Browse Source

Revert "Upgrades TF & TG in Prod Client Env"

This reverts commit d781d1f7d62a1a638c009b2b08cbcd0b41df5af2.
Jeremy Cooper [AFS MBP] 3 years ago
parent
commit
c09ad2ba54
73 changed files with 203 additions and 203 deletions
  1. 3 3
      prod/aws-us-gov/mdr-tiaas/005-iam/terragrunt.hcl
  2. 3 3
      prod/aws-us-gov/mdr-tiaas/006-account-standards-regional/us-gov-west-1/terragrunt.hcl
  3. 3 3
      prod/aws-us-gov/mdr-tiaas/006-account-standards/terragrunt.hcl
  4. 3 3
      prod/aws-us-gov/mdr-tiaas/007-backups/terragrunt.hcl
  5. 3 3
      prod/aws-us-gov/mdr-tiaas/010-vpc-splunk/terragrunt.hcl
  6. 3 3
      prod/aws-us-gov/mdr-tiaas/021-qualys-connector-role/terragrunt.hcl
  7. 3 3
      prod/aws-us-gov/mdr-tiaas/072-salt-master-inventory-role/terragrunt.hcl
  8. 3 3
      prod/aws-us-gov/mdr-tiaas/140-splunk-frozen-bucket/terragrunt.hcl
  9. 3 3
      prod/aws-us-gov/mdr-tiaas/150-splunk-cluster-master/terragrunt.hcl
  10. 3 3
      prod/aws-us-gov/mdr-tiaas/160-splunk-indexer-cluster/terragrunt.hcl
  11. 3 3
      prod/aws-us-gov/mdr-tiaas/170-splunk-searchhead/terragrunt.hcl
  12. 3 3
      prod/aws-us-gov/mdr-tiaas/180-splunk-heavy-forwarder/terragrunt.hcl
  13. 2 2
      prod/aws-us-gov/mdr-tiaas/account.hcl
  14. 3 3
      prod/aws/legacy-mdr-prod/005-iam/terragrunt.hcl
  15. 3 3
      prod/aws/legacy-mdr-prod/006-account-standards-regional/us-west-1/terragrunt.hcl
  16. 3 3
      prod/aws/legacy-mdr-prod/006-account-standards/terragrunt.hcl
  17. 3 3
      prod/aws/legacy-mdr-prod/026-legacy-dns-entries/terragrunt.hcl
  18. 3 3
      prod/aws/legacy-mdr-prod/072-salt-master-inventory-role/terragrunt.hcl
  19. 1 1
      prod/aws/legacy-mdr-prod/account.hcl
  20. 3 3
      prod/aws/mdr-prod-afs/005-iam/terragrunt.hcl
  21. 3 3
      prod/aws/mdr-prod-afs/006-account-standards-regional/us-gov-west-1/terragrunt.hcl
  22. 3 3
      prod/aws/mdr-prod-afs/006-account-standards/terragrunt.hcl
  23. 2 2
      prod/aws/mdr-prod-afs/account.hcl
  24. 3 3
      prod/aws/mdr-prod-c2/005-account-standards-c2/terragrunt.hcl
  25. 3 3
      prod/aws/mdr-prod-c2/005-iam/terragrunt.hcl
  26. 3 3
      prod/aws/mdr-prod-c2/006-account-standards-regional/us-west-1/terragrunt.hcl
  27. 3 3
      prod/aws/mdr-prod-c2/006-account-standards/terragrunt.hcl
  28. 3 3
      prod/aws/mdr-prod-c2/072-salt-master-inventory-role/terragrunt.hcl
  29. 1 1
      prod/aws/mdr-prod-c2/account.hcl
  30. 3 3
      prod/aws/mdr-prod-ca-c19/005-iam/terragrunt.hcl
  31. 3 3
      prod/aws/mdr-prod-ca-c19/006-account-standards-regional/us-gov-west-1/terragrunt.hcl
  32. 3 3
      prod/aws/mdr-prod-ca-c19/006-account-standards/terragrunt.hcl
  33. 2 2
      prod/aws/mdr-prod-ca-c19/account.hcl
  34. 3 3
      prod/aws/mdr-prod-dc-c19/005-iam/terragrunt.hcl
  35. 3 3
      prod/aws/mdr-prod-dc-c19/006-account-standards-regional/us-gov-west-1/terragrunt.hcl
  36. 3 3
      prod/aws/mdr-prod-dc-c19/006-account-standards/terragrunt.hcl
  37. 2 2
      prod/aws/mdr-prod-dc-c19/account.hcl
  38. 3 3
      prod/aws/mdr-prod-dgi/005-iam/terragrunt.hcl
  39. 3 3
      prod/aws/mdr-prod-dgi/006-account-standards-regional/us-gov-west-1/terragrunt.hcl
  40. 3 3
      prod/aws/mdr-prod-dgi/006-account-standards/terragrunt.hcl
  41. 2 2
      prod/aws/mdr-prod-dgi/account.hcl
  42. 3 3
      prod/aws/mdr-prod-doed/005-iam/terragrunt.hcl
  43. 3 3
      prod/aws/mdr-prod-doed/006-account-standards-regional/us-gov-west-1/terragrunt.hcl
  44. 3 3
      prod/aws/mdr-prod-doed/006-account-standards/terragrunt.hcl
  45. 2 2
      prod/aws/mdr-prod-doed/account.hcl
  46. 3 3
      prod/aws/mdr-prod-frtib/005-iam/terragrunt.hcl
  47. 3 3
      prod/aws/mdr-prod-frtib/006-account-standards-regional/us-gov-west-1/terragrunt.hcl
  48. 3 3
      prod/aws/mdr-prod-frtib/006-account-standards/terragrunt.hcl
  49. 2 2
      prod/aws/mdr-prod-frtib/account.hcl
  50. 3 3
      prod/aws/mdr-prod-la-c19/005-iam/terragrunt.hcl
  51. 3 3
      prod/aws/mdr-prod-la-c19/006-account-standards-regional/us-gov-west-1/terragrunt.hcl
  52. 3 3
      prod/aws/mdr-prod-la-c19/006-account-standards/terragrunt.hcl
  53. 2 2
      prod/aws/mdr-prod-la-c19/account.hcl
  54. 3 3
      prod/aws/mdr-prod-ma-c19/005-iam/terragrunt.hcl
  55. 3 3
      prod/aws/mdr-prod-ma-c19/006-account-standards-regional/us-gov-west-1/terragrunt.hcl
  56. 3 3
      prod/aws/mdr-prod-ma-c19/006-account-standards/terragrunt.hcl
  57. 2 2
      prod/aws/mdr-prod-ma-c19/account.hcl
  58. 3 3
      prod/aws/mdr-prod-malware/005-iam/terragrunt.hcl
  59. 3 3
      prod/aws/mdr-prod-malware/072-salt-master-inventory-role/terragrunt.hcl
  60. 3 3
      prod/aws/mdr-prod-modelclient/005-iam/terragrunt.hcl
  61. 3 3
      prod/aws/mdr-prod-modelclient/072-salt-master-inventory-role/terragrunt.hcl
  62. 3 3
      prod/aws/mdr-prod-nga/005-iam/terragrunt.hcl
  63. 3 3
      prod/aws/mdr-prod-nga/006-account-standards-regional/us-gov-west-1/terragrunt.hcl
  64. 3 3
      prod/aws/mdr-prod-nga/006-account-standards/terragrunt.hcl
  65. 2 2
      prod/aws/mdr-prod-nga/account.hcl
  66. 3 3
      prod/aws/mdr-prod-root-ca/005-iam/terragrunt.hcl
  67. 3 3
      prod/aws/mdr-prod-root-ca/006-account-standards-regional/us-gov-west-1/terragrunt.hcl
  68. 3 3
      prod/aws/mdr-prod-root-ca/006-account-standards/terragrunt.hcl
  69. 2 2
      prod/aws/mdr-prod-root-ca/account.hcl
  70. 3 3
      prod/aws/mdr-tiaas/005-iam/terragrunt.hcl
  71. 3 3
      prod/aws/mdr-tiaas/006-account-standards-regional/us-gov-west-1/terragrunt.hcl
  72. 3 3
      prod/aws/mdr-tiaas/006-account-standards/terragrunt.hcl
  73. 2 2
      prod/aws/mdr-tiaas/account.hcl

