Getting Started
Quick start guide to set up Cloud Cost Guard in under 10 minutes
Onboarding Guide
Welcome to OpsCurb! This guide will help you get started in less than 10 minutes.
🚀 Quick Start Checklist
- Create your account
- Connect your AWS account
- Run your first scan
- Review findings
- Set up notifications (optional)
- Implement recommendations
Step 1: Create Your Account (2 minutes)
Sign Up
- Go to https://opscurb.com/signup
- Enter your email and create a password
- Verify your email address
- Complete your profile (company name, role)
Choose a Plan
| Plan | Best For | Price |
|---|---|---|
| Free | Testing, small projects | $0/month |
| Starter | Startups, small teams | $29/month |
| Pro | Growing companies | $99/month |
| Enterprise | Large organizations | Custom |
See PRICING.md for detailed comparison.
💡 Tip: Start with the Free plan to test the service, then upgrade when ready.
Step 2: Connect Your AWS Account (5 minutes)
Option A: Automated Setup (Recommended)
- Log in to OpsCurb dashboard
- Click "Add AWS Account"
- Click "Deploy with Terraform"
- Follow the guided setup:
# Clone the setup script curl -o setup.sh https://opscurb.com/setup.sh # Run the setup bash setup.sh - The script will:
- Generate a unique External ID
- Create the IAM role in your AWS account
- Configure the trust relationship
- Test the connection
Option B: Manual Setup
2.1 Generate External ID
# Download the generator
curl -o generate_external_id.py \
https://raw.githubusercontent.com/opscurb/cloud-cost-guard/main/generate_external_id.py
# Generate your External ID
python generate_external_id.py
Save this External ID - you'll need it in the next step.
2.2 Deploy IAM Role
Using Terraform (Recommended):
# Clone the repository
git clone https://github.com/opscurb/cloud-cost-guard.git
cd cloud-cost-guard/terraform
# Configure
cp terraform.tfvars.example terraform.tfvars
nano terraform.tfvars # Edit with your values
# Deploy
terraform init
terraform plan
terraform apply
Using CloudFormation:
aws cloudformation create-stack \
--stack-name cloud-cost-guard-role \
--template-url https://opscurb.com/cloudformation.yaml \
--parameters \
ParameterKey=OpsCurbAccountId,ParameterValue=123456789012 \
ParameterKey=ExternalId,ParameterValue=YOUR_EXTERNAL_ID \
--capabilities CAPABILITY_NAMED_IAM
Using AWS Console:
- Go to IAM → Roles → Create Role
- Select Another AWS Account
- Enter OpsCurb Account ID:
123456789012(replace with actual) - Check Require External ID
- Enter your External ID
- Attach the OpsCurbPolicy (see terraform/main.tf)
- Name the role:
OpsCurbRole - Create the role
2.3 Add Account to Dashboard
- Go to OpsCurb dashboard
- Click "Add AWS Account"
- Enter:
- Account Name: e.g., "Production"
- AWS Account ID: Your 12-digit AWS account ID
- IAM Role ARN:
arn:aws:iam::YOUR_ACCOUNT_ID:role/OpsCurbRole - External ID: The External ID you generated
- Click "Test Connection"
- If successful, click "Save"
Step 3: Run Your First Scan (1 minute)
Automatic Scan
OpsCurb automatically scans your account:
- Free Plan: Daily at 6 AM UTC
- Paid Plans: Configurable schedule (hourly, daily, weekly)
Manual Scan
To run a scan immediately:
- Go to Dashboard → Scans
- Click "Run Scan Now"
- Select the AWS account(s) to scan
- Click "Start Scan"
The scan typically takes 2-5 minutes depending on your infrastructure size.
What Gets Scanned?
OpsCurb scans 14 categories:
- ✅ Unattached EBS volumes
- ✅ Unassociated Elastic IPs
- ✅ Idle load balancers
- ✅ Aged RDS/EBS snapshots
- ✅ Zombie RDS instances
- ✅ NAT gateways
- ✅ CloudWatch logs
- ✅ S3 buckets
- ✅ ECR repositories
- ✅ VPC endpoints
- ✅ AMI snapshots
- ✅ CloudWatch metrics
- ✅ Data transfer costs
- ✅ And more...
