unSkript Documentation
Free SandboxBlogGitHubSlack Community
  • What is unSkript?
  • Guides
    • Contribute to Open Source
    • Getting started
      • Sign Up/Install
      • Authentication
        • Okta configuration
          • Okta Groups Sync
      • Create a Proxy
      • Add Credentials to Connect your Resources
      • Key Terms
  • RunBooks
    • Prebuilt xRunBooks
      • xRunBooks for CloudOps
      • xRunBooks for Cost Optimization
      • xRunBooks for DevOps
      • xRunBooks for IAM
      • xRunBooks for SecOps
      • xRunBooks for SRE
      • xRunBooks for Troubleshooting
    • Creating RunBooks
      • Importing unSkript xRunBooks
      • Create a xRunBook
      • Add an Action
      • Connecting Actions
      • Create a RunBook Input Parameter
      • Create a Credential
      • Writing Notes
      • Running XRunBooks
        • Running RunBooks with Approvals
      • Schedules
      • xRunBook Executions
      • Alarms
        • Create an Alarm Webhook
          • Webhooks for onprem installations
        • Create a Grafana Alert
        • Attaching runbooks to alarms
      • Folders
      • RunBook Outputs
  • Actions
    • What is an Action?
    • Create Custom Actions
    • Create Actions with AI
    • Actions
      • Action Configuration
        • Configure Action Inputs
        • Add Action Inputs
        • Action Output
        • Action Iterator
          • Using Iterators
        • Action Poll
        • Action Start Condition
      • Anatomy of an Action
    • Prebuilt Actions
  • Healthchecks
    • What is a HealthCheck?
    • Create a HealthCheck
      • Create a HealthCheck Folder
      • Adding Checks
    • HealthCheck Parameters
    • Running HealthChecks
    • HealthCheck Remediation
  • Workflows
    • What is a Workflow?
  • Connnecting
    • Connectors
      • Airflow
        • Airflow Actions
      • AWS
        • AWS Actions
          • AWS Cloudwatch Actions
          • AWS EC2 Actions
          • AWS ECS Actions
          • AWS EKS Actions
          • AWS ELB Actions
          • AWS IAM Actions
          • AWS Postgres Actions
          • AWS RDS Actions
          • AWS RedShift Actions
          • AWS S3 Actions
          • AWS VPC Actions
      • Azure
        • Azure Actions
      • ChatGPT
        • ChatGPT Actions
      • Datadog
        • Configuring webhook in Datadog
        • Datadog Actions
          • Datadog Alert Actions
          • Datadog Metrics Actions
          • Datadog Monitor Actions
      • Elasticsearch
        • Elasticsearch Actions
      • GCP
        • GCP Actions
          • GCP Bucket Actions
          • GCP GKE Actions
          • GCP IAM Actions
          • GCP VM Actions
      • Github
        • Github Actions
      • Grafana
        • Grafana Actions
      • Hadoop
        • Hadoop Actions
      • Jenkins
        • Jenkins Actions
      • Jira
        • Jira Actions
      • Kafka
        • Kafka Actions
      • Kubernetes
        • K8s Actions
      • MongoDB
        • MongoDB Actions
      • MS SQL
        • MSSQL Actions
      • MySQL
        • MySQL Actions
      • Netbox
        • Netbox Actions
      • Nomad
        • Nomad Actions
      • OpenSearch
        • opensearch Actions
      • Pingdom
        • Pingdom Actions
      • Postgres
        • Postgres Actions
      • Prometheus
        • Prometheus Actions
      • Redis
        • Redis Actions
      • REST
        • REST Actions
      • SalesForce
        • SalesForce Actions
      • Slack
        • Slack Actions
      • Snowflake
        • Snowflake Actions
      • Splunk
        • Splunk Actions
      • SSH
        • SSH Actions
      • Stripe
        • Stripe Actions
      • Terraform
        • Terraform Actions
      • Zabbix
    • Proxies
      • Environment
        • RunBooks Across Environments: ServiceIDs
      • unSkript Proxy
      • AWS Proxy
      • GCP Proxy
    • Secret store
      • Vault
  • Tooling
    • Role Based Access Control
      • RBAC Roles
    • API reference
      • Authentication
      • Endpoints
        • Executions
        • RunBooks
        • Schedules
    • Command Line Tool
    • Notifications
  • Fundamentals
    • Jupyter Notebook 101
  • Use Cases
    • DevOps
    • SRE
  • Open source
    • Runbooks.sh
    • Contribute to Open Source
  • Lists
    • AWS Service Quota list
Powered by GitBook
On this page

Was this helpful?

