Which Metrics Are Supported By The Enterprise Agent Notifications

Both the GEM alertmanager and the ruler work nearly identically to their Mimir counterparts: the Grafana Mimir ruler, and Grafana Mimir Alertmanager. The only difference between GEM and Mimir is the configuration of the communication between the GEM ruler and GEM alertmanager. Additionally, this difference only applies when you are running GEM with the token-based authentication model.

Context

When the ruler evaluates alerting rules for a tenant, it sends the alertmanager the notifications for every firing alert.

In GEM, the requests between the ruler and the alertmanager must be authenticated and authorized for each tenant. The requests must have basic authentication with the tenant ID and an access token from an access policy, which has the alerts:write scope for that tenant. The ruler has configuration options that allow you to set the basic authentication credentials for communicating with the alertmanager.

The problem is that these credentials can only be configured per ruler, not per tenant. For example, if the configuration uses tenant-A as the tenant ID, then the alerts from all tenants in the ruler are sent to the tenant-A tenant in the alertmanager. This means that alerts will use the alertmanager tenant configuration, such as alert receivers, alert routes, and inhibition rules, of tenant-A.

Refer to more articles:  Which Behavior Does Head-butting In Bighorn Sheep Illustrate

Configure communication between the ruler and the alertmanager with enterprise authentication

The ruler configuration options can take a special value for the basic authentication user. This value allows Alertmanager to detect the tenant from the ruler and use the appropriate Alertmanager tenant configuration for routing the alerts.

  1. Create an access policy with the alerts:write scope to all tenants in the cluster.

    For detailed instructions, see Create an access policy.

  2. Create an access token for that policy.

    Create an access policy also shows you how to create a token for the access policy.

  3. Add the following to your GEM configuration:

    Alternatively, you can set the CLI arguments -ruler.alertmanager-url, -ruler.alertmanager-client.basic-auth-username, and -ruler.alertmanager-client.basic-auth-password:

    1. Replace http://alertmanager with the address of the alertmanager component or components in your GEM cluster.

      The alertmanager URL is already configured by the mimir-distributed Helm chart, so you can omit it from your values file.

    2. Replace <TOKEN> with the token that you created in the previous step.

      You can also inject the token in the configuration via an environment variable. For details, see Use environment variables in the configuration.

  4. (Optional) Configure the tenants in Alertmanager.

    See Tenant configurations.

  5. (Optional) Configure the rules in the ruler.

    See Rules in the mimirtool documentation.

Related Posts

Which Is True About Scientific Inquiry

One thing is common to all forms of science: an ultimate goal “to know.” Curiosity and inquiry are the driving forces for the development of science. Scientists…

Which Zodiac Sign Is The Oldest

Which Zodiac Sign Is The Oldest

The Ancient Greeks — along with other civilizations of the time — widely believed in a now-iconic phrase: “As Above, So Below.” In other words, the Greeks…

Which Of The Following Is A Characteristic Of Beta

What Is Beta? Beta is a measure of a stock’s volatility in relation to the overall market. By definition, the market, such as the S&P 500 Index,…

Which Is Better Graphite Or Fiberglass Pickleball Paddle

Fiberglass vs Graphite Pickleball Paddle The pickleball arena resonates with the constant buzz of energetic gameplay and the clink of paddles. Among the myriad of considerations for…

Which Of The Following Best Describes The Paintbox Era

The Hay Wain, Study Artist: John ConstableYou may be interested Which Time Signature Has Three Quarter Note Beats Per Measure Which Best Describes The Function Of The…

Which Of The Following Is A Transition Element

Which Of The Following Is A Transition Element

Table of Content What are Transition Elements?Electronic Configuration of Transition ElementsGeneral Properties of Transition ElementsAtomic Ionic RadiiIonization EnthalpyFrequently Asked QuestionsYou may be interested Which Initial Purpose Would…