CloudKnifeCloudKnife
PlatformCore Optimization Intelligence

Turn usage into safe optimisation decisions.

CloudKnife identifies rightsizing, waste, and scheduling opportunities and explains the evidence behind each recommendation,so teams can approve changes with confidence.

ModeRead-only first
TraceabilityEvidence + assumptions
ControlHuman-approved
What you get
A prioritized queue of opportunities, each with impact, risk, and evidence,ready for review and approval.
What it looks like

Recommendations with evidence attached

A technical view built for review: impact, risk, confidence, and the “why”.

Recommendations queue

Prioritised queue with impact, risk, and evidence in one view.

Rightsizing with defendable proof

Uses observed usage profiles (avg + tail behavior) and visible safety buffers.

Waste detection with context

Flags idle/orphaned resources with ownership and activity signals, not just “unused”.

No black box scoring,just transparent inputs.
Capabilities

Optimisation outcomes

Scan fast. Each outcome links to evidence.

Right-size to actual demand

Capacity recommendations based on observed usage profiles,not guesswork.

Eliminate idle & orphaned resources

Detect waste with ownership and usage signals before proposing actions.

Scheduling for predictable workloads

Spot consistent off-hours and propose safe runtime schedules.

Reservation & commitment optimisation

Quantify savings and break-even, aligned to real utilisation.

Region & placement optimisation

Highlight savings opportunities while respecting policy and latency constraints.

Evidence

Usage profiles and assumptions are explicit

Make risk visible: tail behavior, buffers.

Evidence view

Metrics, tail behavior, buffers, and assumptions,explicit.

How we decide it’s safe

Every action includes the exact metrics, time windows, and stats used.

Avoids unsafe downgrades by checking constraints, features, and dependencies.

Safety headroom is visible (e.g., +X% buffer). No hidden heuristics.

Recommendations respect governance boundaries and can be audited later.

Governance-friendly by default.
Workflow

From data to safe action

A repeatable process teams can audit.

1
Observe

Collect usage signals per workload and environment.

2
Evaluate

Quantify impact and risk with transparent assumptions.

No black box.
Platform
Get technical clarity before touching production

Start in read-only. Review evidence, assumptions,then decide what to approve.