mirror of
https://github.com/grafana/grafana.git
synced 2024-11-29 04:04:00 -06:00
a738cb42d8
* Prometheus: Update dependency to v0.52.0 * go work sync * fix panics in tests * go work sync * prometheus v0.52.0 * handle errors * Update pkg/services/ngalert/sender/sender_test.go Co-authored-by: Santiago <santiagohernandez.1997@gmail.com> * Update pkg/services/ngalert/sender/sender_test.go Co-authored-by: Santiago <santiagohernandez.1997@gmail.com> --------- Co-authored-by: Santiago <santiagohernandez.1997@gmail.com> Co-authored-by: ismail simsek <ismailsimsek09@gmail.com>
573 lines
18 KiB
Go
573 lines
18 KiB
Go
package remote
|
|
|
|
import (
|
|
"context"
|
|
"crypto/md5"
|
|
"encoding/base64"
|
|
"encoding/json"
|
|
"fmt"
|
|
"net/http"
|
|
"net/url"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/go-openapi/strfmt"
|
|
amalert "github.com/prometheus/alertmanager/api/v2/client/alert"
|
|
amalertgroup "github.com/prometheus/alertmanager/api/v2/client/alertgroup"
|
|
amgeneral "github.com/prometheus/alertmanager/api/v2/client/general"
|
|
amreceiver "github.com/prometheus/alertmanager/api/v2/client/receiver"
|
|
amsilence "github.com/prometheus/alertmanager/api/v2/client/silence"
|
|
"github.com/prometheus/client_golang/prometheus"
|
|
|
|
alertingClusterPB "github.com/grafana/alerting/cluster/clusterpb"
|
|
alertingNotify "github.com/grafana/alerting/notify"
|
|
|
|
"gopkg.in/yaml.v3"
|
|
|
|
"github.com/grafana/grafana/pkg/infra/log"
|
|
apimodels "github.com/grafana/grafana/pkg/services/ngalert/api/tooling/definitions"
|
|
"github.com/grafana/grafana/pkg/services/ngalert/metrics"
|
|
"github.com/grafana/grafana/pkg/services/ngalert/models"
|
|
"github.com/grafana/grafana/pkg/services/ngalert/notifier"
|
|
remoteClient "github.com/grafana/grafana/pkg/services/ngalert/remote/client"
|
|
"github.com/grafana/grafana/pkg/services/ngalert/sender"
|
|
)
|
|
|
|
type stateStore interface {
|
|
GetSilences(ctx context.Context) (string, error)
|
|
GetNotificationLog(ctx context.Context) (string, error)
|
|
}
|
|
|
|
// DecryptFn is a function that takes in an encrypted value and returns it decrypted.
|
|
type DecryptFn func(ctx context.Context, payload []byte) ([]byte, error)
|
|
|
|
type Alertmanager struct {
|
|
decrypt DecryptFn
|
|
defaultConfig string
|
|
defaultConfigHash string
|
|
log log.Logger
|
|
metrics *metrics.RemoteAlertmanager
|
|
orgID int64
|
|
ready bool
|
|
sender *sender.ExternalAlertmanager
|
|
state stateStore
|
|
tenantID string
|
|
url string
|
|
|
|
amClient *remoteClient.Alertmanager
|
|
mimirClient remoteClient.MimirClient
|
|
}
|
|
|
|
type AlertmanagerConfig struct {
|
|
OrgID int64
|
|
URL string
|
|
TenantID string
|
|
BasicAuthPassword string
|
|
|
|
DefaultConfig string
|
|
// PromoteConfig is a flag that determines whether the configuration should be used in the remote Alertmanager.
|
|
// The same flag is used for promoting state.
