The AWS Configuration View provides a unified interface to establish a secure connection between the Cavisson platform and your Amazon Web Services (AWS) environment. It enables users to configure authentication details, set up cloud billing visibility, and retrieve cost data stored in Amazon S3 buckets. This configuration helps monitor and analyze AWS expenditure directly within the platform.

Prerequisites

{ "Version": "2012-10-17",
"Statement": [
{
"Sid": "ReportDefinition",
"Effect": "Allow",
"Action": [
"cur:DescribeReportDefinitions"
],
"Resource": "*"
},
{
"Sid": "GetObject",
"Effect": "Allow",
"Action": [
"s3:GetObject"
],
"Resource": "arn:aws:s3:::Bucket name/*"
},
{
"Sid": "CloudWatchListMetrics",
"Effect": "Allow",
"Action": [
"cloudwatch:ListMetrics",
"cloudwatch:GetMetricData",
"pricing:GetProducts"
],
"Resource": "*"
},
{
"Sid": "BucketOperations",
"Effect": "Allow",
"Action": [
"s3:ListBucket",
"s3:GetBucketLocation"
],
"Resource": "arn:aws:s3:::<Bucket name>"
},
{
"Effect": "Allow",
"Action": [
"sts:GetCallerIdentity",
"sts:AssumeRole"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"bcm-data-exports:ListExports",
"bcm-data-exports:CreateExport",
"bcm-data-exports:GetExport"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": "cur:PutReportDefinition",
"Resource": "*"
}
]
}

Authentication Mechanism

AWS SDK Default

This method uses credentials available in the environment such as IAM roles, AWS CLI configuration, or environment variables.

Access and Secret Key

This option allows authentication using manually entered IAM credentials.

Credential File

Authenticate using a credentials file containing the access key and secret key.

Cloud Cost Visibility Configuration

Once the authentication is successful, configure the S3 export location from where billing data will be retrieved.

Note: Ensure the report has hourly granularity and CSV format (GZIP compression allowed).


Test and Save: Validates credentials and S3 export settings, then saves on success.

Reset: Clears all fields for fresh entry.


Configure Cavisson — Discover Resources Policy

Before establishing the connection, include the Discover Resources policy so Cavisson can parse EC2 resource data. Use the JSON below in the "Type or paste a JSON policy document" step.

Steps 1–5 (quick checklist)

  1. Open the AWS Management Console and go to IAM > Policies.
  2. Click Create policy and switch to the JSON tab.
  3. Type or paste the policy JSON shown below.
  4. Click Review policy, give it a name (e.g. CavissonDiscoverResources) and description, then Create policy.
  5. Attach the policy to the IAM role or user that Cavisson will use (IAM > Users or Roles > Attach policies).

Policy JSON

{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "OptScaleOperations",
"Effect": "Allow",
"Action": [
"s3:GetBucketPublicAccessBlock",
"s3:GetBucketPolicyStatus",
"s3:GetBucketTagging",
"iam:GetAccessKeyLastUsed",
"cloudwatch:GetMetricStatistics",
"s3:GetBucketAcl",
"ec2:Describe*",
"s3:ListAllMyBuckets",
"iam:ListUsers",
"s3:GetBucketLocation",
"iam:GetLoginProfile",
"cur:DescribeReportDefinitions",
"iam:ListAccessKeys",
"elasticloadbalancing:Describe*"
],
"Resource": "*"
}
]
}

Query / Examples

AWS CLI — create policy
aws iam create-policy --policy-name CavissonDiscoverResources --policy-document file://policy.json

# To create the policy.json file, paste the JSON above into a file named policy.json
AWS CLI — attach policy to role
aws iam attach-role-policy --role-name CavissonRole --policy-arn arn:aws:iam::123456789012:policy/CavissonDiscoverResources

# replace ACCOUNT_ID and role name as needed

Notes

  • Use the JSON block above directly in the AWS Console "JSON" tab when creating a new policy.
  • Make sure to restrict the policy to the minimum necessary resources in production (replace "Resource": "*" where possible).

For Kubernetes data: Verify Split Cost Allocation

To check if you have successfully enabled Pod/Namespace "Split" Cost, you need to verify two specific settings in the AWS Billing Console.

  1. Check the "Global Switch" (Cost Management Preferences)

    This is the master switch. If this is unchecked, no report will ever see Pod data.

    • Go to the Billing and Cost Management Console.
    • In the left navigation pane, click Cost Management preferences.
    • Scroll down to the section Split cost allocation data.
    • Verify: Ensure the checkbox for Amazon Elastic Kubernetes Service (Amazon EKS) is checked and set to Active.
      (If it is unchecked: Check it now and select "Resource requests" — this is the standard, free option).
  2. Check Your Report Definition

    Even if the switch above is On, your specific report (CUR) must be configured to include that data in the file it generates.

      In the left navigation pane, click Data Exports (or Cost & Usage Reports if you are using the legacy view).
    • Click on the Report name you are using.
    • Look under Report content or Report details.
    • Verify: You should see "Split cost allocation data" listed as Included (or the box checked).
  3. The "Final Proof" (Check the File)

    If you want to be 100% sure the data is flowing:

    • Download your latest Report (CSV file) from your S3 bucket.
    • Open it and search for a column named lineItem/LineItemType.
    • Filter that column for the value SplitUsage.

  • If you see SplitUsage rows: It is working! These rows represent your Pods.
  • If you only see Usage: It is NOT working yet (or the data hasn't processed, which takes 24 hours).