globals.hcl 7.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220
  1. # Set common variables for everything. This is automatically pulled in in the root terragrunt.hcl configuration to
  2. # feed forward to the child modules.
  3. locals {
  4. remote_state_bucket = "afsxdr-terraform-state" # Could be moved to environment/partition.
  5. binaries_bucket = "afsxdr-binaries" # Storage for binaries
  6. global_tags = {
  7. "Snapshot" = "Daily", # This will put it on some things where it doesn't belong, but seems useful overall
  8. #"Last_Updated" = timestamp() # while this is cool, its usefulness does not warrant the constant updates.
  9. }
  10. trusted_ips = [ # IPs for 'permissive' ingress. Used for the bastion host and for testing. Think twice before employing.
  11. "108.203.37.38/32", # Duane Waddle
  12. "24.11.231.98/32", # George Starcher
  13. "99.151.37.185/32", # Wesley Leonard
  14. "73.10.53.113/32", # Rick Page Home
  15. "74.211.32.26/32", # Brad Poulton
  16. "70.160.60.248/32", # Brandon Naughton
  17. "99.56.213.129/32", # Fred Damstra
  18. #"76.173.128.126/32", # Jeremy Cooper
  19. "97.117.83.215/32", # Colby Williams
  20. ]
  21. portal_test_whitelist = [ # IPs for Portal Test and vmray
  22. "12.245.107.250/32", # DPS Office Legato
  23. "12.204.167.162/32", # DPS Office San Antonio
  24. "54.86.98.62/32", # DPS AWS User VPN
  25. "108.203.37.38/32", # Duane Waddle
  26. "24.11.231.98/32", # George Starcher
  27. "99.151.37.185/32", # Wesley Leonard
  28. "73.10.53.113/32", # Rick Page Home
  29. "74.211.32.26/32", # Brad Poulton
  30. "70.160.60.248/32", # Brandon Naughton
  31. "99.56.213.129/32", # Frederick Damstra
  32. "97.117.83.215/32", # Colby Williams
  33. #"76.173.128.126/32", # Jeremy Cooper
  34. "73.213.108.186/32", # LaDonia Wicks
  35. ]
  36. admin_ips = [
  37. "108.28.25.119/32", # James Kerr Home
  38. "73.10.53.113/32", # Rick Page Home
  39. "99.151.37.185/32", # Wesley Leonard Home
  40. "74.211.32.26/32", # Brad Poulton Home
  41. "104.9.149.90/32", # Greg Rivas Home
  42. "100.4.76.3/32", # Brandon Naughton Home
  43. "170.248.173.247/32", # AFS site
  44. "170.248.173.245/32", # AFS site
  45. "107.207.74.118/32", # Angelita Crawley Home
  46. "69.207.192.131/32", # Aaron Flores Home
  47. "70.120.19.33/32", # Hilda Colon-Martinez Home
  48. "198.13.82.11/32", # Hussein Carrenard Home
  49. "136.226.18.198/32", # Jose Alvarez Home
  50. ]
  51. # from https://config.zscaler.com/zscalergov.net/cenr
  52. zscalar_ips = [
  53. "165.225.3.0/24",
  54. "136.226.10.0/23",
  55. "136.226.12.0/23",
  56. "136.226.14.0/23",
  57. "165.225.46.0/24",
  58. "136.226.6.0/23",
  59. "136.226.4.0/23",
  60. "136.226.8.0/23",
  61. "136.226.22.0/24",
  62. "165.225.48.0/24",
  63. "136.226.18.0/23",
  64. "136.226.16.0/23",
  65. "136.226.20.0/23",
  66. ]
  67. # Customer External IPs
  68. # To increase flexibility and to provide better documentation,
  69. # break up the IPs based on on-prem and not on-prem.
  70. #
  71. # All of the "external" things that need access to publically
  72. # available C2 services, like Salt Masters, Repo Servers
  73. #
  74. # Structure is a list of maps, and the "description" value in the
  75. # map must be unique across the whole list or it will cause an error.
