-
Notifications
You must be signed in to change notification settings - Fork 52
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
feat: Add Control Plane Authority samples and update README content f…
…or gke-custom-org-policy. (#211)
- Loading branch information
1 parent
a1050e3
commit 3247b6f
Showing
4 changed files
with
38 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
10 changes: 10 additions & 0 deletions
10
gke-custom-org-policy/samples/control-plane-authority/control_plane_network_connection.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
name: organizations/${ORG_ID}/customConstraints/custom.controlPlaneNetworkConnectionLogs | ||
resource_types: container.googleapis.com/Cluster | ||
method_types: | ||
- CREATE | ||
- UPDATE | ||
condition: resource.loggingConfig.componentConfig.enableComponents.exists(component, component=="KCP_CONNECTION") | ||
action_type: ALLOW | ||
display_name: GKE Control Plane Authority Network Connection Logs Visibility | ||
description: Only allow Clusters to be created and updated when GKE Control Plane Authority network connections logs visibility is enabled. | ||
|
10 changes: 10 additions & 0 deletions
10
gke-custom-org-policy/samples/control-plane-authority/control_plane_ssh_logs.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
name: organizations/${ORG_ID}/customConstraints/custom.controlPlaneSSHLogs | ||
resource_types: container.googleapis.com/Cluster | ||
method_types: | ||
- CREATE | ||
- UPDATE | ||
condition: resource.loggingConfig.componentConfig.enableComponents.exists(component, component=="KCP_SSHD") | ||
action_type: ALLOW | ||
display_name: GKE Control Plane Authority SSH Logs Visibility | ||
description: Only allow Clusters to be created and updated when GKE Control Plane Authority SSH logs visibility is enabled. | ||
|
10 changes: 10 additions & 0 deletions
10
gke-custom-org-policy/samples/control-plane-authority/control_plane_user_managed_keys.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
name: organizations/${ORG_ID}/customConstraints/custom.controlPlaneUserManagedKeys | ||
resource_types: container.googleapis.com/Cluster | ||
method_types: | ||
- CREATE | ||
- UPDATE | ||
condition: resource.userManagedKeysConfig.clusterCa.startsWith("/projects/${PROJECT_ID}") && resource.userManagedKeysConfig.etcdApiCa.startsWith("/projects/${PROJECT_ID}") && resource.userManagedKeysConfig.etcdPeerCa.startsWith("/projects/${PROJECT_ID}") && resource.userManagedKeysConfig.aggregationCa.startsWith("/projects/${PROJECT_ID}") && resource.userManagedKeysConfig.controlPlaneDiskEncryptionKey.startsWith("/projects/${PROJECT_ID}") && resource.userManagedKeysConfig.gkeopsEtcdBackupEncryptionKey.startsWith("/projects/${PROJECT_ID}") && resource.userManagedKeysConfig.serviceAccountSigningKeys.all(key, key.startsWith("/projects/${PROJECT_ID}")) && resource.userManagedKeysConfig.serviceAccountVerificationKeys.all(key, key.startsWith("/projects/${PROJECT_ID}")) | ||
action_type: ALLOW | ||
display_name: GKE Control Plane Authority CMEK | ||
description: Only allow Clusters to be created and updated with GKE Control Plane Authority features, namely inputting the Cluster CA, etcd-API CA, etcd-peer CA, service account signing & verification key, etcd backup encryption key, and the control plane boot disk & etcd storage key housed in Certificate Authority Service and Cloud KMS from specific project. | ||
|