account.hcl 3.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110
  1. # Set account-wide variables. These are automatically pulled in to configure the remote state bucket in the root
  2. # terragrunt.hcl configuration.
  3. locals {
  4. account_name = "afs-mdr-prod-c2-gov"
  5. account_alias = "afs-mdr-prod-c2-gov"
  6. aws_account_id = "721817724804"
  7. instance_termination_protection = true # set to true for production!
  8. splunk_prefix = "moose"
  9. account_tags = {
  10. "Client": local.splunk_prefix
  11. }
  12. c2_account_standards_path = "../../mdr-prod-c2/005-account-standards-c2"
  13. # For CIDR assignment, see https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
  14. standard_vpc_cidr = "10.40.0.0/22"
  15. vpc_info = {
  16. "vpc-splunk" = {
  17. "name" = "vpc-splunk"
  18. "purpose" = "Splunk Systems (MOOSE)"
  19. "cidr" = "10.20.16.0/22",
  20. "tgw_attached" = true,
  21. },
  22. "vpc-system-services" = {
  23. "name" = "vpc-system-services",
  24. "purpose" = "Internal Services for Systems",
  25. "cidr" = "10.40.0.0/22",
  26. "tgw_attached" = false, # Attached via tgw creation
  27. },
  28. "vpc-qualys" = {
  29. "name" = "vpc-qualys",
  30. "purpose" = "Security Scanning",
  31. "cidr" = "10.40.12.0/22",
  32. "tgw_attached" = true,
  33. },
  34. "vpc-interconnects" = {
  35. "name" = "vpc-interconnects",
  36. "purpose" = "Interconnections between AWS partitions",
  37. "cidr" = "10.179.0.0/22",
  38. "tgw_attached" = true,
  39. },
  40. "vpc-access" = {
  41. "name" = "vpc-access"
  42. "purpose" = "Systems providing restricted access, such as bastions and vpn concentrators"
  43. "cidr" = "10.40.20.0/22",
  44. "tgw_attached" = true,
  45. },
  46. "vpc-portal" = {
  47. "name" = "vpc-portal"
  48. "purpose" = "The Customer Portal"
  49. "cidr" = "10.40.32.0/24",
  50. "tgw_attached" = true,
  51. },
  52. "vpc-public" = {
  53. "name" = "vpc-public"
  54. "purpose" = "Publicly Accessible Infrastructure Services, such as GHE and Jira"
  55. "cidr" = "10.40.24.0/22",
  56. "tgw_attached" = true,
  57. },
  58. "vpc-private-services" = {
  59. "name" = "vpc-private-services"
  60. "purpose" = "Private XDR Services for XDR users"
  61. "cidr" = "10.40.28.0/22",
  62. "tgw_attached" = true,
  63. },
  64. }
  65. # Bastion
  66. bastion_instance_type = "t3a.micro"
  67. # Salt Master
  68. salt_master_instance_type = "t3a.large"
  69. # mailrelay
  70. mailrelay_instance_type = "t3a.micro"
  71. # Proxy
  72. openvpn_instance_type = "t3a.medium"
  73. # Proxy
  74. proxy_server_instance_type = "t3a.medium"
  75. # Repo Server
  76. repo_server_instance_type = "t3a.micro"
  77. # DNS Resolver
  78. resolver_instance_type = "t3a.micro"
  79. # Vault Server
  80. vault_server_instance_type = "t3a.micro"
  81. # Sensu Server
  82. sensu_server_instance_type = "t3a.medium"
  83. # For testing
  84. create_test_instance = false
  85. # AS Number used for various resources, but not every account needs one.
  86. asn = 64810
  87. security_vpc_cidr = "10.179.0.0/22"
  88. # Interconnects
  89. interconnect_asn = 64888
  90. interconnects_instance_type = "t3a.micro"
  91. interconnects_key_name = "fdamstra" # DO NOT CHANGE
  92. interconnects_count = 2
  93. interconnect_instances_path = "../018-interconnect-instances"
  94. }