You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/cost-management-billing/costs/aws-integration-manage.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ titleSuffix: Microsoft Cost Management
4
4
description: This article helps you understand how to use cost analysis and budgets in Cost Management to manage your AWS costs and usage.
5
5
author: bandersmsft
6
6
ms.author: banders
7
-
ms.date: 11/09/2023
7
+
ms.date: 11/30/2023
8
8
ms.topic: how-to
9
9
ms.service: cost-management-billing
10
10
ms.subservice: cost-management
@@ -153,19 +153,19 @@ This error means that Cost Management is unable to see the Cost and Usage report
153
153
154
154
**Error code:**_AccessDeniedListReports_
155
155
156
-
This error means that Cost Management is unable to list the object in the S3 bucket where the CUR is located. AWS IAM policy requires a permission on the bucket and on the objects in the bucket. See [Create a role and policy in AWS](aws-integration-set-up-configure.md#create-a-role-and-policy-in-aws).
156
+
This error means that Cost Management is unable to list the object in the S3 bucket where the CUR is located. AWS IAM policy requires a permission on the bucket and on the objects in the bucket. See [Create a role and policy in AWS](aws-integration-set-up-configure.md#create-a-policy-and-role-in-aws).
157
157
158
158
### Collection failed with Access Denied - Download report
159
159
160
160
**Error code:**_AccessDeniedDownloadReport_
161
161
162
-
This error means that Cost Management is unable to access and download the CUR files stored in the Amazon S3 bucket. Make sure that the AWS JSON policy attached to the role resembles the example shown at the bottom of the [Create a role and policy in AWS](aws-integration-set-up-configure.md#create-a-role-and-policy-in-aws) section.
162
+
This error means that Cost Management is unable to access and download the CUR files stored in the Amazon S3 bucket. Make sure that the AWS JSON policy attached to the role resembles the example shown at the bottom of the [Create a role and policy in AWS](aws-integration-set-up-configure.md#create-a-policy-and-role-in-aws) section.
163
163
164
164
### Collection failed since we did not find the Cost and Usage Report
165
165
166
166
**Error code:**_FailedToFindReport_
167
167
168
-
This error means that Cost Management can't find the Cost and Usage report that was defined in the connector. Make sure it isn't deleted and that the AWS JSON policy attached to the role resembles the example shown at the bottom of the [Create a role and policy in AWS](aws-integration-set-up-configure.md#create-a-role-and-policy-in-aws) section.
168
+
This error means that Cost Management can't find the Cost and Usage report that was defined in the connector. Make sure it isn't deleted and that the AWS JSON policy attached to the role resembles the example shown at the bottom of the [Create a role and policy in AWS](aws-integration-set-up-configure.md#create-a-policy-and-role-in-aws) section.
169
169
170
170
### Unable to create or verify connector due to Cost and Usage Report definitions mismatch
Copy file name to clipboardExpand all lines: articles/cost-management-billing/costs/aws-integration-set-up-configure.md
+56-52Lines changed: 56 additions & 52 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ titleSuffix: Microsoft Cost Management
4
4
description: This article walks you through setting up and configuring AWS Cost and Usage report integration with Cost Management.
5
5
author: bandersmsft
6
6
ms.author: banders
7
-
ms.date: 04/05/2023
7
+
ms.date: 11/30/2023
8
8
ms.topic: how-to
9
9
ms.service: cost-management-billing
10
10
ms.subservice: cost-management
@@ -33,96 +33,79 @@ Use the **Cost & Usage Reports** page of the Billing and Cost Management console
33
33
8. For **S3 bucket**, choose **Configure**.
34
34
9. In the Configure S3 Bucket dialog box, enter a bucket name and the Region where you want to create a new bucket and choose **Next**.
35
35
10. Select **I have confirmed that this policy is correct**, then select **Save**.
36
-
11. (Optional) For Report path prefix, enter the report path prefix that you want prepended to the name of your report.
