Merge pull request #190496 from NukaDuka/kthxbye

Sandro d374d79d cf49501b

Changed files
+331
nixos
doc
manual
from_md
release-notes
release-notes
modules
services
monitoring
tests
pkgs
servers
monitoring
prometheus
top-level
+8
nixos/doc/manual/from_md/release-notes/rl-2211.section.xml
···
</listitem>
<listitem>
<para>
+
<link xlink:href="https://github.com/prymitive/kthxbye">kthxbye</link>,
+
an alert acknowledgement management daemon for Prometheus
+
Alertmanager. Available as
+
<link xlink:href="options.html#opt-services.kthxbye.enable">services.kthxbye</link>
+
</para>
+
</listitem>
+
<listitem>
+
<para>
<link xlink:href="https://github.com/jtroo/kanata">kanata</link>,
a tool to improve keyboard comfort and usability with advanced
customization. Available as
+2
nixos/doc/manual/release-notes/rl-2211.section.md
···
- [infnoise](https://github.com/leetronics/infnoise), a hardware True Random Number Generator dongle.
Available as [services.infnoise](options.html#opt-services.infnoise.enable).
+
- [kthxbye](https://github.com/prymitive/kthxbye), an alert acknowledgement management daemon for Prometheus Alertmanager. Available as [services.kthxbye](options.html#opt-services.kthxbye.enable)
+
- [kanata](https://github.com/jtroo/kanata), a tool to improve keyboard comfort and usability with advanced customization.
Available as [services.kanata](options.html#opt-services.kanata.enable).
+1
nixos/modules/module-list.nix
···
./services/monitoring/heapster.nix
./services/monitoring/incron.nix
./services/monitoring/kapacitor.nix
+
./services/monitoring/kthxbye.nix
./services/monitoring/loki.nix
./services/monitoring/longview.nix
./services/monitoring/mackerel-agent.nix
+166
nixos/modules/services/monitoring/kthxbye.nix
···
+
{ config, pkgs, lib, ... }:
+
with lib;
+
+
let
+
cfg = config.services.kthxbye;
+
in
+
+
{
+
options.services.kthxbye = {
+
enable = mkEnableOption (mdDoc "kthxbye alert acknowledgement management daemon");
+
+
package = mkOption {
+
type = types.package;
+
default = pkgs.kthxbye;
+
defaultText = literalExpression "pkgs.kthxbye";
+
description = mdDoc ''
+
The kthxbye package that should be used.
+
'';
+
};
+
+
openFirewall = mkOption {
+
type = types.bool;
+
default = false;
+
description = mdDoc ''
+
Whether to open ports in the firewall needed for the daemon to function.
+
'';
+
};
+
+
extraOptions = mkOption {
+
type = with types; listOf str;
+
default = [];
+
description = mdDoc ''
+
Extra command line options.
+
+
Documentation can be found [here](https://github.com/prymitive/kthxbye/blob/main/README.md).
+
'';
+
example = literalExpression ''
+
[
+
"-extend-with-prefix 'ACK!'"
+
];
+
'';
+
};
+
+
alertmanager = {
+
timeout = mkOption {
+
type = types.str;
+
default = "1m0s";
+
description = mdDoc ''
+
Alertmanager request timeout duration in the [time.Duration](https://pkg.go.dev/time#ParseDuration) format.
+
'';
+
example = "30s";
+
};
+
uri = mkOption {
+
type = types.str;
+
default = "http://localhost:9093";
+
description = mdDoc ''
+
Alertmanager URI to use.
+
'';
+
example = "https://alertmanager.example.com";
+
};
+
};
+
+
extendBy = mkOption {
+
type = types.str;
+
default = "15m0s";
+
description = mdDoc ''
+
Extend silences by adding DURATION seconds.
+
+
DURATION should be provided in the [time.Duration](https://pkg.go.dev/time#ParseDuration) format.
