account.hcl 1.7 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546
  1. # Set account-wide variables. These are automatically pulled in to configure the remote state bucket in the root
  2. # terragrunt.hcl configuration.
  3. locals {
  4. account_name = "afs-mdr-common-services"
  5. account_alias = "afs-mdr-common-services"
  6. aws_account_id = "471284459109"
  7. instance_termination_protection = true # set to true for production!
  8. account_tags = { }
  9. # For CIDR assignment, see https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
  10. standard_vpc_cidr = "10.1.1.0/22"
  11. # For testing
  12. create_test_instance = false
  13. test_instance_key_name = "fdamstra" # The key with which to provision the test instance
  14. # # Account Specific Module Variables
  15. security_vpc_cidr = "10.1.0.0/22"
  16. # Palo Alto moved to govcloud
  17. # panorama_count = 2 # We need a second serial number for 2
  18. # #panorama_instance_type = "m5.2xlarge"
  19. # panorama_instance_type = "t3.xlarge"
  20. # panorama_key_name = "fdamstra" # DO NOT CHANGE
  21. # palo_alto_count = 2 # should be divisible by 2
  22. # palo_alto_instance_type = "m5.xlarge"
  23. # palo_alto_key_name = "fdamstra" # DO NOT CHANGE
  24. #
  25. # # To generate auth keys, log in to the panorama cli and run:
  26. # # request bootstrap vm-auth-key generate lifetime 720
  27. # # where 720 is the validity period in hours (720 is 30 days)
  28. # # (Should only need to be valid when you stand up the firewall)
  29. # palo_alto_auth_keys = [
  30. # "919502713609312", # Expires at: 2020/07/30 21:32:44
  31. # "655051814206833", # Expires at: 2020/07/30 21:32:45
  32. # ]
  33. # palo_alto_license_keys = [ # one per count
  34. # "32836999",
  35. # "65202677"
  36. # ]
  37. # palo_alto_feature_auth_keys = [ # one per count, not yet implemented
  38. # "28341453",
  39. # "62158825"
  40. # ]
  41. }