+ 3 - 3
prod/aws-us-gov/mdr-tiaas/005-iam/terragrunt.hcl

@@ -41,7 +41,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -58,5 +58,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws-us-gov/mdr-tiaas/006-account-standards-regional/us-gov-west-1/terragrunt.hcl

@@ -20,7 +20,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -58,5 +58,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws-us-gov/mdr-tiaas/006-account-standards/terragrunt.hcl

@@ -14,7 +14,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.0.0"
 }
 
 dependency "c2_account_standards" {
@@ -36,5 +36,5 @@ inputs = {
   }
   cloudtrail_key_arn = dependency.c2_account_standards.outputs.cloudtrail_logging_bucket.kms_key_id
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws-us-gov/mdr-tiaas/007-backups/terragrunt.hcl

@@ -14,7 +14,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/backups?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/backups?ref=v3.2.11"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -31,5 +31,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws-us-gov/mdr-tiaas/010-vpc-splunk/terragrunt.hcl

@@ -18,7 +18,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/standard_vpc?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/standard_vpc?ref=v3.2.15"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -45,5 +45,5 @@ inputs = {
   }
   accept_tgw_invitation = true
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws-us-gov/mdr-tiaas/021-qualys-connector-role/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/qualys_connector_role?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/qualys_connector_role?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -31,5 +31,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws-us-gov/mdr-tiaas/072-salt-master-inventory-role/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/salt_master_inventory_role?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/salt_master_inventory_role?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -31,5 +31,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws-us-gov/mdr-tiaas/140-splunk-frozen-bucket/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/frozen_s3_bucket?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/frozen_s3_bucket?ref=v3.4.10"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -31,5 +31,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws-us-gov/mdr-tiaas/150-splunk-cluster-master/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/cluster_master?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/cluster_master?ref=v3.4.10"
 }
 
 dependency "vpc" {
@@ -41,5 +41,5 @@ inputs = {
   azs = dependency.vpc.outputs.azs
   subnets = dependency.vpc.outputs.private_subnets
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws-us-gov/mdr-tiaas/160-splunk-indexer-cluster/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/indexer_cluster?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/indexer_cluster?ref=v3.5.5"
 }
 
 dependency "vpc" {
@@ -42,5 +42,5 @@ inputs = {
   private_subnets = dependency.vpc.outputs.private_subnets
   public_subnets  = dependency.vpc.outputs.public_subnets
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws-us-gov/mdr-tiaas/170-splunk-searchhead/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/searchhead?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/searchhead?ref=v3.4.10"
 }
 
 dependency "vpc" {
@@ -41,5 +41,5 @@ inputs = {
   azs = dependency.vpc.outputs.azs
   subnets = dependency.vpc.outputs.private_subnets
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws-us-gov/mdr-tiaas/180-splunk-heavy-forwarder/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/heavy_forwarder?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/splunk_servers/heavy_forwarder?ref=v3.4.10"
 }
 
 dependency "vpc" {
@@ -41,5 +41,5 @@ inputs = {
   azs = dependency.vpc.outputs.azs
   subnets = dependency.vpc.outputs.private_subnets
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 2 - 2
prod/aws-us-gov/mdr-tiaas/account.hcl

@@ -21,7 +21,7 @@ locals {
   } 
   c2_account_standards_path = "../../mdr-prod-c2/005-account-standards-c2" # TODO: Subsitute with test or prod
 
-  # For CIDR assignment, see https://github.xdr.accenturefederalcyber.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
+  # For CIDR assignment, see https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
   vpc_info = { 
     "vpc-splunk" = {
        "name" = "vpc-splunk",
@@ -31,7 +31,7 @@ locals {
     }
   } 
 
-  # Qualys Connector - See https://github.xdr.accenturefederalcyber.com/mdr-engineering/msoc-infrastructure/wiki/Qualys
+  # Qualys Connector - See https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/Qualys
   qualys_connector_externalid = "LATER" # Needs to come from the qualys console
 
   # End of TODO

+ 3 - 3
prod/aws/legacy-mdr-prod/005-iam/terragrunt.hcl

@@ -18,7 +18,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -35,5 +35,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws/legacy-mdr-prod/006-account-standards-regional/us-west-1/terragrunt.hcl

