Connecting AWS CUR

Step-by-step guide on how to enable AWS CUR

PerfectScale has created a detailed guide to help you effortlessly enable AWS CUR.

In order to start using AWS CUR, follow the steps provided below:

Create Cost and Usage Reports

  1. Go to Data Exportsin the navigation pane and choose Create.

  2. In the Export type choose Legacy CUR export.

  3. Enter a Report name for your report (for example: cur-perfectscale-example).

  4. Select Refresh automatically in the Export Content / Data refresh settings .

  5. In the Data export delivery options for Report data time granularity choose one of the following options:

    • Hourly to aggregate the line items in the report by hour.

    • Daily to aggregate the line items in the report by day.

    • Monthly to aggregate the line items in the report by month.

    To get more detailed data, PerfectScale recommends aggregating the line items in the report Hourly.

  6. For Report data integration choose Amazon Athena.

  7. In the Data export storage settings, configure the section following one of these steps:

    • Select the existing bucket (if you already have S3 bucket).

    • Select Create a bucket, enter a bucket name, and choose the Region for the new bucket.

  8. For the S3 path prefix, enter the report path prefix you want to prepend to the name of your report.

  9. Add Tags if needed.

  10. Review the settings for your report and click Create report.

It can take up to 24 hours for AWS to deliver your first report to your Amazon S3 bucket.

CUR master account support

If your AWS account is a part of an AWS Organization or if you manage multiple AWS accounts within the same organization, you can centralize billing data using the management (primary) account of the AWS Organization. This setup allows you to configure AWS CUR only once and get a detailed view of costs and usage across all accounts, enabling better cost management across your entire organization.

When CUR is enabled at the organization level, it automatically collects cost and usage data from all member accounts, simplifying expense tracking and management across multiple accounts in a centralized way. This setup allows you to utilize a single AWS CUR for all pricing profiles, requiring only a change in the region where your Kubernetes cluster is installed.

If you are setting up CUR in the master account, ensure that all subsequent configurations (CUR, Athena, and IAM) are also completed in this account.

Set up Amazon Athena

Set up Amazon Athena using AWS CloudFormation templates.

AWS CloudFormation doesn't support cross-region resources. In order to use an AWS CloudFormation template, all the resources should be created in the same AWS Region. The Region must support the following services:

  • AWS Lambda

  • Amazon Simple Storage Service (Amazon S3)

  • AWS Glue

  • Amazon Athena

  1. In the S3 bucket that you opted to receive the AWS CUR report (cur-perfectscale-example) in the folder report path prefix(your-report-path-prefix)/report name (your-report-name) you will find template file crawler-cfn.yml.

    AWS generate automatically template file and it can take up to 24h to generate from creating CUR

  2. Go to Object actions, and click Download as.

  3. In case of using AWS CloudFormation for the first time, select Create New Stack and click With new resources (standard) in the dropdown list.

    Create new stack

    Otherwise - Create Stack.

  4. Select Choose an existing template in Prerequisite - Prepare template.

  5. Select Upload a template file in Specify template.

  6. After clicking Choose file select the downloaded .yml template, and click Open.

  7. As a next step, enter the Stack name for your template, name cur-perfectscale-example, add tags, if needed, and go to the next page.

  8. Tick the check box at the bottom of the page and click Submit. I acknowledge that AWS CloudFormation might create IAM resources

    The template creates the following resources:

    • Three IAM roles

    • An AWS Glue database

    • An AWS Glue crawler

    • Two Lambda functions

    • An Amazon S3 notification

  9. To ensure the template is configured properly, check the status in stack info.

    Template status

Run Amazon Athena queries

  1. Go to the Amazon Athena service and select Query editor.

  2. Click Edit settings on the top right corner

    Amazon Athena settings1
  3. In the Query result location and encryption write down the path to the created for the CUR bucket, or use another bucket (for example, s3://cur-perfectscale-example/athena/ ) and click Save.

    Amazon Athena settings2
  4. Return to the Query editor and run the following query to ensure the configuration works properly: select status from cost_and_usage_data_status

    Amazon Athena settings3

Configure the authentication method

There are two ways to grant us access to your CUR:

  1. Delegate access across AWS accounts using IAM roles (recommended).

  2. Create a separate IAM user.

How to delegate access with IAM roles

  1. Go to AWS IAM service

  2. Chose Policy and click Create Policy.

  3. Add the following JSON permissions to the policy.

Replace the s3 bucket name and athena/glue names with yours.

