How recommendations are generated
When a Gemini API key is configured, InfraAudit sends each finding (drift, vulnerability, or cost anomaly) to the Gemini API along with context about the affected resource: its type, configuration, cloud provider, and severity. Gemini returns a structured recommendation with:- A plain-language explanation of the problem
- Specific step-by-step remediation instructions
- Estimated cost savings (for cost recommendations) or a risk reduction score (for security)
Recommendation types
| Type | Examples |
|---|---|
| Cost | Right-size an overprovisioned EC2 instance, purchase Reserved Instances, remove idle resources |
| Security | Enable S3 bucket encryption, restrict security group ingress, rotate access keys |
| Performance | Scale up an instance hitting CPU limits, migrate a high-I/O workload to provisioned IOPS |
Recommendation list
In the sidebar, click Recommendations. The list shows:| Column | Description |
|---|---|
| Title | Short description of the recommendation |
| Type | Cost, security, or performance |
| Severity | Severity of the underlying finding |
| Estimated impact | Monthly savings (cost) or risk score reduction (security) |
| Resource | The affected resource |
| Status | pending, applied, or dismissed |
Recommendation detail
Click any recommendation to see:- The full explanation of the problem
- Step-by-step remediation instructions
- An Apply fix button (if automated remediation is available for this recommendation type)
- A Dismiss button (to hide it from the active list while keeping it in the database)
- A Copy button (to copy the steps to your clipboard)
Applying a recommendation
When an automated remediation action is available, an Apply fix button appears on the recommendation. Clicking it either:- Executes the fix immediately, if auto-execution is enabled in your remediation settings
- Creates a pending remediation action in the approval queue, if approval is required
Generating recommendations on demand
You can request a recommendation for a specific resource at any time from the resource detail panel. Open the resource, go to the Recommendations tab, and click Generate recommendation. Via CLI:Next steps
- Remediation — apply fixes with a rollback window
- Cost optimization — understand cost savings recommendations in context
- Drift detection — see the security findings that drive security recommendations