Connecting AWS CUR
Step-by-step guide on how to enable AWS CUR
Last updated
Step-by-step guide on how to enable AWS CUR
Last updated
PerfectScale has created a detailed guide to help you effortlessly enable AWS CUR.
In order to start using AWS CUR, follow the steps provided below:
Sign in to the .
Go to Data Exports
in the navigation pane and choose Create
.
In the Export type choose Legacy CUR export.
Enter a Report name
for your report (for example: cur-perfectscale-example
).
Select Refresh automatically
in the Export Content / Data refresh settings .
In the Data export delivery options for Report data time granularity choose one of the following options:
Hourly
to aggregate the line items in the report by hour.
Daily
to aggregate the line items in the report by day.
Monthly
to aggregate the line items in the report by month.
For Report data integration choose Amazon Athena.
In the Data export storage settings, configure the section following one of these steps:
Select the existing bucket (if you already have S3 bucket).
Select Create a bucket, enter a bucket name, and choose the Region for the new bucket.
For the S3 path prefix, enter the report path prefix you want to prepend to the name of your report.
Add Tags if needed.
Review the settings for your report and click Create report
.
If your AWS account is a part of an AWS Organization or if you manage multiple AWS accounts within the same organization, you can centralize billing data using the management (primary) account of the AWS Organization. This setup allows you to configure AWS CUR only once and get a detailed view of costs and usage across all accounts, enabling better cost management across your entire organization.
When CUR is enabled at the organization level, it automatically collects cost and usage data from all member accounts, simplifying expense tracking and management across multiple accounts in a centralized way. This setup allows you to utilize a single AWS CUR for all pricing profiles, requiring only a change in the region where your Kubernetes cluster is installed.
Set up Amazon Athena using AWS CloudFormation templates.
Go to Object actions, and click Download as
.
In case of using AWS CloudFormation for the first time, select Create New Stack
and click With new resources (standard)
in the dropdown list.
Otherwise - Create Stack
.
Select Choose an existing template
in Prerequisite - Prepare template.
Select Upload a template file
in Specify template.
After clicking Choose file
select the downloaded .yml
template, and click Open
.
As a next step, enter the Stack name for your template, name cur-perfectscale-example
, add tags, if needed, and go to the next page.
The template creates the following resources:
Three IAM roles
An AWS Glue database
An AWS Glue crawler
Two Lambda functions
An Amazon S3 notification
To ensure the template is configured properly, check the status
in stack info
.
Click Edit settings
on the top right corner
In the Query result location and encryption
write down the path to the created for the CUR bucket, or use another bucket (for example, s3://cur-perfectscale-example/
athena
/
) and click Save
.
There are two ways to grant us access to your CUR:
Delegate access across AWS accounts using IAM roles (recommended).
Create a separate IAM user.
Go to AWS IAM service
Chose Policy
and click Create Policy
.
Add the following JSON permissions to the policy.
Choose Roles
and then choose to Create a Role
in the navigation pane.
Choose the An AWS account
role type.
Select Another AWS account
.
For Account ID
, enter 888061904880.
In the Options, choose Require external ID
and write down your External ID
Choose Next: Permissions
to set the permissions associated with the role.
Select the check box next to the policy you created before.
Name the user and click Next
.
(Optional) Add description and metadata to the role by attaching tags as key-value pairs (you may need it for more information about using tags in IAM).
After reviewing the role, choose Create role
.
Go to AWS IAM service.
Go to Policy
and click Create Policy
.
Add the following JSON permissions to the policy and move to the next step.
Name your policy and click Create Policy
.
Go to User and click Create User
.
Name the user and click Next
.
Select your policy in the Attach policies directly
and move to the next step.
Create User
Select just created user, go to Security_credentials, and click Create access key
.
Copy the generated Access key/Secret access key and paste it into the CUR profile.
Visit the official AWS documentation for more details
After enabling CUR, in order to start using the integration, you need to create a AWS CUR Pricing Profile and apply it to the desired cluster.
Go to the Settings
tab on the left panel -> select Pricing
-> click the +Add Profile
button -> select AWS CUR
-> name the profile and put the needed values in the relevant fields -> click Save
button.
Go to the Overview
tab on the left panel -> find the cluster to which you want to apply the custom Pricing Profile
and click three dots
button -> select Cluster Settings
-> go to Customizations
-> click on Add New Profile
in the Pricing Profile
drop-down list -> select AWS CUR
type -> name and configure your profile -> click the Save And Apply
button -> click the Save Changes
button.
athena_result_bucket
: the S3 bucket, where Athena stores query results.
athena_region
: the AWS region where Athena is running.
athena_database
: the name of the database created on Athena setup.
athena_table
: the name of the table, created on Athena setup.
aws_account_id:
AWS account, where the cluster is running.
aws_external_id
: the ID for cross-account access in AWS Identity and Access Management (IAM).
role_arn
: the Amazon Resource Name associated with the role possessing the necessary credentials to execute calls on your behalf.
To verify if AWS CUR is configured properly, click the Test Integration button.
To apply AWS CUR Pricing Profile
to the cluster, go to the Overview
tab on the left panel -> find the cluster to which you want to apply the AWS CUR Pricing Profile
and click three dots
button -> select Cluster Settings
-> go to Customizations
-> select the needed profile in the Pricing Profile
drop-down list.
To apply the profile to multiple clusters from a single view, use the Manage Assignments
feature.
Go to the Settings
tab on the left panel -> select the Pricing
-> click the Manage Assignments
button -> apply the profiles for the needed clusters -> click the Save Changes
button.
Go to the .
In the S3 bucket that you opted to receive the AWS CUR report (cur-perfectscale-example) in the folder report path prefix(your-report-path-prefix)/report name (your-report-name) you will find template file .
Navigate to the .
Tick the check box at the bottom of the page and click Submit
.
I acknowledge that AWS CloudFormation might create IAM resources
Go to the Amazon Athena service and select .
Return to the and run the following query to ensure the configuration works properly:
select status from cost_and_usage_data_status
NOTE: there is no “-“ in the name of athena. AWS replaces all “-“with “_“
You should now obtain the role's Amazon Resource Name (ARN), a unique identifier for the role you need to add to the PerfectScale . Example: arn:aws:iam::989068116150:role/access-perfectscale-account-to-cur).
NOTE: there is no “-“ in the name of athena. AWS replaces all “-“with “_“
There are two options for creating a Profile: or directly .
When the configuration is correct, you will see the message AWS CUR Configured Correctly.
In case of AWS CUR Configured Wrongly response, check the Show integration failure details
dropdown and fix the displayed issues.