37
-
If you don't specify a prefix, the default prefix is the name that you specified for the report. The date range has the `/report-name/date-range/` format.
36
+
11. (Optional) For Report path prefix, enter the report path prefix that you want prepended to the name of your report.
37
+
If skipped, the default prefix is the name that you specified for the report. The date range has the `/report-name/date-range/` format.
38
38
12. For **Time unit**, choose **Hourly**.
39
39
13. For **Report versioning**, choose whether you want each version of the report to overwrite the previous version, or if you want more new reports.
40
40
14. For **Enable data integration for**, no selection is required.
41
41
15. For **Compression**, select **GZIP**.
42
42
16. Select **Next**.
43
-
17. After you've reviewed the settings for your report, select **Review and Complete**.
44
-
45
-
Note the report name. You'll use it in later steps.
43
+
17. After you review the settings for your report, select **Review and Complete**.
44
+
Note the report name. You use it in later steps.
46
45
47
46
It can take up to 24 hours for AWS to start delivering reports to your Amazon S3 bucket. After delivery starts, AWS updates the AWS Cost and Usage report files at least once a day. You can continue configuring your AWS environment without waiting for delivery to start.
48
47
49
48
> [!NOTE]
50
49
> Cost and usage reports configured at the member (linked) account level aren't currently supported.
51
50
52
-
## Create a role and policy in AWS
51
+
## Create a policy and role in AWS
53
52
54
53
Cost Management accesses the S3 bucket where the Cost and Usage report is located several times a day. The service needs access to credentials to check for new data. You create a role and policy in AWS to allow Cost Management to access it.
55
54
56
55
To enable role-based access to an AWS account in Cost Management, the role is created in the AWS console. You need to have the _role ARN_ and _external ID_ from the AWS console. Later, you use them on the **Create an AWS connector** page in Cost Management.
57
56
58
-
Use the Create a New Role wizard:
57
+
### Use the Create Policy wizard
59
58
60
-
1. Sign in to your AWS console and select **Services**.
61
-
2. In the list of services, select **IAM**.
62
-
3. Select **Roles** and then select **Create Role**.
63
-
4. On the **Select trusted entity** page, select **AWS account** and then under **An AWS account**, select **Another AWS account**.
64
-
5. Under **Account ID**, enter **432263259397**.
65
-
6. Under **Options**, select **Require external ID (Best practice when a third party will assume this role)**.
66
-
7. Under **External ID**, enter the external ID, which is a shared passcode between the AWS role and Cost Management. The same external ID is also used on the **New Connector** page in Cost Management. Microsoft recommends that you use a strong passcode policy when entering the external ID. The external ID should comply with AWS restrictions:
67
-
- Type: String
68
-
- Length constraints: Minimum length of 2. Maximum length of 1224.
69
-
- Must satisfy regular expression pattern: [\w+=,.@: /-]*
70
-
> [!NOTE]
71
-
> Don't change the selection for **Require MFA**. It should remain cleared.
72
-
8. Select **Next: Permissions**.
73
-
9. Select **Create policy**. A new browser tab opens where you create a policy.
74
-
10. Select **Choose a service**.
59
+
1. Sign in into your AWS console and select **Services**.
60
+
2. In the list of services, select **IAM**.
61
+
3. Select **Policies**.
62
+
4. Select **Create policy**.
63
+
5. Select **Choose a service**.
75
64
76
-
Configure permission for the Cost and Usage report:
65
+
### Configure permission for the Cost and Usage report
77
66
78
67
1. Enter **Cost and Usage Report**.
79
68
2. Select **Access level** > **Read** > **DescribeReportDefinitions**. This step allows Cost Management to read what CUR reports are defined and determine if they match the report definition prerequisite.
