Browse Source

Merge pull request #526 from mdr-engineering/feature/bp_MSOCI-1972_ma-c19-final

decom ma-c19 final
Brad Poulton 3 years ago
parent
commit
c79c054b12

+ 0 - 62
prod/aws-us-gov/mdr-prod-ma-c19/005-iam/terragrunt.hcl

@@ -1,62 +0,0 @@
-locals {
-  # If you want to use any of the variables in _this_ file, you have to load them here.
-  # However, they will all be available as inputs to the module loaded in terraform.source
-  # below.
-
-  # e.g. inherited variables:
-  #environment_vars = read_terragrunt_config(find_in_parent_folders("env.hcl"))
-  #partition_vars = read_terragrunt_config(find_in_parent_folders("partition.hcl"))
-  region_vars = read_terragrunt_config(find_in_parent_folders("region.hcl"))
-  account_vars = read_terragrunt_config(find_in_parent_folders("account.hcl"))
-  #global_vars = read_terragrunt_config(find_in_parent_folders("globals.hcl"))
-
-  # Extract out common variables for reuse
-  #env            = local.environment_vars.locals.environment
-  aws_region     = local.region_vars.locals.aws_region
-  account_id     = local.account_vars.locals.aws_account_id
-  
-}
-
-# TODO: For provisioning only. Comment out after provisioning
-#generate "provider" {
-#  path      = "provider.tf"
-#  if_exists = "overwrite_terragrunt"
-#  contents  = <<EOF
-#provider "template" {
-#}
-#
-#provider "aws" {
-#  region = "${local.aws_region}"
-#
-#  # TODO: make sure you have a profile matching this
-#  profile = "tmp"
-#
-#  # Only these AWS Account IDs may be operated on by this template
-#  allowed_account_ids = ["${local.account_id}"]
-#}
-#EOF
-#}
-
-# Terragrunt will copy the Terraform configurations specified by the source parameter, along with any files in the
-# working directory, into a temporary folder, and execute your Terraform commands in that folder.
-terraform {
-  # Double slash is intentional and required to show root of modules
-  source = "git@github.xdr.accenturefederalcyber.com:mdr-engineering/xdr-terraform-modules.git//base/iam?ref=v3.0.0"
-}
-
-# Include all settings from the root terragrunt.hcl file
-include {
-  path = find_in_parent_folders()
-}
-
-# These are the variables we have to pass in to use the module specified in the terragrunt source above
-inputs = {
-  # All of the inputs from the inherited hcl files are available automatically
-  # (via the `inputs` section of the root `terragrunt.hcl`). However, modules
-  # will be more flexible if you specify particular input values.
-  tags = {
-    Terraform = "aws/${basename(get_parent_terragrunt_dir())}/${path_relative_to_include()}/"
-  }
-}
-terraform_version_constraint = "= 1.0.7"
-terragrunt_version_constraint = "= 0.32.3"

