Skip to content

feat: incident.io Notifier #4372

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 2 commits into
base: main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions config/config.go
Original file line number Diff line number Diff line change
Expand Up @@ -1007,6 +1007,7 @@ type Receiver struct {

DiscordConfigs []*DiscordConfig `yaml:"discord_configs,omitempty" json:"discord_configs,omitempty"`
EmailConfigs []*EmailConfig `yaml:"email_configs,omitempty" json:"email_configs,omitempty"`
IncidentioConfigs []*IncidentioConfig `yaml:"incidentio_configs,omitempty" json:"incidentio_configs,omitempty"`
PagerdutyConfigs []*PagerdutyConfig `yaml:"pagerduty_configs,omitempty" json:"pagerduty_configs,omitempty"`
SlackConfigs []*SlackConfig `yaml:"slack_configs,omitempty" json:"slack_configs,omitempty"`
WebhookConfigs []*WebhookConfig `yaml:"webhook_configs,omitempty" json:"webhook_configs,omitempty"`
Expand Down
58 changes: 58 additions & 0 deletions config/notifiers.go
Original file line number Diff line number Diff line change
Expand Up @@ -28,6 +28,13 @@ import (
)

var (
// DefaultIncidentioConfig defines default values for Incident.io configurations.
DefaultIncidentioConfig = IncidentioConfig{
NotifierConfig: NotifierConfig{
VSendResolved: true,
},
}

// DefaultWebhookConfig defines default values for Webhook configurations.
DefaultWebhookConfig = WebhookConfig{
NotifierConfig: NotifierConfig{
Expand Down Expand Up @@ -521,6 +528,57 @@ func (c *SlackConfig) UnmarshalYAML(unmarshal func(interface{}) error) error {
return nil
}

// IncidentioConfig configures notifications via incident.io.
type IncidentioConfig struct {
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What do you think about adding a field Metadata to this struct? Something similar to the Details field in the OpsgenieConfig struct.
This would enable users to define additional data (see incident.io API definition for reference).

NotifierConfig `yaml:",inline" json:",inline"`

HTTPConfig *commoncfg.HTTPClientConfig `yaml:"http_config,omitempty" json:"http_config,omitempty"`

// URL to send POST request to.
URL *URL `yaml:"url" json:"url"`
URLFile string `yaml:"url_file" json:"url_file"`

// AlertSourceToken is the key used to authenticate with the alert source in incident.io.
AlertSourceToken Secret `yaml:"alert_source_token,omitempty" json:"alert_source_token,omitempty"`
AlertSourceTokenFile string `yaml:"alert_source_token_file,omitempty" json:"alert_source_token_file,omitempty"`

// MaxAlerts is the maximum number of alerts to be sent per incident.io message.
// Alerts exceeding this threshold will be truncated. Setting this to 0
// allows an unlimited number of alerts. Note that if the payload exceeds
// incident.io's size limits, you will receive a 429 response and alerts
// will not be ingested.
MaxAlerts uint64 `yaml:"max_alerts" json:"max_alerts"`

// Timeout is the maximum time allowed to invoke incident.io. Setting this to 0
// does not impose a timeout.
Timeout time.Duration `yaml:"timeout" json:"timeout"`
}

// UnmarshalYAML implements the yaml.Unmarshaler interface.
func (c *IncidentioConfig) UnmarshalYAML(unmarshal func(interface{}) error) error {
*c = DefaultIncidentioConfig
type plain IncidentioConfig
if err := unmarshal((*plain)(c)); err != nil {
return err
}
if c.URL == nil && c.URLFile == "" {
return errors.New("one of url or url_file must be configured")
}
if c.URL != nil && c.URLFile != "" {
return errors.New("at most one of url & url_file must be configured")
}
if c.AlertSourceToken != "" && c.AlertSourceTokenFile != "" {
return errors.New("at most one of alert_source_token & alert_source_token_file must be configured")
}
if c.AlertSourceToken == "" && c.AlertSourceTokenFile == "" {
return errors.New("one of alert_source_token or alert_source_token_file must be configured")
}
if c.HTTPConfig != nil && c.HTTPConfig.Authorization != nil && (c.AlertSourceToken != "" || c.AlertSourceTokenFile != "") {
return errors.New("cannot specify both alert_source_token/alert_source_token_file and http_config.authorization")
}
return nil
}