  1. RunBooks
  2. Prebuilt xRunBooks

xRunBooks for CloudOps

PreviousPrebuilt xRunBooksNextxRunBooks for Cost Optimization

Last updated 1 year ago

Was this helpful?

  • AWS : Create new IAM user with a security Policy. Sends confirmation to Slack.

  • AWS : This runbook is the inverse of Create IAM user with profile - removes the profile, the login and then the IAM user itself..

  • AWS : This runbook can be used to delete all unattached EBS Volumes within an AWS region. You can delete an Amazon EBS volume that you no longer need. After deletion, its data is gone and the volume can't be attached to any instance. So before deletion, you can store a snapshot of the volume, which you can use to re-create the volume later.

  • AWS : This runbook can be used to detach an instance from Auto Scaling Group. You can remove (detach) an instance that is in the InService state from an Auto Scaling group. After the instance is detached, you can manage it independently from the rest of the Auto Scaling group. By detaching an instance, you can move an instance out of one Auto Scaling group and attach it to a different group. For more information, see Attach EC2 instances to your Auto Scaling group.

  • AWS : This runbook locates large files in an EC2 instance and backs them up into a given S3 bucket. Afterwards, it deletes the files backed up and send a message on a specified Slack channel. It uses SSH and linux commands to perform the functions it needs.

  • AWS : This runbook finds redshift clusters that don't have pause resume enabled and schedules the pause resume for the cluster.

  • AWS : This runbook can be used to list unhealthy EC2 instance from an ELB. Sometimes it difficult to determine why Amazon EC2 Auto Scaling didn't terminate an unhealthy instance from Activity History alone. You can find further details about an unhealthy instance's state, and how to terminate that instance, by checking the a few extra things.

  • AWS : This runbook can be used to create charts and alerts around Your AWS product usage. It requires a Cost and USage report to be live in RedShift.

  • AWS : This runbook can be used to create charts and alerts around AWS EC2 usage. It requires a Cost and USage report to be live in RedShift.

  • AWS : The AWS CloudTrail service allows developers to enable policies managing compliance, governance, and auditing of their AWS account. In addition, AWS CloudTrail offers logging, monitoring, and storage of any activity around actions related to your AWS structures. The service activates from the moment you set up your AWS account and while it provides real-time activity visibility, it also means higher AWS costs. Here Finding Redundant Trails in AWS

  • AWS : This runbook finds all EC2 key pairs that are not used by an EC2 instance and notifies a slack channel about them. Optionally it can delete the key pairs based on user configuration.

  • AWS : This runbook can be used to find the publicly accessible RDS instances for the given AWS region.

  • AWS : Ensuring that long-running AWS ElastiCache clusters have Reserved Nodes purchased for them is an effective cost optimization strategy for AWS users. By committing to a specific capacity of ElastiCache nodes for a period of one or three years, users can take advantage of significant discounts compared to On-Demand pricing. This approach can help optimize AWS costs for ElastiCache clusters that are expected to run for an extended period and have predictable usage patterns. This runbook helps us optimize costs by ensuring that Reserved Nodes are purchased for these ElastiCache clusters.

  • AWS : Ensuring that long-running AWS RDS instances have Reserved Instances purchased for them is an important cost optimization strategy for AWS users. By committing to a specific capacity of RDS instances for a period of one or three years, users can take advantage of significant discounts compared to On-Demand pricing. This approach can help optimize AWS costs for RDS instances that are expected to run for an extended period and have predictable usage patterns. This runbook helps us to optimize costs by ensuring that Reserved Instances are purchased for these RDS instances.

