Usecase Universe

A collective of use cases for DevOps teams

Browse a variety of 200+ predefined templates to automate all your AWS actions

Create Template
Solutions
All Categories

EC2

24 Times Used
22 MAY 2019
EC2 Instances
EC2
Reporting

Sends the utilization report of Ec2 instances in context with network traffic

EC2 Instances
EC2
Reporting

Sends report for EC2 instances CPU utilization.

EC2 Desired Instance Type
Security
EC2
Security

Determine if the EC2 instances provisioned in your AWS account have the desired instance type(s) established by your organization based on the workload deployed.

Reserved Instance Lease Expiration In The Next 30 Days
Cost Saving
EC2
Cost Saving

To determine the expiration date for your Amazon EC2 Reserved Instances

Unrestricted Oracle Access
EC2
Security

It is AWS best practice to remove entries in security group which allows Oracle DB access from public IP to reduce possibility of breach. Allowing unrestricted Oracle access can increase threats like hacking, denial-of-service (DoS) attacks and loss of data.

Older EC2 AMI's
EC2
Operational Excellence

This template takes the AMI's which are older than 15 days in your AWS account and deregister them. Deleting unused images is a good practice to remove junk from your aws account.

Unrestricted MySQL Access
EC2
Security

It is AWS best practice to remove entries in security group which allows MySQL access from public IP to reduce possibility of breach. Allowing unrestricted MySQL access can increase threats like hacking, denial-of-service (DoS) attacks and loss of data.

Unrestricted DNS Access
EC2
Security
Security

It is AWS best practice to remove entries in security group which allows DNS access from public IP to reduce possibility of breach. Allowing unrestricted DNS access can increase threats such as Denial of Service (DoS) attacks or Distributed Denial of Service (DDoS) attacks.

Increase EBS Volume size if Instance disk utilisation reaches 90%
EC2
Remediation
AWS Best Practices
Remediation

Increases EBS Volume size when the instance's disk utilisation exceeds 90%

Unrestricted HTTP Access
EC2
Security
Security

It is AWS best practice to get aware of security groups which allows HTTP access from public IP to reduce possibility of breach. Allowing unrestricted HTTP access can increase threats like hacking, denial-of-service (DoS) attacks and loss of data.

AWS EC2 instances without cloudWatch alarms (Custom metric)
EC2
CloudWatch
Operational Excellence
Operational Excellence

Send report for all the EC2 Instances without a cloudwatch alarm attached to them.

EC2 Instance In VPC
EC2
Security
Security

Running instances in EC2-VPC instead of EC2-Classic provides better flexibility and control over security, traffic routing and availability.

Cross region EBS backup PART-2
EC2
Backup
AWS Best Practices

This template takes EBS snapshot from one region in your aws account and copy it into another region.

Reboot process in EC2 machine (Triggered by alarm)
EC2
Remediation

If CPUUtilization of any instance having required cloudwatch alarm set, If CPUUtilization goes high then this workflow will be triggered and it will lower down the CPUUtilization of the machine by rebooting the process inside the machine.

Idle AWS EC2 Instances
Cost Saving
EC2
Cost Saving

This workflow send report of all the EC2 instances which are idle from the past 7 days and are launched before 7 days. Instance is identified as idle if its CPU Utilization is less than 2% and Network In/Out is less than 5MB. You can also give other configurations for this workflow.