Skip to main content

Workflow: Governance & Compliance Review

Step-by-step guide for auditing Alertmanager operations — review silence changes, export configurations for Git diffing, and ensure organizational policies are followed.


When to Use

Use this workflow when:

  • Reviewing silence activity for compliance
  • Exporting Alertmanager configuration for Git storage and diffing
  • Investigating unauthorized or overly broad silences
  • Verifying that silence policies are being enforced

Journey


Step-by-Step

StepActionTool / ResourceKey Parameters
1Export configResource: am://system/configFull routing config for Git storage
2Audit silence changesam_list_recent_changes(hours=24)Created/expired silences with authors
3Review MCP audit logResource: am://system/audit-logAll MCP-initiated operations
4Validate silencesam_validate_silence_policy(matchers=[...], duration_minutes=..., comment="...", created_by="...")Check against policy rules
5Expire bad silencesam_expire_silence(silence_id="<id>")Reactivates notifications

Governance Checklist

CheckTool / ResourceWhat to Look For
Config driftam://system/configCompare with Git-stored config
Unauthorized silencesam_list_recent_changesUnknown authors, missing comments
Overly broad silencesam_validate_silence_policySeverity-only matchers, env-only matchers
MCP operation historyam://system/audit-logUnexpected create/expire patterns
Default route leakageam_audit_default_routeAlerts hitting the fallback receiver

Next Steps