cloud-foundation-fabric/blueprints/cloud-operations
Julio Castillo f8208670e2 Fix variable cf_version validation 2022-10-20 19:12:57 +02:00
..
adfs Refactor net-vpc module for Terraform 1.3 (#880) 2022-10-14 11:02:33 +02:00
asset-inventory-feed-remediation Refactor net-vpc module for Terraform 1.3 (#880) 2022-10-14 11:02:33 +02:00
dns-fine-grained-iam Refactor net-vpc module for Terraform 1.3 (#880) 2022-10-14 11:02:33 +02:00
dns-shared-vpc Refactor net-vpc module for Terraform 1.3 (#880) 2022-10-14 11:02:33 +02:00
glb_and_armor Refactor net-vpc module for Terraform 1.3 (#880) 2022-10-14 11:02:33 +02:00
iam-delegated-role-grants Refactor GKE nodepool and blueprints (#875) 2022-10-12 12:59:36 +02:00
network-dashboard Fix variable cf_version validation 2022-10-20 19:12:57 +02:00
onprem-sa-key-management Refactor GKE nodepool and blueprints (#875) 2022-10-12 12:59:36 +02:00
packer-image-builder Refactor net-vpc module for Terraform 1.3 (#880) 2022-10-14 11:02:33 +02:00
quota-monitoring Refactor GKE nodepool and blueprints (#875) 2022-10-12 12:59:36 +02:00
scheduled-asset-inventory-export-bq Refactor GKE nodepool and blueprints (#875) 2022-10-12 12:59:36 +02:00
unmanaged-instances-healthcheck Refactor net-vpc module for Terraform 1.3 (#880) 2022-10-14 11:02:33 +02:00
vm-migration Refactor net-vpc module for Terraform 1.3 (#880) 2022-10-14 11:02:33 +02:00
workload-identity-federation More updates 2 2022-09-09 16:40:37 +02:00
README.md More updates 2 2022-09-09 16:40:37 +02:00

README.md

Operations blueprints

The blueprints in this folder show how to wire together different Google Cloud services to simplify operations, and are meant for testing, or as minimal but sufficiently complete starting points for actual use.

Resource tracking and remediation via Cloud Asset feeds

This blueprint shows how to leverage Cloud Asset Inventory feeds to stream resource changes in real time, and how to programmatically use the feed change notifications for alerting or remediation, via a Cloud Function wired to the feed PubSub queue.

The blueprint's feed tracks changes to Google Compute instances, and the Cloud Function enforces policy compliance on each change so that tags match a set of simple rules. The obvious use case is when instance tags are used to scope firewall rules, but the blueprint can easily be adapted to suit different use cases.


Scheduled Cloud Asset Inventory Export to Bigquery

This blueprint shows how to leverage the Cloud Asset Inventory Exporting to Bigquery feature, to keep track of your organization's assets over time storing information in Bigquery. Data stored in Bigquery can then be used for different purposes like dashboarding or analysis.


Granular Cloud DNS IAM via Service Directory

This blueprint shows how to leverage Service Directory and Cloud DNS Service Directory private zones, to implement fine-grained IAM controls on DNS. The blueprint creates a Service Directory namespace, a Cloud DNS private zone that uses it as its authoritative source, service accounts with different levels of permissions, and VMs to test them.


Granular Cloud DNS IAM for Shared VPC

This blueprint shows how to create reusable and modular Cloud DNS architectures, by provisioning dedicated Cloud DNS instances for application teams that want to manage their own DNS records, and configuring DNS peering to ensure name resolution works in a common Shared VPC.


Compute Engine quota monitoring

This blueprint shows a practical way of collecting and monitoring Compute Engine resource quotas via Cloud Monitoring metrics as an alternative to the recently released built-in quota metrics. A simple alert on quota thresholds is also part of the blueprint.


Delegated Role Grants

This blueprint shows how to use delegated role grants to restrict service usage.


Packer image builder

This blueprint shows how to deploy infrastructure for a Compute Engine image builder based on Hashicorp's Packer tool.


On-prem Service Account key management

This blueprint shows how to manage IAM Service Account Keys by manually generating a key pair and uploading the public part of the key to GCP.


Migrate for Compute Engine (v5)

This set of blueprints shows how to deploy Migrate for Compute Engine (v5) on top of existing Cloud Foundations on different scenarios. An blueprint on how to deploy the M4CE connector on VMWare ESXi is also part of the blueprints.


TCP healthcheck for unmanaged GCE instances

This blueprint shows how to leverage Serverless VPC Access and Cloud Functions to organize a highly performant TCP healtheck for unmanaged GCE instances.