FAST: add 02-networking-peering stage. (#561)
* Networking with peering - initial commit * README and tests * Linter fixes * Linter fixes * Linter fixes * Update README.md * split out vpn/peering in separate files so the rest is identical * fix dns for vpn and peering * update tfdoc to support multiple outputs/variables files * add peering variables * update tfdoc for modules * make it easier to spot errored docs * fix doc * yapf * fix permadiff in firewall module source ranges * FAST: Networking: DNS Fixes * FAST: ability to toggle on-prem vpn creation * FAST: fix outputs Co-authored-by: Ludovico Magnocavallo <ludomagno@google.com>
This commit is contained in:
parent
6c47ba466f
commit
fb90500adc
|
@ -7,17 +7,6 @@ The example uses following GCP features:
|
||||||
|
|
||||||
* [service account impersonation](https://cloud.google.com/iam/docs/impersonating-service-accounts)
|
* [service account impersonation](https://cloud.google.com/iam/docs/impersonating-service-accounts)
|
||||||
* [Identity-Aware Proxy](https://cloud.google.com/iap/docs/using-tcp-forwarding) tunnel
|
* [Identity-Aware Proxy](https://cloud.google.com/iap/docs/using-tcp-forwarding) tunnel
|
||||||
|
|
||||||
<!-- BEGIN TFDOC -->
|
<!-- BEGIN TFDOC -->
|
||||||
## Variables
|
|
||||||
|
|
||||||
| name | description | type | required | default |
|
|
||||||
|---|---|:---: |:---:|:---:|
|
|
||||||
| builder_sa | Image builder's service account email. | <code title="">string</code> | ✓ | |
|
|
||||||
| compute_sa | Temporary's VM service account email. | <code title="">string</code> | ✓ | |
|
|
||||||
| compute_subnetwork | Name of a VPC subnetwork for temporary VM instance. | <code title="">string</code> | ✓ | |
|
|
||||||
| compute_zone | Compute Engine zone to run temporary VM instance. | <code title="">string</code> | ✓ | |
|
|
||||||
| project_id | Project id that references existing GCP project. | <code title="">string</code> | ✓ | |
|
|
||||||
| *use_iap* | Indicates to use IAP tunnel for communication with temporary VM instance. | <code title="">bool</code> | | <code title="">true</code> |
|
|
||||||
|
|
||||||
<!-- END TFDOC -->
|
<!-- END TFDOC -->
|
|
@ -139,7 +139,7 @@ module "billing-alert" {
|
||||||
module "dns" {
|
module "dns" {
|
||||||
source = "../../../modules/dns"
|
source = "../../../modules/dns"
|
||||||
for_each = toset(var.dns_zones)
|
for_each = toset(var.dns_zones)
|
||||||
project_id = module.project.project_id
|
project_id = coalesce(local.vpc.host_project, module.project.project_id)
|
||||||
type = "private"
|
type = "private"
|
||||||
name = each.value
|
name = each.value
|
||||||
domain = "${each.value}.${var.defaults.environment_dns_zone}"
|
domain = "${each.value}.${var.defaults.environment_dns_zone}"
|
||||||
|
|
|
@ -5,7 +5,7 @@ ingress-allow-composer-nodes:
|
||||||
direction: INGRESS
|
direction: INGRESS
|
||||||
action: allow
|
action: allow
|
||||||
sources: []
|
sources: []
|
||||||
ranges: []
|
ranges: ["0.0.0.0/0"]
|
||||||
targets:
|
targets:
|
||||||
- composer-worker
|
- composer-worker
|
||||||
use_service_accounts: false
|
use_service_accounts: false
|
||||||
|
@ -18,7 +18,7 @@ ingress-allow-dataflow-load:
|
||||||
direction: INGRESS
|
direction: INGRESS
|
||||||
action: allow
|
action: allow
|
||||||
sources: []
|
sources: []
|
||||||
ranges: []
|
ranges: ["0.0.0.0/0"]
|
||||||
targets:
|
targets:
|
||||||
- dataflow
|
- dataflow
|
||||||
use_service_accounts: false
|
use_service_accounts: false
|
||||||
|
|
|
@ -20,11 +20,11 @@
|
||||||
|
|
||||||
module "dev-dns-private-zone" {
|
module "dev-dns-private-zone" {
|
||||||
source = "../../../modules/dns"
|
source = "../../../modules/dns"
|
||||||
project_id = module.landing-project.project_id
|
project_id = module.dev-spoke-project.project_id
|
||||||
type = "private"
|
type = "private"
|
||||||
name = "dev-gcp-example-com"
|
name = "dev-gcp-example-com"
|
||||||
domain = "dev.gcp.example.com."
|
domain = "dev.gcp.example.com."
|
||||||
client_networks = [module.dev-spoke-vpc.self_link]
|
client_networks = [module.landing-trusted-vpc.self_link, module.landing-untrusted-vpc.self_link]
|
||||||
recordsets = {
|
recordsets = {
|
||||||
"A localhost" = { type = "A", ttl = 300, records = ["127.0.0.1"] }
|
"A localhost" = { type = "A", ttl = 300, records = ["127.0.0.1"] }
|
||||||
}
|
}
|
||||||
|
|
|
@ -59,34 +59,6 @@ module "gcp-example-dns-private-zone" {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
# GCP-specific DNS zones peered to the environment spoke that holds the config
|
|
||||||
|
|
||||||
module "prod-gcp-example-dns-peering" {
|
|
||||||
source = "../../../modules/dns"
|
|
||||||
project_id = module.landing-project.project_id
|
|
||||||
type = "peering"
|
|
||||||
name = "prod-root-dns-peering"
|
|
||||||
domain = "prod.gcp.example.com."
|
|
||||||
client_networks = [
|
|
||||||
module.landing-untrusted-vpc.self_link,
|
|
||||||
module.landing-trusted-vpc.self_link
|
|
||||||
]
|
|
||||||
peer_network = module.prod-spoke-vpc.self_link
|
|
||||||
}
|
|
||||||
|
|
||||||
module "dev-gcp-example-dns-peering" {
|
|
||||||
source = "../../../modules/dns"
|
|
||||||
project_id = module.landing-project.project_id
|
|
||||||
type = "peering"
|
|
||||||
name = "dev-root-dns-peering"
|
|
||||||
domain = "dev.gcp.example.com."
|
|
||||||
client_networks = [
|
|
||||||
module.landing-untrusted-vpc.self_link,
|
|
||||||
module.landing-trusted-vpc.self_link
|
|
||||||
]
|
|
||||||
peer_network = module.dev-spoke-vpc.self_link
|
|
||||||
}
|
|
||||||
|
|
||||||
# Google API zone to trigger Private Access
|
# Google API zone to trigger Private Access
|
||||||
|
|
||||||
module "googleapis-private-zone" {
|
module "googleapis-private-zone" {
|
||||||
|
|
|
@ -20,11 +20,11 @@
|
||||||
|
|
||||||
module "prod-dns-private-zone" {
|
module "prod-dns-private-zone" {
|
||||||
source = "../../../modules/dns"
|
source = "../../../modules/dns"
|
||||||
project_id = module.landing-project.project_id
|
project_id = module.prod-spoke-project.project_id
|
||||||
type = "private"
|
type = "private"
|
||||||
name = "prod-gcp-example-com"
|
name = "prod-gcp-example-com"
|
||||||
domain = "prod.gcp.example.com."
|
domain = "prod.gcp.example.com."
|
||||||
client_networks = [module.prod-spoke-vpc.self_link]
|
client_networks = [module.landing-trusted-vpc.self_link, module.landing-untrusted-vpc.self_link]
|
||||||
recordsets = {
|
recordsets = {
|
||||||
"A localhost" = { type = "A", ttl = 300, records = ["127.0.0.1"] }
|
"A localhost" = { type = "A", ttl = 300, records = ["127.0.0.1"] }
|
||||||
}
|
}
|
||||||
|
|
|
@ -68,11 +68,11 @@ output "vpn_gateway_endpoints" {
|
||||||
description = "External IP Addresses for the GCP VPN gateways."
|
description = "External IP Addresses for the GCP VPN gateways."
|
||||||
value = {
|
value = {
|
||||||
onprem-ew1 = {
|
onprem-ew1 = {
|
||||||
for v in module.landing-to-onprem-ew1-vpn.gateway.vpn_interfaces :
|
for v in module.landing-to-onprem-ew1-vpn[0].gateway.vpn_interfaces :
|
||||||
v.id => v.ip_address
|
v.id => v.ip_address
|
||||||
}
|
}
|
||||||
onprem-ew4 = {
|
onprem-ew4 = {
|
||||||
for v in module.landing-to-onprem-ew4-vpn.gateway.vpn_interfaces :
|
for v in module.landing-to-onprem-ew4-vpn[0].gateway.vpn_interfaces :
|
||||||
v.id => v.ip_address
|
v.id => v.ip_address
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -17,7 +17,8 @@
|
||||||
# tfdoc:file:description VPN between landing and onprem.
|
# tfdoc:file:description VPN between landing and onprem.
|
||||||
|
|
||||||
locals {
|
locals {
|
||||||
bgp_peer_options_onprem = {
|
enable_onprem_vpn = var.vpn_onprem_configs != null
|
||||||
|
bgp_peer_options_onprem = local.enable_onprem_vpn == false ? null : {
|
||||||
for k, v in var.vpn_onprem_configs :
|
for k, v in var.vpn_onprem_configs :
|
||||||
k => v.adv == null ? null : {
|
k => v.adv == null ? null : {
|
||||||
advertise_groups = []
|
advertise_groups = []
|
||||||
|
@ -32,6 +33,7 @@ locals {
|
||||||
}
|
}
|
||||||
|
|
||||||
module "landing-to-onprem-ew1-vpn" {
|
module "landing-to-onprem-ew1-vpn" {
|
||||||
|
count = local.enable_onprem_vpn ? 1 : 0
|
||||||
source = "../../../modules/net-vpn-ha"
|
source = "../../../modules/net-vpn-ha"
|
||||||
project_id = module.landing-project.project_id
|
project_id = module.landing-project.project_id
|
||||||
network = module.landing-trusted-vpc.self_link
|
network = module.landing-trusted-vpc.self_link
|
||||||
|
@ -60,6 +62,7 @@ module "landing-to-onprem-ew1-vpn" {
|
||||||
}
|
}
|
||||||
|
|
||||||
module "landing-to-onprem-ew4-vpn" {
|
module "landing-to-onprem-ew4-vpn" {
|
||||||
|
count = local.enable_onprem_vpn ? 1 : 0
|
||||||
source = "../../../modules/net-vpn-ha"
|
source = "../../../modules/net-vpn-ha"
|
||||||
project_id = module.landing-project.project_id
|
project_id = module.landing-project.project_id
|
||||||
network = module.landing-trusted-vpc.self_link
|
network = module.landing-trusted-vpc.self_link
|
||||||
|
|
|
@ -0,0 +1 @@
|
||||||
|
ludo-*
|
|
@ -0,0 +1,16 @@
|
||||||
|
# IAM bindings reference
|
||||||
|
|
||||||
|
Legend: <code>+</code> additive, <code>•</code> conditional.
|
||||||
|
|
||||||
|
## Project <i>dev-net-spoke-0</i>
|
||||||
|
|
||||||
|
| members | roles |
|
||||||
|
|---|---|
|
||||||
|
|<b>dev-resman-pf-0</b><br><small><i>serviceAccount</i></small>|[roles/resourcemanager.projectIamAdmin](https://cloud.google.com/iam/docs/understanding-roles#resourcemanager.projectIamAdmin) <code>•</code><br>[roles/dns.admin](https://cloud.google.com/iam/docs/understanding-roles#dns.admin) |
|
||||||
|
|<b>prod-resman-pf-0</b><br><small><i>serviceAccount</i></small>|organizations/[org_id #0]/roles/serviceProjectNetworkAdmin |
|
||||||
|
|
||||||
|
## Project <i>prod-net-spoke-0</i>
|
||||||
|
|
||||||
|
| members | roles |
|
||||||
|
|---|---|
|
||||||
|
|<b>prod-resman-pf-0</b><br><small><i>serviceAccount</i></small>|[roles/resourcemanager.projectIamAdmin](https://cloud.google.com/iam/docs/understanding-roles#resourcemanager.projectIamAdmin) <code>•</code><br>organizations/[org_id #0]/roles/serviceProjectNetworkAdmin <br>[roles/dns.admin](https://cloud.google.com/iam/docs/understanding-roles#dns.admin) |
|
|
@ -0,0 +1,317 @@
|
||||||
|
# Networking
|
||||||
|
|
||||||
|
This stage sets up the shared network infrastructure for the whole organization. It adopts the common “hub and spoke” reference design, which is well suited to multiple scenarios, and offers several advantages versus other designs:
|
||||||
|
|
||||||
|
- the “hub” VPC centralizes external connectivity to on-prem or other cloud environments, and is ready to host cross-environment services like CI/CD, code repositories, and monitoring probes
|
||||||
|
- the “spoke” VPCs allow partitioning workloads (e.g. by environment like in this setup), while still retaining controlled access to central connectivity and services
|
||||||
|
- Shared VPC in both hub and spokes splits management of network resources in specific (host) projects, while still allowing them to be consumed from workload (service) projects
|
||||||
|
- the design also lends itself to easy DNS centralization, both from on-prem to cloud and from cloud to on-prem
|
||||||
|
|
||||||
|
Connectivity between hub and spokes is established here via [VPC Peering](https://cloud.google.com/vpc/docs/vpc-peering), which offers a complete isolation between environments, and no choke-points in the data plane. Different ways of implementing connectivity, and their respective pros and cons, are discussed below.
|
||||||
|
|
||||||
|
The following diagram illustrates the high-level design, and should be used as a reference for the following sections. The final number of subnets, and their IP addressing design will of course depend on customer-specific requirements, and can be easily changed via variables or external data files without having to edit the actual code.
|
||||||
|
|
||||||
|
<p align="center">
|
||||||
|
<img src="diagram.svg" alt="Networking diagram">
|
||||||
|
</p>
|
||||||
|
|
||||||
|
## Design overview and choices
|
||||||
|
|
||||||
|
### VPC design
|
||||||
|
|
||||||
|
The hub/landing VPC hosts external connectivity and shared services for spoke VPCs, which are connected to it via VPC peering. Spokes are used here to partition environments, which is a fairly common pattern:
|
||||||
|
|
||||||
|
- one spoke VPC for the production environment
|
||||||
|
- one spoke VPC for the development environment
|
||||||
|
|
||||||
|
Each VPC is created into its own project, and each project is configured as a Shared VPC host, so that network-related resources and access configurations via IAM are kept separate for each VPC.
|
||||||
|
|
||||||
|
The design easily lends itself to implementing additional environments, or adopting a different logical mapping for spokes (e.g. one spoke for each company entity, etc.). Adding spokes is a trivial operation, does not increase the design complexity, and is explained in operational terms in the following sections.
|
||||||
|
|
||||||
|
In multi-organization scenarios, where production and non-production resources use different Cloud Identity and GCP organizations, the hub/landing VPC is usually part of the production organization, and establishes connections with production spokes in its same organization, and non-production spokes in a different organization.
|
||||||
|
|
||||||
|
### External connectivity
|
||||||
|
|
||||||
|
External connectivity to on-prem is implemented here via VPN HA (two tunnels per region), as this is the minimum common denominator often used directly, or as a stop-gap solution to validate routing and transfer data, while waiting for [interconnects](https://cloud.google.com/network-connectivity/docs/interconnect) to be provisioned.
|
||||||
|
|
||||||
|
Connectivity to additional on-prem sites or other cloud providers should be implemented in a similar fashion, via VPN tunnels or interconnects in the landing VPC sharing the same regional router.
|
||||||
|
|
||||||
|
### Internal connectivity
|
||||||
|
|
||||||
|
Each environment has full line of sight with the Landing VPC, and hence with any networks interconnected with it (e.g. your onprem environment). Environments cannot communicate with each other (prod to dev and viceversa). If this is a requirement, and according to your specific needs and constraints, solutions based on full-mesh peerings, VPNs or NVA should be added to this design.
|
||||||
|
|
||||||
|
As mentioned initially, there are of course other ways to implement internal connectivity other than VPC peering. These can be easily retrofitted with minimal code changes, but introduce additional considerations for service interoperability, quotas and management.
|
||||||
|
|
||||||
|
This is a summary of the main options:
|
||||||
|
|
||||||
|
- [VPN HA](https://cloud.google.com/network-connectivity/docs/vpn/concepts/topologies) (implemented on [02-networking-vpn](../02-networking-vpn/))
|
||||||
|
- Pros: simple compatibility with GCP services that leverage peering internally, better control on routes, avoids peering groups shared quotas and limits
|
||||||
|
- Cons: additional cost, marginal increase in latency, requires multiple tunnels for full bandwidth
|
||||||
|
- [VPC Peering](https://cloud.google.com/vpc/docs/vpc-peering) (implemented here)
|
||||||
|
- Pros: no additional costs, full bandwidth with no configurations, no extra latency, total environment isolation
|
||||||
|
- Cons: no transitivity (e.g. to GKE masters, Cloud SQL, etc.), no selective exchange of routes, several quotas and limits shared between VPCs in a peering group
|
||||||
|
- [Multi-NIC appliances](https://cloud.google.com/architecture/best-practices-vpc-design#multi-nic) (implemented on [02-networking-nva](../02-networking-nva/))
|
||||||
|
- Pros: additional security features (e.g. IPS), potentially better integration with on-prem systems by using the same vendor
|
||||||
|
- Cons: complex HA/failover setup, limited by VM bandwidth and scale, additional costs for VMs and licenses, out of band management of a critical cloud component
|
||||||
|
|
||||||
|
### IP ranges, subnetting, routing
|
||||||
|
|
||||||
|
Minimizing the number of routes (and subnets) in use on the cloud environment is an important consideration, as it simplifies management and avoids hitting [Cloud Router](https://cloud.google.com/network-connectivity/docs/router/quotas) and [VPC](https://cloud.google.com/vpc/docs/quota) quotas and limits. For this reason, we recommend careful planning of the IP space used in your cloud environment, to be able to use large IP CIDR blocks in routes whenever possible.
|
||||||
|
|
||||||
|
This stage uses a dedicated /16 block (which should of course be sized to your needs) for each region in each VPC, and subnets created in each VPC derive their ranges from the relevant block.
|
||||||
|
|
||||||
|
Spoke VPCs also define and reserve two "special" CIDR ranges dedicated to [PSA (Private Service Access)](https://cloud.google.com/vpc/docs/private-services-access) and [Internal HTTPs Load Balancers (L7ILB)](https://cloud.google.com/load-balancing/docs/l7-internal).
|
||||||
|
|
||||||
|
Routes in GCP are either automatically created for VPC subnets, manually created via static routes, or dynamically programmed by [Cloud Routers](https://cloud.google.com/network-connectivity/docs/router#docs) via BGP sessions, which can be configured to advertise VPC ranges, and/or custom ranges via custom advertisements.
|
||||||
|
|
||||||
|
In this setup:
|
||||||
|
|
||||||
|
- routes between multiple subnets within the same VPC are automatically programmed by GCP
|
||||||
|
- each spoke exchanges routes with the hub/landing through VPC peering
|
||||||
|
- spokes don't exchange routes, directly or indirectly
|
||||||
|
- on-premises is connected to the landing VPC and dynamically exchanges BGP routes with GCP using VPN HA
|
||||||
|
|
||||||
|
### Internet egress
|
||||||
|
|
||||||
|
The path of least resistance for Internet egress is using Cloud NAT, and that is what's implemented in this setup, with a NAT gateway configured for each VPC.
|
||||||
|
|
||||||
|
Several other scenarios are possible of course, with varying degrees of complexity:
|
||||||
|
|
||||||
|
- a forward proxy, with optional URL filters
|
||||||
|
- a default route to on-prem to leverage existing egress infrastructure
|
||||||
|
- a full-fledged perimeter firewall to control egress and implement additional security features like IPS
|
||||||
|
|
||||||
|
Future pluggable modules will allow to easily experiment, or deploy the above scenarios.
|
||||||
|
|
||||||
|
### VPC and Hierarchical Firewall
|
||||||
|
|
||||||
|
The GCP Firewall is a stateful, distributed feature that allows the creation of L4 policies, either via VPC-level rules or more recently via hierarchical policies applied on the resource hierarchy (organization, folders).
|
||||||
|
|
||||||
|
The current setup adopts both firewall types, and uses hierarchical rules on the Networking folder for common ingress rules (egress is open by default), e.g. from health check or IAP forwarders ranges, and VPC rules for the environment or workload-level ingress.
|
||||||
|
|
||||||
|
Rules and policies are defined in simple YAML files, described below.
|
||||||
|
|
||||||
|
### DNS
|
||||||
|
|
||||||
|
DNS often goes hand in hand with networking, especially on GCP where Cloud DNS zones and policies are associated at the VPC level. This setup implements both DNS flows:
|
||||||
|
|
||||||
|
- on-prem to cloud via private zones for cloud-managed domains, and an [inbound policy](https://cloud.google.com/dns/docs/server-policies-overview#dns-server-policy-in) used as forwarding target or via delegation (requires some extra configuration) from on-prem DNS resolvers
|
||||||
|
- cloud to on-prem via forwarding zones for the on-prem managed domains
|
||||||
|
|
||||||
|
DNS configuration is further centralized by leveraging peering zones, so that
|
||||||
|
|
||||||
|
- the hub/landing Cloud DNS hosts configurations for on-prem forwarding and Google API domains, with the spokes consuming them via DNS peering zones
|
||||||
|
- the spokes Cloud DNS host configurations for the environment-specific domains, with the hub/landing VPC acting as consumer via DNS peering
|
||||||
|
|
||||||
|
To complete the configuration, the 35.199.192.0/19 range should be routed on the VPN tunnels from on-prem, and the following names configured for DNS forwarding to cloud:
|
||||||
|
|
||||||
|
- `private.googleapis.com`
|
||||||
|
- `restricted.googleapis.com`
|
||||||
|
- `gcp.example.com` (used as a placeholder)
|
||||||
|
|
||||||
|
From cloud, the `example.com` domain (used as a placeholder) is forwarded to on-prem.
