mirror of
https://github.com/grafana/grafana.git
synced 2024-11-25 18:30:41 -06:00
09cb3a6048
* Alerting: Add optional metadata to GET silence responses - ruleMetadata: to request rule metadata. - accesscontrol: to request access control metadata.
804 lines
29 KiB
Go
804 lines
29 KiB
Go
package store
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"strings"
|
|
|
|
"github.com/google/uuid"
|
|
"golang.org/x/exp/maps"
|
|
"golang.org/x/exp/slices"
|
|
|
|
"xorm.io/xorm"
|
|
|
|
"github.com/grafana/grafana/pkg/infra/db"
|
|
"github.com/grafana/grafana/pkg/services/accesscontrol"
|
|
"github.com/grafana/grafana/pkg/services/auth/identity"
|
|
"github.com/grafana/grafana/pkg/services/dashboards"
|
|
"github.com/grafana/grafana/pkg/services/featuremgmt"
|
|
"github.com/grafana/grafana/pkg/services/folder"
|
|
ngmodels "github.com/grafana/grafana/pkg/services/ngalert/models"
|
|
"github.com/grafana/grafana/pkg/services/org"
|
|
"github.com/grafana/grafana/pkg/services/sqlstore"
|
|
"github.com/grafana/grafana/pkg/services/sqlstore/migrator"
|
|
"github.com/grafana/grafana/pkg/services/store/entity"
|
|
"github.com/grafana/grafana/pkg/util"
|
|
)
|
|
|
|
// AlertRuleMaxTitleLength is the maximum length of the alert rule title
|
|
const AlertRuleMaxTitleLength = 190
|
|
|
|
// AlertRuleMaxRuleGroupNameLength is the maximum length of the alert rule group name
|
|
const AlertRuleMaxRuleGroupNameLength = 190
|
|
|
|
var (
|
|
ErrOptimisticLock = errors.New("version conflict while updating a record in the database with optimistic locking")
|
|
)
|
|
|
|
func getAlertRuleByUID(sess *db.Session, alertRuleUID string, orgID int64) (*ngmodels.AlertRule, error) {
|
|
// we consider optionally enabling some caching
|
|
alertRule := ngmodels.AlertRule{OrgID: orgID, UID: alertRuleUID}
|
|
has, err := sess.Get(&alertRule)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if !has {
|
|
return nil, ngmodels.ErrAlertRuleNotFound
|
|
}
|
|
return &alertRule, nil
|
|
}
|
|
|
|
// DeleteAlertRulesByUID is a handler for deleting an alert rule.
|
|
func (st DBstore) DeleteAlertRulesByUID(ctx context.Context, orgID int64, ruleUID ...string) error {
|
|
logger := st.Logger.New("org_id", orgID, "rule_uids", ruleUID)
|
|
return st.SQLStore.WithTransactionalDbSession(ctx, func(sess *db.Session) error {
|
|
rows, err := sess.Table("alert_rule").Where("org_id = ?", orgID).In("uid", ruleUID).Delete(ngmodels.AlertRule{})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
logger.Debug("Deleted alert rules", "count", rows)
|
|
|
|
rows, err = sess.Table("alert_rule_version").Where("rule_org_id = ?", orgID).In("rule_uid", ruleUID).Delete(ngmodels.AlertRule{})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
logger.Debug("Deleted alert rule versions", "count", rows)
|
|
|
|
rows, err = sess.Table("alert_instance").Where("rule_org_id = ?", orgID).In("rule_uid", ruleUID).Delete(ngmodels.AlertRule{})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
logger.Debug("Deleted alert instances", "count", rows)
|
|
return nil
|
|
})
|
|
}
|
|
|
|
// IncreaseVersionForAllRulesInNamespace Increases version for all rules that have specified namespace. Returns all rules that belong to the namespace
|
|
func (st DBstore) IncreaseVersionForAllRulesInNamespace(ctx context.Context, orgID int64, namespaceUID string) ([]ngmodels.AlertRuleKeyWithVersion, error) {
|
|
var keys []ngmodels.AlertRuleKeyWithVersion
|
|
err := st.SQLStore.WithTransactionalDbSession(ctx, func(sess *db.Session) error {
|
|
now := TimeNow()
|
|
_, err := sess.Exec("UPDATE alert_rule SET version = version + 1, updated = ? WHERE namespace_uid = ? AND org_id = ?", now, namespaceUID, orgID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return sess.Table(ngmodels.AlertRule{}).Where("namespace_uid = ? AND org_id = ?", namespaceUID, orgID).Find(&keys)
|
|
})
|
|
return keys, err
|
|
}
|
|
|
|
// GetAlertRuleByUID is a handler for retrieving an alert rule from that database by its UID and organisation ID.
