LogoLogo
  • Welcome to Firefly Documentation
  • Introduction
    • What is Firefly?
    • Who is Firefly for?
    • Why use Firefly?
    • Terminology (Glossary)
  • Key Features
    • Infrastructure-as-Code Automation
    • Cloud Asset Inventory
    • Drift Detection & Remediation
    • Policy-as-Code for Compliance & Governance
    • Cost Visibility & Optimization
    • AI Assistant
    • ChatOps Integration
  • Getting Started
    • Account Setup & Onboarding
    • Connecting Cloud Accounts
    • UI Walkthrough & Navigation
    • First Steps in Firefly
  • Detailed Guides
    • Dashboard Overview
    • Cloud Asset Inventory
      • Remediating Drifts
      • Deleting Assets
      • Creating IaC-Ignore Rules
      • Creating Exclude-Drift Rules
    • Policy & Governance
      • Creating Policy-as-Code Governance Rules
      • Remediating Policy Violations
    • Workflows & Guardrails
      • Creating Workflows
      • Creating Guardrail Rules
    • Codification
    • Self-Service
    • IaC Explorer
    • Event Center
    • Backup and Disaster Recovery
    • Notifications
    • User Management
    • SSO Configuration
  • Integrations
    • Integrations Overview
    • Integrating Data Sources
      • AWS
      • Azure
      • Google Cloud
      • Kubernetes
      • Akamai
      • Datadog
      • New Relic
      • Okta
      • GitHub
      • Cloudflare
      • NS1
      • PagerDuty
      • MongoDB Atlas
      • HashiCorp Vault
    • Integrating IaC Remote State
      • Terraform Cloud
      • Google Cloud Storage
      • env0
      • HashiCorp Consul
      • Firefly States Redactor
    • Integrating Version Control
      • GitHub
      • GitLab
      • Azure DevOps
      • CodeCommit
      • Bitbucket
    • Integrating Notifications
      • Slack
      • Microsoft Teams
      • PagerDuty
      • Opsgenie
      • Torq
      • Webex
      • Google Chat
      • Webhook
    • Integrating Project Management
      • Jira
      • ServiceNow
    • Integrating Workflows with CI/CD
    • Integrating Backstage
    • Integrating MCP
  • Use Cases & Best Practices
    • Cloud Governance & Visibility
    • Cost Optimization Strategies
    • Compliance and Security Best Practices
    • Infrastructure Automation & Self-Service
    • Best Practices and Implementation Tips
  • Analytics & Reporting
    • Analytics Dashboard Overview
    • Using Analytics for Improvement
    • Exporting and Sharing Reports
    • Analytics Security and Privacy
  • Code Snippets & Examples
    • Terraform Snippet for an AWS EC2 Instance (Codified via Firefly)
    • Example Rego Policy (OPA) for a Custom Rule
    • GitHub Actions Workflow YAML for Firefly Integration
    • JSON Output Example: Exporting Inventory
  • Troubleshooting & FAQs
    • Common Issues and Solutions
    • FAQs
  • General Information
    • Firefly API
      • Authentication
      • Inventory
      • Codification
      • Workflows
      • Self-Service
      • Policy & Governance
      • IaC Explorer
      • Event Center
      • Backup & Disaster Recovery
      • Notifications
      • Integrations
      • Identity & Access Management
    • Security & Compliance
    • Pricing Tiers & Add-ons
    • Contacting Support
Powered by GitBook
On this page
  • Overview
  • Prerequisites
  • Integrating a new account
  • Integrating an existing account
  • Configuration Details

Was this helpful?

  1. Integrations
  2. Integrating IaC Remote State

Google Cloud Storage

Overview

Firefly integrates with Google Cloud Storage to pull in Terraform state files. This integration allows Firefly to analyze your Terraform state files stored in Google Cloud Storage buckets, providing comprehensive visibility into your infrastructure resources managed through Terraform.

Prerequisites

  • A Google Cloud Platform account

  • A service account with appropriate permissions to access the storage buckets containing Terraform state files

Integrating a new account

  1. Log into your Google Cloud service account, and select CREATE SERVICE ACCOUNT

  2. Add the Service account details, and select CREATE AND CONTINUE

  3. Add the following role:

    • storage.objectViewer conditional to tfstate suffix

  4. Select SAVE > DONE

  5. Select the kebab menu

  6. Select Manage keys > ADD KEY > Create new key

  7. To download a service account key file, select JSON > CREATE

  8. In Firefly, select Settings > Integrations

  9. Select Add New > Google Cloud Storage

  10. Enter a Nickname and Project ID

  11. Paste or upload the account key file into the Service Account Key field

  12. Select Next

Integrating an existing account

  1. Log in to your Google Cloud service account

  2. Add the following roles to the account you want to integrate:

    • storage.objectViewer conditional to tfstate suffix

  3. Select the kebab menu

  4. Select Manage keys > ADD KEY > Create new key

  5. To download a service account key file, select JSON > CREATE

  6. In Firefly, select Settings > Integrations

  7. Select Add New > Google Cloud Storage

  8. Enter a Nickname and Project ID

  9. Paste or upload the account key file into the Service Account Key field

  10. Select Next

Configuration Details

  • Firefly scans your Google Cloud Storage buckets periodically for Terraform state files

  • Your state files list will stay updated automatically

  • Firefly only requires read access to your storage buckets

PreviousTerraform CloudNextenv0

Last updated 1 month ago

Was this helpful?