  • AWS : Ensuring that long-running AWS Redshift Clusters have Reserved Nodes purchased for them is a critical cost optimization strategy . By committing to a specific capacity of Redshift nodes for a period of one or three years, users can take advantage of significant discounts compared to On-Demand pricing. This approach can help optimize AWS costs for Redshift Clusters that are expected to run for an extended period and have predictable usage patterns. This runbook helps us to ensure that Reserved Nodes are purchased for these clusters so that users can effectively plan ahead, reduce their AWS bill, and optimize their costs over time.

  • AWS : This runbook can be used to filter all the S3 buckets which are unencrypted and apply encryption on unencrypted S3 buckets.

  • AWS : This runbook can be used to list all AWS SSL (ACM) Certificates that need to be renewed within a given threshold number of days. Optionally it can renew the certificate using AWS ACM service.

  • AWS : This runbook restarts unhealthy services in a target group. The restart command is provided via a tag attached to the instance.

  • AWS : This runbook will list all the S3 buckets.Filter buckets which has ACL public READ/WRITE permissions and Change the ACL Public READ/WRITE permissions to private in the given region.

  • AWS : This lego can be used to list all the manual database snapshots in the given region. Get publicly accessible DB snapshots in RDS and Modify the publicly accessible DB snapshots in RDS to private.

  • AWS : This runbook can be used to Stop all EC2 Instances that are idle using given cpu threshold and duration.

  • AWS : This runbook can be used to Stop all EC2 Instances that are Untagged

  • AWS : This runbook can be used to list all the EC2 instances which don't have a lifetime tag and then terminate them.

  • AWS : This runbook can be used to find the old generation RDS instances for the given AWS region and modify then to the given instance class.

  • AWS : This runbook can be used to update a redshift database from a SQL file stored in S3.

  • AWS : This runbook can be used to filter all the S3 buckets which are unencrypted and apply encryption on unencrypted S3 buckets.

  • AWS : Configures the URL endpoint to the SNS associated with a CloudWatch alarm. This allows to external functions to be invoked within unSkript in response to an alert getting generated. Alarms can be attached to the handlers to perform data enrichment or remediation

  • AWS : This runbook can be used to copy AMI from one region to multiple AWS regions using unSkript legos with AWS CLI commands.We can get all the available regions by using AWS CLI Commands.

  • AWS : This runbook can be used to detach an instance from Auto Scaling Group. You can remove (detach) an instance that is in the Service state from an Auto Scaling group. After the instance is detached, you can manage it independently from the rest of the Auto Scaling group. By detaching an instance, you can move an instance out of one Auto Scaling group and attach it to a different group. For more information, see Attach EC2 instances to your Auto Scaling group.

  • AWS : This runbook check if there is a failed deployment in progress for a service in an ECS cluster. If it finds one, it sends the list of stopped task associated with this deployment and their stopped reason to slack.

  • AWS : This runbook can be used to Enforce Mandatory Tags Across All AWS Resources.We can get all the untag resources of the given region,discovers tag keys of the given region and attaches mandatory tags to all the untagged resource.

  • AWS : To avoid unexpected interruptions, it's a good practice to check to see if there are any EC2 instances scheduled to retire. This runbook can be used to List the EC2 instances that are scheduled to retire. To handle the instance retirement, user can stop and restart it before the retirement date. That action moves the instance over to a more stable host.

  • AWS : Extract usage details from Cloudtrail of an existing user. Apply the usage to a new IAM Policy, and connect it to a new IAM profile.

  • AWS : This runbook can be used to collect the data from cloudwatch related to AWS DynamoDB for provision capacity.

  • AWS : This run resizes the EBS volume to a specified amount. This runbook can be attached to Disk usage related Cloudwatch alarms to do the appropriate resizing. It also extends the filesystem to use the new volume size.

  • AWS : This runbook can be used to resize list of pvcs in a namespace. By default, it uses all pvcs to be resized.

  • AWS : This runbook resizes the PVC to input size.

  • AWS : This runbook can be used to Restart AWS EC2 Instances

  • AWS : This lego can be used to launch an AWS EC2 instance from AMI in the given region.

  • AWS : This runbook can be used to troubleshoot EC2 instance configuration in a private subnet by capturing the VPC ID for a given instance ID. Using VPC ID to get Internet Gateway details then try to SSH and connect to internet.

