globals.hcl 7.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226
  1. # Set common variables for everything. This is automatically pulled in in the root terragrunt.hcl configuration to
  2. # feed forward to the child modules.
  3. locals {
  4. remote_state_bucket = "afsxdr-terraform-state" # Could be moved to environment/partition.
  5. binaries_bucket = "afsxdr-binaries" # Storage for binaries
  6. global_tags = {
  7. "Snapshot" = "Daily", # This will put it on some things where it doesn't belong, but seems useful overall
  8. #"Last_Updated" = timestamp() # while this is cool, its usefulness does not warrant the constant updates.
  9. }
  10. trusted_ips = [ # IPs for 'permissive' ingress. Used for the bastion host and for testing. Think twice before employing.
  11. "75.138.227.80/32", # Duane Waddle
  12. "24.11.231.98/32", # George Starcher
  13. "99.151.37.185/32", # Wesley Leonard
  14. "70.106.200.157/32", # John Reuther
  15. "73.10.53.113/32", # Rick Page Home
  16. "74.211.32.26/32", # Brad Poulton
  17. "70.160.60.248/32", # Brandon Naughton
  18. "99.56.213.129/32", # Fred Damstra
  19. "76.173.128.126/32", # Jeremy Cooper
  20. "97.117.87.190/32", # Colby Williams
  21. ]
  22. portal_test_whitelist = [ # IPs for Portal Test and vmray
  23. "12.245.107.250/32", # DPS Office Legato
  24. "12.204.167.162/32", # DPS Office San Antonio
  25. "54.86.98.62/32", # DPS AWS User VPN
  26. "75.138.227.80/32", # Duane Waddle
  27. "24.11.231.98/32", # George Starcher
  28. "99.151.37.185/32", # Wesley Leonard
  29. "70.106.200.157/32", # John Reuther
  30. "73.10.53.113/32", # Rick Page Home
  31. "74.211.32.26/32", # Brad Poulton
  32. "70.160.60.248/32", # Brandon Naughton
  33. "99.56.213.129/32", # Frederick Damstra
  34. "97.117.81.187/32", # Colby Williams
  35. "76.173.128.126/32", # Jeremy Cooper
  36. ]
  37. admin_remote_ipset = [
  38. {
  39. "value" = "108.28.205.174/32" # James Kerr Home
  40. type = "IPV4"
  41. },
  42. {
  43. "value" = "73.10.53.113/32" # Rick Page Home
  44. type = "IPV4"
  45. },
  46. {
  47. "value" = "99.151.37.185/32" # Wesley Leonard Home
  48. type = "IPV4"
  49. },
  50. {
  51. "value" = "74.211.32.26/32" # Brad Poulton Home
  52. type = "IPV4"
  53. },
  54. {
  55. "value" = "104.9.149.90/32" # Greg Rivas Home
  56. type = "IPV4"
  57. },
  58. {
  59. "value" = "100.4.76.3/32" # Brandon Naughton Home
  60. type = "IPV4"
  61. },
  62. {
  63. "value" = "170.248.173.247/32" # AFS site
  64. type = "IPV4"
  65. },
  66. {
  67. "value" = "170.248.173.245/32" # AFS site
  68. type = "IPV4"
  69. },
  70. {
  71. "value" = "70.120.41.230/32" # Will Ledesma Home
  72. type = "IPV4"
  73. },
  74. {
  75. "value" = "107.207.74.118/32" # Angelita Crawley Home
  76. type = "IPV4"
  77. },
  78. {
  79. "value" = "69.207.192.131/32" # Aaron Flores Home
  80. type = "IPV4"
  81. },
  82. {
  83. "value" = "96.231.213.193/32" # Rob Robinette Home
  84. type = "IPV4"
  85. },
  86. {
  87. "value" = "142.197.131.217/32" # Hilda Colon Home
  88. type = "IPV4"
  89. },
  90. {
  91. "value" = "198.13.82.11/32" # Hussein Carrenard Home
  92. type = "IPV4"
  93. },
  94. ]
  95. #Customer External IPs
  96. #To increase flexibility and to provide better documentation,
  97. #break up the IPs based on on-prem and not on-prem.
  98. #### AFS ON-PREM POP ####
  99. afs_pop = [
  100. "170.248.172.0/23",
  101. ]
  102. # AFS Azure POP external IPs
  103. afs_azure_pop = [
  104. "20.190.250.137/32", # EastUS2_External_Access
  105. "52.232.227.197/32", # Azure US-East Palo
  106. "52.185.64.173/32", # CentralUS_External_Access
  107. "52.242.225.98/32", # Azure US-Central Palo 20200721
  108. "52.177.84.83/32", # Lab_External_Access
  109. ]
  110. #### NGA ####
  111. nga_pop = [
  112. "199.16.64.3/32"
  113. ]
  114. xdr_interconnect = [
  115. "18.252.61.218/32",
  116. "18.252.67.171/32",
  117. "18.253.123.98/32",
  118. "18.253.98.90/32",
  119. ]
  120. # All of the "external" things that need access to publically
  121. # available C2 services, like Salt Masters, Repo Servers
  122. #
  123. # Structure is a list of maps, and the "description" value in the
  124. # map must be unique across the whole list or it will cause an error.
  125. #
  126. # TODO: the lists of IPs above need to be moved into this. I did not
  127. # attempt it NOW because of the upcoming change freeze and a desire to
  128. # not put in unnecessary changes.
