How are alerts sent?
Once you've created an alert, it will be automatically associated with your domain's default sending policy. This policy is partly defined by the delivery methods and the anti-flooding policy associated.
The sending policy dictates how to send an alert, to whom, when, and how often. When the domain is created, there is a default sending policy that uses the e-mail address of the domain's creator as the recipient. This policy will distribute the alert by e-mail, to the domain owner, at any hour, all while respecting the default anti-flooding policy.
You will want to set up new delivery methods and sending policies to accommodate your organization's needs but there must always be a sending policy marked as the default policy. This will be automatically assigned to newly-created alerts.
The delivery method dictates how an alert is sent and to whom. For example, a delivery method might be created to send an email to email@example.com, or to distribute the alert message via Pushover to mobile device users.
The anti-flooding policy limits the number of alerts to distribute in the event that the alert is triggered frequently over a short period of time. This way, the anti-flooding policy associated with a sending policy determines how often the alert message will be distributed.
What tasks do I need to perform?
The following articles describe all you need to know about the tasks to configure defined alerts so that they reach the adequate recipient through the adequate channel. You can also find some interesting articles about other alert utilities.
- Manage defined alerts
- Manage sending policies
- Manage delivery methods
- Manage anti-flooding policies
- Make an alert available for panels
- Pre-installed alert reference
What permissions do I need?
These procedures shown above are carried out in the Administration → Alert Configuration area and you need to have a role with manage permissions on this area to perform them (Administration → Roles → Permissions tab). If you have the view version of this permission, you will only be able to access the area but not perform any task. If you do not have the permission at all, you will not be able to access the area.