Skip to content

Commit

Permalink
[feat] - am analyzer
Browse files Browse the repository at this point in the history
  • Loading branch information
heliapb committed Nov 7, 2024
1 parent c38350b commit f465a78
Show file tree
Hide file tree
Showing 2 changed files with 67 additions and 0 deletions.
3 changes: 3 additions & 0 deletions cmd/analyze.go
Original file line number Diff line number Diff line change
Expand Up @@ -31,6 +31,7 @@ const (
ServiceMonitor AnalyzeKind = "servicemonitor"
Operator AnalyzeKind = "operator"
Prometheus AnalyzeKind = "prometheus"
Alertmanager AnalyzeKind = "alertmanager"
)

type AnalyzeFlags struct {
Expand Down Expand Up @@ -81,6 +82,8 @@ func run(cmd *cobra.Command, _ []string) error {
return analyzers.RunOperatorAnalyzer(cmd.Context(), clientSets, analyzerFlags.Name, analyzerFlags.Namespace)
case Prometheus:
return analyzers.RunPrometheusAnalyzer(cmd.Context(), clientSets, analyzerFlags.Name, analyzerFlags.Namespace)
case Alertmanager:
return analyzers.RunAlertmanagerAnalyzer(cmd.Context(), clientSets, analyzerFlags.Name, analyzerFlags.Namespace)
default:
return fmt.Errorf("kind %s not supported", analyzerFlags.Kind)
}
Expand Down
64 changes: 64 additions & 0 deletions internal/analyzers/alertmanager.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,64 @@
// Copyright 2024 The prometheus-operator Authors
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.

package analyzers

import (
"context"
"fmt"
"log/slog"

"github.com/prometheus-operator/poctl/internal/k8sutil"
"k8s.io/apimachinery/pkg/api/errors"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
)

func RunAlertmanagerAnalyzer(ctx context.Context, clientSets *k8sutil.ClientSets, name, namespace string) error {
alertmanager, err := clientSets.MClient.MonitoringV1().Alertmanagers(namespace).Get(ctx, name, metav1.GetOptions{})
if err != nil {
if errors.IsNotFound(err) {
return fmt.Errorf("alertmanager %s not found in namespace %s", name, namespace)
}
return fmt.Errorf("error while getting Alertmanager: %v", err)
}

_, err = clientSets.KClient.CoreV1().ServiceAccounts(namespace).Get(ctx, alertmanager.Spec.ServiceAccountName, metav1.GetOptions{})
if err != nil {
return fmt.Errorf("failed to list ServiceAcounts: %w", err)
}

if alertmanager.Spec.ConfigSecret != "" {
if err := checkAlertmanagerSecret(ctx, clientSets, alertmanager.Spec.ConfigSecret, namespace); err != nil {
return fmt.Errorf("error checking Alertmanager secret: %w", err)
}
}

slog.Info("Alertmanager is compliant, no issues found", "name", name, "namespace", namespace)
return nil
}

func checkAlertmanagerSecret(ctx context.Context, clientSets *k8sutil.ClientSets, secretName, namespace string) error {
alertmanagerSecret, err := clientSets.KClient.CoreV1().Secrets(namespace).Get(ctx, secretName, metav1.GetOptions{})
if err != nil {
return fmt.Errorf("failed to get alertmanager secret %s %v", secretName, err)
}
if len(alertmanagerSecret.Data) == 0 {
return fmt.Errorf("alertmanager Secret %s is empty", secretName)
}
_, found := alertmanagerSecret.Data["alertmanager.yaml"]
if !found {
return fmt.Errorf("alertmanager.yaml key not found in Secret %s", secretName)
}
return nil
}

0 comments on commit f465a78

Please sign in to comment.