The purpose of this step is to set up top level shared folders, monitoring & networking projects, org level logging and set baseline security settings through organizational policy.
- 0-bootstrap executed successfully.
- Cloud Identity / G Suite group for security admins
- Membership in the security admins group for user running terraform
Disclaimer: This step enables Data Access logs for all services in your organization.
Enabling Data Access logs might result in your project being charged for the additional logs usage.
For details on costs you might incur, go to Pricing.
You can choose not to enable the Data Access logs by setting variable data_access_logs_enabled
to false.
Note: This module creates sink to export all logs to Google Storage. It's also create sinks to export a subset of security related logs
to Bigquery and Pub/Sub. This will result in additional charges for those copies of logs.
You can change the filters & sinks by modifying the configuration in envs/shared/log_sinks.tf
.
Note: Currently, this module does not enable bucket policy retention for organization logs, please, enable it if needed.
- Clone repo
gcloud source repos clone gcp-org --project=YOUR_CLOUD_BUILD_PROJECT_ID
(this is from terraform output from the previous section, 0-bootstrap). - Navigate into the repo
cd gcp-org
and change to a non production branchgit checkout -b plan
- Copy contents of foundation to new repo
cp -RT ../terraform-example-foundation/1-org/ .
(modify accordingly based on your current directory). - Copy cloud build configuration files for terraform
cp ../terraform-example-foundation/build/cloudbuild-tf-* .
(modify accordingly based on your current directory). - Copy terraform wrapper script
cp ../terraform-example-foundation/build/tf-wrapper.sh .
to the root of your new repository (modify accordingly based on your current directory). - Ensure wrapper script can be executed
chmod 755 ./tf-wrapper.sh
. - Check if your organization already has a Access Context Manager Policy
gcloud access-context-manager policies list --organization YOUR-ORGANIZATION_ID --format="value(name)"
. - Rename
./envs/shared/terraform.example.tfvars
to./envs/shared/terraform.tfvars
and update the file with values from your environment and bootstrap (you can re-runterraform output
in the 0-bootstrap directory to find these values). Make sure thatdefault_region
is set to a valid BigQuery dataset region. Also if the previous step showed a numeric value, make sure to un-comment the variablecreate_access_context_manager_access_policy = false
. - Commit changes with
git add .
andgit commit -m 'Your message'
- Push your plan branch to trigger a plan
git push --set-upstream origin plan
(the branchplan
is not a special one. Any branch which name is different fromdevelopment
,non-production
orproduction
will trigger a terraform plan).- Review the plan output in your cloud build project https://console.cloud.google.com/cloud-build/builds?project=YOUR_CLOUD_BUILD_PROJECT_ID
- Merge changes to production branch with
git checkout -b production
andgit push origin production
- Review the apply output in your cloud build project https://console.cloud.google.com/cloud-build/builds?project=YOUR_CLOUD_BUILD_PROJECT_ID
-
Clone the repo you created manually in bootstrap:
git clone <YOUR_NEW_REPO-1-org>
-
Navigate into the repo
cd YOUR_NEW_REPO_CLONE-1-org
and change to a non production branchgit checkout -b plan
-
Copy contents of foundation to new repo
cp -RT ../terraform-example-foundation/1-org/ .
(modify accordingly based on your current directory). -
Copy the Jenkinsfile script
cp ../terraform-example-foundation/build/Jenkinsfile .
to the root of your new repository (modify accordingly based on your current directory). -
Update the variables located in the
environment {}
section of theJenkinsfile
with values from your environment:_POLICY_REPO (optional) _TF_SA_EMAIL _STATE_BUCKET_NAME
-
Copy terraform wrapper script
cp ../terraform-example-foundation/build/tf-wrapper.sh .
to the root of your new repository (modify accordingly based on your current directory). -
Ensure wrapper script can be executed
chmod 755 ./tf-wrapper.sh
. -
Check if your organization already has a Access Context Manager Policy
gcloud access-context-manager policies list --organization YOUR-ORGANIZATION_ID --format="value(name)"
. -
Rename
./envs/shared/terraform.example.tfvars
to./envs/shared/terraform.tfvars
and update the file with values from your environment and bootstrap (you can re-runterraform output
in the 0-bootstrap directory to find these values). Make sure thatdefault_region
is set to a valid BigQuery dataset region. Also if the previous step showed a numeric value, make sure to un-comment the variablecreate_access_context_manager_access_policy = false
. -
Commit changes with
git add .
andgit commit -m 'Your message'
-
Push your plan branch
git push --set-upstream origin plan
. The branchplan
is not a special one. Any branch which name is different fromdevelopment
,non-production
orproduction
will trigger a terraform plan.- Assuming you configured an automatic trigger in your Jenkins Master (see Jenkins sub-module README), this will trigger a plan. You can also trigger a Jenkins job manually. Given the many options to do this in Jenkins, it is out of the scope of this document see Jenkins website for more details.
- Review the plan output in your Master's web UI.
-
Merge changes to production branch with
git checkout -b production
andgit push origin production
- Review the apply output in your Master's web UI (You might want to use the option to "Scan Multibranch Pipeline Now" in your Jenkins Master UI).
-
You can now move to the instructions in the step 2-environments.
- Change into 1-org folder.
- Run
cp ../build/tf-wrapper.sh .
- Run
chmod 755 ./tf-wrapper.sh
- Change into 1-org/envs/shared/ folder.
- Rename terraform.example.tfvars to terraform.tfvars and update the file with values from your environment and bootstrap.
- Update backend.tf with your bucket from bootstrap. You can run
for i in `find -name 'backend.tf'`; do sed -i 's/UPDATE_ME/<YOUR-BUCKET-NAME>/' $i; done
. You can runterraform output gcs_bucket_tfstate
in the 0-bootstap folder to obtain the bucket name.
We will now deploy our environment (production) using this script. When using Cloud Build or Jenkins as your CI/CD tool each environment corresponds to a branch is the repository for 1-org step and only the corresponding environment is applied.
- Run
./tf-wrapper.sh init production
- Run
./tf-wrapper.sh plan production
and review output. - Run
./tf-wrapper.sh apply production
If you received any errors or made any changes to the Terraform config or terraform.tfvars
you must re-run ./tf-wrapper.sh plan production
before run ./tf-wrapper.sh apply production