Quellcode durchsuchen

Terraform and Terragrunt Upgrades - Prod

This upgrades the TF/TG code in Prod env.
Jeremy Cooper [AFS MBP] vor 3 Jahren
Ursprung
Commit
0517a8953e
100 geänderte Dateien mit 294 neuen und 294 gelöschten Zeilen
  1. 3 3
      prod/aws-us-gov/mdr-prod-afs/005-iam/terragrunt.hcl
  2. 3 3
      prod/aws-us-gov/mdr-prod-afs/006-account-standards-regional/us-gov-west-1/terragrunt.hcl
  3. 3 3
      prod/aws-us-gov/mdr-prod-afs/006-account-standards/terragrunt.hcl
  4. 3 3
      prod/aws-us-gov/mdr-prod-afs/007-backups/terragrunt.hcl
  5. 3 3
      prod/aws-us-gov/mdr-prod-afs/010-vpc-splunk/terragrunt.hcl
  6. 3 3
      prod/aws-us-gov/mdr-prod-afs/021-qualys-connector-role/terragrunt.hcl
  7. 3 3
      prod/aws-us-gov/mdr-prod-afs/072-salt-master-inventory-role/terragrunt.hcl
  8. 3 3
      prod/aws-us-gov/mdr-prod-afs/140-splunk-frozen-bucket/terragrunt.hcl
  9. 3 3
      prod/aws-us-gov/mdr-prod-afs/145-splunk-smartstore-s3/terragrunt.hcl
  10. 3 3
      prod/aws-us-gov/mdr-prod-afs/150-splunk-cluster-master/terragrunt.hcl
  11. 3 3
      prod/aws-us-gov/mdr-prod-afs/160-splunk-indexer-cluster/terragrunt.hcl
  12. 3 3
      prod/aws-us-gov/mdr-prod-afs/165-splunk-legacy-hec/terragrunt.hcl
  13. 3 3
      prod/aws-us-gov/mdr-prod-afs/170-splunk-searchhead/terragrunt.hcl
  14. 3 3
      prod/aws-us-gov/mdr-prod-afs/180-splunk-heavy-forwarder/terragrunt.hcl
  15. 3 3
      prod/aws-us-gov/mdr-prod-afs/195-splunk-apps-s3/terragrunt.hcl
  16. 3 3
      prod/aws-us-gov/mdr-prod-afs/360-codebuild-splunk-apps/terragrunt.hcl
  17. 2 2
      prod/aws-us-gov/mdr-prod-afs/account.hcl
  18. 3 3
      prod/aws-us-gov/mdr-prod-bas/005-iam/terragrunt.hcl
  19. 3 3
      prod/aws-us-gov/mdr-prod-bas/006-account-standards-regional/us-gov-west-1/terragrunt.hcl
  20. 3 3
      prod/aws-us-gov/mdr-prod-bas/006-account-standards/terragrunt.hcl
  21. 3 3
      prod/aws-us-gov/mdr-prod-bas/007-backups/terragrunt.hcl
  22. 3 3
      prod/aws-us-gov/mdr-prod-bas/010-vpc-splunk/terragrunt.hcl
  23. 3 3
      prod/aws-us-gov/mdr-prod-bas/021-qualys-connector-role/terragrunt.hcl
  24. 3 3
      prod/aws-us-gov/mdr-prod-bas/072-salt-master-inventory-role/terragrunt.hcl
  25. 3 3
      prod/aws-us-gov/mdr-prod-bas/140-splunk-frozen-bucket/terragrunt.hcl
  26. 3 3
      prod/aws-us-gov/mdr-prod-bas/145-splunk-smartstore-s3/terragrunt.hcl
  27. 3 3
      prod/aws-us-gov/mdr-prod-bas/150-splunk-cluster-master/terragrunt.hcl
  28. 3 3
      prod/aws-us-gov/mdr-prod-bas/160-splunk-indexer-cluster/terragrunt.hcl
  29. 3 3
      prod/aws-us-gov/mdr-prod-bas/170-splunk-searchhead/terragrunt.hcl
  30. 3 3
      prod/aws-us-gov/mdr-prod-bas/180-splunk-heavy-forwarder/terragrunt.hcl
  31. 3 3
      prod/aws-us-gov/mdr-prod-bas/195-splunk-apps-s3/terragrunt.hcl
  32. 3 3
      prod/aws-us-gov/mdr-prod-bas/360-codebuild-splunk-apps/terragrunt.hcl
  33. 2 2
      prod/aws-us-gov/mdr-prod-bas/account.hcl
  34. 3 3
      prod/aws-us-gov/mdr-prod-c2/005-account-standards-c2/terragrunt.hcl
  35. 3 3
      prod/aws-us-gov/mdr-prod-c2/005-iam/terragrunt.hcl
  36. 3 3
      prod/aws-us-gov/mdr-prod-c2/006-account-standards-regional/us-gov-west-1/terragrunt.hcl
  37. 3 3
      prod/aws-us-gov/mdr-prod-c2/006-account-standards/terragrunt.hcl
  38. 3 3
      prod/aws-us-gov/mdr-prod-c2/007-backups/terragrunt.hcl
  39. 3 3
      prod/aws-us-gov/mdr-prod-c2/008-transit-gateway-hub/terragrunt.hcl
  40. 3 3
      prod/aws-us-gov/mdr-prod-c2/010-vpc-access/terragrunt.hcl
  41. 3 3
      prod/aws-us-gov/mdr-prod-c2/010-vpc-portal/terragrunt.hcl
  42. 3 3
      prod/aws-us-gov/mdr-prod-c2/010-vpc-private-services/terragrunt.hcl
  43. 3 3
      prod/aws-us-gov/mdr-prod-c2/010-vpc-public/terragrunt.hcl
  44. 3 3
      prod/aws-us-gov/mdr-prod-c2/010-vpc-scanners/terragrunt.hcl
  45. 3 3
      prod/aws-us-gov/mdr-prod-c2/010-vpc-splunk/terragrunt.hcl
  46. 3 3
      prod/aws-us-gov/mdr-prod-c2/010-vpc-system-services/terragrunt.hcl
  47. 3 3
      prod/aws-us-gov/mdr-prod-c2/011-private-dns-zone/terragrunt.hcl
  48. 3 3
      prod/aws-us-gov/mdr-prod-c2/019-attach-transit-gateway-to-hub-account/terragrunt.hcl
  49. 3 3
      prod/aws-us-gov/mdr-prod-c2/021-qualys-connector-role/terragrunt.hcl
