Privileged troubleshooting view. Returns the configuration a tenant ACTUALLY receives: the per-layer contribution of every organization in its ancestor chain (Owner → tenant), the merged effective layer, and the rendered Alertmanager YAML pushed to Mimir for that tenant.
Unlike GET /alerts/config (which returns only the caller's own
layer), this exposes the full inherited + merged view, so it is
gated by the dedicated config:alerts permission. That permission
lives solely on the super user role, which is owner-assignable
only — so in practice only an Owner-org Super Admin can reach this.
It is not reachable by Distributor/Reseller admins.
Secrets are redacted in the response: telegram bot_token and
webhook URL path/query in every layer and in the effective layer,
and SMTP credentials / bearer / bot tokens in the rendered YAML.
organization_id is required and may target ANY tenant. A
nonexistent id returns an empty effective config (no error) — the
honest answer for a diagnostic tool. Read-only: no Mimir push, no
DB writes.
curl \
--request GET 'https://api.your-domain.com/api/alerts/config/effective?organization_id=string' \
--header "Authorization: Bearer $ACCESS_TOKEN"
{
"code": 200,
"message": "effective alerting configuration retrieved successfully",
"data": {
"organization_id": "string",
"chain": [
{
"organization_id": "string",
"organization_name": "string",
"organization_role": "owner",
"has_layer": true,
"layer": {
"enabled": {
"email": true,
"webhook": true,
"telegram": true
},
"email_recipients": [
{
"address": "hello@example.com",
"severities": [
"critical"
],
"language": "en",
"format": "html"
}
],
"webhook_recipients": [
{
"name": "string",
"url": "https://example.com",
"severities": [
"critical"
]
}
],
"telegram_recipients": [
{
"bot_token": "123456:ABC-DEF1234ghIkl-zyx57W2v1u123ew11",
"chat_id": -1001234567890,
"severities": [
"critical"
]
}
]
},
"updated_by_name": "string",
"updated_at": "2026-05-04T09:42:00Z"
}
],
"effective": {
"enabled": {
"email": true,
"webhook": true,
"telegram": true
},
"email_recipients": [
{
"address": "hello@example.com",
"severities": [
"critical"
],
"language": "en",
"format": "html"
}
],
"webhook_recipients": [
{
"name": "string",
"url": "https://example.com",
"severities": [
"critical"
]
}
],
"telegram_recipients": [
{
"bot_token": "123456:ABC-DEF1234ghIkl-zyx57W2v1u123ew11",
"chat_id": -1001234567890,
"severities": [
"critical"
]
}
]
},
"yaml": "string"
}
}
{
"code": 400,
"message": "validation failed",
"data": {
"type": "validation_error",
"errors": [
{
"key": "username",
"message": "required",
"value": "string"
}
]
}
}
{
"code": 401,
"message": "invalid token",
"data": {}
}
{
"code": 403,
"message": "insufficient permissions",
"data": {}
}
{
"code": 400,
"message": "validation failed",
"data": {
"type": "validation_error",
"errors": [
{
"key": "username",
"message": "required",
"value": "string"
}
]
}
}