diff --git a/network_management_vpc_flow_logs_config_interconnect_basic/backing_file.tf b/network_management_vpc_flow_logs_config_interconnect_basic/backing_file.tf new file mode 100644 index 00000000..c60b1199 --- /dev/null +++ b/network_management_vpc_flow_logs_config_interconnect_basic/backing_file.tf @@ -0,0 +1,15 @@ +# This file has some scaffolding to make sure that names are unique and that +# a region and zone are selected when you try to create your Terraform resources. + +locals { + name_suffix = "${random_pet.suffix.id}" +} + +resource "random_pet" "suffix" { + length = 2 +} + +provider "google" { + region = "us-central1" + zone = "us-central1-c" +} diff --git a/network_management_vpc_flow_logs_config_interconnect_basic/main.tf b/network_management_vpc_flow_logs_config_interconnect_basic/main.tf new file mode 100644 index 00000000..ac8c2e2f --- /dev/null +++ b/network_management_vpc_flow_logs_config_interconnect_basic/main.tf @@ -0,0 +1,29 @@ +data "google_project" "project" { +} + +resource "google_network_management_vpc_flow_logs_config" "interconnect-test" { + vpc_flow_logs_config_id = "basic-interconnect-test-id-${local.name_suffix}" + location = "global" + interconnect_attachment = "projects/${data.google_project.project.number}/regions/us-east4/interconnectAttachments/${google_compute_interconnect_attachment.attachment.name}" +} + +resource "google_compute_network" "network" { + name = "basic-interconnect-test-network-${local.name_suffix}" +} + +resource "google_compute_router" "router" { + name = "basic-interconnect-test-router-${local.name_suffix}" + network = google_compute_network.network.name + bgp { + asn = 16550 + } +} + +resource "google_compute_interconnect_attachment" "attachment" { + name = "basic-interconnect-test-id-${local.name_suffix}" + edge_availability_domain = "AVAILABILITY_DOMAIN_1" + type = "PARTNER" + router = google_compute_router.router.id + mtu = 1500 +} + diff --git a/network_management_vpc_flow_logs_config_interconnect_basic/motd b/network_management_vpc_flow_logs_config_interconnect_basic/motd new file mode 100644 index 00000000..45a906e8 --- /dev/null +++ b/network_management_vpc_flow_logs_config_interconnect_basic/motd @@ -0,0 +1,7 @@ +=== + +These examples use real resources that will be billed to the +Google Cloud Platform project you use - so make sure that you +run "terraform destroy" before quitting! + +=== diff --git a/network_management_vpc_flow_logs_config_interconnect_basic/tutorial.md b/network_management_vpc_flow_logs_config_interconnect_basic/tutorial.md new file mode 100644 index 00000000..69804cea --- /dev/null +++ b/network_management_vpc_flow_logs_config_interconnect_basic/tutorial.md @@ -0,0 +1,79 @@ +# Network Management Vpc Flow Logs Config Interconnect Basic - Terraform + +## Setup + + + +Welcome to Terraform in Google Cloud Shell! We need you to let us know what project you'd like to use with Terraform. + + + +Terraform provisions real GCP resources, so anything you create in this session will be billed against this project. + +## Terraforming! + +Let's use {{project-id}} with Terraform! Click the Cloud Shell icon below to copy the command +to your shell, and then run it from the shell by pressing Enter/Return. Terraform will pick up +the project name from the environment variable. + +```bash +export GOOGLE_CLOUD_PROJECT={{project-id}} +``` + +After that, let's get Terraform started. Run the following to pull in the providers. + +```bash +terraform init +``` + +With the providers downloaded and a project set, you're ready to use Terraform. Go ahead! + +```bash +terraform apply +``` + +Terraform will show you what it plans to do, and prompt you to accept. Type "yes" to accept the plan. + +```bash +yes +``` + + +## Post-Apply + +### Editing your config + +Now you've provisioned your resources in GCP! If you run a "plan", you should see no changes needed. + +```bash +terraform plan +``` + +So let's make a change! Try editing a number, or appending a value to