💡 NOTE: there is no “-“ in the name of athena. AWS replaces all “-“with “_“

Add JSON permissions to the policy
{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Sid": "BaseAthenaPermissions",
            "Effect": "Allow",
            "Action": [
                "athena:*"
            ],
            "Resource": [
                "arn:aws:athena:*:*:workgroup/primary",
                "arn:aws:athena:*:*:datacatalog/athenacurcfn_cur_perfectscale_example"
            ]
        },
        {
            "Sid": "BaseGluePermissions",
            "Effect": "Allow",
            "Action": [
                "glue:CreateDatabase",
                "glue:DeleteDatabase",
                "glue:GetDatabase",
                "glue:GetDatabases",
                "glue:UpdateDatabase",
                "glue:CreateTable",
                "glue:DeleteTable",
                "glue:BatchDeleteTable",
                "glue:UpdateTable",
                "glue:GetTable",
                "glue:GetTables",
                "glue:BatchCreatePartition",
                "glue:CreatePartition",
                "glue:DeletePartition",
                "glue:BatchDeletePartition",
                "glue:UpdatePartition",
                "glue:GetPartition",
                "glue:GetPartitions",
                "glue:BatchGetPartition",
                "glue:StartColumnStatisticsTaskRun",
                "glue:GetColumnStatisticsTaskRun",
                "glue:GetColumnStatisticsTaskRuns"
            ],
            "Resource": [
                "arn:aws:glue:*:*:catalog",
                "arn:aws:glue:*:*:database/athenacurcfn_cur_perfectscale_example",
                "arn:aws:glue:*:*:table/athenacurcfn_cur_perfectscale_example/*"
            ]
        },
        {
            "Sid": "BaseQueryResultsPermissions",
            "Effect": "Allow",
            "Action": [
                "s3:GetBucketLocation",
                "s3:GetObject",
                "s3:ListBucket",
                "s3:ListBucketMultipartUploads",
                "s3:ListMultipartUploadParts",
                "s3:AbortMultipartUpload",
                "s3:PutObject",
                "s3:PutBucketPublicAccessBlock"
            ],
            "Resource": [
                "arn:aws:s3:::cur-perfectscale-example*"
            ]
        },
        {
            "Sid": "BaseS3BucketPermissions",
            "Effect": "Allow",
            "Action": [
                "s3:ListBucket",
                "s3:GetBucketLocation",
                "s3:ListAllMyBuckets"
            ],
            "Resource": [
                "*"
            ]
        },
        {
            "Sid": "BasePricingPermissions",
            "Effect": "Allow",
            "Action": [
                "pricing:GetProducts"
            ],
            "Resource": [
                "*"
            ]
        }
    ]
}
  1. Choose Roles and then choose to Create a Role in the navigation pane.

  2. Choose the An AWS account role type.

  3. Select Another AWS account.

  4. For Account ID, enter 888061904880.

  5. In the Options, choose Require external ID and write down your External ID

    External ID is a unique, user-defined string used when setting up cross-account access in AWS Identity and Access Management (IAM). This additional security measure ensures that only trusted third-party entities can assume a specific role.

    The external ID can be any string you define (a combination of random numbers, letters, or both).

    Examples: YourCompanyName-Partner-2024-UniqueString 3JdpNfwvkpw4rs1sGsdrF0rM1R2 f47ac10b-58cc-4372-a567-0e02b2c3d479

  6. Choose Next: Permissions to set the permissions associated with the role.

  7. Select the check box next to the policy you created before.

  8. Name the user and click Next.

  9. (Optional) Add description and metadata to the role by attaching tags as key-value pairs (you may need it for more information about using tags in IAM).

  10. After reviewing the role, choose Create role.

  11. You should now obtain the role's Amazon Resource Name (ARN), a unique identifier for the role you need to add to the PerfectScale AWS CUR Profile. Example: arn:aws:iam::989068116150:role/access-perfectscale-account-to-cur).

How to create IAM user for CUR integration

  1. Go to AWS IAM service.

  2. Go to Policy and click Create Policy.

  3. Add the following JSON permissions to the policy and move to the next step.

Replace the s3 bucket name and athena/glue names with yours.

💡 NOTE: there is no “-“ in the name of athena. AWS replaces all “-“with “_“

Add JSON permissions to the policy
{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Sid": "BaseAthenaPermissions",
            "Effect": "Allow",
            "Action": [
                "athena:*"
            ],
            "Resource": [
                "arn:aws:athena:*:*:workgroup/primary",
                "arn:aws:athena:*:*:datacatalog/athenacurcfn_cur_perfectscale_example"
            ]
        },
        {
            "Sid": "BaseGluePermissions",
            "Effect": "Allow",
            "Action": [
                "glue:CreateDatabase",
                "glue:DeleteDatabase",
                "glue:GetDatabase",
                "glue:GetDatabases",
                "glue:UpdateDatabase",
                "glue:CreateTable",
                "glue:DeleteTable",
                "glue:BatchDeleteTable",
                "glue:UpdateTable",
                "glue:GetTable",
                "glue:GetTables",
                "glue:BatchCreatePartition",
                "glue:CreatePartition",
                "glue:DeletePartition",
                "glue:BatchDeletePartition",
                "glue:UpdatePartition",
                "glue:GetPartition",
                "glue:GetPartitions",
                "glue:BatchGetPartition",
                "glue:StartColumnStatisticsTaskRun",
                "glue:GetColumnStatisticsTaskRun",
                "glue:GetColumnStatisticsTaskRuns"
            ],
            "Resource": [
                "arn:aws:glue:*:*:catalog",
                "arn:aws:glue:*:*:database/athenacurcfn_cur_perfectscale_example",
                "arn:aws:glue:*:*:table/athenacurcfn_cur_perfectscale_example/*"
            ]
        },
        {
            "Sid": "BaseQueryResultsPermissions",
            "Effect": "Allow",
            "Action": [
                "s3:GetBucketLocation",
                "s3:GetObject",
                "s3:ListBucket",
                "s3:ListBucketMultipartUploads",
                "s3:ListMultipartUploadParts",
                "s3:AbortMultipartUpload",
                "s3:PutObject",
                "s3:PutBucketPublicAccessBlock"
            ],
            "Resource": [
                "arn:aws:s3:::cur-perfectscale-example*"
            ]
        },
        {
            "Sid": "BaseS3BucketPermissions",
            "Effect": "Allow",
            "Action": [
                "s3:ListBucket",
                "s3:GetBucketLocation",
                "s3:ListAllMyBuckets"
            ],
            "Resource": [
                "*"
            ]
        },
        {
            "Sid": "BasePricingPermissions",
            "Effect": "Allow",
            "Action": [
                "pricing:GetProducts"
            ],
            "Resource": [
                "*"
            ]
        }
    ]
}
  1. Name your policy and click Create Policy.

