Skip to content

Commit 2179389

Browse files
committed
audit: update as of 2021-07-10
1 parent 930d08e commit 2179389

File tree

18 files changed

+512
-10
lines changed

18 files changed

+512
-10
lines changed
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
{
2+
"createTime": "2021-07-10T12:35:00.145Z",
3+
"lifecycleState": "ACTIVE",
4+
"name": "k8s-infra-project-jedha",
5+
"parent": {
6+
"id": "758905017065",
7+
"type": "organization"
8+
},
9+
"projectId": "k8s-infra-project-jedha",
10+
"projectNumber": "1088262075988"
11+
}
Lines changed: 70 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,70 @@
1+
{
2+
"bindings": [
3+
{
4+
"members": [
5+
"serviceAccount:[email protected]"
6+
],
7+
"role": "roles/compute.serviceAgent"
8+
},
9+
{
10+
"members": [
11+
"serviceAccount:service-1088262075988@container-engine-robot.iam.gserviceaccount.com"
12+
],
13+
"role": "roles/container.serviceAgent"
14+
},
15+
{
16+
"members": [
17+
"serviceAccount:[email protected]"
18+
],
19+
"role": "roles/containerregistry.ServiceAgent"
20+
},
21+
{
22+
"members": [
23+
"serviceAccount:[email protected]",
24+
"serviceAccount:[email protected]"
25+
],
26+
"role": "roles/editor"
27+
},
28+
{
29+
"members": [
30+
"serviceAccount:tf-gke-registry-cluste-l9yw@k8s-infra-project-jedha.iam.gserviceaccount.com",
31+
"serviceAccount:tf-gke-registry-cluste-rz2r@k8s-infra-project-jedha.iam.gserviceaccount.com"
32+
],
33+
"role": "roles/logging.logWriter"
34+
},
35+
{
36+
"members": [
37+
"serviceAccount:tf-gke-registry-cluste-l9yw@k8s-infra-project-jedha.iam.gserviceaccount.com",
38+
"serviceAccount:tf-gke-registry-cluste-rz2r@k8s-infra-project-jedha.iam.gserviceaccount.com"
39+
],
40+
"role": "roles/monitoring.metricWriter"
41+
},
42+
{
43+
"members": [
44+
"serviceAccount:tf-gke-registry-cluste-l9yw@k8s-infra-project-jedha.iam.gserviceaccount.com",
45+
"serviceAccount:tf-gke-registry-cluste-rz2r@k8s-infra-project-jedha.iam.gserviceaccount.com"
46+
],
47+
"role": "roles/monitoring.viewer"
48+
},
49+
{
50+
"members": [
51+
52+
],
53+
"role": "roles/owner"
54+
},
55+
{
56+
"members": [
57+
"serviceAccount:[email protected]"
58+
],
59+
"role": "roles/pubsub.serviceAgent"
60+
},
61+
{
62+
"members": [
63+
"serviceAccount:tf-gke-registry-cluste-l9yw@k8s-infra-project-jedha.iam.gserviceaccount.com",
64+
"serviceAccount:tf-gke-registry-cluste-rz2r@k8s-infra-project-jedha.iam.gserviceaccount.com"
65+
],
66+
"role": "roles/stackdriver.resourceMetadata.writer"
67+
}
68+
],
69+
"version": 1
70+
}
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
{
2+
"disabled": true,
3+
"displayName": "Compute Engine default service account",
4+
"email": "[email protected]",
5+
"name": "projects/k8s-infra-project-jedha/serviceAccounts/[email protected]",
6+
"oauth2ClientId": "106911913404991129722",
7+
"projectId": "k8s-infra-project-jedha",
8+
"uniqueId": "106911913404991129722"
9+
}
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
{}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
{
2+
"displayName": "Terraform-managed service account for cluster registry-cluster-us",
3+
"email": "tf-gke-registry-cluste-l9yw@k8s-infra-project-jedha.iam.gserviceaccount.com",
4+
"name": "projects/k8s-infra-project-jedha/serviceAccounts/tf-gke-registry-cluste-l9yw@k8s-infra-project-jedha.iam.gserviceaccount.com",
5+
"oauth2ClientId": "107487212080222156284",
6+
"projectId": "k8s-infra-project-jedha",
7+
"uniqueId": "107487212080222156284"
8+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
{}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
{
2+
"displayName": "Terraform-managed service account for cluster registry-cluster-us",
3+
"email": "tf-gke-registry-cluste-rz2r@k8s-infra-project-jedha.iam.gserviceaccount.com",
4+
"name": "projects/k8s-infra-project-jedha/serviceAccounts/tf-gke-registry-cluste-rz2r@k8s-infra-project-jedha.iam.gserviceaccount.com",
5+
"oauth2ClientId": "107475807005918167785",
6+
"projectId": "k8s-infra-project-jedha",
7+
"uniqueId": "107475807005918167785"
8+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
{}

