Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
13 changes: 12 additions & 1 deletion gke.tf
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
}

#trivy:ignore:AVD-GCP-0048
resource "google_container_cluster" "gke" {

Check failure on line 7 in gke.tf

View workflow job for this annotation

GitHub Actions / Root Module Validation / Static Security Analysis - Checkov

CKV_GCP_69: "Ensure the GKE Metadata Server is Enabled"

Check failure on line 7 in gke.tf

View workflow job for this annotation

GitHub Actions / Root Module Validation / Static Security Analysis - Checkov

CKV_GCP_61: "Enable VPC Flow Logs and Intranode Visibility"

Check failure on line 7 in gke.tf

View workflow job for this annotation

GitHub Actions / Root Module Validation / Static Security Analysis - Checkov

CKV_GCP_21: "Ensure Kubernetes Clusters are configured with Labels"

Check failure on line 7 in gke.tf

View workflow job for this annotation

GitHub Actions / Root Module Validation / Static Security Analysis - Checkov

CKV_GCP_13: "Ensure client certificate authentication to Kubernetes Engine Clusters is disabled"

Check failure on line 7 in gke.tf

View workflow job for this annotation

GitHub Actions / Root Module Validation / Static Security Analysis - Checkov

CKV_GCP_65: "Manage Kubernetes RBAC users with Google Groups for GKE"

Check failure on line 7 in gke.tf

View workflow job for this annotation

GitHub Actions / Root Module Validation / Static Security Analysis - Checkov

CKV_GCP_66: "Ensure use of Binary Authorization"
name = local.name

initial_node_count = 1
Expand Down Expand Up @@ -85,7 +85,7 @@
}
}

resource "google_container_node_pool" "nodes" {

Check failure on line 88 in gke.tf

View workflow job for this annotation

GitHub Actions / Root Module Validation / Static Security Analysis - Checkov

CKV_GCP_68: "Ensure Secure Boot for Shielded GKE Nodes is Enabled"
name = "wayfinder"
location = var.gcp_region
cluster = google_container_cluster.gke.name
Expand All @@ -103,7 +103,18 @@

#trivy:ignore:AVD-GCP-0048
node_config {
machine_type = var.gke_nodes_machine_type
machine_type = var.gke_nodes_machine_type

resource_labels = {
"goog-gke-node-pool-provisioning-model" = "on-demand"
}

kubelet_config {
cpu_cfs_quota = false
pod_pids_limit = 0
cpu_manager_policy = ""
}

metadata = { disable-legacy-endpoints = true }
oauth_scopes = ["https://www.googleapis.com/auth/cloud-platform"]
service_account = google_service_account.gke_service_account.email
Expand Down
Loading