  2. Go to User and click Create User.

  3. Name the user and click Next.

  4. Select your policy in the Attach policies directly and move to the next step.

  5. Create User

  6. Select just created user, go to Security_credentials, and click Create access key.

  7. Copy the generated Access key/Secret access key and paste it into the CUR profile.


Visit the official AWS documentation for more details


AWS CUR profile

After enabling CUR, in order to start using the integration, you need to create a AWS CUR Pricing Profile and apply it to the desired cluster.

🛠️ How to create AWS CUR profile

There are two options for creating a Profile: from the Settings tab or directly from the Overview.

From the Settings tab

Go to the Settings tab on the left panel -> select Pricing -> click the +Add Profile button -> select AWS CUR -> name the profile and put the needed values in the relevant fields -> click Save button.

AWS CUR profile from the settings

To verify the accuracy of your AWS CUR Profile configuration, simply click on the Test Integration button. When the configuration is correct, you will see the message AWS CUR Configured Correctly . In case of AWS CUR Configured Wrongly response, check, and ensure the correctness of the data.

From the Overview tab

Go to the Overview tab on the left panel -> find the cluster to which you want to apply the custom Pricing Profile and click three dots button -> select Cluster Settings -> go to Customizations -> click on Add New Profile in the Pricing Profile drop-down list -> select AWS CUR type -> name and configure your profile -> click the Save And Apply button -> click the Save Changes button.

AWS CUR profile from the overview

AWS CUR profile configuration

AWS CUR profile configuration

athena_result_bucket: the S3 bucket, where Athena stores query results.

athena_region: the AWS region where Athena is running.

athena_database: the name of the database created on Athena setup.

athena_table: the name of the table, created on Athena setup.

aws_account_id: AWS account, where the cluster is running.

aws_external_id: the ID for cross-account access in AWS Identity and Access Management (IAM).

role_arn: the Amazon Resource Name associated with the role possessing the necessary credentials to execute calls on your behalf.

asw_external_id is a unique, user-defined string used when setting up cross-account access in AWS Identity and Access Management (IAM). This additional security measure ensures that only trusted third-party entities can assume a specific role.

The external ID can be any string you define (a combination of random numbers, letters, or both).

Examples: YourCompanyName-Partner-2024-UniqueString 3JdpNfwvkpw4rs1sGsdrF0rM1R2 f47ac10b-58cc-4372-a567-0e02b2c3d479

NOTE: Alternatively, you can authenticate using credentials. To authenticate with the credentials, replace role_arn with the two following fields in the configuration above:

access_key_id: the ID of a long-term credential for a specific user in AWS (IAM, root).

secret_access_key: the Secret Key for an Access Key (can only be retrieved upon creation). If the access is lost, the secret key must be recreated.

As a result, your configuration will look like this:

aws_account_id: ''
aws_external_id: ''
athena_result_bucket: ''
athena_region: ''
athena_database: ''
athena_table: ''
access_key_id: ''
secret_access_key: ''

AWS CUR configuration verification

To verify if AWS CUR is configured properly, click the Test Integration button.

🟢 When the configuration is correct, you will see the message AWS CUR Configured Correctly.

🔴 In case of AWS CUR Configured Wrongly response, check the Show integration failure details dropdown and fix the displayed issues.

Wrong AWS CUR profile configuration

🛠️ How to apply AWS CUR profile

Apply to a single cluster

To apply AWS CUR Pricing Profile to the cluster, go to the Overview tab on the left panel -> find the cluster to which you want to apply the AWS CUR Pricing Profile and click three dots button -> select Cluster Settings -> go to Customizations -> select the needed profile in the Pricing Profile drop-down list.

Applying a single AWS CUR profile to the cluster

Apply to multiple clusters

To apply the profile to multiple clusters from a single view, use the Manage Assignments feature.

Go to the Settings tab on the left panel -> select the Pricing -> click the Manage Assignments button -> apply the profiles for the needed clusters -> click the Save Changes button.

Applying AWS CUR profile to multiple clusters

Last updated