Search result for 'EC2'
- Most recent
- Most popular
- Most linked
- Most download
- Favorited
Verify the target EC2 instances have the SSM agent installed and runningEnsure the SSM Agent which is a software component that enables instances to interact with AWS Systems Manager services is installed on the target EC2 instances by checking whether the amazon-ssm-agent is running or not. |
|
AWS EC2 Disk Space Optimization by Archiving Large Files to S3This runbook automates the process of identifying large files within a specified directory on an Amazon EC2 instance, backing them up to an Amazon S3 bucket, and subsequently deleting them from the EC2 instance to free up disk space. By archiving these files to S3, users can maintain important data while ensuring optimal disk space utilization on their EC2 instance. |
|
Get all AWS EC2 instancesAmazon Elastic Compute Cloud (EC2) is a service offered by Amazon Web Services (AWS) that provides resizable compute capacity in the cloud. Through Boto3's EC2 client, the describe_instances() method provides detailed information about each instance, including its ID, type, launch time, and current state. This capability assists users in effectively monitoring and managing their cloud resource... |
|
|
Identify Idle AWS EC2 InstancesAWS EC2 instances that are running but not actively used represent unnecessary costs. An "idle" EC2 instance typically exhibits very low metrics on parameters such as CPU utilization, network input/output, and disk read/writes. By leveraging AWS CloudWatch, users can monitor these metrics and identify instances that remain underutilized based on low CPU usage over extended periods. Once identi... |
|
Stop an AWS EC2 InstanceIn AWS, an EC2 instance can be in various states, including running, stopped, or terminated. Stopping an EC2 instance essentially means shutting it down, similar to turning off a computer. When an instance is stopped, it is not running, and therefore, you are not billed for instance usage. However, you are still billed for any EBS storage associated with the instance. The advantage of stopping... |
|
Filter out EBS Volumes attached to stopped EC2 instancesThis is a task focused on identifying Elastic Block Store (EBS) volumes that are connected to Amazon EC2 instances currently in a stopped state by examining the instance-state and corresponding volume mappings. |
|
Stopping Underutilized AWS EC2 InstancesIn an AWS environment, EC2 instances incur charges based on their uptime. However, not all instances are actively utilized, leading to unnecessary expenses. Underutilized instances may have low CPU usage, minimal network activity, or other metrics indicating limited activity. Identifying and stopping such instances can result in significant cost savings. Tools like AWS Cost Explorer and third-... |
|
Delete AWS EBS Volumes attached to stopped EC2 instancesThis runbook streamlines resource management by identifying and removing Elastic Block Store (EBS) volumes linked to stopped Amazon EC2 instances. Through a sequential process, this automation retrieves EBS volumes associated with stopped instances and subsequently detaches and deletes them. This procedure aids in resource optimization and cost efficiency within the AWS environment. |
|
Fetch Rightsizing Recommendations for AWS EC2 InstancesThis task retrieves AWS EC2 instance rightsizing recommendations using AWS Compute Optimizer, identifying cost-saving and performance-enhancing opportunities by analyzing usage patterns. It suggests optimal instance types or sizes, ensuring efficient resource utilization. |
|
Plot Average CPU Utilization for all running AWS EC2 InstancesThis task entails collecting CPU usage metrics from Amazon CloudWatch, calculating the average utilization, and visualizing this data. This task aids in identifying underutilized or overutilized instances, facilitating efficient resource management and cost optimization in AWS. |
|
Plot Savings based on AWS EC2 Rightsizing RecommendationsThis task generates a bar chart visualizing AWS EC2 rightsizing savings, with instance names on the X-axis and different recommendations distinguished by instance ID and rank in the legend. |
|
Rightsizing Recommendations for AWS EC2 Instances using AWS Compute OptimizerThis task utilizes AWS Compute Optimizer to fetch rightsizing recommendations for AWS EC2 instances, aiming to optimize instance sizes based on actual usage. It assesses whether instances are under-utilized or over-utilized, suggesting adjustments to enhance performance and reduce costs. By querying across specified or all regions, it allows for a comprehensive optimization strategy, ensuring ... |
|
Aggregate and Visualize Comprehensive EC2 CPU UtilizationThis task aggregates CPU utilization data for running EC2 instances across an AWS account, computes the average CPU usage over a specified period, and plots the average to help in assessing overall resource efficiency. |
|
|
AWS EC2 Usage AnalysisThis runbook involves collecting data on EC2 instances, retrieving CPU utilization metrics from Amazon CloudWatch, and visually plotting this data to identify underutilized or overutilized instances. This task helps in recognizing potential cost-saving opportunities by rightsizing instances, either by downsizing underutilized instances to reduce costs or upsizing overutilized instances to impr... |
|
Check which AWS EC2 Security Groups allow unrestricted SSH Access: SOC2 ComplianceThis task is designed to audit AWS environments for SOC2 compliance. It systematically identifies security groups in running EC2 instances that permit unrestricted SSH access, flagging potential security vulnerabilities and aiding in maintaining SOC2 compliance standards. |
|
AWS EC2 Security Groups Unrestricted SSH Check: SOC2 ComplianceThis runbook helps enforce SOC2 compliance in AWS environments. It identifies and remediates security groups allowing unrestricted SSH access in running EC2 instances, ensuring robust security and compliance with SOC2 standards. |
|
Remediate AWS EC2 Security Groups with unrestricted SSH Access: SOC2 ComplianceThis task identifies and corrects security groups in AWS EC2, which allow unrestricted SSH access. |
|