Excessive Retry-Induced Token Consumption
excessive-retry-induced-token-consumption
Outdated or Overpowered Model Configuration
outdated-or-overpowered-model-configuration
Misapplied Embedding Architecture
misapplied-embedding-architecture
Excessive Logging Configuration
excessive-logging-configuration
Overprovisioned Minimum Capacity
overprovisioned-minimum-capacity
Missing Caching Layer
missing-caching-layer
Overprovisioned Capacity Allocation
overprovisioned-capacity-allocation
Misaligned Pricing Model
misaligned-pricing-model
Unnecessary Continuous Provisioning
unnecessary-continuous-provisioning
Outdated Runtime Version
outdated-runtime-version
Unoptimized Pricing Model
unoptimized-pricing-model
Outdated Model Selection
outdated-model-selection
Overpowered Model Selection
overpowered-model-selection
Overprovisioned Deployment Model
overprovisioned-deployment-model
Incorrect Compute Tier Selection
incorrect-compute-tier-selection
Misaligned Storage Destination
misaligned-storage-destination
Cross-Region Data Movement
cross-region-data-movement
Excessive Log Verbosity
excessive-log-verbosity
Excessive Ingestion of Low-Value Logs
excessive-ingestion-of-low-value-logs
Redundant Log Routing Configuration
redundant-log-routing-configuration
Licensing Configuration Gap
licensing-configuration-gap
Suboptimal Deployment Model
suboptimal-deployment-model
Operational Overhead from Custom Image Maintenance
operational-overhead-from-custom-image-maintenance
Unreleased Compute Resources After Failure
unreleased-compute-resources-after-failure
Suboptimal Architecture Selection
suboptimal-architecture-selection
Outdated Engine Version
outdated-engine-version
Version Sprawl
version-sprawl
Misconfigured Performance Optimization
misconfigured-performance-optimization
Missing Lifecycle Policy
missing-lifecycle-policy
Misaligned Storage Tiering
misaligned-storage-tiering
Over-Recording of Ephemeral Resources
over-recording-of-ephemeral-resources
Excessive Retention Configuration
excessive-retention-configuration
Excessive Recording Frequency
excessive-recording-frequency
Suboptimal Cluster Configuration
suboptimal-cluster-configuration
Contract Lifecycle Mismanagement
contract-lifecycle-mismanagement
Subscription Disruption Due to Billing Migration
subscription-disruption-due-to-billing-migration
Suboptimal Recording Configuration
suboptimal-recording-configuration
Outdated Resource Selection
outdated-resource-selection
Pricing Model Misalignment
pricing-model-misalignment
Excessive Retention of Non-Critical Data
excessive-retention-of-non-critical-data
Suboptimal Data Layout
suboptimal-data-layout
Inefficient Query Patterns
inefficient-query-patterns
Retry Misconfiguration
retry-misconfiguration
Idle Resource with Baseline Cost
idle-resource-with-baseline-cost
Overprovisioned Resource Allocation
overprovisioned-resource-allocation
Inactive Resource Consuming Baseline Costs
inactive-resource-consuming-baseline-costs
Underutilized Commitment
underutilized-commitment
Misconfiguration Leading to Future Orphaned Resource
misconfiguration-leading-to-future-orphaned-resource
Misconfigured Storage Tier
misconfigured-storage-tier
Over-Retention of Data
over-retention-of-data
Recursive Invocation Misconfiguration
recursive-invocation-misconfiguration
Misconfigured Logging
misconfigured-logging
Misconfigured Redundancy
misconfigured-redundancy
Idle Resource
idle-resource
Misconfigured Architecture
misconfigured-architecture
Suboptimal Workload Distribution
suboptimal-workload-distribution
Missing Cost Control Configuration
missing-cost-control-configuration
Overprovisioned Networking Resource
overprovisioned-networking-resource
Orphaned Storage Resource
orphaned-storage-resource
Inactive Storage Resource
inactive-storage-resource
Underutilized Compute Resource
underutilized-compute-resource
Inactive and Detached Volume
inactive-and-detached-volume
Inactive Resource
inactive-resource
Suboptimal Lifecycle Configuration
suboptimal-lifecycle-configuration
Suboptimal Data Layout or Format
suboptimal-data-layout-or-format
Suboptimal Storage Tier
suboptimal-storage-tier
Overprovisioned Resource
overprovisioned-resource-b6fad
Unused Resource
unused-resource-0f8ec
Visibility Gap
visibility-gap
Underutilized Resource
underutilized-resource
Underutilization
underutilization
Suboptimal Instance Selection
suboptimal-instance-selection
Suboptimal Query Routing and Warehouse Utilization
suboptimal-query-routing-and-warehouse-utilization
Suboptimal Pricing Model
suboptimal-pricing-model
Suboptimal Instance Family Selection
suboptimal-instance-family-selection-d5677
Suboptimal Configuration
suboptimal-configuration
Suboptimal Execution Model
suboptimal-execution-model
Suboptimal Configuration and Usage
suboptimal-configuration-and-usage
Retained Unused Resource
retained-unused-resource
Redundant Configuration
redundant-configuration
Orphaned Resource
orphaned-resource
Misconfiguration
misconfiguration
Modernization
modernization
Inefficient Storage Tiering
inefficient-storage-tiering
Missing Safeguard
missing-safeguard
Inefficient Storage Usage
inefficient-storage-usage
Inefficient Network Configuration
inefficient-network-configuration
Inefficient Scheduling
inefficient-scheduling
Inefficient Resource Usage
inefficient-resource-usage
Inefficient Query Pattern
inefficient-query-pattern
Inefficient Data Ingestion
inefficient-data-ingestion
Behavioral Inefficiency
behavioral-inefficiency
Inefficient Architecture
inefficient-architecture
Excessive Data Retention
excessive-data-retention
Inefficient Configuration
inefficient-configuration-78a8f
Overprovisioned Resource
overprovisioned-resource
Unused Resource
unused-resource
Suboptimal Instance Family Selection
suboptimal-instance-family-selection
Commitment Misalignment
commitment-misalignment