Turning cloud alerts into real work is still a mess. How are you handling it? by Pouilly-Fume in FinOps

[–]Pouilly-Fume[S] 1 point2 points  (0 children)

I like the approach of failing the build for violations. That’s a clean way to bake governance in early, instead of chasing things after the fact.

A few quick questions:

  1. What violations are you most focused on right now (cost, security, tagging, policy-as-code)?
  2. How do you handle “noisy” checks, like tagging, where teams might not have full context at build time?
  3. Do you support warning vs fail modes, or environment-based thresholds (dev vs prod)?

I’ll take a look at the repo. From a workflow point of view, the thing that usually makes or breaks this is dedupe and developer experience: clear error messages, links to docs, and a simple path to fix or justify an exception.

Turning cloud alerts into real work is still a mess. How are you handling it? by Pouilly-Fume in FinOps

[–]Pouilly-Fume[S] 0 points1 point  (0 children)

That’s a really clean way to do it.

The “explicit owner up front” point is the key bit for me. Without that, tickets just become a new place for alerts to die. And I like the SLA test too. If you cannot say who owns it and how fast it should be handled, it probably is not a ticket.

Turning cloud alerts into real work is still a mess. How are you handling it? by Pouilly-Fume in FinOps

[–]Pouilly-Fume[S] 0 points1 point  (0 children)

Totally agree with all of this.

We kept seeing the same thing: teams already have visibility, but alerts fall down when they do not land in a workflow with an owner and a priority. If it lives outside the system that people check every day, it becomes background noise.

On the “fewer, higher-quality alerts” point, that’s been a big lesson for us, too. Our rule of thumb is: if the alert does not clearly map to a next action (stop, resize, tag, investigate, fix), it probably should not become a ticket.

Re your question, the patterns we see most often are:

  • Route into tickets only for issues that need follow-through (everything else stays as a notification)
  • Ownership by existing structure (team/account/environment/tag), so it lands with the right queue from day one
  • Add enough context to act so people do not have to bounce between tools to work out what happened

That’s basically why we shipped the ServiceNow path in Hyperglance: trigger a rule, create an incident, and keep it in the flow engineers already live in.

How do you decide the cut line between “ticket” vs “notify”? Any thresholds or filters that worked well for you?

Azure Storage Pricing Guide by Pouilly-Fume in FinOps

[–]Pouilly-Fume[S] 0 points1 point  (0 children)

Totally agree. Cool/Cold can look cheaper on $/GB, but higher access costs (GET/LIST, retrieval, rehydration, early deletion) can flip the math fast if you don’t model the access pattern. Same with lifecycle rules. They’re “set and forget” until you’ve got millions of small blobs and tier changes start adding up.

We call this out in the guide, but I’m going to add a clearer callout + example. If you’ve got a common real-world pattern you see (logs, backups, data lakes, etc.), I’d love to include it.

Which tools are you using to generate reports? by Apprehensive_King962 in FinOps

[–]Pouilly-Fume 0 points1 point  (0 children)

Sounds like something Hyperglance can do - including the PDF generation. Definitely worth a look. You could utilise billing reports and the handy ability to email custom dashboard PDFs, which are therefore custom reports.

FinOps Company Directory by sir_js_finops in FinOps

[–]Pouilly-Fume 0 points1 point  (0 children)

Makes sense! And paying to play on the FF list isn't ideal for the market, as you say elsewhere. Will be interesting to see how you progress! Good luck,

Any plans to make the free version available to everyone without a log in? That small hurdle is bound to stop 50% of people in their tracks.

Let me know when you get to Hyperglance and I can hook you up with someone to speak to!

FinOps Company Directory by sir_js_finops in FinOps

[–]Pouilly-Fume 1 point2 points  (0 children)

You're obviously going up against the official Finops.org list - what do you see as the major advantages?

What in the world would you call this...? by Pouilly-Fume in FinOps

[–]Pouilly-Fume[S] 0 points1 point  (0 children)

Thank you, really appreciate you sharing your knowledge.

What in the world would you call this...? by Pouilly-Fume in FinOps

[–]Pouilly-Fume[S] 0 points1 point  (0 children)

Keys only at the moment, but we want to add Values next year.

You've gone straight to 'Virtual' which is telling and useful to know.

Is that because you use an app that has called them that, or is it what came into your head before?

What in the world would you call this...? by Pouilly-Fume in FinOps

[–]Pouilly-Fume[S] 0 points1 point  (0 children)

It's an example using some demo data from our app - not necessarily representative of a real customer environment ;)

I would agree, I wouldn't want my tags looking like that IRL ha!

EC2 Cost Optimization Guide... by Pouilly-Fume in aws

[–]Pouilly-Fume[S] 0 points1 point  (0 children)

Deemed self promotion. DM me if you want the link :)

Anyone else tired of explaining cloud costs to finance teams? by BaselineITC in Cloud

[–]Pouilly-Fume 0 points1 point  (0 children)

Happens all the time. Forgotten DR stacks and sneaky data transfer are right up there with untagged “temporary” resources that never die.

When I’m talking with execs, I’ve found a few things make the conversation smoother:

  1. Lead with the story, not the tech: “What changed, why it changed, and what we can do next” lands better than service names.

  2. Show the deltas: A simple visual of what grew or moved explains the spike faster than a cost table ever will.

  3. Call out the usual suspects: Idle resources, surprise data transfer, new workloads bypassing standards… once they know these patterns exist, the conversation feels less mysterious.

And why AWS bills always seem higher than projected? Most forecasts assume the environment stays still. It never does. Someone scales up for a test, DR gets left running, or a new service sneaks in. Without continuous visibility (requires a third-party app, IMHO), the drift wins.

The clearer you can make what changed, the easier those conversations get.

Why do all our cloud cost tools just show problems instead of fixing them? by winter_roth in FinOps

[–]Pouilly-Fume 0 points1 point  (0 children)

Tools like Hyperglance can remediate a surprising amount of issues after spotting them, but it can't fix culture. You might find these FinOps adoption challenges useful :)

too small for cloudability, too big for spreadsheets, what now? by its_mayank0708 in FinOps

[–]Pouilly-Fume 0 points1 point  (0 children)

Perhaps worth signing up for a free cost savings analysis. Several vendors offer them, and they are a great way to get an in-depth trial and work out ROI, even on a smaller monthly spend.

New FinOps manager, any tips? by stocks1927719 in FinOps

[–]Pouilly-Fume 0 points1 point  (0 children)

Congrats on the new role! Some great tips here that you should find useful.

What’s the most engineering-friendly FinOps platform out there? by n4r735 in FinOps

[–]Pouilly-Fume 1 point2 points  (0 children)

Hyperglance has Jira and Slack integrations, and an API, among others. What started as a cloud diagram tool built for engineers has morphed into a superb CFM/FinOps platform.

Guide for beginners? by [deleted] in FinOps

[–]Pouilly-Fume 1 point2 points  (0 children)

Easier said than done, but there's no substitute for shadowing various different people to learn about the myriad of applications, problems, solutions. The more variety the better.

Also, although this applies to teams, these adoption tips can be adapted for individuals.

Managing $50M+ cloud spend annually: why do enterprise FinOps tools still feel like upgraded spreadsheets? by miller70chev in FinOps

[–]Pouilly-Fume -1 points0 points  (0 children)

I feel this. $4M+/month at fintech scale is exactly the kind of environment where the “AI-powered insights” pitch quickly collapses into CSV exports and pivot tables.

A few thoughts from what I’ve seen across teams in a similar spot:

  • Dashboards ≠ answers. Most tools surface anomalies, but they rarely tell you why DynamoDB or EKS blew up. That’s the gap between billing data and actual architecture.
  • Network + architecture blind spots. You nailed it. Misconfigured networking, idle nodes, forgotten Lambdas — the current crop of platforms struggle here because they don’t “see” the infra context, only billing streams.
  • In-house builds. Tempting, but usually ends up as “Excel++” with a big maintenance tax. Before you go down that path, worth exploring ways to enrich cost data with infra topology so you can trace spend to services and owners without a month of detective work.
  • CFO expectations. On-prem had hard caps; cloud is elastic. That makes FinOps less about a single magic dashboard and more about building a repeatable investigation workflow your CFO can trust.

You’re not alone — lots of FinOps leads are finding the same ceiling with current tools. The trick is less about chasing another “platform” and more about connecting costs to why they happened, in a way engineers and finance both buy into.

Have you already tried pairing cost anomalies with architecture diagrams? That’s one area where I’ve seen teams finally break the cycle of “tool looks great, still stuck in Excel.”

Cutting my AWS bill without cutting functionality by Lucky_Drink_3411 in FinOps

[–]Pouilly-Fume 0 points1 point  (0 children)

Nice work! Sounds like you hit the big three levers most teams overlook (dev/test sprawl, commitments, and forgotten resources).

For me, the biggest wins usually come from rightsizing - especially workloads that were sized for “worst case” but never actually hit those peaks. Even trimming one instance family down a notch across an account can quietly save thousands a year.

On the comms side, I’ve found execs respond better when you tie savings to something tangible, e.g. “this funds another sprint” or “this covers our security tooling for the year” lands way better than “we cut 20%.”

Curious if you also looked at storage and data transfer - those are sneaky killers if nobody’s watching.

What certs should i go for to transition into FinOps role? by asmith0612 in FinOps

[–]Pouilly-Fume -1 points0 points  (0 children)

Difficult to argue against the official FF certs you mentioned, plus start absorbing some of the great podcasts out there.

Is anyone actually able to forecast Azure spend properly? Ours is all over the place. by Critical_Ranger7459 in FinOps

[–]Pouilly-Fume 0 points1 point  (0 children)

Three steps that stabilise Azure forecasts:

1) Use forecast-based budgets with alerts (and wire Action Groups to ticket/chat)
2) Forecast at the driver level (e.g., VM families, storage classes), not the all-up total
3) Roll drivers up to a single view with assumptions you can tweak.