cloud-foundation-fabric/networking
Simone Ruffilli d9b05e5633
Update README.md - fixed broken link
2021-12-02 15:27:08 +01:00
..
decentralized-firewall Updated diagram and documentation for decentralized firewall. 2021-11-17 11:41:21 +01:00
filtering-proxy Allow using gVNIC in compute-vm (#211) 2021-11-08 11:18:15 +00:00
hub-and-spoke-peering Allow using gVNIC in compute-vm (#211) 2021-11-08 11:18:15 +00:00
hub-and-spoke-vpn Allow using gVNIC in compute-vm (#211) 2021-11-08 11:18:15 +00:00
ilb-next-hop Allow using gVNIC in compute-vm (#211) 2021-11-08 11:18:15 +00:00
onprem-google-access-dns Update README.md - fixed broken link 2021-12-02 15:27:08 +01:00
private-cloud-function-from-onprem Allow using gVNIC in compute-vm (#211) 2021-11-08 11:18:15 +00:00
shared-vpc-gke Allow using gVNIC in compute-vm (#211) 2021-11-08 11:18:15 +00:00
README.md minor fixed to readme 2021-07-26 22:45:52 +02:00

README.md

Networking and infrastructure examples

The examples in this folder implement typical network topologies like hub and spoke, or end-to-end scenarios that allow testing specific features like on-premises DNS policies and Private Google Access.

They are meant to be used as minimal but complete starting points to create actual infrastructure, and as playgrounds to experiment with specific Google Cloud features.

Examples

Hub and Spoke via Peering

This example implements a hub and spoke topology via VPC peering, a common design where a landing zone VPC (hub) is conncted to on-premises, and then peered with satellite VPCs (spokes) to further partition the infrastructure.

The sample highlights the lack of transitivity in peering: the absence of connectivity between spokes, and the need create workarounds for private service access to managed services. One such workarund is shown for private GKE, allowing access from hub and all spokes to GKE masters via a dedicated VPN.

Hub and Spoke via Dynamic VPN

This example implements a hub and spoke topology via dynamic VPN tunnels, a common design where peering cannot be used due to limitations on the number of spokes or connectivity to managed services.

The example shows how to implement spoke transitivity via BGP advertisements, how to expose hub DNS zones to spokes via DNS peering, and allows easy testing of different VPN and BGP configurations.

DNS and Private Access for On-premises

This example uses an emulated on-premises environment running in Docker containers inside a GCE instance, to allow testing specific features like DNS policies, DNS forwarding zones across VPN, and Private Access for On-premises hosts.

The emulated on-premises environment can be used to test access to different services from outside Google Cloud, by implementing a VPN connection and BGP to Google CLoud via Strongswan and Bird.

Shared VPC with GKE and per-subnet support

This example shows how to configure a Shared VPC, including the specific IAM configurations needed for GKE, and to give different level of access to the VPC subnets to different identities.

It is meant to be used as a starting point for most Shared VPC configurations, and to be integrated to the above examples where Shared VPC is needed in more complex network topologies.

ILB as next hop

This example allows testing ILB as next hop using simple Linux gateway VMS between two VPCs, to emulate virtual appliances. An optional additional ILB can be enabled to test multiple load balancer configurations and hashing.

Calling a private Cloud Function from On-premises

This example shows how to invoke a private Google Cloud Function from the on-prem environment via a Private Service Connect endpoint.

Decentralized firewall management

This example shows how a decentralized firewall management can be organized using firewall-yaml module.