// WebhookConfig configures notifications via a generic webhook.
type WebhookConfig struct {
NotifierConfig `yaml:",inline" json:",inline"`
Expand Down
4 changes: 4 additions & 0 deletions config/receiver/receiver.go
Original file line number Diff line number Diff line change
Expand Up @@ -23,6 +23,7 @@ import (
"github.com/prometheus/alertmanager/notify"
"github.com/prometheus/alertmanager/notify/discord"
"github.com/prometheus/alertmanager/notify/email"
"github.com/prometheus/alertmanager/notify/incidentio"
"github.com/prometheus/alertmanager/notify/jira"
"github.com/prometheus/alertmanager/notify/msteams"
"github.com/prometheus/alertmanager/notify/msteamsv2"
Expand Down Expand Up @@ -106,6 +107,9 @@ func BuildReceiverIntegrations(nc config.Receiver, tmpl *template.Template, logg
for i, c := range nc.JiraConfigs {
add("jira", i, c, func(l *slog.Logger) (notify.Notifier, error) { return jira.New(c, tmpl, l, httpOpts...) })
}
for i, c := range nc.IncidentioConfigs {
add("incidentio", i, c, func(l *slog.Logger) (notify.Notifier, error) { return incidentio.New(c, tmpl, l, httpOpts...) })
}
for i, c := range nc.RocketchatConfigs {
add("rocketchat", i, c, func(l *slog.Logger) (notify.Notifier, error) { return rocketchat.New(c, tmpl, l, httpOpts...) })
}
Expand Down
36 changes: 36 additions & 0 deletions docs/configuration.md
Original file line number Diff line number Diff line change
Expand Up @@ -748,6 +748,8 @@ opsgenie_configs:
[ - <opsgenie_config>, ... ]
pagerduty_configs:
[ - <pagerduty_config>, ... ]
incidentio_configs:
[ - <incidentio_config>, ... ]
pushover_configs:
[ - <pushover_config>, ... ]
rocketchat_configs:
Expand Down Expand Up @@ -1673,6 +1675,40 @@ There is a list of
[integrations](https://prometheus.io/docs/operating/integrations/#alertmanager-webhook-receiver) with
this feature.

### `<incidentio_config>`

incident.io notifications are sent via the [incident.io Alert Sources API](https://incident.io/docs/api/alert-sources).

```yaml
# Whether to notify about resolved alerts.
[ send_resolved: <boolean> | default = true ]

# The HTTP client's configuration.
[ http_config: <http_config> | default = global.http_config ]

# The URL to send the incident.io alert. This would typically be provided by the
# incident.io team when setting up an alert source.
# URL and URL_file are mutually exclusive.
url: <string>
url_file: <filepath>

# The alert source token is used to authenticate with incident.io.
# alert_source_token and alert_source_token_file are mutually exclusive.
[ alert_source_token: <secret> ]
[ alert_source_token_file: <filepath> ]

# The maximum number of alerts to be sent per incident.io message.
# Alerts exceeding this threshold will be truncated. Setting this to 0
# allows an unlimited number of alerts. Note that if the payload exceeds
# incident.io's size limits, you will receive a 429 response and alerts
# will not be ingested.
[ max_alerts: <int> | default = 0 ]

# Timeout is the maximum time allowed to invoke incident.io. Setting this to 0
# does not impose a timeout.
[ timeout: <duration> | default = 0s ]
```

### `<wechat_config>`

WeChat notifications are sent via the [WeChat
Expand Down
205 changes: 205 additions & 0 deletions notify/incidentio/incidentio.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,205 @@
// Copyright 2025 Prometheus Team
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.

package incidentio

import (
"bytes"
"context"
"encoding/json"
"errors"
"fmt"
"io"
"log/slog"
"net/http"
"os"
"strings"

commoncfg "github.com/prometheus/common/config"

"github.com/prometheus/alertmanager/config"
"github.com/prometheus/alertmanager/notify"
"github.com/prometheus/alertmanager/template"
"github.com/prometheus/alertmanager/types"
)

// Notifier implements a Notifier for incident.io.
type Notifier struct {
conf *config.IncidentioConfig
tmpl *template.Template
logger *slog.Logger
client *http.Client
retrier *notify.Retrier
}

// New returns a new incident.io notifier.
func New(conf *config.IncidentioConfig, t *template.Template, l *slog.Logger, httpOpts ...commoncfg.HTTPClientOption) (*Notifier, error) {
// Handle authentication configuration
if conf.HTTPConfig == nil {
conf.HTTPConfig = &commoncfg.HTTPClientConfig{}
}

// Ensure one of AlertSourceToken or AlertSourceTokenFile is provided
if conf.AlertSourceToken == "" && conf.AlertSourceTokenFile == "" {
return nil, errors.New("one of alert_source_token or alert_source_token_file must be configured")
}

// Error if authorization is already set in HTTPConfig
if conf.HTTPConfig.Authorization != nil {
return nil, errors.New("cannot specify both alert_source_token/alert_source_token_file and http_config.authorization")
}

// Set authorization from token or token file
if conf.AlertSourceToken != "" {
conf.HTTPConfig.Authorization = &commoncfg.Authorization{
Type: "Bearer",
Credentials: commoncfg.Secret(conf.AlertSourceToken),
}
} else if conf.AlertSourceTokenFile != "" {
content, err := os.ReadFile(conf.AlertSourceTokenFile)
if err != nil {
return nil, fmt.Errorf("failed to read alert_source_token_file: %w", err)
}

conf.HTTPConfig.Authorization = &commoncfg.Authorization{
Type: "Bearer",
Credentials: commoncfg.Secret(strings.TrimSpace(string(content))),
}
}

client, err := commoncfg.NewClientFromConfig(*conf.HTTPConfig, "incidentio", httpOpts...)
if err != nil {
return nil, err
}

return &Notifier{
conf: conf,
tmpl: t,
logger: l,
client: client,
// Always retry on 429 (rate limiting) and 5xx response codes.
retrier: &notify.Retrier{
RetryCodes: []int{
http.StatusTooManyRequests, // 429
},
CustomDetailsFunc: errDetails,
},
}, nil
}

// Message defines the JSON object sent to incident.io endpoints.
type Message struct {
*template.Data

// The protocol version.
Version string `json:"version"`
GroupKey string `json:"groupKey"`
TruncatedAlerts uint64 `json:"truncatedAlerts"`
}

func truncateAlerts(maxAlerts uint64, alerts []*types.Alert) ([]*types.Alert, uint64) {
if maxAlerts != 0 && uint64(len(alerts)) > maxAlerts {
return alerts[:maxAlerts], uint64(len(alerts)) - maxAlerts
}

return alerts, 0
}

// Notify implements the Notifier interface.
func (n *Notifier) Notify(ctx context.Context, alerts ...*types.Alert) (bool, error) {
alerts, numTruncated := truncateAlerts(n.conf.MaxAlerts, alerts)
data := notify.GetTemplateData(ctx, n.tmpl, alerts, n.logger)

groupKey, err := notify.ExtractGroupKey(ctx)
if err != nil {
return false, err
}

n.logger.Debug("incident.io notification", "groupKey", groupKey)

msg := &Message{
Version: "1",
Data: data,
GroupKey: groupKey.String(),
TruncatedAlerts: numTruncated,
}

var buf bytes.Buffer
if err := json.NewEncoder(&buf).Encode(msg); err != nil {
return false, err
}

var url string
if n.conf.URL != nil {
url = n.conf.URL.String()
} else {
content, err := os.ReadFile(n.conf.URLFile)
if err != nil {
return false, fmt.Errorf("read url_file: %w", err)
}
url = strings.TrimSpace(string(content))
}

if n.conf.Timeout > 0 {
postCtx, cancel := context.WithTimeoutCause(ctx, n.conf.Timeout, fmt.Errorf("configured incident.io timeout reached (%s)", n.conf.Timeout))
defer cancel()
ctx = postCtx
}

resp, err := notify.PostJSON(ctx, n.client, url, &buf)
if err != nil {
if ctx.Err() != nil {
err = fmt.Errorf("%w: %w", err, context.Cause(ctx))
}
return true, notify.RedactURL(err)
}
defer notify.Drain(resp)

shouldRetry, err := n.retrier.Check(resp.StatusCode, resp.Body)
if err != nil {
return shouldRetry, notify.NewErrorWithReason(notify.GetFailureReasonFromStatusCode(resp.StatusCode), err)
}
return shouldRetry, err
}

// errDetails extracts error details from the response for better error messages.
func errDetails(status int, body io.Reader) string {
if body == nil {
return ""
}

// Try to decode the error message from JSON response
var errorResponse struct {
Message string `json:"message"`
Errors []string `json:"errors"`
Error string `json:"error"`
}

if err := json.NewDecoder(body).Decode(&errorResponse); err != nil {
return ""
}

// Format the error message
var parts []string
if errorResponse.Message != "" {
parts = append(parts, errorResponse.Message)
}
if errorResponse.Error != "" {
parts = append(parts, errorResponse.Error)
}
if len(errorResponse.Errors) > 0 {
parts = append(parts, strings.Join(errorResponse.Errors, ", "))
}

return strings.Join(parts, ": ")
}
Loading