streaming/gke-stateful-kafka/terraform/modules/beta-private-cluster/firewall.tf (156 lines of code) (raw):

/** * Copyright 2022 Google LLC * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ // This file was automatically generated from a template in ./autogen/main /****************************************** Match the gke-<CLUSTER>-<ID>-all INGRESS firewall rule created by GKE but for EGRESS Required for clusters when VPCs enforce a default-deny egress rule *****************************************/ resource "google_compute_firewall" "intra_egress" { count = var.add_cluster_firewall_rules ? 1 : 0 name = "gke-${substr(var.name, 0, min(25, length(var.name)))}-intra-cluster-egress" description = "Managed by terraform gke module: Allow pods to communicate with each other and the master" project = local.network_project_id network = var.network priority = var.firewall_priority direction = "EGRESS" target_tags = [local.cluster_network_tag] destination_ranges = [ local.cluster_endpoint_for_nodes, local.cluster_subnet_cidr, local.cluster_alias_ranges_cidr[var.ip_range_pods], ] # Allow all possible protocols allow { protocol = "tcp" } allow { protocol = "udp" } allow { protocol = "icmp" } allow { protocol = "sctp" } allow { protocol = "esp" } allow { protocol = "ah" } } /****************************************** Allow egress to the TPU IPv4 CIDR block This rule is defined separately from the intra_egress rule above since it requires an output from the google_container_cluster resource. https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/1124 *****************************************/ resource "google_compute_firewall" "tpu_egress" { count = var.add_cluster_firewall_rules && var.enable_tpu ? 1 : 0 name = "gke-${substr(var.name, 0, min(25, length(var.name)))}-tpu-egress" description = "Managed by terraform gke module: Allow pods to communicate with TPUs" project = local.network_project_id network = var.network priority = var.firewall_priority direction = "EGRESS" target_tags = [local.cluster_network_tag] destination_ranges = [google_container_cluster.primary.tpu_ipv4_cidr_block] # Allow all possible protocols allow { protocol = "tcp" } allow { protocol = "udp" } allow { protocol = "icmp" } allow { protocol = "sctp" } allow { protocol = "esp" } allow { protocol = "ah" } } /****************************************** Allow GKE master to hit non 443 ports for Webhooks/Admission Controllers https://github.com/kubernetes/kubernetes/issues/79739 *****************************************/ resource "google_compute_firewall" "master_webhooks" { count = var.add_cluster_firewall_rules || var.add_master_webhook_firewall_rules ? 1 : 0 name = "gke-${substr(var.name, 0, min(25, length(var.name)))}-webhooks" description = "Managed by terraform gke module: Allow master to hit pods for admission controllers/webhooks" project = local.network_project_id network = var.network priority = var.firewall_priority direction = "INGRESS" source_ranges = [local.cluster_endpoint_for_nodes] source_tags = [] target_tags = [local.cluster_network_tag] allow { protocol = "tcp" ports = var.firewall_inbound_ports } } /****************************************** Create shadow firewall rules to capture the traffic flow between the managed firewall rules *****************************************/ resource "google_compute_firewall" "shadow_allow_pods" { count = var.add_shadow_firewall_rules ? 1 : 0 name = "gke-shadow-${substr(var.name, 0, min(25, length(var.name)))}-all" description = "Managed by terraform gke module: A shadow firewall rule to match the default rule allowing pod communication." project = local.network_project_id network = var.network priority = var.shadow_firewall_rules_priority direction = "INGRESS" source_ranges = [local.cluster_alias_ranges_cidr[var.ip_range_pods]] target_tags = [local.cluster_network_tag] # Allow all possible protocols allow { protocol = "tcp" } allow { protocol = "udp" } allow { protocol = "icmp" } allow { protocol = "sctp" } allow { protocol = "esp" } allow { protocol = "ah" } log_config { metadata = "INCLUDE_ALL_METADATA" } } resource "google_compute_firewall" "shadow_allow_master" { count = var.add_shadow_firewall_rules ? 1 : 0 name = "gke-shadow-${substr(var.name, 0, min(25, length(var.name)))}-master" description = "Managed by terraform GKE module: A shadow firewall rule to match the default rule allowing worker nodes communication." project = local.network_project_id network = var.network priority = var.shadow_firewall_rules_priority direction = "INGRESS" source_ranges = [local.cluster_endpoint_for_nodes] target_tags = [local.cluster_network_tag] allow { protocol = "tcp" ports = ["10250", "443"] } log_config { metadata = "INCLUDE_ALL_METADATA" } } resource "google_compute_firewall" "shadow_allow_nodes" { count = var.add_shadow_firewall_rules ? 1 : 0 name = "gke-shadow-${substr(var.name, 0, min(25, length(var.name)))}-vms" description = "Managed by Terraform GKE module: A shadow firewall rule to match the default rule allowing worker nodes communication." project = local.network_project_id network = var.network priority = var.shadow_firewall_rules_priority direction = "INGRESS" source_ranges = [local.cluster_subnet_cidr] target_tags = [local.cluster_network_tag] allow { protocol = "icmp" } allow { protocol = "udp" ports = ["1-65535"] } allow { protocol = "tcp" ports = ["1-65535"] } log_config { metadata = "INCLUDE_ALL_METADATA" } }