-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Implementation of FinOps Toolkit / Cost Reporting #141
Comments
FinOps Toolkit Deployment NotesFinOps Hub
Note Created a Policy exception within the
PowerBI Reports
Cost Summary
Governance
Rate Optimization
Workload Optimization
Data Ingestion
FinOps Workbooks
Optimization
Governance
|
Manually applied the "Inherit a tag from the subscription" policy in FORGE to the Landing Zone root level. Note Reference documentation: Within that policy assignment, we can specify exactly which tag(s) we want it to inherit (it's not an all-or-none approach). So I tested with just the Since there were existing resources, I had to manually created/trigger a Remediation Task (as the automatic one didn't work for some reason). The task ran fairly quickly, and as you can see, remediated appropriately The failed resources are VM extensions, as the VM apparently needs to be running for the tag to be applied (to the extension, not the VM itself). |
Checking the Cost Management export the following day (after applying the policy), the However, in the Modified the PromotedTags step and added Now that tag/filed can be added to the PowerBI report as a custom filter. |
To facilitate long-term operations and use of the FinOps Toolkit, we want to use the Configure managed exports method in LIVE. To do this effectively, we need to configure the Managed Identity (used to generate the exports), with Enterprise or Department Reader permissions at the Enterprise Agreement level. This will then simplify configuring the scope in the "scopes": [
{
"scope": "/providers/Microsoft.Billing/billingAccounts/1234567/departments/56789"
}
] We will recommend that a separate EA Department be created for the Public Cloud Platform team's Azure implementation, before implementing the FinOps Toolkit in LIVE. |
Blocked until Enterprise Agreement access is granted |
ACM Cost Allocation RulesAfter meeting with Jonathan McCaig (who now has access to create ACM Cost Allocation Rules), it seems this feature is not mature enough. When using a Cost Allocation Rule, it will transfer/drain all costs from the EA DepartmentThere is already an EA department ( Follow-UpWarren suggests that we have an Entra ID Security Group created with EA Department Reader permissions, so that if/when we need to re-deploy the FinOps Toolkit, we can add the Managed Identity to the appropriate Group, and grant it the access required. UpdateEnterprise Agreement roles can only be assigned to Users, and Service Principals, not Groups. Therefore we will have to wait to deploy the FinOps Toolkit in LIVE. Additionally, ideally, we could use an existing Service Principal (ie. the one that has the Subscription Creator role), and just add the Department Reader permissions to that. However, currently the FinOps Toolkit does not support using a pre-created Managed Identity. There is a GitHub Issue ([Hubs] Use of pre created Entra ID SPN to deploy the resources) about this feature request. |
Cleaned up existing resources, and deployed the latest version of the FinOps Toolkit (v0.7).
Unfortunately, although selecting the "public" networking option, the resources for private networking were deployed, including VNet, NSG, Private Endpoints, Private DNS Zones! Created the following GitHub Issue: FinOps Toolkit v0.7 Deploys Private Networking Resources When Public Networking Option Selected Re-DeployDeleted the entire Resource Group, re-created it (and re-applied the Azure Policy exception), and attempted to re-deploy v0.7 of the FinOps Toolkit. Re-deployment failed due to the Key Vault name already existed (due to purge/delete protection). Also, the private networking resources were also created again, despite selecting the public network option. |
UpdatePer the following GitHub Issue (FinOps Toolkit v0.7 Deploys Private Networking Resources When Public Networking Option Selected), this is "by design". Apparently, "Our intent is for private endpoints to be the only option going forward." LimitationsThe following is the limitations of using the FinOps Toolkit within our CAF-structured environment. Until these are resolved/addressed, we cannot deploy the FOT:
|
We have decided that the FinOps tool kit needs to mature a bit more before we use it. We also have a meeting with the developer next week to express our needs and experiences |
FinOps Toolkit Implementation PlanningA few notes to consider:
|
FinOps Toolkit Networking Meeting Notes
|
As part of achieving cost optimization, cost reporting, and financial responsibility, we need to look into if the FinOps Toolkit is applicable to implement.
Additionally, there are 2 FinOps Toolkit implementation options: FinOps Hub versus individual Power BI reports and Azure Workbooks.
Note
The automation of deploying the FinOps Toolkit currently is only supported with PowerShell or Bicep. Terraform is not supported / provided.
UPDATE
Per the following GitHub Issue (Build a Terraform Module for FinOps Hub), there is a Terraform module in development.
Acceptance Criteria
The text was updated successfully, but these errors were encountered: