account.hcl 6.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210
  1. # Set account-wide variables. These are automatically pulled in to configure the remote state bucket in the root
  2. # terragrunt.hcl configuration.
  3. locals {
  4. account_name = "afs-mdr-prod-c2-gov"
  5. account_alias = "afs-mdr-prod-c2-gov"
  6. aws_account_id = "721817724804"
  7. instance_termination_protection = true # set to true for production!
  8. splunk_prefix = "moose"
  9. splunk_private_hec = true # True if the customer needs a private HTTP Event Collector such as for ALSI
  10. # For CIDR assignment, see https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
  11. standard_vpc_cidr = "10.40.0.0/22"
  12. splunk_data_sources = [
  13. "170.248.172.0/23", # legacy afs_whitelist
  14. "20.190.250.137/32", # legacy afs_azure_whitelist: EastUS2_External_Access
  15. "52.232.227.197/32", # legacy afs_azure_whitelist: Azure US-East Palo
  16. "52.185.64.173/32", # legacy afs_azure_whitelist: CentralUS_External_Access
  17. "52.242.225.98/32", # legacy afs_azure_whitelist: Azure US-Central Palo 20200721
  18. "52.177.84.83/32", # legacy afs_azure_whitelist: Lab_External_Access
  19. "199.16.64.3/32", # legacy nga_whitelist
  20. ]
  21. splunk_legacy_cidr = [ # Allow splunk ports to/from here, too
  22. "10.80.0.0/16",
  23. ]
  24. splunk_asg_sizes = [ 1, 1, 1 ] # How many?
  25. splunk_volume_sizes = {
  26. "cluster_master" = {
  27. "swap": 8, # minimum: 8
  28. "/": 10, # minimum: 10
  29. "/home": 4, # minimum: 4
  30. "/var": 15, # minimum: 15
  31. "/var/tmp": 4, # minimum: 4
  32. "/var/log": 8, # minimum: 8
  33. "/var/log/audit": 8, # minimum: 8
  34. "/tmp": 4, # minimum: 4
  35. "/opt/splunk": 30, # No minimum; not in base image
  36. },
  37. "indexer" = {
  38. "swap": 8, # minimum: 8
  39. "/": 10, # minimum: 10
  40. "/home": 4, # minimum: 4
  41. "/var": 15, # minimum: 15
  42. "/var/tmp": 4, # minimum: 4
  43. "/var/log": 8, # minimum: 8
  44. "/var/log/audit": 8, # minimum: 8
  45. "/tmp": 4, # minimum: 4
  46. "/opt/splunk": 30, # No minimum; not in base image
  47. },
  48. "searchhead" = {
  49. "swap": 8, # minimum: 8
  50. "/": 10, # minimum: 10
  51. "/home": 4, # minimum: 4
  52. "/var": 15, # minimum: 15
  53. "/var/tmp": 4, # minimum: 4
  54. "/var/log": 8, # minimum: 8
  55. "/var/log/audit": 8, # minimum: 8
  56. "/tmp": 4, # minimum: 4
  57. "/opt/splunk": 60, # No minimum; not in base image
  58. },
  59. # qcompliance, fm-shared-search, and the monitoring console are all searchheads
  60. # "qcompliance" = {
  61. # "swap": 8, # minimum: 8
  62. # "/": 10, # minimum: 10
  63. # "/home": 4, # minimum: 4
  64. # "/var": 15, # minimum: 15
  65. # "/var/tmp": 4, # minimum: 4
  66. # "/var/log": 8, # minimum: 8
  67. # "/var/log/audit": 8, # minimum: 8
  68. # "/tmp": 4, # minimum: 4
  69. # "/opt/splunk": 30, # No minimum; not in base image
  70. # },
  71. "heavy_forwarder" = {
  72. "swap": 8, # minimum: 8
  73. "/": 10, # minimum: 10
  74. "/home": 4, # minimum: 4
  75. "/var": 15, # minimum: 15
  76. "/var/tmp": 4, # minimum: 4
  77. "/var/log": 8, # minimum: 8
  78. "/var/log/audit": 8, # minimum: 8
  79. "/tmp": 4, # minimum: 4
  80. "/opt/splunk": 30, # No minimum; not in base image
  81. },
  82. }
  83. account_tags = {
  84. "Client": local.splunk_prefix
  85. }
  86. c2_account_standards_path = "../../mdr-prod-c2/005-account-standards-c2"
  87. vpc_info = {
  88. "vpc-splunk" = {
  89. "name" = "vpc-splunk"
  90. "purpose" = "Splunk Systems (MOOSE)"
  91. "cidr" = "10.40.16.0/22",
  92. "tgw_attached" = true,