  50. 3 3
      prod/aws-us-gov/mdr-prod-c2/023-dns-resolver-instance-2/terragrunt.hcl
  51. 3 3
      prod/aws-us-gov/mdr-prod-c2/023-dns-resolver-instance/terragrunt.hcl
  52. 3 3
      prod/aws-us-gov/mdr-prod-c2/024-dns-resolver-dns-entry/terragrunt.hcl
  53. 3 3
      prod/aws-us-gov/mdr-prod-c2/032-qualys-scanners/terragrunt.hcl
  54. 3 3
      prod/aws-us-gov/mdr-prod-c2/070-instance-bastion/terragrunt.hcl
  55. 3 3
      prod/aws-us-gov/mdr-prod-c2/071-instance-salt-master/terragrunt.hcl
  56. 3 3
      prod/aws-us-gov/mdr-prod-c2/072-salt-master-inventory-role/terragrunt.hcl
  57. 3 3
      prod/aws-us-gov/mdr-prod-c2/080-instance-proxy-server/terragrunt.hcl
  58. 3 3
      prod/aws-us-gov/mdr-prod-c2/080-instance-repo-server/terragrunt.hcl
  59. 3 3
      prod/aws-us-gov/mdr-prod-c2/085-rhsso/terragrunt.hcl
  60. 3 3
      prod/aws-us-gov/mdr-prod-c2/087-amazon-vpn/terragrunt.hcl
  61. 3 3
      prod/aws-us-gov/mdr-prod-c2/090-instance-github/terragrunt.hcl
  62. 3 3
      prod/aws-us-gov/mdr-prod-c2/090-instance-mailrelay/terragrunt.hcl
  63. 3 3
      prod/aws-us-gov/mdr-prod-c2/090-instance-openvpn/terragrunt.hcl
  64. 3 3
      prod/aws-us-gov/mdr-prod-c2/090-instance-teleport/terragrunt.hcl
  65. 2 2
      prod/aws-us-gov/mdr-prod-c2/090-instance-vault/README.md
  66. 3 3
      prod/aws-us-gov/mdr-prod-c2/090-instance-vault/terragrunt.hcl
  67. 3 3
      prod/aws-us-gov/mdr-prod-c2/095-instance-sensu/terragrunt.hcl
  68. 3 3
      prod/aws-us-gov/mdr-prod-c2/096-sensu-configuration/terragrunt.hcl
  69. 3 3
      prod/aws-us-gov/mdr-prod-c2/099-vault-configuration/terragrunt.hcl
  70. 3 3
      prod/aws-us-gov/mdr-prod-c2/130-kinesis_firehose_waf_logs/terragrunt.hcl
  71. 3 3
      prod/aws-us-gov/mdr-prod-c2/140-splunk-frozen-bucket/terragrunt.hcl
  72. 3 3
      prod/aws-us-gov/mdr-prod-c2/145-splunk-smartstore-s3/terragrunt.hcl
  73. 3 3
      prod/aws-us-gov/mdr-prod-c2/150-splunk-cluster-master/terragrunt.hcl
  74. 3 3
      prod/aws-us-gov/mdr-prod-c2/160-splunk-indexer-cluster/terragrunt.hcl
  75. 3 3
      prod/aws-us-gov/mdr-prod-c2/165-splunk-legacy-hec/terragrunt.hcl
  76. 3 3
      prod/aws-us-gov/mdr-prod-c2/170-splunk-searchhead/terragrunt.hcl
  77. 3 3
      prod/aws-us-gov/mdr-prod-c2/180-splunk-heavy-forwarder/terragrunt.hcl
  78. 3 3
      prod/aws-us-gov/mdr-prod-c2/190-splunk-fm-shared-search/terragrunt.hcl
  79. 3 3
      prod/aws-us-gov/mdr-prod-c2/190-splunk-mc/terragrunt.hcl
  80. 3 3
      prod/aws-us-gov/mdr-prod-c2/190-splunk-qcompliance-searchhead/terragrunt.hcl
  81. 3 3
      prod/aws-us-gov/mdr-prod-c2/195-splunk-apps-s3/terragrunt.hcl
  82. 3 3
      prod/aws-us-gov/mdr-prod-c2/200-customer-portal/terragrunt.hcl
  83. 3 3
      prod/aws-us-gov/mdr-prod-c2/205-customer-portal-lambda/terragrunt.hcl
  84. 3 3
      prod/aws-us-gov/mdr-prod-c2/210-rds-jira/terragrunt.hcl
  85. 3 3
      prod/aws-us-gov/mdr-prod-c2/220-instance-jira/terragrunt.hcl
  86. 3 3
      prod/aws-us-gov/mdr-prod-c2/250-phantom/terragrunt.hcl
  87. 3 3
      prod/aws-us-gov/mdr-prod-c2/255-phantom-archive-s3/terragrunt.hcl
  88. 3 3
      prod/aws-us-gov/mdr-prod-c2/270-nessus-security-center/terragrunt.hcl
  89. 3 3
      prod/aws-us-gov/mdr-prod-c2/275-nessus-security-managers/terragrunt.hcl
  90. 3 3
      prod/aws-us-gov/mdr-prod-c2/275-nessus-security-scanners/terragrunt.hcl
  91. 3 3
      prod/aws-us-gov/mdr-prod-c2/360-codebuild-splunk-apps/terragrunt.hcl
  92. 2 2
      prod/aws-us-gov/mdr-prod-c2/370-moose-cloudwatch-logs/terragrunt.hcl
  93. 1 1
      prod/aws-us-gov/mdr-prod-c2/account.hcl
  94. 3 3
      prod/aws-us-gov/mdr-prod-ca-c19/005-iam/terragrunt.hcl
  95. 3 3
      prod/aws-us-gov/mdr-prod-ca-c19/006-account-standards-regional/us-gov-west-1/terragrunt.hcl
  96. 3 3
      prod/aws-us-gov/mdr-prod-ca-c19/006-account-standards/terragrunt.hcl
  97. 3 3
      prod/aws-us-gov/mdr-prod-ca-c19/007-backups/terragrunt.hcl
  98. 3 3
      prod/aws-us-gov/mdr-prod-ca-c19/010-vpc-splunk/terragrunt.hcl
  99. 3 3
      prod/aws-us-gov/mdr-prod-ca-c19/021-qualys-connector-role/terragrunt.hcl
  100. 3 3
      prod/aws-us-gov/mdr-prod-ca-c19/072-salt-master-inventory-role/terragrunt.hcl

