Search result for 'AWS'
- Most recent
- Most popular
- Most linked
- Most download
- Favorited
Manage Unused AWS CloudWatch DashboardsThis runbook involves identifying and addressing dashboards within AWS CloudWatch that have not been accessed or utilized for a predetermined period. It typically includes analyzing dashboard activity through AWS CloudTrail to detect inactivity, categorizing dashboards as unused, and then taking appropriate actions such as deletion or archiving to optimize resource management and reduce clutte... |
|
List All AWS CloudWatch DashboardsThis task involves retrieving and displaying a comprehensive overview of all AWS CloudWatch dashboards available across different AWS regions. This includes details such as the dashboard names, the regions they are hosted in, and the last modified dates. The goal is to provide visibility into all existing dashboards to manage them effectively or audit their usage. |
|
Filter Out Unused AWS CloudWatch DashboardsThis task involves identifying dashboards with minimal interaction or updates over a set period. This process typically uses AWS CloudTrail to track access patterns, helping organizations identify and decommission underutilized dashboards. This optimization reduces costs and administrative effort by eliminating unnecessary monitoring tools. |
|
Delete AWS CloudWatch DashboardThis task involves removing specific AWS CloudWatch dashboards that are no longer needed or in use. This helps streamline monitoring resources and reduce clutter, ensuring that only relevant and actively used dashboards remain operational within AWS environments. |
|
Filter out redundant global AWS CloudTrail TrailsThis task aims to identify and filter out redundant global trails within AWS CloudTrail. A global trail is a trail that applies to all regions in an AWS account. Redundant global trails can capture duplicate events, leading to unnecessary data storage and processing costs. Our script carefully inspects all global trails in each AWS region and identifies redundancies, providing a clear report o... |
|
Filter out redundant regional AWS CloudTrail TrailsThis task detects redundant regional trails within AWS CloudTrail. Occasionally, users might inadvertently create multiple trails in the same region, which not only results in redundant data collection but also incurs additional costs. These unnecessary trails can capture identical events and consume extra storage, leading to inefficiency and clutter. This task scans through all the regional t... |
|
Filter out redundant AWS CloudTrail TrailsAWS CloudTrail trails are designed to log and monitor AWS account activity, but having multiple trails with overlapping configurations or that are recording the same events in the same region can lead to confusion, inefficiency, and increased costs. This task systematically reviews each trail, checks for redundancy based on specific criteria like region, event types logged, and destination S3 ... |
|
Analysing AWS CloudTrail TrailsThis runbook involves a two-step process aimed at optimizing AWS CloudTrail management. Initially, every trail within AWS CloudTrail is meticulously enumerated and listed, offering visibility into trail configurations across all available regions. The process then shifts focus to scrutinize each trail, identifying and highlighting any redundant trails that may exist. Redundant trails often res... |
|
List all AWS CloudTrail TrailsThis task involves enumerating and retrieving detailed information about every AWS CloudTrail trail that exists across all AWS regions within an AWS account. Each trail captures specific API activity and events, and having a comprehensive list helps in providing visibility into what actions are being logged, where the logs are stored, and how they are configured. This listing process is founda... |
|
Verify the target EC2 instances have the SSM agent installed and runningEnsure the SSM Agent which is a software component that enables instances to interact with AWS Systems Manager services is installed on the target EC2 instances by checking whether the amazon-ssm-agent is running or not. |
|
Verify the IAM role has the correct permissionsFor an EC2 instance to interact with AWS Systems Manager and establish an SSM session, it must be associated with an IAM role that has the correct Systems Manager permissions which include AmazonSSMManagedInstanceCore policy and any other policy required by the services such as S3FullAccess policy to enable S3 logging. By ensuring the IAM role is correctly configured with the appropriate permi... |
|
Prerequisites of using a SSM session.Before utilizing AWS Systems Manager (SSM) sessions, certain prerequisites must be met. These include ensuring the target EC2 instances have the SSM Agent installed and are associated with an appropriate IAM role granting session permissions. Additionally, it's crucial to verify that the necessary AWS services, such as Amazon EC2 and Systems Manager, are accessible and adequately configured. M... |
|
|
Enable S3 Logging to log session activity of SSM sessionsThis runbook facilitates the capture and storage of SSM session activity of instances directly into an S3 bucket. By integrating S3 logging, every command executed and its respective output during SSM sessions are systematically logged. This not only enhances security and auditability but also provides a comprehensive record of operations performed in SSM sessions, ensuring transparency and tr... |
|
|
List All AWS DynamoDB tablesThis task retrieves names of all AWS DynamoDB tables in a specified AWS account and region, useful for inventory checks, administrative tasks, or automating operations across multiple tables. |
|
Access/Modify AWS DynamoDB Table ItemThis task includes fetching (accessing) data using item keys and updating or altering (modifying) table data(optional). |
|
Working with AWS DynamoDBThis runbook allows users to list all available tables in the database, enabling easy management and overview. Additionally, DynamoDB provides the flexibility to access and modify individual table items, supporting a wide range of use cases from web applications to IoT systems, by efficiently handling data retrieval and updates. |
|
List AWS RDS Instances of a specific instance typeIn AWS, users can manage multiple RDS (Relational Database Service) instances for various database workloads. This task can be used to identify RDS instances based on a specific instance type, perhaps for auditing, cost optimization, or migration purposes. By using this task users can filter and list all RDS instances that match a particular instance type. This allows for a more streamlined ma... |
|
Update AWS RDS Instance TypeAs the workload and performance requirements of an application change, there might be a need to adjust the compute capacity of the RDS instance. AWS provides the capability to modify the instance type of an RDS instance, offering flexibility in terms of performance and cost. By using this task users can seamlessly upgrade or downgrade the instance type, optimizing for their current needs. This... |
|