@@ -20,7 +20,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -58,5 +58,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws/legacy-mdr-prod/006-account-standards/terragrunt.hcl

@@ -14,7 +14,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.0.0"
 }
 
 dependency "c2_account_standards" {
@@ -36,5 +36,5 @@ inputs = {
   }
   cloudtrail_key_arn = dependency.c2_account_standards.outputs.cloudtrail_logging_bucket.kms_key_id
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws/legacy-mdr-prod/026-legacy-dns-entries/terragrunt.hcl

@@ -15,7 +15,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/dns/legacy_dns_entries?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/dns/legacy_dns_entries?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -32,5 +32,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws/legacy-mdr-prod/072-salt-master-inventory-role/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/salt_master_inventory_role?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/salt_master_inventory_role?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -31,5 +31,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 1 - 1
prod/aws/legacy-mdr-prod/account.hcl

@@ -12,7 +12,7 @@ locals {
   }
   c2_account_standards_path = "../../mdr-prod-c2/005-account-standards-c2"
 
-  # For CIDR assignment, see https://github.xdr.accenturefederalcyber.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
+  # For CIDR assignment, see https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
   vpc_info = { } # TODO
 
   # Instance Configuration

+ 3 - 3
prod/aws/mdr-prod-afs/005-iam/terragrunt.hcl

@@ -41,7 +41,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -58,5 +58,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws/mdr-prod-afs/006-account-standards-regional/us-gov-west-1/terragrunt.hcl

@@ -20,7 +20,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -58,5 +58,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws/mdr-prod-afs/006-account-standards/terragrunt.hcl

@@ -14,7 +14,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.0.0"
 }
 
 dependency "c2_account_standards" {
@@ -36,5 +36,5 @@ inputs = {
   }
   cloudtrail_key_arn = dependency.c2_account_standards.outputs.cloudtrail_logging_bucket.kms_key_id
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 2 - 2
prod/aws/mdr-prod-afs/account.hcl

@@ -21,7 +21,7 @@ locals {
   } 
   c2_account_standards_path = "../../mdr-prod-c2/005-account-standards-c2" # TODO: Subsitute with test or prod
 
-  # For CIDR assignment, see https://github.xdr.accenturefederalcyber.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
+  # For CIDR assignment, see https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
   vpc_info = { 
     "vpc-splunk" = {
        "name" = "vpc-splunk",
@@ -31,7 +31,7 @@ locals {
     }
   } 
 
-  # Qualys Connector - See https://github.xdr.accenturefederalcyber.com/mdr-engineering/msoc-infrastructure/wiki/Qualys
+  # Qualys Connector - See https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/Qualys
   qualys_connector_externalid = "LATER" # Needs to come from the qualys console
 
   # End of TODO

+ 3 - 3
prod/aws/mdr-prod-c2/005-account-standards-c2/terragrunt.hcl

@@ -15,7 +15,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_c2?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_c2?ref=v3.4.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -32,5 +32,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws/mdr-prod-c2/005-iam/terragrunt.hcl

@@ -18,7 +18,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -35,5 +35,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws/mdr-prod-c2/006-account-standards-regional/us-west-1/terragrunt.hcl

@@ -20,7 +20,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -58,5 +58,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws/mdr-prod-c2/006-account-standards/terragrunt.hcl

@@ -14,7 +14,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.0.0"
 }
 
 dependency "c2_account_standards" {
@@ -36,5 +36,5 @@ inputs = {
   }
   cloudtrail_key_arn = dependency.c2_account_standards.outputs.cloudtrail_logging_bucket.kms_key_id
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws/mdr-prod-c2/072-salt-master-inventory-role/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/salt_master_inventory_role?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/salt_master_inventory_role?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -31,5 +31,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 1 - 1
prod/aws/mdr-prod-c2/account.hcl

@@ -12,7 +12,7 @@ locals {
   }
   c2_account_standards_path = "../../mdr-prod-c2/005-account-standards-c2"
 
-  # For CIDR assignment, see https://github.xdr.accenturefederalcyber.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
+  # For CIDR assignment, see https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
   vpc_info = {
     "vpc-system-services" = {
       "name" = "vpc-system-services",

