Skip to content

See. Understand. Reduce AWS costs. Control and optimize your AWS billing with an intuitive desktop application. Cost-effective solution includes multiple AWS accounts, regardless of a bill size.

Notifications You must be signed in to change notification settings

CloudPouch/CloudPouch.dev

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

21 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CloudPouch

WebsiteReleasesBuy licenseUser Guide

Minimal IAM User privileges

If you want to use a dedicated IAM user with minimal privileges please use the following policy:

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Sid": "CloudPouchMinimalAccess",
            "Effect": "Allow",
            "Action": [
                "application-autoscaling:DescribeScalableTargets",
                "ce:GetCostAndUsage",
                "cloudwatch:GetMetricStatistics",
                "dynamodb:DescribeTable",
                "dynamodb:ListTables",
                "ec2:Describe*",
                "elasticloadbalancing:DescribeLoadBalancers",
                "elasticloadbalancing:DescribeTargetGroups",
                "elasticloadbalancing:DescribeTargetHealth",
                "logs:DescribeLogGroups",
                "organizations:ListAccounts",
                "rds:DescribeDBClusters",
                "rds:DescribeDBInstances",
                "rds:DescribeDBSnapshots"
            ],
            "Resource": "*"
        }
    ]
}

Last change for version 1.24.0.

Optional: Configuring Certificates in CloudPouch Application

The CloudPouch includes an option that enables users to configure and use a certificate when connecting to the internet. This feature is particularly beneficial for users operating within corporate networks that frequently have stringent security protocols, often mandating certificate use for internet resource access.

The CloudPouch supports the use of custom and global SSL/TLS certificates in PEM format (.pem). These could be certificates issued by widely recognized CAs, or those signed by private or self-signed authorities. Please make sure to specify the correct path to your certificate when configuring your CloudPouch application.

To set up the certificate, please define the path to the certificate file in the config.json file, as shown below:

{
  "certificatePath": "<Path to your .pem certificate file>"
}

Here, certificatePath should contain the full path to your .pem file, including the file name. Please ensure you have the necessary read permissions to access this file.

Ensure to restart the CloudPouch application for the new certificate settings to take effect.

Should you need more detailed information about supported certificates, refer to the public documentation regarding AWS_CA_BUNDLE and NODE_EXTRA_CA_CERTS on the Internet.

File location

The config.json file location depends on the OS you're using:

  • MacOs - /Users/<YOUR_USER_NAME>/Library/Application Support/CloudPouch/config.json
  • Windows - c:\Users\<YOUR_USER_NAME>\AppData\Roaming\CloudPouch\config.json
  • Linux - ~/.config/CloudPouch/config.json

Certificate support was introduces in version 1.25.0.

Create CloudFormation stack

Click this button to create CloudPouch-access-policy-stack on your AWS account with the IAM policy that you can attach to any IAM Role or IAM User.

Launch Stack

Step-by-step guide of CloudFormation deployment

  1. This is the first CloudFormation service console with the template already pre-loaded. Click Next.
  2. There are parameters to set. Click Next.
  3. Leaver everything as is. Click Next.
  4. Review and click Next.
  5. CloudFormation deployment starts.
  6. After a moment it is finished.
  7. Go to IAM Policies tab and find the policy named CloudPouch-costs-policy.
  8. Now you need to add this policy to an IAM User or a Role.


Attach policy to an IAM User

  1. After Policy is created go to the IAM Users tab, select a user and click Add Permissions button (select again Add Permissions from the dropdown list).
  2. Select Attach policies directly and in the search below enter the name of the newly created IAM Policy: CloudPouch-costs-policy Attach policies directly
  3. Tick checkbox next the it and click Next
  4. On the next screen click Add Permissions button.
  5. Done ✅

Policy explanation

Necessary privileges

  • ce:GetCostAndUsage is crucial as allows to fetch cost data.
  • organizations:ListAccounts used to resolve names of your accounts in the AWS Organizations. Used only when you have paying account.

Insights privileges

Insights check your resources in the AWS cloud and provide useful information for cost optimization. They can detect waste, for example unattached EBS drives or wrongly configured resources such as over-provisioned DynamoDB tables.

  • EC2 - Other insights use following privileges:
    • ec2:Describe*
  • DynamoDB insights use:
    • dynamodb:DescribeTable
    • dynamodb:ListTables
    • cloudwatch:GetMetricStatistics
    • application-autoscaling:DescribeScalableTargets
  • CloudWatch insights use:
    • logs:DescribeLogGroups
  • RDS insights use:
    • rds:DescribeDBClusters
    • rds:DescribeDBInstances
    • rds:DescribeDBSnapshots
    • <