|
|
// It returns ngmodels.ErrAlertRuleNotFound if no alert rule is found for the provided ID.
|
|
func (st DBstore) GetAlertRuleByUID(ctx context.Context, query *ngmodels.GetAlertRuleByUIDQuery) (result *ngmodels.AlertRule, err error) {
|
|
err = st.SQLStore.WithDbSession(ctx, func(sess *db.Session) error {
|
|
alertRule, err := getAlertRuleByUID(sess, query.UID, query.OrgID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
result = alertRule
|
|
return nil
|
|
})
|
|
return result, err
|
|
}
|
|
|
|
// GetAlertRulesGroupByRuleUID is a handler for retrieving a group of alert rules from that database by UID and organisation ID of one of rules that belong to that group.
|
|
func (st DBstore) GetAlertRulesGroupByRuleUID(ctx context.Context, query *ngmodels.GetAlertRulesGroupByRuleUIDQuery) (result []*ngmodels.AlertRule, err error) {
|
|
err = st.SQLStore.WithDbSession(ctx, func(sess *db.Session) error {
|
|
var rules []*ngmodels.AlertRule
|
|
err := sess.Table("alert_rule").Alias("a").Join(
|
|
"INNER",
|
|
"alert_rule AS b", "a.org_id = b.org_id AND a.namespace_uid = b.namespace_uid AND a.rule_group = b.rule_group AND b.uid = ?", query.UID,
|
|
).Where("a.org_id = ?", query.OrgID).Select("a.*").Find(&rules)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
result = rules
|
|
return nil
|
|
})
|
|
return result, err
|
|
}
|
|
|
|
// InsertAlertRules is a handler for creating/updating alert rules.
|
|
// Returns the UID and ID of rules that were created in the same order as the input rules.
|
|
func (st DBstore) InsertAlertRules(ctx context.Context, rules []ngmodels.AlertRule) ([]ngmodels.AlertRuleKeyWithId, error) {
|
|
ids := make([]ngmodels.AlertRuleKeyWithId, 0, len(rules))
|
|
return ids, st.SQLStore.WithTransactionalDbSession(ctx, func(sess *db.Session) error {
|
|
newRules := make([]ngmodels.AlertRule, 0, len(rules))
|
|
ruleVersions := make([]ngmodels.AlertRuleVersion, 0, len(rules))
|
|
for i := range rules {
|
|
r := rules[i]
|
|
if r.UID == "" {
|
|
uid, err := GenerateNewAlertRuleUID(sess, r.OrgID, r.Title)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to generate UID for alert rule %q: %w", r.Title, err)
|
|
}
|
|
r.UID = uid
|
|
}
|
|
r.Version = 1
|
|
if err := st.validateAlertRule(r); err != nil {
|
|
return err
|
|
}
|
|
if err := (&r).PreSave(TimeNow); err != nil {
|
|
return err
|
|
}
|
|
newRules = append(newRules, r)
|
|
ruleVersions = append(ruleVersions, ngmodels.AlertRuleVersion{
|
|
RuleUID: r.UID,
|
|
RuleOrgID: r.OrgID,
|
|
RuleNamespaceUID: r.NamespaceUID,
|
|
RuleGroup: r.RuleGroup,
|
|
ParentVersion: 0,
|
|
Version: r.Version,
|
|
Created: r.Updated,
|
|
Condition: r.Condition,
|
|
Title: r.Title,
|
|
Data: r.Data,
|
|
IntervalSeconds: r.IntervalSeconds,
|
|
NoDataState: r.NoDataState,
|
|
ExecErrState: r.ExecErrState,
|
|
For: r.For,
|
|
Annotations: r.Annotations,
|
|
Labels: r.Labels,
|
|
Record: r.Record,
|
|
NotificationSettings: r.NotificationSettings,
|
|
})
|
|
}
|
|
if len(newRules) > 0 {
|
|
// we have to insert the rules one by one as otherwise we are
|
|
// not able to fetch the inserted id as it's not supported by xorm
|
|
for i := range newRules {
|
|
if _, err := sess.Insert(&newRules[i]); err != nil {
|
|
if st.SQLStore.GetDialect().IsUniqueConstraintViolation(err) {
|
|
return ruleConstraintViolationToErr(newRules[i], err)
|
|
}
|
|
return fmt.Errorf("failed to create new rules: %w", err)
|
|
}
|
|
ids = append(ids, ngmodels.AlertRuleKeyWithId{
|
|
AlertRuleKey: newRules[i].GetKey(),
|
|
ID: newRules[i].ID,
|
|
})
|
|
}
|
|
}
|
|
|
|
if len(ruleVersions) > 0 {
|
|
if _, err := sess.Insert(&ruleVersions); err != nil {
|
|
return fmt.Errorf("failed to create new rule versions: %w", err)
|
|
}
|
|
}
|
|
return nil
|
|
})
|
|
}
|
|
|
|
// UpdateAlertRules is a handler for updating alert rules.
