cloud-foundation-fabric/modules
Ludovico Magnocavallo d9f7cef1e7
allow using a separate resource for boot disk (#1496)
2023-07-07 15:40:13 +00:00
..
__experimental allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
alloydb-instance allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
api-gateway allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
apigee allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
artifact-registry allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
bigquery-dataset allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
bigtable-instance allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
billing-budget allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
binauthz allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
cloud-config-container allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
cloud-dataplex allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
cloud-function-v1 allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
cloud-function-v2 allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
cloud-identity-group allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
cloud-run allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
cloudsql-instance allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
compute-mig allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
compute-vm allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
container-registry allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
data-catalog-policy-tag allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
datafusion allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
dataproc allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
dns allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
dns-response-policy allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
endpoints allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
folder allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
gcs allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
gke-cluster-autopilot allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
gke-cluster-standard allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
gke-hub allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
gke-nodepool allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
iam-service-account allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
kms allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
logging-bucket allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
ncc-spoke-ra allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
net-address allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
net-cloudnat allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
net-ipsec-over-interconnect allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
net-lb-app-ext allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
net-lb-app-int allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
net-lb-ext allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
net-lb-int allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
net-vlan-attachment allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
net-vpc allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
net-vpc-firewall allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
net-vpc-firewall-policy allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
net-vpc-peering allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
net-vpc-swp allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
net-vpn-dynamic allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
net-vpn-ha allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
net-vpn-static allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
organization allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
project allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
projects-data-source allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
pubsub allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
secret-manager allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
service-directory allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
source-repository allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
vpc-sc allow using a separate resource for boot disk (#1496) 2023-07-07 15:40:13 +00:00
README.md Rename network load balancer modules (#1466) 2023-06-26 07:50:10 +00:00

README.md

Terraform modules suite for Google Cloud

The modules collected in this folder are designed as a suite: they are meant to be composed together, and are designed to be forked and modified where use of third party code and sources is not allowed.

Modules try to stay close to the low level provider resources they encapsulate, and they all share a similar interface that combines management of one resource or set or resources, and the corresponding IAM bindings.

Authoritative IAM bindings are primarily used (e.g. google_storage_bucket_iam_binding for GCS buckets) so that each module is authoritative for specific roles on the resources it manages, and can neutralize or reconcile IAM changes made elsewhere.

Specific modules also offer support for non-authoritative bindings (e.g. google_storage_bucket_iam_member for service accounts), to allow granular permission management on resources that they don't manage directly.

These modules are not necessarily backward compatible. Changes breaking compatibility in modules are marked by major releases (but not all major releases contain breaking changes). Please be mindful when upgrading Fabric modules in existing Terraform setups, and always try to use versioned references in module sources so you can easily revert back to a previous version. Since the introduction of the moved block in Terraform we try to use it whenever possible to make updates non-breaking, but that does not cover all changes we might need to make.

These modules are used in the examples included in this repository. If you are using any of those examples in your own Terraform configuration, make sure that you are using the same version for all the modules, and switch module sources to GitHub format using references. The recommended approach to working with Fabric modules is the following:

  • Fork the repository and own the fork. This will allow you to:

    • Evolve the existing modules.
    • Create your own modules.
    • Sync from the upstream repository to get all the updates.
  • Use GitHub sources with refs to reference the modules. See an example below:

    module "project" {
        source              = "github.com/GoogleCloudPlatform/cloud-foundation-fabric//modules/project?ref=v13.0.0"
        name                = "my-project"
        billing_account     = "123456-123456-123456"
        parent              = "organizations/123456"
    }
    

Foundational modules

Networking modules

Compute/Container

Data

Development

Security

Serverless