+
'';
+
example = "6h0m0s";
+
};
+
+
extendIfExpiringIn = mkOption {
+
type = types.str;
+
default = "5m0s";
+
description = mdDoc ''
+
Extend silences that are about to expire in the next DURATION seconds.
+
+
DURATION should be provided in the [time.Duration](https://pkg.go.dev/time#ParseDuration) format.
+
'';
+
example = "1m0s";
+
};
+
+
extendWithPrefix = mkOption {
+
type = types.str;
+
default = "ACK!";
+
description = mdDoc ''
+
Extend silences with comment starting with PREFIX string.
+
'';
+
example = "!perma-silence";
+
};
+
+
interval = mkOption {
+
type = types.str;
+
default = "45s";
+
description = mdDoc ''
+
Silence check interval duration in the [time.Duration](https://pkg.go.dev/time#ParseDuration) format.
+
'';
+
example = "30s";
+
};
+
+
listenAddress = mkOption {
+
type = types.str;
+
default = "0.0.0.0";
+
description = mdDoc ''
+
The address to listen on for HTTP requests.
+
'';
+
example = "127.0.0.1";
+
};
+
+
port = mkOption {
+
type = types.port;
+
default = 8080;
+
description = mdDoc ''
+
The port to listen on for HTTP requests.
+
'';
+
};
+
+
logJSON = mkOption {
+
type = types.bool;
+
default = false;
+
description = mdDoc ''
+
Format logged messages as JSON.
+
'';
+
};
+
+
maxDuration = mkOption {
+
type = with types; nullOr str;
+
default = null;
+
description = mdDoc ''
+
Maximum duration of a silence, it won't be extended anymore after reaching it.
+
+
Duration should be provided in the [time.Duration](https://pkg.go.dev/time#ParseDuration) format.
+
'';
+
example = "30d";
+
};
+
};
+
+
config = mkIf cfg.enable {
+
systemd.services.kthxbye = {
+
description = "kthxbye Alertmanager ack management daemon";
+
wantedBy = [ "multi-user.target" ];
+
script = ''
+
${cfg.package}/bin/kthxbye \
+
-alertmanager.timeout ${cfg.alertmanager.timeout} \
+
-alertmanager.uri ${cfg.alertmanager.uri} \
+
-extend-by ${cfg.extendBy} \
+
-extend-if-expiring-in ${cfg.extendIfExpiringIn} \
+
-extend-with-prefix ${cfg.extendWithPrefix} \
+
-interval ${cfg.interval} \
+
-listen ${cfg.listenAddress}:${toString cfg.port} \
+
${optionalString cfg.logJSON "-log-json"} \
+
${optionalString (cfg.maxDuration != null) "-max-duration ${cfg.maxDuration}"} \
+
${concatStringsSep " " cfg.extraOptions}
+
'';
+
serviceConfig = {
+
Type = "simple";
+
DynamicUser = true;
+
Restart = "on-failure";
+
};
+
};
+
+
networking.firewall.allowedTCPPorts = mkIf cfg.openFirewall [ cfg.port ];
+
};
+
}
+1
nixos/tests/all-tests.nix
···
komga = handleTest ./komga.nix {};
krb5 = discoverTests (import ./krb5 {});
ksm = handleTest ./ksm.nix {};
+
kthxbye = handleTest ./kthxbye.nix {};
kubernetes = handleTestOn ["x86_64-linux"] ./kubernetes {};
languagetool = handleTest ./languagetool.nix {};
latestKernel.login = handleTest ./login.nix { latestKernel = true; };
+110
nixos/tests/kthxbye.nix
···
+
import ./make-test-python.nix ({ lib, pkgs, ... }:
+
{
+
name = "kthxbye";
+
+
meta = with lib.maintainers; {
+
maintainers = [ nukaduka ];
+
};
+
+
nodes.server = { ... }: {
+
environment.systemPackages = with pkgs; [ prometheus-alertmanager ];
+
services.prometheus = {
+
enable = true;
