults.name + '",namespace="' + defaults.namespace + '"',
|
|
runbookURLPattern: 'https://runbooks.prometheus-operator.dev/runbooks/alertmanager/%s',
|
|
},
|
|
},
|
|
};
|
|
|
|
|
|
function(params) {
|
|
local am = self,
|
|
_config:: defaults + params,
|
|
// Safety check
|
|
assert std.isObject(am._config.resources),
|
|
assert std.isObject(am._config.mixin._config),
|
|
|
|
mixin:: (import 'github.com/prometheus/alertmanager/doc/alertmanager-mixin/mixin.libsonnet') +
|
|
(import 'github.com/kubernetes-monitoring/kubernetes-mixin/lib/add-runbook-links.libsonnet') {
|
|
_config+:: am._config.mixin._config,
|
|
},
|
|
|
|
prometheusRule: {
|
|
apiVersion: 'monitoring.coreos.com/v1',
|
|
kind: 'PrometheusRule',
|
|
metadata: {
|
|
labels: am._config.commonLabels + am._config.mixin.ruleLabels,
|
|
name: 'alertmanager-' + am._config.name + '-rules',
|
|
namespace: am._config.namespace,
|
|
},
|
|
spec: {
|
|
local r = if std.objectHasAll(am.mixin, 'prometheusRules') then am.mixin.prometheusRules.groups else [],
|
|
local a = if std.objectHasAll(am.mixin, 'prometheusAlerts') then am.mixin.prometheusAlerts.groups else [],
|
|
groups: a + r,
|
|
},
|
|
},
|
|
|
|
secret: {
|
|
apiVersion: 'v1',
|
|
kind: 'Secret',
|
|
type: 'Opaque',
|
|
metadata: {
|
|
name: 'alertmanager-' + am._config.name,
|
|
namespace: am._config.namespace,
|
|
labels: { alertmanager: am._config.name } + am._config.commonLabels,
|
|
},
|
|
stringData: {
|
|
'alertmanager.yaml': if std.type(am._config.config) == 'object'
|
|
then
|
|
std.manifestYamlDoc(am._config.config)
|
|
else
|
|
am._config.config,
|
|
},
|
|
},
|
|
|
|
serviceAccount: {
|
|
apiVersion: 'v1',
|
|
kind: 'ServiceAccount',
|
|
metadata: {
|
|
name: 'alertmanager-' + am._config.name,
|
|
namespace: am._config.namespace,
|
|
labels: { alertmanager: am._config.name } + am._config.commonLabels,
|
|
},
|
|
},
|
|
|
|
service: {
|
|
apiVersion: 'v1',
|
|
kind: 'Service',
|
|
metadata: {
|
|
name: 'alertmanager-' + am._config.name,
|
|
namespace: am._config.namespace,
|
|
labels: { alertmanager: am._config.name } + am._config.commonLabels,
|
|
},
|
|
spec: {
|
|
ports: [
|
|
{ name: 'web', targetPort: 'web', port: 9093 },
|
|
],
|
|
selector: {
|
|
app: 'alertmanager',
|
|
alertmanager: am._config.name,
|
|
} + am._config.selectorLabels,
|
|
sessionAffinity: 'ClientIP',
|
|
},
|
|
},
|
|
|
|
serviceMonitor: {
|
|
apiVersion: 'monitoring.coreos.com/v1',
|
|
kind: 'ServiceMonitor',
|
|
metadata: {
|
|
name: 'alertmanager',
|
|
namespace: am._config.namespace,
|
|
labels: am._config.commonLabels,
|
|
},
|
|
spec: {
|
|
selector: {
|
|
matchLabels: {
|
|
alertmanager: am._config.name,
|
|
} + am._config.selectorLabels,
|
|
},
|
|
endpoints: [
|
|
{ port: 'web', interval: '30s' },
|
|
],
|
|
},
|
|
},
|
|
|
|
[if (defaults + params).replicas > 1 then 'podDisruptionBudget']: {
|
|
apiVersion: 'policy/v1beta1',
|
|
kind: 'PodDisruptionBudget',
|
|
metadata: {
|
|
name: 'alertmanager-' + am._config.name,
|
|
namespace: am._config.namespace,
|
|
labels: am._config.commonLabels,
|
|
},
|
|
spec: {
|
|
maxUnavailable: 1,
|
|
selector: {
|
|
matchLabels: {
|
|
alertmanager: am._config.name,
|
|
} + am._config.selectorLabels,
|
|
},
|
|
},
|
|
},
|
|
|
|
alertmanager: {
|
|
apiVersion: 'monitoring.coreos.com/v1',
|
|
kind: 'Alertmanager',
|
|
metadata: {
|
|
name: am._config.name,
|
|
namespace: am._config.namespace,
|
|
labels: {
|
|
alertmanager: am._config.name,
|
|
} + am._config.commonLabels,
|
|
},
|
|
spec: {
|
|
replicas: am._config.replicas,
|
|
version: am._config.version,
|
|
image: am._config.image,
|
|
podMetadata: {
|
|
labels: am._config.commonLabels,
|
|
},
|
|
resources: am._config.resources,
|
|
nodeSelector: { 'kubernetes.io/os': 'linux' },
|
|
serviceAccountName: 'alertmanager-' + am._config.name,
|
|
securityContext: {
|
|
runAsUser: 1000,
|
|
runAsNonRoot: true,
|
|
fsGroup: 2000,
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|