|
||||||
|
|
||||||
|
This configuration is battle-tested, and flexible enough to lend itself to simple modifications without subverting its design, for example by forwarding and peering root zones to bypass Cloud DNS external resolution.
|
||||||
|
|
||||||
|
## How to run this stage
|
||||||
|
|
||||||
|
This stage is meant to be executed after the [resman](../01-resman) stage has run, as it leverages the automation service account and bucket created there, and additional resources configured in the [bootstrap](../00-bootstrap) stage.
|
||||||
|
|
||||||
|
It's of course possible to run this stage in isolation, but that's outside the scope of this document, and you would need to refer to the code for the previous stages for the environmental requirements.
|
||||||
|
|
||||||
|
Before running this stage, you need to make sure you have the correct credentials and permissions, and localize variables by assigning values that match your configuration.
|
||||||
|
|
||||||
|
### Providers configuration
|
||||||
|
|
||||||
|
The default way of making sure you have the right permissions, is to use the identity of the service account pre-created for this stage during the [resource management](../01-resman) stage, and that you are a member of the group that can impersonate it via provider-level configuration (`gcp-devops` or `organization-admins`).
|
||||||
|
|
||||||
|
To simplify setup, the previous stage pre-configures a valid providers file in its output, and optionally writes it to a local file if the `outputs_location` variable is set to a valid path.
|
||||||
|
|
||||||
|
If you have set a valid value for `outputs_location` in the bootstrap stage, simply link the relevant `providers.tf` file from this stage's folder in the path you specified:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# `outputs_location` is set to `~/fast-config`
|
||||||
|
ln -s ~/fast-config/providers/02-networking-providers.tf .
|
||||||
|
```
|
||||||
|
|
||||||
|
If you have not configured `outputs_location` in bootstrap, you can derive the providers file from that stage's outputs:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
cd ../01-resman
|
||||||
|
terraform output -json providers | jq -r '.["02-networking"]' \
|
||||||
|
> ../02-networking/providers.tf
|
||||||
|
```
|
||||||
|
|
||||||
|
### Variable configuration
|
||||||
|
|
||||||
|
There are two broad sets of variables you will need to fill in:
|
||||||
|
|
||||||
|
- variables shared by other stages (org id, billing account id, etc.), or derived from a resource managed by a different stage (folder id, automation project id, etc.)
|
||||||
|
- variables specific to resources managed by this stage
|
||||||
|
|
||||||
|
To avoid the tedious job of filling in the first group of variables with values derived from other stages' outputs, the same mechanism used above for the provider configuration can be used to leverage pre-configured `.tfvars` files.
|
||||||
|
|
||||||
|
If you have set a valid value for `outputs_location` in the bootstrap and in the resman stage, simply link the relevant `terraform-*.auto.tfvars.json` files from this stage's folder in the path you specified, where the `*` above is set to the name of the stage that produced it. For this stage, a single `.tfvars` file is available:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# `outputs_location` is set to `~/fast-config`
|
||||||
|
ln -s ../../configs/example/02-networking/terraform-bootstrap.auto.tfvars.json
|
||||||
|
ln -s ../../configs/example/02-networking/terraform-resman.auto.tfvars.json
|
||||||
|
# also copy the tfvars file used for the bootstrap stage
|
||||||
|
cp ../00-bootstrap/terraform.tfvars .
|
||||||
|
```
|
||||||
|
|
||||||
|
A second set of variables is specific to this stage, they are all optional so if you need to customize them, add them to the file copied from bootstrap.
|
||||||
|
|
||||||
|
Please refer to the [Variables](#variables) table below for a map of the variable origins, and to the sections below on how to adapt this stage to your networking configuration.
|
||||||
|
|
||||||
|
### VPCs
|
||||||
|
|
||||||
|
VPCs are defined in separate files, one for `landing` and one for each of `prod` and `dev`.
|
||||||
|
Each file contains the same resources, described in the following paragraphs.
|
||||||
|
|
||||||
|
The **project** ([`project`](https://github.com/terraform-google-modules/cloud-foundation-fabric/tree/master/modules/project)) contains the VPC, and enables the required APIs and sets itself as a "[host project](https://cloud.google.com/vpc/docs/shared-vpc)".
|
||||||
|
|
||||||
|
The **VPC** ([`net-vpc`](https://github.com/terraform-google-modules/cloud-foundation-fabric/tree/master/modules/net-vpc)) manages the DNS inbound policy (for Landing), explicit routes for `{private,restricted}.googleapis.com`, and its **subnets**. Subnets are created leveraging a "resource factory" paradigm, where the configuration is separated from the module that implements it, and stored in a well-structured file. To add a new subnet, simply create a new file in the `data_folder` directory defined in the module, following the examples found in the [Fabric `net-vpc` documentation](https://github.com/terraform-google-modules/cloud-foundation-fabric/tree/master/modules/net-vpc#subnet-factory). Sample subnets are shipped in [data/subnets](./data/subnets), and can be easily customised to fit your needs.
|
||||||
|
|
||||||
|
Subnets for [L7 ILBs](https://cloud.google.com/load-balancing/docs/l7-internal/proxy-only-subnets) are handled differently, and defined in variable `l7ilb_subnets`, while ranges for [PSA](https://cloud.google.com/vpc/docs/configure-private-services-access#allocating-range) are configured by variable `psa_ranges` - such variables are consumed by spoke VPCs.
|
||||||
|
|
||||||
|
**Cloud NAT** ([`net-cloudnat`](https://github.com/terraform-google-modules/cloud-foundation-fabric/tree/master/modules/net-cloudnat)) manages the networking infrastructure required to enable internet egress.
|
||||||
|
|
||||||
|
### VPNs
|
||||||
|
|
||||||
|
Connectivity to on-prem is implemented with VPN HA ([`net-vpn`](https://github.com/terraform-google-modules/cloud-foundation-fabric/tree/master/modules/net-vpn)) and defined in [`vpn-onprem.tf`](./vpn-onprem.tf). The file provisionally implements a single logical connection between onprem and landing at `europe-west1`, and the relevant parameters for its configuration are found in variable `vpn_onprem_configs`.
|
||||||
|
|
||||||
|
### Routing and BGP
|
||||||
|
|
||||||
|
Each VPC network ([`net-vpc`](https://github.com/terraform-google-modules/cloud-foundation-fabric/tree/master/modules/net-vpc)) manages a separate routing table, which can define static routes (e.g. to private.googleapis.com) and receives dynamic routes from BGP sessions established with neighbor networks (i.e. landing receives routes from onprem and any other interconnected network). Spokes receive dynamic routes programmed on the Landing VPC from the VPC peering.
|
||||||
|
|
||||||
|
Static routes are defined in `vpc-*.tf` files, in the `routes` section of each `net-vpc` module.
|
||||||
|
|
||||||
|
### Firewall
|
||||||
|
|
||||||
|
**VPC firewall rules** ([`net-vpc-firewall`](https://github.com/terraform-google-modules/cloud-foundation-fabric/tree/master/modules/net-vpc-firewall)) are defined per-vpc on each `vpc-*.tf` file and leverage a resource factory to massively create rules.
|
||||||
|
To add a new firewall rule, create a new file or edit an existing one in the `data_folder` directory defined in the module `net-vpc-firewall`, following the examples of the "[Rules factory](https://github.com/terraform-google-modules/cloud-foundation-fabric/tree/master/modules/net-vpc-firewall#rules-factory)" section of the module documentation. Sample firewall rules are shipped in [data/firewall-rules/landing](./data/firewall-rules/landing) and can be easily customised.
|
||||||
|
|
||||||
|
**Hierarchical firewall policies** ([`folder`](https://github.com/terraform-google-modules/cloud-foundation-fabric/tree/master/modules/folder)) are defined in `main.tf`, and managed through a policy factory implemented by the `folder` module, which applies the defined hierarchical to the `Networking` folder, which contains all the core networking infrastructure. Policies are defined in the `rules_file` file - to define a new one simply use the instructions found on "[Firewall policy factory](https://github.com/terraform-google-modules/cloud-foundation-fabric/tree/master/modules/organization#firewall-policy-factory)". Sample hierarchical firewall policies are shipped in [data/hierarchical-policy-rules.yaml](./data/hierarchical-policy-rules.yaml) and can be easily customised.
|
||||||
|
|
||||||
|
### DNS architecture
|
||||||
|
|
||||||
|
The DNS ([`dns`](https://github.com/terraform-google-modules/cloud-foundation-fabric/tree/master/modules/dns)) infrastructure is defined in the respective `vpc-xxx.tf` files.
|
||||||
|
|
||||||
|
Cloud DNS manages onprem forwarding, the main GCP zone (in this example `gcp.example.com`) and is peered to environment-specific zones (i.e. `dev.gcp.example.com` and `prod.gcp.example.com`).
|
||||||
|
|
||||||
|
#### Cloud environment
|
||||||
|
|
||||||
|
Per the section above Landing acts as the source of truth for DNS within the Cloud environment. Resources defined in the spoke VPCs consume the Landing DNS infrastructure through DNS peering (e.g. `prod-landing-root-dns-peering`).
|
||||||
|
Spokes can optionally define private zones (e.g. `prod-dns-private-zone`) - granting visibility to the Landing VPC ensures that the whole cloud environment can query such zones.
|
||||||
|
|
||||||
|
#### Cloud to on-prem
|
||||||
|
|
||||||
|
Leveraging the forwarding zones defined on Landing (e.g. `onprem-example-dns-forwarding` and `reverse-10-dns-forwarding`), the cloud environment can resolve `in-addr.arpa.` and `onprem.example.com.` using the on-premises DNS infrastructure. Onprem resolvers IPs are set in variable `dns.onprem`.
|
||||||
|
|
||||||
|
DNS queries sent to the on-premises infrastructure come from the `35.199.192.0/19` source range, which is only accessible from within a VPC or networks connected to one.
|
||||||
|
|
||||||
|
#### On-prem to cloud
|
||||||
|
|
||||||
|
The [Inbound DNS Policy](https://cloud.google.com/dns/docs/server-policies-overview#dns-server-policy-in) defined in module `landing-vpc` ([`landing.tf`](./landing.tf)) automatically reserves the first available IP address on each created subnet (typically the third one in a CIDR) to expose the Cloud DNS service so that it can be consumed from outside of GCP.
|
||||||
|
|
||||||
|
### Private Google Access
|
||||||
|
|
||||||
|
[Private Google Access](https://cloud.google.com/vpc/docs/private-google-access) (or PGA) enables VMs and on-prem systems to consume Google APIs from within the Google network, and is already fully configured on this environment.
|
||||||
|
|
||||||
|
For PGA to work:
|
||||||
|
|
||||||
|
- Private Google Access should be enabled on the subnet. \
|
||||||
|
Subnets created by the `net-vpc` module are PGA-enabled by default.
|
||||||
|
|
||||||
|
- 199.36.153.4/30 (`restricted.googleapis.com`) and 199.36.153.8/30 (`private.googleapis.com`) should be routed from on-prem to VPC, and from there to the `default-internet-gateway`. \
|
||||||
|
Per variable `vpn_onprem_configs` such ranges are advertised to onprem - furthermore every VPC (e.g. see `landing-vpc` in [`landing.tf`](./landing.tf)) has explicit routes set in case the `0.0.0.0/0` route is changed.
|
||||||
|
|
||||||
|
- A private DNS zone for `googleapis.com` should be created and configured per [this article](https://cloud.google.com/vpc/docs/configure-private-google-access-hybrid#config-domain), as implemented in module `googleapis-private-zone` in [`dns.tf`](./dns.tf)
|
||||||
|
|
||||||
|
### Preliminar activities
|
||||||
|
|
||||||
|
Before running `terraform apply` on this stage, make sure to adapt all of `variables.tf` to your needs, to update all reference to regions (e.g. `europe-west1` or `ew1`) in the whole directory to match your preferences.
|
||||||
|
|
||||||
|
If you're not using FAST, you'll also need to create a `providers.tf` file to configure the GCS backend and the service account to use to run the deployment.
|
||||||
|
|
||||||
|
You're now ready to run `terraform init` and `apply`.
|
||||||
|
|
||||||
|
### Post-deployment activities
|
||||||
|
|
||||||
|
- On-prem routers should be configured to advertise all relevant CIDRs to the GCP environments. To avoid hitting GCP quotas, we recomment aggregating routes as much as possible.
|
||||||
|
- On-prem routers should accept BGP sessions from their cloud peers.
|
||||||
|
- On-prem DNS servers should have forward zones for GCP-managed ones.
|
||||||
|
|
||||||
|
## Customizations
|
||||||
|
|
||||||
|
### Adding an environment
|
||||||
|
|
||||||
|
To create a new environment (e.g. `staging`), a few changes are required.
|
||||||
|
|
||||||
|
Create a `spoke-staging.tf` file by copying `spoke-prod.tf` file,
|
||||||
|
and adapt the new file by replacing the value "prod" with the value "staging".
|
||||||
|
Running `diff spoke-dev.tf spoke-prod.tf` can help to see how environment files differ.
|
||||||
|
|
||||||
|
The new VPC requires a set of dedicated CIDRs, one per region, added to variable `custom_adv` (for example as `spoke_staging_ew1` and `spoke_staging_ew4`).
|
||||||
|
>`custom_adv` is a map that "resolves" CIDR names to actual addresses, and will be used later to configure routing.
|
||||||
|
>
|
||||||
|
Variables managing L7 Interal Load Balancers (`l7ilb_subnets`) and Private Service Access (`psa_ranges`) should also be adapted, and subnets and firewall rules for the new spoke should be added as described above.
|
||||||
|
|
||||||
|
DNS configurations are centralised in the `dns.tf` file. Spokes delegate DNS resolution to Landing through DNS peering, and optionally define a private zone (e.g. `staging.gcp.example.com`) which the landing peers to. To configure DNS for a new environment, copy all the `prod-*` modules in the `dns.tf` file to `staging-*`, and update their content accordingly. Don't forget to add a peering zone from Landing to the newly created environment private zone.
|
||||||
|
|
||||||
|
<!-- TFDOC OPTS files:1 show_extra:1 -->
|
||||||
|
<!-- BEGIN TFDOC -->
|
||||||
|
|
||||||
|
## Files
|
||||||
|
|
||||||
|
| name | description | modules | resources |
|
||||||
|
|---|---|---|---|
|
||||||
|
| [dns-dev.tf](./dns-dev.tf) | Development spoke DNS zones and peerings setup. | <code>dns</code> | |
|
||||||
|
| [dns-landing.tf](./dns-landing.tf) | Landing DNS zones and peerings setup. | <code>dns</code> | |
|
||||||
|
| [dns-prod.tf](./dns-prod.tf) | Production spoke DNS zones and peerings setup. | <code>dns</code> | |
|
||||||
|
| [landing.tf](./landing.tf) | Landing VPC and related resources. | <code>net-cloudnat</code> · <code>net-vpc</code> · <code>net-vpc-firewall</code> · <code>project</code> | |
|
||||||
|
| [main.tf](./main.tf) | Networking folder and hierarchical policy. | <code>folder</code> | |
|
||||||
|
| [monitoring.tf](./monitoring.tf) | Network monitoring dashboards. | | <code>google_monitoring_dashboard</code> |
|
||||||
|
| [outputs.tf](./outputs.tf) | Module outputs. | | <code>local_file</code> |
|
||||||
|
| [peerings.tf](./peerings.tf) | None | <code>net-vpc-peering</code> | |
|
||||||
|
| [spoke-dev.tf](./spoke-dev.tf) | Dev spoke VPC and related resources. | <code>net-cloudnat</code> · <code>net-vpc</code> · <code>net-vpc-firewall</code> · <code>project</code> | <code>google_project_iam_binding</code> |
|
||||||
|
| [spoke-prod.tf](./spoke-prod.tf) | Production spoke VPC and related resources. | <code>net-cloudnat</code> · <code>net-vpc</code> · <code>net-vpc-firewall</code> · <code>project</code> | <code>google_project_iam_binding</code> |
|
||||||
|
| [test-resources.tf](./test-resources.tf) | temporary instances for testing | <code>compute-vm</code> | |
|
||||||
|
| [variables-peerings.tf](./variables-peerings.tf) | Peering related variables. | | |
|
||||||
|
| [variables.tf](./variables.tf) | Module variables. | | |
|
||||||
|
| [vpn-onprem.tf](./vpn-onprem.tf) | VPN between landing and onprem. | <code>net-vpn-ha</code> | |
|
||||||
|
|
||||||
|
## Variables
|
||||||
|
|
||||||
|
| name | description | type | required | default | producer |
|
||||||
|
|---|---|:---:|:---:|:---:|:---:|
|
||||||
|
| [billing_account](variables.tf#L17) | Billing account id and organization id ('nnnnnnnn' or null). | <code title="object({ id = string organization_id = number })">object({…})</code> | ✓ | | <code>00-bootstrap</code> |
|
||||||
|
| [folder_ids](variables.tf#L66) | Folders to be used for the networking resources in folders/nnnnnnnnnnn format. If null, folder will be created. | <code title="object({ networking = string networking-dev = string networking-prod = string })">object({…})</code> | ✓ | | <code>01-resman</code> |
|
||||||
|
| [organization](variables.tf#L94) | Organization details. | <code title="object({ domain = string id = number customer_id = string })">object({…})</code> | ✓ | | <code>00-bootstrap</code> |
|
||||||
|
| [prefix](variables.tf#L110) | Prefix used for resources that need unique names. Use 9 characters or less. | <code>string</code> | ✓ | | <code>00-bootstrap</code> |
|
||||||
|
