Create Automation Policies#
Automation policies schedule automatic lifecycle actions on cloud resources — stopping resources outside of business hours, starting them in the morning, and enforcing tag standards. Policies are scoped to your Allocation Groups hierarchy.
Navigate: left navigation → Automation → Policies → “+ New Policy”.
Policy types#
Type |
What it does |
|---|---|
Start VM |
Starts (powers on) compute resources on a schedule |
Stop VM |
Stops (powers off / deallocates) compute resources on a schedule |
Enforce Tags |
Applies standard tags or labels to resources on a schedule |
See Tag Enforcement Policies for the dedicated Enforce Tags guide.
Creating a Start or Stop VM policy#
Step 1 — General settings#
Policy name — descriptive name (e.g. “Stop Dev VMs - After Hours”)
Policy type — Start VM or Stop VM
Target scope — select a Group, Environment, or Project from your Allocation hierarchy; the policy applies to all matching resources within that scope
Step 2 — Schedule#
Use the visual cron picker with fields for minute, hour, day of week, day of month, and month.
Note
All schedules are in UTC timezone. Convert your local working hours to UTC before setting a schedule.
CET (UTC+1 winter): 6 PM local → 17:00 UTC
CEST (UTC+2 summer): 6 PM local → 16:00 UTC
Common schedule examples:
Intent |
Cron expression |
Plain English |
|---|---|---|
Stop at 7 PM UTC on weekdays |
|
Monday–Friday at 19:00 UTC |
Start at 7 AM UTC on weekdays |
|
Monday–Friday at 07:00 UTC |
Stop every day at midnight |
|
Every day at 00:00 UTC |
Weekly cleanup on Friday |
|
Friday at 18:00 UTC |
Tip
Create a paired Start-Stop for Dev environments: Stop at 19:00 UTC weekdays + Start at 07:00 UTC weekdays. This covers 12 off-hours per weekday ≈ 50% compute savings.
Step 3 — Save#
Click Save. The policy is active immediately and fires at the next scheduled time.
Supported resource types#
Azure:
Virtual Machines (VMs)
Virtual Machine Scale Sets (VMSS)
Application Gateways
Azure Database for MySQL
Azure Database for PostgreSQL
Azure Kubernetes Service (AKS) — node pool start/stop
AWS:
EC2 Instances
RDS Instances
Redshift Clusters
GCP:
Compute Engine instances
Managed Instance Groups (MIGs)
Cloud SQL instances
Cloud Storage buckets
Google Kubernetes Engine (GKE) — Standard clusters only
Warning
GKE Autopilot clusters do not support Stop policies. Autopilot manages its own node lifecycle and cannot be controlled via external automation.
Policy execution results#
After each policy run, the execution summary shows one of three results per resource:
Result |
Meaning |
|---|---|
Processed |
The action was applied successfully |
Skipped |
The resource was already in the correct state (already stopped / already running) |
Failed |
The action failed — usually a permissions issue on the cloud connection |
Viewing policy history#
Open any policy → History tab shows a log of all past runs with: trigger time, resources processed, skipped, and failed.