account.hcl 1.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748
  1. # Set account-wide variables. These are automatically pulled in to configure the remote state bucket in the root
  2. # terragrunt.hcl configuration.
  3. locals {
  4. account_name = "afs-mdr-common-services"
  5. account_alias = "afs-mdr-common-services"
  6. aws_account_id = "471284459109"
  7. instance_termination_protection = true # set to true for production!
  8. splunk_prefix = "moose"
  9. account_tags = {
  10. "Client": local.splunk_prefix
  11. }
  12. c2_account_standards_path = "../../../../prod/aws/mdr-prod-c2/005-account-standards-c2"
  13. # For CIDR assignment, see https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
  14. vpc_info = {
  15. "vpc-security" = {
  16. "name" = "vpc-security",
  17. "purpose" = "created for palo altos, can probably be removed.",
  18. "cidr" = "10.1.0.0/22",
  19. }
  20. }
  21. #####################################
  22. # DNS Zones
  23. hosted_public_dns_zones = [
  24. "accenturefederalcyber.com",
  25. "accenturefederalcyber.net",
  26. "xdr.accenturefederalcyber.com",
  27. "xdrtest.accenturefederalcyber.com",
  28. "xdrtest.accenturefederalcyber.net", # testing dnssec
  29. ]
  30. # Delegated zones are created in different accounts
  31. delegated_public_dns_zones = {
  32. "ai.accenturefederalcyber.com" = [
  33. "ns-348.awsdns-43.com",
  34. "ns-1733.awsdns-24.co.uk",
  35. "ns-1330.awsdns-38.org",
  36. "ns-610.awsdns-12.net",
  37. ],
  38. "caasp.accenturefederalcyber.com" = [
  39. "ns-537.awsdns-03.net",
  40. "ns-1532.awsdns-63.org",
  41. "ns-1933.awsdns-49.co.uk",
  42. "ns-417.awsdns-52.com",
  43. ],
  44. }
  45. }