Landing Zone v2 experimentation core package. Depends on the bootstrap procedure.
Name | Value | Type | Count |
---|---|---|---|
allowed-contact-domains | ["@example.com"] | array | 1 |
allowed-policy-domain-members | ["DIRECTORY_CUSTOMER_ID"] | array | 1 |
billing-id | AAAAAA-BBBBBB-CCCCCC | str | 1 |
logging-project-id | logging-project-12345 | str | 34 |
lz-folder-id | 0000000000 | str | 13 |
management-namespace | config-control | str | 38 |
management-project-id | management-project-12345 | str | 83 |
management-project-number | 0000000000 | str | 3 |
org-id | 0000000000 | str | 16 |
retention-in-days | 1 | int | 2 |
retention-locking-policy | false | bool | 2 |
security-incident-log-bucket | security-incident-log-bucket | str | 1 |
security-incident-log-bucket-retention-in-seconds | 86400 | int | 1 |
security-incident-log-bucket-retention-locking-policy | false | bool | 1 |
This package has no sub-packages.
File | APIVersion | Kind | Name | Namespace |
---|---|---|---|---|
lz-folder/audits/folder.yaml | resourcemanager.cnrm.cloud.google.com/v1beta1 | Folder | audits | hierarchy |
lz-folder/audits/logging-project/cloud-logging-buckets.yaml | logging.cnrm.cloud.google.com/v1beta1 | LoggingLogBucket | security-log-bucket | logging |
lz-folder/audits/logging-project/cloud-logging-buckets.yaml | logging.cnrm.cloud.google.com/v1beta1 | LoggingLogBucket | platform-and-component-log-bucket | logging |
lz-folder/audits/logging-project/cloud-storage-buckets.yaml | storage.cnrm.cloud.google.com/v1beta1 | StorageBucket | security-incident-log-bucket | logging |
lz-folder/audits/logging-project/monitoring/metrics-scope.yaml | monitoring.cnrm.cloud.google.com/v1beta1 | MonitoringMonitoredProject | management-project-id | logging |
lz-folder/audits/logging-project/project-iam.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMPartialPolicy | security-log-bucket-writer-permissions | projects |
lz-folder/audits/logging-project/project-iam.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMPartialPolicy | platform-and-component-log-bucket-writer-permissions | projects |
lz-folder/audits/logging-project/project-iam.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMPartialPolicy | mgmt-project-cluster-platform-and-component-log-bucket-writer-permissions | projects |
lz-folder/audits/logging-project/project-iam.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMAuditConfig | logging-project-data-access-log-config | projects |
lz-folder/audits/logging-project/project-sink.yaml | logging.cnrm.cloud.google.com/v1beta1 | LoggingLogSink | logging-project-id-data-access-sink | logging |
lz-folder/audits/logging-project/project.yaml | resourcemanager.cnrm.cloud.google.com/v1beta1 | Project | logging-project-id | projects |
lz-folder/audits/logging-project/services.yaml | serviceusage.cnrm.cloud.google.com/v1beta1 | Service | logging-project-id-logging | projects |
lz-folder/audits/logging-project/services.yaml | serviceusage.cnrm.cloud.google.com/v1beta1 | Service | logging-project-id-monitoring | projects |
lz-folder/clients/folder.yaml | resourcemanager.cnrm.cloud.google.com/v1beta1 | Folder | clients | hierarchy |
lz-folder/tests/admins/folder.yaml | resourcemanager.cnrm.cloud.google.com/v1beta1 | Folder | tests.admins | hierarchy |
lz-folder/tests/folder-sink.yaml | logging.cnrm.cloud.google.com/v1beta1 | LoggingLogSink | platform-and-component-log-sink | logging |
lz-folder/tests/folder.yaml | resourcemanager.cnrm.cloud.google.com/v1beta1 | Folder | tests | hierarchy |
lz-folder/tests/unittests/folder.yaml | resourcemanager.cnrm.cloud.google.com/v1beta1 | Folder | tests.unittests | hierarchy |
mgmt-project/project-sink.yaml | logging.cnrm.cloud.google.com/v1beta1 | LoggingLogSink | mgmt-project-cluster-platform-and-component-log-sink | logging |
mgmt-project/services.yaml | serviceusage.cnrm.cloud.google.com/v1beta1 | Service | management-project-id-cloudbilling | config-control |
mgmt-project/services.yaml | serviceusage.cnrm.cloud.google.com/v1beta1 | Service | management-project-id-cloudresourcemanager | config-control |
mgmt-project/services.yaml | serviceusage.cnrm.cloud.google.com/v1beta1 | Service | management-project-id-serviceusage | config-control |
mgmt-project/services.yaml | serviceusage.cnrm.cloud.google.com/v1beta1 | Service | management-project-id-anthos | config-control |
namespaces/config-management-monitoring.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMServiceAccount | config-mgmt-mon-default-sa | config-control |
namespaces/config-management-monitoring.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMPolicyMember | config-mgmt-mon-default-sa-metric-writer-permissions | config-control |
namespaces/config-management-monitoring.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMPartialPolicy | config-mgmt-mon-default-sa-workload-identity-binding | config-control |
namespaces/config-management-monitoring.yaml | core.cnrm.cloud.google.com/v1beta1 | ConfigConnectorContext | configconnectorcontext.core.cnrm.cloud.google.com | config-management-monitoring |
