Networking dashboard to display per VPC and per VPC peering group limits that are not shown in the console
This commit is contained in:
parent
b0fcc94b1d
commit
971726224f
|
@ -0,0 +1,201 @@
|
||||||
|
Apache License
|
||||||
|
Version 2.0, January 2004
|
||||||
|
http://www.apache.org/licenses/
|
||||||
|
|
||||||
|
TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
|
||||||
|
|
||||||
|
1. Definitions.
|
||||||
|
|
||||||
|
"License" shall mean the terms and conditions for use, reproduction,
|
||||||
|
and distribution as defined by Sections 1 through 9 of this document.
|
||||||
|
|
||||||
|
"Licensor" shall mean the copyright owner or entity authorized by
|
||||||
|
the copyright owner that is granting the License.
|
||||||
|
|
||||||
|
"Legal Entity" shall mean the union of the acting entity and all
|
||||||
|
other entities that control, are controlled by, or are under common
|
||||||
|
control with that entity. For the purposes of this definition,
|
||||||
|
"control" means (i) the power, direct or indirect, to cause the
|
||||||
|
direction or management of such entity, whether by contract or
|
||||||
|
otherwise, or (ii) ownership of fifty percent (50%) or more of the
|
||||||
|
outstanding shares, or (iii) beneficial ownership of such entity.
|
||||||
|
|
||||||
|
"You" (or "Your") shall mean an individual or Legal Entity
|
||||||
|
exercising permissions granted by this License.
|
||||||
|
|
||||||
|
"Source" form shall mean the preferred form for making modifications,
|
||||||
|
including but not limited to software source code, documentation
|
||||||
|
source, and configuration files.
|
||||||
|
|
||||||
|
"Object" form shall mean any form resulting from mechanical
|
||||||
|
transformation or translation of a Source form, including but
|
||||||
|
not limited to compiled object code, generated documentation,
|
||||||
|
and conversions to other media types.
|
||||||
|
|
||||||
|
"Work" shall mean the work of authorship, whether in Source or
|
||||||
|
Object form, made available under the License, as indicated by a
|
||||||
|
copyright notice that is included in or attached to the work
|
||||||
|
(an example is provided in the Appendix below).
|
||||||
|
|
||||||
|
"Derivative Works" shall mean any work, whether in Source or Object
|
||||||
|
form, that is based on (or derived from) the Work and for which the
|
||||||
|
editorial revisions, annotations, elaborations, or other modifications
|
||||||
|
represent, as a whole, an original work of authorship. For the purposes
|
||||||
|
of this License, Derivative Works shall not include works that remain
|
||||||
|
separable from, or merely link (or bind by name) to the interfaces of,
|
||||||
|
the Work and Derivative Works thereof.
|
||||||
|
|
||||||
|
"Contribution" shall mean any work of authorship, including
|
||||||
|
the original version of the Work and any modifications or additions
|
||||||
|
to that Work or Derivative Works thereof, that is intentionally
|
||||||
|
submitted to Licensor for inclusion in the Work by the copyright owner
|
||||||
|
or by an individual or Legal Entity authorized to submit on behalf of
|
||||||
|
the copyright owner. For the purposes of this definition, "submitted"
|
||||||
|
means any form of electronic, verbal, or written communication sent
|
||||||
|
to the Licensor or its representatives, including but not limited to
|
||||||
|
communication on electronic mailing lists, source code control systems,
|
||||||
|
and issue tracking systems that are managed by, or on behalf of, the
|
||||||
|
Licensor for the purpose of discussing and improving the Work, but
|
||||||
|
excluding communication that is conspicuously marked or otherwise
|
||||||
|
designated in writing by the copyright owner as "Not a Contribution."
|
||||||
|
|
||||||
|
"Contributor" shall mean Licensor and any individual or Legal Entity
|
||||||
|
on behalf of whom a Contribution has been received by Licensor and
|
||||||
|
subsequently incorporated within the Work.
|
||||||
|
|
||||||
|
2. Grant of Copyright License. Subject to the terms and conditions of
|
||||||
|
this License, each Contributor hereby grants to You a perpetual,
|
||||||
|
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
|
||||||
|
copyright license to reproduce, prepare Derivative Works of,
|
||||||
|
publicly display, publicly perform, sublicense, and distribute the
|
||||||
|
Work and such Derivative Works in Source or Object form.
|
||||||
|
|
||||||
|
3. Grant of Patent License. Subject to the terms and conditions of
|
||||||
|
this License, each Contributor hereby grants to You a perpetual,
|
||||||
|
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
|
||||||
|
(except as stated in this section) patent license to make, have made,
|
||||||
|
use, offer to sell, sell, import, and otherwise transfer the Work,
|
||||||
|
where such license applies only to those patent claims licensable
|
||||||
|
by such Contributor that are necessarily infringed by their
|
||||||
|
Contribution(s) alone or by combination of their Contribution(s)
|
||||||
|
with the Work to which such Contribution(s) was submitted. If You
|
||||||
|
institute patent litigation against any entity (including a
|
||||||
|
cross-claim or counterclaim in a lawsuit) alleging that the Work
|
||||||
|
or a Contribution incorporated within the Work constitutes direct
|
||||||
|
or contributory patent infringement, then any patent licenses
|
||||||
|
granted to You under this License for that Work shall terminate
|
||||||
|
as of the date such litigation is filed.
|
||||||
|
|
||||||
|
4. Redistribution. You may reproduce and distribute copies of the
|
||||||
|
Work or Derivative Works thereof in any medium, with or without
|
||||||
|
modifications, and in Source or Object form, provided that You
|
||||||
|
meet the following conditions:
|
||||||
|
|
||||||
|
(a) You must give any other recipients of the Work or
|
||||||
|
Derivative Works a copy of this License; and
|
||||||
|
|
||||||
|
(b) You must cause any modified files to carry prominent notices
|
||||||
|
stating that You changed the files; and
|
||||||
|
|
||||||
|
(c) You must retain, in the Source form of any Derivative Works
|
||||||
|
that You distribute, all copyright, patent, trademark, and
|
||||||
|
attribution notices from the Source form of the Work,
|
||||||
|
excluding those notices that do not pertain to any part of
|
||||||
|
the Derivative Works; and
|
||||||
|
|
||||||
|
(d) If the Work includes a "NOTICE" text file as part of its
|
||||||
|
distribution, then any Derivative Works that You distribute must
|
||||||
|
include a readable copy of the attribution notices contained
|
||||||
|
within such NOTICE file, excluding those notices that do not
|
||||||
|
pertain to any part of the Derivative Works, in at least one
|
||||||
|
of the following places: within a NOTICE text file distributed
|
||||||
|
as part of the Derivative Works; within the Source form or
|
||||||
|
documentation, if provided along with the Derivative Works; or,
|
||||||
|
within a display generated by the Derivative Works, if and
|
||||||
|
wherever such third-party notices normally appear. The contents
|
||||||
|
of the NOTICE file are for informational purposes only and
|
||||||
|
do not modify the License. You may add Your own attribution
|
||||||
|
notices within Derivative Works that You distribute, alongside
|
||||||
|
or as an addendum to the NOTICE text from the Work, provided
|
||||||
|
that such additional attribution notices cannot be construed
|
||||||
|
as modifying the License.
|
||||||
|
|
||||||
|
You may add Your own copyright statement to Your modifications and
|
||||||
|
may provide additional or different license terms and conditions
|
||||||
|
for use, reproduction, or distribution of Your modifications, or
|
||||||
|
for any such Derivative Works as a whole, provided Your use,
|
||||||
|
reproduction, and distribution of the Work otherwise complies with
|
||||||
|
the conditions stated in this License.
|
||||||
|
|
||||||
|
5. Submission of Contributions. Unless You explicitly state otherwise,
|
||||||
|
any Contribution intentionally submitted for inclusion in the Work
|
||||||
|
by You to the Licensor shall be under the terms and conditions of
|
||||||
|
this License, without any additional terms or conditions.
|
||||||
|
Notwithstanding the above, nothing herein shall supersede or modify
|
||||||
|
the terms of any separate license agreement you may have executed
|
||||||
|
with Licensor regarding such Contributions.
|
||||||
|
|
||||||
|
6. Trademarks. This License does not grant permission to use the trade
|
||||||
|
names, trademarks, service marks, or product names of the Licensor,
|
||||||
|
except as required for reasonable and customary use in describing the
|
||||||
|
origin of the Work and reproducing the content of the NOTICE file.
|
||||||
|
|
||||||
|
7. Disclaimer of Warranty. Unless required by applicable law or
|
||||||
|
agreed to in writing, Licensor provides the Work (and each
|
||||||
|
Contributor provides its Contributions) on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
|
||||||
|
implied, including, without limitation, any warranties or conditions
|
||||||
|
of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
|
||||||
|
PARTICULAR PURPOSE. You are solely responsible for determining the
|
||||||
|
appropriateness of using or redistributing the Work and assume any
|
||||||
|
risks associated with Your exercise of permissions under this License.
|
||||||
|
|
||||||
|
8. Limitation of Liability. In no event and under no legal theory,
|
||||||
|
whether in tort (including negligence), contract, or otherwise,
|
||||||
|
unless required by applicable law (such as deliberate and grossly
|
||||||
|
negligent acts) or agreed to in writing, shall any Contributor be
|
||||||
|
liable to You for damages, including any direct, indirect, special,
|
||||||
|
incidental, or consequential damages of any character arising as a
|
||||||
|
result of this License or out of the use or inability to use the
|
||||||
|
Work (including but not limited to damages for loss of goodwill,
|
||||||
|
work stoppage, computer failure or malfunction, or any and all
|
||||||
|
other commercial damages or losses), even if such Contributor
|
||||||
|
has been advised of the possibility of such damages.
|
||||||
|
|
||||||
|
9. Accepting Warranty or Additional Liability. While redistributing
|
||||||
|
the Work or Derivative Works thereof, You may choose to offer,
|
||||||
|
and charge a fee for, acceptance of support, warranty, indemnity,
|
||||||
|
or other liability obligations and/or rights consistent with this
|
||||||
|
License. However, in accepting such obligations, You may act only
|
||||||
|
on Your own behalf and on Your sole responsibility, not on behalf
|
||||||
|
of any other Contributor, and only if You agree to indemnify,
|
||||||
|
defend, and hold each Contributor harmless for any liability
|
||||||
|
incurred by, or claims asserted against, such Contributor by reason
|
||||||
|
of your accepting any such warranty or additional liability.
|
||||||
|
|
||||||
|
END OF TERMS AND CONDITIONS
|
||||||
|
|
||||||
|
APPENDIX: How to apply the Apache License to your work.
|
||||||
|
|
||||||
|
To apply the Apache License to your work, attach the following
|
||||||
|
boilerplate notice, with the fields enclosed by brackets "[]"
|
||||||
|
replaced with your own identifying information. (Don't include
|
||||||
|
the brackets!) The text should be enclosed in the appropriate
|
||||||
|
comment syntax for the file format. We also recommend that a
|
||||||
|
file or class name and description of purpose be included on the
|
||||||
|
same "printed page" as the copyright notice for easier
|
||||||
|
identification within third-party archives.
|
||||||
|
|
||||||
|
Copyright [yyyy] [name of copyright owner]
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
|
@ -0,0 +1,37 @@
|
||||||
|
# Networking Dashboard
|
||||||
|
|
||||||
|
This repository provides an end-to-end solution to gather some GCP Networking quotas and limits (that cannot be seen in the GCP console today) and display them in a dashboard.
|
||||||
|
The goal is to allow for better visibility of these limits, facilitating capacity planning and avoiding hitting these limits.
