Usecase Universe

A collective of use cases for DevOps teams

Browse a variety of 200+ predefined templates to automate all your AWS actions

Lambda Runtime Environment Version

This workflow checks if the lambda functions' runtime environment is updated to the latest version and reports the ones that are not updated to the latest version.

RDS DBInstances without CloudWatch Alarms

Sends a report with all the RDS DBInstances without a cloudwatch alarm attached to them.

EC2 Hibernation Not Enabled

EC2 Instances have hibernation as an additional state option, and is useful for certain cases where startup time needs to be minimized. During hibernation, contents from the instance RAM are stored on the EBS Root Volume. Hibernation allows the instances to start much faster than from the conventional stop state.

Redshift Clusters Use Default Port

Sends a report if any of the Redshift Clusters are using the default endpoint ports. This will provide an extra layer of security against port scanning and network attacks.

EC2 Security Groups with Empty Descriptions

It is an AWS best practice to give a description for your security groups. It helps in quickly getting more insight into the configuration of your security group. You should define the purpose and identity of the IP address to each rule. This workflow sends a report of security groups which do not have descriptions to any of the rules.

EC2 Instance Termination Protection Is Disabled

EC2 Termination Protection ensures that the instances cannot be terminated accidentally from the Console, API or CLI. These instances can be terminated only after the termination protection setting is turned off.

EBS Volumes without CloudWatch Alarms

Sends a report with all the EBS Volumes without a cloudwatch alarm attached to them.

Elasticsearch Exposed Domains

Sends a report if AWS Elasticsearch domains are publicly accessible. Allowing public access to your ES domains is not recommended and is considered a bad practice.

Unrestricted My_SQL Access

Allowing unrestricted MySQL access can increase threats like hacking, denial-of-service (DoS) attacks and loss of data

Elasticache Within Limit - 5 Nodes

Report if the ElastiCache node limit threshold (5) defined for your AWS account is reached. Setting limits for the maximum number of ElastiCache cluster nodes provisioned within your AWS account will help you to better manage your ElastiCache compute resources and prevent unexpected charges on your AWS bill.

Auto Scaling Groups without Integrated Elastic Load Balancers

Checks whether Auto Scaling Groups have Elastic Load Balancers associated with them. In the case of a failure of any of the EC2 resources, the presence of Elastic Load Balancers will ensure availability. Runs every Monday, Wednesday and Friday.

Set Concurrency for Tagged Lambdas

Finds particular Lambda Functions via tags and set the desired concurrency.

EC2 Instances Detailed Monitoring

Detailed monitoring ensures that we have enough data to make informed choices about the compute resources on AWS. Standard monitoring occurs in intervals of five minutes. Detailed monitoring ensures that the instances are monitored at one minute intervals. This enables the user to view trends better and sanction resources in an efficient manner.

Unrestricted Https Access

It is AWS best practice to get aware of Security Groups which allows HTTPS access from public IP to reduce possibility of breach. Allowing unrestricted HTTPs access can increase threats like hacking, denial-of-service (DoS) attacks and loss of data.

Unrestricted Oracle DB Access

It is AWS best practice to get aware of Security Groups which allows Oracle DB access from public IP to reduce possibility of breach. Allowing unrestricted Oracle access can increase threats like hacking, denial-of-service (DoS) attacks and loss of data.

Create Template
Have idea that can solve your problem, Create It