Report ElastiCache memcached cluster using default ports.

Sends a report of ElastiCache memcached cluster running on default port. Running your AWS ElastiCache clusters on the default port(ii.e. 11211) rises a potential security concern. Changing the default port to other ports adds an extra security layer to your AWS elasticache memcached clusters.

Adopt Template

Trigger

Use this to initiate a workflow based on time, events or call.

Runs everday.

Resource

Select resources on which you want to work on.

Gets Cache Clusters in a specific AWS Region for ElastiCache service.

Filter

Enter parameters to filter resources in the workflow.

Filters the data

Report

Use this node to generate advanced reports

Generates the report and sends it via email.

Trigger

Use this to initiate a workflow based on time, events or call.

Runs everday.
Gets Cache Clusters in a specific AWS Region for ElastiCache service.

Resource

Select resources on which you want to work on.

Filter

Enter parameters to filter resources in the workflow.

Filters the data

Report

Use this node to generate advanced reports

Generates the report and sends it via email.

Trigger

Use this to initiate a workflow based on time, events or call.

Runs everday.

Trigger

Use this to initiate a workflow based on time, events or call.

Runs everday.

Trigger

Use this to initiate a workflow based on time, events or call.

Runs everday.

Trigger

Use this to initiate a workflow based on time, events or call.

Runs everday.

Trigger

Use this to initiate a workflow based on time, events or call.

Runs everday.
Adopt Template

Workflow Template

Trigger

Use this to initiate a workflow based on time, events or call.

Runs everday.

Resource

Select resources on which you want to work on.

Gets Cache Clusters in a specific AWS Region for ElastiCache service.

Filter

Enter parameters to filter resources in the workflow.

Filters the data

Report

Use this node to generate advanced reports

Generates the report and sends it via email.

Create A Template

Thank you! Your submission has been received!
Oops! Something went wrong while submitting. Please Try Again.

Request for a template

You can publish templates created by you on this platform.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Similar Templates

Remove entries in Security Group which allow https access on public ip

It is AWS best practice to remove entries in security group which allows HTTPS access from public IP to reduce possibility of breach. Allowing unrestricted HTTPS access can increase threats like hacking, denial-of-service (DoS) attacks and loss of data

Remove entries in security group which allows Oracle DB(TCP port 1521 ) access from public IP.

It is AWS best practice to remove entries in security group which allows Oracle DB access from public IP to reduce possibility of breach. Allowing unrestricted Oracle access can increase threats like hacking, denial-of-service (DoS) attacks and loss of data.

Send report of security group which allows DNS(TCP port 53 and UDP port 53 ) access from public IP.

It is AWS best practice to remove entries in security group which allows DNS access from public IP to reduce possibility of breach. Allowing unrestricted DNS access can increase threats such as Denial of Service (DoS) attacks or Distributed Denial of Service (DDoS) attacks.