Get notified of upcoming product changes, critical vulnerability notifications and patches and more.
Sign inMinimalist Wolfi-based image for Prometheus Alertmanager. Handles alerts sent by client applications such as the Prometheus server. It takes care of deduplicating, grouping, and routing to the correct receiver.
The image is available on cgr.dev
:
For full instructions on prometheus-alertmanager, refer to the official documentation. The GitHub repository can also be found here.
The upstream docker image, overrides some of the default values for alertmanager, for example, see here. We replicate the same behaviour in the chainguard image to provide parity with the upstream image.
To deploy via helm, please refer to the upstream helm charts documentation for comprehensive instructions, which includes supported parameters.
Below is an example of how to use the helm chart, overriding the image with the chainguard image:
The upstream helm chart
provides some default config:
values, but if you intend to deploy with
additional configuration, i.e defining routes and receivers, you'll need to
create your own custom values.yaml and pass this into the chart at deployment.
Before running the container, you'll need to create a configuration file. This contains all the necessary configurations for Alertmanager, such as alerting routes, receivers, and integrations.
Refer to the official documentation for more information. Below is a simple example:
In order to ensure the 'nonroot' container user can access the file when volume mounted (below step), ensure you've set read-only permissions:
IMPORTANT: Prometheus looks for a file mounted as 'alertmanager.yml' (i.e not .yaml).
Verify that Alertmanager is running correctly by accessing http://localhost:9093 on your browser.
Chainguard Images contain software packages that are direct or transitive dependencies. The following licenses were found in the "latest" version of this image:
Apache-2.0
LGPL-2.1-or-later
MIT
MPL-2.0
For a complete list of licenses, please refer to this Image's SBOM.
Software license agreementThis is a FIPS validated image for FedRAMP compliance.
This image is STIG hardened and scanned against the DISA General Purpose Operating System SRG with reports available.
Learn more about STIGsGet started with STIGsProducts
Chainguard Images© 2024 Chainguard, Inc.