|
||||||
|
|
||||||
|
## Usage
|
||||||
|
|
||||||
|
Clone this repository, then go through the following steps to create resources:
|
||||||
|
- Create a terraform.tfvars file with the following content:
|
||||||
|
- organization_id = "[YOUR-ORG-ID]"
|
||||||
|
- billing_account = "[YOUR-BILLING-ACCOUNT]"
|
||||||
|
- monitoring_project_id = "project-0" # Monitoring project where the dashboard will be created and the solution deployed
|
||||||
|
- monitored_projects_list = ["project-1", "project2"] # Projects to be monitored by the solution
|
||||||
|
- `terraform init`
|
||||||
|
- `terraform apply`
|
||||||
|
|
||||||
|
Once the resources are deployed, go to the following page to see the dashboard: https://console.cloud.google.com/monitoring/dashboards?project=<YOUR-MONITORING-PROJECT>.
|
||||||
|
A dashboard called "quotas-utilization" should be created.
|
||||||
|
|
||||||
|
The Cloud Function runs every 5 minutes by default so you should start getting some data points after a few minutes.
|
||||||
|
You can change this frequency by modifying the "schedule_cron" variable in variables.tf.
|
||||||
|
|
||||||
|
Once done testing, you can clean up resources by running `terraform destroy`.
|
||||||
|
|
||||||
|
## Supported limits and quotas
|
||||||
|
The Cloud Function currently tracks usage, limit and utilization of:
|
||||||
|
- active VPC peerings per VPC
|
||||||
|
- VPC peerings per VPC
|
||||||
|
- instances per VPC
|
||||||
|
- instances per VPC peering group
|
||||||
|
- Subnet IP ranges per VPC peering group
|
||||||
|
- internal forwarding rules for internal L4 load balancers per VPC
|
||||||
|
- internal forwarding rules for internal L7 load balancers per VPC
|
||||||
|
- internal forwarding rules for internal L4 load balancers per VPC peering group
|
||||||
|
- internal forwarding rules for internal L7 load balancers per VPC peering group
|
||||||
|
|
||||||
|
It writes this values to custom metrics in Cloud Monitoring and creates a dashboard to visualize the current utilization of these metrics in Cloud Monitoring.
|
|
@ -0,0 +1,588 @@
|
||||||
|
#
|
||||||
|
# Copyright 2022 Google LLC
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
#
|
||||||
|
|
||||||
|
from google.cloud import monitoring_v3
|
||||||
|
from googleapiclient import discovery
|
||||||
|
from google.api import metric_pb2 as ga_metric
|
||||||
|
import time
|
||||||
|
import os
|
||||||
|
import google.api_core
|
||||||
|
import re
|
||||||
|
import random
|
||||||
|
|
||||||
|
monitored_projects_list = os.environ.get("monitored_projects_list").split(",") # list of projects from which function will get quotas information
|
||||||
|
monitoring_project_id = os.environ.get("monitoring_project_id") # project where the metrics and dahsboards will be created
|
||||||
|
monitoring_project_link = f"projects/{monitoring_project_id}"
|
||||||
|
service = discovery.build('compute', 'v1')
|
||||||
|
|
||||||
|
# DEFAULT LIMITS
|
||||||
|
limit_vpc_peer = os.environ.get("LIMIT_VPC_PEER").split(",") # 25
|
||||||
|
limit_l4 = os.environ.get("LIMIT_L4").split(",") # 75
|
||||||
|
limit_l7 = os.environ.get("LIMIT_L7").split(",") # 75
|
||||||
|
limit_instances = os.environ.get("LIMIT_INSTANCES").split(",") # ["default_value", "15000"]
|
||||||
|
limit_instances_ppg = os.environ.get("LIMIT_INSTANCES_PPG").split(",") # 15000
|
||||||
|
limit_subnets = os.environ.get("LIMIT_SUBNETS").split(",") # 400
|
||||||
|
limit_l4_ppg = os.environ.get("LIMIT_L4_PPG").split(",") # 175
|
||||||
|
limit_l7_ppg = os.environ.get("LIMIT_L7_PPG").split(",") # 175
|
||||||
|
|
||||||
|
# Cloud Function entry point
|
||||||
|
def quotas(request):
|
||||||
|
global client, interval
|
||||||
|
client, interval = create_client()
|
||||||
|
|
||||||
|
# Instances per VPC
|
||||||
|
instance_metric = create_gce_instances_metrics()
|
||||||
|
get_gce_instances_data(instance_metric)
|
||||||
|
|
||||||
|
# Number of VPC peerings per VPC
|
||||||
|
vpc_peering_active_metric, vpc_peering_metric = create_vpc_peering_metrics()
|
||||||
|
get_vpc_peering_data(vpc_peering_active_metric, vpc_peering_metric)
|
||||||
|
|
||||||
|
# Internal L4 Forwarding Rules per VPC
|
||||||
|
forwarding_rules_metric = create_l4_forwarding_rules_metric()
|
||||||
|
get_l4_forwarding_rules_data(forwarding_rules_metric)
|
||||||
|
|
||||||
|
# Internal L4 Forwarding Rules per VPC peering group
|
||||||
|
# Existing GCP Monitoring metrics for L4 Forwarding Rules per Network
|
||||||
|
l4_forwarding_rules_usage = "compute.googleapis.com/quota/internal_lb_forwarding_rules_per_vpc_network/usage"
|
||||||
|
l4_forwarding_rules_limit = "compute.googleapis.com/quota/internal_lb_forwarding_rules_per_vpc_network/limit"
|
||||||
|
|
||||||
|
l4_forwarding_rules_ppg_metric = create_l4_forwarding_rules_ppg_metric()
|
||||||
|
get_pgg_data(l4_forwarding_rules_ppg_metric, l4_forwarding_rules_usage, l4_forwarding_rules_limit, limit_l4_ppg)
|
||||||
|
|
||||||
|
# Internal L7 Forwarding Rules per VPC peering group
|
||||||
|
# Existing GCP Monitoring metrics for L7 Forwarding Rules per Network
|
||||||
|
l7_forwarding_rules_usage = "compute.googleapis.com/quota/internal_managed_forwarding_rules_per_vpc_network/usage"
|
||||||
|
l7_forwarding_rules_limit = "compute.googleapis.com/quota/internal_managed_forwarding_rules_per_vpc_network/limit"
|
||||||
|
|
||||||
|
l7_forwarding_rules_ppg_metric = create_l7_forwarding_rules_ppg_metric()
|
||||||
|
get_pgg_data(l7_forwarding_rules_ppg_metric, l7_forwarding_rules_usage, l7_forwarding_rules_limit, limit_l7_ppg)
|
||||||
|
|
||||||
|
# Subnet ranges per VPC peering group
|
||||||
|
# Existing GCP Monitoring metrics for Subnet Ranges per Network
|
||||||
|
subnet_ranges_usage = "compute.googleapis.com/quota/subnet_ranges_per_vpc_network/usage"
|
||||||
|
subnet_ranges_limit = "compute.googleapis.com/quota/subnet_ranges_per_vpc_network/limit"
|
||||||
|
|
||||||
|
subnet_ranges_ppg_metric = create_subnet_ranges_ppg_metric()
|
||||||
|
get_pgg_data(subnet_ranges_ppg_metric, subnet_ranges_usage, subnet_ranges_limit, limit_subnets)
|
||||||
|
|
||||||
|
# GCE Instances per VPC peering group
|
||||||
|
# Existing GCP Monitoring metrics for GCE per Network
|
||||||
|
gce_instances_usage = "compute.googleapis.com/quota/instances_per_vpc_network/usage"
|
||||||
|
gce_instances_limit = "compute.googleapis.com/quota/instances_per_vpc_network/limit"
|
||||||
|
|
||||||
|
gce_instances_metric = create_gce_instances_ppg_metric()
|
||||||
|
get_pgg_data(gce_instances_metric, gce_instances_usage, gce_instances_limit, limit_instances_ppg)
|
||||||
|
|
||||||
|
return 'Function executed successfully'
|
||||||
|
|
||||||
|
def create_client():
|
||||||
|
try:
|
||||||
|
client = monitoring_v3.MetricServiceClient()
|
||||||
|
now = time.time()
|
||||||
|
seconds = int(now)
|
||||||
|
nanos = int((now - seconds) * 10 ** 9)
|
||||||
|
interval = monitoring_v3.TimeInterval(
|
||||||
|
{
|
||||||
|
"end_time": {"seconds": seconds, "nanos": nanos},
|
||||||
|
"start_time": {"seconds": (seconds - 86400), "nanos": nanos},
|
||||||
|
})
|
||||||
|
return (client, interval)
|
||||||
|
except Exception as e:
|
||||||
|
raise Exception("Error occurred creating the client: {}".format(e))
|
||||||
|
|
||||||
|
# Creates usage, limit and utilization Cloud monitoring metrics for GCE instances
|
||||||
|
# Returns a dictionary with the names and descriptions of the created metrics
|
||||||
|
def create_gce_instances_metrics():
|
||||||
|
instance_metric = {}
|
||||||
|
instance_metric["usage_name"] = "number_of_instances_usage"
|
||||||
|
instance_metric["limit_name"] = "number_of_instances_limit"
|
||||||
|
instance_metric["utilization_name"] = "number_of_instances_utilization"
|
||||||
|
|
||||||
|
instance_metric["usage_description"] = "Number of instances per VPC network - usage."
|
||||||
|
instance_metric["limit_description"] = "Number of instances per VPC network - effective limit."
|
||||||
|
instance_metric["utilization_description"] = "Number of instances per VPC network - utilization."
