account.hcl 4.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596
  1. # Set account-wide variables. These are automatically pulled in to configure the remote state bucket in the root
  2. # terragrunt.hcl configuration.
  3. locals {
  4. account_name = "legacy-mdr-test"
  5. account_alias = "" # No alias for legacy
  6. aws_account_id = "527700175026"
  7. instance_termination_protection = false # set to true for production!
  8. splunk_prefix = "moose"
  9. account_tags = {
  10. "Client": local.splunk_prefix
  11. }
  12. c2_account_standards_path = "../../mdr-test-c2/005-account-standards-c2"
  13. # For CIDR assignment, see https://github.mdr.defpoint.com/mdr-engineering/msoc-infrastructure/wiki/IP-Address-Allocation
  14. vpc_info = {} # "TODO"
  15. # Instance Configuration
  16. instance_types = {
  17. "jira-rds" = "db.t3.medium", # legacy: db.t2.medium
  18. }
  19. jira_rds_storage = 50
  20. aws_waf_logs_hec_token = "FA38B8DD-1398-46D0-BD79-BA046C6064B0"
  21. portal_data_sync_hec_token = "eb79bb2d-b27d-455d-bc5c-e8cf3165b294"
  22. # Legacy accounts have some extra key users
  23. is_legacy = true
  24. extra_ebs_key_admins = [
  25. "arn:aws:iam::527700175026:root",
  26. "arn:aws:iam::527700175026:role/mdr_iam_admins",
  27. "arn:aws:iam::527700175026:role/mdr_powerusers"
  28. ]
  29. extra_ebs_key_users = [
  30. "arn:aws:iam::527700175026:role/mdr_powerusers",
  31. "arn:aws:iam::527700175026:role/msoc-default-instance-role",
  32. "arn:aws:iam::527700175026:role/aws-service-role/autoscaling.amazonaws.com/AWSServiceRoleForAutoScaling",
  33. "arn:aws:iam::527700175026:role/portal-instance-role",
  34. "arn:aws:iam::527700175026:role/mdr_iam_admins"
  35. ]
  36. extra_ebs_key_attachers = [
  37. "arn:aws:iam::527700175026:role/mdr_powerusers",
  38. "arn:aws:iam::527700175026:role/msoc-default-instance-role",
  39. "arn:aws:iam::527700175026:role/aws-service-role/autoscaling.amazonaws.com/AWSServiceRoleForAutoScaling",
  40. "arn:aws:iam::527700175026:role/portal-instance-role",
  41. ]
  42. # Legacy information
  43. # legacy_vpc information is required to connect the VPCs to the transit gateway.
  44. legacy_vpcs = {
  45. main_infrastructure = {
  46. id = "vpc-0b455a7f22a13412b",
  47. private_subnets = [ "subnet-053c6f1b9a48d4285", "subnet-047cba9290bc502fd", "subnet-01d13857b6f3899cb" ]
  48. public_subnets = [ "subnet-0b1e9d82bcd8c0a2c", "subnet-0d65c22aa4f76b634", "subnet-07312c554fb87e4b5" ]
  49. private_route_tables = [ "rtb-0effbd34d78eabe6f", "rtb-02e8aaa2e4b82a665", "rtb-00928b94222c589a4" ]
  50. public_route_tables = [ "rtb-022461b2a3c523e73" ]
  51. }
  52. ma-c19 = {
  53. id = "vpc-03522ef9cbaef2378",
  54. private_subnets = [ "subnet-0045fcb58b3ec017c", "subnet-05150379ec0cc4181", "subnet-0b4a35031fd20dcfb" ]
  55. public_subnets = [ "subnet-0dee7a137d1598c4b", "subnet-0cc302d548e97188d", "subnet-0947439d65a8b54e2" ]
  56. private_route_tables = [ "rtb-01ad15c283474922a", "rtb-09be121675ff21a20", "rtb-08969d2fb85c343bb" ]
  57. public_route_tables = [ "rtb-0d94202396743c4a5" ]
  58. }
  59. customer-portal = {
  60. id = "vpc-075e58bd7619dc5b0",
  61. private_subnets = [ "subnet-0f8eec82a17cef7a6", "subnet-02575f16e22431ad6", "subnet-0662ad00a4fbf3034" ]
  62. public_subnets = [ "subnet-0bbb38f6b222607cf", "subnet-03074b876845ebae4", "subnet-0177f1e226cb5bc55" ]
  63. private_route_tables = [ "rtb-033ada297a85c58fe", "rtb-08e28c3117db6b282", "rtb-04700e9a72f266287" ]
  64. public_route_tables = [ "rtb-0e26a4fa3833eaa96" ]
  65. }
  66. afs = {
  67. id = "vpc-0bb514965e384f13a",
  68. private_subnets = [ "subnet-0db1488cd94ad0b38", "subnet-0275d50060a77e726", "subnet-07a0c3f2ee215d5f1" ]
  69. public_subnets = [ "subnet-05153a99ddb83712c", "subnet-044cf67369cee4967", "subnet-0bb9ec330ead3bab3" ]
  70. private_route_tables = [ "rtb-0f1ba98c1ce4a1306", "rtb-0861949990769ea9c", "rtb-00c008cd8a03f9a0d" ]
  71. public_route_tables = [ "rtb-09261ab694d10ed4e" ]
  72. }
  73. la-c19 = {
  74. id = "vpc-0ce10fb98f1e9a078",
  75. private_subnets = [ "subnet-02ab0934a1161cd38", "subnet-07197e8b1661a3006", "subnet-00135f6f54e0ee4fc" ]
  76. public_subnets = [ "subnet-0d0ef745c05339043", "subnet-01ab62a37d5c40eb3", "subnet-081ded06d577fd57d" ]
  77. private_route_tables = [ "rtb-098d239c29c96fb03", "rtb-0cd81b36f75e817e7", "rtb-06b060305a96cfab4" ]
  78. public_route_tables = [ "rtb-0ca9389c1f764ced5" ]
  79. }
  80. dc-c19 = {
  81. id = "vpc-0f64ba0a5c72b7402",
  82. private_subnets = [ "subnet-01973d25e80bc4341", "subnet-0e2d94b352495b3c1", "subnet-0f68328639ccb8754" ]
  83. public_subnets = [ "subnet-04188a43516592efa", "subnet-0a9b6fa8860a05751", "subnet-0281a55f386cf58f2" ]
  84. private_route_tables = [ "rtb-0f4babc621c88a81c", "rtb-093ce14bd550edfd2", "rtb-06e4a2609b3c63320" ]
  85. public_route_tables = [ "rtb-0caf65533eea2f16c" ]
  86. }
  87. }
  88. # Qualys Connector
  89. qualys_connector_externalid = "1601947413043" # Needs to come from the qualys console
  90. }