| [custom_adv](variables.tf#L26) | Custom advertisement definitions in name => range format. | <code>map(string)</code> | | <code title="{ cloud_dns = "35.199.192.0/19" gcp_all = "10.128.0.0/16" gcp_dev = "10.128.32.0/19" gcp_landing = "10.128.0.0/19" gcp_prod = "10.128.64.0/19" googleapis_private = "199.36.153.8/30" googleapis_restricted = "199.36.153.4/30" rfc_1918_10 = "10.0.0.0/8" rfc_1918_172 = "172.16.0.0/12" rfc_1918_192 = "192.168.0.0/16" }">{…}</code> | |
|
||||||
|
| [custom_roles](variables.tf#L43) | Custom roles defined at the org level, in key => id format. | <code title="object({ service_project_network_admin = string })">object({…})</code> | | <code>null</code> | <code>00-bootstrap</code> |
|
||||||
|
| [data_dir](variables.tf#L52) | Relative path for the folder storing configuration data for network resources. | <code>string</code> | | <code>"data"</code> | |
|
||||||
|
| [dns](variables.tf#L58) | Onprem DNS resolvers. | <code>map(list(string))</code> | | <code title="{ onprem = ["10.0.200.3"] }">{…}</code> | |
|
||||||
|
| [l7ilb_subnets](variables.tf#L76) | Subnets used for L7 ILBs. | <code title="map(list(object({ ip_cidr_range = string region = string })))">map(list(object({…})))</code> | | <code title="{ prod = [ { ip_cidr_range = "10.128.92.0/24", region = "europe-west1" }, { ip_cidr_range = "10.128.93.0/24", region = "europe-west4" } ] dev = [ { ip_cidr_range = "10.128.60.0/24", region = "europe-west1" }, { ip_cidr_range = "10.128.61.0/24", region = "europe-west4" } ] }">{…}</code> | |
|
||||||
|
| [outputs_location](variables.tf#L104) | Path where providers and tfvars files for the following stages are written. Leave empty to disable. | <code>string</code> | | <code>null</code> | |
|
||||||
|
| [peering_configs](variables-peerings.tf#L19) | Peering configurations. | <code title="map(object({ export_local_custom_routes = bool export_peer_custom_routes = bool }))">map(object({…}))</code> | | <code title="{ dev = { export_local_custom_routes = true export_peer_custom_routes = true } prod = { export_local_custom_routes = true export_peer_custom_routes = true } }">{…}</code> | |
|
||||||
|
| [psa_ranges](variables.tf#L121) | IP ranges used for Private Service Access (e.g. CloudSQL). | <code>map(map(string))</code> | | <code title="{ prod = { cloudsql-mysql = "10.128.94.0/24" cloudsql-sqlserver = "10.128.95.0/24" } dev = { cloudsql-mysql = "10.128.62.0/24" cloudsql-sqlserver = "10.128.63.0/24" } }">{…}</code> | |
|
||||||
|
| [router_onprem_configs](variables.tf#L136) | Configurations for routers used for onprem connectivity. | <code title="map(object({ adv = object({ custom = list(string) default = bool }) asn = number }))">map(object({…}))</code> | | <code title="{ landing-ew1 = { asn = "65533" adv = null } }">{…}</code> | |
|
||||||
|
| [service_accounts](variables.tf#L154) | Automation service accounts in name => email format. | <code title="object({ data-platform-dev = string data-platform-prod = string project-factory-dev = string project-factory-prod = string })">object({…})</code> | | <code>null</code> | <code>01-resman</code> |
|
||||||
|
| [vpn_onprem_configs](variables.tf#L166) | VPN gateway configuration for onprem interconnection. | <code title="map(object({ adv = object({ default = bool custom = list(string) }) peer_external_gateway = object({ redundancy_type = string interfaces = list(object({ id = number ip_address = string })) }) tunnels = list(object({ peer_asn = number peer_external_gateway_interface = number secret = string session_range = string vpn_gateway_interface = number })) }))">map(object({…}))</code> | | <code title="{ landing-ew1 = { adv = { default = false custom = [ "cloud_dns", "googleapis_private", "googleapis_restricted", "gcp_all" ] } peer_external_gateway = { redundancy_type = "SINGLE_IP_INTERNALLY_REDUNDANT" interfaces = [ { id = 0, ip_address = "8.8.8.8" }, ] } tunnels = [ { peer_asn = 65534 peer_external_gateway_interface = 0 secret = "foobar" session_range = "169.254.1.0/30" vpn_gateway_interface = 0 }, { peer_asn = 65534 peer_external_gateway_interface = 0 secret = "foobar" session_range = "169.254.1.4/30" vpn_gateway_interface = 1 } ] } }">{…}</code> | |
|
||||||
|
|
||||||
|
## Outputs
|
||||||
|
|
||||||
|
| name | description | sensitive | consumers |
|
||||||
|
|---|---|:---:|---|
|
||||||
|
| [cloud_dns_inbound_policy](outputs.tf#L57) | IP Addresses for Cloud DNS inbound policy. | | |
|
||||||
|
| [host_project_ids](outputs.tf#L62) | Network project ids. | | |
|
||||||
|
| [host_project_numbers](outputs.tf#L67) | Network project numbers. | | |
|
||||||
|
| [shared_vpc_self_links](outputs.tf#L72) | Shared VPC host projects. | | |
|
||||||
|
| [tfvars](outputs.tf#L87) | Terraform variables file for the following stages. | ✓ | |
|
||||||
|
| [vpn_gateway_endpoints](outputs.tf#L77) | External IP Addresses for the GCP VPN gateways. | | |
|
||||||
|
|
||||||
|
<!-- END TFDOC -->
|
|
@ -0,0 +1,15 @@
|
||||||
|
# skip boilerplate check
|
||||||
|
|
||||||
|
healthchecks:
|
||||||
|
- 35.191.0.0/16
|
||||||
|
- 130.211.0.0/22
|
||||||
|
- 209.85.152.0/22
|
||||||
|
- 209.85.204.0/22
|
||||||
|
|
||||||
|
rfc1918:
|
||||||
|
- 10.0.0.0/8
|
||||||
|
- 172.16.0.0/12
|
||||||
|
- 192.168.0.0/16
|
||||||
|
|
||||||
|
onprem_probes:
|
||||||
|
- 10.255.255.254/32
|
|
@ -0,0 +1,68 @@
|
||||||
|
{
|
||||||
|
"displayName": "Firewall Insights Monitoring",
|
||||||
|
"gridLayout": {
|
||||||
|
"columns": "2",
|
||||||
|
"widgets": [
|
||||||
|
{
|
||||||
|
"title": "Subnet Firewall Hit Counts",
|
||||||
|
"xyChart": {
|
||||||
|
"chartOptions": {
|
||||||
|
"mode": "COLOR"
|
||||||
|
},
|
||||||
|
"dataSets": [
|
||||||
|
{
|
||||||
|
"minAlignmentPeriod": "60s",
|
||||||
|
"plotType": "LINE",
|
||||||
|
"targetAxis": "Y1",
|
||||||
|
"timeSeriesQuery": {
|
||||||
|
"timeSeriesFilter": {
|
||||||
|
"aggregation": {
|
||||||
|
"perSeriesAligner": "ALIGN_RATE"
|
||||||
|
},
|
||||||
|
"filter": "metric.type=\"firewallinsights.googleapis.com/subnet/firewall_hit_count\" resource.type=\"gce_subnetwork\"",
|
||||||
|
"secondaryAggregation": {}
|
||||||
|
},
|
||||||
|
"unitOverride": "1"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"timeshiftDuration": "0s",
|
||||||
|
"yAxis": {
|
||||||
|
"label": "y1Axis",
|
||||||
|
"scale": "LINEAR"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "VM Firewall Hit Counts",
|
||||||
|
"xyChart": {
|
||||||
|
"chartOptions": {
|
||||||
|
"mode": "COLOR"
|
||||||
|
},
|
||||||
|
"dataSets": [
|
||||||
|
{
|
||||||
|
"minAlignmentPeriod": "60s",
|
||||||
|
"plotType": "LINE",
|
||||||
|
"targetAxis": "Y1",
|
||||||
|
"timeSeriesQuery": {
|
||||||
|
"timeSeriesFilter": {
|
||||||
|
"aggregation": {
|
||||||
|
"perSeriesAligner": "ALIGN_RATE"
|
||||||
|
},
|
||||||
|
"filter": "metric.type=\"firewallinsights.googleapis.com/vm/firewall_hit_count\" resource.type=\"gce_instance\"",
|
||||||
|
"secondaryAggregation": {}
|
||||||
|
},
|
||||||
|
"unitOverride": "1"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"timeshiftDuration": "0s",
|
||||||
|
"yAxis": {
|
||||||
|
"label": "y1Axis",
|
||||||
|
"scale": "LINEAR"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,248 @@
|
||||||
|
{
|
||||||
|
"displayName": "VPN Monitoring",
|
||||||
|
"gridLayout": {
|
||||||
|
"columns": "2",
|
||||||
|
"widgets": [
|
||||||
|
{
|
||||||
|
"title": "Number of connections",
|
||||||
|
"xyChart": {
|
||||||
|
"chartOptions": {
|
||||||
|
"mode": "COLOR"
|
||||||
|
},
|
||||||
|
"dataSets": [
|
||||||
|
{
|
||||||
|
"minAlignmentPeriod": "60s",
|
||||||
|
"plotType": "LINE",
|
||||||
|
"targetAxis": "Y1",
|
||||||
|
"timeSeriesQuery": {
|
||||||
|
"timeSeriesFilter": {
|
||||||
|
"aggregation": {
|
||||||
|
"perSeriesAligner": "ALIGN_MEAN"
|
||||||
|
},
|
||||||
|
"filter": "metric.type=\"vpn.googleapis.com/gateway/connections\" resource.type=\"vpn_gateway\"",
|
||||||
|
"secondaryAggregation": {}
|
||||||
|
},
|
||||||
|
"unitOverride": "1"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"timeshiftDuration": "0s",
|
||||||
|
"yAxis": {
|
||||||
|
"label": "y1Axis",
|
||||||
|
"scale": "LINEAR"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Tunnel established",
|
||||||
|
"xyChart": {
|
||||||
|
"chartOptions": {
|
||||||
|
"mode": "COLOR"
|
||||||
|
},
|
||||||
|
"dataSets": [
|
||||||
|
{
|
||||||
|
"minAlignmentPeriod": "60s",
|
||||||
|
"plotType": "LINE",
|
||||||
|
"targetAxis": "Y1",
|
||||||
|
"timeSeriesQuery": {
|
||||||
|
"timeSeriesFilter": {
|
||||||
|
"aggregation": {
|
||||||
|
"perSeriesAligner": "ALIGN_MEAN"
|
||||||
|
},
|
||||||
|
"filter": "metric.type=\"vpn.googleapis.com/tunnel_established\" resource.type=\"vpn_gateway\"",
|
||||||
|
"secondaryAggregation": {}
|
||||||
|
},
|
||||||
|
"unitOverride": "1"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"timeshiftDuration": "0s",
|
||||||
|
"yAxis": {
|
||||||
|
"label": "y1Axis",
|
||||||
|
"scale": "LINEAR"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Cloud VPN Gateway - Received bytes",
|
||||||
|
"xyChart": {
|
||||||
|
"chartOptions": {
|
||||||
|
"mode": "COLOR"
|
||||||
|
},
|
||||||
|
"dataSets": [
|
||||||
|
{
|
||||||
|
"minAlignmentPeriod": "60s",
|
||||||
|
"plotType": "LINE",
|
||||||
|
"targetAxis": "Y1",
|
||||||
|
"timeSeriesQuery": {
|
||||||
|
"timeSeriesFilter": {
|
||||||
|
"aggregation": {
|
||||||
|
"perSeriesAligner": "ALIGN_RATE"
|
||||||
|
},
|
||||||
|
"filter": "metric.type=\"vpn.googleapis.com/network/received_bytes_count\" resource.type=\"vpn_gateway\"",
|
||||||
|
"secondaryAggregation": {}
|
||||||
|
},
|
||||||
|
"unitOverride": "By"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"timeshiftDuration": "0s",
|
||||||
|
"yAxis": {
|
||||||
|
"label": "y1Axis",
|
||||||
|
"scale": "LINEAR"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Cloud VPN Gateway - Sent bytes",
|
||||||
|
"xyChart": {
|
||||||
|
"chartOptions": {
|
||||||
|
"mode": "COLOR"
|
||||||
|
},
|
||||||
|
"dataSets": [
|
||||||
|
{
|
||||||
|
"minAlignmentPeriod": "60s",
|
||||||
|
"plotType": "LINE",
|
||||||
|
"targetAxis": "Y1",
|
||||||
|
"timeSeriesQuery": {
|
||||||
|
"timeSeriesFilter": {
|
||||||
|
"aggregation": {
|
||||||
|
"perSeriesAligner": "ALIGN_RATE"
|
||||||
|
},
|
||||||
|
"filter": "metric.type=\"vpn.googleapis.com/network/sent_bytes_count\" resource.type=\"vpn_gateway\"",
|
||||||
|
"secondaryAggregation": {}
|
||||||
|
},
|
||||||
|
"unitOverride": "By"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"timeshiftDuration": "0s",
|
||||||
|
"yAxis": {
|
||||||
|
"label": "y1Axis",
|
||||||
|
"scale": "LINEAR"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Cloud VPN Gateway - Received packets",
|
||||||
|
"xyChart": {
|
||||||
|
"chartOptions": {
|
||||||
|
"mode": "COLOR"
|
||||||
|
},
|
||||||
|
"dataSets": [
|
||||||
|
{
|
||||||
|
"minAlignmentPeriod": "60s",
|
||||||
|
"plotType": "LINE",
|
||||||
|
"targetAxis": "Y1",
|
||||||
|
"timeSeriesQuery": {
|
||||||
|
"timeSeriesFilter": {
|
||||||
|
"aggregation": {
|
||||||
|
"perSeriesAligner": "ALIGN_RATE"
|
||||||
|
},
|
||||||
|
"filter": "metric.type=\"vpn.googleapis.com/network/received_packets_count\" resource.type=\"vpn_gateway\"",
|
||||||
|
"secondaryAggregation": {}
|
||||||
|
},
|
||||||
|
"unitOverride": "{packets}"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"timeshiftDuration": "0s",
|
||||||
|
"yAxis": {
|
||||||
|
"label": "y1Axis",
|
||||||
|
"scale": "LINEAR"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Cloud VPN Gateway - Sent packets",
|
||||||
|
"xyChart": {
|
||||||
|
"chartOptions": {
|
||||||
|
"mode": "COLOR"
|
||||||
|
},
|
||||||
|
"dataSets": [
|
||||||
|
{
|
||||||
|
"minAlignmentPeriod": "60s",
|
||||||
|
"plotType": "LINE",
|
||||||
|
"targetAxis": "Y1",
|
||||||
|
"timeSeriesQuery": {
|
||||||
|
"timeSeriesFilter": {
|
||||||
|
"aggregation": {
|
||||||
|
"perSeriesAligner": "ALIGN_RATE"
|
||||||
|
},
|
||||||
|
"filter": "metric.type=\"vpn.googleapis.com/network/sent_packets_count\" resource.type=\"vpn_gateway\"",
|
||||||
|
"secondaryAggregation": {}
|
||||||
|
},
|
||||||
|
"unitOverride": "{packets}"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"timeshiftDuration": "0s",
|
||||||
|
"yAxis": {
|
||||||
|
"label": "y1Axis",
|
||||||
|
"scale": "LINEAR"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Incoming packets dropped",
|
||||||
|
"xyChart": {
|
||||||
|
"chartOptions": {
|
||||||
|
"mode": "COLOR"
|
||||||
|
},
|
||||||
|
"dataSets": [
|
||||||
|
{
|
||||||
|
"minAlignmentPeriod": "60s",
|
||||||
|
"plotType": "LINE",
|
||||||
|
"targetAxis": "Y1",
|
||||||
|
"timeSeriesQuery": {
|
||||||
|
"timeSeriesFilter": {
|
||||||
|
"aggregation": {
|
||||||
|
"perSeriesAligner": "ALIGN_RATE"
|
||||||
|
},
|
||||||
|
"filter": "metric.type=\"vpn.googleapis.com/network/dropped_received_packets_count\" resource.type=\"vpn_gateway\"",
|
||||||
|
"secondaryAggregation": {}
|
||||||
|
},
|
||||||
|
"unitOverride": "1"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"timeshiftDuration": "0s",
|
||||||
|
"yAxis": {
|
||||||
|
"label": "y1Axis",
|
||||||
|
"scale": "LINEAR"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Outgoing packets dropped",
|
||||||
|
"xyChart": {
|
||||||
|
"chartOptions": {
|
||||||
|
"mode": "COLOR"
|
||||||
|
},
|
||||||
|
"dataSets": [
|
||||||
|
{
|
||||||
|
"minAlignmentPeriod": "60s",
|
||||||
|
"plotType": "LINE",
|
||||||
|
"targetAxis": "Y1",
|
||||||
|
"timeSeriesQuery": {
|
||||||
|
"timeSeriesFilter": {
|
||||||
|
"aggregation": {
|
||||||
|
"perSeriesAligner": "ALIGN_RATE"
|
||||||
|
},
|
||||||
|
"filter": "metric.type=\"vpn.googleapis.com/network/dropped_sent_packets_count\" resource.type=\"vpn_gateway\"",
|
||||||
|
"secondaryAggregation": {}
|
||||||
|
},
|
||||||
|
"unitOverride": "1"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"timeshiftDuration": "0s",
|
||||||
|
"yAxis": {
|
||||||
|
"label": "y1Axis",
|
||||||
|
"scale": "LINEAR"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,27 @@
|
||||||
|
# skip boilerplate check
|
||||||
|
|
||||||
|
ingress-allow-composer-nodes:
|
||||||
|
description: "Allow traffic to Composer nodes."
|
||||||
|
direction: INGRESS
|
||||||
|
action: allow
|
||||||
|
sources: []
|
||||||
|
ranges: ["0.0.0.0/0"]
|
||||||
|
targets:
|
||||||
|
- composer-worker
|
||||||
|
use_service_accounts: false
|
||||||
|
rules:
|
||||||
|
- protocol: tcp
|
||||||
|
ports: [80, 443, 3306, 3307]
|
||||||
|
|
||||||
|
ingress-allow-dataflow-load:
|
||||||
|
description: "Allow traffic to Dataflow nodes."
|
||||||
|
direction: INGRESS
|
||||||
|
action: allow
|
||||||
|
sources: []
|
||||||
|
ranges: ["0.0.0.0/0"]
|
||||||
|
targets:
|
||||||
|
- dataflow
|
||||||
|
use_service_accounts: false
|
||||||
|
rules:
|
||||||
|
- protocol: tcp
|
||||||
|
ports: [12345, 12346]
|
|
@ -0,0 +1,15 @@
|
||||||
|
# skip boilerplate check
|
||||||
|
|
||||||
|
allow-onprem-probes-example:
|
||||||
|
description: "Allow traffic from onprem probes"
|
||||||
|
direction: INGRESS
|
||||||
|
action: allow
|
||||||
|
sources: []
|
||||||
|
ranges:
|
||||||
|
- $onprem_probes
|
||||||
|
targets: []
|
||||||
|
use_service_accounts: false
|
||||||
|
rules:
|
||||||
|
- protocol: tcp
|
||||||
|
ports:
|
||||||
|
- 12345
|
|
@ -0,0 +1,49 @@
|
||||||
|
# skip boilerplate check
|
||||||
|
|
||||||
|
allow-admins:
|
||||||
|
description: Access from the admin subnet to all subnets
|
||||||
|
direction: INGRESS
|
||||||
|
action: allow
|
||||||
|
priority: 1000
|
||||||
|
ranges:
|
||||||
|
- $rfc1918
|
||||||
|
ports:
|
||||||
|
all: []
|
||||||
|
target_resources: null
|
||||||
|
enable_logging: false
|
||||||
|
|
||||||
|
allow-healthchecks:
|
||||||
|
description: Enable HTTP and HTTPS healthchecks
|
||||||
|
direction: INGRESS
|
||||||
|
action: allow
|
||||||
|
priority: 1001
|
||||||
|
ranges:
|
||||||
|
- $healthchecks
|
||||||
|
ports:
|
||||||
|
tcp: ["80", "443"]
|
||||||
|
target_resources: null
|
||||||
|
enable_logging: false
|
||||||
|
|
||||||
|
allow-ssh-from-iap:
|
||||||
|
description: Enable SSH from IAP
|
||||||
|
direction: INGRESS
|
||||||
|
action: allow
|
||||||
|
priority: 1002
|
||||||
|
ranges:
|
||||||
|
- 35.235.240.0/20
|
||||||
|
ports:
|
||||||
|
tcp: ["22"]
|
||||||
|
target_resources: null
|
||||||
|
enable_logging: false
|
||||||
|
|
||||||
|
allow-icmp:
|
||||||
|
description: Enable ICMP
|
||||||
|
direction: INGRESS
|
||||||
|
action: allow
|
||||||
|
priority: 1003
|
||||||
|
ranges:
|
||||||
|
- 0.0.0.0/0
|
||||||
|
ports:
|
||||||
|
icmp: []
|
||||||
|
target_resources: null
|
||||||
|
enable_logging: false
|
|
@ -0,0 +1,8 @@
|
||||||
|
# skip boilerplate check
|
||||||
|
|
||||||
|
region: europe-west1
|
||||||
|
description: Default subnet for dev Data Platform
|
||||||
|
ip_cidr_range: 10.128.48.0/24
|
||||||
|
secondary_ip_range:
|
||||||
|
pods: 100.128.48.0/20
|
||||||
|
services: 100.255.48.0/24
|
|
@ -0,0 +1,5 @@
|
||||||
|
# skip boilerplate check
|
||||||
|
|
||||||
|
region: europe-west1
|
||||||
|
ip_cidr_range: 10.128.32.0/24
|
||||||
|
description: Default subnet for dev
|
|
@ -0,0 +1,5 @@
|
||||||
|
# skip boilerplate check
|
||||||
|
|
||||||
|
region: europe-west1
|
||||||
|
ip_cidr_range: 10.128.0.0/24
|
||||||
|
description: Default subnet for landing
|
|
@ -0,0 +1,5 @@
|
||||||
|
# skip boilerplate check
|
||||||
|
|
||||||
|
region: europe-west1
|
||||||
|
ip_cidr_range: 10.128.64.0/24
|
||||||
|
description: Default subnet for prod
|
Binary file not shown.
