demo_solution/configuration/epam.gateway.env.demo.tfvars (426 lines of code) (raw):

# BASE layer # 005_rg rg_list = [ # epam.gateway.env.demo { name = "gat-rg-weeu-s-network-01" location = "westeurope" tags = { Organization = "demo" } }, { name = "gat-rg-weeu-s-infra-01" location = "westeurope" tags = { Organization = "demo" } } ] # 010_loganalytics logAnalytics = [ # epam.gateway.env.demo { name = "gat-la-weeu-s-hubNetworking-01" rg_name = "gat-rg-weeu-s-infra-01" pricing_tier = "PerGB2018" retention_in_days = 60 storage_account_name = "gatstrphnetworkingla0001" assignment_role_definition_name = "Monitoring Contributor" assignment_description = "Can read all monitoring data and update monitoring settings." monitoring_contributor_assigment_ids = {} # Please configure subscriptions "IDs" activity_log_subs = ["#{ENV_AZURE_SUBSCRIPTION_ID}#"] diagnostic_setting = { name = "gat-la-weeu-s-hubNetworking-01-dgs" # storage_account_id = "/subscriptions/#{ENV_AZURE_SUBSCRIPTION_ID}#/resourceGroups/gat-rg-weeu-s-infra-01/providers/Microsoft.Storage/storageAccounts/gatsthubnetworkingla011" log_category_group = ["audit"] metric = ["AllMetrics"] } tags = { environment = "" businessCriticality = "" businessUnit = "" businessOwner = "" platfromSupport = "" functionalSupport = "" reviewedOn = "" } } ] # 025_vnet vnets = [ # epam.gateway.env.demo { vnet_name = "gat-vnet-weeu-s-hub-01" rg_name = "gat-rg-weeu-s-network-01" address_space = ["10.1.48.0/20"] subnets = [ { name = "GatewaySubnet" address_prefixes = ["10.1.56.0/24"] service_endpoints = [ "Microsoft.AzureActiveDirectory", "Microsoft.KeyVault", "Microsoft.Storage", "Microsoft.Sql" ] }, { name = "PrivateEndpointSubnet" address_prefixes = ["10.1.57.0/24"] service_endpoints = [ "Microsoft.AzureActiveDirectory", "Microsoft.KeyVault", "Microsoft.Storage", "Microsoft.Sql" ] }, { name = "AzureFirewallSubnet" address_prefixes = ["10.1.58.0/24"] service_endpoints = [ "Microsoft.AzureActiveDirectory", "Microsoft.KeyVault", "Microsoft.Storage", "Microsoft.Sql" ] }, { name = "AzureBastionSubnet" address_prefixes = ["10.1.59.0/24"] service_endpoints = [ "Microsoft.AzureActiveDirectory", "Microsoft.KeyVault", "Microsoft.Storage", "Microsoft.Sql" ] } ] diagnostic_setting = { name = "gat-vnet-weeu-s-hub-01-diag" log_analytics_workspace_id = "/subscriptions/#{ENV_AZURE_SUBSCRIPTION_ID}#/resourceGroups/gat-rg-weeu-s-infra-01/providers/Microsoft.OperationalInsights/workspaces/gat-la-weeu-s-hubNetworking-01" storage_account_id = "/subscriptions/#{ENV_AZURE_SUBSCRIPTION_ID}#/resourceGroups/gat-rg-weeu-s-infra-01/providers/Microsoft.Storage/storageAccounts/gatstrphnetworkingla0001" log_category = ["VMProtectionAlerts"] metric = ["AllMetrics"] } tags = { environment = "" businessCriticality = "" businessUnit = "" businessOwner = "" platfromSupport = "" functionalSupport = "" reviewedOn = "" } } ] # WORK layer # backend tfstate data from base layer backend_tfstate_file_path_list = [ "../base_layer/terraform.tfstate.d/epam.shared.env.demo", "../base_layer/terraform.tfstate.d/epam.identity.env.demo", "../base_layer/terraform.tfstate.d/epam.dmz.env.demo", "../base_layer/terraform.tfstate.d/epam.business.env.demo", "../base_layer/terraform.tfstate.d/epam.gateway.env.demo" ] # 