account.hcl 1.6 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849
  1. # Set account-wide variables. These are automatically pulled in to configure the remote state bucket in the root
  2. # terragrunt.hcl configuration.
  3. locals {
  4. account_name = "afs-mdr-common-services"
  5. account_alias = "afs-mdr-common-services"
  6. aws_account_id = "471284459109"
  7. instance_termination_protection = true # set to true for production!
  8. splunk_prefix = "moose"
  9. okta_app = "AWS - Commercial"
  10. account_tags = {
  11. "Client": local.splunk_prefix
  12. }
  13. c2_account_standards_path = "../../../../prod/aws/mdr-prod-c2/005-account-standards-c2"
  14. # For CIDR assignment, see https://github.xdr.accenturefederalcyber.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
  15. vpc_info = {
  16. "vpc-security" = {
  17. "name" = "vpc-security",
  18. "purpose" = "created for palo altos, can probably be removed.",
  19. "cidr" = "10.1.0.0/22",
  20. }
  21. }
  22. #####################################
  23. # DNS Zones
  24. hosted_public_dns_zones = [
  25. "accenturefederalcyber.com",
  26. "accenturefederalcyber.net",
  27. "xdr.accenturefederalcyber.com",
  28. "xdrtest.accenturefederalcyber.com",
  29. "xdrtest.accenturefederalcyber.net", # testing dnssec
  30. ]
  31. # Delegated zones are created in different accounts
  32. delegated_public_dns_zones = {
  33. "ai.accenturefederalcyber.com" = [
  34. "ns-348.awsdns-43.com",
  35. "ns-1733.awsdns-24.co.uk",
  36. "ns-1330.awsdns-38.org",
  37. "ns-610.awsdns-12.net",
  38. ],
  39. "caasp.accenturefederalcyber.com" = [
  40. "ns-537.awsdns-03.net",
  41. "ns-1532.awsdns-63.org",
  42. "ns-1933.awsdns-49.co.uk",
  43. "ns-417.awsdns-52.com",
  44. ],
  45. }
  46. }