|
|
PromoteConfig bool
|
|
}
|
|
|
|
func (cfg *AlertmanagerConfig) Validate() error {
|
|
if cfg.OrgID == 0 {
|
|
return fmt.Errorf("orgID for remote Alertmanager not set")
|
|
}
|
|
|
|
if cfg.TenantID == "" {
|
|
return fmt.Errorf("empty remote Alertmanager tenantID")
|
|
}
|
|
|
|
if cfg.URL == "" {
|
|
return fmt.Errorf("empty remote Alertmanager URL for tenant '%s'", cfg.TenantID)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func NewAlertmanager(cfg AlertmanagerConfig, store stateStore, decryptFn DecryptFn, metrics *metrics.RemoteAlertmanager) (*Alertmanager, error) {
|
|
if err := cfg.Validate(); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
u, err := url.Parse(cfg.URL)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("unable to parse remote Alertmanager URL: %w", err)
|
|
}
|
|
logger := log.New("ngalert.remote.alertmanager")
|
|
|
|
mcCfg := &remoteClient.Config{
|
|
Logger: logger,
|
|
Password: cfg.BasicAuthPassword,
|
|
TenantID: cfg.TenantID,
|
|
URL: u,
|
|
PromoteConfig: cfg.PromoteConfig,
|
|
}
|
|
mc, err := remoteClient.New(mcCfg, metrics)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
amcCfg := &remoteClient.AlertmanagerConfig{
|
|
URL: u,
|
|
TenantID: cfg.TenantID,
|
|
Password: cfg.BasicAuthPassword,
|
|
Logger: logger,
|
|
}
|
|
amc, err := remoteClient.NewAlertmanager(amcCfg, metrics)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Configure and start the components that sends alerts.
|
|
c := amc.GetAuthedClient()
|
|
doFunc := func(ctx context.Context, _ *http.Client, req *http.Request) (*http.Response, error) {
|
|
return c.Do(req.WithContext(ctx))
|
|
}
|
|
senderLogger := log.New("ngalert.sender.external-alertmanager")
|
|
s, err := sender.NewExternalAlertmanagerSender(senderLogger, prometheus.NewRegistry(), sender.WithDoFunc(doFunc))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
s.Run()
|
|
err = s.ApplyConfig(cfg.OrgID, 0, []sender.ExternalAMcfg{{URL: cfg.URL + "/alertmanager"}})
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Parse the default configuration into a postable config.
|
|
pCfg, err := notifier.Load([]byte(cfg.DefaultConfig))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
rawCfg, err := json.Marshal(pCfg)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Initialize LastReadinessCheck so it's present even if the check fails.
|
|
metrics.LastReadinessCheck.Set(0)
|
|
|
|
return &Alertmanager{
|
|
amClient: amc,
|
|
decrypt: decryptFn,
|
|
defaultConfig: string(rawCfg),
|
|
defaultConfigHash: fmt.Sprintf("%x", md5.Sum(rawCfg)),
|
|
log: logger,
|
|
metrics: metrics,
|
|
mimirClient: mc,
|
|
orgID: cfg.OrgID,
|
|
state: store,
|
|
sender: s,
|
|
tenantID: cfg.TenantID,
|
|
url: cfg.URL,
|
|
}, nil
|
|
}
|
|
|
|
// ApplyConfig is called everytime we've determined we need to apply an existing configuration to the Alertmanager,
|
|
// including the first time the Alertmanager is started. In the context of a "remote Alertmanager" it's as good of a heuristic,
|
|
// for "a function that gets called when the Alertmanager starts". As a result we do two things:
|
|
// 1. Execute a readiness check to make sure the remote Alertmanager we're about to communicate with is up and ready.
|
|
// 2. Upload the configuration and state we currently hold.
|
|
func (am *Alertmanager) ApplyConfig(ctx context.Context, config *models.AlertConfiguration) error {
|
|
if am.ready {
|
|
am.log.Debug("Alertmanager previously marked as ready, skipping readiness check and config + state update")
|
|
return nil
|
|
}
|
|
|
|
// First, execute a readiness check to make sure the remote Alertmanager is ready.
|
|
am.log.Debug("Start readiness check for remote Alertmanager", "url", am.url)
|
|
if err := am.checkReadiness(ctx); err != nil {
|
|
am.log.Error("Unable to pass the readiness check", "err", err)
|
|
return err
|
|
}
|
|
am.log.Debug("Completed readiness check for remote Alertmanager", "url", am.url)
|
|
|
|
// Send configuration and base64-encoded state if necessary.
