Cloud Data to Automation in Minutes

Shift Left, Empower Your Developers With Cloud Data

Access Real-Time, Quality Data

Fits Into Your Workflow

Find production AWS EBS Volumes without a snapshot

query Data_Tier_Instances_in_Oregon_without_Snapshots {
  ec2_vpcs(where: {vpc_id: {_eq: "vpc-085d9f5d25dfg56g3"}}) {
    vpc_id
    owner_id
    cidr_block
    ec2_instances(
      where: {subnet_id: {_eq: "subnet-018e139fe5678vf78"}, ec2_volume: {snapshot_id: {_is_null: true}}}
    ) {
      subnet_id
      instance_id
      ec2_volume {
        volume_id
        snapshot_id
      }
    }
  }
}

{
  "data": {
    "ec2_vpcs": [
      {
        "vpc_id": "vpc-085d9f5d25dfg56g3",
        "cidr_block": "10.40.0.0/16",
        "ec2_instances": [
          {
            "subnet_id": "subnet-018e139fe5678vf78",
            "instance_id": "i-0f463b4589b0b24cc",
            "ec2_volume": {
              "volume_id": "vol-01386af3359b45822",
              "snapshot_id": null
            }
          }
        ]
      }
    ]
  }
}
Find all AWS EC2 instances in Production VPC that are OS Type Windows and current state is Running

query MyQuery($_contains: jsonb = "") {
  ec2_instances(
    where: {platform: {_eq: "windows"}, vpc_id: {_eq: "vpc-0b8811ee55845tg65"}, state: {_contains: $_contains}, tags: {}}
  ) {
    instance_id
    instance_type
    platform
    tags
    state(path: "Name")
    vpc_id
  }
}

{
  "_contains": {
    "Name": "running"
  }
}

{
  "data": {
    "ec2_instances": [
      {
        "instance_id": "i-076b94b48d9d4444c",
        "instance_type": "t2.micro",
        "platform": "windows",
        "tags": [
          {
            "Key": "nOps",
            "Value": "test"
          }
        ],
        "state": "running",
        "vpc_id": "vpc-0b8811ee55845tg65"
      }
    ]
  }
}
Your company’s CISO is requesting a list of all AWS IAM Roles created between Jan 1st, 2019 and March 1st 2022.

query MyQuery {
    iam_roles(where: {create_date: {_lt: "2020-01-01", _gt: "2019-01-01"}}) {
        arn
        role_name
        create_date
        description
    }
}

{
    "data": {
        "iam_roles": [
            {
                "arn": "arn:aws:iam:: 202279755555:role/acme-demo-role",
                "role_name": "acme-demo-role",
                "create_date": "2022-02-17T19:01:58",
                "description": "Role used for Demo Environment"
            },
            {
                "arn": "arn:aws:iam:: 202279755555:role/service-role/AmazonSageMaker-ExecutionRole-20210525T234102",
                "role_name": "AmazonSageMaker-ExecutionRole-20210525T234102",
                "create_date": "2021-05-25T18:11:58",
                "description": "SageMaker execution role created from the SageMaker AWS Management Console."
            },
            {
                "arn": "arn:aws:iam:: 202279755555:role/aws-reserved/sso.amazonaws.com/AWSReservedSSO_region-restricted_55f4cd1d784548da",
                "role_name": "AWSReservedSSO_region-restricted_55f4cd1d784548da",
                "create_date": "2021-07-16T19:20:02",
                "description": "Role Reserved for SSO Regions"
            },
            {
                "arn": "arn:aws:iam:: 202279755555:role/aws-service-role/access-analyzer.amazonaws.com/AWSServiceRoleForAccessAnalyzer",
                "role_name": "AWSServiceRoleForAccessAnalyzer",
                "create_date": "2020-06-12T15:05:34",
                "description": "AWS Access Analyzer Role"
            },
            {
                "arn": "arn:aws:iam:: 202279755555:role/aws-service-role/auditmanager.amazonaws.com/AWSServiceRoleForAuditManager",
                "role_name": "AWSServiceRoleForAuditManager",
                "create_date": "2021-08-17T09:12:35",
                "description": "Auditing Manager Role"
            },
            {
                "arn": "arn:aws:iam:: 202279755555:role/aws-service-role/logger.cloudfront.amazonaws.com/AWSServiceRoleForCloudFrontLogger",
                "role_name": "AWSServiceRoleForCloudFrontLogger",
                "create_date": "2020-10-16T00:47:52",
                "description": "CloudFront Logger Service Role"
            },
            {
                "arn": "arn:aws:iam::202279755555:role/aws-service-role/compute-optimizer.amazonaws.com/AWSServiceRoleForComputeOptimizer",
                "role_name": "AWSServiceRoleForComputeOptimizer",
                "create_date": "2021-01-28T22:21:05",
                "description": "Allows ComputeOptimizer to call AWS services and collect workload details on your behalf."
            }
        ]
    }
}

Access your Cloud Data at your finger tips, empower your team to automate manual tasks.

nOps is a real-time event-driven Cloud data platform. nOps allows companies to automate mitigation and recurrence of cost, security, governance, and compliance.

Your team gets access to normalized cloud data through a GraphQL endpoint to automate routine tasks without the headache of managing Cloud data infrastructure. Companies can easily automate their reserved instances, tune Lambdas after their deployments, right-size resources, and automate countless manual tasks.