EC2

24 Times Used
22 MAY 2019
Report Instances without CloudWatch Alarms

Sends a report with all the EC2 Instances without a cloudwatch alarm attached to them.

View Template
Report EBS Volumes without CloudWatch Alarms

Sends a report with all the EBS Volumes without a cloudwatch alarm attached to them.

View Template
Report EC2 Spot Instances without CloudWatch Alarms

Sends a report with all the Spot fleet requests without a cloudwatch alarm attached to them

View Template
Send report of app-tier EC2 Instances having Elastic or Public IP addresses

This workflow sends the report of app tier EC2 instances that have Elastic or Public IP addresses. You can change Tag from Name=app-tier to your own tag. If any of your app-tier instance have an Elastic or Public IP, then it is accessible from internet.

View Template
Send a report of all instances which are not part of an Auto-Scaling Group (ASG)

It is an AWS best practice to launch every EC2 machine in an AWS Auto Scaling Group to achieve zero downtime. This workflow sends a report of instances not launched in an auto-scaling group.

View Template
Send report of tenancy type of EC2 instances

Using the right tenancy model for your EC2 instances should reduce the concerns around security at the instance hypervisor level and promote better compliance.

View Template
Send report of EC2 Instances older than 150 days

It is an AWS best practice to stop and relaunch your old EC2 instances, so that they are reallocated to updated and more reliable hardware. Instances older than 150 days are recommended to be updated.

View Template
Send report of EC2 Instances which are using IAM access keys

It is an AWS best practice to use IAM Roles over IAM Access Keys to sign AWS API requests, as Roles provide more flexibility to manage permissions. This workflow sends a report of EC2 instances which are not using IAM Roles.

View Template
Send report of under-utilised EC2 machines

This workflows send a report of under-utilised(default 40%) EC2 instances. You can save cost by downsizing under-utilised EC2 instances.

View Template
Notify if any of your AMIs are not encrypted

It is an AWS best practice to enable data encryption in order to prevent it from unauthorised personnel. AMI encryption is managed by AWS Key Management Service (KMS).

View Template
Notify If any EC2 instance in your account is not Launched using approved/golden AMIs

It is an AWS best practice to launch EC2 machine from an approved/golden AMI. Approved AMI is an image of an EC2 Instance containing all the necessary software and settings configured for your application; which helps in scaling, and quick & secure deployment.

View Template
Remove unused Amazon Elastic Network Interfaces (ENI)

It is an AWS best practice to remove unused ENIs as there is service limit set by AWS. Keeping a lot of unused ENIs can exhaust the resource limit and will prevent the launching of new EC2 machines.

View Template
Remove unused EC2 key pairs

It is an AWS best practice to remove all unused EC2 key pairs from your account. It provides security to your EC2 machines by restricting access to individuals who are no longer part of your organization but still have old key value pairs with them.

View Template
Notify if any AWS AMIs are publicly shared

AWS AMIS created by you might contain sensitive information like your application or its data that should not be exposed outside your organisation. This workflow notifies if any of the AWS AMIs are publicly shared.

View Template
AWS Automation Builder by TotalCloud - The easiest and fastest way to automate AWS | Product Hunt Embed