Kaynağa Gözat

Allows access to TEST portal via VPN

Brad Poulton 3 yıl önce
ebeveyn
işleme
57aaa909eb

+ 4 - 2
globals.hcl

@@ -19,8 +19,10 @@ locals {
     "67.167.143.30/32", # Fred Damstra
     #"76.173.128.126/32",   # Jeremy Cooper
     "97.117.83.215/32", # Colby Williams
-    "18.253.178.104/32", # Test VPN NAT GW
-    "18.253.116.210/32", # Prod VPN NAT GW
+    # We currently have the VPN in a public subnet and we are using a internet gateway. If we want a static egress IP we need to use a private subnet for the VPN and a NAT gateway. 
+    # https://aws.amazon.com/premiumsupport/knowledge-center/client-vpn-static-ip-address/
+    "18.252.173.222/32", # Test AWS VPN Internet GW Dynamic IP
+    "18.252.186.82/32", # Prod AWS VPN Internet GW Dynamic IP
   ]
 
   portal_test_whitelist = [ # IPs for Portal Test and vmray

+ 1 - 1
prod/aws-us-gov/mdr-prod-c2/200-customer-portal/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/customer_portal?ref=v4.3.9"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/customer_portal?ref=v4.4.3"
 }
 
 dependency "vpc" {

+ 1 - 1
test/aws-us-gov/mdr-test-c2/200-customer-portal/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/customer_portal?ref=v4.3.9"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/customer_portal?ref=v4.4.3"
 }
 
 dependency "vpc" {