Overview
A software vendors FinOps showback lived in dashboards and monthly emails that teams ignored until bills arrived. Service owners didnt see anomalies in time, budget increases were approved in ad hoc chats, and ownership for untagged spend was unclear. Intelligex embedded cost signals directly into Jira: anomalies and budget variance opened issues against the right service owner from the Configuration Management Database (CMDB), linked to live dashboards, and required approvals for budget changes. Cleanup tasks for untagged or idle resources were generated with evidence and due dates. Decisions happened sooner, quarter?end surprises eased, and cleanup became accountablewhile existing cloud accounts, FinOps tooling, Jira, and CMDB stayed in place.
Client Profile
- Industry: B2B software (SaaS)
- Company size (range): Product engineering with platform, data, and shared services teams
- Stage: Multi?cloud spend with showback dashboards; anomaly alerts sent by email; budget approvals tracked in spreadsheets; CMDB mapped services but wasnt tied to cloud spend
- Department owner: IT & Infrastructure (Platform/FinOps and Service Management)
- Other stakeholders: Product Engineering, Data Platform, Security, Finance/FP&A, Procurement, Architecture, Service Desk/Change Management, Internal Audit
The Challenge
Finance and platform teams published cost dashboards and sent monthly summaries, but engineering didnt engage until an overage triggered escalations. Anomalies detected by cloud providers were emailed to shared lists with unclear ownership. Budget increases were approved in chat or not tracked at all, and remediation of untagged or orphaned resources happened sporadically.
Ownership signals were scattered. The CMDB listed services and technical owners, but cloud spend data wasnt joined to those records. Dashboards showed accounts, regions, or projects rather than service names and on?call groups. When an anomaly arrived, someone forwarded it to a likely owner, and duplicates or misses were common. Quarter?end reviews pulled the same reports again and debated who should act.
Decision latency created real churn. Engineers made cleanup changes without context, budget changes lacked traceable approvals, and Finance couldnt see if actions were taken in time. The tooling existeddashboards, anomaly detections, budgetsbut the workflow from signal to decision wasnt embedded where teams worked.
Why It Was Happening
Cost data and work management were disconnected. Alerts and dashboards lived outside engineering workflows, so they competed with day?to?day priorities. There was no binding between a cost signal and a service owner in a system with clear due dates and approvals. Untagged or shared resources compounded the problem because spend couldnt be routed confidently to a team.
Governance relied on reports rather than on enforceable steps. Budget changes were discussed in meetings but not tied to a durable record with reason codes. Anomalies closed themselves when spend normalized, leaving no evidence of what was done. Without a workflow that linked CMDB ownership, issues, approvals, and dashboards, showback remained a passive report rather than an operational process.
The Solution
Intelligex embedded FinOps into Jira by turning cost signals into work tied to ownership. Cloud anomaly detections and budget variances opened issues with service, owner, and environment mapped from the CMDB; links to live dashboards provided context; and budget changes required approvals with reason codes before merging. Cleanup tasks for untagged, idle, or mis?sized resources were generated with evidence. The model followed FinOps Framework practices and used native cloud cost services (for example, AWS Cost Anomaly Detection and Azure Cost Management budgets), Jira workflows and automation (Jira Cloud), and the existing CMDB (for example, ServiceNow CMDB).
- Integrations: Cloud cost and anomaly feeds; budget and forecast signals; CMDB service catalog and ownership; Jira for issue types, routing, and approvals; FinOps dashboards for context; identity for requester/approver lookups; ITSM for change links.
- Issue model: Standard Jira issue types for Cost Anomaly, Budget Change, and Cleanup Task with fields for account/subscription, service, environment, tags, owner, and evidence links.
- Auto?assignment and routing: CMDB mappings drove assignee, component, and on?call group mentions; watchers included Finance and Platform; escalations triggered if issues aged without action.
- Approvals and gates: Budget changes and tag exceptions required approver sign?off with reason codes; maker?checker for sensitive environments; approvals captured in Jira with links to dashboards.
- Evidence and context: Deep links to dashboards and queries; attachment of anomaly snapshots; suggested remediation based on resource type and patterns; references to recent deploys or changes.
- Cleanup automation: Bulk suggestions for tag backfill, idle resource rightsizing, and deprecation candidates; merge?friendly CSV/JSON exports; optional policy checks that opened issues when budgets neared thresholds.
- Dashboards and reporting: Team and service views of open anomalies, cleanup backlog, budget posture, and time?to?decision; Finance view of approvals and forecast deltas; audit export of issues and outcomes.
- Permissions and privacy: Role?based visibility for cost details; minimal sensitive data in issues; comments and attachments logged; links respect dashboard permissions.
Implementation
- Discovery: Mapped cost data sources and anomaly signals; reviewed budget approval practices; inventoried CMDB service ownership; sampled ignored alerts and late cleanups; gathered Finance and Audit requirements for approvals and evidence.
- Design: Defined Jira issue types, fields, and workflows; authored routing rules from CMDB to teams; set approval matrices and reason codes; designed dashboard deep links; planned escalation policies and SLA targets; documented privacy boundaries for spend data.
- Build: Connected cloud cost and anomaly feeds; implemented the routing and issue creation service; created Jira workflows, screens, and automations; integrated CMDB ownership; added budget approval gates; wired links to FinOps dashboards; enabled logging and audit exports.
- Testing/QA: Ran in shadow mode to create draft issues without notifications; validated routing and owners; reconciled anomalies to dashboard views; piloted budget approvals with a few teams; tuned fields, reason codes, and dashboards based on feedback.
- Rollout: Enabled live issues for high?variance services first; turned on approvals for budget changes; expanded to all teams and environments in waves; retained email alerts as a fallback during early cycles; tightened escalation rules after stable adoption.
- Training/hand?off: Delivered short guides for engineers and PMs on handling anomalies, cleanup tasks, and budget requests; briefed Finance on approval review and dashboards; updated SOPs to link Jira issues in change records; transferred workflow ownership and dashboards to Platform/FinOps under change control.
- Human?in?the?loop review: Established weekly FinOps reviews for aged anomalies, exception trends, and cleanup outcomes; recorded decisions with rationale and effective dates; updates flowed into routing rules, approval matrices, and dashboard views.
Results
Cost signals reached the right owners in time to act. Anomalies opened issues against the service and on?call group with links to the exact dashboard views, and teams either resolved the spike or documented a planned change. Budget increases moved through approvals with clear reason codes, and Finance reviewed outcomes without requesting screenshots.
Cleanup gained traction. Untagged and idle resources generated accountable tasks with owners and evidence, and teams prioritized the work alongside features. Quarter?end reviews referenced the same issues and approvals already recorded in Jira. The company kept its cloud platforms, dashboards, Jira, and CMDB; the change was a workflow that turned showback into decisions with ownership and audit trails.
What Changed for the Team
- Before: Anomaly emails landed in shared inboxes. After: Cost anomalies created Jira issues assigned to the service owner with dashboard links.
- Before: Budget changes were approved informally. After: Jira approvals with reason codes and links to forecasts recorded decisions.
- Before: Finance chased status at quarter end. After: Approvals and outcomes were visible in real time through Jira and dashboards.
- Before: Ownership for spend was unclear. After: CMDB service mappings drove routing, watchers, and escalation.
- Before: Reports were read?only. After: Cost signals became work with due dates, approvers, and resolution notes.
li>Before: Untagged spend lingered. After: Cleanup tasks with evidence routed to owners and tracked to closure.
Key Takeaways
- Put cost signals where teams work; embed anomalies and budgets in Jira, not just in dashboards.
- Tie spend to services; use CMDB ownership to route, escalate, and report.
- Require approvals with context; budget changes need reason codes and links to forecasts.
- Make cleanup accountable; generate tasks with evidence and owners for untagged or idle resources.
- Start in shadow mode; test routing and definitions before paging and approvals.
- Integrate, dont replace; keep cloud tools, dashboards, Jira, and CMDBadd workflow and governance across them.
FAQ
What tools did this integrate with? Cost and anomaly signals came from cloud platforms, including AWS Cost Anomaly Detection and Azure Cost Management budgets. Issues and approvals lived in Jira Cloud. Service ownership and routing used the CMDB (for example, ServiceNow CMDB). Dashboards stayed in the existing FinOps tooling, and links respected existing permissions.
How did you handle quality control and governance? Routing rules, approval matrices, and issue templates were versioned with owners and rationale. Budget requests required reason codes and linked forecasts. Maker?checker applied to sensitive environments. All issues, comments, approvals, and closures were logged and exportable for audit. Weekly reviews examined aged anomalies, exception usage, and cleanup trends, feeding updates back into policies.
How did you roll this out without disruption? The system created draft issues in shadow mode first, validating routing and dashboard links with selected teams. Live creation started with high?variance services, and email alerts remained as a fallback. Budget approval gates ramped gradually, and escalation rules tightened after teams became comfortable with the flow.
How did cost ownership tie to the CMDB? Each cloud account, subscription, or project mapped to services in the CMDB through tags and metadata. The mapping drove assignees, components, and escalation paths in Jira. Conflicts or missing mappings triggered a review task to update ownership, reducing future routing errors.
What about untagged or shared resources? The pipeline flagged untagged or shared costs and opened cleanup tasks with evidence and suggested owners based on network, IAM, or deployment metadata. Exceptions required approvals with expiration, and dashboards tracked aging until tagging or allocation was resolved.
How did this support Finance and forecasting? Budget change issues linked to dashboards that showed current posture and forecast. Approvals captured the narrative once, and Finance viewed outcomes in Jira rather than reconciling email threads. End?of?quarter reviews used the same issue history and approvals already recorded.
Did engineers have to learn new tools? No. Work happened in Jira with links to familiar dashboards. Teams followed standard issue workflows with added fields for cost context and approvals. The CMDB and dashboards continued to be maintained as before, now with tighter feedback loops.
Department/Function: Finance & AccountingIT & InfrastructureProcurementSupply Chain & Logistics
Capability: AI Integration & Workflow Automation
Get a FREE
Proof of Concept
& Consultation
No Cost, No Commitment!