|
||||||
|
|
||||||
|
create_metric(instance_metric["usage_name"], instance_metric["usage_description"])
|
||||||
|
create_metric(instance_metric["limit_name"], instance_metric["limit_description"])
|
||||||
|
create_metric(instance_metric["utilization_name"], instance_metric["utilization_description"])
|
||||||
|
|
||||||
|
return instance_metric
|
||||||
|
|
||||||
|
# Creates a Cloud Monitoring metric based on the parameter given if the metric is not already existing
|
||||||
|
def create_metric(metric_name, description):
|
||||||
|
client = monitoring_v3.MetricServiceClient()
|
||||||
|
|
||||||
|
metric_link = f"custom.googleapis.com/{metric_name}"
|
||||||
|
types = []
|
||||||
|
for desc in client.list_metric_descriptors(name=monitoring_project_link):
|
||||||
|
types.append(desc.type)
|
||||||
|
|
||||||
|
# If the metric doesn't exist yet, then we create it
|
||||||
|
if metric_link not in types:
|
||||||
|
descriptor = ga_metric.MetricDescriptor()
|
||||||
|
descriptor.type = f"custom.googleapis.com/{metric_name}"
|
||||||
|
descriptor.metric_kind = ga_metric.MetricDescriptor.MetricKind.GAUGE
|
||||||
|
descriptor.value_type = ga_metric.MetricDescriptor.ValueType.DOUBLE
|
||||||
|
descriptor.description = description
|
||||||
|
descriptor = client.create_metric_descriptor(name=monitoring_project_link, metric_descriptor=descriptor)
|
||||||
|
print("Created {}.".format(descriptor.name))
|
||||||
|
|
||||||
|
def get_gce_instances_data(instance_metric):
|
||||||
|
|
||||||
|
# Existing GCP Monitoring metrics for GCE instances
|
||||||
|
metric_instances_usage = "compute.googleapis.com/quota/instances_per_vpc_network/usage"
|
||||||
|
metric_instances_limit = "compute.googleapis.com/quota/instances_per_vpc_network/limit"
|
||||||
|
|
||||||
|
for project in monitored_projects_list:
|
||||||
|
network_dict = get_networks(project)
|
||||||
|
|
||||||
|
current_quota_usage = get_quota_current_usage(f"projects/{project}", metric_instances_usage)
|
||||||
|
current_quota_limit = get_quota_current_limit(f"projects/{project}", metric_instances_limit)
|
||||||
|
|
||||||
|
current_quota_usage_view = customize_quota_view(current_quota_usage)
|
||||||
|
current_quota_limit_view = customize_quota_view(current_quota_limit)
|
||||||
|
|
||||||
|
for net in network_dict:
|
||||||
|
set_usage_limits(net, current_quota_usage_view, current_quota_limit_view, limit_instances)
|
||||||
|
write_data_to_metric(project, net['usage'], instance_metric["usage_name"], net['network name'])
|
||||||
|
write_data_to_metric(project, net['limit'], instance_metric["limit_name"], net['network name'])
|
||||||
|
write_data_to_metric(project, net['usage']/ net['limit'], instance_metric["utilization_name"], net['network name'])
|
||||||
|
|
||||||
|
print(f"Wrote number of instances to metric for projects/{project}")
|
||||||
|
|
||||||
|
|
||||||
|
# Creates 2 metrics: VPC peerings per VPC and active VPC peerings per VPC
|
||||||
|
def create_vpc_peering_metrics():
|
||||||
|
vpc_peering_active_metric = {}
|
||||||
|
vpc_peering_active_metric["usage_name"] = "number_of_active_vpc_peerings_usage"
|
||||||
|
vpc_peering_active_metric["limit_name"] = "number_of_active_vpc_peerings_limit"
|
||||||
|
vpc_peering_active_metric["utilization_name"] = "number_of_active_vpc_peerings_utilization"
|
||||||
|
|
||||||
|
vpc_peering_active_metric["usage_description"] = "Number of active VPC Peerings per VPC - usage."
|
||||||
|
vpc_peering_active_metric["limit_description"] = "Number of active VPC Peerings per VPC - effective limit."
|
||||||
|
vpc_peering_active_metric["utilization_description"] = "Number of active VPC Peerings per VPC - utilization."
|
||||||
|
|
||||||
|
vpc_peering_metric = {}
|
||||||
|
vpc_peering_metric["usage_name"] = "number_of_vpc_peerings_usage"
|
||||||
|
vpc_peering_metric["limit_name"] = "number_of_vpc_peerings_limit"
|
||||||
|
vpc_peering_metric["utilization_name"] = "number_of_vpc_peerings_utilization"
|
||||||
|
|
||||||
|
vpc_peering_metric["usage_description"] = "Number of VPC Peerings per VPC - usage."
|
||||||
|
vpc_peering_metric["limit_description"] = "Number of VPC Peerings per VPC - effective limit."
|
||||||
|
vpc_peering_metric["utilization_description"] = "Number of VPC Peerings per VPC - utilization."
|
||||||
|
|
||||||
|
create_metric(vpc_peering_active_metric["usage_name"], vpc_peering_active_metric["usage_description"])
|
||||||
|
create_metric(vpc_peering_active_metric["limit_name"], vpc_peering_active_metric["limit_description"])
|
||||||
|
create_metric(vpc_peering_active_metric["utilization_name"], vpc_peering_active_metric["utilization_description"])
|
||||||
|
|
||||||
|
create_metric(vpc_peering_metric["usage_name"], vpc_peering_metric["usage_description"])
|
||||||
|
create_metric(vpc_peering_metric["limit_name"], vpc_peering_metric["limit_description"])
|
||||||
|
create_metric(vpc_peering_metric["utilization_name"], vpc_peering_metric["utilization_description"])
|
||||||
|
|
||||||
|
return vpc_peering_active_metric, vpc_peering_metric
|
||||||
|
|
||||||
|
# Populates data for VPC peerings per VPC and active VPC peerings per VPC
|
||||||
|
def get_vpc_peering_data(vpc_peering_active_metric, vpc_peering_metric):
|
||||||
|
for project in monitored_projects_list:
|
||||||
|
active_vpc_peerings, vpc_peerings = gather_vpc_peerings_data(project, limit_vpc_peer)
|
||||||
|
for peering in active_vpc_peerings:
|
||||||
|
write_data_to_metric(project, peering['active_peerings'], vpc_peering_active_metric["usage_name"], peering['network name'])
|
||||||
|
write_data_to_metric(project, peering['network_limit'], vpc_peering_active_metric["limit_name"], peering['network name'])
|
||||||
|
write_data_to_metric(project, peering['active_peerings'] / peering['network_limit'], vpc_peering_active_metric["utilization_name"], peering['network name'])
|
||||||
|
print("Wrote number of active VPC peerings to custom metric for project:", project)
|
||||||
|
|
||||||
|
for peering in vpc_peerings:
|
||||||
|
write_data_to_metric(project, peering['peerings'], vpc_peering_metric["usage_name"], peering['network name'])
|
||||||
|
write_data_to_metric(project, peering['network_limit'], vpc_peering_metric["limit_name"], peering['network name'])
|
||||||
|
write_data_to_metric(project, peering['peerings'] / peering['network_limit'], vpc_peering_metric["utilization_name"], peering['network name'])
|
||||||
|
print("Wrote number of VPC peerings to custom metric for project:", project)
|
||||||
|
|
||||||
|
# gathers number of VPC peerings, active VPC peerings and limits, returns 2 dictionaries: active_vpc_peerings and vpc_peerings (including inactive and active ones)
|
||||||
|
def gather_vpc_peerings_data(project_id, limit_list):
|
||||||
|
active_peerings_dict = []
|
||||||
|
peerings_dict = []
|
||||||
|
request = service.networks().list(project=project_id)
|
||||||
|
response = request.execute()
|
||||||
|
if 'items' in response:
|
||||||
|
for network in response['items']:
|
||||||
|
if 'peerings' in network:
|
||||||
|
STATE = network['peerings'][0]['state']
|
||||||
|
if STATE == "ACTIVE":
|
||||||
|
active_peerings_count = len(network['peerings'])
|
||||||
|
else:
|
||||||
|
active_peerings_count = 0
|
||||||
|
|
||||||
|
peerings_count = len(network['peerings'])
|
||||||
|
else:
|
||||||
|
peerings_count = 0
|
||||||
|
active_peerings_count = 0
|
||||||
|
|
||||||
|
active_d = {'project_id': project_id,'network name':network['name'],'active_peerings':active_peerings_count,'network_limit': get_limit(network['name'], limit_list)}
|
||||||
|
active_peerings_dict.append(active_d)
|
||||||
|
d = {'project_id': project_id,'network name':network['name'],'peerings':peerings_count,'network_limit': get_limit(network['name'], limit_list)}
|
||||||
|
peerings_dict.append(d)
|
||||||
|
|
||||||
|
return active_peerings_dict, peerings_dict
|
||||||
|
|
||||||
|
# Check if the VPC has a specific limit for a specific metric, if so, returns that limit, if not, returns the default limit
|
||||||
|
def get_limit(network_name, limit_list):
|
||||||
|
if network_name in limit_list:
|
||||||
|
return int(limit_list[limit_list.index(network_name) + 1])
|
||||||
|
else:
|
||||||
|
if 'default_value' in limit_list:
|
||||||
|
return int(limit_list[limit_list.index('default_value') + 1])
|
||||||
|
else:
|
||||||
|
return 0
|
||||||
|
|
||||||
|
# Creates the custom metrics for L4 internal forwarding Rules
|
||||||
|
def create_l4_forwarding_rules_metric():
|
||||||
|
forwarding_rules_metric = {}
|
||||||
|
forwarding_rules_metric["usage_name"] = "internal_forwarding_rules_l4_usage"
|
||||||
|
forwarding_rules_metric["limit_name"] = "internal_forwarding_rules_l4_limit"
|
||||||
|
forwarding_rules_metric["utilization_name"] = "internal_forwarding_rules_l4_utilization"
|
||||||
|
|
||||||
|
forwarding_rules_metric["usage_description"] = "Number of Internal Forwarding Rules for Internal L4 Load Balancers - usage."
|
||||||
|
forwarding_rules_metric["limit_description"] = "Number of Internal Forwarding Rules for Internal L4 Load Balancers - effective limit."
|
||||||
|
forwarding_rules_metric["utilization_description"] = "Number of Internal Forwarding Rules for Internal L4 Load Balancers - utilization."
|
||||||
|
|
||||||
|
create_metric(forwarding_rules_metric["usage_name"], forwarding_rules_metric["usage_description"])
|
||||||
|
create_metric(forwarding_rules_metric["limit_name"], forwarding_rules_metric["limit_description"])
|
||||||
|
create_metric(forwarding_rules_metric["utilization_name"], forwarding_rules_metric["utilization_description"])
|
||||||
|
|
||||||
|
return forwarding_rules_metric
|
||||||
|
|
||||||
|
def get_l4_forwarding_rules_data(forwarding_rules_metric):
|
||||||
|
|
||||||
|
# Existing GCP Monitoring metrics for L4 Forwarding Rules
|
||||||
|
l4_forwarding_rules_usage = "compute.googleapis.com/quota/internal_lb_forwarding_rules_per_vpc_network/usage"
|
||||||
|
l4_forwarding_rules_limit = "compute.googleapis.com/quota/internal_lb_forwarding_rules_per_vpc_network/limit"
|
||||||
|
|
||||||
|
for project in monitored_projects_list:
|
||||||
|
network_dict = get_networks(project)
|
||||||
|
|
||||||
|
current_quota_usage = get_quota_current_usage(f"projects/{project}", l4_forwarding_rules_usage)
|
||||||
|
current_quota_limit = get_quota_current_limit(f"projects/{project}", l4_forwarding_rules_limit)
|
||||||
|
|
||||||
|
current_quota_usage_view = customize_quota_view(current_quota_usage)
|
||||||
|
current_quota_limit_view = customize_quota_view(current_quota_limit)
|
||||||
|
|
||||||
|
for net in network_dict:
|
||||||
|
set_usage_limits(net, current_quota_usage_view, current_quota_limit_view, limit_l4)
|
||||||
|
write_data_to_metric(project, net['usage'], forwarding_rules_metric["usage_name"], net['network name'])
|
||||||
|
write_data_to_metric(project, net['limit'], forwarding_rules_metric["limit_name"], net['network name'])
|
||||||
|
write_data_to_metric(project, net['usage']/ net['limit'], forwarding_rules_metric["utilization_name"], net['network name'])
|
||||||
|
|
||||||
|
print(f"Wrote number of L4 forwarding rules to metric for projects/{project}")
|
||||||
|
|
||||||
|
# Creates the custom metrics for L4 internal forwarding Rules per VPC Peering Group
|
||||||
|
def create_l4_forwarding_rules_ppg_metric():
|
||||||
|
forwarding_rules_metric = {}
|
||||||
|
forwarding_rules_metric["usage_name"] = "internal_forwarding_rules_l4_ppg_usage"
|
||||||
|
forwarding_rules_metric["limit_name"] = "internal_forwarding_rules_l4_ppg_limit"
|
||||||
|
forwarding_rules_metric["utilization_name"] = "internal_forwarding_rules_l4_ppg_utilization"
|
||||||
|
|
||||||
|
forwarding_rules_metric["usage_description"] = "Number of Internal Forwarding Rules for Internal l4 Load Balancers per peering group - usage."