Step 4: Review Findings (2 minutes)
Understanding Findings
Each finding includes:
- Resource Type: What kind of resource (EBS volume, RDS instance, etc.)
- Resource ID: AWS resource identifier
- Region: AWS region
- Severity: High, Medium, or Low
- Monthly Cost: Estimated monthly waste
- Annual Savings: Potential yearly savings
- Recommendation: What to do about it
Severity Levels
| Severity | Meaning | Example |
|---|---|---|
| 🔴 High | >$50/month waste | Unattached 1TB EBS volume |
| 🟡 Medium | $10-$50/month waste | Idle NAT Gateway |
| 🟢 Low | <$10/month waste | Small aged snapshot |
Filtering Findings
Use filters to focus on what matters:
- By Severity: Show only high-severity findings
- By Category: Focus on specific resource types
- By Region: Filter by AWS region
- By Cost: Show findings above a certain threshold
Exporting Findings
Export findings for reporting:
- CSV: For spreadsheets
- JSON: For automation
- PDF: For presentations
Step 5: Set Up Notifications (Optional, 3 minutes)
Email Notifications
- Go to Settings → Notifications
- Enable Email Notifications
- Choose notification triggers:
- ✅ Scan completed
- ✅ High-severity findings detected
- ✅ Weekly summary report
- Save settings
Slack Integration
- Go to Settings → Integrations → Slack
- Click "Connect Slack"
- Authorize OpsCurb
- Select the channel for notifications
- Configure notification preferences
Discord Integration
- Go to Settings → Integrations → Discord
- Create a webhook in your Discord server:
- Server Settings → Integrations → Webhooks → New Webhook
- Copy the webhook URL
- Paste it in OpsCurb settings
- Test the integration
See INTEGRATIONS.md for more details.
Step 6: Implement Recommendations (Ongoing)
Using AI-Powered Instructions (Starter+)
For each finding:
- Click "Get Fix Instructions"
- Review the AI-generated steps
- Choose your preferred method:
- AWS CLI: Copy and run commands
- AWS Console: Follow step-by-step guide
- Terraform: Infrastructure as Code changes
Example: Delete Unattached EBS Volume
AWS CLI:
# Optional: Create snapshot first
aws ec2 create-snapshot \
--volume-id vol-0123456789abcdef0 \
--description "Backup before deletion"
# Delete the volume
aws ec2 delete-volume --volume-id vol-0123456789abcdef0
AWS Console:
- Go to EC2 → Volumes
- Select the volume
- Actions → Delete Volume
- Confirm deletion
Track Your Savings
OpsCurb tracks:
- Potential Savings: What you could save
- Realized Savings: What you've actually saved
- Savings Over Time: Historical trends
Next Steps
Optimize Your Setup
- Enable MFA: Settings → Security → Enable MFA
- Invite Team Members: Settings → Team → Invite
- Set Up API Access: Settings → API Keys → Generate
- Configure Scan Schedule: Settings → Scans → Schedule
- Customize Thresholds: Settings → Preferences → Thresholds
Learn More
- 📖 FAQ - Common questions
- 🔧 Troubleshooting - Common issues
- 📊 Best Practices - Optimization tips
- 🎓 Tutorials - Video guides
Get Help
- 💬 Live Chat: Available in dashboard (Pro+)
- 📧 Email: support@opscurb.com
- 📚 Documentation: docs.opscurb.com
- 🐛 Bug Reports: github.com/opscurb/issues
Common Questions
How much will I save?
Most customers save 15-30% on their AWS bill in the first month. Actual savings depend on your infrastructure and how many recommendations you implement.
Is it safe?
Yes! OpsCurb is read-only and cannot modify your AWS resources. See SECURITY.md for details.
How long does setup take?
5-10 minutes for most users. The IAM role setup is the longest part.
Can I scan multiple AWS accounts?
Yes! Add as many AWS accounts as you need. Each account requires its own IAM role.
What if I need help?
We're here to help! Contact support@opscurb.com or use the in-app chat.
Welcome aboard! 🎉
You're now ready to start saving money on AWS. If you have any questions, we're here to help.
Last Updated: 2026-02-24
Version: 1.0