Search result for 'ec2'
- Most recent
- Most popular
- Most linked
- Most download
- Favorited
Install kubernetes on an ec2 instance ubuntu 20.04 using kubeadm and turn this instance into a master node.Install kubernetes on an ec2 instance ubuntu 20.04 using kubeadm and turn this instance into a master node. |
|
Turn an ec2 instance, ubuntu 20.04 into a kubeadm worker node. Install necessary packages and have it join the cluster.Convert an ec2 instance running Ubuntu 20.04 into a kubeadm worker node, install necessary packages, and have it join the cluster. |
|
|
AWS EC2 Instance Health Checks•Use Case: Monitor the health of EC2 instances across different environments (e.g., development, production). •Automate EC2 instance health checks using AWS CloudWatch. •Trigger automated recovery actions such as instance reboot or replacement if an instance is reported as unhealthy. |
|
|
Disk Space Monitoring on EC2 Instances•Use Case: Monitor disk usage on EC2 instances and trigger alerts when usage exceeds thresholds. •Integrate with CloudWatch to monitor disk space usage. •Automatically trigger cleanup scripts or scale up disk space when thresholds are exceeded. |
|
Checks which security groups in use do not allow unrestricted incoming TCP traffic to the specified ports for IPv4This task identifies security groups allowing unrestricted TCP traffic to specified ports on IPv4, highlighting potential security risks. It ensures traffic to sensitive ports is limited to authorized sources, bolstering network security. The aim is to prevent unauthorized access and exposure of critical services. |
|
Check which AWS EC2 Security Groups allow unrestricted SSH Access: SOC2 ComplianceThis task is designed to audit AWS environments for SOC2 compliance. It systematically identifies security groups in running EC2 instances that permit unrestricted SSH access, flagging potential security vulnerabilities and aiding in maintaining SOC2 compliance standards. |
|
AWS EC2 Security Groups Unrestricted SSH Check: SOC2 ComplianceThis runbook helps enforce SOC2 compliance in AWS environments. It identifies and remediates security groups allowing unrestricted SSH access in running EC2 instances, ensuring robust security and compliance with SOC2 standards. |
|
Remediate AWS EC2 Security Groups with unrestricted SSH Access: SOC2 ComplianceThis task identifies and corrects security groups in AWS EC2, which allow unrestricted SSH access. |
|
AWS Restricted Common Ports AuditThe AWS Restricted Common Ports Audit rule evaluates security groups to ensure they do not allow unrestricted incoming TCP traffic to specific critical ports for IPv4. It aims to prevent unauthorized access by marking configurations as COMPLIANT when traffic to these ports is appropriately restricted, thereby enhancing the security posture of AWS environments. |
|
Get all AWS EC2 instancesAmazon Elastic Compute Cloud (EC2) is a service offered by Amazon Web Services (AWS) that provides resizable compute capacity in the cloud. Through Boto3's EC2 client, the describe_instances() method provides detailed information about each instance, including its ID, type, launch time, and current state. This capability assists users in effectively monitoring and managing their cloud resource... |
|
Stop an AWS EC2 InstanceIn AWS, an EC2 instance can be in various states, including running, stopped, or terminated. Stopping an EC2 instance essentially means shutting it down, similar to turning off a computer. When an instance is stopped, it is not running, and therefore, you are not billed for instance usage. However, you are still billed for any EBS storage associated with the instance. The advantage of stopping... |
|
Identify Idle AWS EC2 InstancesAWS EC2 instances that are running but not actively used represent unnecessary costs. An "idle" EC2 instance typically exhibits very low metrics on parameters such as CPU utilization, network input/output, and disk read/writes. By leveraging AWS CloudWatch, users can monitor these metrics and identify instances that remain underutilized based on low CPU usage over extended periods. Once identi... |
|
Filter out EBS Volumes attached to stopped EC2 instancesThis is a task focused on identifying Elastic Block Store (EBS) volumes that are connected to Amazon EC2 instances currently in a stopped state by examining the instance-state and corresponding volume mappings. |
|
Delete AWS EBS Volumes attached to stopped EC2 instancesThis runbook streamlines resource management by identifying and removing Elastic Block Store (EBS) volumes linked to stopped Amazon EC2 instances. Through a sequential process, this automation retrieves EBS volumes associated with stopped instances and subsequently detaches and deletes them. This procedure aids in resource optimization and cost efficiency within the AWS environment. |
|
Stopping Underutilized AWS EC2 InstancesIn an AWS environment, EC2 instances incur charges based on their uptime. However, not all instances are actively utilized, leading to unnecessary expenses. Underutilized instances may have low CPU usage, minimal network activity, or other metrics indicating limited activity. Identifying and stopping such instances can result in significant cost savings. Tools like AWS Cost Explorer and third-... |
|
Aggregate and Visualize Comprehensive EC2 CPU UtilizationThis task aggregates CPU utilization data for running EC2 instances across an AWS account, computes the average CPU usage over a specified period, and plots the average to help in assessing overall resource efficiency. |
|
Plot Average CPU Utilization for all running AWS EC2 InstancesThis task entails collecting CPU usage metrics from Amazon CloudWatch, calculating the average utilization, and visualizing this data. This task aids in identifying underutilized or overutilized instances, facilitating efficient resource management and cost optimization in AWS. |
|