  93. },
  94. "vpc-system-services" = {
  95. "name" = "vpc-system-services",
  96. "purpose" = "Internal Services for Systems",
  97. "cidr" = "10.40.0.0/22",
  98. "tgw_attached" = false, # Attached via tgw creation
  99. },
  100. "vpc-qualys" = {
  101. "name" = "vpc-qualys",
  102. "purpose" = "Security Scanning",
  103. "cidr" = "10.40.12.0/22",
  104. "tgw_attached" = true,
  105. },
  106. "vpc-interconnects" = {
  107. "name" = "vpc-interconnects",
  108. "purpose" = "Interconnections between AWS partitions",
  109. "cidr" = "10.179.0.0/22",
  110. "tgw_attached" = true,
  111. },
  112. "vpc-access" = {
  113. "name" = "vpc-access"
  114. "purpose" = "Systems providing restricted access, such as bastions and vpn concentrators"
  115. "cidr" = "10.40.20.0/22",
  116. "tgw_attached" = true,
  117. },
  118. "vpc-portal" = {
  119. "name" = "vpc-portal"
  120. "purpose" = "The Customer Portal"
  121. "cidr" = "10.40.32.0/24",
  122. "tgw_attached" = true,
  123. },
  124. "vpc-public" = {
  125. "name" = "vpc-public"
  126. "purpose" = "Publicly Accessible Infrastructure Services, such as GHE and Jira"
  127. "cidr" = "10.40.24.0/22",
  128. "tgw_attached" = true,
  129. },
  130. "vpc-private-services" = {
  131. "name" = "vpc-private-services"
  132. "purpose" = "Private XDR Services for XDR users"
  133. "cidr" = "10.40.28.0/22",
  134. "tgw_attached" = true,
  135. },
  136. }
  137. instance_types = {
  138. #"alsi-master" = "t3a.small",
  139. #"alsi-worker" = "t3a.small",
  140. "fm-shared-search" = "m5a.large", # Legacy: t2.small, prod m4.large
  141. "github" = "c5.4xlarge", # legacy: c4.4xlarge in prod, c5.2xlarge in test
  142. "github-backup" = "t3a.medium", # legacy: t2.medium
  143. "jira-rds" = "db.t3.medium",
  144. "jira-server" = "t3a.medium", # legacy test: t2.small, legacy prod: t2.medium
  145. "nessus_security_center" = "m5a.xlarge",
  146. "nessus_scanners" = "m5a.large",
  147. "phantom" = "m5a.4xlarge", # legacy test: t2.medium, legacy prod: m4.4xlarge
  148. "qcompliance" = "c5a.8xlarge", # legacy: c4.8xlarge
  149. "splunk-cm" = "m5a.xlarge",
  150. "splunk-hf" = "m5a.xlarge",
  151. "splunk-indexer" = "i3en.3xlarge",
  152. "splunk-mc" = "m5a.large", # Legacy: t2.small, prod m4.large
  153. "splunk-sh" = "m5a.4xlarge",
  154. "portal" = "t3a.medium", # legacy: t2.medium
  155. }
  156. # Bastion
  157. bastion_instance_type = "t3a.micro"
  158. # GitHub
  159. github_instance_count = 1
  160. github_data_volume_size = 500
  161. # Salt Master
  162. salt_master_instance_type = "t3a.xlarge"
  163. # mailrelay
  164. mailrelay_instance_type = "t3a.micro"
  165. # Nessus Scanner Variables
  166. nessus_scanner_count = 2
  167. # OpenVPN Server
  168. openvpn_instance_type = "t3a.medium"
  169. # Phantom Server
  170. phantom_instance_count = 1
  171. # Proxy
  172. proxy_server_instance_type = "t3a.medium"
  173. # Repo Server
  174. repo_server_instance_type = "t3a.micro"
  175. # DNS Resolver
  176. resolver_instance_type = "t3a.micro"
  177. # Vault Server
  178. vault_server_instance_type = "t3a.medium"
  179. # Sensu Server
  180. sensu_server_instance_type = "t3a.medium"
  181. # AS Number used for various resources, but not every account needs one.
  182. asn = 64810
  183. security_vpc_cidr = "10.179.0.0/22"
  184. # Interconnects
  185. interconnect_asn = 64888
  186. interconnects_instance_type = "t3a.micro"
  187. interconnects_key_name = "fdamstra" # DO NOT CHANGE
  188. interconnects_count = 2
  189. interconnect_instances_path = "../018-interconnect-instances"
  190. }