Follow the procedure below to deploy a scanner and a storage stack into your GCP account.
Procedure
- In the File Storage Security console, select the Stack Management page, go to , then select Deploy.
- To deploy the stacks, select Scanner Stack and Storage Stack. The Deploy
Scanner Stack and Storage Stack dialog box opens.
Note
There is also the option to add a scanner stack by itself. - Make sure you're signed in to your GCP account.
Note
The GCP account must be connected in the Cloud One Cloud Provider Account list first. See Connect GCP account to Trend Micro Cloud One. - Retrieve your Service Account:
-
Type in the GCP project ID.
-
Click Get.
Note
Paste this information in the managementServiceAccountProjectID and managementServiceAccountID variables of the Terraform deployment when you launch the stack.
-
- Configure and run the Terraform deployment:
-
Click Launch Stack to launch the Terraform deployment in the GCP Cloud Shell.
-
Click the Trust Repo check box to select it.
-
Set up your project:
- Under Project setup, select the project from the drop-down list.
- Execute the script in Cloud Shell.
Note
If you do not have a project ID, you need to create one:- Under Project setup, click **create a new one**.
- Create the project.
- Under Project setup, select the project from the drop-down list.
- Execute the script in Cloud Shell.
Enable permissions for deployment:You need to apply the settings and create the custom roles in the project before File Storage Security stack deployment. You only need to apply once on a GCP project for File Storage Security stack deployment:-
Apply the GCP configuration deployment:
-
Enable all the needed APIs and create the required custom roles by Terraform.
-
Specify the
projectID
interraform.tfvars.json
undergcp-configuration
folder. -
Specify the
customRolePrefix
interraform.tfvars.json
if the prefix of the roles is needed. -
Apply the Terraform template in the Cloud Shell
terraform -chdir=gcp-configuration init && terraform -chdir=gcp-configuration apply
-
-
Configure and deploy the stacks:Specify the following fields in
terraform.tfvars.json
under all-in-one folder and apply the Terraform template in the Cloud Shell.Note
There could be multiple stacks in the JSON objectsscannerStacks
andstorageStacks
could be multiples. There is a limit of 5 scanner stacks and 20 storage stacks per Terraform deployment. Please create another workspace in Terraform to separate the deployment if the number of stacks exceeds the limit.Terraform Input Variables:- projectID: Specify the project for this deployment.
- functionAutoUpdate: Enable or disable automatic remote code update. The
default value is
true
. Allow values:true
,false
. - customRolePrefix: Specify the prefix of the custom roles if needed.
Scanner stack:- <SCANNER_STACK_NAME>: Specify the name of the scanner stack. The name, as a resource prefix, must be less than 17 characters. Replace the key with the scanner stack name.
- region: Specify the region for the scanner stack. For the list of supported GCP regions, please see Supported GCP Regions.
- managementServiceAccountProjectID: Copy and paste the service account project ID from the File Storage Security console.
- managementServiceAccountID: Copy and paste the service account information from the File Storage Security console.
Storage stack:- <STORAGE_STACK_NAME>: Specify the name of the storage stack. The name, as a resource prefix, must be less than 17 characters. Replace the key with the storage stack name.
- scanner: Specify the name of the scanner stack.
- scanningBucketName: Specify the existing bucket name that you wish to protect.
- region: Specify the region of the storage stack. For the list of supported GCP regions, please see Supported GCP Regions.
- managementServiceAccountProjectID: Copy and paste the service account project ID from the File Storage Security console.
- managementServiceAccountID: Copy and paste the service account information from the File Storage Security console.
- reportObjectKey: Select
true
to report the object keys of the scanned objects to File Storage Security backend services. File Storage Security can then display the object keys of the malicious objects in the response of events API. Allows valuestrue
,false
. - objectFilterPrefix: Enter the prefix of the objects you want to scan from
the bucket. Enter
''
to scan without filters.
Note
scannerProjectID
,scannerTopic
,scannerServiceAccountID
should benull
in All-in-One deployment.disableScanningBucketIAMBinding
is required by converting from the GCP Deployment Manager's deployment, if it's a new deployment should befalse
. -
Initialize and deploy in the Cloud Shell
terraform -chdir=all-in-one init && terraform -chdir=all-in-one apply
Tip
Please saveterraform.tfstate
andterraform.tfvars.json
for managing the deployment (You will need them for updating and deleting stacks). We recommend that you use remote configuration to keep your tfstate somewhere safe. -
- Configure output in the File Storage Security console:To complete the deployment process, once the stacks are deployed, configure the management role:
- Copy the output content of
all_in_one_outputs
from the Cloud Shell output of Terraform. - Paste the content into the File Storage Security console.
Tip
You can get Terraform output by the command:terraform output
- Copy the output content of
- Click Submit.