You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: 0-bootstrap/README.md
+3-4Lines changed: 3 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -66,8 +66,7 @@ installed:
66
66
-[Terraform](https://www.terraform.io/downloads.html) version 0.13.7.
67
67
- An existing project which the user has access to be used by terraform-validator.
68
68
69
-
**Note:** Make sure that you use the same version of Terraform throughout this
70
-
series. Otherwise, you might experience Terraform state snapshot lock errors.
69
+
**Note:** Make sure that you use the same version of Terraform throughout this series. Otherwise, you might experience Terraform state snapshot lock errors.
71
70
72
71
Also make sure that you've done the following:
73
72
@@ -78,7 +77,7 @@ Also make sure that you've done the following:
78
77
1. Created Cloud Identity or Google Workspace (formerly G Suite) groups for
79
78
organization and billing admins.
80
79
1. Added the user who will use Terraform to the `group_org_admins` group.
81
-
They must be in this group or they won't have
80
+
They must be in this group, or they won't have
82
81
`roles/resourcemanager.projectCreator` access.
83
82
1. For the user who will run the procedures in this document, granted the
84
83
following roles:
@@ -89,7 +88,7 @@ Also make sure that you've done the following:
89
88
90
89
If other users need to be able to run these procedures, add them to the group
91
90
represented by the `org_project_creators` variable.
92
-
For more information about the permissions that are required and the resources
91
+
For more information about the permissions that are required, and the resources
93
92
that are created, see the organization bootstrap module
Copy file name to clipboardExpand all lines: 1-org/README.md
+2-3Lines changed: 2 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,8 +64,7 @@ The purpose of this step is to set up top-level shared folders, monitoring and n
64
64
4. Security Command Center notifications require that you choose a Security Command Center tier and create and grant permissions for the Security Command Center service account as outlined in [Setting up Security Command Center](https://cloud.google.com/security-command-center/docs/quickstart-security-command-center)
65
65
5. Ensure that you have requested for sufficient projects quota, as the Terraform scripts will create multiple projects from this point onwards. For more information, please [see the FAQ](https://github.com/terraform-google-modules/terraform-example-foundation/blob/master/docs/FAQ.md).
66
66
67
-
**Note:** Make sure that you use the same version of Terraform throughout this
68
-
series, otherwise you might experience Terraform state snapshot lock errors.
67
+
**Note:** Make sure that you use the same version of Terraform throughout this series, otherwise you might experience Terraform state snapshot lock errors.
69
68
70
69
### Troubleshooting
71
70
@@ -253,7 +252,7 @@ to run the command as the Terraform service account.
253
252
1. Run `chmod 755 ./tf-wrapper.sh`
254
253
1. Change into 1-org/envs/shared/ folder.
255
254
1. Rename `terraform.example.tfvars` to `terraform.tfvars` and update the file with values from your environment and bootstrap.
256
-
1. Obtain your bucket name by running the following command in the 0-bootstap folder.
255
+
1. Obtain your bucket name by running the following command in the 0-bootstrap folder.
Copy file name to clipboardExpand all lines: 2-environments/README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -201,7 +201,7 @@ Please refer to [troubleshooting](../docs/TROUBLESHOOTING.md) if you run into is
201
201
```
202
202
for i in `find -name 'backend.tf'`; do sed -i 's/UPDATE_ME/<YOUR-BUCKET-NAME>/' $i; done
203
203
```
204
-
You can run `terraform output gcs_bucket_tfstate` in the 0-bootstap folder to obtain the bucket name.
204
+
You can run `terraform output gcs_bucket_tfstate` in the 0-bootstrap folder to obtain the bucket name.
205
205
206
206
We will now deploy each of our environments(development/production/non-production) using this script.
207
207
When using Cloud Build or Jenkins as your CI/CD tool each environment corresponds to a branch is the repository for 2-environments step and only the corresponding environment is applied.
Copy file name to clipboardExpand all lines: 3-networks/README.md
+7-3Lines changed: 7 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -66,9 +66,13 @@ The purpose of this step is to:
66
66
1. 2-environments executed successfully.