020_automationaccount automation_accounts = [ { automation_account_name = "gat-aa-weeu-p-patching-01" resource_group_name = "gat-rg-weeu-s-infra-01" schedule = [ { schedule_name = "gat-schedule-weeu-s-01" frequency = "Hour" interval = null description = null start_time = null timezone = null week_days = null month_days = null monthly_occurrence = null } ] job_schedule = [ { schedule_name = "gat-schedule-weeu-s-01" runbook_name = "gat-runbook-weeu-s-01" parameters = {} } ] runbook = [ { runbook_name = "gat-runbook-weeu-s-01" runbook_type = "PowerShell" log_verbose = true log_progress = true runbook_type = "PowerShell" script_file_name = "runbook-fw.ps1" uri = null } ] diagnostic_setting = { name = "gat-aa-weeu-p-patching-01-diag" log_analytics_workspace_id = "/subscriptions/#{ENV_AZURE_SUBSCRIPTION_ID}#/resourceGroups/gat-rg-weeu-s-infra-01/providers/Microsoft.OperationalInsights/workspaces/gat-la-weeu-s-hubNetworking-01" storage_account_id = "/subscriptions/#{ENV_AZURE_SUBSCRIPTION_ID}#/resourceGroups/gat-rg-weeu-s-infra-01/providers/Microsoft.Storage/storageAccounts/gatstrphnetworkingla0001" log_category = ["JobLogs", "JobStreams", "DscNodeStatus", "AuditEvent"] metric = ["AllMetrics"] } tags = { environment = "" } } ] # 025_publicip public_ips = [ { name = "gat-pip-weeu-s-hubnetfw-01" rg_name = "gat-rg-weeu-s-network-01" allocation_method = "Static" sku = "Standard" zones = ["1", "2", "3"] ip_version = "IPv4" domain_name_label = "gat-pip-weeu-gaw-hubnetfw-011" diagnostic_setting = { name = "gat-pip-weeu-s-hubnetfw-01-diag" log_analytics_workspace_id = "/subscriptions/#{ENV_AZURE_SUBSCRIPTION_ID}#/resourceGroups/gat-rg-weeu-s-infra-01/providers/Microsoft.OperationalInsights/workspaces/gat-la-weeu-s-hubNetworking-01" storage_account_id = "/subscriptions/#{ENV_AZURE_SUBSCRIPTION_ID}#/resourceGroups/gat-rg-weeu-s-infra-01/providers/Microsoft.Storage/storageAccounts/gatstrphnetworkingla0001" log_category = ["DDoSProtectionNotifications", "DDoSMitigationFlowLogs", "DDoSMitigationReports"] metric = ["AllMetrics"] } tags = { environment = "" businessCriticality = "" businessUnit = "" businessOwner = "" platformSupport = "" functionalSupport = "" reviewedOn = "" } }, { name = "gat-pip-weeu-s-vpngtw-01" rg_name = "gat-rg-weeu-s-network-01" allocation_method = "Static" sku = "Standard" zones = ["1", "2", "3"] ip_version = "IPv4" domain_name_label = "gat-pip-weeu-gaw-vpngtw-011" diagnostic_setting = { name = "gat-pip-weeu-s-vpngtw-01-diag" log_analytics_workspace_id = "/subscriptions/#{ENV_AZURE_SUBSCRIPTION_ID}#/resourceGroups/gat-rg-weeu-s-infra-01/providers/Microsoft.OperationalInsights/workspaces/gat-la-weeu-s-hubNetworking-01" storage_account_id = "/subscriptions/#{ENV_AZURE_SUBSCRIPTION_ID}#/resourceGroups/gat-rg-weeu-s-infra-01/providers/Microsoft.Storage/storageAccounts/gatstrphnetworkingla0001" log_category = ["DDoSProtectionNotifications", "DDoSMitigationFlowLogs", "DDoSMitigationReports"] metric = ["AllMetrics"] } tags = { environment = "" businessCriticality = "" businessUnit = "" businessOwner = "" platformSupport = "" functionalSupport = "" reviewedOn = "" } }, { name = "gat-pip-weeu-s-bstn-01" rg_name = "gat-rg-weeu-s-network-01" allocation_method = "Static" sku = "Standard" zones = ["1", "2", "3"] ip_version = "IPv4" domain_name_label = "gat-pip-weeu-gaw-bstn-011" diagnostic_setting = { name = "gat-pip-weeu-s-bstn-01-diag" log_analytics_workspace_id = "/subscriptions/#{ENV_AZURE_SUBSCRIPTION_ID}#/resourceGroups/gat-rg-weeu-s-infra-01/providers/Microsoft.OperationalInsights/workspaces/gat-la-weeu-s-hubNetworking-01" storage_account_id = "/subscriptions/#{ENV_AZURE_SUBSCRIPTION_ID}#/resourceGroups/gat-rg-weeu-s-infra-01/providers/Microsoft.Storage/storageAccounts/gatstrphnetworkingla0001" log_category = ["DDoSProtectionNotifications", "DDoSMitigationFlowLogs", "DDoSMitigationReports"] metric = ["AllMetrics"] } tags = { environment = "" businessCriticality = "" businessUnit = "" businessOwner = "" platformSupport = "" functionalSupport = "" reviewedOn = "" } } ] # # 030_virtualgtw virtual_gateways = [ { name = "gat-vgtw-weeu-s-vpn-shared-01" location = "westeurope" rg_name = "gat-rg-weeu-s-network-01" type = "Vpn" sku = "VpnGw2AZ" generation = "Generation1" ip_configuration = { subnet_name = "GatewaySubnet" vnet_name = "gat-vnet-weeu-s-hub-01" vnet_rg_name = "gat-rg-weeu-s-network-01" public_ip_name = "gat-pip-weeu-s-vpngtw-01" public_ip_rg_name = "gat-rg-weeu-s-network-01" } local_network_gateway = { name = "gat-vnet-weeu-s-hubnet-01-localgw" gateway_address = "1.1.1.1" address_space = ["10.0.0.0/8"] } tags = { environment = "" businessCriticality = "" businessUnit = "" businessOwner = "" platfromSupport = "" functionalSupport = "" reviewedOn = "" } } ] # 035_vnetpeering vnet_peerings = [ # epam.gateway.env.demo { name = "gat-peer-weeu-s-dmz-01" source_vnet_name = "gat-vnet-weeu-s-hub-01" source_vnet_rg_name = "gat-rg-weeu-s-network-01" destination_vnet_name = "dmz-vnet-weeu-s-spoke-01" destination_vnet_rg_name = "dmz-rg-weeu-s-network-01" allow_virtual_network_access = true allow_forwarded_traffic = true allow_gateway_transit = false use_remote_gateways = false }, { name = "gat-peer-weeu-s-sh-01" source_vnet_name = "gat-vnet-weeu-s-hub-01" source_vnet_rg_name = "gat-rg-weeu-s-network-01" destination_vnet_name = "sh-vnet-weeu-s-spoke-01" destination_vnet_rg_name = "gat-rg-weeu-s-network-01" allow_virtual_network_access = true allow_forwarded_traffic = true allow_gateway_transit = false use_remote_gateways = false }, { name = "gat-peer-weeu-s-bus-01" source_vnet_name = "gat-vnet-weeu-s-hub-01" source_vnet_rg_name = "gat-rg-weeu-s-network-01" destination_vnet_name = "bus-vnet-weeu-s-spoke-01" destination_vnet_rg_name = "gat-rg-weeu-s-network-01" allow_virtual_network_access = true allow_forwarded_traffic = true allow_gateway_transit = false use_remote_gateways = false }, { name = "gat-peer-weeu-s-idth-01" source_vnet_name = "gat-vnet-weeu-s-hub-01" source_vnet_rg_name = "gat-rg-weeu-s-network-01" destination_vnet_name = "idth-vnet-weeu-s-spoke-01" destination_vnet_rg_name = "idth-rg-weeu-s-network-01" allow_virtual_network_access = true allow_forwarded_traffic = true allow_gateway_transit = false use_remote_gateways = false } ] # # 045_azurefirewall azure_firewalls = [ { name = "gat-azfrw-weeu-s-hubnetfirewall" location = "westeurope" rg_name = "gat-rg-weeu-s-network-01" sku_tier = "Premium" sku_name = "AZFW_VNet" subnet_associate = { subnet_name = "AzureFirewallSubnet" vnet_name = "gat-vnet-weeu-s-hub-01" rg_name = "gat-rg-weeu-s-network-01" } public_ip_address = { name = "gat-pip-weeu-s-hubnetfw-01" rg_name = "gat-rg-weeu-s-network-01" } zones = [ "1", "2", "3" ] netw_rule_collections = [ { name = "demo-test-rule" priority = 500 action = "Allow" rule = [ { name = "demo-test-rule" description = "first description" source_addresses = ["10.1.34.0/24"] source_ip_groups = null destination_addresses = ["*"] destination_ip_groups = null destination_fqdns = null destination_ports = ["8080"] protocols = ["Any"] } ] } ] diagnostic_setting = { name = "gat-azfrw-weeu-s-hubnetfirewall-diag" log_analytics_workspace_id = "/subscriptions/#{ENV_AZURE_SUBSCRIPTION_ID}#/resourceGroups/gat-rg-weeu-s-infra-01/providers/Microsoft.OperationalInsights/workspaces/gat-la-weeu-s-hubNetworking-01" storage_account_id = "/subscriptions/#{ENV_AZURE_SUBSCRIPTION_ID}#/resourceGroups/gat-rg-weeu-s-infra-01/providers/Microsoft.Storage/storageAccounts/gatstrphnetworkingla0001" log_category = ["AzureFirewallApplicationRule", "AzureFirewallNetworkRule", "AzureFirewallDnsProxy", "AZFWNetworkRule", "AZFWApplicationRule", "AZFWNatRule", "AZFWThreatIntel", "AZFWIdpsSignature", "AZFWDnsQuery", "AZFWFqdnResolveFailure", "AZFWFatFlow", "AZFWFlowTrace", "AZFWApplicationRuleAggregation", "AZFWNetworkRuleAggregation", "AZFWNatRuleAggregation"] metric = ["AllMetrics"] } tags = { environment = "" businessCriticality = "" businessUnit = "" businessOwner = "" platfromSupport = "" functionalSupport = "" reviewedOn = "" } } ] # 050_bastionhost bastion_host = [ { resource_group_name = "gat-rg-weeu-s-network-01" vnet_rg_name = "gat-rg-weeu-s-network-01" vnet_name = "gat-vnet-weeu-s-hub-01" public_ip_address_id = "/subscriptions/#{ENV_AZURE_SUBSCRIPTION_ID}#/resourceGroups/gat-rg-weeu-s-network-01/providers/Microsoft.Network/publicIPAddresses/gat-pip-weeu-s-bstn-01" bastion_pip_name = "gat-pip-weeu-s-hubnetbastin-01" bastion_pip_zones = ["1", "2", "3"] bastion_host_name = "gat-weeu-s-networking-shared-01-bastion" sku = "Standard" scale_units = "2" tunneling_enabled = true shareable_link_enabled = true ip_connect_enabled = true file_copy_enabled = true diagnostic_setting = { name = "conh-rg-weeu-p-network-01-diag" log_analytics_workspace_id = "/subscriptions/#{ENV_AZURE_SUBSCRIPTION_ID}#/resourceGroups/gat-rg-weeu-s-infra-01/providers/Microsoft.OperationalInsights/workspaces/gat-la-weeu-s-hubNetworking-01" storage_account_id = "/subscriptions/#{ENV_AZURE_SUBSCRIPTION_ID}#/resourceGroups/gat-rg-weeu-s-infra-01/providers/Microsoft.Storage/storageAccounts/gatstrphnetworkingla0001" log_category = ["BastionAuditLogs"] metric = ["AllMetrics"] } tags = { environment = "" businessCriticality = "" businessUnit = "" businessOwner = "" platfromSupport = "" functionalSupport = "" reviewedOn = "" } } ]