+ 3 - 3
prod/aws-us-gov/mdr-prod-afs/005-iam/terragrunt.hcl

@@ -41,7 +41,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.0.0"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -58,5 +58,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-afs/006-account-standards-regional/us-gov-west-1/terragrunt.hcl

@@ -20,7 +20,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.0.0"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -58,5 +58,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-afs/006-account-standards/terragrunt.hcl

@@ -14,7 +14,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.0.0"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.5.17"
 }
 
 dependency "c2_account_standards" {
@@ -36,5 +36,5 @@ inputs = {
   }
   cloudtrail_key_arn = dependency.c2_account_standards.outputs.cloudtrail_logging_bucket.kms_key_id
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-afs/007-backups/terragrunt.hcl

@@ -14,7 +14,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/backups?ref=v3.2.11"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/backups?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -31,5 +31,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-afs/010-vpc-splunk/terragrunt.hcl

@@ -18,7 +18,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/standard_vpc?ref=v3.2.15"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/standard_vpc?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -45,5 +45,5 @@ inputs = {
   }
   accept_tgw_invitation = true
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-afs/021-qualys-connector-role/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/qualys_connector_role?ref=v3.0.0"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/qualys_connector_role?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -31,5 +31,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-afs/072-salt-master-inventory-role/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/salt_master_inventory_role?ref=v3.0.0"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/salt_master_inventory_role?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -31,5 +31,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-afs/140-splunk-frozen-bucket/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/frozen_s3_bucket?ref=v3.4.10"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/frozen_s3_bucket?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -31,5 +31,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-afs/145-splunk-smartstore-s3/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/smartstore_s3_bucket?ref=v3.4.10"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/smartstore_s3_bucket?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -31,5 +31,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-afs/150-splunk-cluster-master/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/cluster_master?ref=v3.4.10"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/cluster_master?ref=v3.5.17"
 }
 
 dependency "vpc" {
@@ -41,5 +41,5 @@ inputs = {
   azs = dependency.vpc.outputs.azs
   subnets = dependency.vpc.outputs.private_subnets
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-afs/160-splunk-indexer-cluster/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/indexer_cluster?ref=v3.5.5"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/indexer_cluster?ref=v3.5.17"
 }
 
 dependency "vpc" {
@@ -43,5 +43,5 @@ inputs = {
   public_subnets  = dependency.vpc.outputs.public_subnets
   hec_listen_443 = true
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-afs/165-splunk-legacy-hec/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/legacy_hec?ref=v3.4.10"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/legacy_hec?ref=v3.5.17"
 }
 
 generate "provider-legacy" {
@@ -68,5 +68,5 @@ inputs = {
   private_subnets  = dependency.vpc.outputs.private_subnets
   elb_attachments = dependency.indexers.outputs.elb_attachments
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-afs/170-splunk-searchhead/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/searchhead?ref=v3.4.10"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/searchhead?ref=v3.5.17"
 }
 
 dependency "vpc" {
@@ -41,5 +41,5 @@ inputs = {
   azs = dependency.vpc.outputs.azs
   subnets = dependency.vpc.outputs.private_subnets
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-afs/180-splunk-heavy-forwarder/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/heavy_forwarder?ref=v3.4.10"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/heavy_forwarder?ref=v3.5.17"
 }
 
 dependency "vpc" {
@@ -41,5 +41,5 @@ inputs = {
   azs = dependency.vpc.outputs.azs
   subnets = dependency.vpc.outputs.private_subnets
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-afs/195-splunk-apps-s3/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/app_s3_bucket?ref=v3.5.1"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/app_s3_bucket?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -32,5 +32,5 @@ inputs = {
   }
   has_cust_sh = false
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-afs/360-codebuild-splunk-apps/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/codebuild_splunk_apps?ref=v3.5.6"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/codebuild_splunk_apps?ref=v3.5.17"
 }
 