67
67
1. Obtain the value for the access_context_manager_policy_id variable. Can be obtained by running
68
68
69
-
```
70
-
gcloud access-context-manager policies list --organization YOUR_ORGANIZATION_ID --format="value(name)"
71
-
```
69
+
```bash
70
+
gcloud access-context-manager policies list --organization YOUR_ORGANIZATION_ID --format="value(name)"
71
+
```
72
+
73
+
1. For the manual step described in this document, you need [Terraform](https://www.terraform.io/downloads.html) version 0.13.7 to be installed.
74
+
75
+
**Note:** Make sure that you use the same version of Terraform throughout this series. Otherwise, you might experience Terraform state snapshot lock errors.
Copy file name to clipboardExpand all lines: 4-projects/README.md
+26-19Lines changed: 26 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -67,36 +67,43 @@ This pipeline can be utilized for deploying resources in projects across develop
67
67
1. 2-environments executed successfully.
68
68
1. 3-networks executed successfully.
69
69
1. Obtain the value for the `access_context_manager_policy_id` variable.
70
-
```
70
+
71
+
```bash
71
72
gcloud access-context-manager policies list --organization YOUR_ORGANIZATION_ID --format="value(name)"
72
73
```
74
+
75
+
1. For the manual step described in this document, you need [Terraform](https://www.terraform.io/downloads.html) version 0.13.7 to be installed.
76
+
77
+
**Note:** Make sure that you use the same version of Terraform throughout this series. Otherwise, you might experience Terraform state snapshot lock errors.
78
+
73
79
1. Obtain the values for the `perimeter_name` for each environment variable.
74
-
```
80
+
81
+
```bash
75
82
gcloud access-context-manager perimeters list --policy ACCESS_CONTEXT_MANAGER_POLICY_ID --format="value(name)"
76
83
```
77
84
78
-
**Note:** If you have more than one service perimeter for each environment, you can also get the values from the `restricted_service_perimeter_name` output from each of the`3-networks` environments.
85
+
**Note:** If you have more than one service perimeter for each environment, you can also get the values from the `restricted_service_perimeter_name` output from each of the`3-networks` environments.
79
86
80
-
If you are using Cloud Build you can also search for the values in the outputs from the build logs:
87
+
If you are using Cloud Build you can also search for the values in the outputs from the build logs:
81
88
82
-
```console
83
-
gcloud builds list \
84
-
--project=YOUR_CLOUD_BUILD_PROJECT_ID \
85
-
--filter="status=SUCCESS \
86
-
AND source.repoSource.repoName=gcp-networks \
87
-
AND substitutions.BRANCH_NAME=development" \
88
-
--format="value(id)"
89
-
```
89
+
```console
90
+
gcloud builds list \
91
+
--project=YOUR_CLOUD_BUILD_PROJECT_ID \
92
+
--filter="status=SUCCESS \
93
+
AND source.repoSource.repoName=gcp-networks \
94
+
AND substitutions.BRANCH_NAME=development" \
95
+
--format="value(id)"
96
+
```
90
97
91
-
Use the result of this command as the `BUILD_ID` value in the next command:
98
+
Use the result of this command as the `BUILD_ID` value in the next command:
92
99
93
-
```console
94
-
gcloud builds log BUILD_ID \
95
-
--project=YOUR_CLOUD_BUILD_PROJECT_ID | \
96
-
grep "restricted_service_perimeter_name = "
97
-
```
100
+
```console
101
+
gcloud builds log BUILD_ID \
102
+
--project=YOUR_CLOUD_BUILD_PROJECT_ID | \
103
+
grep "restricted_service_perimeter_name = "
104
+
```
98
105
99
-
Change the `BRANCH_NAME` from `development` to `non-production` or `production` for the other two service perimeters.
106
+
Change the `BRANCH_NAME` from `development` to `non-production` or `production` for the other two service perimeters.
0 commit comments