|
|
am.log.Debug("Start configuration upload to remote Alertmanager", "url", am.url)
|
|
if err := am.CompareAndSendConfiguration(ctx, config); err != nil {
|
|
am.log.Error("Unable to upload the configuration to the remote Alertmanager", "err", err)
|
|
}
|
|
am.log.Debug("Completed configuration upload to remote Alertmanager", "url", am.url)
|
|
|
|
am.log.Debug("Start state upload to remote Alertmanager", "url", am.url)
|
|
if err := am.CompareAndSendState(ctx); err != nil {
|
|
am.log.Error("Unable to upload the state to the remote Alertmanager", "err", err)
|
|
}
|
|
am.log.Debug("Completed state upload to remote Alertmanager", "url", am.url)
|
|
return nil
|
|
}
|
|
|
|
func (am *Alertmanager) checkReadiness(ctx context.Context) error {
|
|
ready, err := am.amClient.IsReadyWithBackoff(ctx)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if ready {
|
|
am.log.Debug("Alertmanager readiness check successful")
|
|
am.metrics.LastReadinessCheck.SetToCurrentTime()
|
|
am.ready = true
|
|
return nil
|
|
}
|
|
|
|
return notifier.ErrAlertmanagerNotReady
|
|
}
|
|
|
|
// CompareAndSendConfiguration checks whether a given configuration is being used by the remote Alertmanager.
|
|
// If not, it sends the configuration to the remote Alertmanager.
|
|
func (am *Alertmanager) CompareAndSendConfiguration(ctx context.Context, config *models.AlertConfiguration) error {
|
|
c, err := notifier.Load([]byte(config.AlertmanagerConfiguration))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Decrypt the configuration before comparing.
|
|
decrypted, err := am.decryptConfiguration(ctx, c)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Send the configuration only if we need to.
|
|
if !am.shouldSendConfig(ctx, decrypted) {
|
|
return nil
|
|
}
|
|
return am.sendConfiguration(ctx, decrypted, config.ConfigurationHash, config.CreatedAt, config.Default)
|
|
}
|
|
|
|
func (am *Alertmanager) decryptConfiguration(ctx context.Context, cfg *apimodels.PostableUserConfig) (*apimodels.PostableUserConfig, error) {
|
|
fn := func(payload []byte) ([]byte, error) {
|
|
return am.decrypt(ctx, payload)
|
|
}
|
|
decrypted, err := cfg.Decrypt(fn)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("unable to decrypt the configuration: %w", err)
|
|
}
|
|
|
|
return &decrypted, nil
|
|
}
|
|
|
|
func (am *Alertmanager) sendConfiguration(ctx context.Context, decrypted *apimodels.PostableUserConfig, hash string, createdAt int64, isDefault bool) error {
|
|
am.metrics.ConfigSyncsTotal.Inc()
|
|
if err := am.mimirClient.CreateGrafanaAlertmanagerConfig(
|
|
ctx,
|
|
decrypted,
|
|
hash,
|
|
createdAt,
|
|
isDefault,
|
|
); err != nil {
|
|
am.metrics.ConfigSyncErrorsTotal.Inc()
|
|
return err
|
|
}
|
|
am.metrics.LastConfigSync.SetToCurrentTime()
|
|
return nil
|
|
}
|
|
|
|
// CompareAndSendState gets the Alertmanager's internal state and compares it with the remote Alertmanager's one.
|
|
// If the states are different, it updates the remote Alertmanager's state with that of the internal Alertmanager.
|
|
func (am *Alertmanager) CompareAndSendState(ctx context.Context) error {
|
|
state, err := am.getFullState(ctx)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if am.shouldSendState(ctx, state) {
|
|
am.metrics.StateSyncsTotal.Inc()
|
|
if err := am.mimirClient.CreateGrafanaAlertmanagerState(ctx, state); err != nil {
|
|
am.metrics.StateSyncErrorsTotal.Inc()
|
|
return err
|
|
}
|
|
am.metrics.LastStateSync.SetToCurrentTime()
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// SaveAndApplyConfig decrypts and sends a configuration to the remote Alertmanager.