After Width: | Height: | Size: 85 KiB |
File diff suppressed because one or more lines are too long
After Width: | Height: | Size: 281 KiB |
|
@ -0,0 +1,53 @@
|
||||||
|
/**
|
||||||
|
* Copyright 2022 Google LLC
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
# tfdoc:file:description Development spoke DNS zones and peerings setup.
|
||||||
|
|
||||||
|
# GCP-specific environment zone
|
||||||
|
|
||||||
|
module "dev-dns-private-zone" {
|
||||||
|
source = "../../../modules/dns"
|
||||||
|
project_id = module.dev-spoke-project.project_id
|
||||||
|
type = "private"
|
||||||
|
name = "dev-gcp-example-com"
|
||||||
|
domain = "dev.gcp.example.com."
|
||||||
|
client_networks = [module.landing-vpc.self_link]
|
||||||
|
recordsets = {
|
||||||
|
"A localhost" = { type = "A", ttl = 300, records = ["127.0.0.1"] }
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
# root zone peering to landing to centralize configuration; remove if unneeded
|
||||||
|
|
||||||
|
module "dev-landing-root-dns-peering" {
|
||||||
|
source = "../../../modules/dns"
|
||||||
|
project_id = module.dev-spoke-project.project_id
|
||||||
|
type = "peering"
|
||||||
|
name = "dev-root-dns-peering"
|
||||||
|
domain = "."
|
||||||
|
client_networks = [module.dev-spoke-vpc.self_link]
|
||||||
|
peer_network = module.landing-vpc.self_link
|
||||||
|
}
|
||||||
|
|
||||||
|
module "dev-reverse-10-dns-peering" {
|
||||||
|
source = "../../../modules/dns"
|
||||||
|
project_id = module.dev-spoke-project.project_id
|
||||||
|
type = "peering"
|
||||||
|
name = "dev-reverse-10-dns-peering"
|
||||||
|
domain = "10.in-addr.arpa."
|
||||||
|
client_networks = [module.dev-spoke-vpc.self_link]
|
||||||
|
peer_network = module.landing-vpc.self_link
|
||||||
|
}
|
|
@ -0,0 +1,71 @@
|
||||||
|
/**
|
||||||
|
* Copyright 2022 Google LLC
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
# tfdoc:file:description Landing DNS zones and peerings setup.
|
||||||
|
|
||||||
|
# forwarding to on-prem DNS resolvers
|
||||||
|
|
||||||
|
module "onprem-example-dns-forwarding" {
|
||||||
|
source = "../../../modules/dns"
|
||||||
|
project_id = module.landing-project.project_id
|
||||||
|
type = "forwarding"
|
||||||
|
name = "example-com"
|
||||||
|
domain = "onprem.example.com."
|
||||||
|
client_networks = [module.landing-vpc.self_link]
|
||||||
|
forwarders = { for ip in var.dns.onprem : ip => null }
|
||||||
|
}
|
||||||
|
|
||||||
|
module "reverse-10-dns-forwarding" {
|
||||||
|
source = "../../../modules/dns"
|
||||||
|
project_id = module.landing-project.project_id
|
||||||
|
type = "forwarding"
|
||||||
|
name = "root-reverse-10"
|
||||||
|
domain = "10.in-addr.arpa."
|
||||||
|
client_networks = [module.landing-vpc.self_link]
|
||||||
|
forwarders = { for ip in var.dns.onprem : ip => null }
|
||||||
|
}
|
||||||
|
|
||||||
|
module "gcp-example-dns-private-zone" {
|
||||||
|
source = "../../../modules/dns"
|
||||||
|
project_id = module.landing-project.project_id
|
||||||
|
type = "private"
|
||||||
|
name = "gcp-example-com"
|
||||||
|
domain = "gcp.example.com."
|
||||||
|
client_networks = [module.landing-vpc.self_link]
|
||||||
|
recordsets = {
|
||||||
|
"A localhost" = { type = "A", ttl = 300, records = ["127.0.0.1"] }
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
# Google API zone to trigger Private Access
|
||||||
|
|
||||||
|
module "googleapis-private-zone" {
|
||||||
|
source = "../../../modules/dns"
|
||||||
|
project_id = module.landing-project.project_id
|
||||||
|
type = "private"
|
||||||
|
name = "googleapis-com"
|
||||||
|
domain = "googleapis.com."
|
||||||
|
client_networks = [module.landing-vpc.self_link]
|
||||||
|
recordsets = {
|
||||||
|
"A private" = { type = "A", ttl = 300, records = [
|
||||||
|
"199.36.153.8", "199.36.153.9", "199.36.153.10", "199.36.153.11"
|
||||||
|
] }
|
||||||
|
"A restricted" = { type = "A", ttl = 300, records = [
|
||||||
|
"199.36.153.4", "199.36.153.5", "199.36.153.6", "199.36.153.7"
|
||||||
|
] }
|
||||||
|
"CNAME *" = { type = "CNAME", ttl = 300, records = ["private.googleapis.com."] }
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,53 @@
|
||||||
|
/**
|
||||||
|
* Copyright 2022 Google LLC
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
# tfdoc:file:description Production spoke DNS zones and peerings setup.
|
||||||
|
|
||||||
|
# GCP-specific environment zone
|
||||||
|
|
||||||
|
module "prod-dns-private-zone" {
|
||||||
|
source = "../../../modules/dns"
|
||||||
|
project_id = module.prod-spoke-project.project_id
|
||||||
|
type = "private"
|
||||||
|
name = "prod-gcp-example-com"
|
||||||
|
domain = "prod.gcp.example.com."
|
||||||
|
client_networks = [module.landing-vpc.self_link]
|
||||||
|
recordsets = {
|
||||||
|
"A localhost" = { type = "A", ttl = 300, records = ["127.0.0.1"] }
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
# root zone peering to landing to centralize configuration; remove if unneeded
|
||||||
|
|
||||||
|
module "prod-landing-root-dns-peering" {
|
||||||
|
source = "../../../modules/dns"
|
||||||
|
project_id = module.prod-spoke-project.project_id
|
||||||
|
type = "peering"
|
||||||
|
name = "prod-root-dns-peering"
|
||||||
|
domain = "."
|
||||||
|
client_networks = [module.prod-spoke-vpc.self_link]
|
||||||
|
peer_network = module.landing-vpc.self_link
|
||||||
|
}
|
||||||
|
|
||||||
|
module "prod-reverse-10-dns-peering" {
|
||||||
|
source = "../../../modules/dns"
|
||||||
|
project_id = module.prod-spoke-project.project_id
|
||||||
|
type = "peering"
|
||||||
|
name = "prod-reverse-10-dns-peering"
|
||||||
|
domain = "10.in-addr.arpa."
|
||||||
|
client_networks = [module.prod-spoke-vpc.self_link]
|
||||||
|
peer_network = module.landing-vpc.self_link
|
||||||
|
}
|
|
@ -0,0 +1,99 @@
|
||||||
|
/**
|
||||||
|
* Copyright 2022 Google LLC
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
# tfdoc:file:description Landing VPC and related resources.
|
||||||
|
|
||||||
|
module "landing-project" {
|
||||||
|
source = "../../../modules/project"
|
||||||
|
billing_account = var.billing_account.id
|
||||||
|
name = "prod-net-landing-0"
|
||||||
|
parent = var.folder_ids.networking-prod
|
||||||
|
prefix = var.prefix
|
||||||
|
service_config = {
|
||||||
|
disable_on_destroy = false
|
||||||
|
disable_dependent_services = false
|
||||||
|
}
|
||||||
|
services = [
|
||||||
|
"compute.googleapis.com",
|
||||||
|
"dns.googleapis.com",
|
||||||
|
"iap.googleapis.com",
|
||||||
|
"networkmanagement.googleapis.com",
|
||||||
|
"stackdriver.googleapis.com"
|
||||||
|
]
|
||||||
|
shared_vpc_host_config = {
|
||||||
|
enabled = true
|
||||||
|
service_projects = []
|
||||||
|
}
|
||||||
|
iam = {
|
||||||
|
"roles/dns.admin" = [local.service_accounts.project-factory-prod]
|
||||||
|
(local.custom_roles.service_project_network_admin) = [
|
||||||
|
local.service_accounts.project-factory-prod
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
module "landing-vpc" {
|
||||||
|
source = "../../../modules/net-vpc"
|
||||||
|
project_id = module.landing-project.project_id
|
||||||
|
name = "prod-landing-0"
|
||||||
|
mtu = 1500
|
||||||
|
dns_policy = {
|
||||||
|
inbound = true
|
||||||
|
logging = false
|
||||||
|
outbound = null
|
||||||
|
}
|
||||||
|
# set explicit routes for googleapis in case the default route is deleted
|
||||||
|
routes = {
|
||||||
|
private-googleapis = {
|
||||||
|
dest_range = "199.36.153.8/30"
|
||||||
|
priority = 1000
|
||||||
|
tags = []
|
||||||
|
next_hop_type = "gateway"
|
||||||
|
next_hop = "default-internet-gateway"
|
||||||
|
}
|
||||||
|
restricted-googleapis = {
|
||||||
|
dest_range = "199.36.153.4/30"
|
||||||
|
priority = 1000
|
||||||
|
tags = []
|
||||||
|
next_hop_type = "gateway"
|
||||||
|
next_hop = "default-internet-gateway"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
data_folder = "${var.data_dir}/subnets/landing"
|
||||||
|
}
|
||||||
|
|
||||||
|
module "landing-firewall" {
|
||||||
|
source = "../../../modules/net-vpc-firewall"
|
||||||
|
project_id = module.landing-project.project_id
|
||||||
|
network = module.landing-vpc.name
|
||||||
|
admin_ranges = []
|
||||||
|
http_source_ranges = []
|
||||||
|
https_source_ranges = []
|
||||||
|
ssh_source_ranges = []
|
||||||
|
data_folder = "${var.data_dir}/firewall-rules/landing"
|
||||||
|
cidr_template_file = "${var.data_dir}/cidrs.yaml"
|
||||||
|
}
|
||||||
|
|
||||||
|
module "landing-nat-ew1" {
|
||||||
|
source = "../../../modules/net-cloudnat"
|
||||||
|
project_id = module.landing-project.project_id
|
||||||
|
region = "europe-west1"
|
||||||
|
name = "ew1"
|
||||||
|
router_create = true
|
||||||
|
router_name = "prod-nat-ew1"
|
||||||
|
router_network = module.landing-vpc.name
|
||||||
|
router_asn = 4200001024
|
||||||
|
}
|
|
@ -0,0 +1,58 @@
|
||||||
|
/**
|
||||||
|
* Copyright 2022 Google LLC
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
# tfdoc:file:description Networking folder and hierarchical policy.
|
||||||
|
|
||||||
|
locals {
|
||||||
|
custom_roles = coalesce(var.custom_roles, {})
|
||||||
|
l7ilb_subnets = {
|
||||||
|
for env, v in var.l7ilb_subnets : env => [
|
||||||
|
for s in v : merge(s, {
|
||||||
|
active = true
|
||||||
|
name = "${env}-l7ilb-${s.region}"
|
||||||
|
})]
|
||||||
|
}
|
||||||
|
region_trigram = {
|
||||||
|
europe-west1 = "ew1"
|
||||||
|
europe-west3 = "ew3"
|
||||||
|
}
|
||||||
|
stage3_sas_delegated_grants = [
|
||||||
|
"roles/composer.sharedVpcAgent",
|
||||||
|
"roles/compute.networkUser",
|
||||||
|
"roles/container.hostServiceAgentUser",
|
||||||
|
"roles/vpcaccess.user",
|
||||||
|
]
|
||||||
|
service_accounts = {
|
||||||
|
for k, v in coalesce(var.service_accounts, {}) : k => "serviceAccount:${v}"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
module "folder" {
|
||||||
|
source = "../../../modules/folder"
|
||||||
|
parent = "organizations/${var.organization.id}"
|
||||||
|
name = "Networking"
|
||||||
|
folder_create = var.folder_ids.networking == null
|
||||||
|
id = var.folder_ids.networking
|
||||||
|
firewall_policy_factory = {
|
||||||
|
cidr_file = "${var.data_dir}/cidrs.yaml"
|
||||||
|
policy_name = null
|
||||||
|
rules_file = "${var.data_dir}/hierarchical-policy-rules.yaml"
|
||||||
|
}
|
||||||
|
firewall_policy_association = {
|
||||||
|
factory-policy = "factory"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
|
@ -0,0 +1,32 @@
|
||||||
|
/**
|
||||||
|
* Copyright 2022 Google LLC
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
# tfdoc:file:description Network monitoring dashboards.
|
||||||
|
|
||||||
|
locals {
|
||||||
|
dashboard_path = "${var.data_dir}/dashboards"
|
||||||
|
dashboard_files = fileset(local.dashboard_path, "*.json")
|
||||||
|
dashboards = {
|
||||||
|
for filename in local.dashboard_files :
|
||||||
|
filename => "${local.dashboard_path}/${filename}"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
resource "google_monitoring_dashboard" "dashboard" {
|
||||||
|
for_each = local.dashboards
|
||||||
|
project = module.landing-project.project_id
|
||||||
|
dashboard_json = file(each.value)
|
||||||
|
}
|
|
@ -0,0 +1,91 @@
|
||||||
|
/**
|
||||||
|
* Copyright 2022 Google LLC
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
locals {
|
||||||
|
host_project_ids = {
|
||||||
|
dev-spoke-0 = module.dev-spoke-project.project_id
|
||||||
|
prod-landing = module.landing-project.project_id
|
||||||
|
prod-spoke-0 = module.prod-spoke-project.project_id
|
||||||
|
}
|
||||||
|
host_project_numbers = {
|
||||||
|
dev-spoke-0 = module.dev-spoke-project.number
|
||||||
|
prod-landing = module.landing-project.number
|
||||||
|
prod-spoke-0 = module.prod-spoke-project.number
|
||||||
|
}
|
||||||
|
subnet_self_links = {
|
||||||
|
prod-landing = module.landing-vpc.subnet_self_links
|
||||||
|
dev-spoke-0 = module.dev-spoke-vpc.subnet_self_links
|
||||||
|
prod-spoke-0 = module.prod-spoke-vpc.subnet_self_links
|
||||||
|
}
|
||||||
|
tfvars = {
|
||||||
|
host_project_ids = local.host_project_ids
|
||||||
|
host_project_numbers = local.host_project_numbers
|
||||||
|
subnet_self_links = local.subnet_self_links
|
||||||
|
vpc_self_links = local.vpc_self_links
|
||||||
|
}
|
||||||
|
vpc_self_links = {
|
||||||
|
prod-landing = module.landing-vpc.self_link
|
||||||
|
dev-spoke-0 = module.dev-spoke-vpc.self_link
|
||||||
|
prod-spoke-0 = module.prod-spoke-vpc.self_link
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
# optionally generate tfvars file for subsequent stages
|
||||||
|
|
||||||
|
resource "local_file" "tfvars" {
|
||||||
|
for_each = var.outputs_location == null ? {} : { 1 = 1 }
|
||||||
|
file_permission = "0644"
|
||||||
|
filename = "${pathexpand(var.outputs_location)}/tfvars/02-networking.auto.tfvars.json"
|
||||||
|
content = jsonencode(local.tfvars)
|
||||||
|
}
|
||||||
|
|
||||||
|
# outputs
|
||||||
|
|
||||||
|
output "cloud_dns_inbound_policy" {
|
||||||
|
description = "IP Addresses for Cloud DNS inbound policy."
|
||||||
|
value = [for s in module.landing-vpc.subnets : cidrhost(s.ip_cidr_range, 2)]
|
||||||
|
}
|
||||||
|
|
||||||
|
output "host_project_ids" {
|
||||||
|
description = "Network project ids."
|
||||||
|
value = local.host_project_ids
|
||||||
|
}
|
||||||
|
|
||||||
|
output "host_project_numbers" {
|
||||||
|
description = "Network project numbers."
|
||||||
|
value = local.host_project_numbers
|
||||||
|
}
|
||||||
|
|
||||||
|
output "shared_vpc_self_links" {
|
||||||
|
description = "Shared VPC host projects."
|
||||||
|
value = local.vpc_self_links
|
||||||
|
}
|
||||||
|
|
||||||
|
output "vpn_gateway_endpoints" {
|
||||||
|
description = "External IP Addresses for the GCP VPN gateways."
|
||||||
|
value = local.enable_onprem_vpn == false ? null : {
|
||||||
|
onprem-ew1 = {
|
||||||
|
for v in module.landing-to-onprem-ew1-vpn[0].gateway.vpn_interfaces :
|
||||||
|
v.id => v.ip_address
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
output "tfvars" {
|
||||||
|
description = "Terraform variables file for the following stages."
|
||||||
|
sensitive = true
|
||||||
|
value = local.tfvars
|
||||||
|
}
|
|
@ -0,0 +1,43 @@
|
||||||
|
/**
|
||||||
|
* Copyright 2022 Google LLC
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
module "peering-dev" {
|
||||||
|
source = "../../../modules/net-vpc-peering"
|
||||||
|
prefix = "dev-peering-0"
|
||||||
|
local_network = module.dev-spoke-vpc.self_link
|
||||||
|
peer_network = module.landing-vpc.self_link
|
||||||
|
export_local_custom_routes = try(
|
||||||
|
var.peering_configs.dev.export_local_custom_routes, null
|
||||||
|
)
|
||||||
|
export_peer_custom_routes = try(
|
||||||
|
var.peering_configs.dev.export_peer_custom_routes, null
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
module "peering-prod" {
|
||||||
|
source = "../../../modules/net-vpc-peering"
|
||||||
|
prefix = "prod-peering-0"
|
||||||
|
local_network = module.prod-spoke-vpc.self_link
|
||||||
|
peer_network = module.landing-vpc.self_link
|
||||||
|
depends_on = [module.peering-dev]
|
||||||
|
export_local_custom_routes = try(
|
||||||
|
var.peering_configs.prod.export_local_custom_routes, null
|
||||||
|
)
|
||||||
|
export_peer_custom_routes = try(
|
||||||
|
var.peering_configs.prod.export_peer_custom_routes, null
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
|
@ -0,0 +1,114 @@
|
||||||
|
/**
|
||||||
|
* Copyright 2022 Google LLC
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
# tfdoc:file:description Dev spoke VPC and related resources.
|
||||||
|
|
||||||
|
module "dev-spoke-project" {
|
||||||
|
source = "../../../modules/project"
|
||||||
|
billing_account = var.billing_account.id
|
||||||
|
name = "dev-net-spoke-0"
|
||||||
|
parent = var.folder_ids.networking-dev
|
||||||
|
prefix = var.prefix
|
||||||
|
service_config = {
|
||||||
|
disable_on_destroy = false
|
||||||
|
disable_dependent_services = false
|
||||||
|
}
|
||||||
|
services = [
|
||||||
|
"container.googleapis.com",
|
||||||
|
"compute.googleapis.com",
|
||||||
|
"dns.googleapis.com",
|
||||||
|
"iap.googleapis.com",
|
||||||
|
"networkmanagement.googleapis.com",
|
||||||
|
"servicenetworking.googleapis.com",
|
||||||
|
]
|
||||||
|
shared_vpc_host_config = {
|
||||||
|
enabled = true
|
||||||
|
service_projects = []
|
||||||
|
}
|
||||||
|
metric_scopes = [module.landing-project.project_id]
|
||||||
|
iam = {
|
||||||
|
"roles/dns.admin" = [local.service_accounts.project-factory-dev]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
module "dev-spoke-vpc" {
|
||||||
|
source = "../../../modules/net-vpc"
|
||||||
|
project_id = module.dev-spoke-project.project_id
|
||||||
|
name = "dev-spoke-0"
|
||||||
|
mtu = 1500
|
||||||
|
data_folder = "${var.data_dir}/subnets/dev"
|
||||||
|
psa_ranges = var.psa_ranges.dev
|
||||||
|
subnets_l7ilb = local.l7ilb_subnets.dev
|
||||||
|
# set explicit routes for googleapis in case the default route is deleted
|
||||||
|
routes = {
|
||||||
|
private-googleapis = {
|
||||||
|
dest_range = "199.36.153.8/30"
|
||||||
|
priority = 1000
|
||||||
|
tags = []
|
||||||
|
next_hop_type = "gateway"
|
||||||
|
next_hop = "default-internet-gateway"
|
||||||
|
}
|
||||||
|
restricted-googleapis = {
|
||||||
|
dest_range = "199.36.153.4/30"
|
||||||
|
priority = 1000
|
||||||
|
tags = []
|
||||||
|
next_hop_type = "gateway"
|
||||||
|
next_hop = "default-internet-gateway"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
module "dev-spoke-firewall" {
|
||||||
|
source = "../../../modules/net-vpc-firewall"
|
||||||
|
project_id = module.dev-spoke-project.project_id
|
||||||
|
network = module.dev-spoke-vpc.name
|
||||||
|
admin_ranges = []
|
||||||
|
http_source_ranges = []
|
||||||
|
https_source_ranges = []
|
||||||
|
ssh_source_ranges = []
|
||||||
|
data_folder = "${var.data_dir}/firewall-rules/dev"
|
||||||
|
cidr_template_file = "${var.data_dir}/cidrs.yaml"
|
||||||
|
}
|
||||||
|
|
||||||
|
module "dev-spoke-cloudnat" {
|
||||||
|
for_each = toset(values(module.dev-spoke-vpc.subnet_regions))
|
||||||
|
source = "../../../modules/net-cloudnat"
|
||||||
|
project_id = module.dev-spoke-project.project_id
|
||||||
|
region = each.value
|
||||||
|
name = "dev-nat-${local.region_trigram[each.value]}"
|
||||||
|
router_create = true
|
||||||
|
router_network = module.dev-spoke-vpc.name
|
||||||
|
router_asn = 4200001024
|
||||||
|
logging_filter = "ERRORS_ONLY"
|
||||||
|
}
|
||||||
|
|
||||||
|
# Create delegated grants for stage3 service accounts
|
||||||
|
resource "google_project_iam_binding" "dev_spoke_project_iam_delegated" {
|
||||||
|
project = module.dev-spoke-project.project_id
|
||||||
|
role = "roles/resourcemanager.projectIamAdmin"
|
||||||
|
members = [
|
||||||
|
local.service_accounts.data-platform-dev,
|
||||||
|
local.service_accounts.project-factory-dev,
|
||||||
|
]
|
||||||
|
condition {
|
||||||
|
title = "dev_stage3_sa_delegated_grants"
|
||||||
|
description = "Development host project delegated grants."
|
||||||
|
expression = format(
|
||||||
|
"api.getAttribute('iam.googleapis.com/modifiedGrantsByRole', []).hasOnly([%s])",
|
||||||
|
join(",", formatlist("'%s'", local.stage3_sas_delegated_grants))
|
||||||
|
)
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,114 @@
|
||||||
|
/**
|
||||||
|
* Copyright 2022 Google LLC
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
# tfdoc:file:description Production spoke VPC and related resources.
|
||||||
|
|
||||||
|
module "prod-spoke-project" {
|
||||||
|
source = "../../../modules/project"
|
||||||
|
billing_account = var.billing_account.id
|
||||||
|
name = "prod-net-spoke-0"
|
||||||
|
parent = var.folder_ids.networking-prod
|
||||||
|
prefix = var.prefix
|
||||||
|
service_config = {
|
||||||
|
disable_on_destroy = false
|
||||||
|
disable_dependent_services = false
|
||||||
|
}
|
||||||
|
services = [
|
||||||
|
"container.googleapis.com",
|
||||||
|
"compute.googleapis.com",
|
||||||
|
"dns.googleapis.com",
|
||||||
|
"iap.googleapis.com",
|
||||||
|
"networkmanagement.googleapis.com",
|
||||||
|
"servicenetworking.googleapis.com",
|
||||||
|
]
|
||||||
|
shared_vpc_host_config = {
|
||||||
|
enabled = true
|
||||||
|
service_projects = []
|
||||||
|
}
|
||||||
|
metric_scopes = [module.landing-project.project_id]
|
||||||
|
iam = {
|
||||||
|
"roles/dns.admin" = [local.service_accounts.project-factory-prod]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
module "prod-spoke-vpc" {
|
||||||
|
source = "../../../modules/net-vpc"
|
||||||
|
project_id = module.prod-spoke-project.project_id
|
||||||
|
name = "prod-spoke-0"
|
||||||
|
mtu = 1500
|
||||||
|
data_folder = "${var.data_dir}/subnets/prod"
|
||||||
|
psa_ranges = var.psa_ranges.prod
|
||||||
|
subnets_l7ilb = local.l7ilb_subnets.prod
|
||||||
|
# set explicit routes for googleapis in case the default route is deleted
|
||||||
|
routes = {
|
||||||
|
private-googleapis = {
|
||||||
|
dest_range = "199.36.153.8/30"
|
||||||
|
priority = 1000
|
||||||
|
tags = []
|
||||||
|
next_hop_type = "gateway"
|
||||||
|
next_hop = "default-internet-gateway"
|
||||||
|
}
|
||||||
|
restricted-googleapis = {
|
||||||
|
dest_range = "199.36.153.4/30"
|
||||||
|
priority = 1000
|
||||||
|
tags = []
|
||||||
|
next_hop_type = "gateway"
|
||||||
|
next_hop = "default-internet-gateway"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
module "prod-spoke-firewall" {
|
||||||
|
source = "../../../modules/net-vpc-firewall"
|
||||||
|
project_id = module.prod-spoke-project.project_id
|
||||||
|
network = module.prod-spoke-vpc.name
|
||||||
|
admin_ranges = []
|
||||||
|
http_source_ranges = []
|
||||||
|
https_source_ranges = []
|
||||||
|
ssh_source_ranges = []
|
||||||
|
data_folder = "${var.data_dir}/firewall-rules/prod"
|
||||||
|
cidr_template_file = "${var.data_dir}/cidrs.yaml"
|
||||||
|
}
|
||||||
|
|
||||||
|
module "prod-spoke-cloudnat" {
|
||||||
|
for_each = toset(values(module.prod-spoke-vpc.subnet_regions))
|
||||||
|
source = "../../../modules/net-cloudnat"
|
||||||
|
project_id = module.prod-spoke-project.project_id
|
||||||
|
region = each.value
|
||||||
|
name = "prod-nat-${local.region_trigram[each.value]}"
|
||||||
|
router_create = true
|
||||||
|
router_network = module.prod-spoke-vpc.name
|
||||||
|
router_asn = 4200001024
|
||||||
|
logging_filter = "ERRORS_ONLY"
|
||||||
|
}
|
||||||
|
|
||||||
|
# Create delegated grants for stage3 service accounts
|
||||||
|
resource "google_project_iam_binding" "prod_spoke_project_iam_delegated" {
|
||||||
|
project = module.prod-spoke-project.project_id
|
||||||
|
role = "roles/resourcemanager.projectIamAdmin"
|
||||||
|
members = [
|
||||||
|
local.service_accounts.data-platform-prod,
|
||||||
|
local.service_accounts.project-factory-prod,
|
||||||
|
]
|
||||||
|
condition {
|
||||||
|
title = "prod_stage3_sa_delegated_grants"
|
||||||
|
description = "Production host project delegated grants."
|
||||||
|
expression = format(
|
||||||
|
"api.getAttribute('iam.googleapis.com/modifiedGrantsByRole', []).hasOnly([%s])",
|
||||||
|
join(",", formatlist("'%s'", local.stage3_sas_delegated_grants))
|
||||||
|
)
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,100 @@
|
||||||
|
/**
|
||||||
|
* Copyright 2022 Google LLC
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
# tfdoc:file:description temporary instances for testing
|
||||||
|
|
||||||
|
# module "test-vm-landing-0" {
|
||||||
|
# source = "../../../modules/compute-vm"
|
||||||
|
# project_id = module.landing-project.project_id
|
||||||
|
# zone = "europe-west1-b"
|
||||||
|
# name = "test-vm-0"
|
||||||
|
# network_interfaces = [{
|
||||||
|
# network = module.landing-vpc.self_link
|
||||||
|
# subnetwork = module.landing-vpc.subnet_self_links["europe-west1/landing-default-ew1"]
|
||||||
|
# alias_ips = {}
|
||||||
|
# nat = false
|
||||||
|
# addresses = null
|
||||||
|
# }]
|
||||||
|
# tags = ["ssh"]
|
||||||
|
# service_account_create = true
|
||||||
|
# boot_disk = {
|
||||||
|
# image = "projects/debian-cloud/global/images/family/debian-10"
|
||||||
|
# type = "pd-balanced"
|
||||||
|
# size = 10
|
||||||
|
# }
|
||||||
|
# metadata = {
|
||||||
|
# startup-script = <<EOF
|
||||||
|
# apt update
|
||||||
|
# apt install iputils-ping bind9-dnsutils
|
||||||
|
# EOF
|
||||||
|
# }
|
||||||
|
# }
|
||||||
|
|
||||||
|
# module "test-vm-dev-0" {
|
||||||
|
# source = "../../../modules/compute-vm"
|
||||||
|
# project_id = module.dev-spoke-project.project_id
|
||||||
|
# zone = "europe-west1-b"
|
||||||
|
# name = "test-vm-0"
|
||||||
|
# network_interfaces = [{
|
||||||
|
# network = module.dev-spoke-vpc.self_link
|
||||||
|
# # change the subnet name to match the values you are actually using
|
||||||
|
# subnetwork = module.dev-spoke-vpc.subnet_self_links["europe-west1/dev-default-ew1"]
|
||||||
|
# alias_ips = {}
|
||||||
|
# nat = false
|
||||||
|
# addresses = null
|
||||||
|
# }]
|
||||||
|
# tags = ["ssh"]
|
||||||
|
# service_account_create = true
|
||||||
|
# boot_disk = {
|
||||||
|
# image = "projects/debian-cloud/global/images/family/debian-10"
|
||||||
|
# type = "pd-balanced"
|
||||||
|
# size = 10
|
||||||
|
# }
|
||||||
|
# metadata = {
|
||||||
|
# startup-script = <<EOF
|
||||||
|
# apt update
|
||||||
|
# apt install iputils-ping bind9-dnsutils
|
||||||
|
# EOF
|
||||||
|
# }
|
||||||
|
# }
|
||||||
|
|
||||||
|
# module "test-vm-prod-0" {
|
||||||
|
# source = "../../../modules/compute-vm"
|
||||||
|
# project_id = module.prod-spoke-project.project_id
|
||||||
|
# zone = "europe-west1-b"
|
||||||
|
# name = "test-vm-0"
|
||||||
|
# network_interfaces = [{
|
||||||
|
# network = module.prod-spoke-vpc.self_link
|
||||||
|
# # change the subnet name to match the values you are actually using
|
||||||
|
# subnetwork = module.prod-spoke-vpc.subnet_self_links["europe-west1/prod-default-ew1"]
|
||||||
|
# alias_ips = {}
|
||||||
|
# nat = false
|
||||||
|
# addresses = null
|
||||||
|
# }]
|
||||||
|
# tags = ["ssh"]
|
||||||
|
# service_account_create = true
|
||||||
|
# boot_disk = {
|
||||||
|
# image = "projects/debian-cloud/global/images/family/debian-10"
|
||||||
|
# type = "pd-balanced"
|
||||||
|
# size = 10
|
||||||
|
# }
|
||||||
|
# metadata = {
|
||||||
|
# startup-script = <<EOF
|
||||||
|
# apt update
|
||||||
|
# apt install iputils-ping bind9-dnsutils
|
||||||
|
# EOF
|
||||||
|
# }
|
||||||
|
# }
|
|
@ -0,0 +1,36 @@
|
||||||
|
/**
|
||||||
|
* Copyright 2022 Google LLC
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
# tfdoc:file:description Peering related variables.
|
||||||
|
|
||||||
|
variable "peering_configs" {
|
||||||
|
description = "Peering configurations."
|
||||||
|
type = map(object({
|
||||||
|
export_local_custom_routes = bool
|
||||||
|
export_peer_custom_routes = bool
|
||||||
|
}))
|
||||||
|
default = {
|
||||||
|
dev = {
|
||||||
|
export_local_custom_routes = true
|
||||||
|
export_peer_custom_routes = true
|
||||||
|
}
|
||||||
|
prod = {
|
||||||
|
export_local_custom_routes = true
|
||||||
|
export_peer_custom_routes = true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
nullable = false
|
||||||
|
}
|
|
@ -0,0 +1,220 @@
|
||||||
|
/**
|
||||||
|
* Copyright 2022 Google LLC
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
variable "billing_account" {
|
||||||
|
# tfdoc:variable:source 00-bootstrap
|
||||||
|
description = "Billing account id and organization id ('nnnnnnnn' or null)."
|
||||||
|
type = object({
|
||||||
|
id = string
|
||||||
|
organization_id = number
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "custom_adv" {
|
||||||
|
description = "Custom advertisement definitions in name => range format."
|
||||||
|
type = map(string)
|
||||||
|
default = {
|
||||||
|
cloud_dns = "35.199.192.0/19"
|
||||||
|
gcp_all = "10.128.0.0/16"
|
||||||
|
gcp_dev = "10.128.32.0/19"
|
||||||
|
gcp_landing = "10.128.0.0/19"
|
||||||
|
gcp_prod = "10.128.64.0/19"
|
||||||
|
googleapis_private = "199.36.153.8/30"
|
||||||
|
googleapis_restricted = "199.36.153.4/30"
|
||||||
|
rfc_1918_10 = "10.0.0.0/8"
|
||||||
|
rfc_1918_172 = "172.16.0.0/12"
|
||||||
|
rfc_1918_192 = "192.168.0.0/16"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "custom_roles" {
|
||||||
|
# tfdoc:variable:source 00-bootstrap
|
||||||
|
description = "Custom roles defined at the org level, in key => id format."
|
||||||
|
type = object({
|
||||||
|
service_project_network_admin = string
|
||||||
|
})
|
||||||
|
default = null
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "data_dir" {
|
||||||
|
description = "Relative path for the folder storing configuration data for network resources."
|
||||||
|
type = string
|
||||||
|
default = "data"
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "dns" {
|
||||||
|
description = "Onprem DNS resolvers."
|
||||||
|
type = map(list(string))
|
||||||
|
default = {
|
||||||
|
onprem = ["10.0.200.3"]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "folder_ids" {
|
||||||
|
# tfdoc:variable:source 01-resman
|
||||||
|
description = "Folders to be used for the networking resources in folders/nnnnnnnnnnn format. If null, folder will be created."
|
||||||
|
type = object({
|
||||||
|
networking = string
|
||||||
|
networking-dev = string
|
||||||
|
networking-prod = string
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "l7ilb_subnets" {
|
||||||
|
description = "Subnets used for L7 ILBs."
|
||||||
|
type = map(list(object({
|
||||||
|
ip_cidr_range = string
|
||||||
|
region = string
|
||||||
|
})))
|
||||||
|
default = {
|
||||||
|
prod = [
|
||||||
|
{ ip_cidr_range = "10.128.92.0/24", region = "europe-west1" },
|
||||||
|
{ ip_cidr_range = "10.128.93.0/24", region = "europe-west4" }
|
||||||
|
]
|
||||||
|
dev = [
|
||||||
|
{ ip_cidr_range = "10.128.60.0/24", region = "europe-west1" },
|
||||||
|
{ ip_cidr_range = "10.128.61.0/24", region = "europe-west4" }
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "organization" {
|
||||||
|
# tfdoc:variable:source 00-bootstrap
|
||||||
|
description = "Organization details."
|
||||||
|
type = object({
|
||||||
|
domain = string
|
||||||
|
id = number
|
||||||
|
customer_id = string
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "outputs_location" {
|
||||||
|
description = "Path where providers and tfvars files for the following stages are written. Leave empty to disable."
|
||||||
|
type = string
|
||||||
|
default = null
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "prefix" {
|
||||||
|
# tfdoc:variable:source 00-bootstrap
|
||||||
|
description = "Prefix used for resources that need unique names. Use 9 characters or less."
|
||||||
|
type = string
|
||||||
|
|
||||||
|
validation {
|
||||||
|
condition = try(length(var.prefix), 0) < 10
|
||||||
|
error_message = "Use a maximum of 9 characters for prefix."
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "psa_ranges" {
|
||||||
|
description = "IP ranges used for Private Service Access (e.g. CloudSQL)."
|
||||||
|
type = map(map(string))
|
||||||
|
default = {
|
||||||
|
prod = {
|
||||||
|
cloudsql-mysql = "10.128.94.0/24"
|
||||||
|
cloudsql-sqlserver = "10.128.95.0/24"
|
||||||
|
}
|
||||||
|
dev = {
|
||||||
|
cloudsql-mysql = "10.128.62.0/24"
|
||||||
|
cloudsql-sqlserver = "10.128.63.0/24"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "router_onprem_configs" {
|
||||||
|
description = "Configurations for routers used for onprem connectivity."
|
||||||
|
type = map(object({
|
||||||
|
adv = object({
|
||||||
|
custom = list(string)
|
||||||
|
default = bool
|
||||||
|
})
|
||||||
|
asn = number
|
||||||
|
}))
|
||||||
|
default = {
|
||||||
|
landing-ew1 = {
|
||||||
|
asn = "65533"
|
||||||
|
adv = null
|
||||||
|
# adv = { default = false, custom = [] }
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "service_accounts" {
|
||||||
|
# tfdoc:variable:source 01-resman
|
||||||
|
description = "Automation service accounts in name => email format."
|
||||||
|
type = object({
|
||||||
|
data-platform-dev = string
|
||||||
|
data-platform-prod = string
|
||||||
|
project-factory-dev = string
|
||||||
|
project-factory-prod = string
|
||||||
|
})
|
||||||
|
default = null
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "vpn_onprem_configs" {
|
||||||
|
description = "VPN gateway configuration for onprem interconnection."
|
||||||
|
type = map(object({
|
||||||
|
adv = object({
|
||||||
|
default = bool
|
||||||
|
custom = list(string)
|
||||||
|
})
|
||||||
|
peer_external_gateway = object({
|
||||||
|
redundancy_type = string
|
||||||
|
interfaces = list(object({
|
||||||
|
id = number
|
||||||
|
ip_address = string
|
||||||
|
}))
|
||||||
|
})
|
||||||
|
tunnels = list(object({
|
||||||
|
peer_asn = number
|
||||||
|
peer_external_gateway_interface = number
|
||||||
|
secret = string
|
||||||
|
session_range = string
|
||||||
|
vpn_gateway_interface = number
|
||||||
|
}))
|
||||||
|
}))
|
||||||
|
default = {
|
||||||
|
landing-ew1 = {
|
||||||
|
adv = {
|
||||||
|
default = false
|
||||||
|
custom = [
|
||||||
|
"cloud_dns", "googleapis_private", "googleapis_restricted", "gcp_all"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
peer_external_gateway = {
|
||||||
|
redundancy_type = "SINGLE_IP_INTERNALLY_REDUNDANT"
|
||||||
|
interfaces = [
|
||||||
|
{ id = 0, ip_address = "8.8.8.8" },
|
||||||
|
]
|
||||||
|
}
|
||||||
|
tunnels = [
|
||||||
|
{
|
||||||
|
peer_asn = 65534
|
||||||
|
peer_external_gateway_interface = 0
|
||||||
|
secret = "foobar"
|
||||||
|
session_range = "169.254.1.0/30"
|
||||||
|
vpn_gateway_interface = 0
|
||||||
|
},
|
||||||
|
{
|
||||||
|
peer_asn = 65534
|
||||||
|
peer_external_gateway_interface = 0
|
||||||
|
secret = "foobar"
|
||||||
|
session_range = "169.254.1.4/30"
|
||||||
|
vpn_gateway_interface = 1
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,62 @@
|
||||||
|
/**
|
||||||
|
* Copyright 2022 Google LLC
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
# tfdoc:file:description VPN between landing and onprem.
|
||||||
|
|
||||||
|
locals {
|
||||||
|
enable_onprem_vpn = var.vpn_onprem_configs != null
|
||||||
|
bgp_peer_options_onprem = local.enable_onprem_vpn == false ? null : {
|
||||||
|
for k, v in var.vpn_onprem_configs :
|
||||||
|
k => v.adv == null ? null : {
|
||||||
|
advertise_groups = []
|
||||||
|
advertise_ip_ranges = {
|
||||||
|
for adv in(v.adv == null ? [] : v.adv.custom) :
|
||||||
|
var.custom_adv[adv] => adv
|
||||||
|
}
|
||||||
|
advertise_mode = try(v.adv.default, false) ? "DEFAULT" : "CUSTOM"
|
||||||
|
route_priority = null
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
module "landing-to-onprem-ew1-vpn" {
|
||||||
|
count = local.enable_onprem_vpn ? 1 : 0
|
||||||
|
source = "../../../modules/net-vpn-ha"
|
||||||
|
project_id = module.landing-project.project_id
|
||||||
|
network = module.landing-vpc.self_link
|
||||||
|
region = "europe-west1"
|
||||||
|
name = "vpn-to-onprem-ew1"
|
||||||
|
router_create = true
|
||||||
|
router_name = "landing-onprem-vpn-ew1"
|
||||||
|
router_asn = var.router_onprem_configs.landing-ew1.asn
|
||||||
|
peer_external_gateway = var.vpn_onprem_configs.landing-ew1.peer_external_gateway
|
||||||
|
tunnels = {
|
||||||
|
for t in var.vpn_onprem_configs.landing-ew1.tunnels :
|
||||||
|
"remote-${t.vpn_gateway_interface}-${t.peer_external_gateway_interface}" => {
|
||||||
|
bgp_peer = {
|
||||||
|
address = cidrhost(t.session_range, 1)
|
||||||
|
asn = t.peer_asn
|
||||||
|
}
|
||||||
|
bgp_peer_options = local.bgp_peer_options_onprem.landing-ew1
|
||||||
|
bgp_session_range = "${cidrhost(t.session_range, 2)}/30"
|
||||||
|
ike_version = 2
|
||||||
|
peer_external_gateway_interface = t.peer_external_gateway_interface
|
||||||
|
router = null
|
||||||
|
shared_secret = t.secret
|
||||||
|
vpn_gateway_interface = t.vpn_gateway_interface
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
|
@ -301,6 +301,7 @@ DNS configurations are centralised in the `dns.tf` file. Spokes delegate DNS res
|
||||||
| [spoke-dev.tf](./spoke-dev.tf) | Dev spoke VPC and related resources. | <code>net-cloudnat</code> · <code>net-vpc</code> · <code>net-vpc-firewall</code> · <code>project</code> | <code>google_project_iam_binding</code> |
|
| [spoke-dev.tf](./spoke-dev.tf) | Dev spoke VPC and related resources. | <code>net-cloudnat</code> · <code>net-vpc</code> · <code>net-vpc-firewall</code> · <code>project</code> | <code>google_project_iam_binding</code> |
|
||||||
| [spoke-prod.tf](./spoke-prod.tf) | Production spoke VPC and related resources. | <code>net-cloudnat</code> · <code>net-vpc</code> · <code>net-vpc-firewall</code> · <code>project</code> | <code>google_project_iam_binding</code> |
|
| [spoke-prod.tf](./spoke-prod.tf) | Production spoke VPC and related resources. | <code>net-cloudnat</code> · <code>net-vpc</code> · <code>net-vpc-firewall</code> · <code>project</code> | <code>google_project_iam_binding</code> |
|
||||||
| [test-resources.tf](./test-resources.tf) | temporary instances for testing | <code>compute-vm</code> | |
|
| [test-resources.tf](./test-resources.tf) | temporary instances for testing | <code>compute-vm</code> | |
|
||||||
|
| [variables-vpn.tf](./variables-vpn.tf) | None | | |
|
||||||
| [variables.tf](./variables.tf) | Module variables. | | |
|
| [variables.tf](./variables.tf) | Module variables. | | |
|
||||||
| [vpn-onprem.tf](./vpn-onprem.tf) | VPN between landing and onprem. | <code>net-vpn-ha</code> | |
|
| [vpn-onprem.tf](./vpn-onprem.tf) | VPN between landing and onprem. | <code>net-vpn-ha</code> | |
|
||||||
| [vpn-spoke-dev.tf](./vpn-spoke-dev.tf) | VPN between landing and development spoke. | <code>net-vpn-ha</code> | |
|
| [vpn-spoke-dev.tf](./vpn-spoke-dev.tf) | VPN between landing and development spoke. | <code>net-vpn-ha</code> | |
|
||||||
|
@ -321,10 +322,11 @@ DNS configurations are centralised in the `dns.tf` file. Spokes delegate DNS res
|
||||||
| [l7ilb_subnets](variables.tf#L76) | Subnets used for L7 ILBs. | <code title="map(list(object({ ip_cidr_range = string region = string })))">map(list(object({…})))</code> | | <code title="{ prod = [ { ip_cidr_range = "10.128.92.0/24", region = "europe-west1" }, { ip_cidr_range = "10.128.93.0/24", region = "europe-west4" } ] dev = [ { ip_cidr_range = "10.128.60.0/24", region = "europe-west1" }, { ip_cidr_range = "10.128.61.0/24", region = "europe-west4" } ] }">{…}</code> | |
|
| [l7ilb_subnets](variables.tf#L76) | Subnets used for L7 ILBs. | <code title="map(list(object({ ip_cidr_range = string region = string })))">map(list(object({…})))</code> | | <code title="{ prod = [ { ip_cidr_range = "10.128.92.0/24", region = "europe-west1" }, { ip_cidr_range = "10.128.93.0/24", region = "europe-west4" } ] dev = [ { ip_cidr_range = "10.128.60.0/24", region = "europe-west1" }, { ip_cidr_range = "10.128.61.0/24", region = "europe-west4" } ] }">{…}</code> | |
|
||||||
| [outputs_location](variables.tf#L104) | Path where providers and tfvars files for the following stages are written. Leave empty to disable. | <code>string</code> | | <code>null</code> | |
|
| [outputs_location](variables.tf#L104) | Path where providers and tfvars files for the following stages are written. Leave empty to disable. | <code>string</code> | | <code>null</code> | |
|
||||||
| [psa_ranges](variables.tf#L121) | IP ranges used for Private Service Access (e.g. CloudSQL). | <code>map(map(string))</code> | | <code title="{ prod = { cloudsql-mysql = "10.128.94.0/24" cloudsql-sqlserver = "10.128.95.0/24" } dev = { cloudsql-mysql = "10.128.62.0/24" cloudsql-sqlserver = "10.128.63.0/24" } }">{…}</code> | |
|
| [psa_ranges](variables.tf#L121) | IP ranges used for Private Service Access (e.g. CloudSQL). | <code>map(map(string))</code> | | <code title="{ prod = { cloudsql-mysql = "10.128.94.0/24" cloudsql-sqlserver = "10.128.95.0/24" } dev = { cloudsql-mysql = "10.128.62.0/24" cloudsql-sqlserver = "10.128.63.0/24" } }">{…}</code> | |
|
||||||
| [router_configs](variables.tf#L136) | Configurations for CRs and onprem routers. | <code title="map(object({ adv = object({ custom = list(string) default = bool }) asn = number }))">map(object({…}))</code> | | <code title="{ onprem-ew1 = { asn = "65534" adv = null } landing-ew1 = { asn = "64512", adv = null } landing-ew4 = { asn = "64512", adv = null } spoke-dev-ew1 = { asn = "64513", adv = null } spoke-dev-ew4 = { asn = "64513", adv = null } spoke-prod-ew1 = { asn = "64514", adv = null } spoke-prod-ew4 = { asn = "64514", adv = null } }">{…}</code> | |
|
| [router_onprem_configs](variables.tf#L136) | Configurations for routers used for onprem connectivity. | <code title="map(object({ adv = object({ custom = list(string) default = bool }) asn = number }))">map(object({…}))</code> | | <code title="{ landing-ew1 = { asn = "65533" adv = null } }">{…}</code> | |
|
||||||
| [service_accounts](variables.tf#L160) | Automation service accounts in name => email format. | <code title="object({ data-platform-dev = string data-platform-prod = string project-factory-dev = string project-factory-prod = string })">object({…})</code> | | <code>null</code> | <code>01-resman</code> |
|
| [router_spoke_configs](variables-vpn.tf#L18) | Configurations for routers used for internal connectivity. | <code title="map(object({ adv = object({ custom = list(string) default = bool }) asn = number }))">map(object({…}))</code> | | <code title="{ landing-ew1 = { asn = "64512", adv = null } landing-ew4 = { asn = "64512", adv = null } spoke-dev-ew1 = { asn = "64513", adv = null } spoke-dev-ew4 = { asn = "64513", adv = null } spoke-prod-ew1 = { asn = "64514", adv = null } spoke-prod-ew4 = { asn = "64514", adv = null } }">{…}</code> | |
|
||||||
| [vpn_onprem_configs](variables.tf#L172) | VPN gateway configuration for onprem interconnection. | <code title="map(object({ adv = object({ default = bool custom = list(string) }) peer_external_gateway = object({ redundancy_type = string interfaces = list(object({ id = number ip_address = string })) }) tunnels = list(object({ peer_asn = number peer_external_gateway_interface = number secret = string session_range = string vpn_gateway_interface = number })) }))">map(object({…}))</code> | | <code title="{ landing-ew1 = { adv = { default = false custom = [ "cloud_dns", "googleapis_private", "googleapis_restricted", "gcp_all" ] } peer_external_gateway = { redundancy_type = "SINGLE_IP_INTERNALLY_REDUNDANT" interfaces = [ { id = 0, ip_address = "8.8.8.8" }, ] } tunnels = [ { peer_asn = 65534 peer_external_gateway_interface = 0 secret = "foobar" session_range = "169.254.1.0/30" vpn_gateway_interface = 0 }, { peer_asn = 65534 peer_external_gateway_interface = 0 secret = "foobar" session_range = "169.254.1.4/30" vpn_gateway_interface = 1 } ] } }">{…}</code> | |
|
| [service_accounts](variables.tf#L154) | Automation service accounts in name => email format. | <code title="object({ data-platform-dev = string data-platform-prod = string project-factory-dev = string project-factory-prod = string })">object({…})</code> | | <code>null</code> | <code>01-resman</code> |
|
||||||
| [vpn_spoke_configs](variables.tf#L228) | VPN gateway configuration for spokes. | <code title="map(object({ adv = object({ default = bool custom = list(string) }) session_range = string }))">map(object({…}))</code> | | <code title="{ landing-ew1 = { adv = { default = false custom = ["rfc_1918_10", "rfc_1918_172", "rfc_1918_192"] } session_range = null } landing-ew4 = { adv = { default = false custom = ["rfc_1918_10", "rfc_1918_172", "rfc_1918_192"] } session_range = null } dev-ew1 = { adv = { default = false custom = ["gcp_dev"] } session_range = "169.254.0.0/27" } prod-ew1 = { adv = { default = false custom = ["gcp_prod"] } session_range = "169.254.0.64/27" } prod-ew4 = { adv = { default = false custom = ["gcp_prod"] } session_range = "169.254.0.96/27" } }">{…}</code> | |
|
| [vpn_onprem_configs](variables.tf#L166) | VPN gateway configuration for onprem interconnection. | <code title="map(object({ adv = object({ default = bool custom = list(string) }) peer_external_gateway = object({ redundancy_type = string interfaces = list(object({ id = number ip_address = string })) }) tunnels = list(object({ peer_asn = number peer_external_gateway_interface = number secret = string session_range = string vpn_gateway_interface = number })) }))">map(object({…}))</code> | | <code title="{ landing-ew1 = { adv = { default = false custom = [ "cloud_dns", "googleapis_private", "googleapis_restricted", "gcp_all" ] } peer_external_gateway = { redundancy_type = "SINGLE_IP_INTERNALLY_REDUNDANT" interfaces = [ { id = 0, ip_address = "8.8.8.8" }, ] } tunnels = [ { peer_asn = 65534 peer_external_gateway_interface = 0 secret = "foobar" session_range = "169.254.1.0/30" vpn_gateway_interface = 0 }, { peer_asn = 65534 peer_external_gateway_interface = 0 secret = "foobar" session_range = "169.254.1.4/30" vpn_gateway_interface = 1 } ] } }">{…}</code> | |
|
||||||
|
| [vpn_spoke_configs](variables-vpn.tf#L37) | VPN gateway configuration for spokes. | <code title="map(object({ adv = object({ default = bool custom = list(string) }) session_range = string }))">map(object({…}))</code> | | <code title="{ landing-ew1 = { adv = { default = false custom = ["rfc_1918_10", "rfc_1918_172", "rfc_1918_192"] } session_range = null } landing-ew4 = { adv = { default = false custom = ["rfc_1918_10", "rfc_1918_172", "rfc_1918_192"] } session_range = null } dev-ew1 = { adv = { default = false custom = ["gcp_dev"] } session_range = "169.254.0.0/27" } prod-ew1 = { adv = { default = false custom = ["gcp_prod"] } session_range = "169.254.0.64/27" } prod-ew4 = { adv = { default = false custom = ["gcp_prod"] } session_range = "169.254.0.96/27" } }">{…}</code> | |
|
||||||
|
|
||||||
## Outputs
|
## Outputs
|
||||||
|
|
||||||
|
|
|
@ -5,7 +5,7 @@ ingress-allow-composer-nodes:
|
||||||
direction: INGRESS
|
direction: INGRESS
|
||||||
action: allow
|
action: allow
|
||||||
sources: []
|
sources: []
|
||||||
ranges: []
|
ranges: ["0.0.0.0/0"]
|
||||||
targets:
|
targets:
|
||||||
- composer-worker
|
- composer-worker
|
||||||
use_service_accounts: false
|
use_service_accounts: false
|
||||||
|
@ -18,7 +18,7 @@ ingress-allow-dataflow-load:
|
||||||
direction: INGRESS
|
direction: INGRESS
|
||||||
action: allow
|
action: allow
|
||||||
sources: []
|
sources: []
|
||||||
ranges: []
|
ranges: ["0.0.0.0/0"]
|
||||||
targets:
|
targets:
|
||||||
- dataflow
|
- dataflow
|
||||||
use_service_accounts: false
|
use_service_accounts: false
|
||||||
|
|
|
@ -20,11 +20,11 @@
|
||||||
|
|
||||||
module "dev-dns-private-zone" {
|
module "dev-dns-private-zone" {
|
||||||
source = "../../../modules/dns"
|
source = "../../../modules/dns"
|
||||||
project_id = module.landing-project.project_id
|
project_id = module.dev-spoke-project.project_id
|
||||||
type = "private"
|
type = "private"
|
||||||
name = "dev-gcp-example-com"
|
name = "dev-gcp-example-com"
|
||||||
domain = "dev.gcp.example.com."
|
domain = "dev.gcp.example.com."
|
||||||
client_networks = [module.dev-spoke-vpc.self_link]
|
client_networks = [module.landing-vpc.self_link]
|
||||||
recordsets = {
|
recordsets = {
|
||||||
"A localhost" = { type = "A", ttl = 300, records = ["127.0.0.1"] }
|
"A localhost" = { type = "A", ttl = 300, records = ["127.0.0.1"] }
|
||||||
}
|
}
|
||||||
|
|
|
@ -50,28 +50,6 @@ module "gcp-example-dns-private-zone" {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
# GCP-specific DNS zones peered to the environment spoke that holds the config
|
|
||||||
|
|
||||||
module "prod-gcp-example-dns-peering" {
|
|
||||||
source = "../../../modules/dns"
|
|
||||||
project_id = module.landing-project.project_id
|
|
||||||
type = "peering"
|
|
||||||
name = "prod-root-dns-peering"
|
|
||||||
domain = "prod.gcp.example.com."
|
|
||||||
client_networks = [module.landing-vpc.self_link]
|
|
||||||
peer_network = module.prod-spoke-vpc.self_link
|
|
||||||
}
|
|
||||||
|
|
||||||
module "dev-gcp-example-dns-peering" {
|
|
||||||
source = "../../../modules/dns"
|
|
||||||
project_id = module.landing-project.project_id
|
|
||||||
type = "peering"
|
|
||||||
name = "dev-root-dns-peering"
|
|
||||||
domain = "dev.gcp.example.com."
|
|
||||||
client_networks = [module.landing-vpc.self_link]
|
|
||||||
peer_network = module.dev-spoke-vpc.self_link
|
|
||||||
}
|
|
||||||
|
|
||||||
# Google API zone to trigger Private Access
|
# Google API zone to trigger Private Access
|
||||||
|
|
||||||
module "googleapis-private-zone" {
|
module "googleapis-private-zone" {
|
||||||
|
|
|
@ -20,11 +20,11 @@
|
||||||
|
|
||||||
module "prod-dns-private-zone" {
|
module "prod-dns-private-zone" {
|
||||||
source = "../../../modules/dns"
|
source = "../../../modules/dns"
|
||||||
project_id = module.landing-project.project_id
|
project_id = module.prod-spoke-project.project_id
|
||||||
type = "private"
|
type = "private"
|
||||||
name = "prod-gcp-example-com"
|
name = "prod-gcp-example-com"
|
||||||
domain = "prod.gcp.example.com."
|
domain = "prod.gcp.example.com."
|
||||||
client_networks = [module.prod-spoke-vpc.self_link]
|
client_networks = [module.landing-vpc.self_link]
|
||||||
recordsets = {
|
recordsets = {
|
||||||
"A localhost" = { type = "A", ttl = 300, records = ["127.0.0.1"] }
|
"A localhost" = { type = "A", ttl = 300, records = ["127.0.0.1"] }
|
||||||
}
|
}
|
||||||
|
|
|
@ -17,19 +17,6 @@
|
||||||
# tfdoc:file:description Networking folder and hierarchical policy.
|
# tfdoc:file:description Networking folder and hierarchical policy.
|
||||||
|
|
||||||
locals {
|
locals {
|
||||||
# define the structures used for BGP peers in the VPN resources
|
|
||||||
bgp_peer_options = {
|
|
||||||
for k, v in var.vpn_spoke_configs :
|
|
||||||
k => v.adv == null ? null : {
|
|
||||||
advertise_groups = []
|
|
||||||
advertise_ip_ranges = {
|
|
||||||
for adv in(v.adv == null ? [] : v.adv.custom) :
|
|
||||||
var.custom_adv[adv] => adv
|
|
||||||
}
|
|
||||||
advertise_mode = try(v.adv.default, false) ? "DEFAULT" : "CUSTOM"
|
|
||||||
route_priority = null
|
|
||||||
}
|
|
||||||
}
|
|
||||||
custom_roles = coalesce(var.custom_roles, {})
|
custom_roles = coalesce(var.custom_roles, {})
|
||||||
l7ilb_subnets = {
|
l7ilb_subnets = {
|
||||||
for env, v in var.l7ilb_subnets : env => [
|
for env, v in var.l7ilb_subnets : env => [
|
||||||
|
|
|
@ -76,9 +76,9 @@ output "shared_vpc_self_links" {
|
||||||
|
|
||||||
output "vpn_gateway_endpoints" {
|
output "vpn_gateway_endpoints" {
|
||||||
description = "External IP Addresses for the GCP VPN gateways."
|
description = "External IP Addresses for the GCP VPN gateways."
|
||||||
value = {
|
value = local.enable_onprem_vpn == false ? null : {
|
||||||
onprem-ew1 = {
|
onprem-ew1 = {
|
||||||
for v in module.landing-to-onprem-ew1-vpn.gateway.vpn_interfaces :
|
for v in module.landing-to-onprem-ew1-vpn[0].gateway.vpn_interfaces :
|
||||||
v.id => v.ip_address
|
v.id => v.ip_address
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -0,0 +1,88 @@
|
||||||
|
/**
|
||||||
|
* Copyright 2022 Google LLC
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
|
||||||
|
variable "router_spoke_configs" {
|
||||||
|
description = "Configurations for routers used for internal connectivity."
|
||||||
|
type = map(object({
|
||||||
|
adv = object({
|
||||||
|
custom = list(string)
|
||||||
|
default = bool
|
||||||
|
})
|
||||||
|
asn = number
|
||||||
|
}))
|
||||||
|
default = {
|
||||||
|
landing-ew1 = { asn = "64512", adv = null }
|
||||||
|
landing-ew4 = { asn = "64512", adv = null }
|
||||||
|
spoke-dev-ew1 = { asn = "64513", adv = null }
|
||||||
|
spoke-dev-ew4 = { asn = "64513", adv = null }
|
||||||
|
spoke-prod-ew1 = { asn = "64514", adv = null }
|
||||||
|
spoke-prod-ew4 = { asn = "64514", adv = null }
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "vpn_spoke_configs" {
|
||||||
|
description = "VPN gateway configuration for spokes."
|
||||||
|
type = map(object({
|
||||||
|
adv = object({
|
||||||
|
default = bool
|
||||||
|
custom = list(string)
|
||||||
|
})
|
||||||
|
session_range = string
|
||||||
|
}))
|
||||||
|
default = {
|
||||||
|
landing-ew1 = {
|
||||||
|
adv = {
|
||||||
|
default = false
|
||||||
|
custom = ["rfc_1918_10", "rfc_1918_172", "rfc_1918_192"]
|
||||||
|
}
|
||||||
|
# values for the landing router are pulled from the spoke range
|
||||||
|
session_range = null
|
||||||
|
}
|
||||||
|
landing-ew4 = {
|
||||||
|
adv = {
|
||||||
|
default = false
|
||||||
|
custom = ["rfc_1918_10", "rfc_1918_172", "rfc_1918_192"]
|
||||||
|
}
|
||||||
|
# values for the landing router are pulled from the spoke range
|
||||||
|
session_range = null
|
||||||
|
}
|
||||||
|
dev-ew1 = {
|
||||||
|
adv = {
|
||||||
|
default = false
|
||||||
|
custom = ["gcp_dev"]
|
||||||
|
}
|
||||||
|
# resize according to required number of tunnels
|
||||||
|
session_range = "169.254.0.0/27"
|
||||||
|
}
|
||||||
|
prod-ew1 = {
|
||||||
|
adv = {
|
||||||
|
default = false
|
||||||
|
custom = ["gcp_prod"]
|
||||||
|
}
|
||||||
|
# resize according to required number of tunnels
|
||||||
|
session_range = "169.254.0.64/27"
|
||||||
|
}
|
||||||
|
prod-ew4 = {
|
||||||
|
adv = {
|
||||||
|
default = false
|
||||||
|
custom = ["gcp_prod"]
|
||||||
|
}
|
||||||
|
# resize according to required number of tunnels
|
||||||
|
session_range = "169.254.0.96/27"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
|
@ -133,8 +133,8 @@ variable "psa_ranges" {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "router_configs" {
|
variable "router_onprem_configs" {
|
||||||
description = "Configurations for CRs and onprem routers."
|
description = "Configurations for routers used for onprem connectivity."
|
||||||
type = map(object({
|
type = map(object({
|
||||||
adv = object({
|
adv = object({
|
||||||
custom = list(string)
|
custom = list(string)
|
||||||
|
@ -143,17 +143,11 @@ variable "router_configs" {
|
||||||
asn = number
|
asn = number
|
||||||
}))
|
}))
|
||||||
default = {
|
default = {
|
||||||
onprem-ew1 = {
|
landing-ew1 = {
|
||||||
asn = "65534"
|
asn = "65533"
|
||||||
adv = null
|
adv = null
|
||||||
# adv = { default = false, custom = [] }
|
# adv = { default = false, custom = [] }
|
||||||
}
|
}
|
||||||
landing-ew1 = { asn = "64512", adv = null }
|
|
||||||
landing-ew4 = { asn = "64512", adv = null }
|
|
||||||
spoke-dev-ew1 = { asn = "64513", adv = null }
|
|
||||||
spoke-dev-ew4 = { asn = "64513", adv = null }
|
|
||||||
spoke-prod-ew1 = { asn = "64514", adv = null }
|
|
||||||
spoke-prod-ew4 = { asn = "64514", adv = null }
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -224,56 +218,3 @@ variable "vpn_onprem_configs" {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "vpn_spoke_configs" {
|
|
||||||
description = "VPN gateway configuration for spokes."
|
|
||||||
type = map(object({
|
|
||||||
adv = object({
|
|
||||||
default = bool
|
|
||||||
custom = list(string)
|
|
||||||
})
|
|
||||||
session_range = string
|
|
||||||
}))
|
|
||||||
default = {
|
|
||||||
landing-ew1 = {
|
|
||||||
adv = {
|
|
||||||
default = false
|
|
||||||
custom = ["rfc_1918_10", "rfc_1918_172", "rfc_1918_192"]
|
|
||||||
}
|
|
||||||
# values for the landing router are pulled from the spoke range
|
|
||||||
session_range = null
|
|
||||||
}
|
|
||||||
landing-ew4 = {
|
|
||||||
adv = {
|
|
||||||
default = false
|
|
||||||
custom = ["rfc_1918_10", "rfc_1918_172", "rfc_1918_192"]
|
|
||||||
}
|
|
||||||
# values for the landing router are pulled from the spoke range
|
|
||||||
session_range = null
|
|
||||||
}
|
|
||||||
dev-ew1 = {
|
|
||||||
adv = {
|
|
||||||
default = false
|
|
||||||
custom = ["gcp_dev"]
|
|
||||||
}
|
|
||||||
# resize according to required number of tunnels
|
|
||||||
session_range = "169.254.0.0/27"
|
|
||||||
}
|
|
||||||
prod-ew1 = {
|
|
||||||
adv = {
|
|
||||||
default = false
|
|
||||||
custom = ["gcp_prod"]
|
|
||||||
}
|
|
||||||
# resize according to required number of tunnels
|
|
||||||
session_range = "169.254.0.64/27"
|
|
||||||
}
|
|
||||||
prod-ew4 = {
|
|
||||||
adv = {
|
|
||||||
default = false
|
|
||||||
custom = ["gcp_prod"]
|
|
||||||
}
|
|
||||||
# resize according to required number of tunnels
|
|
||||||
session_range = "169.254.0.96/27"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
|
@ -17,7 +17,8 @@
|
||||||
# tfdoc:file:description VPN between landing and onprem.
|
# tfdoc:file:description VPN between landing and onprem.
|
||||||
|
|
||||||
locals {
|
locals {
|
||||||
bgp_peer_options_onprem = {
|
enable_onprem_vpn = var.vpn_onprem_configs != null
|
||||||
|
bgp_peer_options_onprem = local.enable_onprem_vpn == false ? null : {
|
||||||
for k, v in var.vpn_onprem_configs :
|
for k, v in var.vpn_onprem_configs :
|
||||||
k => v.adv == null ? null : {
|
k => v.adv == null ? null : {
|
||||||
advertise_groups = []
|
advertise_groups = []
|
||||||
|
@ -32,6 +33,7 @@ locals {
|
||||||
}
|
}
|
||||||
|
|
||||||
module "landing-to-onprem-ew1-vpn" {
|
module "landing-to-onprem-ew1-vpn" {
|
||||||
|
count = local.enable_onprem_vpn ? 1 : 0
|
||||||
source = "../../../modules/net-vpn-ha"
|
source = "../../../modules/net-vpn-ha"
|
||||||
project_id = module.landing-project.project_id
|
project_id = module.landing-project.project_id
|
||||||
network = module.landing-vpc.self_link
|
network = module.landing-vpc.self_link
|
||||||
|
@ -39,7 +41,7 @@ module "landing-to-onprem-ew1-vpn" {
|
||||||
name = "vpn-to-onprem-ew1"
|
name = "vpn-to-onprem-ew1"
|
||||||
router_create = true
|
router_create = true
|
||||||
router_name = "landing-onprem-vpn-ew1"
|
router_name = "landing-onprem-vpn-ew1"
|
||||||
router_asn = var.router_configs.landing-ew1.asn
|
router_asn = var.router_onprem_configs.landing-ew1.asn
|
||||||
peer_external_gateway = var.vpn_onprem_configs.landing-ew1.peer_external_gateway
|
peer_external_gateway = var.vpn_onprem_configs.landing-ew1.peer_external_gateway
|
||||||
tunnels = {
|
tunnels = {
|
||||||
for t in var.vpn_onprem_configs.landing-ew1.tunnels :
|
for t in var.vpn_onprem_configs.landing-ew1.tunnels :