 #Github specific provider
@@ -72,5 +72,5 @@ inputs = {
   source_version = "develop"
   enable_webhooks = false
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 2 - 2
prod/aws-us-gov/mdr-prod-afs/account.hcl

@@ -26,7 +26,7 @@ locals {
   } 
   c2_account_standards_path = "../../mdr-prod-c2/005-account-standards-c2" # TODO: Subsitute with test or prod
 
-  # For CIDR assignment, see https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
+  # For CIDR assignment, see https://github.xdr.accenturefederalcyber.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
   vpc_info = { 
     "vpc-splunk" = {
        "name" = "vpc-splunk",
@@ -36,7 +36,7 @@ locals {
     }
   } 
 
-  # Qualys Connector - See https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/Qualys
+  # Qualys Connector - See https://github.xdr.accenturefederalcyber.com/mdr-engineering/msoc-infrastructure/wiki/Qualys
   qualys_connector_externalid = "1628694246292" # Needs to come from the qualys console
 
   # End of TODO

+ 3 - 3
prod/aws-us-gov/mdr-prod-bas/005-iam/terragrunt.hcl

@@ -41,7 +41,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.0.0"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -58,5 +58,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-bas/006-account-standards-regional/us-gov-west-1/terragrunt.hcl

@@ -20,7 +20,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.0.0"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -58,5 +58,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-bas/006-account-standards/terragrunt.hcl

@@ -14,7 +14,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.0.0"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.5.17"
 }
 
 dependency "c2_account_standards" {
@@ -36,5 +36,5 @@ inputs = {
   }
   cloudtrail_key_arn = dependency.c2_account_standards.outputs.cloudtrail_logging_bucket.kms_key_id
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-bas/007-backups/terragrunt.hcl

@@ -14,7 +14,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/backups?ref=v3.2.11"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/backups?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -31,5 +31,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-bas/010-vpc-splunk/terragrunt.hcl

@@ -18,7 +18,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/standard_vpc?ref=v3.2.15"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/standard_vpc?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -45,5 +45,5 @@ inputs = {
   }
   accept_tgw_invitation = true
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-bas/021-qualys-connector-role/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/qualys_connector_role?ref=v3.0.0"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/qualys_connector_role?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -31,5 +31,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-bas/072-salt-master-inventory-role/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/salt_master_inventory_role?ref=v3.0.0"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/salt_master_inventory_role?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -31,5 +31,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-bas/140-splunk-frozen-bucket/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/frozen_s3_bucket?ref=v3.4.10"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/frozen_s3_bucket?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -31,5 +31,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-bas/145-splunk-smartstore-s3/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/smartstore_s3_bucket?ref=v3.4.10"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/smartstore_s3_bucket?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -31,5 +31,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-bas/150-splunk-cluster-master/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/cluster_master?ref=v3.4.10"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/cluster_master?ref=v3.5.17"
 }
 
 dependency "vpc" {
@@ -41,5 +41,5 @@ inputs = {
   azs = dependency.vpc.outputs.azs
   subnets = dependency.vpc.outputs.private_subnets
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-bas/160-splunk-indexer-cluster/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/indexer_cluster?ref=v3.5.5"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/indexer_cluster?ref=v3.5.17"
 }
 
 dependency "vpc" {
@@ -42,5 +42,5 @@ inputs = {
   private_subnets = dependency.vpc.outputs.private_subnets
   public_subnets  = dependency.vpc.outputs.public_subnets
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-bas/170-splunk-searchhead/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/searchhead?ref=v3.4.10"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/searchhead?ref=v3.5.17"
 }
 
 dependency "vpc" {
@@ -41,5 +41,5 @@ inputs = {
   azs = dependency.vpc.outputs.azs
   subnets = dependency.vpc.outputs.private_subnets
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-bas/180-splunk-heavy-forwarder/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/heavy_forwarder?ref=v3.4.10"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/heavy_forwarder?ref=v3.5.17"
 }
 
 dependency "vpc" {
@@ -41,5 +41,5 @@ inputs = {
   azs = dependency.vpc.outputs.azs
   subnets = dependency.vpc.outputs.private_subnets
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-bas/195-splunk-apps-s3/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/app_s3_bucket?ref=v3.5.1"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/app_s3_bucket?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -32,5 +32,5 @@ inputs = {
   }
   has_cust_sh = false
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-bas/360-codebuild-splunk-apps/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/codebuild_splunk_apps?ref=v3.5.6"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/codebuild_splunk_apps?ref=v3.5.17"
 }
 
 #Github specific provider
@@ -72,5 +72,5 @@ inputs = {
   source_version = "develop"
   enable_webhooks = false
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 2 - 2
prod/aws-us-gov/mdr-prod-bas/account.hcl

