The purpose of this step is to set up base and restricted shared VPCs with default DNS, NAT (optional), Private Service networking, VPC service controls, onprem Dedicated Interconnect, onprem VPN and baseline firewall rules for environment development.
- 0-bootstrap executed successfully.
- 1-org executed successfully.
- 2-environments/envs/development executed successfully.
- 3-networks-dual-svpc/envs/shared executed successfully.
- Obtain the value for the access_context_manager_policy_id variable. Can be obtained by running
gcloud access-context-manager policies list --organization YOUR_ORGANIZATION_ID --format="value(name)"
.
Name | Description | Type | Default | Required |
---|---|---|---|---|
access_context_manager_policy_id | The id of the default Access Context Manager policy created in step 1-org . Can be obtained by running gcloud access-context-manager policies list --organization YOUR_ORGANIZATION_ID --format="value(name)" . |
number |
n/a | yes |
domain | The DNS name of peering managed zone, for instance 'example.com.'. Must end with a period. | string |
n/a | yes |
egress_policies | A list of all egress policies, each list object has a from and to value that describes egress_from and egress_to.Example: [{ from={ identities=[], identity_type="ID_TYPE" }, to={ resources=[], operations={ "SRV_NAME"={ OP_TYPE=[] }}}}] Valid Values: ID_TYPE = null or IDENTITY_TYPE_UNSPECIFIED (only allow indentities from list); ANY_IDENTITY ; ANY_USER_ACCOUNT ; ANY_SERVICE_ACCOUNT SRV_NAME = "* " (allow all services) or Specific ServicesOP_TYPE = methods or permissions |
list(object({ |
[] |
no |
ingress_policies | A list of all ingress policies, each list object has a from and to value that describes ingress_from and ingress_to.Example: [{ from={ sources={ resources=[], access_levels=[] }, identities=[], identity_type="ID_TYPE" }, to={ resources=[], operations={ "SRV_NAME"={ OP_TYPE=[] }}}}] Valid Values: ID_TYPE = null or IDENTITY_TYPE_UNSPECIFIED (only allow indentities from list); ANY_IDENTITY ; ANY_USER_ACCOUNT ; ANY_SERVICE_ACCOUNT SRV_NAME = "* " (allow all services) or Specific ServicesOP_TYPE = methods or permissions |
list(object({ |
[] |
no |
perimeter_additional_members | The list of additional members to be added to the perimeter access level members list. To be able to see the resources protected by the VPC Service Controls in the restricted perimeter, add your user in this list. Entries must be in the standard GCP form: user:[email protected] or serviceAccount:[email protected] . |
list(string) |
n/a | yes |
remote_state_bucket | Backend bucket to load Terraform Remote State Data from previous steps. | string |
n/a | yes |
Name | Description |
---|---|
access_context_manager_policy_id | Access Context Manager Policy ID. |
base_host_project_id | The base host project ID |
base_network_name | The name of the VPC being created |
base_network_self_link | The URI of the VPC being created |
base_subnets_ips | The IPs and CIDRs of the subnets being created |
base_subnets_names | The names of the subnets being created |
base_subnets_secondary_ranges | The secondary ranges associated with these subnets |
base_subnets_self_links | The self-links of subnets being created |
restricted_access_level_name | Access context manager access level name |
restricted_host_project_id | The restricted host project ID |
restricted_network_name | The name of the VPC being created |
restricted_network_self_link | The URI of the VPC being created |
restricted_service_perimeter_name | Access context manager service perimeter name |
restricted_subnets_ips | The IPs and CIDRs of the subnets being created |
restricted_subnets_names | The names of the subnets being created |
restricted_subnets_secondary_ranges | The secondary ranges associated with these subnets |
restricted_subnets_self_links | The self-links of subnets being created |