layout | parent | grand_parent |
---|---|---|
default |
Checks |
Documentation |
This check works the same way as alerts/annotation check, but it operates on labels instead. It uses static labels set on alerting or recording rule. It doesn't use labels on time series used in those rules.
Syntax:
label "$pattern" {
severity = "bug|warning|info"
token = "(.*)"
value = "(.*)"
values = ["...", ...]
required = true|false
}
$pattern
- regexp pattern to match label name on, this can be templated to reference checked rule fields, see Configuration for details.severity
- set custom severity for reported issues, defaults to a warning.token
- optional regexp to tokenize label value before validating it. By default the whole label value is validated againstvalue
regexp or thevalues
list. If you want to break the value into sub-strings and validate each of them independently you can do this by settingtoken
to a regexp that captures a single sub-string.value
- optional value regexp to enforce, if not set only pint will only check if the label exists.values
- optional list of allowed values - this is alternative to usingvalue
regexp. Set this to the list of all possible valid label values.required
- iftrue
pint will require every rule to have this label set, iffalse
it will only check values where label is set.
This check is not enabled by default as it requires explicit configuration
to work.
To enable it add one or more rule {...}
blocks and specify all required
labels there.
Example that will require severity
label to be set on alert rules with two
all possible values:
rule {
match {
kind = "alerting"
}
label "severity" {
value = "(warning|critical)"
required = true
}
}
Example that enforces all alerting rules with for
value present and greater
than 5 minutes field to have a label called alert_for
and value equal to
for
field.
{% raw %}
rule {
match {
for = "> 5m"
}
label "alert_for" {
required = true
value = "{{ $for }}"
}
}
{% endraw %}
If you have a label that can contain multiple different values as a single string,
for example components: "db api memcached"
, and you want to ensure only valid values
are included then use token
and values
.
By setting token
to a regexp that matches only a sequence of letters ([a-zA-Z]+
)
you tell pint to split "db api memcached"
into ["db", "api", "memcached"]
.
Then it iterates this list and checks each element independently.
This allows you to have validation for multi-value strings.
{% raw %}
rule {
label "components" {
required = true
token = "[a-zA-Z]+"
values = [
"prometheus",
"db",
"memcached",
"api",
"storage",
]
}
}
{% endraw %}
You can disable this check globally by adding this config block:
checks {
disabled = ["rule/label"]
}
You can also disable it for all rules inside given file by adding a comment anywhere in that file. Example:
# pint file/disable rule/label
Or you can disable it per rule by adding a comment to it. Example:
# pint disable rule/label
If you want to disable only individual instances of this check you can add a more specific comment.
# pint disable rule/label($label:$required)
Where $label
is the label name and $required
is the configure value
of required
option.
groups:
- name: ...
rules:
# pint disable rule/label($pattern:$required)
- record: ...
expr: ...
Example rule:
label "severity" {
value = "(warning|critical)"
required = true
}
Example comment disabling that rule:
# pint disable rule/label(severity:true)
You can disable this check until given time by adding a comment to it. Example:
# pint snooze $TIMESTAMP rule/label
Where $TIMESTAMP
is either use RFC3339
formatted or YYYY-MM-DD
.
Adding this comment will disable rule/label
until $TIMESTAMP
, after that
check will be re-enabled.