@@ -20,7 +20,7 @@ locals {
   } 
   c2_account_standards_path = "../../mdr-prod-c2/005-account-standards-c2" # TODO: Subsitute with test or prod
 
-  # For CIDR assignment, see https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
+  # For CIDR assignment, see https://github.xdr.accenturefederalcyber.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
   vpc_info = { 
     "vpc-splunk" = {
        "name" = "vpc-splunk",
@@ -30,7 +30,7 @@ locals {
     }
   } 
 
-  # Qualys Connector - See https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/Qualys
+  # Qualys Connector - See https://github.xdr.accenturefederalcyber.com/mdr-engineering/msoc-infrastructure/wiki/Qualys
   qualys_connector_externalid = "1620314156668" # Needs to come from the qualys console
 
   # End of TODO

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/005-account-standards-c2/terragrunt.hcl

@@ -15,7 +15,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_c2?ref=v3.4.11"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_c2?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -32,5 +32,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/005-iam/terragrunt.hcl

@@ -18,7 +18,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.0.0"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -35,5 +35,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/006-account-standards-regional/us-gov-west-1/terragrunt.hcl

@@ -20,7 +20,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.0.0"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -58,5 +58,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/006-account-standards/terragrunt.hcl

@@ -14,7 +14,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.0.0"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.5.17"
 }
 
 dependency "c2_account_standards" {
@@ -36,5 +36,5 @@ inputs = {
   }
   cloudtrail_key_arn = dependency.c2_account_standards.outputs.cloudtrail_logging_bucket.kms_key_id
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/007-backups/terragrunt.hcl

@@ -14,7 +14,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/backups?ref=v3.2.11"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/backups?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -31,5 +31,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/008-transit-gateway-hub/terragrunt.hcl

@@ -15,7 +15,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/transit_gateway_hub?ref=v3.0.0"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/transit_gateway_hub?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -34,5 +34,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/010-vpc-access/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/standard_vpc?ref=v3.2.15"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/standard_vpc?ref=v3.5.17"
 }
 
 dependency "transit_gateway" {
@@ -40,5 +40,5 @@ inputs = {
   }
   enable_nat_gateway = true # Needed for outbound LDAP access
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/010-vpc-portal/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/standard_vpc?ref=v3.2.15"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/standard_vpc?ref=v3.5.17"
 }
 
 dependency "transit_gateway" {
@@ -40,5 +40,5 @@ inputs = {
   }
   enable_nat_gateway = true # Needed for outbound LDAP access
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/010-vpc-private-services/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/standard_vpc?ref=v3.2.15"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/standard_vpc?ref=v3.5.17"
 }
 
 dependency "transit_gateway" {
@@ -39,5 +39,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/010-vpc-public/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/standard_vpc?ref=v3.2.15"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/standard_vpc?ref=v3.5.17"
 }
 
 dependency "transit_gateway" {
@@ -40,5 +40,5 @@ inputs = {
   }
   enable_nat_gateway = true # for letsencrypt for ghe
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/010-vpc-scanners/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/standard_vpc?ref=v3.2.15"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/standard_vpc?ref=v3.5.17"
 }
 
 dependency "transit_gateway" {
@@ -41,5 +41,5 @@ inputs = {
   }
   enable_nat_gateway = true  #needed for Nessus scanners to scan customer portal.
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/010-vpc-splunk/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/standard_vpc?ref=v3.2.15"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/standard_vpc?ref=v3.5.17"
 }
 
 dependency "transit_gateway" {
@@ -39,5 +39,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/010-vpc-system-services/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/standard_vpc?ref=v3.2.15"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/standard_vpc?ref=v3.5.17"
 }
 
 dependency "transit_gateway" {
@@ -41,5 +41,5 @@ inputs = {
   enable_nat_gateway = true # most VPCs have no need
   allow_any_to_endpoints = true # DNS servers are in this vpc, so other vpcs may need access
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/011-private-dns-zone/terragrunt.hcl

@@ -8,7 +8,7 @@ locals {
 
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/dns/private_dns?ref=v3.0.0"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/dns/private_dns?ref=v3.5.17"
 }
 
 dependency "vpc_system_services" {
@@ -26,5 +26,5 @@ inputs = {
   vpcs = [ dependency.vpc_system_services.outputs.vpc_id ] # can add more if desired
   subnets = dependency.vpc_system_services.outputs.private_subnets
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/019-attach-transit-gateway-to-hub-account/terragrunt.hcl

@@ -24,7 +24,7 @@ dependency "vpc_system_services" {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/transit_gateway_client?ref=v3.0.0"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/transit_gateway_client?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -47,5 +47,5 @@ inputs = {
   subnets = dependency.vpc_system_services.outputs.private_subnets
   route_tables = concat(dependency.vpc_system_services.outputs.private_route_tables, dependency.vpc_system_services.outputs.public_route_tables)
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/021-qualys-connector-role/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/qualys_connector_role?ref=v3.0.0"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/qualys_connector_role?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -31,5 +31,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/023-dns-resolver-instance-2/terragrunt.hcl

@@ -19,7 +19,7 @@ dependency "vpc_system_services" {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/dns/resolver_instance?ref=v3.2.6"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/dns/resolver_instance?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -46,5 +46,5 @@ inputs = {
   reverse_enabled = true # Set to 'true' on second run
   instance_number = 2
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/023-dns-resolver-instance/terragrunt.hcl

