Integrating SinksΒΆ

Robusta can send notifications to various destinations, called sinks. These are general settings for all sinks, please take a look at the specific sink guide for detailed instructions.

For a list of all sinks, refer to Sinks Reference.

Defining SinksΒΆ

Sinks are defined in Robusta's Helm chart, using the sinksConfig value:

- ms_teams_sink:                  # sink type
    name: my_teams_sink           # arbitrary name
    webhook_url: <placeholder>    # a sink-specific parameter
    stop: false                   # optional (see `Routing Alerts to only one Sink`)
    match: {}                     # optional routing rules (see below)
    default: true                 # optional (see below)

To add a sink, update sinksConfig according to the instructions in Sinks Reference. Then do a Helm Upgrade.

Integrate as many sinks as you like.

Routing Alerts to only one SinkΒΆ

By default, alerts are sent to all sinks that matches the alerts.

To prevent sending alerts to more sinks after the current one, you can specify stop: true

The sinks evaluation order, is the order defined in generated_values.yaml.

- slack_sink:
    name: production_sink
    slack_channel: production-notifications
    api_key: secret-key
      namespace: production
    stop: true

Routing Alerts to Specific SinksΒΆ

Define which messages a sink accepts using matchers.

For example, Slack can be integrated to receive high-severity messages in a specific namespace. Other messages will not be sent to Slack.

- slack_sink:
    name: test_sink
    slack_channel: test-notifications
    api_key: secret-key
      namespace: [prod]
      severity: [HIGH]
      # more options available - see below

When multiple match conditions are present, all must be satisfied.

The following attributes can be included in a match block:

  • title: e.g. Crashing pod foo in namespace default

  • name : the Kubernetes object name

  • namespace: the Kubernetes object namespace

  • node : the Kubernetes node name

  • severity: one of INFO, LOW, MEDIUM, HIGH


  • kind: one of deployment, node, pod, job, daemonset


  • identifier: e.g. report_crash_loop

  • labels: A comma separated list of key=val e.g. foo=bar,instance=123

  • annotations: A comma separated list of key=val e.g.


labels and annotations are both the Kubernetes resource labels and annotations (e.g. pod labels) and the Prometheus alert labels and annotations. If both contains the same label/annotation, the value from the Prometheus alert is preferred.

How do I find the identifier value to use in a match block?

For Prometheus alerts, it's always the alert name.

For custom playbooks, it's the value you set in create_finding under aggregation_key.

Ask us in Slack if you need help.

By default, every message is sent to every matching sink. To change this behaviour, you can mark a sink as non-default.

Matches Can Be Lists Or RegexesΒΆ

match rules support both regular expressions and lists of exact values:

- slack_sink:
    name: prod_slack_sink
    slack_channel: prod-notifications
    api_key: secret-key
    # AND between namespace and severity
      namespace: ^prod$                # match the "prod" namespace exactly
      severity: [HIGH, LOW]            # either HIGH or LOW (OR logic)

Regular expressions must be in Python re module format, as passed to re.match.

Matching Labels and AnnotationsΒΆ

Special syntax is used for matching labels and annotations:

- slack_sink:
    name: prod_slack_sink
    slack_channel: prod-notifications
    api_key: secret-key
      labels: "foo=bar,instance=123"   # both labels must match

The syntax is similar to Kubernetes selectors, but only = conditions are allowed, not !=

Or Between MatchesΒΆ

You can use Or between match rules:

- slack_sink:
    name: prod_slack_sink
    slack_channel: prod-notifications
    api_key: secret-key
    # AND between namespace and labels, but or within each selector
      - default
      - robusta
      - "instance=123"
      - "instance=456"

The above will match a resource from namespace (default or robusta) and label (instance=123 or instance=456)

Alternative Routing MethodsΒΆ

For customPlaybooks, there is another option for routing notifications.

Instead of using sink matchers, you can set the sinks attribute per playbook:

- triggers:
  - on_job_failure: {}
  - create_finding:
      aggregation_key: "job_failure"
      title: "Job Failed"
  - job_info_enricher: {}
  - job_events_enricher: {}
  - job_pod_enricher: {}
    - "some_sink"
    - "some_other_sink"

Notifications generated this way are sent exclusively to the specified sinks. They will still be filtered by matchers.

Non-Default SinksΒΆ

To prevent a sink from receiving most notifications, you can set default: false. In this case, notifications will be routed to the sink only from customPlaybooks that explicitly name this sink.

Here too, matchers apply as usual and perform further filtering.

Time-limiting sink activityΒΆ

It is possible, for any sink, to set the schedule of its activation by specifying the activity field in its configuration. You can specify multiple time spans, with specific days of the week and hours in these days that the sink will be active. Outside of these specified time spans, the sink will not run - so for example Slack messages will not be delivered.

An example of such a configuration is presented below:

- slack_sink:
    name: main_slack_sink
    slack_channel: robusta-notifications
    api_key: xoxb-your-slack-key
      timezone: CET
      - days: ['mon', 'tue', 'sun']
        - start: 10:00
          end: 11:00
        - start: 16:00
          end: 17:00
      - days: ['thr']
        - start: 10:00
          end: 16:00
        - start: 16:05
          end: 23:00

Note that if the activity field is omitted, it is assumed that the sink will always be activated. As seen above, each section under intervals may have multiple spans of time under the hours key. If the hours section is omitted for a given interval, it's assumed that the sink will be active for all the specified days, irrespective of time.


πŸŽ“ Route Alerts By Namespace

πŸŽ“ Route Alerts By Type

πŸŽ“ Routing with Exclusion Rules

See AlsoΒΆ

πŸ”” All Sinks

πŸŽ“ Silencing Alerts