Go to file
Fabian Reinartz 26b6eac6e1 *: add Procfile for example setup
This add a Procfile that can be run with `goreman start`. It starts
three Alertmanagers and one webhook receiver. The webhook receiver
simply reflects sent messages.
The send_alerts.sh script simulates a set of alerts sent by a Prometheus
server to all Alertmanagers at once.
2016-08-09 12:00:28 +02:00
config config: make Slack channel optional 2016-08-03 08:24:42 +02:00
doc Fix a typo in simple.yml 2016-04-20 22:10:28 -04:00
examples/ha *: add Procfile for example setup 2016-08-09 12:00:28 +02:00
notify notify,main: implement peer based notify backoff 2016-08-09 12:00:28 +02:00
provider main: use mesh providers 2016-08-09 12:00:28 +02:00
template Hide groups if all alerts within are silenced 2016-07-28 13:28:12 +01:00
test main: use mesh providers 2016-08-09 12:00:28 +02:00
types provider/mesh: add silence state 2016-08-09 11:59:35 +02:00
ui Hide groups if all alerts within are silenced 2016-07-28 13:28:12 +01:00
vendor vendor: add weaveworks/mesh 2016-08-09 11:59:35 +02:00
.dockerignore New release process using docker, circleci and a centralized 2016-04-22 21:46:53 +02:00
.gitignore New release process using docker, circleci and a centralized 2016-04-22 21:46:53 +02:00
.promu.yml Support more cross-build platforms 2016-05-15 12:56:47 +02:00
.travis.yml Update Travis Go versions 2016-07-27 11:58:56 -07:00
api.go *: refactor Silence type, use UUID 2016-08-09 11:59:35 +02:00
AUTHORS.md Update Fabian's email address 2016-03-24 17:02:42 +01:00
CHANGELOG.md *: cut 0.3.0 2016-07-07 11:53:47 +02:00
circle.yml Revert "circle: tag pre-release docker images" 2016-07-14 11:40:10 +09:00
CONTRIBUTING.md License cleanup. 2015-01-22 15:45:23 +01:00
dispatch_test.go Move send_resolved parameter to notifier configuration 2015-12-17 13:43:56 +01:00
dispatch.go *: refactor Silence type, use UUID 2016-08-09 11:59:35 +02:00
Dockerfile New release process using docker, circleci and a centralized 2016-04-22 21:46:53 +02:00
inhibit_test.go Fix go vet warnings 2016-06-17 15:10:16 +02:00
inhibit.go inhibit: reduce O(n^2) complexity problem 2016-06-13 18:27:43 +02:00
LICENSE License cleanup. 2015-01-22 15:45:23 +01:00
main.go notify,main: implement peer based notify backoff 2016-08-09 12:00:28 +02:00
Makefile New release process using docker, circleci and a centralized 2016-04-22 21:46:53 +02:00
NOTICE License cleanup. 2015-01-22 15:45:23 +01:00
Procfile *: add Procfile for example setup 2016-08-09 12:00:28 +02:00
README.md readme: update config documentation link 2016-06-14 11:03:49 +02:00
route_test.go Add route tests for receiver inheritance 2016-06-04 10:21:28 +01:00
route.go Move send_resolved parameter to notifier configuration 2015-12-17 13:43:56 +01:00
VERSION *: cut 0.3.0 2016-07-07 11:53:47 +02:00
web.go web: Move /api/-/reload endpoint to /-/reload. 2016-06-12 11:27:21 +02:00

Alertmanager Build Status

CircleCI Docker Repository on Quay Docker Pulls

The Alertmanager handles alerts sent by client applications such as the Prometheus server. It takes care of deduplicating, grouping, and routing them to the correct receiver integration such as email, PagerDuty, or OpsGenie. It also takes care of silencing and inhibition of alerts.

Installation

Build dependencies

These dependencies are necessary for building Alertmanager. There are no runtime dependencies, as the resulting binary is statically linked.

Debian family:

sudo apt-get install build-essential libc6-dev

Red Hat family:

sudo yum install glibc-static

Compiling the binary

The current version has to be run from the repository folder as UI assets and notification templates are not yet statically compiled into the binary.

You can either go get it:

$ GO15VENDOREXPERIMENT=1 go get github.com/prometheus/alertmanager
# cd $GOPATH/src/github.com/prometheus/alertmanager
$ alertmanager -config.file=<your_file>

Or checkout the source code and build manually:

$ mkdir -p $GOPATH/src/github.com/prometheus
$ cd $GOPATH/src/github.com/prometheus
$ git clone https://github.com/prometheus/alertmanager.git
$ cd alertmanager
$ make build
$ ./alertmanager -config.file=<your_file>

Example

This is an example configuration that should cover most relevant aspects of the new YAML configuration format. The full documentation of the configuration can be found here.

global:
  # The smarthost and SMTP sender used for mail notifications.
  smtp_smarthost: 'localhost:25'
  smtp_from: 'alertmanager@example.org'

# The root route on which each incoming alert enters.
route:
  # The root route must not have any matchers as it is the entry point for
  # all alerts. It needs to have a receiver configured so alerts that do not
  # match any of the sub-routes are sent to someone.
  receiver: 'team-X-mails'
  
  # The labels by which incoming alerts are grouped together. For example,
  # multiple alerts coming in for cluster=A and alertname=LatencyHigh would
  # be batched into a single group.
  group_by: ['alertname', 'cluster']

  # When a new group of alerts is created by an incoming alert, wait at
  # least 'group_wait' to send the initial notification.
  # This way ensures that you get multiple alerts for the same group that start
  # firing shortly after another are batched together on the first
  # notification.
  group_wait: 30s

  # When the first notification was sent, wait 'group_interval' to send a batch
  # of new alerts that started firing for that group.
  group_interval: 5m

  # If an alert has successfully been sent, wait 'repeat_interval' to
  # resend them.
  repeat_interval: 3h

  # All the above attributes are inherited by all child routes and can 
  # overwritten on each.

  # The child route trees.
  routes:
  # This routes performs a regular expression match on alert labels to
  # catch alerts that are related to a list of services.
  - match_re:
      service: ^(foo1|foo2|baz)$
    receiver: team-X-mails

    # The service has a sub-route for critical alerts, any alerts
    # that do not match, i.e. severity != critical, fall-back to the
    # parent node and are sent to 'team-X-mails'
    routes:
    - match:
        severity: critical
      receiver: team-X-pager

  - match:
      service: files
    receiver: team-Y-mails

    routes:
    - match:
        severity: critical
      receiver: team-Y-pager

  # This route handles all alerts coming from a database service. If there's
  # no team to handle it, it defaults to the DB team.
  - match:
      service: database

    receiver: team-DB-pager
    # Also group alerts by affected database.
    group_by: [alertname, cluster, database]

    routes:
    - match:
        owner: team-X
      receiver: team-X-pager

    - match:
        owner: team-Y
      receiver: team-Y-pager


# Inhibition rules allow to mute a set of alerts given that another alert is
# firing.
# We use this to mute any warning-level notifications if the same alert is
# already critical.
inhibit_rules:
- source_match:
    severity: 'critical'
  target_match:
    severity: 'warning'
  # Apply inhibition if the alertname is the same.
  equal: ['alertname']


receivers:
- name: 'team-X-mails'
  email_configs:
  - to: 'team-X+alerts@example.org'

- name: 'team-X-pager'
  email_configs:
  - to: 'team-X+alerts-critical@example.org'
  pagerduty_configs:
  - service_key: <team-X-key>

- name: 'team-Y-mails'
  email_configs:
  - to: 'team-Y+alerts@example.org'

- name: 'team-Y-pager'
  pagerduty_configs:
  - service_key: <team-Y-key>

- name: 'team-DB-pager'
  pagerduty_configs:
  - service_key: <team-DB-key>

Testing

If you want to test the new Alertmanager while running the current version, you can mirror traffic to the new one with a simple nginx configuration similar to this:

server {
  server_name <your_current_alertmanager>;
  location / {
    proxy_pass  http://localhost:9093;
    post_action @forward;
  }
  location @forward {
    proxy_pass http://<your_new_alertmanager>:9093;
  }
}

Architecture