|
|
func (am *Alertmanager) SaveAndApplyConfig(ctx context.Context, cfg *apimodels.PostableUserConfig) error {
|
|
// Get the hash for the encrypted configuration.
|
|
rawCfg, err := json.Marshal(cfg)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
hash := fmt.Sprintf("%x", md5.Sum(rawCfg))
|
|
|
|
// Decrypt and send.
|
|
decrypted, err := am.decryptConfiguration(ctx, cfg)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return am.sendConfiguration(ctx, decrypted, hash, time.Now().Unix(), false)
|
|
}
|
|
|
|
// SaveAndApplyDefaultConfig sends the default Grafana Alertmanager configuration to the remote Alertmanager.
|
|
func (am *Alertmanager) SaveAndApplyDefaultConfig(ctx context.Context) error {
|
|
c, err := notifier.Load([]byte(am.defaultConfig))
|
|
if err != nil {
|
|
return fmt.Errorf("unable to parse the default configuration: %w", err)
|
|
}
|
|
|
|
// Decrypt before sending.
|
|
decrypted, err := am.decryptConfiguration(ctx, c)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return am.sendConfiguration(
|
|
ctx,
|
|
decrypted,
|
|
am.defaultConfigHash,
|
|
time.Now().Unix(),
|
|
true,
|
|
)
|
|
}
|
|
|
|
func (am *Alertmanager) CreateSilence(ctx context.Context, silence *apimodels.PostableSilence) (string, error) {
|
|
defer func() {
|
|
if r := recover(); r != nil {
|
|
am.log.Error("Panic while creating silence", "err", r)
|
|
}
|
|
}()
|
|
|
|
params := amsilence.NewPostSilencesParamsWithContext(ctx).WithSilence(silence)
|
|
res, err := am.amClient.Silence.PostSilences(params)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
return res.Payload.SilenceID, nil
|
|
}
|
|
|
|
func (am *Alertmanager) DeleteSilence(ctx context.Context, silenceID string) error {
|
|
defer func() {
|
|
if r := recover(); r != nil {
|
|
am.log.Error("Panic while deleting silence", "err", r)
|
|
}
|
|
}()
|
|
|
|
params := amsilence.NewDeleteSilenceParamsWithContext(ctx).WithSilenceID(strfmt.UUID(silenceID))
|
|
_, err := am.amClient.Silence.DeleteSilence(params)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (am *Alertmanager) GetSilence(ctx context.Context, silenceID string) (apimodels.GettableSilence, error) {
|
|
defer func() {
|
|
if r := recover(); r != nil {
|
|
am.log.Error("Panic while getting silence", "err", r)
|
|
}
|
|
}()
|
|
|
|
params := amsilence.NewGetSilenceParamsWithContext(ctx).WithSilenceID(strfmt.UUID(silenceID))
|
|
res, err := am.amClient.Silence.GetSilence(params)
|
|
if err != nil {
|
|
return apimodels.GettableSilence{}, err
|
|
}
|
|
|
|
return *res.Payload, nil
|
|
}
|
|
|
|
func (am *Alertmanager) ListSilences(ctx context.Context, filter []string) (apimodels.GettableSilences, error) {
|
|
defer func() {
|
|
if r := recover(); r != nil {
|
|
am.log.Error("Panic while listing silences", "err", r)
|
|
}
|
|
}()
|
|
|
|
params := amsilence.NewGetSilencesParamsWithContext(ctx).WithFilter(filter)
|
|
res, err := am.amClient.Silence.GetSilences(params)
|
|
if err != nil {
|
|
return apimodels.GettableSilences{}, err
|
|
}
|
|
|
|
return res.Payload, nil
|
|
}
|
|
|
|
func (am *Alertmanager) GetAlerts(ctx context.Context, active, silenced, inhibited bool, filter []string, receiver string) (apimodels.GettableAlerts, error) {
|
|
defer func() {
|
|
if r := recover(); r != nil {
|
|
am.log.Error("Panic while getting alerts", "err", r)
|
|
}
|
|
}()
|
|
|
|
params := amalert.NewGetAlertsParamsWithContext(ctx).