80
-
3. Select **Add additional permissions**.
69
+
3. Select **Add more permissions**.
81
70
82
-
Configure permission for your S3 bucket and objects:
71
+
### Configure permission for your S3 bucket and objects
83
72
84
73
1. Select **Choose a service**.
85
74
2. Enter **S3**.
86
75
3. Select **Access level** > **List** > **ListBucket**. This action gets the list of objects in the S3 Bucket.
87
76
4. Select **Access level** > **Read** > **GetObject**. This action allows the download of billing files.
88
-
5. Select **Resources**.
89
-
6. Select **bucket – Add ARN**.
90
-
7. In **Bucket name**, enter the bucket used to store the CUR files.
91
-
8. Select **object – Add ARN**.
92
-
9. In **Bucket name**, enter the bucket used to store the CUR files.
93
-
10. In **Object name**, select **Any**.
94
-
11. Select **Add additional permissions**.
77
+
5. Select **Resources** > **Specific**.
78
+
6. In **bucket**, select the **Add ARNs** link to open another window.
79
+
7. In **Resource Bucket name**, enter the bucket used to store the CUR files.
80
+
8. Select **Add ARNs**.
81
+
9. In **object**, select **Any**.
82
+
10. Select **Add more permissions**.
95
83
96
-
Configure permission for Cost Explorer:
84
+
### Configure permission for Cost Explorer
97
85
98
86
1. Select **Choose a service**.
99
87
2. Enter **Cost Explorer Service**.
100
88
3. Select **All Cost Explorer Service actions (ce:\*)**. This action validates that the collection is correct.
101
-
4. Select **Add additional permissions**.
89
+
4. Select **Add more permissions**.
102
90
103
-
Add permission for AWS Organizations:
91
+
### Add permission for AWS Organizations
104
92
105
93
1. Enter **Organizations**.
106
94
2. Select **Access level** > **List** > **ListAccounts**. This action gets the names of the accounts.
107
-
3. Select **Add Additional permissions**.
95
+
3. Select **Add more permissions**.
108
96
109
-
Configure permissions for Policies
97
+
### Configure permissions for Policies
110
98
111
99
1. Enter **IAM**.
112
100
1. Select Access level > List > **ListAttachedRolePolicies** and **ListPolicyVersions** and **ListRoles**.
1. Select **Resources** > policy, and then select **Any**. These actions allow verification that only the minimal required set of permissions were granted to the connector.
115
-
1. Select role - **Add ARN**. The account number should be automatically populated.
116
-
1. In **Role name with path**, enter a role name and note it. You need to use it in the final role creation step.
117
-
1. Select **Add**.
118
-
1. Select **Next: Tags**. You may enter tags you wish to use or skip this step. This step isn't required to create a connector in Cost Management.
119
-
1. Select **Next: Review Policy**.
120
-
1. In Review Policy, enter a name for the new policy. Verify that you entered the correct information, and then select **Create Policy**.
121
-
1. Go back to the previous tab and refresh the policies list. On the search bar, search for your new policy.
122
-
1. Select **Next: Review**.
123
-
1. Enter the same role name you defined and noted while configuring the IAM permissions. Verify that you entered the correct information, and then select **Create Role**.
124
-
125
-
Note the role ARN and the external ID used in the preceding steps when you created the role. You'll use them later when you set up the Cost Management connector.
103
+
1. Select **Next**.
104
+
105
+
### Review and create
106
+
1. In Review Policy, enter a name for the new policy. Verify that you entered the correct information.
107
+
1. Add tags. You can enter tags you wish to use or skip this step. This step isn't required to create a connector in Cost Management.
108
+
1. Select **Create policy** to complete this procedure.
126
109
127
110
The policy JSON should resemble the following example. Replace `bucketname` with the name of your S3 bucket, `accountname` with your account number and `rolename` with the role name you created.
128
111
@@ -162,6 +145,27 @@ The policy JSON should resemble the following example. Replace `bucketname` with
162
145
}
163
146
```
164
147
148
+
### Use the Create a New Role wizard
149
+
150
+
1. Sign in to your AWS console and select **Services**.
151
+
2. In the list of services, select **IAM**.
152
+
3. Select **Roles** and then select **Create Role**.
153
+
4. On the **Select trusted entity** page, select **AWS account** and then under **An AWS account**, select **Another AWS account**.