+ 3 - 3
prod/aws/mdr-prod-ca-c19/005-iam/terragrunt.hcl

@@ -41,7 +41,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -58,5 +58,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws/mdr-prod-ca-c19/006-account-standards-regional/us-gov-west-1/terragrunt.hcl

@@ -20,7 +20,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.5.7"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -58,5 +58,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws/mdr-prod-ca-c19/006-account-standards/terragrunt.hcl

@@ -14,7 +14,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.0.0"
 }
 
 dependency "c2_account_standards" {
@@ -36,5 +36,5 @@ inputs = {
   }
   cloudtrail_key_arn = dependency.c2_account_standards.outputs.cloudtrail_logging_bucket.kms_key_id
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 2 - 2
prod/aws/mdr-prod-ca-c19/account.hcl

@@ -21,7 +21,7 @@ locals {
   } 
   c2_account_standards_path = "../../mdr-prod-c2/005-account-standards-c2" # TODO: Subsitute with test or prod
 
-  # For CIDR assignment, see https://github.xdr.accenturefederalcyber.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
+  # For CIDR assignment, see https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
   vpc_info = { 
     "vpc-splunk" = {
        "name" = "vpc-splunk",
@@ -31,7 +31,7 @@ locals {
     }
   } 
 
-  # Qualys Connector - See https://github.xdr.accenturefederalcyber.com/mdr-engineering/msoc-infrastructure/wiki/Qualys
+  # Qualys Connector - See https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/Qualys
   qualys_connector_externalid = "LATER" # Needs to come from the qualys console
 
   # End of TODO

+ 3 - 3
prod/aws/mdr-prod-dc-c19/005-iam/terragrunt.hcl

@@ -41,7 +41,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -58,5 +58,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws/mdr-prod-dc-c19/006-account-standards-regional/us-gov-west-1/terragrunt.hcl

@@ -20,7 +20,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -58,5 +58,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws/mdr-prod-dc-c19/006-account-standards/terragrunt.hcl

@@ -14,7 +14,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.0.0"
 }
 
 dependency "c2_account_standards" {
@@ -36,5 +36,5 @@ inputs = {
   }
   cloudtrail_key_arn = dependency.c2_account_standards.outputs.cloudtrail_logging_bucket.kms_key_id
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 2 - 2
prod/aws/mdr-prod-dc-c19/account.hcl

@@ -21,7 +21,7 @@ locals {
   } 
   c2_account_standards_path = "../../mdr-prod-c2/005-account-standards-c2" # TODO: Subsitute with test or prod
 
-  # For CIDR assignment, see https://github.xdr.accenturefederalcyber.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
+  # For CIDR assignment, see https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
   vpc_info = { 
     "vpc-splunk" = {
        "name" = "vpc-splunk",
@@ -31,7 +31,7 @@ locals {
     }
   } 
 
-  # Qualys Connector - See https://github.xdr.accenturefederalcyber.com/mdr-engineering/msoc-infrastructure/wiki/Qualys
+  # Qualys Connector - See https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/Qualys
   qualys_connector_externalid = "LATER" # Needs to come from the qualys console
 
   # End of TODO

+ 3 - 3
prod/aws/mdr-prod-dgi/005-iam/terragrunt.hcl

@@ -41,7 +41,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -58,5 +58,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws/mdr-prod-dgi/006-account-standards-regional/us-gov-west-1/terragrunt.hcl

@@ -20,7 +20,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -58,5 +58,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws/mdr-prod-dgi/006-account-standards/terragrunt.hcl

@@ -14,7 +14,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.0.0"
 }
 
 dependency "c2_account_standards" {
@@ -36,5 +36,5 @@ inputs = {
   }
   cloudtrail_key_arn = dependency.c2_account_standards.outputs.cloudtrail_logging_bucket.kms_key_id
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 2 - 2
prod/aws/mdr-prod-dgi/account.hcl

@@ -21,7 +21,7 @@ locals {
   } 
   c2_account_standards_path = "../../mdr-prod-c2/005-account-standards-c2" # TODO: Subsitute with test or prod
 