+
+
globalConfig = {
+
scrape_interval = "5s";
+
scrape_timeout = "5s";
+
evaluation_interval = "5s";
+
};
+
+
scrapeConfigs = [
+
{
+
job_name = "prometheus";
+
scrape_interval = "5s";
+
static_configs = [
+
{
+
targets = [ "localhost:9090" ];
+
}
+
];
+
}
+
];
+
+
rules = [
+
''
+
groups:
+
- name: test
+
rules:
+
- alert: node_up
+
expr: up != 0
+
for: 5s
+
labels:
+
severity: bottom of the barrel
+
annotations:
+
summary: node is fine
+
''
+
];
+
+
alertmanagers = [
+
{
+
static_configs = [
+
{
+
targets = [
+
"localhost:9093"
+
];
+
}
+
];
+
}
+
];
+
+
alertmanager = {
+
enable = true;
+
openFirewall = true;
+
configuration.route = {
+
receiver = "test";
+
group_wait = "5s";
+
group_interval = "5s";
+
group_by = [ "..." ];
+
};
+
configuration.receivers = [
+
{
+
name = "test";
+
webhook_configs = [
+
{
+
url = "http://localhost:1234";
+
}
+
];
+
}
+
];
+
};
+
};
+
+
services.kthxbye = {
+
enable = true;
+
openFirewall = true;
+
extendIfExpiringIn = "30s";
+
logJSON = true;
+
maxDuration = "15m";
+
interval = "5s";
+
};
+
};
+
+
testScript = ''
+
with subtest("start the server"):
+
start_all()
+
server.wait_for_unit("prometheus.service")
+
server.wait_for_unit("alertmanager.service")
+
server.wait_for_unit("kthxbye.service")
+
+
server.sleep(2) # wait for units to settle
+
server.systemctl("restart kthxbye.service") # make sure kthxbye comes up after alertmanager
+
server.sleep(2)
+
+
with subtest("set up test silence which expires in 20s"):
+
server.succeed('amtool --alertmanager.url "http://localhost:9093" silence add alertname="node_up" -a "nixosTest" -d "20s" -c "ACK! this server is fine!!"')
+
+
with subtest("wait for 21 seconds and check if the silence is still active"):
+
server.sleep(21)
+
server.systemctl("status kthxbye.service")
+
server.succeed("amtool --alertmanager.url 'http://localhost:9093' silence | grep 'ACK'")
+
'';
+
})
+39
pkgs/servers/monitoring/prometheus/kthxbye.nix
···
+
{ pkgs
+
, lib
+
, buildGoModule
+
, fetchFromGitHub
+
, nixosTests
+
}:
+
+
buildGoModule rec {
+
pname = "kthxbye";
+
version = "0.15";
+
+
src = fetchFromGitHub rec {
+
owner = "prymitive";
+
repo = "kthxbye";
+
rev = "v${version}";
+
hash = "sha256-N1MzutjzLk9MnE1b7dKRsiS7LL4Nb61+NpmjTBPGohI=";
+
};
+
+
vendorHash = "sha256-PtINxblqX/wxJyN42mS+hmwMy0lCd6FcQgmBnxTUdcc=";
+
+
buildPhase = ''
+
make -j$NIX_BUILD_CORES
+
'';
+
+
installPhase = ''
+
install -Dm755 ./kthxbye -t $out/bin
+
'';
+
+
passthru.tests = {
+
kthxbye = nixosTests.kthxbye;
+
};
+
+
meta = with lib; {
+
description = "Prometheus Alertmanager alert acknowledgement management daemon";
+
homepage = "https://github.com/prymitive/kthxbye";
+
license = licenses.asl20;
+
maintainers = with maintainers; [ nukaduka ];
+
};
+
}
+4
pkgs/top-level/all-packages.nix
···
pinniped = callPackage ../applications/networking/cluster/pinniped { };
+
kthxbye = callPackage ../servers/monitoring/prometheus/kthxbye.nix {
+
buildGoModule = buildGo119Module;
+
};
+
pgo-client = callPackage ../applications/networking/cluster/pgo-client { };
popeye = callPackage ../applications/networking/cluster/popeye { };