Usecase Universe

A collective of use cases for DevOps teams

Browse a variety of 200+ predefined templates to automate all your AWS actions

S3 to DynamoDB Importer

Import data from AWS S3 to DynamoDB. Importing DynamoDB data to S3 successfully safeguards your data and doubles up as an efficient AWS backup strategy.

EC2 Instances Detailed Monitoring

Detailed monitoring ensures that we have enough data to make informed choices about the compute resources on AWS. Standard monitoring occurs in intervals of five minutes. Detailed monitoring ensures that the instances are monitored at one minute intervals. This enables the user to view trends better and sanction resources in an efficient manner.

Send report of Security Groups which allow https access on public IP

It is AWS best practice to get aware of Security Groups which allows HTTPS access from public IP to reduce possibility of breach. Allowing unrestricted HTTPs access can increase threats like hacking, denial-of-service (DoS) attacks and loss of data.

Elasticache Within Limit - 5 Nodes

Report if the ElastiCache node limit threshold (5) defined for your AWS account is reached. Setting limits for the maximum number of ElastiCache cluster nodes provisioned within your AWS account will help you to better manage your ElastiCache compute resources and prevent unexpected charges on your AWS bill.

RDS DBInstances without CloudWatch Alarms

Sends a report with all the RDS DBInstances without a cloudwatch alarm attached to them.

Report unused CloudFronts.

Sends a report if AWS CloudFront Content Delivery Network (CDN) service is not used within your AWS account. Using AWS cloudFront content delivery network service increases the performance, security, reliability and availability of your websites/applications content delivery process.

Security Groups Which Allow Oracle DB (TCP port 1521) Access from Public IP

It is AWS best practice to get aware of Security Groups which allows Oracle DB access from public IP to reduce possibility of breach. Allowing unrestricted Oracle access can increase threats like hacking, denial-of-service (DoS) attacks and loss of data.

EC2 Hibernation Not Enabled

EC2 Instances have hibernation as an additional state option, and is useful for certain cases where startup time needs to be minimized. During hibernation, contents from the instance RAM are stored on the EBS Root Volume. Hibernation allows the instances to start much faster than from the conventional stop state.

Lambda Daily Cost Predictor

Lambda costs for may unintentionally run into excessive amounts. This template enables users to predict lambda costs on a daily basis, helping them estimate and plan better. The generated report keeps a regular check on your Lambda costs.

Enable All Features of Organisation Using Service Control Policies (SCPs)

Ensure that all features within your Amazon Organizations are enabled to gain full control over the use of AWS services and actions across multiple AWS accounts using Service Control Policies

Security Groups Which Allow PostGreSQL DB (TCP Port 5432) Access From Public IP

It is AWS best practice to be aware of Security Groups which allow PostGreSQL DB access from public IP to reduce the possibility of a breach. Allowing unrestricted PostGreSQL access can increase threats like hacking, denial-of-service (DoS) attacks and loss of data.

Unrestricted SMTP access

It is AWS best practice to get aware of Security Groups which allows SMTP access from public IP to reduce possibility of breach. Allowing unrestricted SMTP access can increase threats like hacking, spamming, Shellshock attacks, denial-of-service (DoS) attacks.

Redshift Clusters Use Default Port

Sends a report if any of the Redshift Clusters are using the default endpoint ports. This will provide an extra layer of security against port scanning and network attacks.

EC2 Security Groups with Empty Descriptions

It is an AWS best practice to give a description for your security groups. It helps in quickly getting more insight into the configuration of your security group. You should define the purpose and identity of the IP address to each rule. This workflow sends a report of security groups which do not have descriptions to any of the rules.

Elasticsearch Exposed Domains

Sends a report if AWS Elasticsearch domains are publicly accessible. Allowing public access to your ES domains is not recommended and is considered a bad practice.

Create Template
Have idea that can solve your problem, Create It