What Tracer/sweep does
Tracer/sweep analyzes execution activity across your cloud compute environment to identify waste that is otherwise hard to detect. It:- Scans compute based on real runtime activity
- Identifies inefficiencies that persist across runs and instances
- Surfaces opportunities for cost reduction with minimal investigation
- Delivers results quickly, without requiring long tuning cycles

What makes Tracer/sweep different
Most cloud cost tools rely on:- Billing aggregates
- Tags and allocation rules
- Coarse utilization metrics
- Predictive or AI-driven shutdown recommendations
These approaches often miss execution-level inefficiencies or introduce risk by acting on incomplete information.
Execution-based
Relies on observed execution and activity patterns
Deep visibility
Detects waste inside instances that appear “active”
Safe
Avoids predictive shutdown heuristics that can cause errors
Zero setup
Requires no tagging discipline or manual classification
What Tracer/sweep finds
Tracer/sweep identifies several common classes of hidden waste:Idle time inside active instances
Idle time inside active instances
Instances that are running and billed, but spend significant time doing no useful work.
Idle resource detection
Idle resource detection
Tracer/sweep detects idle resources that remain active and billed, including:
- EC2 instances that are running but not executing meaningful work
- AWS Batch workers that are provisioned but stuck idle
- Instances with negligible CPU activity over extended periods
These resources often appear “active” in cloud dashboards but contribute no useful execution. By relying on observed execution activity rather than instance state alone, Tracer/sweep highlights resources that can be safely reviewed for shutdown or resizing.
Underutilized instances that look busy on paper
Underutilized instances that look busy on paper
Compute that appears active due to long runtimes or background activity, but shows low real utilization.
Forgotten or orphaned resources
Forgotten or orphaned resources
Instances or workers that remain active without meaningful execution over time (where observable).
Outputs
Tracer/sweep produces:- Ranked cost-saving opportunities, prioritized by impact
- Suggested actions, such as resizing, consolidating, or retiring resources
- Estimated impact ranges, based on observed usage patterns (when available)
What Tracer/sweep does not do
Tracer/sweep is intentionally conservative.Requirements
Tracer/sweep requires Tracer/collect to be installed so execution activity can be observed. It operates using:- Execution signals captured by Tracer/collect (Not required, but recommended)
- Cloud cost and usage data from supported providers (AWS currently supported)
Install Tracer/sweep
Connect your AWS account in the Tracer UI and get results in minutes. Tracer/sweep requires read-only access to your AWS account to analyze cloud usage and execution activity. Setup takes a few minutes and does not modify any running resources.Prerequisites
- An AWS account with permission to create IAM roles
- Access to the Tracer UI
- No agents, code changes, or tagging required
1
Create a read-only IAM role
Tracer/sweep uses a dedicated, read-only IAM role to access cost and execution metadata.
- Open the AWS CloudFormation link provided in the Tracer UI.
- Deploy the CloudFormation stack in your AWS account.
- The External ID is pre-filled and does not need to be changed.
2
Enter the role ARN
After the CloudFormation stack finishes deploying:
- Copy the Role ARN from the CloudFormation output named
TracerReadRoleArn. - Paste the role ARN into the Role ARN field in the Tracer UI.
- Save the configuration.
3
Review results
Once connected, Tracer/sweep immediately begins to analyze your environment. You can:
- Review up to 90 days of cloud spend
- See what is running now
- Identify idle or underutilized resources
- Estimate potential cloud waste based on observed execution activity
Security model
- The IAM role is read-only
- Tracer does not start, stop, or modify resources
- No application data, environment variables, or secrets are accessed
- You can revoke access at any time by deleting the IAM role
What happens next
After setup:- Tracer/sweep highlights ranked cost-saving opportunities
- Findings are based on observed execution behavior, not predictions
- You remain in full control of any actions taken

