mirror of
https://github.com/TwiN/gatus.git
synced 2024-12-14 11:58:04 +00:00
01131755bc
* fix(logging): Replace log-level parameter by GATUS_LOG_LEVEL env var * Improve log message if GATUS_LOG_LEVEL isn't set
96 lines
4.4 KiB
Go
96 lines
4.4 KiB
Go
package watchdog
|
|
|
|
import (
|
|
"errors"
|
|
"os"
|
|
|
|
"github.com/TwiN/gatus/v5/alerting"
|
|
"github.com/TwiN/gatus/v5/config/endpoint"
|
|
"github.com/TwiN/gatus/v5/storage/store"
|
|
"github.com/TwiN/logr"
|
|
)
|
|
|
|
// HandleAlerting takes care of alerts to resolve and alerts to trigger based on result success or failure
|
|
func HandleAlerting(ep *endpoint.Endpoint, result *endpoint.Result, alertingConfig *alerting.Config) {
|
|
if alertingConfig == nil {
|
|
return
|
|
}
|
|
if result.Success {
|
|
handleAlertsToResolve(ep, result, alertingConfig)
|
|
} else {
|
|
handleAlertsToTrigger(ep, result, alertingConfig)
|
|
}
|
|
}
|
|
|
|
func handleAlertsToTrigger(ep *endpoint.Endpoint, result *endpoint.Result, alertingConfig *alerting.Config) {
|
|
ep.NumberOfSuccessesInARow = 0
|
|
ep.NumberOfFailuresInARow++
|
|
for _, endpointAlert := range ep.Alerts {
|
|
// If the alert hasn't been triggered, move to the next one
|
|
if !endpointAlert.IsEnabled() || endpointAlert.FailureThreshold > ep.NumberOfFailuresInARow {
|
|
continue
|
|
}
|
|
if endpointAlert.Triggered {
|
|
logr.Debugf("[watchdog.handleAlertsToTrigger] Alert for endpoint with key=%s with description='%s' has already been TRIGGERED, skipping", ep.Key(), endpointAlert.GetDescription())
|
|
continue
|
|
}
|
|
alertProvider := alertingConfig.GetAlertingProviderByAlertType(endpointAlert.Type)
|
|
if alertProvider != nil {
|
|
logr.Infof("[watchdog.handleAlertsToTrigger] Sending %s alert because alert for endpoint with key=%s with description='%s' has been TRIGGERED", endpointAlert.Type, ep.Key(), endpointAlert.GetDescription())
|
|
var err error
|
|
if os.Getenv("MOCK_ALERT_PROVIDER") == "true" {
|
|
if os.Getenv("MOCK_ALERT_PROVIDER_ERROR") == "true" {
|
|
err = errors.New("error")
|
|
}
|
|
} else {
|
|
err = alertProvider.Send(ep, endpointAlert, result, false)
|
|
}
|
|
if err != nil {
|
|
logr.Errorf("[watchdog.handleAlertsToTrigger] Failed to send an alert for endpoint with key=%s: %s", ep.Key(), err.Error())
|
|
} else {
|
|
endpointAlert.Triggered = true
|
|
if err := store.Get().UpsertTriggeredEndpointAlert(ep, endpointAlert); err != nil {
|
|
logr.Errorf("[watchdog.handleAlertsToTrigger] Failed to persist triggered endpoint alert for endpoint with key=%s: %s", ep.Key(), err.Error())
|
|
}
|
|
}
|
|
} else {
|
|
logr.Warnf("[watchdog.handleAlertsToTrigger] Not sending alert of type=%s endpoint with key=%s despite being TRIGGERED, because the provider wasn't configured properly", endpointAlert.Type, ep.Key())
|
|
}
|
|
}
|
|
}
|
|
|
|
func handleAlertsToResolve(ep *endpoint.Endpoint, result *endpoint.Result, alertingConfig *alerting.Config) {
|
|
ep.NumberOfSuccessesInARow++
|
|
for _, endpointAlert := range ep.Alerts {
|
|
isStillBelowSuccessThreshold := endpointAlert.SuccessThreshold > ep.NumberOfSuccessesInARow
|
|
if isStillBelowSuccessThreshold && endpointAlert.IsEnabled() && endpointAlert.Triggered {
|
|
// Persist NumberOfSuccessesInARow
|
|
if err := store.Get().UpsertTriggeredEndpointAlert(ep, endpointAlert); err != nil {
|
|
logr.Errorf("[watchdog.handleAlertsToResolve] Failed to update triggered endpoint alert for endpoint with key=%s: %s", ep.Key(), err.Error())
|
|
}
|
|
}
|
|
if !endpointAlert.IsEnabled() || !endpointAlert.Triggered || isStillBelowSuccessThreshold {
|
|
continue
|
|
}
|
|
// Even if the alert provider returns an error, we still set the alert's Triggered variable to false.
|
|
// Further explanation can be found on Alert's Triggered field.
|
|
endpointAlert.Triggered = false
|
|
if err := store.Get().DeleteTriggeredEndpointAlert(ep, endpointAlert); err != nil {
|
|
logr.Errorf("[watchdog.handleAlertsToResolve] Failed to delete persisted triggered endpoint alert for endpoint with key=%s: %s", ep.Key(), err.Error())
|
|
}
|
|
if !endpointAlert.IsSendingOnResolved() {
|
|
continue
|
|
}
|
|
alertProvider := alertingConfig.GetAlertingProviderByAlertType(endpointAlert.Type)
|
|
if alertProvider != nil {
|
|
logr.Infof("[watchdog.handleAlertsToResolve] Sending %s alert because alert for endpoint with key=%s with description='%s' has been RESOLVED", endpointAlert.Type, ep.Key(), endpointAlert.GetDescription())
|
|
err := alertProvider.Send(ep, endpointAlert, result, true)
|
|
if err != nil {
|
|
logr.Errorf("[watchdog.handleAlertsToResolve] Failed to send an alert for endpoint with key=%s: %s", ep.Key(), err.Error())
|
|
}
|
|
} else {
|
|
logr.Warnf("[watchdog.handleAlertsToResolve] Not sending alert of type=%s for endpoint with key=%s despite being RESOLVED, because the provider wasn't configured properly", endpointAlert.Type, ep.Key())
|
|
}
|
|
}
|
|
ep.NumberOfFailuresInARow = 0
|
|
}
|