audit/projects/k8s-infra-project-jedha/services/bigquery/bigquery.datasets.json

Whitespace-only changes.
Lines changed: 177 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,177 @@
1+
{
2+
"commonInstanceMetadata": {
3+
"items": [
4+
{
5+
"key": "gke-registry-cluster-us-33d4327e-secondary-ranges",
6+
"value": "services:vpc-registry-us:registry-us:registry-cluster-us-services-range,shareable-pods:vpc-registry-us:registry-us:registry-cluster-us-pods-range"
7+
}
8+
],
9+
"kind": "compute#metadata"
10+
},
11+
"creationTimestamp": "2021-07-10T05:35:31.563-07:00",
12+
"defaultNetworkTier": "PREMIUM",
13+
"defaultServiceAccount": "[email protected]",
14+
"id": "1841451747995036412",
15+
"kind": "compute#project",
16+
"name": "k8s-infra-project-jedha",
17+
"quotas": [
18+
{
19+
"limit": 10000,
20+
"metric": "SNAPSHOTS"
21+
},
22+
{
23+
"limit": 30,
24+
"metric": "NETWORKS"
25+
},
26+
{
27+
"limit": 500,
28+
"metric": "FIREWALLS"
29+
},
30+
{
31+
"limit": 5000,
32+
"metric": "IMAGES"
33+
},
34+
{
35+
"limit": 175,
36+
"metric": "STATIC_ADDRESSES"
37+
},
38+
{
39+
"limit": 300,
40+
"metric": "ROUTES"
41+
},
42+
{
43+
"limit": 150,
44+
"metric": "FORWARDING_RULES"
45+
},
46+
{
47+
"limit": 500,
48+
"metric": "TARGET_POOLS"
49+
},
50+
{
51+
"limit": 500,
52+
"metric": "HEALTH_CHECKS"
53+
},
54+
{
55+
"limit": 575,
56+
"metric": "IN_USE_ADDRESSES"
57+
},
58+
{
59+
"limit": 500,
60+
"metric": "TARGET_INSTANCES"
61+
},
62+
{
63+
"limit": 100,
64+
"metric": "TARGET_HTTP_PROXIES"
65+
},
66+
{
67+
"limit": 100,
68+
"metric": "URL_MAPS"
69+
},
70+
{
71+
"limit": 30,
72+
"metric": "BACKEND_SERVICES"
73+
},
74+
{
75+
"limit": 1000,
76+
"metric": "INSTANCE_TEMPLATES"
77+
},
78+
{
79+
"limit": 50,
80+
"metric": "TARGET_VPN_GATEWAYS"
81+
},
82+
{
83+
"limit": 100,
84+
"metric": "VPN_TUNNELS"
85+
},
86+
{
87+
"limit": 30,
88+
"metric": "BACKEND_BUCKETS"
89+
},
90+
{
91+
"limit": 20,
92+
"metric": "ROUTERS"
93+
},
94+
{
95+
"limit": 100,
96+
"metric": "TARGET_SSL_PROXIES"
97+
},
98+
{
99+
"limit": 100,
100+
"metric": "TARGET_HTTPS_PROXIES"
101+
},
102+
{
103+
"limit": 100,
104+
"metric": "SSL_CERTIFICATES"
105+
},
106+
{
107+
"limit": 275,
108+
"metric": "SUBNETWORKS"
109+
},
110+
{
111+
"limit": 100,
112+
"metric": "TARGET_TCP_PROXIES"
113+
},
114+
{
115+
"limit": 10,
116+
"metric": "SECURITY_POLICIES"
117+
},
118+
{
119+
"limit": 200,
120+
"metric": "SECURITY_POLICY_RULES"
121+
},
122+
{
123+
"limit": 1000,
124+
"metric": "XPN_SERVICE_PROJECTS"
125+
},
126+
{
127+
"limit": 150,
128+
"metric": "PACKET_MIRRORINGS"
129+
},
130+
{
131+
"limit": 1000,
132+
"metric": "NETWORK_ENDPOINT_GROUPS"
133+
},
134+
{
135+
"limit": 6,
136+
"metric": "INTERCONNECTS"
137+
},
138+
{
139+
"limit": 5000,
140+
"metric": "GLOBAL_INTERNAL_ADDRESSES"
141+
},
142+
{
143+
"limit": 50,
144+
"metric": "VPN_GATEWAYS"
145+
},
146+
{
147+
"limit": 5000,
148+
"metric": "MACHINE_IMAGES"
149+
},
150+
{
151+
"limit": 20,
152+
"metric": "SECURITY_POLICY_CEVAL_RULES"
153+
},
154+
{
155+
"limit": 50,
156+
"metric": "EXTERNAL_VPN_GATEWAYS"
157+
},
158+
{
159+
"limit": 1,
160+
"metric": "PUBLIC_ADVERTISED_PREFIXES"
161+
},
162+
{
163+
"limit": 10,
164+
"metric": "PUBLIC_DELEGATED_PREFIXES"
165+
},
166+
{
167+
"limit": 1024,
168+
"metric": "STATIC_BYOIP_ADDRESSES"
169+
},
170+
{
171+
"limit": 150,
172+
"metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES"
173+
}
174+
],
175+
"selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-project-jedha",
176+
"xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS"
177+
}

0 commit comments

Comments
 (0)