  76. #
  77. c2_services_external_ips = [
  78. {
  79. description = "Test LCPs"
  80. cidr_blocks = [
  81. "18.252.65.137/32", # Test LCP in Govcloud (EIP in common-services-gov)
  82. "54.224.56.231/32", # Test LCP in Commercial (EIP in common-services)
  83. ]
  84. },
  85. {
  86. description = "NGA"
  87. cidr_blocks = [
  88. "199.16.64.3/32", # NGA
  89. ]
  90. },
  91. {
  92. description = "AFS OnPrem"
  93. cidr_blocks = [
  94. "170.248.172.0/23", # AFS Onprem
  95. ]
  96. },
  97. {
  98. description = "AFS Azure"
  99. cidr_blocks = [
  100. "20.190.250.137/32", # EastUS2_External_Access
  101. "52.232.227.197/32", # Azure US-East Palo
  102. "52.185.64.173/32", # CentralUS_External_Access
  103. "52.242.225.98/32", # Azure US-Central Palo 20200721
  104. "52.177.84.83/32", # Lab_External_Access
  105. ]
  106. },
  107. {
  108. description = "BAS-Commerce CMPS"
  109. cidr_blocks = [
  110. "52.61.137.158/32", # 2021-04-06 From Daniel Dicke <daniel.dicke@asmr.com>
  111. "52.61.70.43/32", # 2021-04-15 yanked from VPC flow logs
  112. ]
  113. },
  114. {
  115. description = "FRTIB VDI"
  116. cidr_blocks = [
  117. "52.61.113.202/32", # 2021-04-15 From Brian Nguyen brian.a.nguyen@accenturefederal.com
  118. ]
  119. },
  120. {
  121. description = "FRTIB CMPS"
  122. cidr_blocks = [
  123. "15.200.226.57/32", # 2021-07-12 From Brian Nguyen brian.a.nguyen@accenturefederal.com
  124. ]
  125. },
  126. {
  127. description = "FRTIB ALIGHT"
  128. cidr_blocks = [
  129. "54.205.60.17/32", # 2021-05-04 From John Conrad john.conrad.2@alight.com
  130. "52.206.203.98/32",
  131. "34.233.188.131/32",
  132. ]
  133. },
  134. {
  135. description = "FRTIB ALIGHT 2"
  136. cidr_blocks = [
  137. "34.214.247.125/32", # 2022-01-20 From John Conrad john.conrad.2@alight.com
  138. "44.235.174.214/32",
  139. "52.89.203.9/32",
  140. ]
  141. },
  142. {
  143. description = "CA-C19"
  144. cidr_blocks = [
  145. "34.223.59.103/32", # 2021-05-04 From Wes Leonard
  146. "44.234.190.14/32",
  147. "44.228.141.151/32",
  148. "18.215.158.202/32", # 2022-01-03 From Ben Troglia
  149. "54.234.108.195/32",
  150. "34.228.38.91/32",
  151. ]
  152. },
  153. {
  154. description = "DGI"
  155. cidr_blocks = [
  156. "3.32.175.159/32", # 2021-06-24 From Angelita Crawley MSOCI-1776
  157. "15.200.13.143/32",
  158. ]
  159. },
  160. {
  161. description = "FRTIB Chaos test us-east-1"
  162. cidr_blocks = [
  163. "3.221.245.113/32",
  164. "34.237.100.242/32",
  165. "35.172.75.107/32",
  166. "54.164.205.89/32",
  167. "54.209.105.32/32",
  168. "54.224.69.136/32",
  169. ]
  170. },
  171. {
  172. description = "FRTIB Chaos prod us-east-1"
  173. cidr_blocks = [
  174. "34.237.183.65/32",
  175. "34.227.214.27/32",
  176. "3.232.76.136/32",
  177. ]
  178. },
  179. ]
  180. dns_zone_map = {
  181. "accenturefederalcyber.com" = "Z03575081VGXN3FUZ8ERU"
  182. "accenturefederalcyber.net" = "Z07771312N8X39HKP141M"
  183. "xdr.accenturefederalcyber.com" = "Z0083657A94URZM2TM87"
  184. "xdrtest.accenturefederalcyber.com" = "Z01677392W0QM639KU2KC"
  185. }
  186. repo_server_whitelist = concat(
  187. ["52.179.13.17/32", #???
  188. ],
  189. )
  190. key_pairs = {
  191. # Should be your username -> key pair
  192. "msoc-build" = "ssh-rsa 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 MSOC Build Key",
  193. "fdamstra" = "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDF3pGU9+HufgfEhPP7P0Lt7kqfGWLTGd6sfJgSypcSo3FP1XhwFOWkaNvZIpoIeQXhux5vTm+RoqYZ/3Gj7hcGMLdoHWArvLHD2AGjxbFnsmiCioQgsC/rYLBjiWNsDdVF5Arofby/RwzivMAi7yivhY4nGzXPsHZoucB0Wi34/9AmxbvXWv6ckuWkMjrXVe+uwFje3U7jQHRW9jQRpCRRfUjVA4FmH0PWqWFBlt/zqsDPOzbxNNhAvyrJho7jVBNjCLsq0++lT8BDKrYbaZiT0F2c9uIDRpHJSdjpqVCf9bghmeJWYMoNHAkGR7WCFjPCJ7QM57a2oRBtm1A/EWcr",
  194. }
  195. # Sensu Thresholds
  196. sensu_checks = {
  197. "dns" : {
  198. "warning" : "5.0", # warn if no resolution for 5 seconds
  199. "critical" : "10.0" # critical if no resolution for 10 seconds
  200. },
  201. }
  202. # Some sane defaults we don't want to specify everywhere
  203. is_legacy = false # By default, accounts are not legacy accounts
  204. extra_ebs_key_admins = []
  205. extra_ebs_key_users = []
  206. extra_ebs_key_attachers = []
  207. }