File size: 27,512 Bytes
1e92f2d |
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 |
# Getting Started
This guide will walk through configuring GoAlert for general production use cases.
Most options in GoAlert are configured through the UI in the Admin page. In this guide, when configuring external services,
those options will be referenced in the format: `<Section.Option Name>` where `Section` is the section/header within the admin page and
`Option Name` refers to the label of the individual option being referenced.
The only hard requirement for GoAlert is a running Postgres instance/database.
### Running Behind a Proxy
When running GoAlert behind a reverse proxy, make sure the `--public-url` includes the prefix path, if applicable. Ensure the proxy does _not_ trim the prefix before passing the request to GoAlert; it will be handled internally.
## Database
We recommend using Postgres 13 (or newer) for new installations as newer features will be used in the future.
GoAlert requires the `pgcrypto` extension enabled (you can enable it with `CREATE EXTENSION pgcrypto;`).
Upon first startup, it will attempt to enable the extension if it's not already enabled, but this requires elevated privileges that may not be available
in your setup.
Note: If you are using default install of Postgres on Debian (maybe others) you may run into an issue where the OOM (out of memory) killer terminates the supervisor process. More information along with steps to resolve can be found [here](https://www.postgresql.org/docs/current/kernel-resources.html#LINUX-MEMORY-OVERCOMMIT).
### Switchover
GoAlert natively supports database switchover functionality, allowing you to switch between databases with minimal disruption. This can be especially useful for maintenance, migration, or certain disaster recovery scenarios (it does require both old and new DB to be usable).
To perform a database switchover, GoAlert offers an easy-to-follow, step-by-step guide that you can find in the [Switchover Guide](./switchover.md). We strongly recommend reviewing this guide to understand the best practices and the sequence of steps involved.
Further information about the theory of operation and implementation is available in the [`swo` package README](../swo/README.md).
### Encryption of Sensitive Data
It is also recommended to set the `--data-encryption-key` which is used to encrypt sensitive information (like API keys) before transmitting to the database.
It can be set to any value as it is internally passed through a key derivation function. All instances of GoAlert must be configured to use the same key for things to work properly.
## Running GoAlert
To run GoAlert, you can start the binary directly, or from a container image. You will need to specify the `--db-url`, `--public-url`, and `--data-encryption-key` you plan to use.
The following examples use `postgres://goalert@localhost/goalert` and `super-awesome-secret-key` respectively.
More information on Postgres connection strings can be found [here](https://www.postgresql.org/docs/current/libpq-connect.html#LIBPQ-CONNSTRING).
Binary:
```bash
goalert --db-url postgres://goalert@localhost/goalert --data-encryption-key super-awesome-secret-key --public-url https://goalert.example.com
```
Container:
```bash
docker run -p 8081:8081 -e GOALERT_DB_URL=postgres://goalert@localhost/goalert -e GOALERT_DATA_ENCRYPTION_KEY=super-awesome-secret-key -e GOALERT_PUBLIC_URL=https://goalert.example.com goalert/goalert
```
You should see migrations applied followed by a `Listening.` message and an engine cycle start and end.
### API Only Mode
When running multiple instances of GoAlert (e.g. in a kubernetes cluster) it is recommended to run a single instance in the default mode, and the rest with the `--api-only` flag set.
While it is safe to run multiple "engine" instances simultaneously, it is generally unnecessary and can cause unwanted contention. It is useful, however, to run an "engine" instance
in separate geographic regions or availability zones. If messages fail to send from one (e.g. network outage), they may be retried in the other this way.
## First Time Login
In order to log in to GoAlert initially you will need an admin user to start with. Afterwards you may enable other authentication methods through the UI, as well as disable basic (user/pass) login.
This can be done after GoAlert has started for the first time, and is safe to execute while GoAlert is running.
To do this, you may use the `add-user` subcommand:
```bash
$ goalert add-user -h
Adds a user for basic authentication.
Usage:
goalert add-user [flags]
Flags:
--admin If specified, the user will be created with the admin role (ignored if user-id is provided).
--email string Specifies the email address of the new user (ignored if user-id is provided).