|
|
func (st DBstore) UpdateAlertRules(ctx context.Context, rules []ngmodels.UpdateRule) error {
|
|
return st.SQLStore.WithTransactionalDbSession(ctx, func(sess *db.Session) error {
|
|
err := st.preventIntermediateUniqueConstraintViolations(sess, rules)
|
|
if err != nil {
|
|
return fmt.Errorf("failed when preventing intermediate unique constraint violation: %w", err)
|
|
}
|
|
|
|
ruleVersions := make([]ngmodels.AlertRuleVersion, 0, len(rules))
|
|
for i := range rules {
|
|
// We do indexed access way to avoid "G601: Implicit memory aliasing in for loop."
|
|
// Doing this will be unnecessary with go 1.22 https://stackoverflow.com/a/68247837/767660
|
|
r := rules[i]
|
|
var parentVersion int64
|
|
r.New.ID = r.Existing.ID
|
|
r.New.Version = r.Existing.Version // xorm will take care of increasing it (see https://xorm.io/docs/chapter-06/1.lock/)
|
|
if err := st.validateAlertRule(r.New); err != nil {
|
|
return err
|
|
}
|
|
if err := (&r.New).PreSave(TimeNow); err != nil {
|
|
return err
|
|
}
|
|
// no way to update multiple rules at once
|
|
if updated, err := sess.ID(r.Existing.ID).AllCols().Update(r.New); err != nil || updated == 0 {
|
|
if err != nil {
|
|
if st.SQLStore.GetDialect().IsUniqueConstraintViolation(err) {
|
|
return ruleConstraintViolationToErr(r.New, err)
|
|
}
|
|
return fmt.Errorf("failed to update rule [%s] %s: %w", r.New.UID, r.New.Title, err)
|
|
}
|
|
return fmt.Errorf("%w: alert rule UID %s version %d", ErrOptimisticLock, r.New.UID, r.New.Version)
|
|
}
|
|
parentVersion = r.Existing.Version
|
|
ruleVersions = append(ruleVersions, ngmodels.AlertRuleVersion{
|
|
RuleOrgID: r.New.OrgID,
|
|
RuleUID: r.New.UID,
|
|
RuleNamespaceUID: r.New.NamespaceUID,
|
|
RuleGroup: r.New.RuleGroup,
|
|
RuleGroupIndex: r.New.RuleGroupIndex,
|
|
ParentVersion: parentVersion,
|
|
Version: r.New.Version + 1,
|
|
Created: r.New.Updated,
|
|
Condition: r.New.Condition,
|
|
Title: r.New.Title,
|
|
Data: r.New.Data,
|
|
IntervalSeconds: r.New.IntervalSeconds,
|
|
NoDataState: r.New.NoDataState,
|
|
ExecErrState: r.New.ExecErrState,
|
|
Record: r.New.Record,
|
|
For: r.New.For,
|
|
Annotations: r.New.Annotations,
|
|
Labels: r.New.Labels,
|
|
NotificationSettings: r.New.NotificationSettings,
|
|
})
|
|
}
|
|
if len(ruleVersions) > 0 {
|
|
if _, err := sess.Insert(&ruleVersions); err != nil {
|
|
return fmt.Errorf("failed to create new rule versions: %w", err)
|
|
}
|
|
}
|
|
return nil
|
|
})
|
|
}
|
|
|
|
// preventIntermediateUniqueConstraintViolations prevents unique constraint violations caused by an intermediate update.
|
|
// The uniqueness constraint for titles within an org+folder is enforced on every update within a transaction
|
|
// instead of on commit (deferred constraint). This means that there could be a set of updates that will throw
|
|
// a unique constraint violation in an intermediate step even though the final state is valid.
|
|
// For example, a chain of updates RuleA -> RuleB -> RuleC could fail if not executed in the correct order, or
|
|
// a swap of titles RuleA <-> RuleB cannot be executed in any order without violating the constraint.
|
|
func (st DBstore) preventIntermediateUniqueConstraintViolations(sess *db.Session, updates []ngmodels.UpdateRule) error {
|
|
// The exact solution to this is complex and requires determining directed paths and cycles in the update graph,
|
|
// adding in temporary updates to break cycles, and then executing the updates in reverse topological order.
|
|
// This is not implemented here. Instead, we choose a simpler solution that works in all cases but might perform
|
|
// more updates than necessary. This simpler solution makes a determination of whether an intermediate collision
|
|
// could occur and if so, adds a temporary title on all updated rules to break any cycles and remove the need for
|
|
// specific ordering.
