## Create a Notification policy `alerting.policies.create(PolicyCreateParams**kwargs) -> PolicyCreateResponse` **post** `/accounts/{account_id}/alerting/v3/policies` Creates a new Notification policy. ### Parameters - `account_id: str` The account id - `alert_type: Literal["abuse_report_alert", "access_custom_certificate_expiration_type", "advanced_ddos_attack_l4_alert", 66 more]` Refers to which event will trigger a Notification dispatch. You can use the endpoint to get available alert types which then will give you a list of possible values. - `"abuse_report_alert"` - `"access_custom_certificate_expiration_type"` - `"advanced_ddos_attack_l4_alert"` - `"advanced_ddos_attack_l7_alert"` - `"advanced_http_alert_error"` - `"bgp_hijack_notification"` - `"billing_usage_alert"` - `"block_notification_block_removed"` - `"block_notification_new_block"` - `"block_notification_review_rejected"` - `"bot_traffic_basic_alert"` - `"brand_protection_alert"` - `"brand_protection_digest"` - `"clickhouse_alert_fw_anomaly"` - `"clickhouse_alert_fw_ent_anomaly"` - `"cloudforce_one_request_notification"` - `"cni_maintenance_notification"` - `"custom_analytics"` - `"custom_bot_detection_alert"` - `"custom_ssl_certificate_event_type"` - `"dedicated_ssl_certificate_event_type"` - `"device_connectivity_anomaly_alert"` - `"dos_attack_l4"` - `"dos_attack_l7"` - `"expiring_service_token_alert"` - `"failing_logpush_job_disabled_alert"` - `"fbm_auto_advertisement"` - `"fbm_dosd_attack"` - `"fbm_volumetric_attack"` - `"health_check_status_notification"` - `"hostname_aop_custom_certificate_expiration_type"` - `"http_alert_edge_error"` - `"http_alert_origin_error"` - `"image_notification"` - `"image_resizing_notification"` - `"incident_alert"` - `"load_balancing_health_alert"` - `"load_balancing_pool_enablement_alert"` - `"logo_match_alert"` - `"magic_tunnel_health_check_event"` - `"magic_wan_tunnel_health"` - `"maintenance_event_notification"` - `"mtls_certificate_store_certificate_expiration_type"` - `"pages_event_alert"` - `"radar_notification"` - `"real_origin_monitoring"` - `"scriptmonitor_alert_new_code_change_detections"` - `"scriptmonitor_alert_new_hosts"` - `"scriptmonitor_alert_new_malicious_hosts"` - `"scriptmonitor_alert_new_malicious_scripts"` - `"scriptmonitor_alert_new_malicious_url"` - `"scriptmonitor_alert_new_max_length_resource_url"` - `"scriptmonitor_alert_new_resources"` - `"secondary_dns_all_primaries_failing"` - `"secondary_dns_primaries_failing"` - `"secondary_dns_warning"` - `"secondary_dns_zone_successfully_updated"` - `"secondary_dns_zone_validation_warning"` - `"security_insights_alert"` - `"sentinel_alert"` - `"stream_live_notifications"` - `"synthetic_test_latency_alert"` - `"synthetic_test_low_availability_alert"` - `"traffic_anomalies_alert"` - `"tunnel_health_event"` - `"tunnel_update_event"` - `"universal_ssl_event_type"` - `"web_analytics_metrics_update"` - `"zone_aop_custom_certificate_expiration_type"` - `enabled: bool` Whether or not the Notification policy is enabled. - `mechanisms: MechanismParam` List of IDs that will be used when dispatching a notification. IDs for email type will be the email address. - `email: Optional[List[Email]]` - `id: Optional[str]` The email address - `pagerduty: Optional[List[Pagerduty]]` - `id: Optional[str]` UUID - `webhooks: Optional[List[Webhook]]` - `id: Optional[str]` UUID - `name: str` Name of the policy. - `alert_interval: Optional[str]` Optional specification of how often to re-alert from the same incident, not support on all alert types. - `description: Optional[str]` Optional description for the Notification policy. - `filters: Optional[PolicyFilterParam]` Optional filters that allow you to be alerted only on a subset of events for that alert type based on some criteria. This is only available for select alert types. See alert type documentation for more details. - `actions: Optional[List[str]]` Usage depends on specific alert type - `affected_asns: Optional[List[str]]` Used for configuring radar_notification - `affected_components: Optional[List[str]]` Used for configuring incident_alert - `affected_locations: