Amazon Web Services
AWS Done Right
One of the challenges with Amazon Web Services (AWS), and other public clouds, comes when infrastructure spreads around the globe and spans multiple accounts. When clients scale by using additional virtual services and geographic regions it can be easy to lose sight of all the resources that form a global cloud footprint. DivvyCloud gives customers the ability to view, manage and automate their entire infrastructure using a central, cloud agnostic platform optimized for AWS while reducing risks associated with cloud vendor lock-in.
We recognize adoption of AWS often goes well beyond EC2 (Elastic Compute Cloud), and as such our support for AWS services does too. With support ranging from VPC to RDS and even ancillary services such as Route53 and Elastic Load Balancing customers can get a handle on their dynamic AWS deployments. Listed below are the services we currently support:
AWS Supported Services
- Elastic Compute Cloud (EC2)
- Virtual Private Cloud (VPC)
- Load Balancing (ELB/ALB/NLB)
- Relational Database Service (RDS)
- Simple Storage Service (S3)
- Security Token Service (STS)
- Elastic Block Store (EBS)
- Identity Access Management (IAM)
- Autoscaling Groups
- Key Management Service
- Elastic File System
The DivvyCloud Advantage
Take AWS tags to new heights by leveraging DivvyCloud Resource Groups with auto-curation capabilities. Resource Groups are a many-to-many relationship that enable IT to better organize cloud resources and provide appropriate access to users/stakeholders. Not only do Resource Groups make it easier to find resources, but they come equipped with robust permission, auditing and reporting capabilities.
Event Driven Automation allows developers to automate infrastructure-as-code in new, innovative ways. All DivvyCloud supported resources emit “hooks” when change is detected enabling your engineering staff to execute business logic during the lifecycle of a resource. For example, when new security rules are created, DivvyCloud can check them against a predefined blacklist for compliance, or, when new instances come online, automatically add them to IPAM, DNS and monitoring systems. The possibilities are endless. Click here for some other great examples.
With DivvyCloud’s programmatic API we’ve done the heavy lifting for customer development teams. Whether working with AWS or multiple cloud providers, our API simplifies the experience. Customers can now write tools and scripts using a single, unified API and have confidence they will work across different cloud technologies.
There’s a great deal of waste with resources running on a 24x7x365 basis. Often-times development, QA and staging compute instances are required only during business hours and/or can be suspended entirely during the weekend/holidays. Using DivvyCloud’s Scheduled Instances Bot, customers can define custom stop/start schedules that can cut dramatically down their monthly bills. By coupling the feature with resource groups we can easily define different schedules for production, development, or specific project teams as needed.
Unfortunately, AWS does not support tagging accounts themselves. When managing multiple accounts, it can be useful to tag them to provide the context required to identify cloud ownership, technical environment, and contact information. DivvyCloud allows tagging through the use of “badges”, which are customizable and can be used to filter clouds and to support automated actions through Bots.
Idle Instance Detection
Too often, end-users over-provision capacity resulting in thousands of dollars in unnecessary expenses every month. Idle instance detection allows IT, users and other stakeholders to know what instances are under-utilized and, therefore, are candidates for downsizing or termination.
Put a stop to resources being provisioned in unsupported regions. In AWS, it’s easy for end-users to mistakenly provision in regions that aren’t used for your products/services. DivvyCloud can easily detect and automatically terminate resources provisioned outside approved regions, resulting not only in cost reduction, but bolstering corporate security by eliminating unknown entry points into cloud environments.