|
|
|
|
titleUpdates := make([]ngmodels.UpdateRule, 0)
|
|
for _, update := range updates {
|
|
if update.Existing.Title != update.New.Title {
|
|
titleUpdates = append(titleUpdates, update)
|
|
}
|
|
}
|
|
|
|
// If there is no overlap then an intermediate unique constraint violation is not possible. If there is an overlap,
|
|
// then there is the possibility of intermediate unique constraint violation.
|
|
if !newTitlesOverlapExisting(titleUpdates) {
|
|
return nil
|
|
}
|
|
st.Logger.Debug("Detected possible intermediate unique constraint violation, creating temporary title updates", "updates", len(titleUpdates))
|
|
|
|
for _, update := range titleUpdates {
|
|
r := update.Existing
|
|
u := uuid.New().String()
|
|
|
|
// Some defensive programming in case the temporary title is somehow persisted it will still be recognizable.
|
|
uniqueTempTitle := r.Title + u
|
|
if len(uniqueTempTitle) > AlertRuleMaxTitleLength {
|
|
uniqueTempTitle = r.Title[:AlertRuleMaxTitleLength-len(u)] + uuid.New().String()
|
|
}
|
|
|
|
if updated, err := sess.ID(r.ID).Cols("title").Update(&ngmodels.AlertRule{Title: uniqueTempTitle, Version: r.Version}); err != nil || updated == 0 {
|
|
if err != nil {
|
|
return fmt.Errorf("failed to set temporary rule title [%s] %s: %w", r.UID, r.Title, err)
|
|
}
|
|
return fmt.Errorf("%w: alert rule UID %s version %d", ErrOptimisticLock, r.UID, r.Version)
|
|
}
|
|
// Otherwise optimistic locking will conflict on the 2nd update.
|
|
r.Version++
|
|
// For consistency.
|
|
r.Title = uniqueTempTitle
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// newTitlesOverlapExisting returns true if any new titles overlap with existing titles.
|
|
// It does so in a case-insensitive manner as some supported databases perform case-insensitive comparisons.
|
|
func newTitlesOverlapExisting(rules []ngmodels.UpdateRule) bool {
|
|
existingTitles := make(map[string]struct{}, len(rules))
|
|
for _, r := range rules {
|
|
existingTitles[strings.ToLower(r.Existing.Title)] = struct{}{}
|
|
}
|
|
|
|
// Check if there is any overlap between lower case existing and new titles.
|
|
for _, r := range rules {
|
|
if _, ok := existingTitles[strings.ToLower(r.New.Title)]; ok {
|
|
return true
|
|
}
|
|
}
|
|
|
|
return false
|
|
}
|
|
|
|
// CountInFolder is a handler for retrieving the number of alert rules of
|
|
// specific organisation associated with a given namespace (parent folder).
|
|
func (st DBstore) CountInFolders(ctx context.Context, orgID int64, folderUIDs []string, u identity.Requester) (int64, error) {
|
|
if len(folderUIDs) == 0 {
|
|
return 0, nil
|
|
}
|
|
var count int64
|
|
var err error
|
|
err = st.SQLStore.WithDbSession(ctx, func(sess *db.Session) error {
|
|
args := make([]any, 0, len(folderUIDs))
|
|
for _, folderUID := range folderUIDs {
|
|
args = append(args, folderUID)
|
|
}
|
|
q := sess.Table("alert_rule").Where("org_id = ?", orgID).Where(fmt.Sprintf("namespace_uid IN (%s)", strings.Repeat("?,", len(folderUIDs)-1)+"?"), args...)
|
|
count, err = q.Count()
|
|
return err
|
|
})
|
|
return count, err
|
|
}
|
|
|
|
// ListAlertRules is a handler for retrieving alert rules of specific organisation.
|
|
func (st DBstore) ListAlertRules(ctx context.Context, query *ngmodels.ListAlertRulesQuery) (result ngmodels.RulesGroup, err error) {
|
|
err = st.SQLStore.WithDbSession(ctx, func(sess *db.Session) error {
|
|
q := sess.Table("alert_rule")
|
|
|
|
if query.OrgID >= 0 {
|
|
q = q.Where("org_id = ?", query.OrgID)
|
|
}
|
|
|
|
if query.DashboardUID != "" {
|
|
q = q.Where("dashboard_uid = ?", query.DashboardUID)
|
|
if query.PanelID != 0 {
|
|
q = q.Where("panel_id = ?", query.PanelID)
|
|
}
|
|
}
|
|
|
|
if len(query.NamespaceUIDs) > 0 {
|
|
args, in := getINSubQueryArgs(query.NamespaceUIDs)
|
|
q = q.Where(fmt.Sprintf("namespace_uid IN (%s)", strings.Join(in, ",")), args...)
