This tool collects resources from AWS, GCP, and Azure, evaluates compliance rules, and reports violations.
- Multi-cloud discovery (EC2, S3, IAM; GCP Compute, Storage; Azure VMs, Storage)
- Compliance engine with YAML-defined rules
- Slack alerts, JSON reports, Prometheus metrics
- Runs as Kubernetes CronJob
- Configure cloud credentials (see below)
- Edit
config.yamlwith your accounts/projects - Build Docker image:
docker build -t multi-cloud-inventory . - Deploy to Kubernetes using manifests in
k8s/or Terraform interraform/
- AWS: Use IAM roles (if running in EKS) or access keys (via env vars). Required permissions: ReadOnlyAccess.
- GCP: Set
GOOGLE_APPLICATION_CREDENTIALSor provide path in config. Required roles: Compute Viewer, Storage Object Viewer. - Azure: Use
DefaultAzureCredential(supports environment variables, managed identity). Required roles: Reader.
Prometheus metrics exposed on port 8000 if enabled.
MIT