Skip to main content

GCP Compute Instance Template

A Google Cloud Compute Instance Template is a reusable specification that defines the attributes of virtual machine (VM) instances, such as machine type, boot image, disks, network interfaces, metadata and service accounts. Once created, the template can be referenced by managed instance groups or used ad-hoc to launch identical VMs, ensuring consistency and reducing configuration drift. See the official Google documentation for full details: https://cloud.google.com/compute/docs/instance-templates

Terrafrom Mappings:

  • google_compute_instance_template.name

Supported Methods​

  • GET: Get a gcp-compute-instance-template by its "name"
  • LIST: List all gcp-compute-instance-template
  • SEARCH

gcp-cloud-kms-crypto-key​

If any disks in the template are encrypted with a customer-managed key, the template stores the reference to the corresponding Cloud KMS Crypto Key. This link highlights encryption dependencies that might affect regional availability or key-rotation policies.

gcp-compute-image​

The boot disk of the template is created from a specific Compute Image (custom or public). Overmind links the template to that image so you can trace vulnerabilities or deprecation notices back to all templates that rely on a given image.

gcp-compute-disk​

In addition to the boot disk, a template may define one or more persistent or local disks. Overmind surfaces these relationships so changes to disk snapshots, sizes or encryption settings can be assessed for every template that consumes them.

gcp-compute-instance​

Instances (either standalone or within managed instance groups) that were created from the template retain a reference to it. This link lets you enumerate all running VMs that would inherit changes if the template were updated or replaced.

ip​

When a VM launched from the template is assigned external or internal IP addresses, those IPs become indirectly related to the template. Mapping this relationship helps in topology visualisation and in identifying which templates could lead to public exposure if instantiated.