|
||||||
|
|
|
@ -16,6 +16,24 @@
|
||||||
|
|
||||||
# tfdoc:file:description VPN between landing and development spoke.
|
# tfdoc:file:description VPN between landing and development spoke.
|
||||||
|
|
||||||
|
locals {
|
||||||
|
# define the structures used for BGP peers in the VPN resources
|
||||||
|
vpn_spoke_bgp_peer_options = {
|
||||||
|
for k, v in var.vpn_spoke_configs :
|
||||||
|
k => v.adv == null ? null : {
|
||||||
|
advertise_groups = []
|
||||||
|
advertise_ip_ranges = {
|
||||||
|
for adv in(v.adv == null ? [] : v.adv.custom) :
|
||||||
|
var.custom_adv[adv] => adv
|
||||||
|
}
|
||||||
|
advertise_mode = try(v.adv.default, false) ? "DEFAULT" : "CUSTOM"
|
||||||
|
route_priority = null
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
# development spoke
|
||||||
|
|
||||||
module "landing-to-dev-ew1-vpn" {
|
module "landing-to-dev-ew1-vpn" {
|
||||||
source = "../../../modules/net-vpn-ha"
|
source = "../../../modules/net-vpn-ha"
|
||||||
project_id = module.landing-project.project_id
|
project_id = module.landing-project.project_id
|
||||||
|
@ -25,15 +43,17 @@ module "landing-to-dev-ew1-vpn" {
|
||||||
# The router used for this VPN is managed in vpn-prod.tf
|
# The router used for this VPN is managed in vpn-prod.tf
|
||||||
router_create = false
|
router_create = false
|
||||||
router_name = "landing-vpn-ew1"
|
router_name = "landing-vpn-ew1"
|
||||||
router_asn = var.router_configs.landing-ew1.asn
|
router_asn = var.router_spoke_configs.landing-ew1.asn
|
||||||
peer_gcp_gateway = module.dev-to-landing-ew1-vpn.self_link
|
peer_gcp_gateway = module.dev-to-landing-ew1-vpn.self_link
|
||||||
tunnels = { for t in range(2) : "tunnel-${t}" => {
|
tunnels = { for t in range(2) : "tunnel-${t}" => {
|
||||||
bgp_peer = {
|
bgp_peer = {
|
||||||
address = cidrhost(var.vpn_spoke_configs.dev-ew1.session_range, 1 + (t * 4))
|
address = cidrhost(var.vpn_spoke_configs.dev-ew1.session_range, 1 + (t * 4))
|
||||||
asn = var.router_configs.spoke-dev-ew1.asn
|
asn = var.router_spoke_configs.spoke-dev-ew1.asn
|
||||||
}
|
}
|
||||||
bgp_peer_options = local.bgp_peer_options["landing-ew1"]
|
bgp_peer_options = local.vpn_spoke_bgp_peer_options.landing-ew1
|
||||||
bgp_session_range = "${cidrhost(var.vpn_spoke_configs.dev-ew1.session_range, 2 + (t * 4))}/30"
|
bgp_session_range = "${cidrhost(
|
||||||
|
var.vpn_spoke_configs.dev-ew1.session_range, 2 + (t * 4)
|
||||||
|
)}/30"
|
||||||
ike_version = 2
|
ike_version = 2
|
||||||
peer_external_gateway_interface = null
|
peer_external_gateway_interface = null
|
||||||
router = null
|
router = null
|
||||||
|
@ -54,15 +74,17 @@ module "dev-to-landing-ew1-vpn" {
|
||||||
name = "vpn-to-landing-ew1"
|
name = "vpn-to-landing-ew1"
|
||||||
router_create = true
|
router_create = true
|
||||||
router_name = "dev-spoke-vpn-ew1"
|
router_name = "dev-spoke-vpn-ew1"
|
||||||
router_asn = var.router_configs.spoke-dev-ew1.asn
|
router_asn = var.router_spoke_configs.spoke-dev-ew1.asn
|
||||||
peer_gcp_gateway = module.landing-to-dev-ew1-vpn.self_link
|
peer_gcp_gateway = module.landing-to-dev-ew1-vpn.self_link
|
||||||
tunnels = { for t in range(2) : "tunnel-${t}" => {
|
tunnels = { for t in range(2) : "tunnel-${t}" => {
|
||||||
bgp_peer = {
|
bgp_peer = {
|
||||||
address = cidrhost(var.vpn_spoke_configs.dev-ew1.session_range, 2 + (t * 4))
|
address = cidrhost(var.vpn_spoke_configs.dev-ew1.session_range, 2 + (t * 4))
|
||||||
asn = var.router_configs.landing-ew1.asn
|
asn = var.router_spoke_configs.landing-ew1.asn
|
||||||
}
|
}
|
||||||
bgp_peer_options = local.bgp_peer_options["dev-ew1"]
|
bgp_peer_options = local.vpn_spoke_bgp_peer_options.dev-ew1
|
||||||
bgp_session_range = "${cidrhost(var.vpn_spoke_configs.dev-ew1.session_range, 1 + (t * 4))}/30"
|
bgp_session_range = "${cidrhost(
|
||||||
|
var.vpn_spoke_configs.dev-ew1.session_range, 1 + (t * 4)
|
||||||
|
)}/30"
|
||||||
ike_version = 2
|
ike_version = 2
|
||||||
peer_external_gateway_interface = null
|
peer_external_gateway_interface = null
|
||||||
router = null
|
router = null
|
||||||
|
|
|
@ -16,6 +16,8 @@
|
||||||
|
|
||||||
# tfdoc:file:description VPN between landing and production spoke.
|
# tfdoc:file:description VPN between landing and production spoke.
|
||||||
|
|
||||||
|
# local.vpn_spoke_bgp_peer_options is defined in the dev VPN file
|
||||||
|
|
||||||
module "landing-to-prod-ew1-vpn" {
|
module "landing-to-prod-ew1-vpn" {
|
||||||
source = "../../../modules/net-vpn-ha"
|
source = "../../../modules/net-vpn-ha"
|
||||||
project_id = module.landing-project.project_id
|
project_id = module.landing-project.project_id
|
||||||
|
@ -24,15 +26,19 @@ module "landing-to-prod-ew1-vpn" {
|
||||||
name = "vpn-to-prod-ew1"
|
name = "vpn-to-prod-ew1"
|
||||||
router_create = true
|
router_create = true
|
||||||
router_name = "landing-vpn-ew1"
|
router_name = "landing-vpn-ew1"
|
||||||
router_asn = var.router_configs.landing-ew1.asn
|
router_asn = var.router_spoke_configs.landing-ew1.asn
|
||||||
peer_gcp_gateway = module.prod-to-landing-ew1-vpn.self_link
|
peer_gcp_gateway = module.prod-to-landing-ew1-vpn.self_link
|
||||||
tunnels = { for t in range(2) : "tunnel-${t}" => {
|
tunnels = { for t in range(2) : "tunnel-${t}" => {
|
||||||
bgp_peer = {
|
bgp_peer = {
|
||||||
address = cidrhost(var.vpn_spoke_configs.prod-ew1.session_range, 1 + (t * 4))
|
address = cidrhost(
|
||||||
asn = var.router_configs.spoke-prod-ew1.asn
|
var.vpn_spoke_configs.prod-ew1.session_range, 1 + (t * 4)
|
||||||
|
)
|
||||||
|
asn = var.router_spoke_configs.spoke-prod-ew1.asn
|
||||||
}
|
}
|
||||||
bgp_peer_options = local.bgp_peer_options["landing-ew1"]
|
bgp_peer_options = local.vpn_spoke_bgp_peer_options.landing-ew1
|
||||||
bgp_session_range = "${cidrhost(var.vpn_spoke_configs.prod-ew1.session_range, 2 + (t * 4))}/30"
|
bgp_session_range = "${cidrhost(
|
||||||
|
var.vpn_spoke_configs.prod-ew1.session_range, 2 + (t * 4)
|
||||||
|
)}/30"
|
||||||
ike_version = 2
|
ike_version = 2
|
||||||
peer_external_gateway_interface = null
|
peer_external_gateway_interface = null
|
||||||
router = null
|
router = null
|
||||||
|
@ -50,15 +56,19 @@ module "prod-to-landing-ew1-vpn" {
|
||||||
name = "vpn-to-landing-ew1"
|
name = "vpn-to-landing-ew1"
|
||||||
router_create = true
|
router_create = true
|
||||||
router_name = "prod-spoke-vpn-ew1"
|
router_name = "prod-spoke-vpn-ew1"
|
||||||
router_asn = var.router_configs.spoke-prod-ew1.asn
|
router_asn = var.router_spoke_configs.spoke-prod-ew1.asn
|
||||||
peer_gcp_gateway = module.landing-to-prod-ew1-vpn.self_link
|
peer_gcp_gateway = module.landing-to-prod-ew1-vpn.self_link
|
||||||
tunnels = { for t in range(2) : "tunnel-${t}" => {
|
tunnels = { for t in range(2) : "tunnel-${t}" => {
|
||||||
bgp_peer = {
|
bgp_peer = {
|
||||||
address = cidrhost(var.vpn_spoke_configs.prod-ew1.session_range, 2 + (t * 4))
|
address = cidrhost(
|
||||||
asn = var.router_configs.landing-ew1.asn
|
var.vpn_spoke_configs.prod-ew1.session_range, 2 + (t * 4)
|
||||||
|
)
|
||||||
|
asn = var.router_spoke_configs.landing-ew1.asn
|
||||||
}
|
}
|
||||||
bgp_peer_options = local.bgp_peer_options["prod-ew1"]
|
bgp_peer_options = local.vpn_spoke_bgp_peer_options.prod-ew1
|
||||||
bgp_session_range = "${cidrhost(var.vpn_spoke_configs.prod-ew1.session_range, 1 + (t * 4))}/30"
|
bgp_session_range = "${cidrhost(
|
||||||
|
var.vpn_spoke_configs.prod-ew1.session_range, 1 + (t * 4)
|
||||||
|
)}/30"
|
||||||
ike_version = 2
|
ike_version = 2
|
||||||
peer_external_gateway_interface = null
|
peer_external_gateway_interface = null
|
||||||
router = null
|
router = null
|
||||||
|
@ -76,15 +86,19 @@ module "landing-to-prod-ew4-vpn" {
|
||||||
name = "vpn-to-prod-ew4"
|
name = "vpn-to-prod-ew4"
|
||||||
router_create = true
|
router_create = true
|
||||||
router_name = "landing-vpn-ew4"
|
router_name = "landing-vpn-ew4"
|
||||||
router_asn = var.router_configs.landing-ew4.asn
|
router_asn = var.router_spoke_configs.landing-ew4.asn
|
||||||
peer_gcp_gateway = module.prod-to-landing-ew4-vpn.self_link
|
peer_gcp_gateway = module.prod-to-landing-ew4-vpn.self_link
|
||||||
tunnels = { for t in range(2) : "tunnel-${t}" => {
|
tunnels = { for t in range(2) : "tunnel-${t}" => {
|
||||||
bgp_peer = {
|
bgp_peer = {
|
||||||
address = cidrhost(var.vpn_spoke_configs.prod-ew4.session_range, 1 + (t * 4))
|
address = cidrhost(
|
||||||
asn = var.router_configs.spoke-prod-ew4.asn
|
var.vpn_spoke_configs.prod-ew4.session_range, 1 + (t * 4)
|
||||||
|
)
|
||||||
|
asn = var.router_spoke_configs.spoke-prod-ew4.asn
|
||||||
}
|
}
|
||||||
bgp_peer_options = local.bgp_peer_options["landing-ew4"]
|
bgp_peer_options = local.vpn_spoke_bgp_peer_options.landing-ew4
|
||||||
bgp_session_range = "${cidrhost(var.vpn_spoke_configs.prod-ew4.session_range, 2 + (t * 4))}/30"
|
bgp_session_range = "${cidrhost(
|
||||||
|
var.vpn_spoke_configs.prod-ew4.session_range, 2 + (t * 4)
|
||||||
|
)}/30"
|
||||||
ike_version = 2
|
ike_version = 2
|
||||||
peer_external_gateway_interface = null
|
peer_external_gateway_interface = null
|
||||||
router = null
|
router = null
|
||||||
|
@ -102,15 +116,19 @@ module "prod-to-landing-ew4-vpn" {
|
||||||
name = "vpn-to-landing-ew4"
|
name = "vpn-to-landing-ew4"
|
||||||
router_create = true
|
router_create = true
|
||||||
router_name = "prod-spoke-vpn-ew4"
|
router_name = "prod-spoke-vpn-ew4"
|
||||||
router_asn = var.router_configs.spoke-prod-ew4.asn
|
router_asn = var.router_spoke_configs.spoke-prod-ew4.asn
|
||||||
peer_gcp_gateway = module.landing-to-prod-ew4-vpn.self_link
|
peer_gcp_gateway = module.landing-to-prod-ew4-vpn.self_link
|
||||||
tunnels = { for t in range(2) : "tunnel-${t}" => {
|
tunnels = { for t in range(2) : "tunnel-${t}" => {
|
||||||
bgp_peer = {
|
bgp_peer = {
|
||||||
address = cidrhost(var.vpn_spoke_configs.prod-ew4.session_range, 2 + (t * 4))
|
address = cidrhost(
|
||||||
asn = var.router_configs.landing-ew4.asn
|
var.vpn_spoke_configs.prod-ew4.session_range, 2 + (t * 4)
|
||||||
|
)
|
||||||
|
asn = var.router_spoke_configs.landing-ew4.asn
|
||||||
}
|
}
|
||||||
bgp_peer_options = local.bgp_peer_options["prod-ew4"]
|
bgp_peer_options = local.vpn_spoke_bgp_peer_options.prod-ew4
|
||||||
bgp_session_range = "${cidrhost(var.vpn_spoke_configs.prod-ew4.session_range, 1 + (t * 4))}/30"
|
bgp_session_range = "${cidrhost(
|
||||||
|
var.vpn_spoke_configs.prod-ew4.session_range, 1 + (t * 4)
|
||||||
|
)}/30"
|
||||||
ike_version = 2
|
ike_version = 2
|
||||||
peer_external_gateway_interface = null
|
peer_external_gateway_interface = null
|
||||||
router = null
|
router = null
|
||||||
|
|
|
@ -79,11 +79,14 @@ module "cos-coredns" {
|
||||||
| [coredns_config](variables.tf#L29) | CoreDNS configuration path, if null default will be used. | <code>string</code> | | <code>null</code> |
|
| [coredns_config](variables.tf#L29) | CoreDNS configuration path, if null default will be used. | <code>string</code> | | <code>null</code> |
|
||||||
| [file_defaults](variables.tf#L35) | Default owner and permissions for files. | <code title="object({ owner = string permissions = string })">object({…})</code> | | <code title="{ owner = "root" permissions = "0644" }">{…}</code> |
|
| [file_defaults](variables.tf#L35) | Default owner and permissions for files. | <code title="object({ owner = string permissions = string })">object({…})</code> | | <code title="{ owner = "root" permissions = "0644" }">{…}</code> |
|
||||||
| [files](variables.tf#L47) | Map of extra files to create on the instance, path as key. Owner and permissions will use defaults if null. | <code title="map(object({ content = string owner = string permissions = string }))">map(object({…}))</code> | | <code>{}</code> |
|
| [files](variables.tf#L47) | Map of extra files to create on the instance, path as key. Owner and permissions will use defaults if null. | <code title="map(object({ content = string owner = string permissions = string }))">map(object({…}))</code> | | <code>{}</code> |
|
||||||
|
| [test_instance](variables-instance.tf#L17) | Test/development instance attributes, leave null to skip creation. | <code title="object({ project_id = string zone = string name = string type = string network = string subnetwork = string })">object({…})</code> | | <code>null</code> |
|
||||||
|
| [test_instance_defaults](variables-instance.tf#L30) | Test/development instance defaults used for optional configuration. If image is null, COS stable will be used. | <code title="object({ disks = map(object({ read_only = bool size = number })) image = string metadata = map(string) nat = bool service_account_roles = list(string) tags = list(string) })">object({…})</code> | | <code title="{ disks = {} image = null metadata = {} nat = false service_account_roles = [ "roles/logging.logWriter", "roles/monitoring.metricWriter" ] tags = ["ssh"] }">{…}</code> |
|
||||||
|
|
||||||
## Outputs
|
## Outputs
|
||||||
|
|
||||||
| name | description | sensitive |
|
| name | description | sensitive |
|
||||||
|---|---|:---:|
|
|---|---|:---:|
|
||||||
| [cloud_config](outputs.tf#L17) | Rendered cloud-config file to be passed as user-data instance metadata. | |
|
| [cloud_config](outputs.tf#L17) | Rendered cloud-config file to be passed as user-data instance metadata. | |
|
||||||
|
| [test_instance](outputs-instance.tf#L17) | Optional test instance name and address. | |
|
||||||
|
|
||||||
<!-- END TFDOC -->
|
<!-- END TFDOC -->
|
||||||
|
|
|
@ -86,11 +86,14 @@ module "cos-mysql" {
|
||||||
| [kms_config](variables.tf#L35) | Optional KMS configuration to decrypt passed-in password. Leave null if a plaintext password is used. | <code title="object({ project_id = string keyring = string location = string key = string })">object({…})</code> | | <code>null</code> |
|
| [kms_config](variables.tf#L35) | Optional KMS configuration to decrypt passed-in password. Leave null if a plaintext password is used. | <code title="object({ project_id = string keyring = string location = string key = string })">object({…})</code> | | <code>null</code> |
|
||||||
| [mysql_config](variables.tf#L46) | MySQL configuration file content, if null container default will be used. | <code>string</code> | | <code>null</code> |
|
| [mysql_config](variables.tf#L46) | MySQL configuration file content, if null container default will be used. | <code>string</code> | | <code>null</code> |
|
||||||
| [mysql_data_disk](variables.tf#L52) | MySQL data disk name in /dev/disk/by-id/ including the google- prefix. If null the boot disk will be used for data. | <code>string</code> | | <code>null</code> |
|
| [mysql_data_disk](variables.tf#L52) | MySQL data disk name in /dev/disk/by-id/ including the google- prefix. If null the boot disk will be used for data. | <code>string</code> | | <code>null</code> |
|
||||||
|
| [test_instance](variables-instance.tf#L17) | Test/development instance attributes, leave null to skip creation. | <code title="object({ project_id = string zone = string name = string type = string network = string subnetwork = string })">object({…})</code> | | <code>null</code> |
|
||||||
|
| [test_instance_defaults](variables-instance.tf#L30) | Test/development instance defaults used for optional configuration. If image is null, COS stable will be used. | <code title="object({ disks = map(object({ read_only = bool size = number })) image = string metadata = map(string) nat = bool service_account_roles = list(string) tags = list(string) })">object({…})</code> | | <code title="{ disks = {} image = null metadata = {} nat = false service_account_roles = [ "roles/logging.logWriter", "roles/monitoring.metricWriter" ] tags = ["ssh"] }">{…}</code> |
|
||||||
|
|
||||||
## Outputs
|
## Outputs
|
||||||
|
|
||||||
| name | description | sensitive |
|
| name | description | sensitive |
|
||||||
|---|---|:---:|
|
|---|---|:---:|
|
||||||
| [cloud_config](outputs.tf#L17) | Rendered cloud-config file to be passed as user-data instance metadata. | |
|
| [cloud_config](outputs.tf#L17) | Rendered cloud-config file to be passed as user-data instance metadata. | |
|
||||||
|
| [test_instance](outputs-instance.tf#L17) | Optional test instance name and address. | |
|
||||||
|
|
||||||
<!-- END TFDOC -->
|
<!-- END TFDOC -->
|
||||||
|
|
|
@ -63,11 +63,14 @@ module "cos-nginx" {
|
||||||
| [files](variables.tf#L53) | Map of extra files to create on the instance, path as key. Owner and permissions will use defaults if null. | <code title="map(object({ content = string owner = string permissions = string }))">map(object({…}))</code> | | <code>{}</code> |
|
| [files](variables.tf#L53) | Map of extra files to create on the instance, path as key. Owner and permissions will use defaults if null. | <code title="map(object({ content = string owner = string permissions = string }))">map(object({…}))</code> | | <code>{}</code> |
|
||||||
| [image](variables.tf#L29) | Nginx container image. | <code>string</code> | | <code>"nginxdemos/hello:plain-text"</code> |
|
| [image](variables.tf#L29) | Nginx container image. | <code>string</code> | | <code>"nginxdemos/hello:plain-text"</code> |
|
||||||
| [nginx_config](variables.tf#L35) | Nginx configuration path, if null container default will be used. | <code>string</code> | | <code>null</code> |
|
| [nginx_config](variables.tf#L35) | Nginx configuration path, if null container default will be used. | <code>string</code> | | <code>null</code> |
|
||||||
|
| [test_instance](variables-instance.tf#L17) | Test/development instance attributes, leave null to skip creation. | <code title="object({ project_id = string zone = string name = string type = string network = string subnetwork = string })">object({…})</code> | | <code>null</code> |
|
||||||
|
| [test_instance_defaults](variables-instance.tf#L30) | Test/development instance defaults used for optional configuration. If image is null, COS stable will be used. | <code title="object({ disks = map(object({ read_only = bool size = number })) image = string metadata = map(string) nat = bool service_account_roles = list(string) tags = list(string) })">object({…})</code> | | <code title="{ disks = {} image = null metadata = {} nat = false service_account_roles = [ "roles/logging.logWriter", "roles/monitoring.metricWriter" ] tags = ["ssh"] }">{…}</code> |
|
||||||
|
|
||||||
## Outputs
|
## Outputs
|
||||||
|
|
||||||
| name | description | sensitive |
|
| name | description | sensitive |
|
||||||
|---|---|:---:|
|
|---|---|:---:|
|
||||||
| [cloud_config](outputs.tf#L17) | Rendered cloud-config file to be passed as user-data instance metadata. | |
|
| [cloud_config](outputs.tf#L17) | Rendered cloud-config file to be passed as user-data instance metadata. | |
|
||||||
|
| [test_instance](outputs-instance.tf#L17) | Optional test instance name and address. | |
|
||||||
|
|
||||||
<!-- END TFDOC -->
|
<!-- END TFDOC -->
|
||||||
|
|
|
@ -68,6 +68,8 @@ module "on-prem" {
|
||||||
| [config_variables](variables.tf#L17) | Additional variables used to render the cloud-config and CoreDNS templates. | <code>map(any)</code> | | <code>{}</code> |
|
| [config_variables](variables.tf#L17) | Additional variables used to render the cloud-config and CoreDNS templates. | <code>map(any)</code> | | <code>{}</code> |