154
+
5. Under **Account ID**, enter **432263259397**.
155
+
6. Under **Options**, select **Require external ID (Best practice when a third party will assume this role)**.
156
+
7. Under **External ID**, enter the external ID, which is a shared passcode between the AWS role and Cost Management. Note the external ID, because you use it on the **New Connector** page in Cost Management. Microsoft recommends that you use a strong passcode policy when entering the external ID. The external ID should comply with AWS restrictions:
157
+
- Type: String
158
+
- Length constraints: Minimum length of 2. Maximum length of 1224.
159
+
- Must satisfy regular expression pattern: `[\w+=,.@: /-]*`
160
+
> [!NOTE]
161
+
> Don't change the selection for **Require MFA**. It should remain cleared.
162
+
8. Select **Next**.
163
+
9. On the search bar, search for your new policy and select it.
164
+
10. Select **Next**.
165
+
11. In **Role details**, enter a role name. Verify that you entered the correct information. Note the name entered because you use it later when you set up the Cost Management connector.
166
+
12. Optionally, add tags. You can enter any tags like or skip this step. This step isn't required to create a connector in Cost Management.
167
+
13. Select **Create role**.
168
+
165
169
## Set up a new connector for AWS in Azure
166
170
167
171
Use the following information to create an AWS connector and start monitoring your AWS costs.
@@ -185,7 +189,7 @@ Use the following information to create an AWS connector and start monitoring yo
185
189
1. Select **Add connector**.
186
190
1. On the **Create connector** page, in **Display name**, enter a name for your connector.
187
191
:::image type="content" source="./media/aws-integration-setup-configure/create-aws-connector01.png" alt-text="Example of the page for creating an AWS connector" :::
188
-
1. Optionally, select the default management group. It will store all discovered linked accounts. You can set it up later.
192
+
1. Optionally, select the default management group. It stores all discovered linked accounts. You can set it up later.
189
193
1. In the **Billing** section, select **Auto-Renew** to **On** if you want to ensure continuous operation. If you select the automatic option, you must select a billing subscription.
190
194
1. For **Role ARN**, enter the value that you used when you set up the role in AWS.
191
195
1. For **External ID**, enter the value that you used when you set up the role in AWS.
@@ -220,7 +224,7 @@ When you select a connector on the **Connectors for AWS** page, you can:
220
224
221
225
## Set up Azure management groups
222
226
223
-
Place your Azure subscriptions and AWS linked accounts in the same management group to create a single location where you can see cross-cloud provider information. If you haven't already configured your Azure environment with management groups, see [Initial setup of management groups](../../governance/management-groups/overview.md#initial-setup-of-management-groups).
227
+
Place your Azure subscriptions and AWS linked accounts in the same management group to create a single location where you can see cross-cloud provider information. If you want to configure your Azure environment with management groups, see [Initial setup of management groups](../../governance/management-groups/overview.md#initial-setup-of-management-groups).
224
228
225
229
If you want to separate costs, you can create a management group that holds just AWS linked accounts.
226
230
@@ -260,6 +264,6 @@ AWS linked accounts always inherit permissions from the management group that th
260
264
261
265
## Next steps
262
266
263
-
- Now that you've set up and configured AWS Cost and Usage report integration, continue to [Manage AWS costs and usage](aws-integration-manage.md).
267
+
- Now that you set up and configured AWS Cost and Usage report integration, continue to [Manage AWS costs and usage](aws-integration-manage.md).
264
268
- If you're unfamiliar with cost analysis, see [Explore and analyze costs with cost analysis](quick-acm-cost-analysis.md) quickstart.
265
269
- If you're unfamiliar with budgets in Azure, see [Create and manage budgets](tutorial-acm-create-budgets.md).
0 commit comments