Managing account-wide settings

Click Manage > Settings to change the default settings for your account.

Contents

Account contacts

Account contacts

Every Skytap account must have a primary administrator. You can also designate separate email addresses for billing and security contacts.

  • Primary administrator – Select from the list of administrators in your account. The Primary administrator has the authority to make account-level changes—including anything that may affect billing.

    You must designate a new primary administrator before you can disable or delete the user account of the current primary administrator.

  • Billing contact – Optionally provide an email address for the person Skytap should contact with billing or invoicing questions. If no billing contact is specified, billing questions are sent to the primary administrator.
  • Security contact – Optionally provide an email address for the person Skytap should contact about security issues. If no security contact is specified, security questions are sent to the primary administrator.

    Tips

    • The billing and security contacts don’t have to be Skytap users.
    • If you want billing or security notifications sent to multiple people, you can use email distribution lists on your company’s email server.

Auto-shutdown policy

auto-power policy

Auto-shutdown policies let you to specify the maximum amount of time that VMs in an environment can sit idle. The environment is shut down or suspended after the idle time has elapsed. For more information, see How the power options feature works.

Notes

  • The suspend action works only for x86 VMs with 256 GB or RAM or less. Neither Power A CPU architecture that supports IBM i, AIX, and Linux (on Power) in Skytap Cloud. VMs nor x86 VMs with more than 256 GB of RAM can be suspended.
  • The shut down action works for Power VMs and for x86 VMs that have VMware Tools installed.
To set a global default auto-shutdown policy
  1. Check Enable auto-shutdown.
  2. Choose how long environments can sit idle.
  3. Choose the power option that will be applied.

The default auto-shutdown policy settings automatically apply to all new environments in the account. To enable auto-shutdown for existing environments, edit the power option settings for those environments. For instructions, see Enabling automatic power options for an environment.

Usage limits

Usage and account limits are on the Usage & Limits page. To view and change current usage, reserved capacity, and account limits by region, see Setting usage limits and viewing usage.

Shared drives

shared drive

Skytap shared drives are shared network storage depots for each region in your account. Every VM in a region can access the shared drive. The shared drive is an easy way to exchange files between VMs in a region.

  • Shared SFTP Credentials – Displays the SFTP credentials for the shared drive.
  • Generate new – Click to generate a new SFTP password.
  • Regions & SFTP Addresses – Displays the SFTP address for the shared drive in each enabled region.

For more information, see Transferring files to a VM.

This section is visible only if sharing portals are enabled.

sharing portal support link

  1. Type an http: site, https:// site, or mailto: email address (for example, http://www.example.com, https://www.example.com, or mailto:support@example.com).

    If you do not specify a custom URL or email address, sharing portal users will be directed to the Skytap help site when they click Help.

  2. Click Save.

When you edit this setting, you are changing the global default for your account. When users add new sharing portals, they can override this default by providing a different URL or email address in the sharing portal’s Support contact options section.

Webhooks

webhooks

To configure webhooks
  1. Choose which webhooks to enable:

    • Enable auditing webhook – to stream real-time auditing data.
    • Enable usage data webhook – to stream real-time usage data.
  2. Type the URL where the data will be sent. All events for the account will be sent to the destination URL.
  3. If the destination site is configured to use TLS encryption (optional, but strongly recommended), type or paste the public Certificate.

    You can use OpenSSL to retrieve the TLS public key with the following command:

    openssl s_client -showcerts -connect {webhookserver}:{port} </dev/null 2>/dev/null\|openssl x509 -outform PEM

  4. Click Save.

If the destination URL is not available or stops responding, the webhook service will attempt to reconnect once per minute for up to six hours or 200 attempts. If it can’t reconnect, the webhook service will be disabled until you reconfigure it.

For more details about webhooks, see Configuring the webhook service for audit data and Configuring the webhook service for usage data.