-h, --help help for add-user
--pass string Specify new users password (if blank, prompt will be given).
--user string Specifies the login username.
--user-id string If specified, the auth entry will be created for an existing user ID. Default is to create a new user.
Global Flags:
--data-encryption-key string Encryption key for sensitive data like signing keys. Used for encrypting new and decrypting existing data.
--data-encryption-key-old string Fallback key. Used for decrypting existing data only.
--db-url string Connection string for Postgres.
--db-url-next string Connection string for the *next* Postgres server (enables DB switchover mode).
--json Log in JSON format.
--stack-traces Enables stack traces with all error logs.
-v, --verbose Enable verbose logging.
```
Be sure to specify the `--admin` flag, as well as `--db-url` you plan to use.
Example usage:
```bash
goalert add-user --db-url $GOALERT_DB_URL --admin --user admin --email admin@example.com
# Prompt will be given for password
```
## Configuration
Upon logging in to GoAlert as an admin, you should see a link to the **Admin** page on the left nav-bar. The primary page in this section is Config and allows configuration of various providers and options.
### GitHub Authentication
GoAlert supports GitHub's OAuth as an authentication method with the optional ability to limit logins to specified users, organizations or teams.
Follow [GitHub's documentation on creating an OAuth App](https://developer.github.com/apps/building-oauth-apps/creating-an-oauth-app/).
Using following as examples for required fields:
| Field | Example Value |
| -------------------------- | ---------------------------------------------------------------- |
| Application name | `GoAlert` |
| Homepage URL | `<GOALERT_PUBLIC_URL>` |
| Authorization callback URL | `<GOALERT_PUBLIC_URL>/api/v2/identity/providers/github/callback` |
Document **Client ID** and **Client Secret** after creation and input into appropriate fields in GoAlert's Admin page.
Be sure to **Enable** GitHub authentication and **New Users** using the toggles and fill out **Allowed Users** or **Allowed Orgs** appropriately to restrict access.
Note: If you are limiting logins to an org or team, users will need to manually click on "Grant" access for the required org on first login (before authorizing).
### OpenID Connect Authentication (OIDC)
GoAlert supports [OpenID Connect](https://openid.net/connect/) as an authentication method.
You should be able to use any OIDC-compliant system as an authentication provider, but we'll use [Google Identity Platform using OAuth 2.0](https://developers.google.com/identity/protocols/OpenIDConnect) as an example following the **Setting up OAuth 2.0** instructions.
When creating the **user consent screen**, use the following as examples for required fields:
| Field | Example Value |
| ------------------------------- | ---------------------- |
| Application name | `GoAlert` |
| Authorized domains | `<GOALERT_PUBLIC_URL>` |
| Application Homepage link | `<GOALERT_PUBLIC_URL>` |
| Application Privacy Policy link | `<GOALERT_PUBLIC_URL>` |
When creating the **OAuth client ID**, use the following as examples for required fields:
| Field | Example Value |
| ----------------------------- | -------------------------------------------------------------- |
| Application type | `Web application` |
| Name | `GoAlert` |
| Authorized JavaScript origins | `<GOALERT_PUBLIC_URL>` |
| Authorized redirect URIs | `<GOALERT_PUBLIC_URL>/api/v2/identity/providers/oidc/callback` |
Document **Client ID** and **Client Secret** after creation and input into appropriate fields in GoAlert's Admin page under the **OIDC** section.
Be sure to **Enable** OIDC authentication and **New Users** using the toggles.
- Set `Override Name` to `Google` (not required).
- Set `Issuer URL` to `https://accounts.google.com`
**Note:** An application like [Dex](https://dexidp.io/) can be used to integrate with many other auth systems and provide an OIDC method for GoAlert.
### Mailgun
GoAlert supports creating alerts by email via Mailgun integration.
From the Admin page in GoAlert, under the `Mailgun` section, set your **Email Domain** and **API Key**.
The **API Key** may be found under the **Security** section in the Mailgun website (click your name in the top bar and select it from the drop down) it is labeled as **Private API Key**.
