Notifications & integrations¶
Notifications fan out platform events — service incidents, spend alerts, role changes, audit anomalies — to the people and systems that need to know. Configure them per-user (personal preferences) or org-wide (default channels).
Overview¶
Notifications page. Channels on the left, event-type-to-channel matrix on the right.
Three layers of configuration:
| Layer | Set in | Affects |
|---|---|---|
| Personal | User menu → Account → Notifications | Where you get notified |
| Project | Project Settings → Notifications | Per-project events (defaults inherited from org) |
| Org | Org Settings → Notifications | Org-wide events + default for all projects |
Personal preferences override project defaults; project settings override org defaults.
Channels¶
| Channel | Latency | Best for |
|---|---|---|
| seconds — minutes | Default for everything | |
| Webhook | seconds | Custom integrations |
| Slack (via webhook) | seconds | Engineering / NOC channels |
| Microsoft Teams (via webhook) | seconds | Same |
| PagerDuty | seconds | On-call escalation |
| Opsgenie | seconds | Same |
| ServiceNow | seconds — minutes | ITSM ticket auto-creation |
| SMS (preview) | seconds | Critical-only, optional add-on |
| Mobile push (roadmap) | seconds | Cloud Digit mobile app |
Event categories¶
| Category | Examples |
|---|---|
| Authentication | New sign-in from new IP, failed sign-in burst, password change, MFA reset |
| Authorization | Role changed, member added/removed, token issued/revoked, custom-role updated |
| Resource lifecycle | VM created/deleted, volume attached/detached, cluster up/down |
| Resource health | VM in Error, volume detach failed, K8s node NotReady |
| Spend | Budget at 80% / 95% / 100%, anomaly detected, top-up cleared |
| Service health | Cloud Digit incidents (degraded / outage), maintenance windows |
| Audit anomaly | Unusual API call patterns, off-network access, mass-delete events |
| Compliance | Object Lock retention near expiry, audit pack ready, KYC re-verification due |
Administration¶
Org-wide defaults¶
Org Settings → Notifications → Default recipients:
| Event class | Default recipients |
|---|---|
| Billing | org.billing.dl@your-domain |
| Security | org.security.dl@your-domain |
| Compliance | org.compliance.dl@your-domain |
| Operations | org.ops.dl@your-domain |
| User-facing announcements | org.admin.dl@your-domain |
These mailing-list addresses live at your mail server, not Cloud Digit. We just push to them.
Quotas¶
| Resource | Default per org | Cap |
|---|---|---|
| Webhook destinations | 50 | 500 |
| PagerDuty / Opsgenie services | 25 | 100 |
| Email recipients per event | 100 | 500 |
| Notifications per minute (rate limit) | 1,000 | bumpable |
Operation¶
Adding a webhook¶
Notifications → Channels → + Add → Webhook:
- Name — e.g.
slack-noc - URL — your endpoint
- Method — POST (default) / PUT
- Headers — optional auth (
X-API-Key: ..., etc.) - Format — JSON (default) / CEF / Jinja2 custom template
- Retries — exponential backoff on 5xx (default on)
- Test — Cloud Digit sends a synthetic event to confirm
Once added, route events to it from the Routing matrix.
Slack / Teams integration¶
These are technically webhooks but Cloud Digit ships pre-built templates that render nicely in Slack / Teams:
- In Slack/Teams, create an incoming webhook for the target channel (workspace admin in Slack, channel owner in Teams)
- Copy the webhook URL
- In Cloud Digit, Notifications → Channels → + Add → Slack (or Teams) — paste the URL
- Test → confirms a friendly message lands in the channel
- Route events from the Routing matrix
PagerDuty / Opsgenie¶
For on-call escalation:
- Notifications → Channels → + Add → PagerDuty (or Opsgenie)
- Paste the integration key from your service
- Test → Cloud Digit creates a synthetic incident at the destination
- Route only critical / urgent events here (avoid alert fatigue)
Routing matrix¶
The matrix is the heart of notifications. Rows = event types, columns = channels. Tick the cells that should fire.
Common patterns:
| Event | Webhook | Slack | PagerDuty | SMS | |
|---|---|---|---|---|---|
| Sign-in from new IP | ✓ | ||||
| Failed-sign-in burst (≥ 10/min from one IP) | ✓ | ✓ | ✓ | ||
| VM in Error state | ✓ | ✓ | |||
| Spend at 80% budget | ✓ | ||||
| Spend at 100% budget | ✓ | ✓ | ✓ | ||
| Cloud Digit P1 in your region | ✓ | ✓ | ✓ | ✓ | ✓ |
| Audit anomaly | ✓ | ✓ | ✓ | (severity-dep) | |
| KYC re-verification due | ✓ |
Quiet hours¶
For low-priority events, set per-channel quiet hours (e.g. "no Slack pings between 23:00 and 07:00"). Critical events override quiet hours — that's by design.
Per-user preferences¶
Each user can opt out of specific event types or downgrade to digest mode (a daily summary instead of per-event push). Settings → Notifications under User menu → Account.
Operating-tier integrations¶
If you've subscribed to 24/7 Managed Monitoring, the Cloud Digit NOC is automatically subscribed to your critical events — they triage and escalate to you per your runbook.
If you've subscribed to Managed SIEM, audit-anomaly notifications can be routed via SIEM (with full Sigma-rule filtering) instead of (or in addition to) the platform-native notification channels.
Troubleshooting¶
| Symptom | Likely cause | Fix |
|---|---|---|
| Webhook test fails with timeout | Endpoint unreachable from Cloud Digit's egress | Confirm endpoint is internet-accessible; check firewall |
| Slack messages malformed | Old webhook URL with deprecated format | Re-issue the Slack webhook |
| PagerDuty creates many duplicate incidents | Dedup-key not set in Cloud Digit's payload | Switch the channel to "PagerDuty Events API v2" mode (default; manual override possible) |
| User not receiving emails despite subscription | Org-level recipient mailing list excludes them; or their account has email disabled | Check both org-level routing AND user's personal preferences |
| Too many alerts during incident | Storm-control hadn't kicked in | Storm control is on by default; review the rate-limit settings |
| Audit-anomaly alerts noisy | Default thresholds too tight for your workload | Tune via SIEM Sigma rules, or via the built-in anomaly threshold knob |
Related¶
- Spend alerts in Financial portal
- Audit logs — feeds anomaly notifications
- SIEM — alternative routing path
- Managed Monitoring — let Cloud Digit's NOC handle alerts
- Status — service-health events surface here