namespaces/gatekeeper-system.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMServiceAccount | gatekeeper-admin-sa | config-control |
namespaces/gatekeeper-system.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMPolicyMember | gatekeeper-admin-sa-metric-writer-permissions | config-control |
namespaces/gatekeeper-system.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMPartialPolicy | gatekeeper-admin-sa-workload-identity-binding | config-control |
namespaces/gatekeeper-system.yaml | core.cnrm.cloud.google.com/v1beta1 | ConfigConnectorContext | configconnectorcontext.core.cnrm.cloud.google.com | gatekeeper-system |
namespaces/hierarchy.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMServiceAccount | hierarchy-sa | config-control |
namespaces/hierarchy.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMPolicyMember | hierarchy-sa-folderadmin-permissions | config-control |
namespaces/hierarchy.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMPartialPolicy | hierarchy-sa-workload-identity-binding | config-control |
namespaces/hierarchy.yaml | v1 | Namespace | hierarchy | |
namespaces/hierarchy.yaml | core.cnrm.cloud.google.com/v1beta1 | ConfigConnectorContext | configconnectorcontext.core.cnrm.cloud.google.com | hierarchy |
namespaces/hierarchy.yaml | rbac.authorization.k8s.io/v1 | RoleBinding | allow-hierarchy-resource-reference-from-projects | hierarchy |
namespaces/hierarchy.yaml | rbac.authorization.k8s.io/v1 | RoleBinding | allow-hierarchy-resource-reference-from-policies | hierarchy |
namespaces/hierarchy.yaml | rbac.authorization.k8s.io/v1 | RoleBinding | allow-hierarchy-resource-reference-from-config-control | hierarchy |
namespaces/hierarchy.yaml | rbac.authorization.k8s.io/v1 | RoleBinding | allow-folders-resource-reference-to-logging | hierarchy |
namespaces/logging.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMServiceAccount | logging-sa | config-control |
namespaces/logging.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMPolicyMember | logging-sa-logadmin-permissions | config-control |
namespaces/logging.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMPolicyMember | logging-sa-monitoring-admin-management-project-id-permissions | config-control |
namespaces/logging.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMPolicyMember | logging-sa-monitoring-admin-logging-project-id-permissions | projects |
namespaces/logging.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMPolicyMember | logging-sa-storageadmin-logging-project-id-permissions | projects |
namespaces/logging.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMPartialPolicy | logging-sa-workload-identity-binding | config-control |
namespaces/logging.yaml | v1 | Namespace | logging | |
namespaces/logging.yaml | core.cnrm.cloud.google.com/v1beta1 | ConfigConnectorContext | configconnectorcontext.core.cnrm.cloud.google.com | logging |
namespaces/logging.yaml | rbac.authorization.k8s.io/v1 | RoleBinding | allow-logging-resource-reference-from-projects | logging |
namespaces/management-namespace.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMPolicyMember | config-control-sa-orgroleadmin-permissions | config-control |
namespaces/management-namespace.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMPolicyMember | config-control-sa-management-project-editor-permissions | config-control |
namespaces/management-namespace.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMPolicyMember | config-control-sa-management-project-serviceaccountadmin-permissions | config-control |
namespaces/networking.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMServiceAccount | networking-sa | config-control |
namespaces/networking.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMPolicyMember | networking-sa-networkadmin-permissions | config-control |
namespaces/networking.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMPolicyMember | networking-sa-security-permissions | config-control |
namespaces/networking.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMPolicyMember | networking-sa-dns-permissions | config-control |
namespaces/networking.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMPolicyMember | networking-sa-service-control-permissions | config-control |
namespaces/networking.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMPolicyMember | networking-sa-xpnadmin-permissions | config-control |
namespaces/networking.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMPartialPolicy | networking-sa-workload-identity-binding | config-control |
namespaces/networking.yaml | v1 | Namespace | networking | |
namespaces/networking.yaml | core.cnrm.cloud.google.com/v1beta1 | ConfigConnectorContext | configconnectorcontext.core.cnrm.cloud.google.com | networking |
namespaces/policies.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMServiceAccount | policies-sa | config-control |
namespaces/policies.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMPolicyMember | policies-sa-orgpolicyadmin-permissions | config-control |
