-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remaining config changes to fully deploy #24
Comments
#Full run through of above patch |
test results |
PR rebase flow
|
rerun simulation
|
rerun 20220606
3 groups
validatorhttps://github.com/canada-ca/cloud-guardrails-gcp/blob/main/guardrails-validation/README.md
step back - clone first - then determine which of the 3 projects |
Claudia and Michael triage
fixes (will get past permissions issues running terraform)
New org will require at least one project created (under "no organization") in order for organization to show up in billing under the org.
admin groups can be team or public visibility
If not running from home folder (in cloudshell_open) - rename and change the HOME var in the bootstrap.sh script
Instead of relying on "owner" on account being impersonated
Enable APIs on both guardrails and seed projects
see
https://console.cloud.google.com/apis/dashboard?referrer=search&project=accelerator-pg-dev
via
gcloud services enable pubsub.googleapis.com cloudresourcemanager.googleapis.com identitytoolkit.googleapis.com
check services
When roles are added - rerun terraform init
Which project to use for load (seed or gr) - seed
replace provider.tf
Testing 20220326
test positive/negative role tests
admin_super@cloudshell:
/cloudshell_open/accelerators_accelerateurs-gcp/deployment-templates/Terraform/guardrails/0-bootstrap (accelerator-pg-dev)$ ./bootstrap.sh -d dev -p accelerator-pg-dev/cloudshell_open/accelerators_accelerateurs-gcp/deployment-templates/Terraform/guardrails/0-bootstrap (accelerator-pg-dev)$ ./bootstrap.sh -d dev -p accelerator-pg-devchecking roles of current account: ad...bal
ROLE: roles/iam.serviceAccountTokenCreator role set OK on super admin account
ROLE: roles/resourcemanager.folderAdmin role set OK on super admin account
ROLE: roles/resourcemanager.organizationAdmin role set OK on super admin account
all roles set OK on super admin account: ad...al - proceeding
admin_super@cloudshell:
checking roles of current account: adm...bal
roles/iam.serviceAccountTokenCreator role missing
ROLE: roles/resourcemanager.folderAdmin role set OK on super admin account
ROLE: roles/resourcemanager.organizationAdmin role set OK on super admin account
missing roles listed above on the super admin account: ad..bal
admin_super@cloudshell:
/cloudshell_open/accelerators_accelerateurs-gcp/deployment-templates/Terraform/guardrails/0-bootstrap (accelerator-pg-dev)$ ./bootstrap.sh -d dev -p accelerator-pg-dev/cloudshell_open/accelerators_accelerateurs-gcp/deployment-templates/Terraform/guardrails/0-bootstrap (accelerator-pg-dev)$ ./bootstrap.sh -d dev -p accelerator-pg-devchecking roles of current account: ad...bal
ROLE: roles/iam.serviceAccountTokenCreator role set OK on super admin account
roles/resourcemanager.folderAdmin role missing
ROLE: roles/resourcemanager.organizationAdmin role set OK on super admin account
missing roles listed above on the super admin account: ad...bal
admin_super@cloudshell:
checking roles of current account: admi...bal
ROLE: roles/iam.serviceAccountTokenCreator role set OK on super admin account
ROLE: roles/resourcemanager.folderAdmin role set OK on super admin account
roles/resourcemanager.organizationAdmin role missing
missing roles listed above on the super admin account: ad...bal
admin_super@cloudshell:~/cloudshell_open/accelerators_accelerateurs-gcp/deployment-templates/Terraform/guardrails/0-bootstrap (accelerator-pg-dev)$
run
admin_super@cloudshell:~/cloudshell_open/accelerators_accelerateurs-gcp/deployment-templates/Terraform/guardrails/0-bootstrap (accelerator-pg-dev)$ ./bootstrap.sh -d pgdev -p accelerator-pg-dev
seed project id: pgdev-seed-project
boostrap project id: accelerator-pg-dev
org id: 9...6
billing id: 0...B
checking roles of current account: adm...bal
ROLE: roles/iam.serviceAccountTokenCreator role set OK on super admin account
ROLE: roles/resourcemanager.folderAdmin role set OK on super admin account
ROLE: roles/resourcemanager.organizationAdmin role set OK on super admin account
all roles set OK on super admin account: ad..er@g..al - proceeding
pgdev-seed-project project already exists and will be reused to provision resources
billingAccountName: billingAccounts/01...B
billingEnabled: true
name: projects/pgdev-seed-project/billingInfo
projectId: pgdev-seed-project
TF SA Already exists as: tfadmin-pgdev@pgdev-seed-project.iam.gserviceaccount.com
gs://pgdev-seed-project-guardrails
Creating gs://pgdev-seed-project-guardrails/...
Replace backend.tf bucketname
Your active configuration is: [cloudshell-10722]
Updated property [core/project].
Status: 0
GCP seed project created project id: pgdev-seed-project \n
Terraform Service account to be used for creating GCP landing zone = tfadmin-pgdev@pgdev-seed-project.iam.gserviceaccount.com \n
Terraform Backend Storage Bucket: gs://pgdev-seed-project-guardrails
add 3 admin accounts
billing_data, ssc_broker, ssc_broker
verify/edit tfvar
run terraform
rerun
The text was updated successfully, but these errors were encountered: