services/bastion-host/bastion.yaml (79 lines of code) (raw):
# Copyright 2020 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#########
# Create a bastion host for running kubectl commands against the GKE cluster
apiVersion: compute.cnrm.cloud.google.com/v1beta1
kind: ComputeInstance
metadata:
name: bastion-host
namespace: config-control
labels:
os-config-management: "true"
annotations:
cnrm.cloud.google.com/project-id: PROJECT_ID # kpt-set: ${project-id}
cnrm.cloud.google.com/allow-stopping-for-update: "true"
cnrm.cloud.google.com/blueprint: kpt-fn-live
spec:
description: Bastion host
machineType: n1-standard-1
zone: GCP_REGION-c # kpt-set: ${region}-c
bootDisk:
autoDelete: true
initializeParams:
size: 100
type: pd-ssd
sourceImageRef:
external: ubuntu-os-cloud/ubuntu-1804-lts
networkInterface:
- subnetworkRef:
external: SUBNET_NAME # kpt-set: ${subnet-name}
subnetworkProject: PROJECT_ID # kpt-set: ${project-id}
serviceAccount:
serviceAccountRef:
name: BASTION_SA_NAME # kpt-set: ${bastion-sa-name}
namespace: config-control
scopes:
- https://www.googleapis.com/auth/cloud-platform
shieldedInstanceConfig:
enableIntegrityMonitoring: true
enableSecureBoot: true
metadata:
- key: enable-oslogin
value: "TRUE"
- key: enable-osconfig
value: "TRUE"
- key: enable-guest-attributes
value: "TRUE"
tags:
- allow-ssh
---
apiVersion: compute.cnrm.cloud.google.com/v1beta1
kind: ComputeFirewall
metadata:
name: bastion-host-allow-ssh
namespace: config-control
annotations:
cnrm.cloud.google.com/project-id: PROJECT_ID # kpt-set: ${project-id}
cnrm.cloud.google.com/blueprint: kpt-fn-live
spec:
allow:
- protocol: tcp
ports:
- "22"
networkRef:
external: NETWORK_NAME # kpt-set: ${network-name}
sourceTags:
- allow-ssh
sourceRanges:
- 35.235.240.0/20 # This range contains all IP addresses that IAP uses for TCP forwarding.
priority: 1000
---
# Create a Cloud NAT for the bastion host to be able to pull setup libraries from public
# repos.
apiVersion: compute.cnrm.cloud.google.com/v1beta1
kind: ComputeRouterNAT
metadata:
name: bastion-nat
namespace: config-control
annotations:
cnrm.cloud.google.com/blueprint: kpt-fn
spec:
region: GCP_REGION # kpt-set: ${region}
routerRef:
external: nat-router
natIpAllocateOption: AUTO_ONLY
sourceSubnetworkIpRangesToNat: ALL_SUBNETWORKS_ALL_IP_RANGES