namespaces/policies.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMPartialPolicy | policies-sa-workload-identity-binding | config-control |
namespaces/policies.yaml | v1 | Namespace | policies | |
namespaces/policies.yaml | core.cnrm.cloud.google.com/v1beta1 | ConfigConnectorContext | configconnectorcontext.core.cnrm.cloud.google.com | policies |
namespaces/projects.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMServiceAccount | projects-sa | config-control |
namespaces/projects.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMPolicyMember | projects-sa-projectiamadmin-permissions | config-control |
namespaces/projects.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMPolicyMember | projects-sa-projectcreator-permissions | config-control |
namespaces/projects.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMPolicyMember | projects-sa-projectmover-permissions | config-control |
namespaces/projects.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMPolicyMember | projects-sa-projectdeleter-permissions | config-control |
namespaces/projects.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMPolicyMember | projects-sa-serviceusageadmin-permissions | config-control |
namespaces/projects.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMPolicyMember | projects-sa-billinguser-permissions | config-control |
namespaces/projects.yaml | iam.cnrm.cloud.google.com/v1beta1 | IAMPartialPolicy | projects-sa-workload-identity-binding | config-control |
namespaces/projects.yaml | v1 | Namespace | projects | |
namespaces/projects.yaml | core.cnrm.cloud.google.com/v1beta1 | ConfigConnectorContext | configconnectorcontext.core.cnrm.cloud.google.com | projects |
namespaces/projects.yaml | rbac.authorization.k8s.io/v1 | RoleBinding | allow-projects-resource-reference-from-logging | projects |
namespaces/projects.yaml | rbac.authorization.k8s.io/v1 | RoleBinding | allow-projects-resource-reference-from-networking | projects |
namespaces/projects.yaml | rbac.authorization.k8s.io/v1 | RoleBinding | allow-projects-resource-reference-from-policies | projects |
org/org-policies/compute-disable-nested-virtualization.yaml | resourcemanager.cnrm.cloud.google.com/v1beta1 | ResourceManagerPolicy | compute-disable-nested-virtualization | policies |
org/org-policies/compute-disable-vpc-external-ipv6.yaml | resourcemanager.cnrm.cloud.google.com/v1beta1 | ResourceManagerPolicy | compute-disable-vpc-external-ipv6 | policies |
org/org-policies/compute-require-os-login.yaml | resourcemanager.cnrm.cloud.google.com/v1beta1 | ResourceManagerPolicy | compute-require-os-login | policies |
org/org-policies/compute-restrict-shared-vpc-lien-removal.yaml | resourcemanager.cnrm.cloud.google.com/v1beta1 | ResourceManagerPolicy | compute-restrict-shared-vpc-lien-removal | policies |
org/org-policies/compute-skip-default-network-creation.yaml | resourcemanager.cnrm.cloud.google.com/v1beta1 | ResourceManagerPolicy | compute-skip-default-network-creation | policies |
org/org-policies/essentialcontacts-allowed-contact-domains.yaml | resourcemanager.cnrm.cloud.google.com/v1beta1 | ResourceManagerPolicy | essentialcontacts-allowed-contact-domains | policies |
org/org-policies/gcp-resource-locations.yaml | resourcemanager.cnrm.cloud.google.com/v1beta1 | ResourceManagerPolicy | gcp-restrict-resource-locations | policies |
org/org-policies/iam-allowed-policy-member-domains.yaml | resourcemanager.cnrm.cloud.google.com/v1beta1 | ResourceManagerPolicy | iam-allowed-policy-member-domains | policies |
org/org-policies/storage-uniform-bucket-level-access.yaml | resourcemanager.cnrm.cloud.google.com/v1beta1 | ResourceManagerPolicy | storage-uniform-bucket-level-access | policies |
org/org-sink.yaml | logging.cnrm.cloud.google.com/v1beta1 | LoggingLogSink | org-log-sink-security-logging-project-id | logging |
org/org-sink.yaml | logging.cnrm.cloud.google.com/v1beta1 | LoggingLogSink | org-log-sink-data-access-logging-project-id | logging |
- ConfigConnectorContext
- Folder
- IAMAuditConfig
- IAMPartialPolicy
- IAMPolicyMember
- IAMServiceAccount
- LoggingLogBucket
- LoggingLogSink
- MonitoringMonitoredProject
- Namespace
- Project
- ResourceManagerPolicy
- RoleBinding
- Service
- StorageBucket
-
Clone the package:
kpt pkg get https://github.com/GoogleCloudPlatform/pubsec-declarative-toolkit.git/solutions/experimentation/core-landing-zone@${VERSION}
Replace
${VERSION}
with the desired repo branch or tag (for example,main
). -
Move into the local package:
cd "./core-landing-zone/"
-
Edit the function config file(s):
- setters.yaml
-
Execute the function pipeline
kpt fn render
-
Initialize the resource inventory
kpt live init --namespace ${NAMESPACE}
Replace
${NAMESPACE}
with the namespace in which to manage the inventory ResourceGroup (for example,config-control
). -
Apply the package resources to your cluster
kpt live apply
-
Wait for the resources to be ready
kpt live status --output table --poll-until current