|
||||||
| [coredns_config](variables.tf#L23) | CoreDNS configuration path, if null default will be used. | <code>string</code> | | <code>null</code> |
|
| [coredns_config](variables.tf#L23) | CoreDNS configuration path, if null default will be used. | <code>string</code> | | <code>null</code> |
|
||||||
| [local_ip_cidr_range](variables.tf#L29) | IP CIDR range used for the Docker onprem network. | <code>string</code> | | <code>"192.168.192.0/24"</code> |
|
| [local_ip_cidr_range](variables.tf#L29) | IP CIDR range used for the Docker onprem network. | <code>string</code> | | <code>"192.168.192.0/24"</code> |
|
||||||
|
| [test_instance](variables-instance.tf#L17) | Test/development instance attributes, leave null to skip creation. | <code title="object({ project_id = string zone = string name = string type = string network = string subnetwork = string })">object({…})</code> | | <code>null</code> |
|
||||||
|
| [test_instance_defaults](variables-instance.tf#L30) | Test/development instance defaults used for optional configuration. If image is null, COS stable will be used. | <code title="object({ disks = map(object({ read_only = bool size = number })) image = string metadata = map(string) nat = bool service_account_roles = list(string) tags = list(string) })">object({…})</code> | | <code title="{ disks = {} image = null metadata = {} nat = false service_account_roles = [ "roles/logging.logWriter", "roles/monitoring.metricWriter" ] tags = ["ssh"] }">{…}</code> |
|
||||||
| [vpn_dynamic_config](variables.tf#L46) | BGP configuration for dynamic VPN, ignored if VPN type is 'static'. | <code title="object({ local_bgp_asn = number local_bgp_address = string peer_bgp_asn = number peer_bgp_address = string local_bgp_asn2 = number local_bgp_address2 = string peer_bgp_asn2 = number peer_bgp_address2 = string })">object({…})</code> | | <code title="{ local_bgp_asn = 64514 local_bgp_address = "169.254.1.2" peer_bgp_asn = 64513 peer_bgp_address = "169.254.1.1" local_bgp_asn2 = 64514 local_bgp_address2 = "169.254.2.2" peer_bgp_asn2 = 64520 peer_bgp_address2 = "169.254.2.1" }">{…}</code> |
|
| [vpn_dynamic_config](variables.tf#L46) | BGP configuration for dynamic VPN, ignored if VPN type is 'static'. | <code title="object({ local_bgp_asn = number local_bgp_address = string peer_bgp_asn = number peer_bgp_address = string local_bgp_asn2 = number local_bgp_address2 = string peer_bgp_asn2 = number peer_bgp_address2 = string })">object({…})</code> | | <code title="{ local_bgp_asn = 64514 local_bgp_address = "169.254.1.2" peer_bgp_asn = 64513 peer_bgp_address = "169.254.1.1" local_bgp_asn2 = 64514 local_bgp_address2 = "169.254.2.2" peer_bgp_asn2 = 64520 peer_bgp_address2 = "169.254.2.1" }">{…}</code> |
|
||||||
| [vpn_static_ranges](variables.tf#L70) | Remote CIDR ranges for static VPN, ignored if VPN type is 'dynamic'. | <code>list(string)</code> | | <code>["10.0.0.0/8"]</code> |
|
| [vpn_static_ranges](variables.tf#L70) | Remote CIDR ranges for static VPN, ignored if VPN type is 'dynamic'. | <code>list(string)</code> | | <code>["10.0.0.0/8"]</code> |
|
||||||
|
|
||||||
|
@ -76,5 +78,6 @@ module "on-prem" {
|
||||||
| name | description | sensitive |
|
| name | description | sensitive |
|
||||||
|---|---|:---:|
|
|---|---|:---:|
|
||||||
| [cloud_config](outputs.tf#L17) | Rendered cloud-config file to be passed as user-data instance metadata. | |
|
| [cloud_config](outputs.tf#L17) | Rendered cloud-config file to be passed as user-data instance metadata. | |
|
||||||
|
| [test_instance](outputs-instance.tf#L17) | Optional test instance name and address. | |
|
||||||
|
|
||||||
<!-- END TFDOC -->
|
<!-- END TFDOC -->
|
||||||
|
|
|
@ -70,11 +70,14 @@ module "cos-squid" {
|
||||||
| [file_defaults](variables.tf#L35) | Default owner and permissions for files. | <code title="object({ owner = string permissions = string })">object({…})</code> | | <code title="{ owner = "root" permissions = "0644" }">{…}</code> |
|
| [file_defaults](variables.tf#L35) | Default owner and permissions for files. | <code title="object({ owner = string permissions = string })">object({…})</code> | | <code title="{ owner = "root" permissions = "0644" }">{…}</code> |
|
||||||
| [files](variables.tf#L47) | Map of extra files to create on the instance, path as key. Owner and permissions will use defaults if null. | <code title="map(object({ content = string owner = string permissions = string }))">map(object({…}))</code> | | <code>{}</code> |
|
| [files](variables.tf#L47) | Map of extra files to create on the instance, path as key. Owner and permissions will use defaults if null. | <code title="map(object({ content = string owner = string permissions = string }))">map(object({…}))</code> | | <code>{}</code> |
|
||||||
| [squid_config](variables.tf#L29) | Squid configuration path, if null default will be used. | <code>string</code> | | <code>null</code> |
|
| [squid_config](variables.tf#L29) | Squid configuration path, if null default will be used. | <code>string</code> | | <code>null</code> |
|
||||||
|
| [test_instance](variables-instance.tf#L17) | Test/development instance attributes, leave null to skip creation. | <code title="object({ project_id = string zone = string name = string type = string network = string subnetwork = string })">object({…})</code> | | <code>null</code> |
|
||||||
|
| [test_instance_defaults](variables-instance.tf#L30) | Test/development instance defaults used for optional configuration. If image is null, COS stable will be used. | <code title="object({ disks = map(object({ read_only = bool size = number })) image = string metadata = map(string) nat = bool service_account_roles = list(string) tags = list(string) })">object({…})</code> | | <code title="{ disks = {} image = null metadata = {} nat = false service_account_roles = [ "roles/logging.logWriter", "roles/monitoring.metricWriter" ] tags = ["ssh"] }">{…}</code> |
|
||||||
|
|
||||||
## Outputs
|
## Outputs
|
||||||
|
|
||||||
| name | description | sensitive |
|
| name | description | sensitive |
|
||||||
|---|---|:---:|
|
|---|---|:---:|
|
||||||
| [cloud_config](outputs.tf#L17) | Rendered cloud-config file to be passed as user-data instance metadata. | |
|
| [cloud_config](outputs.tf#L17) | Rendered cloud-config file to be passed as user-data instance metadata. | |
|
||||||
|
| [test_instance](outputs-instance.tf#L17) | Optional test instance name and address. | |
|
||||||
|
|
||||||
<!-- END TFDOC -->
|
<!-- END TFDOC -->
|
||||||
|
|
|
@ -124,14 +124,22 @@ resource "google_compute_firewall" "allow-tag-https" {
|
||||||
|
|
||||||
resource "google_compute_firewall" "custom-rules" {
|
resource "google_compute_firewall" "custom-rules" {
|
||||||
# provider = "google-beta"
|
# provider = "google-beta"
|
||||||
for_each = local.custom_rules
|
for_each = local.custom_rules
|
||||||
name = each.key
|
name = each.key
|
||||||
description = each.value.description
|
description = each.value.description
|
||||||
direction = each.value.direction
|
direction = each.value.direction
|
||||||
network = var.network
|
network = var.network
|
||||||
project = var.project_id
|
project = var.project_id
|
||||||
source_ranges = each.value.direction == "INGRESS" ? each.value.ranges : null
|
source_ranges = (
|
||||||
destination_ranges = each.value.direction == "EGRESS" ? each.value.ranges : null
|
each.value.direction == "INGRESS"
|
||||||
|
? coalesce(each.value.ranges, []) == [] ? ["0.0.0.0/0"] : each.value.ranges
|
||||||
|
: null
|
||||||
|
)
|
||||||
|
destination_ranges = (
|
||||||
|
each.value.direction == "EGRESS"
|
||||||
|
? coalesce(each.value.ranges, []) == [] ? ["0.0.0.0/0"] : each.value.ranges
|
||||||
|
: null
|
||||||
|
)
|
||||||
source_tags = each.value.use_service_accounts || each.value.direction == "EGRESS" ? null : each.value.sources
|
source_tags = each.value.use_service_accounts || each.value.direction == "EGRESS" ? null : each.value.sources
|
||||||
source_service_accounts = each.value.use_service_accounts && each.value.direction == "INGRESS" ? each.value.sources : null
|
source_service_accounts = each.value.use_service_accounts && each.value.direction == "INGRESS" ? each.value.sources : null
|
||||||
target_tags = each.value.use_service_accounts ? null : each.value.targets
|
target_tags = each.value.use_service_accounts ? null : each.value.targets
|
||||||
|
|
|
@ -0,0 +1,13 @@
|
||||||
|
# Copyright 2022 Google LLC
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
|
@ -0,0 +1,44 @@
|
||||||
|
/**
|
||||||
|
* Copyright 2022 Google LLC
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
module "stage" {
|
||||||
|
source = "../../../../../fast/stages/02-networking-peering"
|
||||||
|
data_dir = "../../../../../fast/stages/02-networking-peering/data/"
|
||||||
|
billing_account = {
|
||||||
|
id = "000000-111111-222222"
|
||||||
|
organization_id = 123456789012
|
||||||
|
}
|
||||||
|
custom_roles = {
|
||||||
|
service_project_network_admin = "organizations/123456789012/roles/foo"
|
||||||
|
}
|
||||||
|
folder_ids = {
|
||||||
|
networking = null
|
||||||
|
networking-dev = null
|
||||||
|
networking-prod = null
|
||||||
|
}
|
||||||
|
service_accounts = {
|
||||||
|
data-platform-dev = "string"
|
||||||
|
data-platform-prod = "string"
|
||||||
|
project-factory-dev = "string"
|
||||||
|
project-factory-prod = "string"
|
||||||
|
}
|
||||||
|
organization = {
|
||||||
|
domain = "fast.example.com"
|
||||||
|
id = 123456789012
|
||||||
|
customer_id = "C00000000"
|
||||||
|
}
|
||||||
|
prefix = "fast2"
|
||||||
|
}
|
|
@ -0,0 +1,20 @@
|
||||||
|
# Copyright 2022 Google LLC
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
|
||||||
|
def test_counts(fast_e2e_plan_runner):
|
||||||
|
"Test stage."
|
||||||
|
num_modules, num_resources, _ = fast_e2e_plan_runner()
|
||||||
|
# TODO: to re-enable per-module resource count check print _, then test
|
||||||
|
assert num_modules > 0 and num_resources > 0
|
|
@ -14,22 +14,6 @@
|
||||||
* limitations under the License.
|
* limitations under the License.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
# module "stage" {
|
|
||||||
# source = "../../../../../fast/stages/02-networking-vpn"
|
|
||||||
# billing_account_id = "000000-111111-222222"
|
|
||||||
# organization = {
|
|
||||||
# domain = "gcp-pso-italy.net"
|
|
||||||
# id = 856933387836
|
|
||||||
# customer_id = "C01lmug8b"
|
|
||||||
# }
|
|
||||||
# prefix = "fast"
|
|
||||||
# project_factory_sa = {
|
|
||||||
# dev = "foo@iam"
|
|
||||||
# prod = "bar@iam"
|
|
||||||
# }
|
|
||||||
# data_dir = "../../../../../fast/stages/02-networking-vpn/data/"
|
|
||||||
# }
|
|
||||||
|
|
||||||
module "stage" {
|
module "stage" {
|
||||||
source = "../../../../../fast/stages/02-networking-vpn"
|
source = "../../../../../fast/stages/02-networking-vpn"
|
||||||
data_dir = "../../../../../fast/stages/02-networking-vpn/data/"
|
data_dir = "../../../../../fast/stages/02-networking-vpn/data/"
|
||||||
|
|
|
@ -79,11 +79,15 @@ def main(dirs, exclude_file=None, files=False, show_diffs=False,
|
||||||
for mod_name, state, diff in _check_dir(dir_name, exclude_file, files,
|
for mod_name, state, diff in _check_dir(dir_name, exclude_file, files,
|
||||||
show_extra):
|
show_extra):
|
||||||
if state == State.FAIL:
|
if state == State.FAIL:
|
||||||
errors.append(diff)
|
errors.append((mod_name, diff))
|
||||||
print(f'[{state_labels[state]}] {mod_name}')
|
print(f'[{state_labels[state]}] {mod_name}')
|
||||||
if errors:
|
if errors:
|
||||||
if show_diffs:
|
if show_diffs:
|
||||||
print('\n'.join(errors))
|
print('Errored diffs:')
|
||||||
|
print('\n'.join([e[1] for e in errors]))
|
||||||
|
else:
|
||||||
|
print('Errored modules:')
|
||||||
|
print('\n'.join([e[0] for e in errors]))
|
||||||
raise SystemExit('Errors found.')
|
raise SystemExit('Errors found.')
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -100,10 +100,11 @@ VAR_RE_TYPE = re.compile(r'([\(\{\}\)])')
|
||||||
VAR_TEMPLATE = ('default', 'description', 'type', 'nullable')
|
VAR_TEMPLATE = ('default', 'description', 'type', 'nullable')
|
||||||
|
|
||||||
File = collections.namedtuple('File', 'name description modules resources')
|
File = collections.namedtuple('File', 'name description modules resources')
|
||||||
Output = collections.namedtuple('Output',
|
Output = collections.namedtuple(
|
||||||
'name description sensitive consumers line')
|
'Output', 'name description sensitive consumers file line')
|
||||||
Variable = collections.namedtuple(
|
Variable = collections.namedtuple(
|
||||||
'Variable', 'name description type default required nullable source line')
|
'Variable',
|
||||||
|
'name description type default required nullable source file line')
|
||||||
|
|
||||||
# parsing functions
|
# parsing functions
|
||||||
|
|
||||||
|
@ -171,41 +172,52 @@ def parse_files(basepath, exclude_files=None):
|
||||||
yield File(shortname, description, modules, resources)
|
yield File(shortname, description, modules, resources)
|
||||||
|
|
||||||
|
|
||||||
def parse_outputs(basepath):
|
def parse_outputs(basepath, exclude_files=None):
|
||||||
'Return a list of Output named tuples for root module outputs.tf.'
|
'Return a list of Output named tuples for root module outputs*.tf.'
|
||||||
try:
|
exclude_files = exclude_files or []
|
||||||
with open(os.path.join(basepath, 'outputs.tf')) as file:
|
for name in glob.glob(os.path.join(basepath, 'outputs*tf')):
|
||||||
body = file.read()
|
shortname = os.path.basename(name)
|
||||||
except (IOError, OSError) as e:
|
if shortname in exclude_files:
|
||||||
raise SystemExit(f'No outputs file in {basepath}.')
|
continue
|
||||||
for item in _parse(body, enum=OUT_ENUM, re=OUT_RE, template=OUT_TEMPLATE):
|
try:
|
||||||
description = ''.join(item['description'])
|
with open(name) as file:
|
||||||
sensitive = item['sensitive'] != []
|
body = file.read()
|
||||||
consumers = item['tags'].get('output:consumers', '')
|
except (IOError, OSError) as e:
|
||||||
yield Output(name=item['name'], description=description,
|
raise SystemExit(f'Cannot open outputs file {shortname}.')
|
||||||
sensitive=sensitive, consumers=consumers, line=item['line'])
|
for item in _parse(body, enum=OUT_ENUM, re=OUT_RE, template=OUT_TEMPLATE):
|
||||||
|
description = ''.join(item['description'])
|
||||||
|
sensitive = item['sensitive'] != []
|
||||||
|
consumers = item['tags'].get('output:consumers', '')
|
||||||
|
yield Output(name=item['name'], description=description,
|
||||||
|
sensitive=sensitive, consumers=consumers, file=shortname,
|
||||||
|
line=item['line'])
|
||||||
|
|
||||||
|
|
||||||
def parse_variables(basepath):
|
def parse_variables(basepath, exclude_files=None):
|
||||||
'Return a list of Output named tuples for root module variables.tf.'
|
'Return a list of Variable named tuples for root module variables*.tf.'
|
||||||
try:
|
exclude_files = exclude_files or []
|
||||||
with open(os.path.join(basepath, 'variables.tf')) as file:
|
for name in glob.glob(os.path.join(basepath, 'variables*tf')):
|
||||||
body = file.read()
|
shortname = os.path.basename(name)
|
||||||
except (IOError, OSError) as e:
|
if shortname in exclude_files:
|
||||||
raise SystemExit(f'No variables file in {basepath}.')
|
continue
|
||||||
for item in _parse(body):
|
try:
|
||||||
description = ''.join(item['description'])
|
with open(name) as file:
|
||||||
vtype = '\n'.join(item['type'])
|
body = file.read()
|
||||||
default = HEREDOC_RE.sub(r'\1', '\n'.join(item['default']))
|
except (IOError, OSError) as e:
|
||||||
required = not item['default']
|
raise SystemExit(f'Cannot open variables file {shortname}.')
|
||||||
nullable = item.get('nullable') != ['false']
|
for item in _parse(body):
|
||||||
source = item['tags'].get('variable:source', '')
|
description = ''.join(item['description'])
|
||||||
if not required and default != 'null' and vtype == 'string':
|
vtype = '\n'.join(item['type'])
|
||||||
default = f'"{default}"'
|
default = HEREDOC_RE.sub(r'\1', '\n'.join(item['default']))
|
||||||
|
required = not item['default']
|
||||||
|
nullable = item.get('nullable') != ['false']
|
||||||
|
source = item['tags'].get('variable:source', '')
|
||||||
|
if not required and default != 'null' and vtype == 'string':
|
||||||
|
default = f'"{default}"'
|
||||||
|
|
||||||
yield Variable(name=item['name'], description=description, type=vtype,
|
yield Variable(name=item['name'], description=description, type=vtype,
|
||||||
default=default, required=required, source=source,
|
default=default, required=required, source=source,
|
||||||
line=item['line'], nullable=nullable)
|
file=shortname, line=item['line'], nullable=nullable)
|
||||||
|
|
||||||
|
|
||||||
# formatting functions
|
# formatting functions
|
||||||
|
@ -268,7 +280,7 @@ def format_outputs(items, show_extra=True):
|
||||||
if consumers:
|
if consumers:
|
||||||
consumers = '<code>%s</code>' % '</code> · <code>'.join(consumers.split())
|
consumers = '<code>%s</code>' % '</code> · <code>'.join(consumers.split())
|
||||||
sensitive = '✓' if i.sensitive else ''
|
sensitive = '✓' if i.sensitive else ''
|
||||||
format = f'| [{i.name}](outputs.tf#L{i.line}) | {i.description or ""} | {sensitive} |'
|
format = f'| [{i.name}]({i.file}#L{i.line}) | {i.description or ""} | {sensitive} |'
|
||||||
format += f' {consumers} |' if show_extra else ''
|
format += f' {consumers} |' if show_extra else ''
|
||||||
yield format
|
yield format
|
||||||
|
|
||||||
|
@ -301,7 +313,7 @@ def format_variables(items, show_extra=True):
|
||||||
value = f'{value[0]}…{value[-1].strip()}'
|
value = f'{value[0]}…{value[-1].strip()}'
|
||||||
vars[k] = f'<code title="{_escape(title)}">{_escape(value)}</code>'
|
vars[k] = f'<code title="{_escape(title)}">{_escape(value)}</code>'
|
||||||
format = (
|
format = (
|
||||||
f'| [{i.name}](variables.tf#L{i.line}) | {i.description or ""} | {vars["type"]} '
|
f'| [{i.name}]({i.file}#L{i.line}) | {i.description or ""} | {vars["type"]} '
|
||||||
f'| {vars["required"]} | {vars["default"]} |')
|
f'| {vars["required"]} | {vars["default"]} |')
|
||||||
format += f' {vars["source"]} |' if show_extra else ''
|
format += f' {vars["source"]} |' if show_extra else ''
|
||||||
yield format
|
yield format
|
||||||
|
@ -342,8 +354,8 @@ def create_doc(module_path, files=False, show_extra=False, exclude_files=None,
|
||||||
show_extra = opts.get('show_extra', show_extra)
|
show_extra = opts.get('show_extra', show_extra)
|
||||||
try:
|
try:
|
||||||
mod_files = list(parse_files(module_path, exclude_files)) if files else []
|
mod_files = list(parse_files(module_path, exclude_files)) if files else []
|
||||||
mod_variables = list(parse_variables(module_path))
|
mod_variables = list(parse_variables(module_path, exclude_files))
|
||||||
mod_outputs = list(parse_outputs(module_path))
|
mod_outputs = list(parse_outputs(module_path, exclude_files))
|
||||||
except (IOError, OSError) as e:
|
except (IOError, OSError) as e:
|
||||||
raise SystemExit(e)
|
raise SystemExit(e)
|
||||||
return format_doc(mod_outputs, mod_variables, mod_files, show_extra)
|
return format_doc(mod_outputs, mod_variables, mod_files, show_extra)
|
||||||
|
|
Loading…
Reference in New Issue