AWS Done Right

One of the challenges with Amazon Web Services (AWS), and other public clouds, comes when infrastructure spreads around the globe and spans multiple accounts. When clients scale by using additional virtual services and geographic regions it can be easy to lose sight of all the resources that form a global cloud footprint. DivvyCloud gives customers the ability to view, manage and automate their entire infrastructure using a central, agnostic platform that optimized AWS while reducing risks associated with cloud vendor lock-in.

We recognize adoption of AWS often goes well beyond EC2 (Elastic Compute Cloud), and as such our support for AWS services is far reaching and continues to grow. With support ranging from VPC to RDS and even ancillary services such as Route53 and Elastic Load Balancing customers can get a handle on their dynamic AWS deployments. Listed below are the services we currently support:

AWS Services Supported

Elastic Compute Cloud (EC2)

Virtual Private Cloud (VPC)

Elastic Load Balancing (ELB)

Route53

Relational Database Service (RDS)

Elasticache

RedShift

Simple Storage Service (S3)

Identity Access Management (IAM)

Security Token Service (STS)

CloudWatch

CloudTrail

Elastic Block Store (EBS)

The DivvyCloud Advantage

Intelligent Taxonomy

Take AWS tags to new heights by leveraging DivvyCloud Resource Groups with auto-curation capabilities. Resource Groups are a many-to-many relationship that enable IT to better organize cloud resources and provide appropriate access to users/stakeholders. Not only do Resource Groups make it easier to find resources, but they come equipped with robust permission, auditing and reporting capabilities.

DevOps Focused

Event Driven Automation allows developers to automate infrastructure-as-code in new, innovative ways. All DivvyCloud supported resources emit “hooks” when change is detected enabling your engineering staff to execute business logic during the lifecycle of a resource. For example, when new security rules are created DivvyCloud can check them against a predefined blacklist for compliance, or when new instances come online automatically add them to IPAM, DNS and monitoring systems. The possibilities are endless. Click here for some other great examples.

Unified API

With DivvyCloud’s programmatic API we’ve done the heavy lifting for customer development teams. Working with AWS or multiple cloud providers, our API simplifies the experience. Customers can now write tools and scripts using a single, unified API and have confidence they will work across different cloud technologies.

Scheduled Instances

There’s a great deal of waste with resources running on a 24x7x365 basis. Often times development, QA and staging compute instances are required only during business hours and/or can be suspended entirely during the weekend/holidays. Using DivvyCloud scheduled instances, customers can define custom stop/start schedules which can cut down on monthly bills. By coupling the feature with resource groups we can easily define different schedules for production, development, or specific project teams as needed.

Resource Notes

Unfortunately there are a number of resources within AWS where tags are not supported and/or they don’t provide the context required to identify what a resource is and its purpose. DivvyCloud Resource Notes allow users and teams to record information regarding a resource improving communication, collaboration and historical context.

Idle Instance Detection

Too often end-users over-provision capacity resulting in thousands of dollars in unnecessary expenses every month. Idle instance detection allows IT, users and other stakeholders to know what instances are under-utilized and should be targets for potential downsizing or termination.

Regional Compliance

Put a stop to resources being provisioned in unsupported regions. Too often end-users mistakenly provision in regions that aren’t used for your products/services. DivvyCloud can easily detect and terminate resources provisioned outside approved regions, resulting not only in cost reduction, but bolstering corporate security by eliminating unknown entry points into cloud environments.