mirror of
https://github.com/netdata/netdata.git
synced 2025-05-22 16:37:46 +00:00
add section for regenerate claiming token (#17457)
* add section for regenerate claiming token * missing h * missing If at begh * missing If at n on token * add example of silencing alert instance
This commit is contained in:
parent
bdbf369d6f
commit
f63f41f54d
2 changed files with 21 additions and 9 deletions
|
@ -46,13 +46,14 @@ To manage your **personal alert notification silencing rule settings**, you will
|
|||
|
||||
## Silencing rules examples
|
||||
|
||||
| Rule name | War Rooms | Nodes | Host Label | Alert name | Alert context | Alert role | Description |
|
||||
| :-- | :-- | :-- | :-- | :-- | :-- | :-- | :--|
|
||||
| Rule name | War Rooms | Nodes | Host Label | Alert name | Alert context | Alert instance | Alert role | Description |
|
||||
| :-- | :-- | :-- | :-- | :-- | :-- | :-- | :-- | :--|
|
||||
| Space silencing | All Rooms | * | * | * | * | * | This rule silences the entire space, targets all nodes and for all users. E.g. infrastructure wide maintenance window. |
|
||||
| DB Servers Rooms | PostgreSQL Servers | * | * | * | * | * | This rules silences the nodes in the room named PostgreSQL Servers, for example it doesn't silence the `All Nodes` room. E.g. My team with membership to this room doesn't want to receive notifications for these nodes. |
|
||||
| Node child1 | All Rooms | `child1` | * | * | * | * | This rule silences all alert state transitions for node `child1` on all rooms and for all users. E.g. node could be going under maintenance. |
|
||||
| Production nodes | All Rooms | * | `environment:production` | * | * | * | This rule silences all alert state transitions for nodes with the host label key-value pair `environment:production`. E.g. Maintenance window on nodes with specific host labels. |
|
||||
| Third party maintenance | All Rooms | * | * | `httpcheck_posthog_netdata_cloud.request_status` | * | * | This rule silences this specific alert since third party partner will be undergoing maintenance. |
|
||||
| Intended stress usage on CPU | All Rooms | * | * | * | `system.cpu` | * | This rule silences specific alerts across all nodes and their CPU cores. |
|
||||
| Silence role webmaster | All Rooms | * | * | * | * | `webmaster` | This rule silences all alerts configured with the role `webmaster`. |
|
||||
| Silence alert on node | All Rooms | `child1` | * | `httpcheck_posthog_netdata_cloud.request_status` | * | * | This rule silences the specific alert on the `child1` node. |
|
||||
| DB Servers Rooms | PostgreSQL Servers | * | * | * | * | * | * | This rules silences the nodes in the room named PostgreSQL Servers, for example it doesn't silence the `All Nodes` room. E.g. My team with membership to this room doesn't want to receive notifications for these nodes. |
|
||||
| Node child1 | All Rooms | `child1` | * | * | * | * | * | This rule silences all alert state transitions for node `child1` on all rooms and for all users. E.g. node could be going under maintenance. |
|
||||
| Production nodes | All Rooms | * | `environment:production` | * | * | * | * | This rule silences all alert state transitions for nodes with the host label key-value pair `environment:production`. E.g. Maintenance window on nodes with specific host labels. |
|
||||
| Third party maintenance | All Rooms | * | * | `httpcheck_posthog_netdata_cloud.request_status` | * | * | * | This rule silences this specific alert since third party partner will be undergoing maintenance. |
|
||||
| Intended stress usage on CPU | All Rooms | * | * | * | `system.cpu` | * | * | This rule silences specific alerts across all nodes and their CPU cores. |
|
||||
| Silence role webmaster | All Rooms | * | * | * | * | * | `webmaster` | This rule silences all alerts configured with the role `webmaster`. |
|
||||
| Silence alert on node | All Rooms | `child1` | * | `httpcheck_posthog_netdata_cloud.request_status` | * | * | * | This rule silences the specific alert on the `child1` node. |
|
||||
| Disk Space alerts on mount point | All Rooms | * | * | `disk_space_usage` | `disk.space` | `disk_space_opt_baddisk` | * | This rule silences the specific alert instance on all nodes `/opt/baddisk`. |
|
||||
|
|
|
@ -554,6 +554,17 @@ To remove a node from you Space in Netdata Cloud, and connect it to another Spac
|
|||
If you are using a `docker-compose.yml` file, you will have to overwrite it with the new claiming token.
|
||||
The node should now appear online in that Space.
|
||||
|
||||
### Regenerate Claiming Token
|
||||
|
||||
If in case of some security reason, or other, you need to revoke your previous claiming token and generate a new
|
||||
one you can achieve that from the Netdata Cloud UI.
|
||||
|
||||
On any screen where you see the connect the node to Netdata Cloud command you'll see above it, next to the
|
||||
[updates channel](https://github.com/netdata/netdata/blob/master/docs/netdata-agent/versions-and-platforms.md), a
|
||||
button to **Regenerate token**. This action will invalidate your previous token and generate a fresh new one.
|
||||
|
||||
Only the administrators of a Space in Netdata Cloud can trigger this action.
|
||||
|
||||
## Connecting reference
|
||||
|
||||
In the sections below, you can find reference material for the kickstart script, claiming script, connecting via the Agent's command line
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue