Banner Image: three icons representing three pillars of cloudtamer governance

Release News: What We’re Shipping with 2.16

We’re so excited to tell you about the changes to cloudtamer.io in version 2.16. This release is packed with enhancements, including a new report builder, account setup convenience features, additional support for Azure, and more. Check out the summary below, and read more about the changes in the Support Center.

Run all your reports, all in one place

One of the biggest changes in 2.16 is the report builder. It allows you to generate system-wide reports from one convenient, centralized menu. From this menu, you can build OU reports, project reports, user reports, account reports, and billing source reports. This gives you increased insight into your data, all from one place.

The report enhancements also allow for increased scope, as you can now build reports that include multiple top-level OUs. Let's say your top-level OUs correspond to company divisions, for example. You could run one report to see spending across all divisions with the click of a button. Just select more than one top-level OU from the drop-down menu in the OU Reports builder to see an OU spend report. You can view results by project, service, account, cloud provider, or tag name, allowing you to query all your data in many different ways.

Get more granular with service-level spend reports

You can now drill down into service-level spend for a month on the OU-level spend reports, so it's easy to see spending line items. Now when you run the total service spending report for an OU, you can click on the monthly value for any service to drill down into service-level spend for that month, which reveals its own report. This allows you to zoom in even further than $200 spent on Amazon EC2 in November 2019: you can now see how much of that $200 came from the EC2 Instance, EBS Volume and NAT Gateway, informing decisions about service-level spending.

Fine-tune your security settings

We added the option to specify lockout parameters for failed user logins when using an internal IDMS. The number of failed login attempts and the duration of the lockout are both configurable to meet your organization’s desired specifications, so you're in full control of your security settings.

Speed account setup

We made the Connect Account form easier to use through pre-populated menus, streamlining the process and preventing data entry errors by providing your account information. When selecting an AWS or Azure billing source, users will be able to select an AWS account number or Subscription ID from a pre-populated list, making onboarding new projects a breeze. No searching for account info required!

Get increased support for Azure features

You can now add individual Azure resource groups as their own accounts. As a result, resource groups can now have Azure roles and policies applied to them through cloudtamer.io using cloud rules, without applying the roles and policies to the entire Azure subscription. This allows a more granular level of control when you only want users to see a particular resource group, or when you only wish to apply cloud rules to a particular resource group.

We also now support the management of Azure resources under multiple top-level management groups, allowing increased flexibility when using top-level groups through Azure.

Track both GovCloud and commercial AWS accounts

You can now connect to both GovCloud and commercial AWS accounts (as opposed to one or the other), providing an all-in-one cloud governance solution for those who use both account types.

But wait, there’s more!

Be sure to check out the Support Center to see all the changes we’ve made in 2.16 to make your cloudtamer.io experience easier and more informative. Follow us on Twitter and LinkedIn for more cloud governance news.


Sarah is the technical writer at cloudtamer.io.