Join GitHub today
GitHub is home to over 31 million developers working together to host and review code, manage projects, and build software together.
Sign upBest practice for configuring huge alert rules? #1971
Comments
This comment has been minimized.
This comment has been minimized.
|
I presume there's only a very small number of potential types of alerts users can create, likely less than 10. The way to approach this is to create those 10 alerts, and have the thresholds and notification targets coming from 10 metrics (one per alert type). This unittest should point you in the right direction: https://github.com/prometheus/prometheus/blob/master/promql/testdata/operators.test#L322 |
brian-brazil
added
the
kind/question
label
Sep 9, 2016
This comment has been minimized.
This comment has been minimized.
|
Thanks |
zxwing
closed this
Sep 12, 2016
This comment has been minimized.
This comment has been minimized.
lock
bot
commented
Mar 24, 2019
|
This thread has been automatically locked since there has not been any recent activity after it was closed. Please open a new issue for related bugs. |
lock
bot
locked and limited conversation to collaborators
Mar 24, 2019
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
zxwing commentedSep 9, 2016
My system allows users to create alarms dynamically which are essentially implemented by Prometheus's alert rules. I have two ways to do this:
rule_filesreload the prometheus by
kill -1.Which approach will you recommend for a high concurrent environment with huge rules? for example, 10000 people create 10000 rules concurrently. The #1 may cause a very large file that blows up memory while #2 may lead to a long for...loop.
The DNSMASQ used to have the performance issue in the aforementioned scenario; they fixed it using
inotifywith rules per file after I reported the issue.I know I have #3 that groups rules in files with decent size; I just want to know if prometheus has been designed for this scenario.