Compute Optimizer PNG and SVG Icon
AWS Compute Optimizer uses machine learning to recommend optimal AWS compute resources for your workloads to reduce cost and improve performance.
Last Modified: August 10, 2025

16px
32px
48px
64px
Details
Key Features
- Analyzes AWS resource configurations to recommend optimizations.
- Helps reduce costs and improve performance.
- Supports EC2, EBS, and Lambda.
- Provides right-sizing and scaling recommendations.
Common Use Cases
- Recommending optimal instance types for workloads
- Reducing costs by rightsizing resources
- Improving application performance through tuning
Explore More Icons
Secrets Manager
AWS Secrets Manager helps you securely store, retrieve, rotate, and manage access to sensitive information such as database credentials and API keys.
SQS Message
Amazon SQS Message refers to an individual data unit sent between distributed system components via Amazon Simple Queue Service.
CloudTrail
AWS CloudTrail records AWS API calls for your account, enabling governance, compliance, and operational and risk auditing.
Elastic Block Store
Amazon Elastic Block Store (EBS) provides block-level storage volumes for use with Amazon EC2, designed for high availability and durability.
AWS STS
AWS Security Token Service (STS) enables you to request temporary, limited-privilege credentials for AWS Identity and Access Management (IAM) users or federated users.
Glue
AWS Glue is a serverless data integration service that simplifies discovering, preparing, moving, and integrating data from various sources for analytics and ML.
DCV
NICE DCV is a high-performance remote display protocol that enables secure, low-latency access to remote desktop and application sessions, including 3D graphics workloads.
PrivateLink
AWS PrivateLink provides secure, private connectivity between VPCs, AWS services, and on-premises networks without exposing traffic to the public internet.
Account
AWS Account refers to your uniquely identified entity used to access AWS services and manage resources securely.
AWS Email refers to solutions like Amazon SES that help developers send marketing, notification, and transactional emails using scalable and cost-effective infrastructure.
Service Management Connector
AWS Service Management Connector integrates AWS services like Service Catalog with third-party ITSM tools such as ServiceNow or Jira Service Management.
Quantum Ledger Database
Amazon Quantum Ledger Database (QLDB) is a fully managed ledger database that provides a transparent, immutable, and cryptographically verifiable transaction log owned by a central trusted authority.
EMR
Amazon EMR (Elastic MapReduce) is a cloud big data platform for processing massive amounts of data using open-source tools like Apache Spark, Hive, and Hadoop.
Site to Site VPN
AWS Site-to-Site VPN connects your on-premises network to AWS over an IPsec VPN tunnel for secure communication.
Config
AWS Config enables you to assess, audit, and evaluate configurations of your AWS resources for compliance and security.
Elastic Inference
Amazon Elastic Inference allows you to attach low-cost GPU-powered inference acceleration to Amazon EC2 and SageMaker instances.
Auto Scaling
AWS Auto Scaling automatically adjusts the capacity of your AWS resources to maintain steady, predictable performance at the lowest possible cost.
IAM Role
An IAM Role in AWS is an identity with specific permissions that can be assumed by trusted entities, enabling access to AWS resources without long-term credentials.
Kinesis Data Streams
Amazon Kinesis Data Streams is a service for building real-time data streaming applications that can continuously ingest and process large volumes of data.
Elastic Disaster Recovery
AWS Elastic Disaster Recovery enables fast, reliable disaster recovery of on-premises and cloud-based applications to AWS.
Control Tower
AWS Control Tower provides a guided setup to create a secure, multi-account AWS environment based on AWS best practices.
Backint Agent
AWS Backint Agent allows SAP HANA backups directly to Amazon S3, ensuring secure and efficient backup processes.
IAM Permissions
IAM Permissions define what actions users and roles can take on which resources, using policies attached to IAM identities or resources.
Deep Learning Containers
AWS Deep Learning Containers are Docker images pre-installed with deep learning frameworks for training and inference on Amazon ECS and EKS.