Optional[List[str]]` Used for configuring radar_notification - `airport_code: Optional[List[str]]` Used for configuring maintenance_event_notification - `alert_trigger_preferences: Optional[List[str]]` Usage depends on specific alert type - `alert_trigger_preferences_value: Optional[List[str]]` Usage depends on specific alert type - `enabled: Optional[List[str]]` Used for configuring load_balancing_pool_enablement_alert - `environment: Optional[List[str]]` Used for configuring pages_event_alert - `event: Optional[List[str]]` Used for configuring pages_event_alert - `event_source: Optional[List[str]]` Used for configuring load_balancing_health_alert - `event_type: Optional[List[str]]` Usage depends on specific alert type - `group_by: Optional[List[str]]` Usage depends on specific alert type - `health_check_id: Optional[List[str]]` Used for configuring health_check_status_notification - `incident_impact: Optional[List[Literal["INCIDENT_IMPACT_NONE", "INCIDENT_IMPACT_MINOR", "INCIDENT_IMPACT_MAJOR", "INCIDENT_IMPACT_CRITICAL"]]]` Used for configuring incident_alert - `"INCIDENT_IMPACT_NONE"` - `"INCIDENT_IMPACT_MINOR"` - `"INCIDENT_IMPACT_MAJOR"` - `"INCIDENT_IMPACT_CRITICAL"` - `input_id: Optional[List[str]]` Used for configuring stream_live_notifications - `insight_class: Optional[List[str]]` Used for configuring security_insights_alert - `limit: Optional[List[str]]` Used for configuring billing_usage_alert - `logo_tag: Optional[List[str]]` Used for configuring logo_match_alert - `megabits_per_second: Optional[List[str]]` Used for configuring advanced_ddos_attack_l4_alert - `new_health: Optional[List[str]]` Used for configuring load_balancing_health_alert - `new_status: Optional[List[str]]` Used for configuring tunnel_health_event - `packets_per_second: Optional[List[str]]` Used for configuring advanced_ddos_attack_l4_alert - `pool_id: Optional[List[str]]` Usage depends on specific alert type - `pop_names: Optional[List[str]]` Usage depends on specific alert type - `product: Optional[List[str]]` Used for configuring billing_usage_alert - `project_id: Optional[List[str]]` Used for configuring pages_event_alert - `protocol: Optional[List[str]]` Used for configuring advanced_ddos_attack_l4_alert - `query_tag: Optional[List[str]]` Usage depends on specific alert type - `requests_per_second: Optional[List[str]]` Used for configuring advanced_ddos_attack_l7_alert - `selectors: Optional[List[str]]` Usage depends on specific alert type - `services: Optional[List[str]]` Used for configuring clickhouse_alert_fw_ent_anomaly - `slo: Optional[List[str]]` Usage depends on specific alert type - `status: Optional[List[str]]` Used for configuring health_check_status_notification - `target_hostname: Optional[List[str]]` Used for configuring advanced_ddos_attack_l7_alert - `target_ip: Optional[List[str]]` Used for configuring advanced_ddos_attack_l4_alert - `target_zone_name: Optional[List[str]]` Used for configuring advanced_ddos_attack_l7_alert - `traffic_exclusions: Optional[List[Literal["security_events"]]]` Used for configuring traffic_anomalies_alert - `"security_events"` - `tunnel_id: Optional[List[str]]` Used for configuring tunnel_health_event - `tunnel_name: Optional[List[str]]` Usage depends on specific alert type - `type: Optional[List[str]]` Usage depends on specific alert type - `where: Optional[List[str]]` Usage depends on specific alert type - `zones: Optional[List[str]]` Usage depends on specific alert type ### Returns - `class PolicyCreateResponse: …` - `id: Optional[str]` UUID ### Example ```python import os from cloudflare import Cloudflare client = Cloudflare( api_token=os.environ.get("CLOUDFLARE_API_TOKEN"), # This is the default and can be omitted ) policy = client.alerting.policies.create( account_id="023e105f4ecef8ad9ca31a8372d0c353", alert_type="universal_ssl_event_type", enabled=True, mechanisms={}, name="SSL Notification Event Policy", ) print(policy.id) ``` #### Response ```json { "errors": [ { "message": "message", "code": 1000 } ], "messages": [ { "message": "message", "code": 1000 } ], "success": true, "result": { "id": "f174e90afafe4643bbbc4a0ed4fc8415" } } ```