-  # For CIDR assignment, see https://github.xdr.accenturefederalcyber.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
+  # For CIDR assignment, see https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
   vpc_info = { 
     "vpc-splunk" = {
        "name" = "vpc-splunk",
@@ -31,7 +31,7 @@ locals {
     }
   } 
 
-  # Qualys Connector - See https://github.xdr.accenturefederalcyber.com/mdr-engineering/msoc-infrastructure/wiki/Qualys
+  # Qualys Connector - See https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/Qualys
   qualys_connector_externalid = "LATER" # Needs to come from the qualys console
 
   # End of TODO

+ 3 - 3
prod/aws/mdr-prod-doed/005-iam/terragrunt.hcl

@@ -41,7 +41,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -58,5 +58,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws/mdr-prod-doed/006-account-standards-regional/us-gov-west-1/terragrunt.hcl

@@ -20,7 +20,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -58,5 +58,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws/mdr-prod-doed/006-account-standards/terragrunt.hcl

@@ -14,7 +14,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.0.0"
 }
 
 dependency "c2_account_standards" {
@@ -36,5 +36,5 @@ inputs = {
   }
   cloudtrail_key_arn = dependency.c2_account_standards.outputs.cloudtrail_logging_bucket.kms_key_id
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 2 - 2
prod/aws/mdr-prod-doed/account.hcl

@@ -21,7 +21,7 @@ locals {
   } 
   c2_account_standards_path = "../../mdr-prod-c2/005-account-standards-c2" # TODO: Subsitute with test or prod
 
-  # For CIDR assignment, see https://github.xdr.accenturefederalcyber.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
+  # For CIDR assignment, see https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
   vpc_info = { 
     "vpc-splunk" = {
        "name" = "vpc-splunk",
@@ -31,7 +31,7 @@ locals {
     }
   } 
 
-  # Qualys Connector - See https://github.xdr.accenturefederalcyber.com/mdr-engineering/msoc-infrastructure/wiki/Qualys
+  # Qualys Connector - See https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/Qualys
   qualys_connector_externalid = "LATER" # Needs to come from the qualys console
 
   # End of TODO

+ 3 - 3
prod/aws/mdr-prod-frtib/005-iam/terragrunt.hcl

@@ -41,7 +41,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -58,5 +58,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws/mdr-prod-frtib/006-account-standards-regional/us-gov-west-1/terragrunt.hcl

@@ -20,7 +20,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -58,5 +58,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws/mdr-prod-frtib/006-account-standards/terragrunt.hcl

@@ -14,7 +14,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.0.0"
 }
 
 dependency "c2_account_standards" {
@@ -36,5 +36,5 @@ inputs = {
   }
   cloudtrail_key_arn = dependency.c2_account_standards.outputs.cloudtrail_logging_bucket.kms_key_id
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 2 - 2
prod/aws/mdr-prod-frtib/account.hcl

@@ -21,7 +21,7 @@ locals {
   } 
   c2_account_standards_path = "../../mdr-prod-c2/005-account-standards-c2" # TODO: Subsitute with test or prod
 
-  # For CIDR assignment, see https://github.xdr.accenturefederalcyber.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
+  # For CIDR assignment, see https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
   vpc_info = { 
     "vpc-splunk" = {
        "name" = "vpc-splunk",
@@ -31,7 +31,7 @@ locals {
     }
   } 
 
-  # Qualys Connector - See https://github.xdr.accenturefederalcyber.com/mdr-engineering/msoc-infrastructure/wiki/Qualys
+  # Qualys Connector - See https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/Qualys
   qualys_connector_externalid = "LATER" # Needs to come from the qualys console
 
   # End of TODO

+ 3 - 3
prod/aws/mdr-prod-la-c19/005-iam/terragrunt.hcl

@@ -41,7 +41,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -58,5 +58,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws/mdr-prod-la-c19/006-account-standards-regional/us-gov-west-1/terragrunt.hcl

@@ -20,7 +20,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -58,5 +58,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws/mdr-prod-la-c19/006-account-standards/terragrunt.hcl

