Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.cloudthinker.io/llms.txt

Use this file to discover all available pages before exploring further.

Pulse pulls signals from three families of sources: AWS service pollers, chat platforms (Slack and Teams), and third-party monitoring webhooks. All are configured from the Manage subscriptions page in Pulse.

AWS Polling

AWS polling lets Pulse pull events directly from your AWS accounts on a schedule — no webhook configuration required. Each source is enabled per-connection.
SourceWhat Pulse CollectsCadence
CloudTrailAPI call audit logs — who did what, when, on which resourceEvery 5 min
AWS HealthService health events impacting your account or regionEvery 5 min
Cost AnomalySpend spikes detected by AWS Cost Anomaly DetectorEvery 6 hours
GuardDutyThreat intelligence findings — compromised instances, suspicious behaviorPeriodic
ConfigResource configuration drift against Config rulesPeriodic
Access AnalyzerIAM and S3 access findings — overly permissive or public resourcesPeriodic

Enabling a Poller

1

Open polling settings

In Pulse, click Manage subscriptions and navigate to the AWS Polling section. You’ll see your connected AWS accounts and their current polling status.
2

Validate first

Click Validate next to the source. Pulse performs a dry run to confirm your credentials have the required read permissions. A clear ✓ means ready; an error code (e.g. AccessDenied) tells you exactly what’s missing.
3

Enable

Toggle the source on. Pulse starts polling immediately.

Auto-Pause

If a poller fails five consecutive times, Pulse pauses it automatically and surfaces the error code. To resume: fix the issue, re-validate, then re-enable the toggle.
AWS polling requires an active AWS connection with read permissions for the relevant services.

Slack & Teams Subscriptions

When the CloudThinker bot is present in a channel, messages in that channel become Pulse signals — alert bot posts, incident announcements, on-call chatter — classified alongside your infrastructure events.

Creating a Subscription

Create Subscription dialog with Platform dropdown set to Slack, Channel search field, invite instruction callout, and Enabled toggle

Select a platform, pick a channel, invite the bot, save

1

Select platform

Choose Slack or Microsoft Teams.
2

Pick a channel

Search for the channel you want to monitor.
3

Invite the bot (Slack only)

Run /invite @CloudThinker in the target channel — Slack only delivers messages to apps that are channel members.
4

Save

Enabled is on by default. Click Create subscription.
Subscriptions can be toggled on/off independently — useful for muting a channel during a maintenance window without losing the configuration.

Channel Types

TypeBest For
AlertChannels used exclusively for automated alert bots
CommunicationChannels used for human discussion — incident chats, handoffs
Mixed (default)Channels with both automated alerts and human messages

Third-Party Webhooks

Any monitoring tool that supports outbound webhooks can send signals to Pulse. The following platforms have built-in field mapping:

Datadog

Monitors, alerts, anomaly detections

Grafana

Alert rule firings and annotations

New Relic

Incidents and NRQL alert results

PagerDuty

Incident and alert webhooks

Prometheus

Kubernetes alert rules

Sentry

Error events and performance alerts
Create a webhook endpoint under Webhooks in CloudThinker and point your monitoring tool at the generated URL. See Webhooks for setup instructions.

Signal Categories

Every signal — regardless of source — is assigned one of eight categories:
CategoryExamples
ComputeEC2 status, Lambda timeouts, ECS failures, container restarts
NetworkNAT gateway anomalies, CloudFront degradation, VPC changes
SecurityGuardDuty findings, IAM changes, S3 public access, WAF triggers
CostCost anomalies, idle resources, Savings Plan drops, RI expiry
DataRDS connection issues, S3 operations, database events
DeployCodeDeploy, ECS rollouts, CloudFormation stack changes
CommunicationSlack and Teams messages, alert bot notifications
UnclassifiedDefault until the AI classifier assigns a category