Usecase Universe

A collective of use cases for DevOps teams

Browse a variety of 200+ predefined templates to automate all your AWS actions

Create Template
Solutions
All Categories

Amazon Redshift

24 Times Used
22 MAY 2019
Redshift Clusters CPUUtilization
Amazon Redshift
Other

Template provides you with the CPUUtilization of Redshift Cluster.

Report Redshift clusters without tags.
Amazon Redshift
Operational Excellence
Operational Excellence

This workflow sends a report of Redshift clusters which does not have tags established by their organisations. Which tags are missing can be found in the report generated.

Redshift Clusters
Amazon Redshift
Reporting

Sends report of Redshift cluster CPUUtilization.

Redshift Clusters with High CPU Utilization
Amazon Redshift
Other

Sends a report of Redshift cluster if CPU utilization goes above than 90 %. Clusters with high CPU utilization should be rebooted this will improve the performance.

Enable Redshift Cluster Allow Version Upgrade
Amazon Redshift
Security

This workflow enables Version Upgrade feature on your Redshift cluster. AWS Redshift engine upgrades will occur automatically so the data warehouse service engine can get the newest features, bug fixes or the latest security patches released.

Redshift Idle Clusters
Amazon Redshift
Cost Saving
Cost Saving

Sends a report if any of the Redshift cluster present in your AWS account is appeared to be idle. Identifying and removing idle resources from your AWS account is best practice to reduce AWS costs.

Redshift Cluster Allow Version Upgrade
Amazon Redshift
Security
Security

Sends a report if Version Upgrade is not enabled for Redshift Clusters. Having it enabled ensures that your Clusters remain up to date with the latest patches and upgrades.

Redshift Cluster Default Master Username
Security
Security
Amazon Redshift

Sends a report if the default master username is used in the Redshift Cluster. Changing to a custom username enhances the protection of AWS Redshift Clusters against hacking.

Redshift Clusters Not Using Desired Node Type
Security
Amazon Redshift
Security

Sends a report, if AWS Redshift Clusters present in your aws account are not using desired node type established by your organization. Setting limits for the type of AWS Redshift cluster nodes will help you address internal compliance requirements and prevent unexpected charges on your AWS bill.

Unencrypted Redshift Clusters
Security
Security
Amazon Redshift

Sends a report if the AWS Redshift Clusters are not encrypted. Enabling encryption ensures that there is no unauthorised access to the data.

Redshift Cluster in VPC
Amazon Redshift
Security
Security

Sends a report if the Redshift Clusters are not in a VPC. Having it in a VPC ensures that you have a better networking infrastructure and improved control over your access security.

Redshift Cluster Is Publicly Accessible
Amazon Redshift
Security

A report of publicly accessible Redshift Clusters. If your Cluster is public, any machine on the internet can establish a connection to it which can lead to SQL injection or DDoS attack.

Redshift Clusters Use Default Port
Security
Security
Amazon Redshift

Sends a report if any of the Redshift Clusters are using the default endpoint ports. This will provide an extra layer of security against port scanning and network attacks.