|
||||||
|
forwarding_rules_metric["limit_description"] = "Number of Internal Forwarding Rules for Internal l4 Load Balancers per peering group - effective limit."
|
||||||
|
forwarding_rules_metric["utilization_description"] = "Number of Internal Forwarding Rules for Internal l4 Load Balancers per peering group - utilization."
|
||||||
|
|
||||||
|
create_metric(forwarding_rules_metric["usage_name"], forwarding_rules_metric["usage_description"])
|
||||||
|
create_metric(forwarding_rules_metric["limit_name"], forwarding_rules_metric["limit_description"])
|
||||||
|
create_metric(forwarding_rules_metric["utilization_name"], forwarding_rules_metric["utilization_description"])
|
||||||
|
|
||||||
|
return forwarding_rules_metric
|
||||||
|
|
||||||
|
# Creates the custom metrics for L7 internal forwarding Rules per VPC Peering Group
|
||||||
|
def create_l7_forwarding_rules_ppg_metric():
|
||||||
|
forwarding_rules_metric = {}
|
||||||
|
forwarding_rules_metric["usage_name"] = "internal_forwarding_rules_l7_ppg_usage"
|
||||||
|
forwarding_rules_metric["limit_name"] = "internal_forwarding_rules_l7_ppg_limit"
|
||||||
|
forwarding_rules_metric["utilization_name"] = "internal_forwarding_rules_l7_ppg_utilization"
|
||||||
|
|
||||||
|
forwarding_rules_metric["usage_description"] = "Number of Internal Forwarding Rules for Internal l7 Load Balancers per peering group - usage."
|
||||||
|
forwarding_rules_metric["limit_description"] = "Number of Internal Forwarding Rules for Internal l7 Load Balancers per peering group - effective limit."
|
||||||
|
forwarding_rules_metric["utilization_description"] = "Number of Internal Forwarding Rules for Internal l7 Load Balancers per peering group - utilization."
|
||||||
|
|
||||||
|
create_metric(forwarding_rules_metric["usage_name"], forwarding_rules_metric["usage_description"])
|
||||||
|
create_metric(forwarding_rules_metric["limit_name"], forwarding_rules_metric["limit_description"])
|
||||||
|
create_metric(forwarding_rules_metric["utilization_name"], forwarding_rules_metric["utilization_description"])
|
||||||
|
|
||||||
|
return forwarding_rules_metric
|
||||||
|
|
||||||
|
def create_subnet_ranges_ppg_metric():
|
||||||
|
metric = {}
|
||||||
|
|
||||||
|
metric["usage_name"] = "number_of_subnet_IP_ranges_usage"
|
||||||
|
metric["limit_name"] = "number_of_subnet_IP_ranges_effective_limit"
|
||||||
|
metric["utilization_name"] = "number_of_subnet_IP_ranges_utilization"
|
||||||
|
|
||||||
|
metric["usage_description"] = "Number of Subnet Ranges per peering group - usage."
|
||||||
|
metric["limit_description"] = "Number of Subnet Ranges per peering group - effective limit."
|
||||||
|
metric["utilization_description"] = "Number of Subnet Ranges per peering group - utilization."
|
||||||
|
|
||||||
|
create_metric(metric["usage_name"], metric["usage_description"])
|
||||||
|
create_metric(metric["limit_name"], metric["limit_description"])
|
||||||
|
create_metric(metric["utilization_name"], metric["utilization_description"])
|
||||||
|
|
||||||
|
return metric
|
||||||
|
|
||||||
|
def create_gce_instances_ppg_metric():
|
||||||
|
metric = {}
|
||||||
|
|
||||||
|
metric["usage_name"] = "number_of_instances_ppg_usage"
|
||||||
|
metric["limit_name"] = "number_of_instances_ppg_limit"
|
||||||
|
metric["utilization_name"] = "number_of_instances_ppg_utilization"
|
||||||
|
|
||||||
|
metric["usage_description"] = "Number of instances per peering group - usage."
|
||||||
|
metric["limit_description"] = "Number of instances per peering group - effective limit."
|
||||||
|
metric["utilization_description"] = "Number of instances per peering group - utilization."
|
||||||
|
|
||||||
|
create_metric(metric["usage_name"], metric["usage_description"])
|
||||||
|
create_metric(metric["limit_name"], metric["limit_description"])
|
||||||
|
create_metric(metric["utilization_name"], metric["utilization_description"])
|
||||||
|
|
||||||
|
return metric
|
||||||
|
|
||||||
|
# Populates data for the custom metrics for L4 internal forwarding Rules per Peering Group
|
||||||
|
def get_pgg_data(forwarding_rules_ppg_metric, usage_metric, limit_metric, limit_ppg):
|
||||||
|
|
||||||
|
for project in monitored_projects_list:
|
||||||
|
network_dict_list = gather_peering_data(project)
|
||||||
|
# Network dict list is a list of dictionary (one for each network)
|
||||||
|
# For each network, this dictionary contains:
|
||||||
|
# project_id, network_name, network_id, usage, limit, peerings (list of peered networks)
|
||||||
|
# peerings is a list of dictionary (one for each peered network) and contains:
|
||||||
|
# project_id, network_name, network_id
|
||||||
|
|
||||||
|
# For each network in this GCP project
|
||||||
|
for network_dict in network_dict_list:
|
||||||
|
current_quota_usage = get_quota_current_usage(f"projects/{project}", usage_metric)
|
||||||
|
current_quota_limit = get_quota_current_limit(f"projects/{project}", limit_metric)
|
||||||
|
|
||||||
|
current_quota_usage_view = customize_quota_view(current_quota_usage)
|
||||||
|
current_quota_limit_view = customize_quota_view(current_quota_limit)
|
||||||
|
|
||||||
|
usage, limit = get_usage_limit(network_dict, current_quota_usage_view, current_quota_limit_view, limit_ppg)
|
||||||
|
# Here we add usage and limit to the network dictionary
|
||||||
|
network_dict["usage"] = usage
|
||||||
|
network_dict["limit"] = limit
|
||||||
|
|
||||||
|
# For every peered network, get usage and limits
|
||||||
|
for peered_network in network_dict['peerings']:
|
||||||
|
peering_project_usage = customize_quota_view(get_quota_current_usage(f"projects/{peered_network['project_id']}", usage_metric))
|
||||||
|
peering_project_limit = customize_quota_view(get_quota_current_limit(f"projects/{peered_network['project_id']}", limit_metric))
|
||||||
|
|
||||||
|
usage, limit = get_usage_limit(peered_network, peering_project_usage, peering_project_limit, limit_ppg)
|
||||||
|
# Here we add usage and limit to the peered network dictionary
|
||||||
|
peered_network["usage"] = usage
|
||||||
|
peered_network["limit"] = limit
|
||||||
|
|
||||||
|
count_effective_limit(project, network_dict, forwarding_rules_ppg_metric["usage_name"], forwarding_rules_ppg_metric["limit_name"], forwarding_rules_ppg_metric["utilization_name"], limit_ppg)
|
||||||
|
print(f"Wrote {forwarding_rules_ppg_metric['usage_name']} to metric for peering group {network_dict['network_name']} in {project}")
|
||||||
|
|
||||||
|
# Calculates the effective limits (using algorithm in the link below) for peering groups and writes data (usage, limit, utilization) to metric
|
||||||
|
# https://cloud.google.com/vpc/docs/quota#vpc-peering-effective-limit
|
||||||
|
def count_effective_limit(project_id, network_dict, usage_metric_name, limit_metric_name, utilization_metric_name, limit_ppg):
|
||||||
|
|
||||||
|
if network_dict['peerings'] == []:
|
||||||
|
return
|
||||||
|
|
||||||
|
# Get usage: Sums usage for current network + all peered networks
|
||||||
|
peering_group_usage = network_dict['usage']
|
||||||
|
for peered_network in network_dict['peerings']:
|
||||||
|
peering_group_usage += peered_network['usage']
|
||||||
|
|
||||||
|
# Calculates effective limit: Step 1: max(per network limit, per network_peering_group limit)
|
||||||
|
limit_step1 = max(network_dict['limit'], get_limit(network_dict['network_name'], limit_ppg))
|
||||||
|
|
||||||
|
# Calculates effective limit: Step 2: List of max(per network limit, per network_peering_group limit) for each peered network
|
||||||
|
limit_step2 = []
|
||||||
|
for peered_network in network_dict['peerings']:
|
||||||
|
limit_step2.append(max(peered_network['limit'], get_limit(peered_network['network_name'], limit_ppg)))
|
||||||
|
|
||||||
|
# Calculates effective limit: Step 3: Find minimum from the list created by Step 2
|
||||||
|
limit_step3 = min(limit_step2)
|
||||||
|
|
||||||
|
# Calculates effective limit: Step 4: Find maximum from step 1 and step 3
|
||||||
|
effective_limit = max(limit_step1, limit_step3)
|
||||||
|
utilization = peering_group_usage / effective_limit
|
||||||
|
|
||||||
|
write_data_to_metric(project_id, peering_group_usage, usage_metric_name, network_dict['network_name'])
|
||||||
|
write_data_to_metric(project_id, effective_limit, limit_metric_name, network_dict['network_name'])
|
||||||
|
write_data_to_metric(project_id, utilization, utilization_metric_name, network_dict['network_name'])
|
||||||
|
|
||||||
|
# Takes a project id as argument (and service for the GCP API call) and return a dictionary with the list of networks
|
||||||
|
def get_networks(project_id):
|
||||||
|
request = service.networks().list(project=project_id)
|
||||||
|
response = request.execute()
|
||||||
|
network_dict = []
|
||||||
|
if 'items' in response:
|
||||||
|
for network in response['items']:
|
||||||
|
NETWORK = network['name']
|
||||||
|
ID = network['id']
|
||||||
|
d = {'project_id':project_id,'network name':NETWORK,'network id':ID}
|
||||||
|
network_dict.append(d)
|
||||||
|
return network_dict
|
||||||
|
|
||||||
|
# gathers data for peered networks for the given project_id
|
||||||
|
def gather_peering_data(project_id):
|
||||||
|
request = service.networks().list(project=project_id)
|
||||||
|
response = request.execute()
|
||||||
|
|
||||||
|
# list of networks in that project
|
||||||
|
network_list = []
|
||||||
|
if 'items' in response:
|
||||||
|
for network in response['items']:
|
||||||
|
net = {'project_id':project_id,'network_name':network['name'],'network_id':network['id'], 'peerings':[]}
|
||||||
|
if 'peerings' in network:
|
||||||
|
STATE = network['peerings'][0]['state']
|
||||||
|
if STATE == "ACTIVE":
|
||||||
|
for peered_network in network['peerings']: # "projects/{project_name}/global/networks/{network_name}"
|
||||||
|
start = peered_network['network'].find("projects/") + len('projects/')
|
||||||
|
end = peered_network['network'].find("/global")
|
||||||
|
peered_project = peered_network['network'][start:end]
|
||||||
|
peered_network_name = peered_network['network'].split("networks/")[1]
|
||||||
|
peered_net = {'project_id': peered_project, 'network_name':peered_network_name, 'network_id': get_network_id(peered_project, peered_network_name)}
|
||||||
|
net["peerings"].append(peered_net)
|
||||||
|
network_list.append(net)
|
||||||
|
return network_list
|
||||||
|
|
||||||
|
def get_network_id(project_id, network_name):
|
||||||
|
request = service.networks().list(project=project_id)
|
||||||
|
response = request.execute()
|
||||||
|
|
||||||
|
