account.hcl 2.4 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071
  1. # Set account-wide variables. These are automatically pulled in to configure the remote state bucket in the root
  2. # terragrunt.hcl configuration.
  3. locals {
  4. account_name = "afs-mdr-common-services"
  5. account_alias = "afs-mdr-common-services"
  6. aws_account_id = "471284459109"
  7. instance_termination_protection = true # set to true for production!
  8. account_tags = { }
  9. c2_account_standards_path = "../../../../prod/aws/mdr-prod-c2/005-account-standards-c2"
  10. # For CIDR assignment, see https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
  11. standard_vpc_cidr = "10.1.1.0/22"
  12. #####################################
  13. # DNS Zones
  14. hosted_public_dns_zones = [
  15. "accenturefederalcyber.com",
  16. "accenturefederalcyber.net",
  17. "xdr.accenturefederalcyber.com",
  18. "xdrtest.accenturefederalcyber.com",
  19. ]
  20. # Delegated zones are created in different accounts
  21. delegated_public_dns_zones = {
  22. "ai.accenturefederalcyber.com" = [
  23. "ns-348.awsdns-43.com",
  24. "ns-1733.awsdns-24.co.uk",
  25. "ns-1330.awsdns-38.org",
  26. "ns-610.awsdns-12.net",
  27. ],
  28. "caasp.accenturefederalcyber.com" = [
  29. "ns-537.awsdns-03.net",
  30. "ns-1532.awsdns-63.org",
  31. "ns-1933.awsdns-49.co.uk",
  32. "ns-417.awsdns-52.com",
  33. ],
  34. }
  35. # For testing
  36. create_test_instance = false
  37. test_instance_key_name = "fdamstra" # The key with which to provision the test instance
  38. # # Account Specific Module Variables
  39. security_vpc_cidr = "10.1.0.0/22"
  40. # Palo Alto moved to govcloud
  41. # panorama_count = 2 # We need a second serial number for 2
  42. # #panorama_instance_type = "m5.2xlarge"
  43. # panorama_instance_type = "t3.xlarge"
  44. # panorama_key_name = "fdamstra" # DO NOT CHANGE
  45. # palo_alto_count = 2 # should be divisible by 2
  46. # palo_alto_instance_type = "m5.xlarge"
  47. # palo_alto_key_name = "fdamstra" # DO NOT CHANGE
  48. #
  49. # # To generate auth keys, log in to the panorama cli and run:
  50. # # request bootstrap vm-auth-key generate lifetime 720
  51. # # where 720 is the validity period in hours (720 is 30 days)
  52. # # (Should only need to be valid when you stand up the firewall)
  53. # palo_alto_auth_keys = [
  54. # "919502713609312", # Expires at: 2020/07/30 21:32:44
  55. # "655051814206833", # Expires at: 2020/07/30 21:32:45
  56. # ]
  57. # palo_alto_license_keys = [ # one per count
  58. # "32836999",
  59. # "65202677"
  60. # ]
  61. # palo_alto_feature_auth_keys = [ # one per count, not yet implemented
  62. # "28341453",
  63. # "62158825"
  64. # ]
  65. }