|
|
}
|
|
|
|
if len(query.RuleUIDs) > 0 {
|
|
args, in := getINSubQueryArgs(query.RuleUIDs)
|
|
q = q.Where(fmt.Sprintf("uid IN (%s)", strings.Join(in, ",")), args...)
|
|
}
|
|
|
|
if len(query.RuleGroups) > 0 {
|
|
args, in := getINSubQueryArgs(query.RuleGroups)
|
|
q = q.Where(fmt.Sprintf("rule_group IN (%s)", strings.Join(in, ",")), args...)
|
|
}
|
|
|
|
if query.ReceiverName != "" {
|
|
q, err = st.filterByReceiverName(query.ReceiverName, q)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
q = q.Asc("namespace_uid", "rule_group", "rule_group_idx", "id")
|
|
|
|
alertRules := make([]*ngmodels.AlertRule, 0)
|
|
rule := new(ngmodels.AlertRule)
|
|
rows, err := q.Rows(rule)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer func() {
|
|
_ = rows.Close()
|
|
}()
|
|
|
|
// Deserialize each rule separately in case any of them contain invalid JSON.
|
|
for rows.Next() {
|
|
rule := new(ngmodels.AlertRule)
|
|
err = rows.Scan(rule)
|
|
if err != nil {
|
|
st.Logger.Error("Invalid rule found in DB store, ignoring it", "func", "ListAlertRules", "error", err)
|
|
continue
|
|
}
|
|
if query.ReceiverName != "" { // remove false-positive hits from the result
|
|
if !slices.ContainsFunc(rule.NotificationSettings, func(settings ngmodels.NotificationSettings) bool {
|
|
return settings.Receiver == query.ReceiverName
|
|
}) {
|
|
continue
|
|
}
|
|
}
|
|
alertRules = append(alertRules, rule)
|
|
}
|
|
|
|
result = alertRules
|
|
return nil
|
|
})
|
|
return result, err
|
|
}
|
|
|
|
// Count returns either the number of the alert rules under a specific org (if orgID is not zero)
|
|
// or the number of all the alert rules
|
|
func (st DBstore) Count(ctx context.Context, orgID int64) (int64, error) {
|
|
type result struct {
|
|
Count int64
|
|
}
|
|
|
|
r := result{}
|
|
err := st.SQLStore.WithDbSession(ctx, func(sess *sqlstore.DBSession) error {
|
|
rawSQL := "SELECT COUNT(*) as count from alert_rule"
|
|
args := make([]any, 0)
|
|
if orgID != 0 {
|
|
rawSQL += " WHERE org_id=?"
|
|
args = append(args, orgID)
|
|
}
|
|
if _, err := sess.SQL(rawSQL, args...).Get(&r); err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
})
|
|
return r.Count, err
|
|
}
|
|
|
|
func (st DBstore) GetRuleGroupInterval(ctx context.Context, orgID int64, namespaceUID string, ruleGroup string) (int64, error) {
|
|
var interval int64 = 0
|
|
return interval, st.SQLStore.WithDbSession(ctx, func(sess *db.Session) error {
|
|
ruleGroups := make([]ngmodels.AlertRule, 0)
|
|
err := sess.Find(
|
|
&ruleGroups,
|
|
ngmodels.AlertRule{OrgID: orgID, RuleGroup: ruleGroup, NamespaceUID: namespaceUID},
|
|
)
|
|
if len(ruleGroups) == 0 {
|
|
return ngmodels.ErrAlertRuleGroupNotFound.Errorf("")
|
|
}
|
|
interval = ruleGroups[0].IntervalSeconds
|
|
return err
|
|
})
|
|
}
|
|
|
|
// GetUserVisibleNamespaces returns the folders that are visible to the user
|
|
func (st DBstore) GetUserVisibleNamespaces(ctx context.Context, orgID int64, user identity.Requester) (map[string]*folder.Folder, error) {
|
|
folders, err := st.FolderService.GetFolders(ctx, folder.GetFoldersQuery{
|
|
OrgID: orgID,
|
|
WithFullpath: true,
|
|
SignedInUser: user,
|
|
})
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
namespaceMap := make(map[string]*folder.Folder)
|
|
for _, f := range folders {
|
|
namespaceMap[f.UID] = f
|
|
}
|
|
return namespaceMap, nil
|
|
}
|
|
|
|
// GetNamespaceByUID is a handler for retrieving a namespace by its UID. Alerting rules follow a Grafana folder-like structure which we call namespaces.
