Scan GCP project posture with Prowler via a serverless Cloud Run Job triggered by Cloud Scheduler. One Terraform apply deploys to any number of projects and regions. Audiencia: Cloud engineers, security engineers, platform teams. Tiempo típico de configuración: 5 minutes.
quickstart
Úsalo si
Scan GCP project posture with Prowler via a serverless Cloud Run Job triggered by Cloud Scheduler. One Terraform apply deploys to any number of projects and regions.
Audience
Cloud engineers, security engineers, platform teams
Create an ingestion API key in Settings → API Keys with Ingestion scope.
Camino rápido
Copy a working starter, run it in your environment, then come back here for the deeper rollout details.
Obtén el bundle de código fuente
Descarga los archivos exactos usados en esta guía o ejecuta el instalador de un solo comando para escribirlos localmente antes del despliegue.
GCP cloud scanner source
Creates the Terraform module under `deploy/gcp-cloud-scanner/` and prefills the current platform API URL so the Cloud Run deployment commands on this page work unchanged.
Edit the targets map in main.tf, then apply to deploy all project+region pairs at once.
Bootstrap the local source bundle first. It prefills `BLACKSHIELD_API_URL` from the deployed platform and writes the Terraform module to `deploy/gcp-cloud-scanner/`.
Edit deploy/gcp-cloud-scanner/main.tf — add your project IDs and regions to locals.targets.
Run: cd deploy/gcp-cloud-scanner && terraform init && terraform apply -auto-approve
Terraform creates: service account, Secret Manager secret, Cloud Run Job, Cloud Scheduler, and enables required APIs.
Each project+region pair is an independent deployment unit.
Cómo se ve el éxito
Each project+region pair is an independent deployment unit.