|
|
WithActive(&active).
|
|
WithSilenced(&silenced).
|
|
WithInhibited(&inhibited).
|
|
WithFilter(filter).
|
|
WithReceiver(&receiver)
|
|
|
|
res, err := am.amClient.Alert.GetAlerts(params)
|
|
if err != nil {
|
|
return apimodels.GettableAlerts{}, err
|
|
}
|
|
|
|
return res.Payload, nil
|
|
}
|
|
|
|
func (am *Alertmanager) GetAlertGroups(ctx context.Context, active, silenced, inhibited bool, filter []string, receiver string) (apimodels.AlertGroups, error) {
|
|
defer func() {
|
|
if r := recover(); r != nil {
|
|
am.log.Error("Panic while getting alert groups", "err", r)
|
|
}
|
|
}()
|
|
|
|
params := amalertgroup.NewGetAlertGroupsParamsWithContext(ctx).
|
|
WithActive(&active).
|
|
WithSilenced(&silenced).
|
|
WithInhibited(&inhibited).
|
|
WithFilter(filter).
|
|
WithReceiver(&receiver)
|
|
|
|
res, err := am.amClient.Alertgroup.GetAlertGroups(params)
|
|
if err != nil {
|
|
return apimodels.AlertGroups{}, err
|
|
}
|
|
|
|
return res.Payload, nil
|
|
}
|
|
|
|
func (am *Alertmanager) PutAlerts(ctx context.Context, alerts apimodels.PostableAlerts) error {
|
|
am.log.Debug("Sending alerts to a remote alertmanager", "url", am.url, "alerts", len(alerts.PostableAlerts))
|
|
am.sender.SendAlerts(alerts)
|
|
return nil
|
|
}
|
|
|
|
// GetStatus retrieves the remote Alertmanager configuration.
|
|
func (am *Alertmanager) GetStatus(ctx context.Context) (apimodels.GettableStatus, error) {
|
|
defer func() {
|
|
if r := recover(); r != nil {
|
|
am.log.Error("Panic while getting status", "err", r)
|
|
}
|
|
}()
|
|
|
|
params := amgeneral.NewGetStatusParamsWithContext(ctx)
|
|
res, err := am.amClient.General.GetStatus(params)
|
|
if err != nil {
|
|
return apimodels.GettableStatus{}, err
|
|
}
|
|
|
|
var cfg apimodels.PostableApiAlertingConfig
|
|
if err := yaml.Unmarshal([]byte(*res.Payload.Config.Original), &cfg); err != nil {
|
|
return apimodels.GettableStatus{}, err
|
|
}
|
|
|
|
return *apimodels.NewGettableStatus(&cfg), nil
|
|
}
|
|
|
|
func (am *Alertmanager) GetReceivers(ctx context.Context) ([]apimodels.Receiver, error) {
|
|
params := amreceiver.NewGetReceiversParamsWithContext(ctx)
|
|
res, err := am.amClient.Receiver.GetReceivers(params)
|
|
if err != nil {
|
|
return []apimodels.Receiver{}, err
|
|
}
|
|
|
|
var rcvs []apimodels.Receiver
|
|
for _, rcv := range res.Payload {
|
|
rcvs = append(rcvs, *rcv)
|
|
}
|
|
return rcvs, nil
|
|
}
|
|
|
|
func (am *Alertmanager) TestReceivers(ctx context.Context, c apimodels.TestReceiversConfigBodyParams) (*notifier.TestReceiversResult, error) {
|
|
return ¬ifier.TestReceiversResult{}, nil
|
|
}
|
|
|
|
func (am *Alertmanager) TestTemplate(ctx context.Context, c apimodels.TestTemplatesConfigBodyParams) (*notifier.TestTemplatesResults, error) {
|
|
return ¬ifier.TestTemplatesResults{}, nil
|
|
}
|
|
|
|
// StopAndWait is called when the grafana server is instructed to shut down or an org is deleted.
|
|
// In the context of a "remote Alertmanager" it is a good heuristic for Grafana is about to shut down or we no longer need you.