|
|
func (st DBstore) GetNamespaceByUID(ctx context.Context, uid string, orgID int64, user identity.Requester) (*folder.Folder, error) {
|
|
f, err := st.FolderService.GetFolders(ctx, folder.GetFoldersQuery{OrgID: orgID, UIDs: []string{uid}, WithFullpath: true, SignedInUser: user})
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if len(f) == 0 {
|
|
return nil, dashboards.ErrFolderAccessDenied
|
|
}
|
|
return f[0], nil
|
|
}
|
|
|
|
func (st DBstore) GetAlertRulesKeysForScheduling(ctx context.Context) ([]ngmodels.AlertRuleKeyWithVersion, error) {
|
|
var result []ngmodels.AlertRuleKeyWithVersion
|
|
err := st.SQLStore.WithDbSession(ctx, func(sess *db.Session) error {
|
|
alertRulesSql := sess.Table("alert_rule").Select("org_id, uid, version")
|
|
var disabledOrgs []int64
|
|
|
|
for orgID := range st.Cfg.DisabledOrgs {
|
|
disabledOrgs = append(disabledOrgs, orgID)
|
|
}
|
|
|
|
if len(disabledOrgs) > 0 {
|
|
alertRulesSql = alertRulesSql.NotIn("org_id", disabledOrgs)
|
|
}
|
|
|
|
if err := alertRulesSql.Find(&result); err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
})
|
|
return result, err
|
|
}
|
|
|
|
// GetAlertRulesForScheduling returns a short version of all alert rules except those that belong to an excluded list of organizations
|
|
func (st DBstore) GetAlertRulesForScheduling(ctx context.Context, query *ngmodels.GetAlertRulesForSchedulingQuery) error {
|
|
var rules []*ngmodels.AlertRule
|
|
return st.SQLStore.WithDbSession(ctx, func(sess *db.Session) error {
|
|
var disabledOrgs []int64
|
|
for orgID := range st.Cfg.DisabledOrgs {
|
|
disabledOrgs = append(disabledOrgs, orgID)
|
|
}
|
|
|
|
alertRulesSql := sess.Table("alert_rule")
|
|
if len(disabledOrgs) > 0 {
|
|
alertRulesSql.NotIn("org_id", disabledOrgs)
|
|
}
|
|
|
|
if len(query.RuleGroups) > 0 {
|
|
alertRulesSql.In("rule_group", query.RuleGroups)
|
|
}
|
|
|
|
rule := new(ngmodels.AlertRule)
|
|
rows, err := alertRulesSql.Rows(rule)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to fetch alert rules: %w", err)
|
|
}
|
|
defer func() {
|
|
if err := rows.Close(); err != nil {
|
|
st.Logger.Error("Unable to close rows session", "error", err)
|
|
}
|
|
}()
|
|
// Deserialize each rule separately in case any of them contain invalid JSON.
|
|
for rows.Next() {
|
|
rule := new(ngmodels.AlertRule)
|
|
err = rows.Scan(rule)
|
|
if err != nil {
|
|
st.Logger.Error("Invalid rule found in DB store, ignoring it", "func", "GetAlertRulesForScheduling", "error", err)
|
|
continue
|
|
}
|
|
if st.FeatureToggles.IsEnabled(ctx, featuremgmt.FlagAlertingQueryOptimization) {
|
|
if optimizations, err := OptimizeAlertQueries(rule.Data); err != nil {
|
|
st.Logger.Error("Could not migrate rule from range to instant query", "rule", rule.UID, "err", err)
|
|
} else if len(optimizations) > 0 {
|
|
st.Logger.Info("Migrated rule from range to instant query", "rule", rule.UID, "migrated_queries", len(optimizations))
|
|
}
|
|
}
|
|
rules = append(rules, rule)
|
|
}
|
|
|
|
query.ResultRules = rules
|
|
|
|
if query.PopulateFolders {
|
|
query.ResultFoldersTitles = map[ngmodels.FolderKey]string{}
|
|
uids := map[int64]map[string]struct{}{}
|
|
for _, r := range rules {
|
|
om, ok := uids[r.OrgID]
|
|
if !ok {
|
|
om = make(map[string]struct{})
|
|
uids[r.OrgID] = om
|
|
}
|
|
om[r.NamespaceUID] = struct{}{}
|
|
}
|
|
for orgID, uids := range uids {
|
|
schedulerUser := accesscontrol.BackgroundUser("grafana_scheduler", orgID, org.RoleAdmin,
|
|
[]accesscontrol.Permission{
|
|
{
|
|
Action: dashboards.ActionFoldersRead, Scope: dashboards.ScopeFoldersAll,
|
|
},
|
|
})
|
|
|
|
folders, err := st.FolderService.GetFolders(ctx, folder.GetFoldersQuery{
|
|
OrgID: orgID,
|
|
UIDs: maps.Keys(uids),
|
|
WithFullpath: true,
|
|
SignedInUser: schedulerUser,
|
|
})
|
|
if err != nil {
|
|
return fmt.Errorf("failed to fetch a list of folders that contain alert rules: %w", err)
|
|
}
|
|
for _, f := range folders {
|
|
query.ResultFoldersTitles[ngmodels.FolderKey{OrgID: f.OrgID, UID: f.UID}] = f.Fullpath
|
|
}
|
|
}
|
|
}
|
|
return nil
|
|
})
|
|
}
|
|
|
|
// DeleteInFolder deletes the rules contained in a given folder along with their associated data.