To configure Mailgun to forward to GoAlert:
1. Go to **Receiving**
1. Click **Create Route**
1. Set **Expression Type** to `Match Recipient`
1. Set **Recipient** to `.*@<Mailgun.Email Domain>`
1. Check **Forward**
1. In the forward box, enter `<GOALERT_PUBLIC_URL>/api/v2/mailgun/incoming`
1. Click **Create Route**
### Email/SMTP
GoAlert supports creating alerts from emails received directly as a SMTP server (as an alternative to using Mailgun).
You'll need to create an MX-type DNS record for your GoAlert server.
Note: This SMTP server only handles incoming messages/generating alerts; it will not send outgoing mail. For notifying users via email, you can configure an external SMTP server integration in the admin UI.
To enable the built-in SMTP ingress, pass the `--smtp-listen` and/or `--smtp-listen-tls` flag with the address to listen on, e.g. `--smtp-listen=0.0.0.0:9025`. You may use both flags with different ports. You must also provide a domain name with `--email-integration-domain`, to be used for generating the alert-creating email addresses.
If you use the TLS variant, you must also pass the TLS cert and key. To do so, use either `--smtp-tls-cert-file` and `--smtp-tls-key-file` (with paths to the cert and key files) or `--smtp-tls-cert-data` and `--smtp-tls-key-data` to pass the cert and key data directly as strings. The cert and key must be PEM-encoded.
By default, only the `--email-integration-domain` will be allowed for the TO address on incoming emails. To allow other domains, you can pass a comma-separated list of domains to `--smtp-additional-domains`, e.g. `--smtp-allowed-domains="example.com,foo.io"`. Messages addressed to domains not matching the given list will be rejected.
### Slack
GoAlert supports generating a notification to a Slack channel as part of the Escalation Policy.
For the time being you will need to create your own Slack app in your workspace for GoAlert to interface with.
To configure Slack, first [create a workspace](https://slack.com/create#email) or log in to an existing one.
1. Open the **Slack** section of the GoAlert Admin page
2. Click `App Manifest`
3. Click `Create New App`
4. Follow the prompts to install the app in your workspace
You may now configure the **Slack** section of the GoAlert Admin page.
- You may find your **Access Token** under **OAuth & Permissions** -- it is the **Bot User OAuth Access Token**
- **Client ID**, **Client Secret**, and **Signing Secret** are found under **Basic Information** in the **App Credentials** section.
Be sure to **Enable** Slack using the toggle.
You must invite the new app (e.g. GoAlert) by typing `/invite @GoAlert` in the desired Slack channel(s).
To have `Interactive Messages` work, you will need to link Slack and GoAlert users using a tool like `goalert-slack-email-sync` in this repo. This will be made easier (e.g., user-initiated) in the future.
### Twilio
GoAlert relies on bidirectional communication (outbound & inbound) with certain third-party services in order to provide convenient alerting capabilities.
For voice and SMS notifications to function, you will need a notification provider configured. Currently the only supported provider is Twilio.
Get started with a [free trial account](https://www.twilio.com/try-twilio) in order to configure GoAlert.
[Twilio's Free Trial Guide](https://support.twilio.com/hc/en-us/articles/223136107-How-does-Twilio-s-Free-Trial-work-) details the account setup instructions and limitations.
After your trial account is created, click on **Get a Trial Number** from the Twilio Dashboard.
Configure GoAlert to use your trial account by copying & pasting the following fields into the respective GoAlert fields (on the **Admin** page):
In the **Twilio** section of the Admin page:
| Twilio Dashboard | GoAlert Admin Page |
| ---------------- | ------------------ |
| TRIAL NUMBER | From Number |
| ACCOUNT SID | Account SID |
| AUTH TOKEN | Auth Token |
Be sure to **Enable** Twilio using the toggle.
In order for incoming SMS messages to be processed, the message callback URL must be set within Twilio.
From Twilio Dashboard, navigate to **Phone Numbers** and click on your trial phone number.
- Under **Messaging** section, update the webhook URL for _A MESSAGE COMES IN_ to `<GOALERT_PUBLIC_URL>/api/v2/twilio/message`
Twilio trial account limitations (if you decide to upgrade your Twilio account these go away):
- SMS: The message "Sent from your Twilio trial account" is prepended to all SMS messages
- Voice: "You have a trial account..." verbal message before GoAlert message.
### CLI Flags
Additional options are available for running GoAlert in the form of CLI flags. Their corresponding environment variable names are listed as well.
| Flag | Environment Variable | Description |
| ---------------------------- | ---------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| **`--db-url`** | `GOALERT_DB_URL` | Connection string for Postgres. |
| **`--db-url-next`** | `GOALERT_DB_URL_NEXT` | Connection string for the _next_ Postgres server (enables DB switchover mode). |
| **`--public-url`** | `GOALERT_PUBLIC_URL` | Externally routable URL to the application. Used for validating callback requests, links, auth, and prefix calculation. |
| `--data-encryption-key` | `GOALERT_DATA_ENCRYPTION_KEY` | Used to generate an encryption key for sensitive data like signing keys. Can be any length. only use this when performing a switchover. |
| `--data-encryption-key-old` | `GOALERT_DATA_ENCRYPTION_KEY_OLD` | Fallback key. Used for decrypting existing data only. only necessary when changing --data-encryption-key. |
| `--api-only` | `GOALERT_API_ONLY` | Starts in API-only mode (schedules & notifications will not be processed). Useful in clusters. |
| `--db-max-idle` | `GOALERT_DB_MAX_IDLE` | Max idle DB connections. (default 5) |
| `--db-max-open` | `GOALERT_DB_MAX_OPEN` | Max open DB connections. (default 15) |
| `--disable-https-redirect` | `GOALERT_DISABLE_HTTPS_REDIRECT` | Disable automatic HTTPS redirects. |
| `--enable-secure-headers` | `GOALERT_ENABLE_SECURE_HEADERS` | Enable secure headers (X-Frame-Options, X-Content-Type-Options, X-XSS-Protection, Content-Security-Policy). |
| `--email-integration-domain` | `GOALERT_EMAIL_INTEGRATION_DOMAIN` | This flag is required to set the domain used for email integration keys when --smtp-listen or --smtp-listen-tls are set. |
| `--engine-cycle-time` | `GOALERT_ENGINE_CYCLE_TIME` | Time between engine cycles. (default 5s) |
| `--experimental` | `GOALERT_EXPERIMENTAL` | Enable experimental features. |
| `--github-base-url` | `GOALERT_GITHUB_BASE_URL` | Base URL for GitHub auth and API calls. |
| `--help` | - | Help about any command |
| `--json` | `GOALERT_JSON` | Log in JSON format. |
| `--list-experimental` | `GOALERT_LIST_EXPERIMENTAL` | List experimental features. |
| `--listen` | `GOALERT_LISTEN` | Listen address:port for the application. (default "localhost:8081") |
| `--listen-prometheus` | `GOALERT_LISTEN_PROMETHEUS` | Bind address for Prometheus metrics. |
| `--listen-sysapi` | `GOALERT_LISTEN_SYSAPI` | (Experimental) Listen address:port for the system API (gRPC). |
| `--listen-tls` | `GOALERT_LISTEN_TLS` | HTTPS listen address:port for the application. Requires setting --tls-cert-data and --tls-key-data OR --tls-cert-file and --tls-key-file. |
| `--log-engine-cycles` | `GOALERT_LOG_ENGINE_CYCLES` | Log start and end of each engine cycle. |
| `--log-errors-only` | `GOALERT_LOG_ERRORS_ONLY` | Only log errors (superseeds other flags). |
| `--log-requests` | `GOALERT_LOG_REQUESTS` | Log all HTTP requests. If false, requests will be logged for debug/trace contexts only. |
| `--max-request-body-bytes` | `GOALERT_MAX_REQUEST_BODY_BYTES` | Max body size for all incoming requests (in bytes). Set to 0 to disable limit. (default 262144) |
| `--max-request-header-bytes` | `GOALERT_MAX_REQUEST_HEADER_BYTES` | Max header size for all incoming requests (in bytes). Set to 0 to disable limit. (default 4096) |
