pint
pint is a Prometheus rule linter.
Usage
There are three modes it works in:
- CI PR linting
- Ad-hoc linting of a selected files or directories
- A daemon that continuously checks selected files or directories and expose metrics describing all discovered problems.
Pull Requests
Run it with pint ci
.
It currently supports git for which it will find all commits on the current branch that are not present in the parent branch and scan all modified files included in those changes.
Results can optionally be reported using BitBucket API or GitHub API to generate a report with any found issues. If you are using BitBucket API then each issue will create an inline annotation in BitBucket with a description of the issue. If you are using GitHub API then each issue will appear as a comment on your pull request.
Exit code will be one (1) if any issues were detected with severity Bug
or higher. This permits running pint
in your CI system whilst at the same you will get detailed reports on your source control system.
If any commit on the PR contains [skip ci]
or [no ci]
somewhere in the commit message then pint will skip running all checks.
GitHub Actions
The easiest way of using pint
with GitHub Actions is by using prymitive/pint-action. Here’s an example workflow:
name: pint
on:
push:
branches:
- main
pull_request:
branches:
- main
jobs:
pint:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v3
with:
fetch-depth: 0
- name: Run pint
uses: prymitive/pint-action@v1
with:
token: ${{ github.token }}
# directory containing Prometheus rules
workdir: 'rules'
To customize pint checks create a .pint.hcl
file in the root of your repository. See Configuration for a description of all options.
If your repository contains other files, not only Prometheus rules, then tell pint to only check selected paths when running checks on a pull request:
ci {
include = [ "rules/dev/.*.yml", "rules/prod/.*" ]
}
When pint runs checks after a push to a branch (for example after a merge), then it will pass workdir
option to pint lint
, which means that all files inside rules
directory will be checked.
Ad-hoc
Lint specified files and report any found issue.
You can lint selected files:
pint lint rules.yml
or directories:
pint lint path/to/dir
or both:
pint lint path/to/dir file.yml path/file.yml path/dir
Watch mode
Run pint as a daemon in watch mode:
pint watch rules.yml
By default it will start a HTTP server on port 8080
and run all checks every 10 minutes. This can be customized by passing extra flags to the watch
command. Run pint watch -h
to see all available flags.
Query /metrics
to see all expose metrics, example with default flags:
curl -s http://localhost:8080/metrics
Or setup Prometheus scrape job:
scrape_configs:
- job_name: pint
static_configs:
- targets: ['localhost:8080']
Available metrics:
pint_problem
- exported for every problem detected by pint. To avoid exposing too many metrics at once pass--max-problems
flag to watch command. When this flag is set pint will expose only up to--max-problems
value number ofpint_problem
metrics.pint_problems
- this metric is the total number of all problems detected by pint, including those not exported due to the--max-problems
flag.
pint problem
metric can include owner
label for each rule. This is useful to route alerts based on metrics to the right team. To set a rule owner add a # pint file/owner $owner
comment in a file, to set an owner for all rules in that file. You can also set an owner per rule, by adding # pint rule/owner $owner
comment around given rule.
Example:
# pint file/owner bob
- alert: ...
expr: ...
# pint rule/owner alice
- alert: ...
expr: ...
Here’s an example alert you can use for problems detected by pint:
- alert: Pint Problem Detected
# pint_problem is only present if pint detects any problems
# pint disable promql/series(pint_problem)
expr: |
sum without(instance, problem) (pint_problem) > 0
for: 1h
annotations:
summary: |
{{ with printf "pint_problem{filename='%s', name='%s', reporter='%s'}" .Labels.filename .Labels.name .Labels.reporter | query }}
{{ . | first | label "problem" }}
{{ end }}
docs: "https://cloudflare.github.io/pint/checks/{{ $labels.reporter }}.html"
Release Notes
See changelog for history of changes.
Quick start
Requirements:
Steps:
-
Download a binary from Releases page or build from source:
git clone https://github.com/cloudflare/pint.git cd pint make
-
Run a simple syntax check on Prometheus alerting or recording rules file(s).
./pint lint /etc/prometheus/*.rules.yml
-
Configuration file is optional, but without it pint will only run very basic syntax checks. See configuration for details on config syntax. By default pint will try to load configuration from
.pint.hcl
, you can specify a different path using--config
flag:./pint --config /etc/pint.hcl lint /etc/prometheus/rules/*.yml