Workflows

Find ways for Relay to eliminate repetitive tasks in the DevOps tools you use every day. Relay automates dozens of DevOps workflows. Let’s find a way to save you time and money.
Hero illustration
Cost Optimization

Terminate EC2 instances without valid lifetime tag

Finds all EC2 instances without a valid lifetime tag and terminates them.
Cost Optimization

Delete unattached EBS volumes

Finds all EBS volumes without any attachments and deletes them.
Cost Optimization

Delete untagged Azure Virtual Machines

Deletes untagged Azure Virtual Machines in a provided subscription.
Cost Optimization

Delete unattached Azure Disks

Finds all unattached Azure Disks and deletes them.
Security

Stop untagged EC2 instances

Finds all EC2 instances without any tags and stops them.
Cost Optimization

Delete empty ELBv2 load balancers

Deletes empty AWS ELBv2 load balancers that no registered targets.
Cost Optimization

Delete GCP instances without valid `lifetime` tag

Deletes GCP instances that don't specify a `lifetime` or `termination_date` tag.
Cost Optimization

Delete GCP disks that are unattached

Deletes GCP disks that are unattached (i.e. no users of the disk).
Cost Optimization

Delete empty Azure load balancers

Deletes empty Azure Load Balancers that have no backend configurations
Operations

Delete unused Azure network interfaces

Deletes unused Azure network interfaces that are not attached to a virtual machine.
Security

Remove unused EC2 key pairs

Finds all unused EC2 key pairs and deletes them.
Security

Restrict public S3 buckets with WRITE permissions

Finds all public S3 buckets with WRITE permissions and restricts them.
Security

Restrict public S3 buckets with READ permissions

Finds all public S3 buckets with READ permissions and restricts them.
Security

Remediate unencrypted S3 buckets

Finds all unencrypted S3 buckets and encrypts them with default encryption.
Security

Restrict S3 buckets with READ_ACP permissions to all Authenticated Users

Finds all S3 buckets with READ_ACP permissions to all Authenticated Users and restricts them.
Security

Restrict S3 buckets with WRITE_ACP permissions to all Authenticated Users

Finds all S3 buckets with WRITE_ACP permissions to all Authenticated Users and restricts them.
Security

Restricts S3 buckets with READ permissions to all Authenticated Users

Finds all S3 buckets with READ permissions to all Authenticated Users and restricts them.
Security

Restricts S3 buckets with WRITE permissions to all Authenticated Users

Finds all public S3 buckets with WRITE permissions to all Authenticated Users and restricts them.
Security

Restrict public S3 buckets with READ_ACP permissions

Finds all public S3 buckets with READ_ACP permissions and restricts them.
Security

Restrict public S3 buckets with WRITE_ACP permissions

Finds all public S3 buckets with WRITE_ACP permissions and restricts them.
Continuous Delivery

Run Terraform when Pull Request merged in GitHub

Run Terraform command (plan, apply, etc) when a Pull Request is merged to a repository in GitHub.
Incident Response

When a PagerDuty incident is triggered, send a message to Slack

Send a message to Slack when a PagerDuty incident is triggered based on incident severity
Incident Response

When a PagerDuty incident is triggered, create a Jira ticket

Create a Jira ticket when a PagerDuty incident is triggered based on incident severity
Incident Response

Send a Twilio SMS when PagerDuty incident triggers

Uses Twilio to send an SMS when a new PagerDuty incident is triggered
Incident Response

When a Datadog alert is triggered, send a message to Slack

Send a message to Slack when a Datadog alert is triggered
Incident Response

When a Datadog alert is triggered, create a Jira ticket

Create a Jira ticket when a Datadog alert is triggered
Continuous Delivery

Update Kubernetes deployment image tag on Docker Hub push

Updates a Kubernetes deployment image using a Docker Hub webhook that triggers when a new Docker image is available
Security

Assume IAM role and stop untagged EC2 instances

Uses AWS Security Token Service (STS) to assume an IAM role then stop untagged EC2 instances
Operations

Assume IAM role and list instances, images, key pairs, and volumes

Uses AWS Security Token Service (STS) to assume an IAM role then list instances, images, key pairs, and volumes
Operations

Provision an EC2 instance and configure it with Bolt

Provision an EC2 instance using Terraform and then configures the instance with Puppet Bolt
Operations

Connect Dynatrace and Relay to respond to problem events

A two-way connection between Dynatrace and Relay to act on problem reports
Configuration

Connect a Pulumi application in GitHub to Relay for CI/CD

This workflow receives webhook events from GitHub and runs Pulumi to preview or create resources in your application.