community.google.gce_net – create/destroy GCE networks and firewall rules
Note
This plugin is part of the community.google collection (version 1.0.0).
You might already have this collection installed if you are using the ansible
package. It is not included in ansible-core
. To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install community.google
.
To use it in a playbook, specify: community.google.gce_net
.
Synopsis
- This module can create and destroy Google Compute Engine networks and firewall rules https://cloud.google.com/compute/docs/networking. The name parameter is reserved for referencing a network while the fwname parameter is used to reference firewall rules. IPv4 Address ranges must be specified using the CIDR http://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing format. Full install/configuration instructions for the gce* modules can be found in the comments of ansible/test/gce_tests.py.
Requirements
The below requirements are needed on the host that executes this module.
- python >= 2.6
- apache-libcloud >= 0.13.3, >= 0.17.0 if using JSON credentials
Parameters
Parameter | Choices/Defaults | Comments |
---|---|---|
allowed string | the protocol:ports to allow (tcp:80 or tcp:80,443 or tcp:80-800;udp:1-25) this parameter is mandatory when creating or updating a firewall rule | |
credentials_file path | path to the JSON file associated with the service account email | |
fwname string | name of the firewall rule | |
ipv4_range string | the IPv4 address range in CIDR notation for the network this parameter is not mandatory when you specified existing network in name parameter, but when you create new network, this parameter is mandatory | |
mode string |
| network mode for Google Cloud legacy indicates a network with an IP address range; auto automatically generates subnetworks in different regions; custom uses networks to group subnets of user specified IP address ranges https://cloud.google.com/compute/docs/networking#network_types |
name string | name of the network | |
pem_file path | path to the pem file associated with the service account email This option is deprecated. Use credentials_file . | |
project_id string | your GCE project ID | |
service_account_email string | service account email | |
src_range list / elements=string | Default: [] | the source IPv4 address range in CIDR notation |
src_tags list / elements=string | Default: [] | the source instance tags for creating a firewall rule |
state string | Default: "present" | desired state of the network or firewall Available choices are: active , present , absent , deleted . |
subnet_desc string | description of subnet to create | |
subnet_name string | name of subnet to create | |
subnet_region string | region of subnet to create | |
target_tags list / elements=string | Default: [] | the target instance tags for creating a firewall rule |
Examples
# Create a 'legacy' Network - name: Create Legacy Network community.google.gce_net: name: legacynet ipv4_range: '10.24.17.0/24' mode: legacy state: present # Create an 'auto' Network - name: Create Auto Network community.google.gce_net: name: autonet mode: auto state: present # Create a 'custom' Network - name: Create Custom Network community.google.gce_net: name: customnet mode: custom subnet_name: "customsubnet" subnet_region: us-east1 ipv4_range: '10.240.16.0/24' state: "present" # Create Firewall Rule with Source Tags - name: Create Firewall Rule w/Source Tags community.google.gce_net: name: default fwname: "my-firewall-rule" allowed: tcp:80 state: "present" src_tags: "foo,bar" # Create Firewall Rule with Source Range - name: Create Firewall Rule w/Source Range community.google.gce_net: name: default fwname: "my-firewall-rule" allowed: tcp:80 state: "present" src_range: ['10.1.1.1/32'] # Create Custom Subnetwork - name: Create Custom Subnetwork community.google.gce_net: name: privatenet mode: custom subnet_name: subnet_example subnet_region: us-central1 ipv4_range: '10.0.0.0/16'
Return Values
Common return values are documented here, the following are the fields unique to this module:
Key | Returned | Description |
---|---|---|
allowed string | When specified | Rules (ports and protocols) specified by this firewall rule. Sample: tcp:80;icmp |
fwname string | When specified | Name of the firewall rule. Sample: my-fwname |
ipv4_range string | when specified or when a subnetwork is created | IPv4 range of the specified network or subnetwork. Sample: 10.0.0.0/16 |
name string | always | Name of the network. Sample: my-network |
src_range list / elements=string | when specified | IP address blocks a firewall rule applies to. Sample: ['10.1.1.12/8'] |
src_tags list / elements=string | when specified while creating a firewall rule | Instance Tags firewall rule applies to. Sample: ['foo', 'bar'] |
state string | always | State of the item operated on. Sample: present |
subnet_name string | when specified or when a subnetwork is created | Name of the subnetwork. Sample: my-subnetwork |
subnet_region string | when specified or when a subnetwork is created | Region of the specified subnet. Sample: us-east1 |
target_tags list / elements=string | when specified while creating a firewall rule | Instance Tags with these tags receive traffic allowed by firewall rule. Sample: ['foo', 'bar'] |
Authors
- Eric Johnson (@erjohnso) <erjohnso@google.com>, Tom Melendez (@supertom) <supertom@google.com>
© 2012–2018 Michael DeHaan
© 2018–2021 Red Hat, Inc.
Licensed under the GNU General Public License version 3.
https://docs.ansible.com/ansible/latest/collections/community/google/gce_net_module.html