# Set account-wide variables. These are automatically pulled in to configure the remote state bucket in the root # terragrunt.hcl configuration. locals { account_name = "afs-mdr-prod-c2-gov" account_alias = "afs-mdr-prod-c2-gov" aws_account_id = "721817724804" instance_termination_protection = true # set to true for production! splunk_prefix = "moose" # For CIDR assignment, see https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation standard_vpc_cidr = "10.40.0.0/22" splunk_data_sources = [ "170.248.172.0/23", # legacy afs_whitelist "20.190.250.137/32", # legacy afs_azure_whitelist: EastUS2_External_Access "52.232.227.197/32", # legacy afs_azure_whitelist: Azure US-East Palo "52.185.64.173/32", # legacy afs_azure_whitelist: CentralUS_External_Access "52.242.225.98/32", # legacy afs_azure_whitelist: Azure US-Central Palo 20200721 "52.177.84.83/32", # legacy afs_azure_whitelist: Lab_External_Access "199.16.64.3/32", # legacy nga_whitelist ] splunk_legacy_cidr = [ # Allow splunk ports to/from here, too "10.80.0.0/16", ] splunk_asg_sizes = [ 1, 1, 1 ] # How many? splunk_volume_sizes = { "cluster_master" = { "swap": 8, # minimum: 8 "/": 10, # minimum: 10 "/home": 4, # minimum: 4 "/var": 15, # minimum: 15 "/var/tmp": 4, # minimum: 4 "/var/log": 8, # minimum: 8 "/var/log/audit": 8, # minimum: 8 "/tmp": 4, # minimum: 4 "/opt/splunk": 30, # No minimum; not in base image }, "indexer" = { "swap": 8, # minimum: 8 "/": 10, # minimum: 10 "/home": 4, # minimum: 4 "/var": 15, # minimum: 15 "/var/tmp": 4, # minimum: 4 "/var/log": 8, # minimum: 8 "/var/log/audit": 8, # minimum: 8 "/tmp": 4, # minimum: 4 "/opt/splunk": 30, # No minimum; not in base image }, "searchhead" = { "swap": 8, # minimum: 8 "/": 10, # minimum: 10 "/home": 4, # minimum: 4 "/var": 15, # minimum: 15 "/var/tmp": 4, # minimum: 4 "/var/log": 8, # minimum: 8 "/var/log/audit": 8, # minimum: 8 "/tmp": 4, # minimum: 4 "/opt/splunk": 30, # No minimum; not in base image }, "qcompliance" = { "swap": 8, # minimum: 8 "/": 10, # minimum: 10 "/home": 4, # minimum: 4 "/var": 15, # minimum: 15 "/var/tmp": 4, # minimum: 4 "/var/log": 8, # minimum: 8 "/var/log/audit": 8, # minimum: 8 "/tmp": 4, # minimum: 4 "/opt/splunk": 30, # No minimum; not in base image }, "heavy_forwarder" = { "swap": 8, # minimum: 8 "/": 10, # minimum: 10 "/home": 4, # minimum: 4 "/var": 15, # minimum: 15 "/var/tmp": 4, # minimum: 4 "/var/log": 8, # minimum: 8 "/var/log/audit": 8, # minimum: 8 "/tmp": 4, # minimum: 4 "/opt/splunk": 30, # No minimum; not in base image }, } account_tags = { "Client": local.splunk_prefix } c2_account_standards_path = "../../mdr-prod-c2/005-account-standards-c2" vpc_info = { "vpc-splunk" = { "name" = "vpc-splunk" "purpose" = "Splunk Systems (MOOSE)" "cidr" = "10.40.16.0/22", "tgw_attached" = true, }, "vpc-system-services" = { "name" = "vpc-system-services", "purpose" = "Internal Services for Systems", "cidr" = "10.40.0.0/22", "tgw_attached" = false, # Attached via tgw creation }, "vpc-qualys" = { "name" = "vpc-qualys", "purpose" = "Security Scanning", "cidr" = "10.40.12.0/22", "tgw_attached" = true, }, "vpc-interconnects" = { "name" = "vpc-interconnects", "purpose" = "Interconnections between AWS partitions", "cidr" = "10.179.0.0/22", "tgw_attached" = true, }, "vpc-access" = { "name" = "vpc-access" "purpose" = "Systems providing restricted access, such as bastions and vpn concentrators" "cidr" = "10.40.20.0/22", "tgw_attached" = true, }, "vpc-portal" = { "name" = "vpc-portal" "purpose" = "The Customer Portal" "cidr" = "10.40.32.0/24", "tgw_attached" = true, }, "vpc-public" = { "name" = "vpc-public" "purpose" = "Publicly Accessible Infrastructure Services, such as GHE and Jira" "cidr" = "10.40.24.0/22", "tgw_attached" = true, }, "vpc-private-services" = { "name" = "vpc-private-services" "purpose" = "Private XDR Services for XDR users" "cidr" = "10.40.28.0/22", "tgw_attached" = true, }, } # Bastion bastion_instance_type = "t3a.micro" # Salt Master salt_master_instance_type = "t3a.large" # mailrelay mailrelay_instance_type = "t3a.micro" # Proxy openvpn_instance_type = "t3a.medium" # Proxy proxy_server_instance_type = "t3a.medium" # Repo Server repo_server_instance_type = "t3a.micro" # DNS Resolver resolver_instance_type = "t3a.micro" # Vault Server vault_server_instance_type = "t3a.micro" # Sensu Server sensu_server_instance_type = "t3a.medium" # For testing create_test_instance = false # AS Number used for various resources, but not every account needs one. asn = 64810 security_vpc_cidr = "10.179.0.0/22" # Interconnects interconnect_asn = 64888 interconnects_instance_type = "t3a.micro" interconnects_key_name = "fdamstra" # DO NOT CHANGE interconnects_count = 2 interconnect_instances_path = "../018-interconnect-instances" }