account.hcl 1.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748
  1. # Set account-wide variables. These are automatically pulled in to configure the remote state bucket in the root
  2. # terragrunt.hcl configuration.
  3. locals {
  4. account_name = "afs-mdr-common-services-gov"
  5. account_alias = "afs-mdr-common-services-gov"
  6. aws_account_id = "701290387780"
  7. instance_termination_protection = true # set to true for production!
  8. # For CIDR assignment, see https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
  9. standard_vpc_cidr = "10.1.132.0/22"
  10. # For testing
  11. create_test_instance = false
  12. test_instance_key_name = "TODO" # The key with which to provision the test instance
  13. # Account Specific Module Variables
  14. security_vpc_cidr = "10.1.128.0/22"
  15. # Panorama / Palo Alto information
  16. panorama_serial_numbers = [
  17. "000702891433",
  18. "000702138816"
  19. ]
  20. panorama_count = 2 # We need a second serial number for 2
  21. panorama_instance_type = "m5.2xlarge"
  22. #panorama_instance_type = "t3.xlarge"
  23. panorama_key_name = "fdamstra" # DO NOT CHANGE
  24. palo_alto_count = 2 # should be divisible by 2
  25. palo_alto_instance_type = "m5.xlarge"
  26. palo_alto_key_name = "fdamstra" # DO NOT CHANGE
  27. # To generate auth keys, log in to the panorama cli and run:
  28. # request bootstrap vm-auth-key generate lifetime 720
  29. # where 720 is the validity period in hours (720 is 30 days)
  30. # (Should only need to be valid when you stand up the firewall)
  31. palo_alto_auth_keys = [
  32. "866071457115248", #Expires at: 2020/07/31 15:01:33
  33. "165273115818468", #Expires at: 2020/07/31 15:01:34
  34. ]
  35. palo_alto_license_keys = [ # one per count
  36. "32836999",
  37. "65202677"
  38. ]
  39. palo_alto_feature_auth_keys = [ # one per count, not yet implemented
  40. "28341453",
  41. "62158825"
  42. ]
  43. }