cloud-foundation-fabric/modules
Carlo Maria Valla befbd190a3
Cloud SQL activation policy selectable (#1613)
* Update main.tf

added activation policy

* Update variables.tf

added activation_policy variable defaulted as ALWAYS for non regression

* corrections requested by @juliocc

* Regeneration of README.md on cloudsql-instance mod

* terraform fmt changes

* bug correctionand activation_policy on replicas

* activation_policy description change and README.md

* Bug correction
2023-08-25 12:12:08 +02:00
..
__docs
__experimental
alloydb-instance
api-gateway
apigee Fix tests 2023-08-24 20:09:23 +02:00
artifact-registry
bigquery-dataset
bigtable-instance
billing-budget
binauthz
cloud-config-container
cloud-function-v1
cloud-function-v2
cloud-identity-group
cloud-run
cloudsql-instance Cloud SQL activation policy selectable (#1613) 2023-08-25 12:12:08 +02:00
compute-mig
compute-vm
container-registry
data-catalog-policy-tag
datafusion
dataplex
dataplex-datascan
dataproc
dns
dns-response-policy
endpoints
folder
gcs
gcve-private-cloud
gke-cluster-autopilot
gke-cluster-standard
gke-hub
gke-nodepool
iam-service-account
kms
logging-bucket
ncc-spoke-ra Moved allow_net_admin to enable_features flag. Bumped provider version to 4.76 2023-08-07 14:27:20 +01:00
net-address
net-cloudnat
net-firewall-policy readme update 2023-08-24 20:01:47 +10:00
net-ipsec-over-interconnect
net-lb-app-ext
net-lb-app-int
net-lb-ext
net-lb-int
net-lb-proxy-int
net-swp
net-vlan-attachment
net-vpc
net-vpc-firewall
net-vpc-peering
net-vpn-dynamic
net-vpn-ha
net-vpn-static
organization
project
projects-data-source
pubsub
secret-manager
service-directory
source-repository
vpc-sc
README.md

README.md

Terraform modules suite for Google Cloud

The modules collected in this folder are designed as a suite: they are meant to be composed together, and are designed to be forked and modified where use of third party code and sources is not allowed.

Modules try to stay close to the low level provider resources they encapsulate, and they all share a similar interface that combines management of one resource or set or resources, and the corresponding IAM bindings.

Authoritative IAM bindings are primarily used (e.g. google_storage_bucket_iam_binding for GCS buckets) so that each module is authoritative for specific roles on the resources it manages, and can neutralize or reconcile IAM changes made elsewhere.

Specific modules also offer support for non-authoritative bindings (e.g. google_storage_bucket_iam_member for service accounts), to allow granular permission management on resources that they don't manage directly.

These modules are not necessarily backward compatible. Changes breaking compatibility in modules are marked by major releases (but not all major releases contain breaking changes). Please be mindful when upgrading Fabric modules in existing Terraform setups, and always try to use versioned references in module sources so you can easily revert back to a previous version. Since the introduction of the moved block in Terraform we try to use it whenever possible to make updates non-breaking, but that does not cover all changes we might need to make.

These modules are used in the examples included in this repository. If you are using any of those examples in your own Terraform configuration, make sure that you are using the same version for all the modules, and switch module sources to GitHub format using references. The recommended approach to working with Fabric modules is the following:

  • Fork the repository and own the fork. This will allow you to:

    • Evolve the existing modules.
    • Create your own modules.
    • Sync from the upstream repository to get all the updates.
  • Use GitHub sources with refs to reference the modules. See an example below:

    module "project" {
        source              = "github.com/GoogleCloudPlatform/cloud-foundation-fabric//modules/project?ref=v13.0.0"
        name                = "my-project"
        billing_account     = "123456-123456-123456"
        parent              = "organizations/123456"
    }
    

Foundational modules

Networking modules

Compute/Container

Data

Development

Security

Serverless