Chapter 3. Configuring external Alertmanager instances
The OpenShift Container Platform monitoring stack includes a local Alertmanager instance that routes alerts from Prometheus. You can add external Alertmanager instances to route alerts for core OpenShift Container Platform projects or user-defined projects.
If you add the same external Alertmanager configuration for multiple clusters and disable the local instance for each cluster, you can then manage alert routing for multiple clusters by using a single external Alertmanager instance.
Prerequisites
- If you are configuring core OpenShift Container Platform monitoring components in the - openshift-monitoringproject:- 
							You have access to the cluster as a user with the cluster-admincluster role.
- 
							You have created the cluster-monitoring-configconfig map.
 
- 
							You have access to the cluster as a user with the 
- If you are configuring components that monitor user-defined projects: - 
							You have access to the cluster as a user with the cluster-admincluster role, or as a user with theuser-workload-monitoring-config-editrole in theopenshift-user-workload-monitoringproject.
- A cluster administrator has enabled monitoring for user-defined projects.
 
- 
							You have access to the cluster as a user with the 
- 
					You have installed the OpenShift CLI (oc).
Procedure
- Edit the - ConfigMapobject.- To configure additional Alertmanagers for routing alerts from core OpenShift Container Platform projects: - Edit the - cluster-monitoring-configconfig map in the- openshift-monitoringproject:- oc -n openshift-monitoring edit configmap cluster-monitoring-config - $ oc -n openshift-monitoring edit configmap cluster-monitoring-config- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- 
									Add an additionalAlertmanagerConfigs:section underdata/config.yaml/prometheusK8s.
- Add the configuration details for additional Alertmanagers in this section: - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - For - <alertmanager_specification>, substitute authentication and other configuration details for additional Alertmanager instances. Currently supported authentication methods are bearer token (- bearerToken) and client TLS (- tlsConfig). The following sample config map configures an additional Alertmanager using a bearer token with client TLS authentication:- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
 
- To configure additional Alertmanager instances for routing alerts from user-defined projects: - Edit the - user-workload-monitoring-configconfig map in the- openshift-user-workload-monitoringproject:- oc -n openshift-user-workload-monitoring edit configmap user-workload-monitoring-config - $ oc -n openshift-user-workload-monitoring edit configmap user-workload-monitoring-config- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- 
									Add a <component>/additionalAlertmanagerConfigs:section underdata/config.yaml/.
- Add the configuration details for additional Alertmanagers in this section: - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - For - <component>, substitute one of two supported external Alertmanager components:- prometheusor- thanosRuler.- For - <alertmanager_specification>, substitute authentication and other configuration details for additional Alertmanager instances. Currently supported authentication methods are bearer token (- bearerToken) and client TLS (- tlsConfig). The following sample config map configures an additional Alertmanager using Thanos Ruler with a bearer token and client TLS authentication:- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
 
 
- Save the file to apply the changes. The pods affected by the new configuration are automatically redeployed.