@@ -19,7 +19,7 @@ dependency "vpc_system_services" {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/dns/resolver_instance?ref=v3.2.6"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/dns/resolver_instance?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -45,5 +45,5 @@ inputs = {
   vpc_id = dependency.vpc_system_services.outputs.vpc_id
   reverse_enabled = true # Set to 'true' on second run
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/024-dns-resolver-dns-entry/terragrunt.hcl

@@ -31,7 +31,7 @@ dependency "resolver-2" {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//submodules/dns/private_A_record?ref=v3.0.0"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//submodules/dns/private_A_record?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -52,5 +52,5 @@ inputs = {
   ip_addresses = [ dependency.resolver-1.outputs.instance_private_ip, dependency.resolver-2.outputs.instance_private_ip ]
   reverse_enabled = false
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/032-qualys-scanners/terragrunt.hcl

@@ -20,7 +20,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/qualys_scanners?ref=v3.0.0"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/qualys_scanners?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -47,5 +47,5 @@ inputs = {
   personalization_codes = local.account_vars.locals.qualys_personalization_codes
 
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/070-instance-bastion/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/bastion?ref=v3.1.1"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/bastion?ref=v3.5.17"
 }
 
 dependency "vpc-access" {
@@ -45,5 +45,5 @@ inputs = {
   azs = dependency.vpc-access.outputs.azs
   subnets = dependency.vpc-access.outputs.public_subnets
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/071-instance-salt-master/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/salt_master?ref=v3.1.1"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/salt_master?ref=v3.5.17"
 }
 
 dependency "vpc-system-services" {
@@ -45,5 +45,5 @@ inputs = {
   azs = dependency.vpc-system-services.outputs.azs
   subnets = dependency.vpc-system-services.outputs.public_subnets
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/072-salt-master-inventory-role/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/salt_master_inventory_role?ref=v3.0.0"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/salt_master_inventory_role?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -31,5 +31,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/080-instance-proxy-server/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/proxy_server?ref=v3.0.0"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/proxy_server?ref=v3.5.17"
 }
 
 dependency "vpc-system-services" {
@@ -40,5 +40,5 @@ inputs = {
   azs = dependency.vpc-system-services.outputs.azs
   subnets = dependency.vpc-system-services.outputs.public_subnets
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/080-instance-repo-server/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/repo_server?ref=v3.1.1"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/repo_server?ref=v3.5.17"
 }
 
 dependency "vpc-system-services" {
@@ -45,5 +45,5 @@ inputs = {
   azs = dependency.vpc-system-services.outputs.azs
   subnets = dependency.vpc-system-services.outputs.public_subnets
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/085-rhsso/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/rhsso?ref=v3.5.12"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/rhsso?ref=v3.5.17"
 }
 
 dependency "vpc-public" {
@@ -41,5 +41,5 @@ inputs = {
   public_subnets = dependency.vpc-public.outputs.public_subnets
   private_subnets = dependency.vpc-public.outputs.private_subnets
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/087-amazon-vpn/terragrunt.hcl

@@ -16,7 +16,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/aws_client_vpn?ref=v3.4.8"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/aws_client_vpn?ref=v3.5.17"
 }
 
 dependency "vpc-access" {
@@ -44,5 +44,5 @@ inputs = {
   public_subnets = dependency.vpc-access.outputs.public_subnets
   split_tunnel = false
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/090-instance-github/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/github?ref=v3.3.3"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/github?ref=v3.5.17"
 }
 
 dependency "vpc" {
@@ -54,5 +54,5 @@ inputs = {
   public_subnets = dependency.vpc.outputs.public_subnets
   private_subnets = dependency.vpc.outputs.private_subnets
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/090-instance-mailrelay/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/mailrelay?ref=v3.1.1"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/mailrelay?ref=v3.5.17"
 }
 
 dependency "vpc-system-services" {
@@ -63,5 +63,5 @@ inputs = {
   azs = dependency.vpc-system-services.outputs.azs
   subnets = dependency.vpc-system-services.outputs.private_subnets
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/090-instance-openvpn/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/openvpn?ref=v3.0.0"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/openvpn?ref=v3.5.17"
 }
 
 dependency "vpc-access" {
@@ -41,5 +41,5 @@ inputs = {
   subnets = dependency.vpc-access.outputs.private_subnets
   public_subnets = dependency.vpc-access.outputs.public_subnets
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/090-instance-teleport/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/teleport-single-instance?ref=v3.1.1"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/teleport-single-instance?ref=v3.5.17"
 }
 
 dependency "vpc-system-services" {
@@ -45,5 +45,5 @@ inputs = {
   azs = dependency.vpc-system-services.outputs.azs
   subnets = dependency.vpc-system-services.outputs.public_subnets
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 2 - 2
prod/aws-us-gov/mdr-prod-c2/090-instance-vault/README.md

@@ -33,9 +33,9 @@
 
 For additional Vault documentation see these locations:
 
-https://github.mdr.defpoint.com/mdr-engineering/infrastructure-notes/blob/master/Vault%20Notes.md
+https://github.xdr.accenturefederalcyber.com/mdr-engineering/infrastructure-notes/blob/master/Vault%20Notes.md
 
-https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/blob/develop/salt/fileroots/vault/README.md
+https://github.xdr.accenturefederalcyber.com/mdr-engineering/msoc-infrastructure/blob/develop/salt/fileroots/vault/README.md
 
