The objective of this module is to deploy a Google Cloud Platform project prj-b-cicd
to host a Jenkins Agent that can connect with your current Jenkins Controller on-prem. This module is a replica of the deprecated cloudbuild module, but re-purposed to use Jenkins instead. This module creates:
- The
prj-b-cicd
project, which includes:- GCE Instance for the Jenkins Agent, which you will configure to connect to your current Jenkins Controller using SSH.
- VPC to connect the Jenkins GCE Instance to
- FW rules to allow communication over port 22
- VPN connection with on-prem (or where ever your Jenkins Controller is located)
- Custom service account
[email protected]
for the GCE instance. This service account is granted the access to generate tokens on the provided Terraform custom service account Please note this module does not include an option to create a Jenkins Controller. To deploy a Jenkins Controller, you should follow one of the available user guides about Jenkins in GCP.
If you don't have a Jenkins implementation and don't want one, then we recommend you to use the Cloud Build module instead.
Basic usage of this sub-module is as follows:
module "jenkins_bootstrap" {
source = "./modules/jenkins-agent"
org_id = "<ORGANIZATION_ID>"
folder_id = "<FOLDER_ID>"
billing_account = "<BILLING_ACCOUNT_ID>"
group_org_admins = "[email protected]"
default_region = "us-central1"
terraform_sa_names = "<SERVICE_ACCOUNT_NAMES>"
terraform_state_bucket = "<GCS_STATE_BUCKET_NAME>"
sa_enable_impersonation = true
jenkins_controller_subnetwork_cidr_range = ["10.1.0.6/32"]
jenkins_agent_gce_subnetwork_cidr_range = "172.16.1.0/24"
jenkins_agent_gce_private_ip_address = "172.16.1.6"
nat_bgp_asn = "BGP_ASN_FOR_NAT_CLOUD_ROUTE"
jenkins_agent_sa_email = "jenkins-agent-gce" # service_account_prefix will be added
jenkins_agent_gce_ssh_pub_key = var.jenkins_agent_gce_ssh_pub_key
}
- Creates a new GCP project using
project_prefix
- Enables APIs in the project using
activate_apis
- Creates a GCE Instance to run the Jenkins Agent with SSH access using the supplied public key
- Creates a Service Account (
jenkins_agent_sa_email
) to run the Jenkins Agent GCE instance - Creates a GCS bucket for Jenkins Artifacts using
project_prefix
- Allows
jenkins_agent_sa_email
service account permissions to impersonate terraform service account (which exists in theseed
project) usingsa_enable_impersonation
and supplied value forterraform_sa_names
- Adds Cloud NAT for the Agent to be able to download updates and necessary binaries.
Name | Description | Type | Default | Required |
---|---|---|---|---|
activate_apis | List of APIs to enable in the CICD project. | list(string) |
[ |
no |
bgp_peer_asn | BGP ASN for peer cloud routes. | number |
"64513" |
no |
billing_account | The ID of the billing account to associate projects with. | string |
n/a | yes |
default_region | Default region to create resources where applicable. | string |
"us-central1" |
no |
folder_id | The ID of a folder to host this project | string |
"" |
no |
group_org_admins | Google Group for GCP Organization Administrators | string |
n/a | yes |
jenkins_agent_gce_machine_type | Jenkins Agent GCE Instance type. | string |
"n1-standard-1" |
no |
jenkins_agent_gce_name | Jenkins Agent GCE Instance name. | string |
"jenkins-agent-01" |
no |
jenkins_agent_gce_private_ip_address | The private IP Address of the Jenkins Agent. This IP Address must be in the CIDR range of jenkins_agent_gce_subnetwork_cidr_range and be reachable through the VPN that exists between on-prem (Jenkins Controller) and GCP (CICD Project, where the Jenkins Agent is located). |
string |
n/a | yes |
jenkins_agent_gce_ssh_pub_key | SSH public key needed by the Jenkins Agent GCE Instance. The Jenkins Controller holds the SSH private key. The correct format is 'ssh-rsa [KEY_VALUE] [USERNAME]' |
string |
n/a | yes |
jenkins_agent_gce_subnetwork_cidr_range | The subnetwork to which the Jenkins Agent will be connected to (in CIDR range 0.0.0.0/0) | string |
n/a | yes |
jenkins_agent_sa_email | Email for Jenkins Agent service account. | string |
"jenkins-agent-gce" |
no |
jenkins_controller_subnetwork_cidr_range | A list of CIDR IP ranges of the Jenkins Controller in the form ['0.0.0.0/0']. Usually only one IP in the form '0.0.0.0/32'. Needed to create a FW rule that allows communication with the Jenkins Agent GCE Instance. | list(string) |
n/a | yes |
nat_bgp_asn | BGP ASN for NAT cloud route. This is needed to allow the Jenkins Agent to download packages and updates from the internet without having an external IP address. | number |
n/a | yes |
on_prem_vpn_public_ip_address | The public IP Address of the Jenkins Controller. | string |
n/a | yes |
on_prem_vpn_public_ip_address2 | The secondpublic IP Address of the Jenkins Controller. | string |
n/a | yes |
org_id | GCP Organization ID | string |
n/a | yes |
project_labels | Labels to apply to the project. | map(string) |
{} |
no |
project_prefix | Name prefix to use for projects created. | string |
"prj" |
no |
router_asn | BGP ASN for cloud routes. | number |
"64515" |
no |
sa_enable_impersonation | Allow org_admins group to impersonate service account & enable APIs required. | bool |
false |
no |
service_account_prefix | Name prefix to use for service accounts. | string |
"sa" |
no |
storage_bucket_labels | Labels to apply to the storage bucket. | map(string) |
{} |
no |
storage_bucket_prefix | Name prefix to use for storage buckets. | string |
"bkt" |
no |
terraform_sa_names | Fully-qualified name of the Terraform Service Accounts. It must be supplied by the Seed Project | map(string) |
n/a | yes |
terraform_state_bucket | Default state bucket, used in Cloud Build substitutions. It must be supplied by the Seed Project | string |
n/a | yes |
terraform_version | Default terraform version. | string |
"1.3.0" |
no |
terraform_version_sha256sum | sha256sum for default terraform version. | string |
"380ca822883176af928c80e5771d1c0ac9d69b13c6d746e6202482aedde7d457" |
no |
tunnel0_bgp_peer_address | BGP peer address for tunnel 0 | string |
n/a | yes |
tunnel0_bgp_session_range | BGP session range for tunnel 0 | string |
n/a | yes |
tunnel1_bgp_peer_address | BGP peer address for tunnel 1 | string |
n/a | yes |
tunnel1_bgp_session_range | BGP session range for tunnel 1 | string |
n/a | yes |
vpn_shared_secret | The shared secret used in the VPN | string |
n/a | yes |
Name | Description |
---|---|
cicd_project_id | Project where the CI/CD Pipeline (Jenkins Agents and terraform builder container image) reside. |
gcs_bucket_jenkins_artifacts | Bucket used to store Jenkins artifacts in Jenkins project. |
jenkins_agent_gce_instance_id | Jenkins Agent GCE Instance id. |
jenkins_agent_sa_email | Email for privileged custom service account for Jenkins Agent GCE instance. |
jenkins_agent_sa_name | Fully qualified name for privileged custom service account for Jenkins Agent GCE instance. |
jenkins_agent_vpc_id | Jenkins Agent VPC name. |
- gcloud sdk >= 393.0.0
- Terraform = 1.3.0
- The scripts in this codebase use Terraform v1.3.0. You should use the same version in the manual steps to avoid Terraform State Snapshot Lock errors caused by differences in terraform versions.
-
Jenkins Controller: You need a Jenkins Controller, since this module does not include an option to create one. To deploy a Jenkins Controller, you should follow one of the available user guides about Jenkins in GCP. If you don't have a Jenkins implementation and don't want one, then we recommend you to use the Cloud Build module instead.
-
VPN Connectivity with on-prem: Once you run this module, a Jenkins Agent is created in the CI/CD project in GCP. Please add VPN connectivity manually by following our user guide about how to deploy a VPN tunnel in GCP. This VPN is necessary to allow communication between the Jenkins Controller (on prem or in a cloud environment) with the Jenkins Agent in the CI/CD project.
-
Binaries and packages for the Jenkins Agent: The Jenkins Agent is a new GCE instance created by this module. After creation, the startup script needs to fetch several binaries for later use, during pipelines execution. These binaries include
java
,terraform
and any other binary you use in your own scripts. You have several options to make these binaries and libraries available to the Jenkins Agent:- allow the Jenkins Agent Internet access (ideally through Cloud NAT, implemented by default).
- allow the Jenkins Agent access to local package repositories on your premises, ideally through the VPN connection.
- preparing a golden image for the Jenkins Agent (and assign the image to the
jenkins_agent_gce_instance.boot_disk.initialize_params.image
terraform variable). You can create the golden images with tools like Packer. Although, you might still need network access to download dependencies while running a pipeline.
An account that has the following permissions:
roles/billing.user
on supplied billing accountroles/resourcemanager.organizationAdmin
on GCP Organizationroles/resourcemanager.projectCreator
on GCP Organization or folder
This is especially important as you might face one of the errors below:
Error: google: could not find default credentials. See https://developers.google.com/accounts/docs/application-default-credentials for more information.
on <empty> line 0:
(source code not available)
Error: Error setting billing account "aaaaaa-bbbbbb-cccccc" for project "projects/prj-jenkins-dc3a": googleapi: Error 400: Precondition check failed., failedPrecondition
on .terraform/modules/jenkins/terraform-google-project-factory-7.1.0/modules/core_project_factory/main.tf line 96, in resource "google_project" "main":
96: resource "google_project" "main" {
Error: failed pre-requisites: missing permission on "billingAccounts/aaaaaa-bbbbbb-cccccc": billing.resourceAssociations.create
on .terraform/modules/jenkins/terraform-google-project-factory-7.1.0/modules/core_project_factory/main.tf line 96, in resource "google_project" "main":
96: resource "google_project" "main" {
A project with the following APIs enabled must be used to host the resources of this module:
- Google Cloud Resource Manager API:
cloudresourcemanager.googleapis.com
- Google Cloud Billing API:
cloudbilling.googleapis.com
- Google Cloud IAM API:
iam.googleapis.com
- Google Cloud Storage API
storage-api.googleapis.com
- Google Cloud Service Usage API:
serviceusage.googleapis.com
- Google Cloud Compute API:
compute.googleapis.com
- Google Cloud KMS API:
cloudkms.googleapis.com
This API can be enabled in the default project created during establishing an organization.
Refer to the contribution guidelines for information on contributing to this module.