| `--region-name` | `GOALERT_REGION_NAME` | Name of region for message processing (case sensitive). Only one instance per-region-name will process outgoing messages. (default "default") |
| `--slack-base-url` | `GOALERT_SLACK_BASE_URL` | Override the Slack base URL. |
| `--smtp-additional-domains` | `GOALERT_SMTP_ADDITIONAL_DOMAINS` | Specifies additional destination domains that are allowed for the SMTP server. For multiple domains, separate them with a comma, e.g., "domain1.com,domain2.org,domain3.net". |
| `--smtp-listen` | `GOALERT_SMTP_LISTEN` | Listen address:port for an internal SMTP server. |
| `--smtp-listen-tls` | `GOALERT_SMTP_LISTEN_TLS` | SMTPS listen address:port for an internal SMTP server. Requires setting --smtp-tls-cert-data and --smtp-tls-key-data OR --smtp-tls-cert-file and --smtp-tls-key-file. |
| `--smtp-max-recipients` | `GOALERT_SMTP_MAX_RECIPIENTS` | Specifies the maximum number of recipients allowed per message. (default 1) |
| `--smtp-tls-cert-data` | `GOALERT_SMTP_TLS_CERT_DATA` | Specifies a PEM-encoded certificate. Has no effect if --smtp-listen-tls is unset. |
| `--smtp-tls-cert-file` | `GOALERT_SMTP_TLS_CERT_FILE` | Specifies a path to a PEM-encoded certificate. Has no effect if --smtp-listen-tls is unset. |
| `--smtp-tls-key-data` | `GOALERT_SMTP_TLS_KEY_DATA` | Specifies a PEM-encoded private key. Has no effect if --smtp-listen-tls is unset. |
| `--smtp-tls-key-file` | `GOALERT_SMTP_TLS_KEY_FILE` | Specifies a path to a PEM-encoded private key file. Has no effect if --smtp-listen-tls is unset. |
| `--stack-traces` | `GOALERT_STACK_TRACES` | Enables stack traces with all error logs. |
| `--status-addr` | `GOALERT_STATUS_ADDR` | Open a port to emit status updates. Connections are closed when the server shuts down. Can be used to keep containers running until GoAlert has exited. |
| `--strict-experimental` | `GOALERT_STRICT_EXPERIMENTAL` | Fail to start if unknown experimental features are specified. |
| `--stub-notifiers` | `GOALERT_STUB_NOTIFIERS` | If true, notification senders will be replaced with a stub notifier that always succeeds (useful for staging/sandbox environments). |
| `--sysapi-ca-file` | `GOALERT_SYSAPI_CA_FILE` | (Experimental) Specifies a path to a PEM-encoded certificate(s) to authorize connections from plugin services. |
| `--sysapi-cert-file` | `GOALERT_SYSAPI_CERT_FILE` | (Experimental) Specifies a path to a PEM-encoded certificate to use when connecting to plugin services. |
| `--sysapi-key-file` | `GOALERT_SYSAPI_KEY_FILE` | (Experimental) Specifies a path to a PEM-encoded private key file use when connecting to plugin services. |
| `--tls-cert-data` | `GOALERT_TLS_CERT_DATA` | Specifies a PEM-encoded certificate. Has no effect if --listen-tls is unset. |
| `--tls-cert-file` | `GOALERT_TLS_CERT_FILE` | Specifies a path to a PEM-encoded certificate. Has no effect if --listen-tls is unset. |
| `--tls-key-data` | `GOALERT_TLS_KEY_DATA` | Specifies a PEM-encoded private key. Has no effect if --listen-tls is unset. |
| `--tls-key-file` | `GOALERT_TLS_KEY_FILE` | Specifies a path to a PEM-encoded private key file. Has no effect if --listen-tls is unset. |
| `--twilio-base-url` | `GOALERT_TWILIO_BASE_URL` | Override the Twilio API URL. |
| `--ui-dir` | `GOALERT_UI_DIR` | Serve UI assets from a local directory instead of from memory. |
| `--verbose`, `-v` | `GOALERT_VERBOSE` | Enable verbose logging. |
|