 ## To apply without putting your junk in the terragrunt.hcl
 

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/090-instance-vault/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/vault?ref=v3.1.1"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/vault?ref=v3.5.17"
 }
 
 dependency "vpc-system-services" {
@@ -58,5 +58,5 @@ inputs = {
   azs = dependency.vpc-system-services.outputs.azs
   subnets = dependency.vpc-system-services.outputs.private_subnets
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/095-instance-sensu/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/sensu?ref=v3.5.11"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/sensu?ref=v3.5.17"
 }
 
 dependency "vpc-system-services" {
@@ -42,5 +42,5 @@ inputs = {
   private_subnets = dependency.vpc-system-services.outputs.private_subnets
   public_subnets = dependency.vpc-system-services.outputs.public_subnets
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/096-sensu-configuration/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/sensu-configuration?ref=v3.5.13"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/sensu-configuration?ref=v3.5.17"
 }
 
 dependency "vpc-system-services" {
@@ -58,5 +58,5 @@ inputs = {
   azs = dependency.vpc-system-services.outputs.azs
   subnets = dependency.vpc-system-services.outputs.private_subnets
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/099-vault-configuration/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/vault-configuration?ref=v3.4.2"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/vault-configuration?ref=v3.5.17"
 }
 
 dependency "vpc-system-services" {
@@ -86,5 +86,5 @@ inputs = {
     }
   }
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/130-kinesis_firehose_waf_logs/terragrunt.hcl

@@ -14,7 +14,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/kinesis_firehose_waf_logs?ref=v3.0.0"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/kinesis_firehose_waf_logs?ref=v3.5.17"
 }
 
 dependency "c2_account_standards" {
@@ -36,5 +36,5 @@ inputs = {
   }
   cloudtrail_key_arn = dependency.c2_account_standards.outputs.cloudtrail_logging_bucket.kms_key_id
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/140-splunk-frozen-bucket/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/frozen_s3_bucket?ref=v3.4.10"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/frozen_s3_bucket?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -31,5 +31,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/145-splunk-smartstore-s3/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/smartstore_s3_bucket?ref=v3.4.10"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/smartstore_s3_bucket?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -31,5 +31,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/150-splunk-cluster-master/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/cluster_master?ref=v3.4.10"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/cluster_master?ref=v3.5.17"
 }
 
 dependency "vpc" {
@@ -46,5 +46,5 @@ inputs = {
   azs = dependency.vpc.outputs.azs
   subnets = dependency.vpc.outputs.private_subnets
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/160-splunk-indexer-cluster/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/indexer_cluster?ref=v3.5.5"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/indexer_cluster?ref=v3.5.17"
 }
 
 dependency "vpc" {
@@ -59,5 +59,5 @@ inputs = {
   private_subnets = dependency.vpc.outputs.private_subnets
   public_subnets  = dependency.vpc.outputs.public_subnets
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/165-splunk-legacy-hec/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/legacy_hec?ref=v3.4.10"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/legacy_hec?ref=v3.5.17"
 }
 
 generate "provider-legacy" {
@@ -68,5 +68,5 @@ inputs = {
   private_subnets  = dependency.vpc.outputs.private_subnets
   elb_attachments = dependency.indexers.outputs.elb_attachments
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/170-splunk-searchhead/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/searchhead?ref=v3.4.10"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/searchhead?ref=v3.5.17"
 }
 
 dependency "vpc" {
@@ -46,5 +46,5 @@ inputs = {
   azs = dependency.vpc.outputs.azs
   subnets = dependency.vpc.outputs.private_subnets
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/180-splunk-heavy-forwarder/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/heavy_forwarder?ref=v3.4.10"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/heavy_forwarder?ref=v3.5.17"
 }
 
 dependency "vpc" {
@@ -41,5 +41,5 @@ inputs = {
   azs = dependency.vpc.outputs.azs
   subnets = dependency.vpc.outputs.private_subnets
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/190-splunk-fm-shared-search/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/searchhead?ref=v3.4.10"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/searchhead?ref=v3.5.17"
 }
 
 dependency "vpc" {
@@ -49,5 +49,5 @@ inputs = {
   subnets = dependency.vpc.outputs.private_subnets
   create_instance_profile = false
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/190-splunk-mc/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/searchhead?ref=v3.4.10"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/searchhead?ref=v3.5.17"
 }
 
 dependency "vpc" {
@@ -49,5 +49,5 @@ inputs = {
   subnets = dependency.vpc.outputs.private_subnets
   create_instance_profile = false
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/190-splunk-qcompliance-searchhead/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/searchhead?ref=v3.4.10"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/searchhead?ref=v3.5.17"
 }
 
 dependency "vpc" {
@@ -42,5 +42,5 @@ inputs = {
   subnets = dependency.vpc.outputs.private_subnets
   create_instance_profile = false
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/195-splunk-apps-s3/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/app_s3_bucket?ref=v3.5.1"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/app_s3_bucket?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -32,5 +32,5 @@ inputs = {
   }
   has_cust_sh = false
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/200-customer-portal/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/customer_portal?ref=v3.5.5"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/customer_portal?ref=v3.5.17"
 }
 
 dependency "vpc" {
@@ -58,5 +58,5 @@ inputs = {
   proxy_public_ip = dependency.proxy.outputs.instance_public_ip
   nat_public_ips = dependency.vpc-scanners.outputs.nat_public_ips
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/205-customer-portal-lambda/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/customer_portal_lambda?ref=v3.4.6"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/customer_portal_lambda?ref=v3.5.17"
 }
 
 dependency "vpc-system-services" {
@@ -50,5 +50,5 @@ inputs = {
     "CUSTOMER_13_NAME"       = "DGI"
   }
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/210-rds-jira/terragrunt.hcl