  • Jenkins : This runbook fetches the logs for a given Jenkins job and posts to a slack channel

  • Jira : Using the Panel Library - visualize the time it takes for issues to close over a specifict timeframe

  • Kubernetes : This runbook shows and deletes the evicted pods for given namespace. If the user provides the namespace input, then it only collects pods for the given namespace; otherwise, it will select all pods from all the namespaces.

  • Kubernetes : This runbook fetches the kube system config map for a k8s cluster and publishes the information on a Slack channel.

  • Kubernetes : This runbook get the matching nodes for a given configuration (storage, cpu, memory, pod_limit) from a k8s cluster

  • Kubernetes : This RunBook checks the logs of every pod in a namespace for warning messages.

  • Kubernetes : This runbook checks if any Pod(s) in CrashLoopBackoff state in a given k8s namespace. If it finds, it tries to find out the reason why the Pod(s) is in that state.

  • Kubernetes : This runbook checks if any Pod(s) in ImagePullBackOff state in a given k8s namespace. If it finds, it tries to find out the reason why the Pod(s) is in that state.

  • Kubernetes : This runbook checks any Pods are in terminating state in a given k8s namespace. If it finds, it tries to recover it by resetting finalizers of the pod.

  • Kubernetes : This runbook resizes a list of Kubernetes PVCs.

  • Kubernetes : This runbook resizes a Kubernetes PVC.

  • Kubernetes : This runbook can be used to rollback Kubernetes Deployment

  • Postgresql : This runbook displays collects the long running queries from a database and sends a message to the specified slack channel. Poorly optimized queries and excessive connections can cause problems in PostgreSQL, impacting upstream services.

Create IAM User with policy
Delete IAM profile
Delete Unattached AWS EBS Volumes
AWS Detach EC2 Instance from ASG
AWS EC2 Disk Cleanup
AWS Ensure Redshift Clusters have Paused Resume Enabled
AWS Get unhealthy EC2 instances from ELB
AWS Redshift Get Daily Costs from AWS Products
AWS Redshift Get Daily Costs from EC2 Usage
AWS Lowering CloudTrail Costs by Removing Redundant Trails
List unused Amazon EC2 key pairs
Publicly Accessible Amazon RDS Instances
Purchase Reserved Nodes For Long Running AWS ElastiCache Clusters
Purchase Reserved Instances For Long Running AWS RDS Instances
Purchase Reserved Nodes For Long Running AWS Redshift Clusters
Remediate unencrypted S3 buckets
Renew AWS SSL Certificates that are close to expiration
AWS Restart unhealthy services in a Target Group
Restrict S3 Buckets with READ/WRITE Permissions to all Authenticated Users
Secure Publicly accessible Amazon RDS Snapshot
Stop Idle EC2 Instances
Stop all Untagged AWS EC2 Instances
Terminate EC2 Instances Without Valid Lifetime Tag
AWS Update RDS Instances from Old to New Generation
AWS Redshift Update Database
Encrypt unencrypted S3 buckets
Configure URL endpoint on a AWS CloudWatch alarm
Copy AMI to All Given AWS Regions
Detach EC2 Instance from ASG
Detect ECS failed deployment
Enforce Mandatory Tags Across All AWS Resources
Handle AWS EC2 Instance Scheduled to retire
Create an IAM user using Principle of Least Privilege
Monitor AWS DynamoDB provision capacity
Resize EBS Volume
Resize list of pvcs.
Resize PVC
Restart AWS EC2 Instances
Launch AWS EC2 from AMI
Troubleshooting Your EC2 Configuration in a Private Subnet
Fetch Jenkins Build Logs
Jira Visualize Issue Time to Resolution
k8s: Delete Evicted Pods From All Namespaces
k8s: Get kube system config map
k8s: Get candidate nodes for given configuration
Kubernetes Log Healthcheck
k8s: Pod Stuck in CrashLoopBackoff State
k8s: Pod Stuck in ImagePullBackOff State
k8s: Pod Stuck in Terminating State
k8s: Resize List of PVCs
k8s: Resize PVC
Rollback Kubernetes Deployment
Display long running queries in a PostgreSQL database