123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657 |
- # Set account-wide variables. These are automatically pulled in to configure the remote state bucket in the root
- # terragrunt.hcl configuration.
- locals {
- account_name = "afs-mdr-common-services-gov"
- account_alias = "afs-mdr-common-services-gov"
- aws_account_id = "701290387780"
- instance_termination_protection = true # set to true for production!
- splunk_prefix = "moose"
- okta_app = "AWS - GovCloud"
- account_tags = {
- "Client": local.splunk_prefix
- }
- c2_account_standards_path = "../../../../prod/aws-us-gov/mdr-prod-c2/005-account-standards-c2"
- # For CIDR assignment, see https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
- vpc_info = {
- "vpc-security" = {
- "name" = "vpc-security",
- "purpose" = "Palo altos, can probably be removed.",
- "cidr" = "10.1.128.0/22"
- }
- }
- # Panorama / Palo Alto information
- panorama_serial_numbers = [
- "000702891433",
- "000702138816"
- ]
- panorama_count = 0 # We need a second serial number for 2
- panorama_instance_type = "m5.2xlarge"
- #panorama_instance_type = "t3.xlarge"
- panorama_key_name = "fdamstra" # DO NOT CHANGE
- palo_alto_count = 0 # should be divisible by 2
- palo_alto_instance_type = "m5.xlarge"
- palo_alto_key_name = "fdamstra" # DO NOT CHANGE
- # To generate auth keys, log in to the panorama cli and run:
- # request bootstrap vm-auth-key generate lifetime 720
- # where 720 is the validity period in hours (720 is 30 days)
- # (Should only need to be valid when you stand up the firewall)
- palo_alto_auth_keys = [
- "866071457115248", #Expires at: 2020/07/31 15:01:33
- "165273115818468", #Expires at: 2020/07/31 15:01:34
- ]
- palo_alto_license_keys = [ # one per count
- "32836999",
- "65202677"
- ]
- palo_alto_feature_auth_keys = [ # one per count, not yet implemented
- "28341453",
- "62158825"
- ]
- # Qualys Connector
- qualys_connector_externalid = "1604790479997"
- }
|