@@ -14,7 +14,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.0.0"
 }
 
 dependency "c2_account_standards" {
@@ -36,5 +36,5 @@ inputs = {
   }
   cloudtrail_key_arn = dependency.c2_account_standards.outputs.cloudtrail_logging_bucket.kms_key_id
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 2 - 2
prod/aws/mdr-prod-la-c19/account.hcl

@@ -21,7 +21,7 @@ locals {
   } 
   c2_account_standards_path = "../../mdr-prod-c2/005-account-standards-c2" # TODO: Subsitute with test or prod
 
-  # For CIDR assignment, see https://github.xdr.accenturefederalcyber.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
+  # For CIDR assignment, see https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
   vpc_info = { 
     "vpc-splunk" = {
        "name" = "vpc-splunk",
@@ -31,7 +31,7 @@ locals {
     }
   } 
 
-  # Qualys Connector - See https://github.xdr.accenturefederalcyber.com/mdr-engineering/msoc-infrastructure/wiki/Qualys
+  # Qualys Connector - See https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/Qualys
   qualys_connector_externalid = "LATER" # Needs to come from the qualys console
 
   # End of TODO

+ 3 - 3
prod/aws/mdr-prod-ma-c19/005-iam/terragrunt.hcl

@@ -41,7 +41,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -58,5 +58,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws/mdr-prod-ma-c19/006-account-standards-regional/us-gov-west-1/terragrunt.hcl

@@ -20,7 +20,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -58,5 +58,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws/mdr-prod-ma-c19/006-account-standards/terragrunt.hcl

@@ -14,7 +14,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.0.0"
 }
 
 dependency "c2_account_standards" {
@@ -36,5 +36,5 @@ inputs = {
   }
   cloudtrail_key_arn = dependency.c2_account_standards.outputs.cloudtrail_logging_bucket.kms_key_id
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 2 - 2
prod/aws/mdr-prod-ma-c19/account.hcl

@@ -21,7 +21,7 @@ locals {
   } 
   c2_account_standards_path = "../../mdr-prod-c2/005-account-standards-c2" # TODO: Subsitute with test or prod
 
-  # For CIDR assignment, see https://github.xdr.accenturefederalcyber.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
+  # For CIDR assignment, see https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
   vpc_info = { 
     "vpc-splunk" = {
        "name" = "vpc-splunk",
@@ -31,7 +31,7 @@ locals {
     }
   } 
 
-  # Qualys Connector - See https://github.xdr.accenturefederalcyber.com/mdr-engineering/msoc-infrastructure/wiki/Qualys
+  # Qualys Connector - See https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/Qualys
   qualys_connector_externalid = "LATER" # Needs to come from the qualys console
 
   # End of TODO

+ 3 - 3
prod/aws/mdr-prod-malware/005-iam/terragrunt.hcl

@@ -18,7 +18,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -35,5 +35,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws/mdr-prod-malware/072-salt-master-inventory-role/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/salt_master_inventory_role?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/salt_master_inventory_role?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -31,5 +31,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws/mdr-prod-modelclient/005-iam/terragrunt.hcl

@@ -18,7 +18,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -35,5 +35,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws/mdr-prod-modelclient/072-salt-master-inventory-role/terragrunt.hcl

@@ -13,7 +13,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/salt_master_inventory_role?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/salt_master_inventory_role?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -31,5 +31,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws/mdr-prod-nga/005-iam/terragrunt.hcl

@@ -41,7 +41,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -58,5 +58,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws/mdr-prod-nga/006-account-standards-regional/us-gov-west-1/terragrunt.hcl

@@ -20,7 +20,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -58,5 +58,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws/mdr-prod-nga/006-account-standards/terragrunt.hcl

@@ -14,7 +14,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.0.0"
 }
 
 dependency "c2_account_standards" {
@@ -36,5 +36,5 @@ inputs = {
   }
   cloudtrail_key_arn = dependency.c2_account_standards.outputs.cloudtrail_logging_bucket.kms_key_id
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 2 - 2
prod/aws/mdr-prod-nga/account.hcl

@@ -21,7 +21,7 @@ locals {
   } 
   c2_account_standards_path = "../../mdr-prod-c2/005-account-standards-c2" # TODO: Subsitute with test or prod
 