|
|
func (st DBstore) DeleteInFolders(ctx context.Context, orgID int64, folderUIDs []string, user identity.Requester) error {
|
|
for _, folderUID := range folderUIDs {
|
|
evaluator := accesscontrol.EvalPermission(accesscontrol.ActionAlertingRuleDelete, dashboards.ScopeFoldersProvider.GetResourceScopeUID(folderUID))
|
|
canSave, err := st.AccessControl.Evaluate(ctx, user, evaluator)
|
|
if err != nil {
|
|
st.Logger.Error("Failed to evaluate access control", "error", err)
|
|
return err
|
|
}
|
|
if !canSave {
|
|
st.Logger.Error("user is not allowed to delete alert rules in folder", "folder", folderUID, "user")
|
|
return dashboards.ErrFolderAccessDenied
|
|
}
|
|
|
|
rules, err := st.ListAlertRules(ctx, &ngmodels.ListAlertRulesQuery{
|
|
OrgID: orgID,
|
|
NamespaceUIDs: []string{folderUID},
|
|
})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
uids := make([]string, 0, len(rules))
|
|
for _, tgt := range rules {
|
|
if tgt != nil {
|
|
uids = append(uids, tgt.UID)
|
|
}
|
|
}
|
|
|
|
if err := st.DeleteAlertRulesByUID(ctx, orgID, uids...); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Kind returns the name of the alert rule type of entity.
|
|
func (st DBstore) Kind() string { return entity.StandardKindAlertRule }
|
|
|
|
// GenerateNewAlertRuleUID generates a unique UID for a rule.
|
|
// This is set as a variable so that the tests can override it.
|
|
// The ruleTitle is only used by the mocked functions.
|
|
var GenerateNewAlertRuleUID = func(sess *db.Session, orgID int64, ruleTitle string) (string, error) {
|
|
for i := 0; i < 3; i++ {
|
|
uid := util.GenerateShortUID()
|
|
|
|
exists, err := sess.Where("org_id=? AND uid=?", orgID, uid).Get(&ngmodels.AlertRule{})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
if !exists {
|
|
return uid, nil
|
|
}
|
|
}
|
|
|
|
return "", ngmodels.ErrAlertRuleFailedGenerateUniqueUID
|
|
}
|
|
|
|
// validateAlertRule validates the alert rule including db-level restrictions on field lengths.
|
|
func (st DBstore) validateAlertRule(alertRule ngmodels.AlertRule) error {
|
|
if err := alertRule.ValidateAlertRule(st.Cfg); err != nil {
|
|
return err
|
|
}
|
|
|
|
// enforce max name length.
|
|
if len(alertRule.Title) > AlertRuleMaxTitleLength {
|
|
return fmt.Errorf("%w: name length should not be greater than %d", ngmodels.ErrAlertRuleFailedValidation, AlertRuleMaxTitleLength)
|
|
}
|
|
|
|
// enforce max rule group name length.
|
|
if len(alertRule.RuleGroup) > AlertRuleMaxRuleGroupNameLength {
|
|
return fmt.Errorf("%w: rule group name length should not be greater than %d", ngmodels.ErrAlertRuleFailedValidation, AlertRuleMaxRuleGroupNameLength)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// ListNotificationSettings fetches all notification settings for given organization
|
|
func (st DBstore) ListNotificationSettings(ctx context.Context, q ngmodels.ListNotificationSettingsQuery) (map[ngmodels.AlertRuleKey][]ngmodels.NotificationSettings, error) {
|
|
var rules []ngmodels.AlertRule
|
|
err := st.SQLStore.WithDbSession(ctx, func(sess *db.Session) error {
|
|
query := sess.Table(ngmodels.AlertRule{}).Select("uid, notification_settings").Where("org_id = ?", q.OrgID)
|
|
if q.ReceiverName != "" {
|
|
var err error
|
|
query, err = st.filterByReceiverName(q.ReceiverName, query)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
} else {
|
|
query = query.And("notification_settings IS NOT NULL AND notification_settings <> 'null'")
|
|
}
|
|
return query.Find(&rules)
|
|
})
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
result := make(map[ngmodels.AlertRuleKey][]ngmodels.NotificationSettings, len(rules))
|
|
for _, rule := range rules {
|
|
var ns []ngmodels.NotificationSettings
|
|
if q.ReceiverName != "" { // if filter by receiver name is specified, perform fine filtering on client to avoid false-positives
|
|
for _, setting := range rule.NotificationSettings {
|
|
if q.ReceiverName == setting.Receiver { // currently, there can be only one setting. If in future there are more, we will return all settings of a rule that has a setting with receiver
|
|
ns = rule.NotificationSettings
|
|
break
|
|
}
|
|
}
|
|
} else {
|
|
ns = rule.NotificationSettings
|
|
}
|
|
if len(ns) > 0 {
|
|
key := ngmodels.AlertRuleKey{
|
|
OrgID: q.OrgID,
|
|
UID: rule.UID,
|
|
}
|
|
result[key] = rule.NotificationSettings
|
|
}
|
|
}
|
|
return result, nil
|
|
}
|
|
|
|
func (st DBstore) filterByReceiverName(receiver string, sess *xorm.Session) (*xorm.Session, error) {
|
|
if receiver == "" {
|
|
return sess, nil
|
|
}
|
|
// marshall string according to JSON rules so we follow escaping rules.