network_id = 0
|
||||||
|
|
||||||
|
if 'items' in response:
|
||||||
|
for network in response['items']:
|
||||||
|
if network['name'] == network_name:
|
||||||
|
network_id = network['id']
|
||||||
|
break
|
||||||
|
|
||||||
|
if network_id == 0:
|
||||||
|
print(f"Error: network_id not found for {network_name} in {project_id}")
|
||||||
|
|
||||||
|
return network_id
|
||||||
|
|
||||||
|
# retrieves quota for "type" in project_link, otherwise returns null (assume 0 for building comparison vs limits)
|
||||||
|
def get_quota_current_usage(project_link, type):
|
||||||
|
results = client.list_time_series(request={
|
||||||
|
"name": project_link,
|
||||||
|
"filter": f'metric.type = "{type}"',
|
||||||
|
"interval": interval,
|
||||||
|
"view": monitoring_v3.ListTimeSeriesRequest.TimeSeriesView.FULL
|
||||||
|
})
|
||||||
|
results_list = list(results)
|
||||||
|
return (results_list)
|
||||||
|
|
||||||
|
# retrieves quota for services limits
|
||||||
|
def get_quota_current_limit(project_link, type):
|
||||||
|
results = client.list_time_series(request={
|
||||||
|
"name": project_link,
|
||||||
|
"filter": f'metric.type = "{type}"',
|
||||||
|
"interval": interval,
|
||||||
|
"view": monitoring_v3.ListTimeSeriesRequest.TimeSeriesView.FULL
|
||||||
|
})
|
||||||
|
results_list = list(results)
|
||||||
|
return (results_list)
|
||||||
|
|
||||||
|
# Customize the quota output
|
||||||
|
def customize_quota_view(quota_results):
|
||||||
|
quotaViewList = []
|
||||||
|
for result in quota_results:
|
||||||
|
quotaViewJson = {}
|
||||||
|
quotaViewJson.update(dict(result.resource.labels))
|
||||||
|
quotaViewJson.update(dict(result.metric.labels))
|
||||||
|
for val in result.points:
|
||||||
|
quotaViewJson.update({'value': val.value.int64_value})
|
||||||
|
quotaViewList.append(quotaViewJson)
|
||||||
|
return (quotaViewList)
|
||||||
|
|
||||||
|
# Takes a network dictionary and updates it with the quota usage and limits values
|
||||||
|
def set_usage_limits(network, quota_usage, quota_limit, limit_list):
|
||||||
|
if quota_usage:
|
||||||
|
for net in quota_usage:
|
||||||
|
if net['network_id'] == network['network id']: # if network ids in GCP quotas and in dictionary (using API) are the same
|
||||||
|
network['usage'] = net['value'] # set network usage in dictionary
|
||||||
|
break
|
||||||
|
else:
|
||||||
|
network['usage'] = 0 # if network does not appear in GCP quotas
|
||||||
|
else:
|
||||||
|
network['usage'] = 0 # if quotas does not appear in GCP quotas
|
||||||
|
|
||||||
|
if quota_limit:
|
||||||
|
for net in quota_limit:
|
||||||
|
if net['network_id'] == network['network id']: # if network ids in GCP quotas and in dictionary (using API) are the same
|
||||||
|
network['limit'] = net['value'] # set network limit in dictionary
|
||||||
|
break
|
||||||
|
else:
|
||||||
|
if network['network name'] in limit_list: # if network limit is in the environmental variables
|
||||||
|
network['limit'] = int(limit_list[limit_list.index(network['network name']) + 1])
|
||||||
|
else:
|
||||||
|
network['limit'] = int(limit_list[limit_list.index('default_value') + 1]) # set default value
|
||||||
|
else: # if quotas does not appear in GCP quotas
|
||||||
|
if network['network name'] in limit_list:
|
||||||
|
network['limit'] = int(limit_list[limit_list.index(network['network name']) + 1]) # ["default", 100, "networkname", 200]
|
||||||
|
else:
|
||||||
|
network['limit'] = int(limit_list[limit_list.index('default_value') + 1])
|
||||||
|
|
||||||
|
# Takes a network dictionary (with at least network_id and network_name) and returns usage and limit for that network
|
||||||
|
def get_usage_limit(network, quota_usage, quota_limit, limit_list):
|
||||||
|
usage = 0
|
||||||
|
limit = 0
|
||||||
|
|
||||||
|
if quota_usage:
|
||||||
|
for net in quota_usage:
|
||||||
|
if net['network_id'] == network['network_id']: # if network ids in GCP quotas and in dictionary (using API) are the same
|
||||||
|
usage = net['value'] # set network usage in dictionary
|
||||||
|
break
|
||||||
|
|
||||||
|
if quota_limit:
|
||||||
|
for net in quota_limit:
|
||||||
|
if net['network_id'] == network['network_id']: # if network ids in GCP quotas and in dictionary (using API) are the same
|
||||||
|
limit = net['value'] # set network limit in dictionary
|
||||||
|
break
|
||||||
|
else:
|
||||||
|
if network['network_name'] in limit_list: # if network limit is in the environmental variables
|
||||||
|
limit = int(limit_list[limit_list.index(network['network_name']) + 1])
|
||||||
|
else:
|
||||||
|
limit = int(limit_list[limit_list.index('default_value') + 1]) # set default value
|
||||||
|
else: # if quotas does not appear in GCP quotas
|
||||||
|
if network['network_name'] in limit_list:
|
||||||
|
limit = int(limit_list[limit_list.index(network['network_name']) + 1]) # ["default", 100, "networkname", 200]
|
||||||
|
else:
|
||||||
|
limit = int(limit_list[limit_list.index('default_value') + 1])
|
||||||
|
|
||||||
|
return usage, limit
|
||||||
|
|
||||||
|
# Writes data to Cloud Monitoring data
|
||||||
|
# Note that the monitoring_project_id here should be the monitoring project where the metrics are written
|
||||||
|
# and monitored_project_id is the monitored project, containing the network and resources
|
||||||
|
def write_data_to_metric(monitored_project_id, value, metric_name, network_name):
|
||||||
|
series = monitoring_v3.TimeSeries()
|
||||||
|
series.metric.type = f"custom.googleapis.com/{metric_name}"
|
||||||
|
series.resource.type = "global"
|
||||||
|
series.metric.labels["network_name"] = network_name
|
||||||
|
series.metric.labels["project"] = monitored_project_id
|
||||||
|
|
||||||
|
now = time.time()
|
||||||
|
seconds = int(now)
|
||||||
|
nanos = int((now - seconds) * 10 ** 9)
|
||||||
|
interval = monitoring_v3.TimeInterval({"end_time": {"seconds": seconds, "nanos": nanos}})
|
||||||
|
point = monitoring_v3.Point({"interval": interval, "value": {"double_value": value}})
|
||||||
|
series.points = [point]
|
||||||
|
|
||||||
|
client.create_time_series(name=monitoring_project_link, time_series=[series])
|
|
@ -0,0 +1,8 @@
|
||||||
|
regex
|
||||||
|
google-api-python-client
|
||||||
|
google-auth
|
||||||
|
google-auth-httplib2
|
||||||
|
google-cloud-logging
|
||||||
|
google-cloud-monitoring
|
||||||
|
oauth2client
|
||||||
|
google-api-core
|
|
@ -0,0 +1,351 @@
|
||||||
|
{
|
||||||
|
"displayName": "quotas_utilization",
|
||||||
|
"mosaicLayout": {
|
||||||
|
"columns": 12,
|
||||||
|
"tiles": [
|
||||||
|
{
|
||||||
|
"height": 4,
|
||||||
|
"widget": {
|
||||||
|
"title": "internal_forwarding_rules_l4_utilization",
|
||||||
|
"xyChart": {
|
||||||
|
"chartOptions": {
|
||||||
|
"mode": "COLOR"
|
||||||
|
},
|
||||||
|
"dataSets": [
|
||||||
|
{
|
||||||
|
"minAlignmentPeriod": "3600s",
|
||||||
|
"plotType": "LINE",
|
||||||
|
"targetAxis": "Y1",
|
||||||
|
"timeSeriesQuery": {
|
||||||
|
"timeSeriesFilter": {
|
||||||
|
"aggregation": {
|
||||||
|
"alignmentPeriod": "3600s",
|
||||||
|
"perSeriesAligner": "ALIGN_NEXT_OLDER"
|
||||||
|
},
|
||||||
|
"filter": "metric.type=\"custom.googleapis.com/internal_forwarding_rules_l4_utilization\" resource.type=\"global\"",
|
||||||
|
"secondaryAggregation": {
|
||||||
|
"alignmentPeriod": "1800s",
|
||||||
|
"perSeriesAligner": "ALIGN_MEAN"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"timeshiftDuration": "0s",
|
||||||
|
"yAxis": {
|
||||||
|
"label": "y1Axis",
|
||||||
|
"scale": "LINEAR"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"width": 6
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"height": 4,
|
||||||
|
"widget": {
|
||||||
|
"title": "internal_forwarding_rules_l7_utilization",
|
||||||
|
"xyChart": {
|
||||||
|
"chartOptions": {
|
||||||
|
"mode": "COLOR"
|
||||||
|
},
|
||||||
|
"dataSets": [
|
||||||
|
{
|
||||||
|
"minAlignmentPeriod": "3600s",
|
||||||
|
"plotType": "LINE",
|
||||||
|
"targetAxis": "Y1",
|
||||||
|
"timeSeriesQuery": {
|
||||||
|
"timeSeriesFilter": {
|
||||||
|
"aggregation": {
|
||||||
|
"alignmentPeriod": "3600s",
|
||||||
|
"perSeriesAligner": "ALIGN_NEXT_OLDER"
|
||||||
|
},
|
||||||
|
"filter": "metric.type=\"custom.googleapis.com/internal_forwarding_rules_l7_utilization\" resource.type=\"global\"",
|
||||||
|
"secondaryAggregation": {
|
||||||
|
"alignmentPeriod": "60s",
|
||||||
|
"perSeriesAligner": "ALIGN_MEAN"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"timeshiftDuration": "0s",
|
||||||
|
"yAxis": {
|
||||||
|
"label": "y1Axis",
|
||||||
|
"scale": "LINEAR"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"width": 6,
|
||||||
|
"xPos": 6
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"height": 4,
|
||||||
|
"widget": {
|
||||||
|
"title": "number_of_instances_utilization",
|
||||||
|
"xyChart": {
|
||||||
|
"chartOptions": {
|
||||||
|
"mode": "COLOR"
|
||||||
|
},
|
||||||
|
"dataSets": [
|
||||||
|
{
|
||||||
|
"minAlignmentPeriod": "3600s",
|
||||||
|
"plotType": "LINE",
|
||||||
|
"targetAxis": "Y1",
|
||||||
|
"timeSeriesQuery": {
|
||||||
|
"timeSeriesFilter": {
|
||||||
|
"aggregation": {
|
||||||
|
"alignmentPeriod": "3600s",
|
||||||
|
"perSeriesAligner": "ALIGN_NEXT_OLDER"
|
||||||
|
},
|
||||||
|
"filter": "metric.type=\"custom.googleapis.com/number_of_instances_utilization\" resource.type=\"global\"",
|
||||||
|
"secondaryAggregation": {
|
||||||
|
"alignmentPeriod": "60s",
|
||||||
|
"perSeriesAligner": "ALIGN_MEAN"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"timeshiftDuration": "0s",
|
||||||
|
"yAxis": {
|
||||||
|
"label": "y1Axis",
|
||||||
|
"scale": "LINEAR"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"width": 6,
|
||||||
|
"yPos": 8
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"height": 4,
|
||||||
|
"widget": {
|
||||||
|
"title": "number_of_vpc_peerings_utilization",
|
||||||
|
"xyChart": {
|
||||||
|
"chartOptions": {
|
||||||
|
"mode": "COLOR"
|
||||||
|
},
|
||||||
|
"dataSets": [
|
||||||
|
{
|
||||||
|
"minAlignmentPeriod": "3600s",
|
||||||
|
"plotType": "LINE",
|
||||||
|
"targetAxis": "Y1",
|
||||||
|
"timeSeriesQuery": {
|
||||||
|
"timeSeriesFilter": {
|
||||||
|
"aggregation": {
|
||||||
|
"alignmentPeriod": "3600s",
|
||||||
|
"perSeriesAligner": "ALIGN_NEXT_OLDER"
|
||||||
|
},
|
||||||
|
"filter": "metric.type=\"custom.googleapis.com/number_of_vpc_peerings_utilization\" resource.type=\"global\"",
|
||||||
|
"secondaryAggregation": {
|
||||||
|
"alignmentPeriod": "60s",
|
||||||
|
"perSeriesAligner": "ALIGN_MEAN"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"timeshiftDuration": "0s",
|
||||||
|
"yAxis": {
|
||||||
|
"label": "y1Axis",
|
||||||
|
"scale": "LINEAR"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"width": 6,
|
||||||
|
"xPos": 6,
|
||||||
|
"yPos": 4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"height": 4,
|
||||||
|
"widget": {
|
||||||
|
"title": "number_of_active_vpc_peerings_utilization",
|
||||||
|
"xyChart": {
|
||||||
|
"chartOptions": {
|
||||||
|
"mode": "COLOR"
|
||||||
|
},
|
||||||
|
"dataSets": [
|
||||||
|
{
|
||||||
|
"minAlignmentPeriod": "3600s",
|
||||||
|
"plotType": "LINE",
|
||||||
|
"targetAxis": "Y1",
|
||||||
|
"timeSeriesQuery": {
|
||||||
|
"timeSeriesFilter": {
|
||||||
|
"aggregation": {
|
||||||
|
"alignmentPeriod": "3600s",
|
||||||
|
"perSeriesAligner": "ALIGN_NEXT_OLDER"
|
||||||
|
},
|
||||||
|
"filter": "metric.type=\"custom.googleapis.com/number_of_active_vpc_peerings_utilization\" resource.type=\"global\"",
|
||||||
|
"secondaryAggregation": {
|
||||||
|
"alignmentPeriod": "60s",
|
||||||
|
"perSeriesAligner": "ALIGN_INTERPOLATE"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"timeshiftDuration": "0s",
|
||||||
|
"yAxis": {
|
||||||
|
"label": "y1Axis",
|
||||||
|
"scale": "LINEAR"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"width": 6,
|
||||||
|
"yPos": 4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"height": 4,
|
||||||
|
"widget": {
|
||||||
|
"title": "number_of_subnet_IP_ranges_utilization",
|
||||||
|
"xyChart": {
|
||||||
|
"chartOptions": {
|
||||||
|
"mode": "COLOR"
|
||||||
|
},
|
||||||
|
"dataSets": [
|
||||||
|
{
|
||||||
|
"minAlignmentPeriod": "3600s",
|
||||||
|
"plotType": "LINE",
|
||||||
|
"targetAxis": "Y1",
|
||||||
|
"timeSeriesQuery": {
|
||||||
|
"timeSeriesFilter": {
|
||||||
|
"aggregation": {
|
||||||
|
"alignmentPeriod": "3600s",
|
||||||
|
"perSeriesAligner": "ALIGN_NEXT_OLDER"
|
||||||
|
},
|
||||||
|
"filter": "metric.type=\"custom.googleapis.com/number_of_subnet_IP_ranges_utilization\" resource.type=\"global\"",
|
||||||
|
"secondaryAggregation": {
|
||||||
|
"alignmentPeriod": "3600s",
|
||||||
|
"perSeriesAligner": "ALIGN_MEAN"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"timeshiftDuration": "0s",
|
||||||
|
"yAxis": {
|
||||||
|
"label": "y1Axis",
|
||||||
|
"scale": "LINEAR"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"width": 6,
|
||||||
|
"xPos": 6,
|
||||||
|
"yPos": 8
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"height": 4,
|
||||||
|
"widget": {
|
||||||
|
"title": "internal_forwarding_rules_l4_ppg_utilization",
|
||||||
|
"xyChart": {
|
||||||
|
"chartOptions": {
|
||||||
|
"mode": "COLOR"
|
||||||
|
},
|
||||||
|
"dataSets": [
|
||||||
|
{
|
||||||
|
"minAlignmentPeriod": "3600s",
|
||||||
|
"plotType": "LINE",
|
||||||
|
"targetAxis": "Y1",
|
||||||
|
"timeSeriesQuery": {
|
||||||
|
"timeSeriesFilter": {
|
||||||
|
"aggregation": {
|
||||||
|
"alignmentPeriod": "3600s",
|
||||||
|
"perSeriesAligner": "ALIGN_NEXT_OLDER"
|
||||||
|
},
|
||||||
|
"filter": "metric.type=\"custom.googleapis.com/internal_forwarding_rules_l4_ppg_utilization\" resource.type=\"global\"",
|
||||||
|
"secondaryAggregation": {
|
||||||
|
"alignmentPeriod": "3600s",
|
||||||
|
"perSeriesAligner": "ALIGN_MEAN"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"timeshiftDuration": "0s",
|
||||||
|
"yAxis": {
|
||||||
|
"label": "y1Axis",
|
||||||
|
"scale": "LINEAR"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"width": 6,
|
||||||
|
"yPos": 12
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"height": 4,
|
||||||
|
"widget": {
|
||||||
|
"title": "internal_forwarding_rules_l7_ppg_utilization",
|
||||||
|
"xyChart": {
|
||||||
|
"chartOptions": {
|
||||||
|
"mode": "COLOR"
|
||||||
|
},
|
||||||
|
"dataSets": [
|
||||||
|
{
|
||||||
|
"minAlignmentPeriod": "3600s",
|
||||||
|
"plotType": "LINE",
|
||||||
|
"targetAxis": "Y1",
|
||||||
|
"timeSeriesQuery": {
|
||||||
|
"timeSeriesFilter": {
|
||||||
|
"aggregation": {
|
||||||
|
"alignmentPeriod": "3600s",
|
||||||
|
"perSeriesAligner": "ALIGN_NEXT_OLDER"
|
||||||
|
},
|
||||||
|
"filter": "metric.type=\"custom.googleapis.com/internal_forwarding_rules_l7_ppg_utilization\" resource.type=\"global\"",
|
||||||
|
"secondaryAggregation": {
|
||||||
|
"alignmentPeriod": "60s",
|
||||||
|
"perSeriesAligner": "ALIGN_MEAN"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"timeshiftDuration": "0s",
|
||||||
|
"yAxis": {
|
||||||
|
"label": "y1Axis",
|
||||||
|
"scale": "LINEAR"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"width": 6,
|
||||||
|
"xPos": 6,
|
||||||
|
"yPos": 12
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"height": 4,
|
||||||
|
"widget": {
|
||||||
|
"title": "number_of_instances_ppg_utilization",
|
||||||
|
"xyChart": {
|
||||||
|
"chartOptions": {
|
||||||
|
"mode": "COLOR"
|
||||||
|
},
|
||||||
|
"dataSets": [
|
||||||
|
{
|
||||||
|
"minAlignmentPeriod": "3600s",
|
||||||
|
"plotType": "LINE",
|
||||||
|
"targetAxis": "Y1",
|
||||||
|
"timeSeriesQuery": {
|
||||||
|
"timeSeriesFilter": {
|
||||||
|
"aggregation": {
|
||||||
|
"alignmentPeriod": "3600s",
|
||||||
|
"perSeriesAligner": "ALIGN_NEXT_OLDER"
|
||||||
|
},
|
||||||
|
"filter": "metric.type=\"custom.googleapis.com/number_of_instances_ppg_utilization\" resource.type=\"global\"",
|
||||||
|
"secondaryAggregation": {
|
||||||
|
"alignmentPeriod": "60s"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"timeshiftDuration": "0s",
|
||||||
|
"yAxis": {
|
||||||
|
"label": "y1Axis",
|
||||||
|
"scale": "LINEAR"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"width": 6,
|
||||||
|
"yPos": 16
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,183 @@
|
||||||
|
/**
|
||||||
|
* Copyright 2022 Google LLC
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
locals {
|
||||||
|
project_id_list = toset(var.monitored_projects_list)
|
||||||
|
projects = join(",", local.project_id_list)
|
||||||
|
|
||||||
|
limit_subnets_list = tolist(var.limit_subnets)
|
||||||
|
limit_subnets = join(",", local.limit_subnets_list)
|
||||||
|
limit_instances_list = tolist(var.limit_instances)
|
||||||
|
limit_instances = join(",", local.limit_instances_list)
|
||||||
|
limit_instances_ppg_list = tolist(var.limit_instances_ppg)
|
||||||
|
limit_instances_ppg = join(",", local.limit_instances_ppg_list)
|
||||||
|
limit_vpc_peer_list = tolist(var.limit_vpc_peer)
|
||||||
|
limit_vpc_peer = join(",", local.limit_vpc_peer_list)
|
||||||
|
limit_l4_list = tolist(var.limit_l4)
|
||||||
|
limit_l4 = join(",", local.limit_l4_list)
|
||||||
|
limit_l7_list = tolist(var.limit_l7)
|
||||||
|
limit_l7 = join(",", local.limit_l7_list)
|
||||||
|
limit_l4_ppg_list = tolist(var.limit_l4_ppg)
|
||||||
|
limit_l4_ppg = join(",", local.limit_l4_ppg_list)
|
||||||
|
limit_l7_ppg_list = tolist(var.limit_l7_ppg)
|
||||||
|
limit_l7_ppg = join(",", local.limit_l7_ppg_list)
|
||||||
|
}
|
||||||
|
|
||||||
|
################################################
|
||||||
|
# Monitoring project creation #
|
||||||
|
################################################
|
||||||
|
|
||||||
|
module "project-monitoring" {
|
||||||
|
source = "github.com/GoogleCloudPlatform/cloud-foundation-fabric///modules/project"
|
||||||
|
name = "monitoring"
|
||||||
|
parent = "organizations/${var.organization_id}"
|
||||||
|
prefix = var.prefix
|
||||||
|
billing_account = var.billing_account
|
||||||
|
services = var.project_monitoring_services
|
||||||
|
}
|
||||||
|
|
||||||
|
################################################
|
||||||
|
# Service account creation and IAM permissions #
|
||||||
|
################################################
|
||||||
|
|
||||||
|
module "service-account-function" {
|
||||||
|
source = "github.com/GoogleCloudPlatform/cloud-foundation-fabric///modules/iam-service-account"
|
||||||
|
project_id = module.project-monitoring.project_id
|
||||||
|
name = "sa-dash"
|
||||||
|
generate_key = false
|
||||||
|
|
||||||
|
# Required IAM permissions for this service account are:
|
||||||
|
# 1) compute.networkViewer on projects to be monitored (I gave it at organization level for now for simplicity)
|
||||||
|
# 2) monitoring viewer on the projects to be monitored (I gave it at organization level for now for simplicity)
|
||||||
|
iam_organization_roles = {
|
||||||
|
"${var.organization_id}" = [
|
||||||
|
"roles/compute.networkViewer",
|
||||||
|
"roles/monitoring.viewer",
|
||||||
|
]
|
||||||
|
}
|
||||||
|
|
||||||
|
iam_project_roles = {
|
||||||
|
"${module.project-monitoring.project_id}" = [
|
||||||
|
"roles/monitoring.metricWriter"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
################################################
|
||||||
|
# Cloud Function configuration (& Scheduler) #
|
||||||
|
################################################
|
||||||
|
|
||||||
|
# Create an app engine application (required for Cloud Scheduler)
|
||||||
|
resource "google_app_engine_application" "scheduler_app" {
|
||||||
|
project = module.project-monitoring.project_id
|
||||||
|
# "europe-west1" is called "europe-west" and "us-central1" is "us-central" for App Engine, see https://cloud.google.com/appengine/docs/locations
|
||||||
|
location_id = var.region == "europe-west1" || var.region == "us-central1" ? substr(var.region, 0, length(var.region) - 1) : var.region
|
||||||
|
}
|
||||||
|
|
||||||
|
# Create a storage bucket for the Cloud Function's code
|
||||||
|
resource "google_storage_bucket" "bucket" {
|
||||||
|
name = "net-quotas-bucket"
|
||||||
|
location = "EU"
|
||||||
|
project = module.project-monitoring.project_id
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
data "archive_file" "file" {
|
||||||
|
type = "zip"
|
||||||
|
source_dir = "cloud-function"
|
||||||
|
output_path = "cloud-function.zip"
|
||||||
|
depends_on = [google_storage_bucket.bucket]
|
||||||
|
}
|
||||||
|
|
||||||
|
resource "google_storage_bucket_object" "archive" {
|
||||||
|
# md5 hash in the bucket object name to redeploy the Cloud Function when the code is modified
|
||||||
|
name = format("cloud-function#%s", data.archive_file.file.output_md5)
|
||||||
|
bucket = google_storage_bucket.bucket.name
|
||||||
|
source = "cloud-function.zip"
|
||||||
|
depends_on = [data.archive_file.file]
|
||||||
|
}
|
||||||
|
|
||||||
|
resource "google_cloudfunctions_function" "function_quotas" {
|
||||||
|
name = "function-quotas"
|
||||||
|
project = module.project-monitoring.project_id
|
||||||
|
region = var.region
|
||||||
|
description = "Function which creates metric to show number, limit and utlizitation."
|
||||||
|
runtime = "python39"
|
||||||
|
|
||||||
|
available_memory_mb = 512
|
||||||
|
source_archive_bucket = google_storage_bucket.bucket.name
|
||||||
|
source_archive_object = google_storage_bucket_object.archive.name
|
||||||
|
service_account_email = module.service-account-function.email
|
||||||
|
|
||||||
|
timeout = 180
|
||||||
|
entry_point = "quotas"
|
||||||
|
trigger_http = true
|
||||||
|
|
||||||
|
|
||||||
|
environment_variables = {
|
||||||
|
monitored_projects_list = local.projects
|
||||||
|
monitoring_project_id = module.project-monitoring.project_id
|
||||||
|
|
||||||
|
LIMIT_SUBNETS = local.limit_subnets
|
||||||
|
LIMIT_INSTANCES = local.limit_instances
|
||||||
|
LIMIT_INSTANCES_PPG = local.limit_instances_ppg
|
||||||
|
LIMIT_VPC_PEER = local.limit_vpc_peer
|
||||||
|
LIMIT_L4 = local.limit_l4
|
||||||
|
LIMIT_L7 = local.limit_l7
|
||||||
|
LIMIT_L4_PPG = local.limit_l4_ppg
|
||||||
|
LIMIT_L7_PPG = local.limit_l7_ppg
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
resource "google_cloud_scheduler_job" "job" {
|
||||||
|
name = "scheduler-net-dash"
|
||||||
|
project = module.project-monitoring.project_id
|
||||||
|
region = var.region
|
||||||
|
description = "Cloud Scheduler job to trigger the Networking Dashboard Cloud Function"
|
||||||
|
schedule = var.schedule_cron
|
||||||
|
|
||||||
|
retry_config {
|
||||||
|
retry_count = 1
|
||||||
|
}
|
||||||
|
|
||||||
|
http_target {
|
||||||
|
http_method = "POST"
|
||||||
|
uri = google_cloudfunctions_function.function_quotas.https_trigger_url
|
||||||
|
# We could pass useful data in the body later
|
||||||
|
body = base64encode("{\"foo\":\"bar\"}")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
# TODO: How to secure Cloud Function invokation? Not member = "allUsers" but specific Scheduler service Account?
|
||||||
|
# Maybe "service-YOUR_PROJECT_NUMBER@gcp-sa-cloudscheduler.iam.gserviceaccount.com"?
|
||||||
|
|
||||||
|
resource "google_cloudfunctions_function_iam_member" "invoker" {
|
||||||
|
project = module.project-monitoring.project_id
|
||||||
|
region = var.region
|
||||||
|
cloud_function = google_cloudfunctions_function.function_quotas.name
|
||||||
|
|
||||||
|
role = "roles/cloudfunctions.invoker"
|
||||||
|
member = "allUsers"
|
||||||
|
}
|
||||||
|
|
||||||
|
################################################
|
||||||
|
# Cloud Monitoring Dashboard creation #
|
||||||
|
################################################
|
||||||
|
|
||||||
|
resource "google_monitoring_dashboard" "dashboard" {
|
||||||
|
dashboard_json = file("${path.module}/dashboards/quotas-utilization.json")
|
||||||
|
project = module.project-monitoring.project_id
|
||||||
|
}
|
|
@ -0,0 +1 @@
|
||||||
|
Creating here resources to test the Cloud Function and ensuring metrics are correctly populated
|
|
@ -0,0 +1,279 @@
|
||||||
|
# Creating test infrastructure
|
||||||
|
|
||||||
|
resource "google_folder" "test-net-dash" {
|
||||||
|
display_name = "test-net-dash"
|
||||||
|
parent = "organizations/${var.organization_id}"
|
||||||
|
}
|
||||||
|
|
||||||
|
##### Creating host projects, VPCs, service projects #####
|
||||||
|
|
||||||
|
module "project-hub" {
|
||||||
|
source = "github.com/GoogleCloudPlatform/cloud-foundation-fabric///modules/project"
|
||||||
|
name = "test-host-hub"
|
||||||
|
parent = google_folder.test-net-dash.name
|
||||||
|
prefix = var.prefix
|
||||||
|
billing_account = var.billing_account
|
||||||
|
services = var.project_vm_services
|
||||||
|
|
||||||
|
shared_vpc_host_config = {
|
||||||
|
enabled = true
|
||||||
|
service_projects = [] # defined later
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
module "vpc-hub" {
|
||||||
|
source = "github.com/GoogleCloudPlatform/cloud-foundation-fabric///modules/net-vpc"
|
||||||
|
project_id = module.project-hub.project_id
|
||||||
|
name = "vpc-hub"
|
||||||
|
subnets = [
|
||||||
|
{
|
||||||
|
ip_cidr_range = "10.0.10.0/24"
|
||||||
|
name = "subnet-hub-1"
|
||||||
|
region = var.region
|
||||||
|
secondary_ip_range = {}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
|
||||||
|
module "project-svc-hub" {
|
||||||
|
source = "github.com/GoogleCloudPlatform/cloud-foundation-fabric///modules/project"
|
||||||
|
parent = google_folder.test-net-dash.name
|
||||||
|
billing_account = var.billing_account
|
||||||
|
prefix = var.prefix
|
||||||
|
name = "test-svc-hub"
|
||||||
|
services = var.project_vm_services
|
||||||
|
|
||||||
|
shared_vpc_service_config = {
|
||||||
|
attach = true
|
||||||
|
host_project = module.project-hub.project_id
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
module "project-prod" {
|
||||||
|
source = "github.com/GoogleCloudPlatform/cloud-foundation-fabric///modules/project"
|
||||||
|
name = "test-host-prod"
|
||||||
|
parent = google_folder.test-net-dash.name
|
||||||
|
prefix = var.prefix
|
||||||
|
billing_account = var.billing_account
|
||||||
|
services = var.project_vm_services
|
||||||
|
|
||||||
|
shared_vpc_host_config = {
|
||||||
|
enabled = true
|
||||||
|
service_projects = [] # defined later
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
module "vpc-prod" {
|
||||||
|
source = "github.com/GoogleCloudPlatform/cloud-foundation-fabric///modules/net-vpc"
|
||||||
|
project_id = module.project-prod.project_id
|
||||||
|
name = "vpc-prod"
|
||||||
|
subnets = [
|
||||||
|
{
|
||||||
|
ip_cidr_range = "10.0.20.0/24"
|
||||||
|
name = "subnet-prod-1"
|
||||||
|
region = var.region
|
||||||
|
secondary_ip_range = {}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
|
||||||
|
module "project-svc-prod" {
|
||||||
|
source = "github.com/GoogleCloudPlatform/cloud-foundation-fabric///modules/project"
|
||||||
|
parent = google_folder.test-net-dash.name
|
||||||
|
billing_account = var.billing_account
|
||||||
|
prefix = var.prefix
|
||||||
|
name = "test-svc-prod"
|
||||||
|
services = var.project_vm_services
|
||||||
|
|
||||||
|
shared_vpc_service_config = {
|
||||||
|
attach = true
|
||||||
|
host_project = module.project-prod.project_id
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
module "project-dev" {
|
||||||
|
source = "github.com/GoogleCloudPlatform/cloud-foundation-fabric///modules/project"
|
||||||
|
name = "test-host-dev"
|
||||||
|
parent = google_folder.test-net-dash.name
|
||||||
|
prefix = var.prefix
|
||||||
|
billing_account = var.billing_account
|
||||||
|
services = var.project_vm_services
|
||||||
|
|
||||||
|
shared_vpc_host_config = {
|
||||||
|
enabled = true
|
||||||
|
service_projects = [] # defined later
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
module "vpc-dev" {
|
||||||
|
source = "github.com/GoogleCloudPlatform/cloud-foundation-fabric///modules/net-vpc"
|
||||||
|
project_id = module.project-dev.project_id
|
||||||
|
name = "vpc-dev"
|
||||||
|
subnets = [
|
||||||
|
{
|
||||||
|
ip_cidr_range = "10.0.30.0/24"
|
||||||
|
name = "subnet-dev-1"
|
||||||
|
region = var.region
|
||||||
|
secondary_ip_range = {}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
|
||||||
|
module "project-svc-dev" {
|
||||||
|
source = "github.com/GoogleCloudPlatform/cloud-foundation-fabric///modules/project"
|
||||||
|
parent = google_folder.test-net-dash.name
|
||||||
|
billing_account = var.billing_account
|
||||||
|
prefix = var.prefix
|
||||||
|
name = "test-svc-dev"
|
||||||
|
services = var.project_vm_services
|
||||||
|
|
||||||
|
shared_vpc_service_config = {
|
||||||
|
attach = true
|
||||||
|
host_project = module.project-dev.project_id
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
##### Creating VPC peerings #####
|
||||||
|
|
||||||
|
module "hub-to-prod-peering" {
|
||||||
|
source = "github.com/GoogleCloudPlatform/cloud-foundation-fabric///modules/net-vpc-peering"
|
||||||
|
local_network = module.vpc-hub.self_link
|
||||||
|
peer_network = module.vpc-prod.self_link
|
||||||
|
}
|
||||||
|
|
||||||
|
module "prod-to-hub-peering" {
|
||||||
|
source = "github.com/GoogleCloudPlatform/cloud-foundation-fabric///modules/net-vpc-peering"
|
||||||
|
local_network = module.vpc-prod.self_link
|
||||||
|
peer_network = module.vpc-hub.self_link
|
||||||
|
depends_on = [module.hub-to-prod-peering]
|
||||||
|
}
|
||||||
|
|
||||||
|
module "hub-to-dev-peering" {
|
||||||
|
source = "github.com/GoogleCloudPlatform/cloud-foundation-fabric///modules/net-vpc-peering"
|
||||||
|
local_network = module.vpc-hub.self_link
|
||||||
|
peer_network = module.vpc-dev.self_link
|
||||||
|
}
|
||||||
|
|
||||||
|
module "dev-to-hub-peering" {
|
||||||
|
source = "github.com/GoogleCloudPlatform/cloud-foundation-fabric///modules/net-vpc-peering"
|
||||||
|
local_network = module.vpc-dev.self_link
|
||||||
|
peer_network = module.vpc-hub.self_link
|
||||||
|
depends_on = [module.hub-to-dev-peering]
|
||||||
|
}
|
||||||
|
|
||||||
|
##### Creating VMs #####
|
||||||
|
|
||||||
|
resource "google_compute_instance" "test-vm-prod1" {
|
||||||
|
project = module.project-svc-prod.project_id
|
||||||
|
name = "test-vm-prod1"
|
||||||
|
machine_type = "f1-micro"
|
||||||
|
zone = var.zone
|
||||||
|
|
||||||
|
tags = ["${var.region}"]
|
||||||
|
|
||||||
|
boot_disk {
|
||||||
|
initialize_params {
|
||||||
|
image = "debian-cloud/debian-9"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
network_interface {
|
||||||
|
subnetwork = module.vpc-prod.subnet_self_links["${var.region}/subnet-prod-1"]
|
||||||
|
subnetwork_project = module.project-prod.project_id
|
||||||
|
}
|
||||||
|
|
||||||
|
allow_stopping_for_update = true
|
||||||
|
}
|
||||||
|
|
||||||
|
resource "google_compute_instance" "test-vm-prod2" {
|
||||||
|
project = module.project-prod.project_id
|
||||||
|
name = "test-vm-prod2"
|
||||||
|
machine_type = "f1-micro"
|
||||||
|
zone = var.zone
|
||||||
|
|
||||||
|
tags = ["${var.region}"]
|
||||||
|
|
||||||
|
boot_disk {
|
||||||
|
initialize_params {
|
||||||
|
image = "debian-cloud/debian-9"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
network_interface {
|
||||||
|
subnetwork = module.vpc-prod.subnet_self_links["${var.region}/subnet-prod-1"]
|
||||||
|
subnetwork_project = module.project-prod.project_id
|
||||||
|
}
|
||||||
|
|
||||||
|
allow_stopping_for_update = true
|
||||||
|
}
|
||||||
|
|
||||||
|
resource "google_compute_instance" "test-vm-dev1" {
|
||||||
|
count = 10
|
||||||
|
project = module.project-svc-dev.project_id
|
||||||
|
name = "test-vm-dev${count.index}"
|
||||||
|
machine_type = "f1-micro"
|
||||||
|
zone = var.zone
|
||||||
|
|
||||||
|
tags = ["${var.region}"]
|
||||||
|
|
||||||
|
boot_disk {
|
||||||
|
initialize_params {
|
||||||
|
image = "debian-cloud/debian-9"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
network_interface {
|
||||||
|
subnetwork = module.vpc-dev.subnet_self_links["${var.region}/subnet-dev-1"]
|
||||||
|
subnetwork_project = module.project-dev.project_id
|
||||||
|
}
|
||||||
|
|
||||||
|
allow_stopping_for_update = true
|
||||||
|
}
|
||||||
|
|
||||||
|
resource "google_compute_instance" "test-vm-hub1" {
|
||||||
|
project = module.project-svc-hub.project_id
|
||||||
|
name = "test-vm-hub1"
|
||||||
|
machine_type = "f1-micro"
|
||||||
|
zone = var.zone
|
||||||
|
|
||||||
|
tags = ["${var.region}"]
|
||||||
|
|
||||||
|
boot_disk {
|
||||||
|
initialize_params {
|
||||||
|
image = "debian-cloud/debian-9"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
network_interface {
|
||||||
|
subnetwork = module.vpc-hub.subnet_self_links["${var.region}/subnet-hub-1"]
|
||||||
|
subnetwork_project = module.project-hub.project_id
|
||||||
|
}
|
||||||
|
|
||||||
|
allow_stopping_for_update = true
|
||||||
|
}
|
||||||
|
|
||||||
|
# Forwarding Rules
|
||||||
|
|
||||||
|
resource "google_compute_forwarding_rule" "forwarding-rule-dev" {
|
||||||
|
name = "forwarding-rule-dev"
|
||||||
|
project = module.project-svc-dev.project_id
|
||||||
|
network = module.vpc-dev.self_link
|
||||||
|
subnetwork = module.vpc-dev.subnet_self_links["${var.region}/subnet-dev-1"]
|
||||||
|
|
||||||
|
region = var.region
|
||||||
|
backend_service = google_compute_region_backend_service.test-backend.id
|
||||||
|
ip_protocol = "TCP"
|
||||||
|
load_balancing_scheme = "INTERNAL"
|
||||||
|
all_ports = true
|
||||||
|
allow_global_access = true
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
# backend service
|
||||||
|
resource "google_compute_region_backend_service" "test-backend" {
|
||||||
|
name = "test-backend"
|
||||||
|
region = var.region
|
||||||
|
project = module.project-svc-dev.project_id
|
||||||
|
protocol = "TCP"
|
||||||
|
load_balancing_scheme = "INTERNAL"
|
||||||
|
}
|
|
@ -0,0 +1,49 @@
|
||||||
|
/**
|
||||||
|
* Copyright 2022 Google LLC
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
variable "organization_id" {
|
||||||
|
description = "The organization id for the associated services"
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "billing_account" {
|
||||||
|
description = "The ID of the billing account to associate this project with"
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "prefix" {
|
||||||
|
description = "Customer name to use as prefix for resources' naming"
|
||||||
|
default = "net-dash"
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "project_vm_services" {
|
||||||
|
description = "Service APIs enabled by default in new projects."
|
||||||
|
default = [
|
||||||
|
"cloudbilling.googleapis.com",
|
||||||
|
"compute.googleapis.com",
|
||||||
|
"logging.googleapis.com",
|
||||||
|
"monitoring.googleapis.com",
|
||||||
|
"servicenetworking.googleapis.com",
|
||||||
|
]
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "region" {
|
||||||
|
description = "Region used to deploy subnets"
|
||||||
|
default = "europe-west1"
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "zone" {
|
||||||
|
description = "Zone used to deploy vms"
|
||||||
|
default = "europe-west1-b"
|
||||||
|
}
|
|
@ -0,0 +1,150 @@
|
||||||
|
/**
|
||||||
|
* Copyright 2022 Google LLC
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
variable "organization_id" {
|
||||||
|
description = "The organization id for the associated services"
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "billing_account" {
|
||||||
|
description = "The ID of the billing account to associate this project with"
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "prefix" {
|
||||||
|
description = "Customer name to use as prefix for resources' naming"
|
||||||
|
default = "net-dash"
|
||||||
|
}
|
||||||
|
|
||||||
|
# Not used for now as I am creating the monitoring project in my main.tf file
|
||||||
|
variable "monitoring_project_id" {
|
||||||
|
type = string
|
||||||
|
description = "ID of the monitoring project, where the Cloud Function and dashboards will be deployed."
|
||||||
|
}
|
||||||
|
|
||||||
|
# TODO: support folder instead of a list of projects?
|
||||||
|
variable "monitored_projects_list" {
|
||||||
|
type = list(string)
|
||||||
|
description = "ID of the projects to be monitored (where limits and quotas data will be pulled)"
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "schedule_cron" {
|
||||||
|
description = "Cron format schedule to run the Cloud Function. Default is every 5 minutes."
|
||||||
|
default = "*/5 * * * *"
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "project_monitoring_services" {
|
||||||
|
description = "Service APIs enabled by default in new projects."
|
||||||
|
default = [
|
||||||
|
"cloudbilling.googleapis.com",
|
||||||
|
"cloudbuild.googleapis.com",
|
||||||
|
"cloudresourcemanager.googleapis.com",
|
||||||
|
"cloudscheduler.googleapis.com",
|
||||||
|
"compute.googleapis.com",
|
||||||
|
"cloudfunctions.googleapis.com",
|
||||||
|
"iam.googleapis.com",
|
||||||
|
"iamcredentials.googleapis.com",
|
||||||
|
"logging.googleapis.com",
|
||||||
|
"monitoring.googleapis.com",
|
||||||
|
"oslogin.googleapis.com",
|
||||||
|
"servicenetworking.googleapis.com",
|
||||||
|
"serviceusage.googleapis.com",
|
||||||
|
]
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "project_vm_services" {
|
||||||
|
description = "Service APIs enabled by default in new projects."
|
||||||
|
default = [
|
||||||
|
"cloudbilling.googleapis.com",
|
||||||
|
"compute.googleapis.com",
|
||||||
|
"logging.googleapis.com",
|
||||||
|
"monitoring.googleapis.com",
|
||||||
|
"servicenetworking.googleapis.com",
|
||||||
|
]
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "region" {
|
||||||
|
description = "Region used to deploy subnets"
|
||||||
|
default = "europe-west1"
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "zone" {
|
||||||
|
description = "Zone used to deploy vms"
|
||||||
|
default = "europe-west1-b"
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "limit_l4" {
|
||||||
|
description = "Maximum number of forwarding rules for Internal TCP/UDP Load Balancing per network."
|
||||||
|
type = list(string)
|
||||||
|
default = [
|
||||||
|
"default_value", "75",
|
||||||
|
]
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "limit_l7" {
|
||||||
|
description = "Maximum number of forwarding rules for Internal HTTP(S) Load Balancing per network."
|
||||||
|
type = list(string)
|
||||||
|
default = [
|
||||||
|
"default_value", "75",
|
||||||
|
]
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "limit_subnets" {
|
||||||
|
description = "Maximum number of subnet IP ranges (primary and secondary) per peering group"
|
||||||
|
type = list(string)
|
||||||
|
default = [
|
||||||
|
"default_value", "400",
|
||||||
|
]
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "limit_instances" {
|
||||||
|
description = "Maximum number of instances per network"
|
||||||
|
type = list(string)
|
||||||
|
default = [
|
||||||
|
"default_value", "15000",
|
||||||
|
]
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "limit_instances_ppg" {
|
||||||
|
description = "Maximum number of instances per peering group."
|
||||||
|
type = list(string)
|
||||||
|
default = [
|
||||||
|
"default_value", "15000",
|
||||||
|
]
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "limit_vpc_peer" {
|
||||||
|
description = "Maximum number of peering VPC peerings per network."
|
||||||
|
type = list(string)
|
||||||
|
default = [
|
||||||
|
"default_value", "25",
|
||||||
|
"test-vpc", "40",
|
||||||
|
]
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "limit_l4_ppg" {
|
||||||
|
description = "Maximum number of forwarding rules for Internal TCP/UDP Load Balancing per network."
|
||||||
|
type = list(string)
|
||||||
|
default = [
|
||||||
|
"default_value", "175",
|
||||||
|
]
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "limit_l7_ppg" {
|
||||||
|
description = "Maximum number of forwarding rules for Internal HTTP(S) Load Balancing per network."
|
||||||
|
type = list(string)
|
||||||
|
default = [
|
||||||
|
"default_value", "175",
|
||||||
|
]
|
||||||
|
}
|
Loading…
Reference in New Issue