|
|
func (am *Alertmanager) StopAndWait() {
|
|
am.sender.Stop()
|
|
}
|
|
|
|
func (am *Alertmanager) Ready() bool {
|
|
return am.ready
|
|
}
|
|
|
|
// SilenceState returns the Alertmanager's silence state as a SilenceState. Currently, does not retrieve the state
|
|
// remotely and instead uses the value from the state store.
|
|
func (am *Alertmanager) SilenceState(ctx context.Context) (alertingNotify.SilenceState, error) {
|
|
silences, err := am.state.GetSilences(ctx)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error getting silences: %w", err)
|
|
}
|
|
|
|
return alertingNotify.DecodeState(strings.NewReader(silences))
|
|
}
|
|
|
|
// getFullState returns a base64-encoded protobuf message representing the Alertmanager's internal state.
|
|
func (am *Alertmanager) getFullState(ctx context.Context) (string, error) {
|
|
var parts []alertingClusterPB.Part
|
|
|
|
state, err := am.SilenceState(ctx)
|
|
if err != nil {
|
|
return "", fmt.Errorf("error getting silences: %w", err)
|
|
}
|
|
b, err := state.MarshalBinary()
|
|
if err != nil {
|
|
return "", fmt.Errorf("error marshalling silences: %w", err)
|
|
}
|
|
parts = append(parts, alertingClusterPB.Part{Key: notifier.SilencesFilename, Data: b})
|
|
|
|
notificationLog, err := am.state.GetNotificationLog(ctx)
|
|
if err != nil {
|
|
return "", fmt.Errorf("error getting notification log: %w", err)
|
|
}
|
|
parts = append(parts, alertingClusterPB.Part{Key: notifier.NotificationLogFilename, Data: []byte(notificationLog)})
|
|
|
|
fs := alertingClusterPB.FullState{
|
|
Parts: parts,
|
|
}
|
|
b, err = fs.Marshal()
|
|
if err != nil {
|
|
return "", fmt.Errorf("error marshaling full state: %w", err)
|
|
}
|
|
|
|
return base64.StdEncoding.EncodeToString(b), nil
|
|
}
|
|
|
|
// shouldSendConfig compares the remote Alertmanager configuration with our local one.
|
|
// It returns true if the configurations are different.
|
|
func (am *Alertmanager) shouldSendConfig(ctx context.Context, config *apimodels.PostableUserConfig) bool {
|
|
rc, err := am.mimirClient.GetGrafanaAlertmanagerConfig(ctx)
|
|
if err != nil {
|
|
// Log the error and return true so we try to upload our config anyway.
|
|
am.log.Error("Unable to get the remote Alertmanager configuration for comparison", "err", err)
|
|
return true
|
|
}
|
|
|
|
if rc.Promoted != am.mimirClient.ShouldPromoteConfig() {
|
|
return true
|
|
}
|
|
|
|
rawRemote, err := json.Marshal(rc.GrafanaAlertmanagerConfig)
|
|
if err != nil {
|
|
am.log.Error("Unable to marshal the remote Alertmanager configuration for comparison", "err", err)
|
|
return true
|
|
}
|
|
rawInternal, err := json.Marshal(config)
|
|
if err != nil {
|
|
am.log.Error("Unable to marshal the internal Alertmanager configuration for comparison", "err", err)
|
|
return true
|
|
}
|
|
return md5.Sum(rawRemote) != md5.Sum(rawInternal)
|
|
}
|
|
|
|
// shouldSendState compares the remote Alertmanager state with our local one.
|
|
// It returns true if the states are different.
|
|
func (am *Alertmanager) shouldSendState(ctx context.Context, state string) bool {
|
|
rs, err := am.mimirClient.GetGrafanaAlertmanagerState(ctx)
|
|
if err != nil {
|
|
// Log the error and return true so we try to upload our state anyway.
|
|
am.log.Error("Unable to get the remote Alertmanager state for comparison", "err", err)
|
|
return true
|
|
}
|
|
|
|
return rs.State != state
|
|
}
|