|
|
b, err := json.Marshal(receiver)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to marshall receiver name query: %w", err)
|
|
}
|
|
var search = string(b)
|
|
if st.SQLStore.GetDialect().DriverName() != migrator.SQLite {
|
|
// this escapes escaped double quote (\") to \\\"
|
|
search = strings.ReplaceAll(strings.ReplaceAll(search, `\`, `\\`), `"`, `\"`)
|
|
}
|
|
return sess.And(fmt.Sprintf("notification_settings %s ?", st.SQLStore.GetDialect().LikeStr()), "%"+search+"%"), nil
|
|
}
|
|
|
|
func (st DBstore) RenameReceiverInNotificationSettings(ctx context.Context, orgID int64, oldReceiver, newReceiver string) (int, error) {
|
|
// fetch entire rules because Update method requires it because it copies rules to version table
|
|
rules, err := st.ListAlertRules(ctx, &ngmodels.ListAlertRulesQuery{
|
|
OrgID: orgID,
|
|
ReceiverName: oldReceiver,
|
|
})
|
|
if err != nil {
|
|
return 0, err
|
|
}
|
|
if len(rules) == 0 {
|
|
return 0, nil
|
|
}
|
|
var updates []ngmodels.UpdateRule
|
|
for _, rule := range rules {
|
|
r := ngmodels.CopyRule(rule)
|
|
for idx := range r.NotificationSettings {
|
|
if r.NotificationSettings[idx].Receiver == oldReceiver {
|
|
r.NotificationSettings[idx].Receiver = newReceiver
|
|
}
|
|
}
|
|
updates = append(updates, ngmodels.UpdateRule{
|
|
Existing: rule,
|
|
New: *r,
|
|
})
|
|
}
|
|
return len(updates), st.UpdateAlertRules(ctx, updates)
|
|
}
|
|
|
|
func ruleConstraintViolationToErr(rule ngmodels.AlertRule, err error) error {
|
|
msg := err.Error()
|
|
if strings.Contains(msg, "UQE_alert_rule_org_id_namespace_uid_title") || strings.Contains(msg, "alert_rule.org_id, alert_rule.namespace_uid, alert_rule.title") {
|
|
return ngmodels.ErrAlertRuleConflict(rule, ngmodels.ErrAlertRuleUniqueConstraintViolation)
|
|
} else if strings.Contains(msg, "UQE_alert_rule_org_id_uid") || strings.Contains(msg, "alert_rule.org_id, alert_rule.uid") {
|
|
return ngmodels.ErrAlertRuleConflict(rule, errors.New("rule UID under the same organisation should be unique"))
|
|
} else {
|
|
return ngmodels.ErrAlertRuleConflict(rule, err)
|
|
}
|
|
}
|
|
|
|
// GetNamespacesByRuleUID returns a map of rule UIDs to their namespace UID.
|
|
func (st DBstore) GetNamespacesByRuleUID(ctx context.Context, orgID int64, uids ...string) (map[string]string, error) {
|
|
result := make(map[string]string)
|
|
err := st.SQLStore.WithDbSession(ctx, func(sess *db.Session) error {
|
|
var rules []ngmodels.AlertRule
|
|
err := sess.Table(ngmodels.AlertRule{}).Select("uid, namespace_uid").Where("org_id = ?", orgID).In("uid", uids).Find(&rules)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
for _, rule := range rules {
|
|
result[rule.UID] = rule.NamespaceUID
|
|
}
|
|
return nil
|
|
})
|
|
return result, err
|
|
}
|
|
|
|
func getINSubQueryArgs[T any](inputSlice []T) ([]any, []string) {
|
|
args := make([]any, 0, len(inputSlice))
|
|
in := make([]string, 0, len(inputSlice))
|
|
for _, t := range inputSlice {
|
|
args = append(args, t)
|
|
in = append(in, "?")
|
|
}
|
|
|
|
return args, in
|
|
}
|