the name in the editor. Then, +run a 'plan' again. + +```bash +terraform plan +``` + +Afterwards you can run an apply, which implicitly does a plan and shows you the intended changes +at the 'yes' prompt. + +```bash +terraform apply +``` + +```bash +yes +``` + +## Cleanup + +Run the following to remove the resources Terraform provisioned: + +```bash +terraform destroy +``` +```bash +yes +``` diff --git a/network_management_vpc_flow_logs_config_interconnect_full/backing_file.tf b/network_management_vpc_flow_logs_config_interconnect_full/backing_file.tf new file mode 100644 index 00000000..c60b1199 --- /dev/null +++ b/network_management_vpc_flow_logs_config_interconnect_full/backing_file.tf @@ -0,0 +1,15 @@ +# This file has some scaffolding to make sure that names are unique and that +# a region and zone are selected when you try to create your Terraform resources. + +locals { + name_suffix = "${random_pet.suffix.id}" +} + +resource "random_pet" "suffix" { + length = 2 +} + +provider "google" { + region = "us-central1" + zone = "us-central1-c" +} diff --git a/network_management_vpc_flow_logs_config_interconnect_full/main.tf b/network_management_vpc_flow_logs_config_interconnect_full/main.tf new file mode 100644 index 00000000..66bb4721 --- /dev/null +++ b/network_management_vpc_flow_logs_config_interconnect_full/main.tf @@ -0,0 +1,34 @@ +data "google_project" "project" { +} + +resource "google_network_management_vpc_flow_logs_config" "interconnect-test" { + vpc_flow_logs_config_id = "full-interconnect-test-id-${local.name_suffix}" + location = "global" + interconnect_attachment = "projects/${data.google_project.project.number}/regions/us-east4/interconnectAttachments/${google_compute_interconnect_attachment.attachment.name}" + state = "ENABLED" + aggregation_interval = "INTERVAL_5_SEC" + description = "VPC Flow Logs over a VPN Gateway." + flow_sampling = 0.5 + metadata = "INCLUDE_ALL_METADATA" +} + +resource "google_compute_network" "network" { + name = "full-interconnect-test-network-${local.name_suffix}" +} + +resource "google_compute_router" "router" { + name = "full-interconnect-test-router-${local.name_suffix}" + network = google_compute_network.network.name + bgp { + asn = 16550 + } +} + +resource "google_compute_interconnect_attachment" "attachment" { + name = "full-interconnect-test-id-${local.name_suffix}" + edge_availability_domain = "AVAILABILITY_DOMAIN_1" + type = "PARTNER" + router = google_compute_router.router.id + mtu = 1500 +} + diff --git a/network_management_vpc_flow_logs_config_interconnect_full/motd b/network_management_vpc_flow_logs_config_interconnect_full/motd new file mode 100644 index 00000000..45a906e8 --- /dev/null +++ b/network_management_vpc_flow_logs_config_interconnect_full/motd @@ -0,0 +1,7 @@ +=== + +These examples use real resources that will be billed to the +Google Cloud Platform project you use - so make sure that you +run "terraform destroy" before quitting! + +=== diff --git a/network_management_vpc_flow_logs_config_interconnect_full/tutorial.md b/network_management_vpc_flow_logs_config_interconnect_full/tutorial.md new file mode 100644 index 00000000..79f88171 --- /dev/null +++ b/network_management_vpc_flow_logs_config_interconnect_full/tutorial.md @@ -0,0 +1,79 @@ +# Network Management Vpc Flow Logs Config Interconnect Full - Terraform + +## Setup + + + +Welcome to Terraform in Google Cloud Shell! We need you to let us know what project you'd like to use with Terraform. + + + +Terraform provisions real GCP resources, so anything you create in this session will be billed against this project. + +## Terraforming! + +Let's use {{project-id}} with Terraform! Click the Cloud Shell icon below to copy the command +to your shell, and then run it from the shell by pressing Enter/Return. Terraform will pick up +the project name from the environment variable. + +```bash +export GOOGLE_CLOUD_PROJECT={{project-id}} +``` + +After that, let's get Terraform started. Run the following to pull in the providers. + +```bash +terraform init +``` + +With the providers downloaded and a project set, you're ready to use Terraform. Go ahead! + +```bash +terraform apply +``` + +Terraform will show you what it plans to do, and prompt you to accept. Type "yes" to accept the plan. + +```bash +yes +``` + + +## Post-Apply + +### Editing your config + +Now you've provisioned your resources in GCP! If you run a "plan", you should see no changes needed. + +```bash +terraform plan +``` + +So let's make a change! Try editing a number, or appending a value to the name in the editor. Then, +run a 'plan' again. + +```bash +terraform plan +``` + +Afterwards you can run an apply, which implicitly does a plan and shows you the intended changes +at the 'yes' prompt. + +```bash +terraform apply +``` + +```bash +yes +``` + +## Cleanup + +Run the following to remove the resources Terraform provisioned: + +```bash +terraform destroy +``` +```bash +yes +``` diff --git a/network_management_vpc_flow_logs_config_vpn_basic/backing_file.tf b/network_management_vpc_flow_logs_config_vpn_basic/backing_file.tf new file mode 100644 index 00000000..c60b1199 --- /dev/null +++ b/network_management_vpc_flow_logs_config_vpn_basic/backing_file.tf @@ -0,0 +1,15 @@ +# This file has some scaffolding to make sure that names are unique and that +# a region and zone are selected when you try to create your Terraform resources. + +locals { + name_suffix = "${random_pet.suffix.id}" +} + +resource "random_pet" "suffix" { + length = 2 +} + +provider "google" { + region = "us-central1" + zone = "us-central1-c" +} diff --git a/network_management_vpc_flow_logs_config_vpn_basic/main.tf b/network_management_vpc_flow_logs_config_vpn_basic/main.tf new file mode 100644 index 00000000..83939ed9 --- /dev/null +++ b/network_management_vpc_flow_logs_config_vpn_basic/main.tf @@ -0,0 +1,65 @@ +data "google_project" "project" { +} + +resource "google_network_management_vpc_flow_logs_config" "vpn-test" { + vpc_flow_logs_config_id = "basic-test-id-${local.name_suffix}" + location = "global" + vpn_tunnel = "projects/${data.google_project.project.number}/regions/us-central1/vpnTunnels/${google_compute_vpn_tunnel.tunnel.name}" +} + +resource "google_compute_vpn_tunnel" "tunnel" { + name = "basic-test-tunnel-${local.name_suffix}" + peer_ip = "15.0.0.120" + shared_secret = "a secret message" + target_vpn_gateway = google_compute_vpn_gateway.target_gateway.id + + depends_on = [ + google_compute_forwarding_rule.fr_esp, + google_compute_forwarding_rule.fr_udp500, + google_compute_forwarding_rule.fr_udp4500, + ] +} + +resource "google_compute_vpn_gateway" "target_gateway" { + name = "basic-test-gateway-${local.name_suffix}" + network = google_compute_network.network.id +} + +resource "google_compute_network" "network" { + name = "basic-test-network-${local.name_suffix}" +} + +resource "google_compute_address" "vpn_static_ip" { + name = "basic-test-address-${local.name_suffix}" +} + +resource "google_compute_forwarding_rule" "fr_esp" { + name = "basic-test-fresp-${local.name_suffix}" + ip_protocol = "ESP" + ip_address = google_compute_address.vpn_static_ip.address + target = google_compute_vpn_gateway.target_gateway.id +} + +resource "google_compute_forwarding_rule" "fr_udp500" { + name = "basic-test-fr500-${local.name_suffix}" + ip_protocol = "UDP" + port_range = "500" + ip_address = google_compute_address.vpn_static_ip.address + target = google_compute_vpn_gateway.target_gateway.id +} + +resource "google_compute_forwarding_rule" "fr_udp4500" { + name = "basic-test-fr4500-${local.name_suffix}" + ip_protocol = "UDP" + port_range = "4500" + ip_address = google_compute_address.vpn_static_ip.address + target = google_compute_vpn_gateway.target_gateway.id +} + +resource "google_compute_route" "route" { + name = "basic-test-route-${local.name_suffix}" + network = google_compute_network.network.name + dest_range = "15.0.0.0/24" + priority = 1000 + next_hop_vpn_tunnel = google_compute_vpn_tunnel.tunnel.id +} diff --git a/network_management_vpc_flow_logs_config_vpn_basic/motd b/network_management_vpc_flow_logs_config_vpn_basic/motd new file mode 100644 index 00000000..45a906e8 --- /dev/null +++ b/network_management_vpc_flow_logs_config_vpn_basic/motd @@ -0,0 +1,7 @@ +=== + +These examples use real resources that will be billed to the +Google Cloud Platform project you use - so make sure that you +run "terraform destroy" before quitting! + +=== diff --git a/network_management_vpc_flow_logs_config_vpn_basic/tutorial.md b/network_management_vpc_flow_logs_config_vpn_basic/tutorial.md new file mode 100644 index 00000000..e1698406 --- /dev/null +++ b/network_management_vpc_flow_logs_config_vpn_basic/tutorial.md @@ -0,0 +1,79 @@ +# Network Management Vpc Flow Logs Config Vpn Basic - Terraform + +## Setup + + + +Welcome to Terraform in Google Cloud Shell! We need you to let us know what project you'd like to use with Terraform. + + + +Terraform provisions real GCP resources, so anything you create in this session will be billed against this project. + +## Terraforming! + +Let's use {{project-id}} with Terraform! Click the Cloud Shell icon below to copy the command +to your shell, and then run it from the shell by pressing Enter/Return. Terraform will pick up +the project name from the environment variable. + +```bash +export GOOGLE_CLOUD_PROJECT={{project-id}} +``` + +After that, let's get Terraform started. Run the following to pull in the providers. + +```bash +terraform init +``` + +With the providers downloaded and a project set, you're ready to use Terraform. Go ahead! + +```bash +terraform apply +``` + +Terraform will show you what it plans to do, and prompt you to accept. Type "yes" to accept the plan. + +```bash +yes +``` + + +## Post-Apply + +### Editing your config + +Now you've provisioned your resources in GCP! If you run a "plan", you should see no changes needed. + +```bash +terraform plan +``` + +So let's make a change! Try editing a number, or appending a value to the name in the editor. Then, +run a 'plan' again. + +```bash +terraform plan +``` + +Afterwards you can run an apply, which implicitly does a plan and shows you the intended changes +at the 'yes' prompt. + +```bash +terraform apply +``` + +```bash +yes +``` + +## Cleanup + +Run the following to remove the resources Terraform provisioned: + +```bash +terraform destroy +``` +```bash +yes +``` diff --git a/network_management_vpc_flow_logs_config_vpn_full/backing_file.tf b/network_management_vpc_flow_logs_config_vpn_full/backing_file.tf new file mode 100644 index 00000000..c60b1199 --- /dev/null +++ b/network_management_vpc_flow_logs_config_vpn_full/backing_file.tf @@ -0,0 +1,15 @@ +# This file has some scaffolding to make sure that names are unique and that +# a region and zone are selected when you try to create your Terraform resources. + +locals { + name_suffix = "${random_pet.suffix.id}" +} + +resource "random_pet" "suffix" { + length = 2 +} + +provider "google" { + region = "us-central1" + zone = "us-central1-c" +} diff --git a/network_management_vpc_flow_logs_config_vpn_full/main.tf b/network_management_vpc_flow_logs_config_vpn_full/main.tf new file mode 100644 index 00000000..bd7a6f77 --- /dev/null +++ b/network_management_vpc_flow_logs_config_vpn_full/main.tf @@ -0,0 +1,70 @@ +data "google_project" "project" { +} + +resource "google_network_management_vpc_flow_logs_config" "vpn-test" { + vpc_flow_logs_config_id = "full-test-id-${local.name_suffix}" + location = "global" + vpn_tunnel = "projects/${data.google_project.project.number}/regions/us-central1/vpnTunnels/${google_compute_vpn_tunnel.tunnel.name}" + state = "ENABLED" + aggregation_interval = "INTERVAL_5_SEC" + description = "VPC Flow Logs over a VPN Gateway." + flow_sampling = 0.5 + metadata = "INCLUDE_ALL_METADATA" +} + +resource "google_compute_vpn_tunnel" "tunnel" { + name = "full-test-tunnel-${local.name_suffix}" + peer_ip = "15.0.0.120" + shared_secret = "a secret message" + target_vpn_gateway = google_compute_vpn_gateway.target_gateway.id + + depends_on = [ + google_compute_forwarding_rule.fr_esp, + google_compute_forwarding_rule.fr_udp500, + google_compute_forwarding_rule.fr_udp4500, + ] +} + +resource "google_compute_vpn_gateway" "target_gateway" { + name = "full-test-gateway-${local.name_suffix}" + network = google_compute_network.network.id +} + +resource "google_compute_network" "network" { + name = "full-test-network-${local.name_suffix}" +} + +resource "google_compute_address" "vpn_static_ip" { + name = "full-test-address-${local.name_suffix}" +} + +resource "google_compute_forwarding_rule" "fr_esp" { + name = "full-test-fresp-${local.name_suffix}" + ip_protocol = "ESP" + ip_address = google_compute_address.vpn_static_ip.address + target = google_compute_vpn_gateway.target_gateway.id +} + +resource "google_compute_forwarding_rule" "fr_udp500" { + name = "full-test-fr500-${local.name_suffix}" + ip_protocol = "UDP" + port_range = "500" + ip_address = google_compute_address.vpn_static_ip.address + target = google_compute_vpn_gateway.target_gateway.id +} + +resource "google_compute_forwarding_rule" "fr_udp4500" { + name = "full-test-fr4500-${local.name_suffix}" + ip_protocol = "UDP" + port_range = "4500" + ip_address = google_compute_address.vpn_static_ip.address + target = google_compute_vpn_gateway.target_gateway.id +} + +resource "google_compute_route" "route" { + name = "full-test-route-${local.name_suffix}" + network = google_compute_network.network.name + dest_range = "15.0.0.0/24" + priority = 1000 + next_hop_vpn_tunnel = google_compute_vpn_tunnel.tunnel.id +} diff --git a/network_management_vpc_flow_logs_config_vpn_full/motd b/network_management_vpc_flow_logs_config_vpn_full/motd new file mode 100644 index 00000000..45a906e8 --- /dev/null +++ b/network_management_vpc_flow_logs_config_vpn_full/motd @@ -0,0 +1,7 @@ +=== + +These examples use real resources that will be billed to the +Google Cloud Platform project you use - so make sure that you +run "terraform destroy" before quitting! + +=== diff --git a/network_management_vpc_flow_logs_config_vpn_full/tutorial.md b/network_management_vpc_flow_logs_config_vpn_full/tutorial.md new file mode 100644 index 00000000..4523e824 --- /dev/null +++ b/network_management_vpc_flow_logs_config_vpn_full/tutorial.md @@ -0,0 +1,79 @@ +# Network Management Vpc Flow Logs Config Vpn Full - Terraform + +## Setup + + + +Welcome to Terraform in Google Cloud Shell! We need you to let us know what project you'd like to use with Terraform. + + + +Terraform provisions real GCP resources, so anything you create in this session will be billed against this project. + +## Terraforming! + +Let's use {{project-id}} with Terraform! Click the Cloud Shell icon below to copy the command +to your shell, and then run it from the shell by pressing Enter/Return. Terraform will pick up +the project name from the environment variable. + +```bash +export GOOGLE_CLOUD_PROJECT={{project-id}} +``` + +After that, let's get Terraform started. Run the following to pull in the providers. + +```bash +terraform init +``` + +With the providers downloaded and a project set, you're ready to use Terraform. Go ahead! + +```bash +terraform apply +``` + +Terraform will show you what it plans to do, and prompt you to accept. Type "yes" to accept the plan. + +```bash +yes +``` + + +## Post-Apply + +### Editing your config + +Now you've provisioned your resources in GCP! If you run a "plan", you should see no changes needed. + +```bash +terraform plan +``` + +So let's make a change! Try editing a number, or appending a value to the name in the editor. Then, +run a 'plan' again. + +```bash +terraform plan +``` + +Afterwards you can run an apply, which implicitly does a plan and shows you the intended changes +at the 'yes' prompt. + +```bash +terraform apply +``` + +```bash +yes +``` + +## Cleanup + +Run the following to remove the resources Terraform provisioned: + +```bash +terraform destroy +``` +```bash +yes +```