cloud-foundation-fabric/modules
Julio Castillo 89525bed95 Add Cloud SQL module to READMEs 2021-10-07 21:52:22 +02:00
..
__experimental/net-neg Update copyright to 2021 2021-02-15 09:38:10 +01:00
apigee-organization Update CI processes (#296) 2021-08-12 17:30:53 +02:00
apigee-x-instance Update CI processes (#296) 2021-08-12 17:30:53 +02:00
artifact-registry Update copyright to 2021 2021-02-15 09:38:10 +01:00
bigquery-dataset Add deletion_protection to bigquery module 2021-06-01 18:36:53 +02:00
bigtable-instance Update CI processes (#296) 2021-08-12 17:30:53 +02:00
billing-budget Create email notification channels automatically 2021-08-13 12:02:46 +02:00
cloud-config-container Update CI processes (#296) 2021-08-12 17:30:53 +02:00
cloud-function Update CI processes (#296) 2021-08-12 17:30:53 +02:00
cloud-identity-group fix modules version constraints (#206) 2021-03-05 08:41:59 +01:00
cloudsql-instance README and test fixes 2021-10-07 21:50:16 +02:00
compute-mig Refactor compute-vm to remove multiple instance support (#314) 2021-10-04 10:46:44 +02:00
compute-vm Refactor compute-vm to remove multiple instance support (#314) 2021-10-04 10:46:44 +02:00
container-registry Update copyright to 2021 2021-02-15 09:38:10 +01:00
datafusion Update CI processes (#296) 2021-08-12 17:30:53 +02:00
dns Make dns module resilient to dynamic values (#317) 2021-10-04 18:59:14 +02:00
endpoints Update CI processes (#296) 2021-08-12 17:30:53 +02:00
folder Add support for group-based IAM to resource management modules (#229) 2021-04-11 14:48:16 +02:00
folders-unit Update CI processes (#296) 2021-08-12 17:30:53 +02:00
gcs Update CI processes (#296) 2021-08-12 17:30:53 +02:00
gke-cluster Autopilot support 2021-06-28 00:54:14 +02:00
gke-nodepool Update CI processes (#296) 2021-08-12 17:30:53 +02:00
iam-service-account Compute service account email statically 2021-08-10 10:50:44 +02:00
kms Update CI processes (#296) 2021-08-12 17:30:53 +02:00
logging-bucket Support for cloud logging buckets 2021-03-03 14:23:59 +01:00
naming-convention Naming convention module (#318) 2021-10-05 12:21:12 +02:00
net-address Simplify new CF from onprem via PSC example (#280) 2021-07-20 15:05:48 +02:00
net-cloudnat Update copyright to 2021 2021-02-15 09:38:10 +01:00
net-ilb Update README.md 2021-10-05 08:22:07 +02:00
net-interconnect-attachment-direct module for VLAN attachment+cloud router+bgp (#254) 2021-06-16 13:56:40 +02:00
net-vpc Always output project_id from net-vpc 2021-10-06 18:21:04 +02:00
net-vpc-firewall Remove redundant variable `admin_ranges_enabled` 2021-10-04 14:12:00 +02:00
net-vpc-firewall-yaml Fix firewall-yaml readme 2021-07-29 11:54:26 +02:00
net-vpc-peering Update copyright to 2021 2021-02-15 09:38:10 +01:00
net-vpn-dynamic Add support for per-tunnel routers to VPN dynamic and HA (#202) 2021-03-02 07:36:06 +01:00
net-vpn-ha Update CI processes (#296) 2021-08-12 17:30:53 +02:00
net-vpn-static Update copyright to 2021 2021-02-15 09:38:10 +01:00
organization Output role information from organization module 2021-09-13 17:36:21 +02:00
project Update CI processes (#296) 2021-08-12 17:30:53 +02:00
pubsub Update CI processes (#296) 2021-08-12 17:30:53 +02:00
secret-manager Update CI processes (#296) 2021-08-12 17:30:53 +02:00
service-directory Update copyright to 2021 2021-02-15 09:38:10 +01:00
source-repository Update copyright to 2021 2021-02-15 09:38:10 +01:00
vpc-sc Update README.md 2021-09-14 15:12:06 +02:00
README.md Add Cloud SQL module to READMEs 2021-10-07 21:52:22 +02:00

README.md

Terraform modules suite for Google Cloud

The modules collected in this folder are designed as a suite: they are meant to be composed together, and are designed to be forked and modified where use of third party code and sources is not allowed.

Modules try to stay close to the low level provider resources they encapsulate, and they all share a similar interface that combines management of one resource or set or resources, and the corresponding IAM bindings.

Authoritative IAM bindings are primarily used (e.g. google_storage_bucket_iam_binding for GCS buckets) so that each module is authoritative for specific roles on the resources it manages, and can neutralize or reconcile IAM changes made elsewhere.

Specific modules also offer support for non-authoritative bindings (e.g. google_storage_bucket_iam_member for service accounts), to allow granular permission management on resources that they don't manage directly.

Foundational modules

Networking modules

Compute/Container

Data

Development

Security

Serverless