Workflows

Find ways for Relay to eliminate repetitive tasks in the DevOps tools you use every day. Relay automates dozens of DevOps workflows. Let’s find a way to save you time and money.
Hero illustration

Delete empty Azure Load Balancers

This workflow finds empty Azure load balancers by locating load balancers that have no backend configurations. It then terminates these load balancers.

Delete unused Azure network interfaces

This workflow finds unused Azure network interfaces by locating all network interfaces that are not attached to a virtual machine. It then terminates these network interfaces.

Delete unattached Azure Disks

This workflow looks at all of the Azure Disks in a given subscription and (optionally) resource group that are unattached and terminates them. Requires an Azure account with permissions to delete Disks.

Delete untagged Azure Virtual Machines

This workflow looks at all of the Azure Virtual Machines in a given subscription and (optionally) resource group that are untagged and terminates the ones that have no tags. Requires an Azure account with permissions to delete Virtual Machines.

Rollback Kubernetes deployment and update Datadog incident

This workflow rolls back a kubernetes deployment to the previous version and updates a Datadog Incident Management incident upon completion.

When a Datadog alert is triggered, create a Jira ticket

This workflow responds to a Datadog alert by creating an issue in Jira.

When a Datadog alert is triggered, send a message to Slack

This workflow responds to a Datadog alert by sending a message to a Slack channel.

Monitor AWS DynamoDB provisioned capacity

This workflow sends a notification to Slack when DynamoDB provisioned capacity exceeds defined limits.

Connect Dynatrace and Relay to respond to problem events

This workflow configures a webhook trigger to receive problem notifications from Dynatrace, conditionally posts a comment back to the Dynatrace problem, and logs the problem details in Relay.

Delete unattached EBS volumes

This workflow looks at all of the EBS volumes in a given account and region and selects a subset of those to delete. Requires an AWS account with permissions to delete EBS volumes. The termination criterion is whether any attachments exist on the EBS volume.

Provision an EC2 instance and configure it with Bolt

This workflow uses Terraform to provision an EC2 instance, then it runs a Bolt plan to configure it.

Terminate EC2 instances without valid lifetime tag

This workflow looks at all of the EC2 instances in a given account and region and selects a subset of those to terminate.

Remove unused EC2 key pairs

This workflow finds all EC2 key pairs that are not used by an EC2 instance and removes them from the account.

Stop untagged EC2 instances

This workflow looks at all of the EC2 instances in a given account and region and stops the ones that are untagged. Requires an AWS account with permissions to delete stop EC2 instances.

Delete empty ELBv2 load balancers

This workflow finds empty ELBv2 load balancers by locating all load balancers that have empty target groups (i.e. no registered targets). It then terminates these load balancers.

Delete GCP disks that are unattached

This workflow looks at all of the GCP disks in a given account and zone and terminates the ones that don't have any users.

Delete GCP instances without valid `lifetime` tag

This workflow looks at all of the GCP instances in a given account and zone and selects a subset of those to terminate.

Check http health status and restart EC2 instance if needed

This workflow performs a general http health status and then restarts an EC2 instance in response if the http status is not 200.

Update Kubernetes deployment image tag on Docker Hub push

This workflow responds when a new Docker Hub image is available by updating a Kubernetes deployment image.

When a PagerDuty incident is triggered, initiate the incident remediation policy

This workflow responds to a PagerDuty incident by creating a Jira ticket and Slack channel for the incident, and pinging the current on-call person with the details.

When a PagerDuty incident is triggered, create a Jira ticket

This workflow responds to a PagerDuty incident by creating an issue in Jira.

When a PagerDuty incident is triggered, send a message to Slack

This workflow responds to a PagerDuty incident by sending a message to a Slack channel. The urgency of the incident determines which Slack channel the message goes to.

Send a Twilio SMS when PagerDuty incident triggers

This workflow uses Twilio to send an SMS notification when a new PagerDuty incident is triggered.

Connect a Pulumi application in GitHub to Relay for CI/CD

This workflow receives webhook events from GitHub and runs Pulumi to preview or create resources in your application.

Remediate unencrypted S3 buckets

This workflow finds unencrypted S3 buckets and enables default encryption on those buckets.

Restricts S3 buckets with READ permissions to all Authenticated Users

This workflow looks at all of the S3 buckets in a given account and restricts those that provide 'READ' access to all Authenticated Users. Requires an AWS account with permissions to modify S3 buckets.

Restrict S3 buckets with READ_ACP permissions to all Authenticated Users

This workflow looks at all of the S3 buckets in a given account and restricts those that provide 'READ_ACP' access to all Authenticated Users. Requires an AWS account with permissions to modify S3 buckets.

Restricts S3 buckets with WRITE permissions to all Authenticated Users

This workflow looks at all of the S3 buckets in a given account and restricts those that provide 'WRITE' access to all Authenticated Users. Requires an AWS account with permissions to modify S3 buckets.

Restrict S3 buckets with WRITE_ACP permissions to all Authenticated Users

This workflow looks at all of the S3 buckets in a given account and restricts those that provide 'WRITE_ACP' access to all Authenticated Users. Requires an AWS account with permissions to modify S3 buckets.

Restrict public S3 buckets with READ permissions

This workflow looks at all of the public S3 buckets in a given account and restricts those that provide 'READ' access. Requires an AWS account with permissions to modify S3 buckets.

Restrict public S3 buckets with READ_ACP permissions

This workflow looks at all of the public S3 buckets in a given account and restricts those that provide 'READ_ACP' access. Requires an AWS account with permissions to modify S3 buckets.

Restrict public S3 buckets with WRITE permissions

This workflow looks at all of the public S3 buckets in a given account and restricts those that provide 'WRITE' access. Requires an AWS account with permissions to modify S3 buckets.

Restrict public S3 buckets with WRITE_ACP permissions

This workflow looks at all of the public S3 buckets in a given account and restricts those that provide 'WRITE_ACP' access. Requires an AWS account with permissions to modify S3 buckets.

Assume IAM role and list instances, images, key pairs, and volumes

This workflow uses AWS Security Token Service (STS) to assume a privileged IAM role which it uses to list instances, images, key pairs, and volumes.

Assume IAM role and stop untagged EC2 instances

This workflow uses AWS Security Token Service (STS) to assume a privileged IAM role which it uses to then stop untagged EC2 instances.

Run Terraform when Pull Request merged in GitHub

This workflow runs a Terraform command when a GitHub PR is merged into a configured branch.

Update workflow on merge

This workflow can be run from a GitHub commit trigger configured on a workflow repo to update workflows in the service whenever a PR is merged.