Create a Compute Policy
You can create notifications for compute products, such as Elastigroup and Ocean resources.
- In the Spot console, click the user icon
> Settings.
- Go to Notification Center > Event Policies > Create Policy.
- Enter a Name for the policy (and a Description).
- Select Type: Compute.
- Select Personal policy if you want the policy to be visible only to you. You will not be able to add integrations. If you don't select Personal policy, the policy will be available to other members of the account it is in, and you will be able to add integrations.
- Click Continue.
To complete the policy definition, you need to complete all steps of the wizard. You'll select an account, rules, regions, and integrations. Once the policy is created, you may need to edit it to select users who will have access.
Step 1: Select Account
- Select the account the notification policy should apply to. Only accounts that are connected to a cloud service provider can create a notification policy.
- Click Next.
Step 2: Select Resources
-
Select the resources to include in your policy:
- All Resources in the account will be monitored. Any resources that are added in the future will also be monitored.
- Rule-Based Resources defines criteria for monitoring in a condition and a condition set. Any new resources added to the account that match the defined criteria will automatically be included in the monitoring.
More about conditions and condition sets
- A Condition Set is a group of one or more conditions. When there are multiple condition sets, they relate to each other with an OR operation.
- A Condition is a rule within a condition set. Multiple conditions within a condition set relate to each other with an AND operation.
Each condition contains:
- Identifier: the resource type to be monitored, such as:
- Name
- ID
- Region
- AMI
- Tag
- Load Balancer
- Availability Zone
- Security Group
- Operator: The criterion for matching a search, such as:
- Is
- Is not
- Contains
- Does Not Contain
- Begins with
- Ends with
- Value: The string to be matched, such as a:
- Phrase
- Word
- Part of a word
- Individual Resources are the only resources that will be monitored for notifications. Any new resources added to the account in the future will not be included unless you edit the policy and add them to the monitoring list.
View image
-
Click Next.
Step 3: Select Events
-
Select the types of events to receive notifications about.
View image
-
If you want to configure integrations, click Next (Optional). Otherwise, click Create Policy Now.
Step 4: Select Integrations (Optional)
If you (as an admin user) are configuring a policy at the account level, you can select the integrations. The integrations decide how the notifications are delivered.
View image
You can choose from these integrations:
- External Email to add email addresses that will receive notifications.
- Webhook to add webhooks to applications.
- SNS to add an SNS topic ARN to receive notifications in AWS.
- Slack to add the webhook for a Slack channel. To define the channel, create a webhook URL.
These attributes are sent as part of the JSON message in Webhook, SNS, or Slack:
- default
- accountId
- resourceId
- organizationName
- trigger_policies
- accountName
- resourceName
- title
- message
Select Users
Once you (an admin user) have created an account-level policy, only you are registered to the policy. You can edit the policy and select Spot users to receive notifications.