+ 0 - 2
prod/aws-us-gov/mdr-prod-ma-c19/README.md

@@ -1,2 +0,0 @@
-# MA-C19
-

+ 0 - 105
prod/aws-us-gov/mdr-prod-ma-c19/account.hcl

@@ -1,105 +0,0 @@
-# Set account-wide variables. These are automatically pulled in to configure the remote state bucket in the root
-# terragrunt.hcl configuration.
-locals {
-  # TODO put the right values here
-  account_name   = "mdr-prod-ma-c19"
-  account_alias  = "mdr-prod-ma-c19"
-  aws_account_id = "555457296585"
-  instance_termination_protection = true # set to true for production!
-  splunk_prefix = "ma-c19"
-  splunk_private_hec = false # True if the customer needs a private HTTP Event Collector such as for ALSI
-
-  splunk_data_sources = [
-   # "x.x.x.x/32", # TODO: Add customer's public IP addresses
-  ]
-  splunk_legacy_cidr = [ "10.160.20.0/22" ] # Should not be needed for new customers
-  splunk_asg_sizes   = [ 0, 0, 0 ] # How many indexers in each site
-  
-  
-  account_tags = {
-    "Client": local.splunk_prefix,
-  } 
-  c2_account_standards_path = "../../mdr-prod-c2/005-account-standards-c2" # TODO: Subsitute with test or prod
-
-  # For CIDR assignment, see https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
-  vpc_info = { 
-    "vpc-splunk" = {
-       "name" = "vpc-splunk",
-       "purpose" = "Splunk Systems ma-c19", # TODO: Substitute with Customer Name
-       "cidr" = "10.42.8.0/22",
-       "tgw_attached" = true
-    }
-  } 
-
-  # Qualys Connector - See https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/Qualys
-  qualys_connector_externalid = "1629178007548" # Needs to come from the qualys console
-
-  # End of TODO
-
-  # Splunk instance sizes can be customized
-  # TODO: Set these appropriately in the skeleton for prod
-  instance_types = {
-    "alsi-master"    = "t3a.small",
-    "alsi-worker"    = "t3a.small",
-    "splunk-cm"      = "m5a.xlarge",  # legacy: t2.small
-    "splunk-indexer" = "i3en.3xlarge", # legacy: t2.small, but whats the point if we don't have instance storage.
-    "splunk-hf"      = "m5a.xlarge", # legacy: t2.medium
-    "splunk-sh"      = "m5a.4xlarge", # legacy: ? not sure
-  }
-
-  # Splunk Volume Sizes are probably fine at defaults
-  splunk_volume_sizes = {
-    "cluster_master" = {
-      "swap": 8,  # minimum: 8
-      "/": 20,    # minimum: 20
-      "/home": 4, # minimum: 4
-      "/var": 15, # minimum: 15
-      "/var/tmp": 4, # minimum: 4
-      "/var/log": 8, # minimum: 8
-      "/var/log/audit": 8, # minimum: 8
-      "/tmp": 4,  # minimum: 4
-      "/opt/splunk": 30, # No minimum; not in base image
-    },
-    "indexer" = {
-      "swap": 8,  # minimum: 8
-      "/": 20,    # minimum: 20
-      "/home": 4, # minimum: 4
-      "/var": 15, # minimum: 15
-      "/var/tmp": 4, # minimum: 4
-      "/var/log": 8, # minimum: 8
-      "/var/log/audit": 8, # minimum: 8
-      "/tmp": 4,  # minimum: 4
-      "/opt/splunk": 30, # No minimum; not in base image
-    },
-    "searchhead" = {
-      "swap": 8,  # minimum: 8
-      "/": 20,    # minimum: 20
-      "/home": 4, # minimum: 4
-      "/var": 15, # minimum: 15
-      "/var/tmp": 4, # minimum: 4
-      "/var/log": 8, # minimum: 8
-      "/var/log/audit": 8, # minimum: 8
-      "/tmp": 4,  # minimum: 4
-      "/opt/splunk": 60, # No minimum; not in base image
-    },
-    "heavy_forwarder" = {
-      "swap": 8,  # minimum: 8
-      "/": 20,    # minimum: 20
-      "/home": 4, # minimum: 4
-      "/var": 15, # minimum: 15
-      "/var/tmp": 4, # minimum: 4
-      "/var/log": 8, # minimum: 8
-      "/var/log/audit": 8, # minimum: 8
-      "/tmp": 4,  # minimum: 4
-      "/opt/splunk": 30, # No minimum; not in base image
-    },
-  }
-
-  # ALSI - Aggregated Log Source Ingestion
-  #
-  # If cribl is being used for log ingestion, remember to turn on splunk_private_hec, too.
-  alsi_workers = 0 # how many cribl workers
-  alsi_splunk_nlb = false # splunk://moose-alsi-splunk.xdr{,test}.accenturefederalcyber.com:9997 and 9998
-  alsi_elastic_alb = false # https://moose-alsi-elastic.xdr{,test}.accenturefederalcyber.com -> 9200
-  alsi_hec_alb = false # https://moose-alsi-hec.xdr{,test}.accenturefederalcyber.com -> 8080
-}