@@ -15,7 +15,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/jira/rds_jira?ref=v3.5.15"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/jira/rds_jira?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -40,5 +40,5 @@ inputs = {
   vpc_id = dependency.vpc.outputs.vpc_id
   subnets = dependency.vpc.outputs.private_subnets
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/220-instance-jira/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/jira/instance_jira?ref=v3.5.15"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/jira/instance_jira?ref=v3.5.17"
 }
 
 dependency "vpc" {
@@ -51,5 +51,5 @@ inputs = {
   private_subnets = dependency.vpc.outputs.private_subnets
   rds_sg = dependency.rds.outputs.security_group_id
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/250-phantom/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/phantom?ref=v3.3.7"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/phantom?ref=v3.5.17"
 }
 
 dependency "vpc" {
@@ -45,5 +45,5 @@ inputs = {
   azs = dependency.vpc.outputs.azs
   public_subnets = dependency.vpc.outputs.public_subnets # Phantom is on a PUBLIC subnet for direct comm
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/255-phantom-archive-s3/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/phantom_s3_bucket?ref=v3.3.7"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/phantom_s3_bucket?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -31,5 +31,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/270-nessus-security-center/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/nessus/instance_security_center?ref=v3.1.1"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/nessus/instance_security_center?ref=v3.5.17"
 }
 
 dependency "vpc" {
@@ -45,5 +45,5 @@ inputs = {
   public_subnets = dependency.vpc.outputs.public_subnets
   private_subnets = dependency.vpc.outputs.private_subnets
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/275-nessus-security-managers/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/nessus/instance_nessus_manager?ref=v3.1.1"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/nessus/instance_nessus_manager?ref=v3.5.17"
 }
 
 dependency "vpc" {
@@ -45,5 +45,5 @@ inputs = {
   public_subnets = dependency.vpc.outputs.public_subnets
   private_subnets = dependency.vpc.outputs.private_subnets
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/275-nessus-security-scanners/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/nessus/instance_nessus_scanner?ref=v3.1.1"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/nessus/instance_nessus_scanner?ref=v3.5.17"
 }
 
 dependency "vpc" {
@@ -45,5 +45,5 @@ inputs = {
   public_subnets = dependency.vpc.outputs.public_subnets
   private_subnets = dependency.vpc.outputs.private_subnets
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-c2/360-codebuild-splunk-apps/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/codebuild_splunk_apps?ref=v3.5.6"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/codebuild_splunk_apps?ref=v3.5.17"
 }
 
 #Github specific provider
@@ -72,5 +72,5 @@ inputs = {
   source_version = "develop"
   enable_webhooks = false
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 2 - 2
prod/aws-us-gov/mdr-prod-c2/370-moose-cloudwatch-logs/terragrunt.hcl

@@ -35,5 +35,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 1 - 1
prod/aws-us-gov/mdr-prod-c2/account.hcl

@@ -8,7 +8,7 @@ locals {
   splunk_prefix = "moose"
   splunk_private_hec = true # True if the customer needs a private HTTP Event Collector such as for ALSI
   
-  # For CIDR assignment, see https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
+  # For CIDR assignment, see https://github.xdr.accenturefederalcyber.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
   standard_vpc_cidr = "10.40.0.0/22"
 
   splunk_data_sources = [

+ 3 - 3
prod/aws-us-gov/mdr-prod-ca-c19/005-iam/terragrunt.hcl

@@ -41,7 +41,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.0.0"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -58,5 +58,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-ca-c19/006-account-standards-regional/us-gov-west-1/terragrunt.hcl

@@ -20,7 +20,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.0.0"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -58,5 +58,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-ca-c19/006-account-standards/terragrunt.hcl

@@ -14,7 +14,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.0.0"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.5.17"
 }
 
 dependency "c2_account_standards" {
@@ -36,5 +36,5 @@ inputs = {
   }
   cloudtrail_key_arn = dependency.c2_account_standards.outputs.cloudtrail_logging_bucket.kms_key_id
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-ca-c19/007-backups/terragrunt.hcl

@@ -14,7 +14,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/backups?ref=v3.2.11"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/backups?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -31,5 +31,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-ca-c19/010-vpc-splunk/terragrunt.hcl

@@ -18,7 +18,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/standard_vpc?ref=v3.2.15"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/standard_vpc?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -45,5 +45,5 @@ inputs = {
   }
   accept_tgw_invitation = true
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-ca-c19/021-qualys-connector-role/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/qualys_connector_role?ref=v3.0.0"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/qualys_connector_role?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -31,5 +31,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

+ 3 - 3
prod/aws-us-gov/mdr-prod-ca-c19/072-salt-master-inventory-role/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/salt_master_inventory_role?ref=v3.0.0"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/salt_master_inventory_role?ref=v3.5.17"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -31,5 +31,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"
+terraform_version_constraint = "= 1.1.6"
+terragrunt_version_constraint = "= 0.36.2"

Einige Dateien werden nicht angezeigt, da zu viele Dateien in diesem Diff geändert wurden.