  129. c2_services_external_ips = [
  130. {
  131. description = "Test LCPs"
  132. cidr_blocks = [
  133. "18.252.65.137/32", # Test LCP in Govcloud (EIP in common-services-gov)
  134. "54.224.56.231/32", # Test LCP in Commercial (EIP in common-services)
  135. ]
  136. },
  137. {
  138. description = "BAS-Commerce CMPS"
  139. cidr_blocks = [
  140. "52.61.137.158/32", # 2021-04-06 From Daniel Dicke <daniel.dicke@asmr.com>
  141. "52.61.70.43/32", # 2021-04-15 yanked from VPC flow logs
  142. ]
  143. },
  144. {
  145. description = "FRTIB VDI"
  146. cidr_blocks = [
  147. "52.61.113.202/32", # 2021-04-15 From Brian Nguyen brian.a.nguyen@accenturefederal.com
  148. ]
  149. },
  150. {
  151. description = "FRTIB CMPS"
  152. cidr_blocks = [
  153. "15.200.226.57/32", # 2021-07-12 From Brian Nguyen brian.a.nguyen@accenturefederal.com
  154. ]
  155. },
  156. {
  157. description = "FRTIB ALIGHT"
  158. cidr_blocks = [
  159. "54.205.60.17/32", # 2021-05-04 From John Conrad john.conrad.2@alight.com
  160. "52.206.203.98/32",
  161. "34.233.188.131/32",
  162. ]
  163. },
  164. {
  165. description = "CA-C19"
  166. cidr_blocks = [
  167. "34.223.59.103/32", # 2021-05-04 From Wes Leonard
  168. "44.234.190.14/32",
  169. "44.228.141.151/32",
  170. ]
  171. },
  172. {
  173. description = "DGI"
  174. cidr_blocks = [
  175. "3.32.175.159/32", # 2021-06-24 From Angelita Crawley MSOCI-1776
  176. "15.200.13.143/32",
  177. ]
  178. },
  179. ]
  180. dns_zone_map = {
  181. "accenturefederalcyber.com" = "Z03575081VGXN3FUZ8ERU"
  182. "accenturefederalcyber.net" = "Z07771312N8X39HKP141M"
  183. "xdr.accenturefederalcyber.com" = "Z0083657A94URZM2TM87"
  184. "xdrtest.accenturefederalcyber.com" = "Z01677392W0QM639KU2KC"
  185. }
  186. repo_server_whitelist = concat(
  187. local.afs_pop,
  188. local.afs_azure_pop,
  189. local.nga_pop,
  190. [ "52.179.13.17/32", #???
  191. ],
  192. local.xdr_interconnect
  193. )
  194. key_pairs = {
  195. # Should be your username -> key pair
  196. "msoc-build" = "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQDv8N5N/ECQNKdqZKmjQqGkPiAtJc3WmWdpcZmhxUfplGRFW0IlHGH/wPUgkXXg+djWNpMyT+bqWI8B4Q18uw0Y+w09lN+F1t/vp2GNPYyIPHTGbr2u/r5RCuPXc5Gg6ogkneyAipPCPAhBRbvPaFtfLSJ94ba01LoFs4xgCIZXetr/3ql61OlLyB8vb8FohpW/7u32zzOVJwObA+QlDrRgivaYpwNBxd+No9HEz29dUVFMsKb3ko0GpBuu4pptbj73XxP0EeodMj0hee0FH4kEkZy80LVbg2WeTsq6Mi/FRZmeGt5f3oZEcfflGqYOPA4FmhTrc9O9pp36DDOGts79TeZ6abky+a0jRJQvaeN8x8DZ6PQXfVGpOrNst5zw0Z9EP3ZrFAkX6CYfZkckq0h5Fs+rcWLeUfM/ppZqcyNBDys7zxjFNdmWk86pgn+XvdCVIlsp99B6CzgDoAJkay09ROVqh39HTK7m2aKZoyFWZvUpaqUOlLkOb47bMQzIBSp8Yaoo4PozSg0lQOzkJl3JTR0OZksbeN0pFKY4qNcUcpgUU5mVYs5SXWAOsih51kC5s+0F6Uxt+iDjT9ASaF1O+Bl46UnhpwrtN4ckpHsFnp58mdfhJCUMjt6PX+UPxjRlSL21EkjGALybG2C0gPuoGo0x5bEsZl/gFrFJ+3r6gQ== MSOC Build Key",
  197. "fdamstra" = "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDF3pGU9+HufgfEhPP7P0Lt7kqfGWLTGd6sfJgSypcSo3FP1XhwFOWkaNvZIpoIeQXhux5vTm+RoqYZ/3Gj7hcGMLdoHWArvLHD2AGjxbFnsmiCioQgsC/rYLBjiWNsDdVF5Arofby/RwzivMAi7yivhY4nGzXPsHZoucB0Wi34/9AmxbvXWv6ckuWkMjrXVe+uwFje3U7jQHRW9jQRpCRRfUjVA4FmH0PWqWFBlt/zqsDPOzbxNNhAvyrJho7jVBNjCLsq0++lT8BDKrYbaZiT0F2c9uIDRpHJSdjpqVCf9bghmeJWYMoNHAkGR7WCFjPCJ7QM57a2oRBtm1A/EWcr",
  198. }
  199. # Sensu Thresholds
  200. sensu_checks = {
  201. "dns": {
  202. "warning": "5.0", # warn if no resolution for 5 seconds
  203. "critical": "10.0" # critical if no resolution for 10 seconds
  204. },
  205. }
  206. # Some sane defaults we don't want to specify everywhere
  207. is_legacy = false # By default, accounts are not legacy accounts
  208. extra_ebs_key_admins = [ ]
  209. extra_ebs_key_users = [ ]
  210. extra_ebs_key_attachers = [ ]
  211. }