-  # For CIDR assignment, see https://github.xdr.accenturefederalcyber.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
+  # For CIDR assignment, see https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
   vpc_info = { 
     "vpc-splunk" = {
        "name" = "vpc-splunk",
@@ -31,7 +31,7 @@ locals {
     }
   } 
 
-  # Qualys Connector - See https://github.xdr.accenturefederalcyber.com/mdr-engineering/msoc-infrastructure/wiki/Qualys
+  # Qualys Connector - See https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/Qualys
   qualys_connector_externalid = "LATER" # Needs to come from the qualys console
 
   # End of TODO

+ 3 - 3
prod/aws/mdr-prod-root-ca/005-iam/terragrunt.hcl

@@ -41,7 +41,7 @@ EOF
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -58,5 +58,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws/mdr-prod-root-ca/006-account-standards-regional/us-gov-west-1/terragrunt.hcl

@@ -20,7 +20,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -58,5 +58,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws/mdr-prod-root-ca/006-account-standards/terragrunt.hcl

@@ -14,7 +14,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.0.0"
 }
 
 dependency "c2_account_standards" {
@@ -36,5 +36,5 @@ inputs = {
   }
   cloudtrail_key_arn = dependency.c2_account_standards.outputs.cloudtrail_logging_bucket.kms_key_id
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 2 - 2
prod/aws/mdr-prod-root-ca/account.hcl

@@ -21,7 +21,7 @@ locals {
   } 
   c2_account_standards_path = "../../mdr-prod-c2/005-account-standards-c2" # TODO: Subsitute with test or prod
 
-  # For CIDR assignment, see https://github.xdr.accenturefederalcyber.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
+  # For CIDR assignment, see https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
   vpc_info = { 
     "vpc-splunk" = {
        "name" = "vpc-splunk",
@@ -31,7 +31,7 @@ locals {
     }
   } 
 
-  # Qualys Connector - See https://github.xdr.accenturefederalcyber.com/mdr-engineering/msoc-infrastructure/wiki/Qualys
+  # Qualys Connector - See https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/Qualys
   qualys_connector_externalid = "LATER" # Needs to come from the qualys console
 
   # End of TODO

+ 3 - 3
prod/aws/mdr-tiaas/005-iam/terragrunt.hcl

@@ -41,7 +41,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -58,5 +58,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws/mdr-tiaas/006-account-standards-regional/us-gov-west-1/terragrunt.hcl

@@ -20,7 +20,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards_regional?ref=v3.0.0"
 }
 
 # Include all settings from the root terragrunt.hcl file
@@ -58,5 +58,5 @@ inputs = {
     Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
   }
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 3 - 3
prod/aws/mdr-tiaas/006-account-standards/terragrunt.hcl

@@ -14,7 +14,7 @@ locals {
 # working directory, into a temporary folder, and execute your Terraform commands in that folder.
 terraform {
   # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.5.17"
+  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/account_standards?ref=v3.0.0"
 }
 
 dependency "c2_account_standards" {
@@ -36,5 +36,5 @@ inputs = {
   }
   cloudtrail_key_arn = dependency.c2_account_standards.outputs.cloudtrail_logging_bucket.kms_key_id
 }
-terraform_version_constraint = "= 1.1.6"
-terragrunt_version_constraint = "= 0.36.2"
+terraform_version_constraint = "= 1.0.7"
+terragrunt_version_constraint = "= 0.32.3"

+ 2 - 2
prod/aws/mdr-tiaas/account.hcl

@@ -21,7 +21,7 @@ locals {
   } 
   c2_account_standards_path = "../../mdr-prod-c2/005-account-standards-c2" # TODO: Subsitute with test or prod
 
-  # For CIDR assignment, see https://github.xdr.accenturefederalcyber.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
+  # For CIDR assignment, see https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
   vpc_info = { 
     "vpc-splunk" = {
        "name" = "vpc-splunk",
@@ -31,7 +31,7 @@ locals {
     }
   } 
 
-  # Qualys Connector - See https://github.xdr.accenturefederalcyber.com/mdr-engineering/msoc-infrastructure/wiki/Qualys
+  # Qualys Connector - See https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/Qualys
   qualys_connector_externalid = "LATER" # Needs to come from the qualys console
 
   # End of TODO