From 986a21211608c5109b375e73d13e85cd2d34abaa Mon Sep 17 00:00:00 2001 From: Patrick Bareiss Date: Mon, 26 Aug 2024 11:22:50 +0200 Subject: [PATCH] Remove terraform/ansible/vars/ from version control --- .gitignore | 2 +- terraform/ansible/vars/.gitkeep | 0 terraform/ansible/vars/linux_vars.json | 7 ------- terraform/ansible/vars/nginx_vars.json | 6 ------ terraform/ansible/vars/phantom_vars.json | 5 ----- terraform/ansible/vars/snort_vars.json | 6 ------ terraform/ansible/vars/splunk_vars.json | 13 ------------- terraform/ansible/vars/windows_vars.json | 9 --------- terraform/ansible/vars/zeek_vars.json | 5 ----- 9 files changed, 1 insertion(+), 52 deletions(-) delete mode 100644 terraform/ansible/vars/.gitkeep delete mode 100644 terraform/ansible/vars/linux_vars.json delete mode 100644 terraform/ansible/vars/nginx_vars.json delete mode 100644 terraform/ansible/vars/phantom_vars.json delete mode 100644 terraform/ansible/vars/snort_vars.json delete mode 100644 terraform/ansible/vars/splunk_vars.json delete mode 100644 terraform/ansible/vars/windows_vars.json delete mode 100644 terraform/ansible/vars/zeek_vars.json diff --git a/.gitignore b/.gitignore index af5972040..881b3cf8a 100644 --- a/.gitignore +++ b/.gitignore @@ -1,7 +1,7 @@ # ignore attack_range.yml that might include local custom changes attack_range.yml poetry.lock -terraform/ansible/vars/*vars.json +terraform/ansible/vars/* vagrant/*vars.json #keys diff --git a/terraform/ansible/vars/.gitkeep b/terraform/ansible/vars/.gitkeep deleted file mode 100644 index e69de29bb..000000000 diff --git a/terraform/ansible/vars/linux_vars.json b/terraform/ansible/vars/linux_vars.json deleted file mode 100644 index 7f3aa1a12..000000000 --- a/terraform/ansible/vars/linux_vars.json +++ /dev/null @@ -1,7 +0,0 @@ -{ - "ansible_python_interpreter": "/usr/bin/python3", - "general": {"attack_range_name":"ar","attack_range_password":"5kVkrkns0eL2TN23Ir2","carbon_black_cloud":"0","carbon_black_cloud_agent_name":"installer_vista_win7_win8-64-3.8.0.627.msi","carbon_black_cloud_company_code":"","carbon_black_cloud_s3_bucket":"","cloud_provider":"aws","crowdstrike_agent_name":"WindowsSensor.exe","crowdstrike_customer_ID":"","crowdstrike_falcon":"0","crowdstrike_logs_access_key_id":"","crowdstrike_logs_region":"","crowdstrike_logs_secret_access_key":"","crowdstrike_logs_sqs_url":"","install_contentctl":"0","ip_whitelist":"84.174.73.25/32","key_name":"pbareiss-09129","statepath":"/Users/pbareiss/projects/attack_range/modules/../terraform/aws/state/ar.terraform.tfstate","use_prebuilt_images_with_packer":"0"}, - "splunk_server": {"byo_splunk":"0","byo_splunk_ip":"","ingest_bots3_data":"0","install_dltk":"0","install_es":"0","s3_bucket_url":"https://attack-range-appbinaries.s3-us-west-2.amazonaws.com","splunk_apps":"splunk-add-on-for-microsoft-windows_880.tgz,splunk-timeline-custom-visualization_162.tgz,status-indicator-custom-visualization_150.tgz,splunk-sankey-diagram-custom-visualization_160.tgz,punchcard-custom-visualization_150.tgz,splunk_attack_range_reporting-1.0.9.tar.gz,splunk-common-information-model-cim_532.tgz,DA-ESS-ContentUpdate-latest.tar.gz,python-for-scientific-computing-for-linux-64-bit_420.tgz,splunk-machine-learning-toolkit_541.tgz,splunk-security-essentials_380.tgz,splunk-add-on-for-sysmon_400.tgz,splunk-add-on-for-sysmon-for-linux_100.tgz,splunk-add-on-for-amazon-web-services-aws_760.tgz,splunk-add-on-for-microsoft-office-365_451.tgz,splunk-add-on-for-amazon-kinesis-firehose_131r7d1d093.tgz,splunk-add-on-for-unix-and-linux_910.tgz,ta-for-zeek_108.tgz,splunk-add-on-for-nginx_322.tgz,phantom-app-for-splunk_4035.tgz,TA-osquery.tar.gz,splunk-add-on-for-microsoft-cloud-services_530.tgz,splunk-add-on-for-crowdstrike-fdr_150.tgz,vmware-carbon-black-cloud_115.tgz,splunk-add-on-for-carbon-black_210.tgz,TA-aurora-0.2.0.tar.gz,snort-alert-for-splunk_111.tgz","splunk_es_app":"splunk-enterprise-security_731.spl","splunk_uf_url":"https://download.splunk.com/products/universalforwarder/releases/9.3.0/linux/splunkforwarder-9.3.0-51ccf43db5bd-linux-2.6-amd64.deb","splunk_uf_win_url":"https://download.splunk.com/products/universalforwarder/releases/9.3.0/windows/splunkforwarder-9.3.0-51ccf43db5bd-x64-release.msi","splunk_url":"https://download.splunk.com/products/splunk/releases/9.3.0/linux/splunk-9.3.0-51ccf43db5bd-Linux-x86_64.tgz"}, - "linux_servers": {"hostname":"ar-lin","sysmon_config":"SysMonLinux-CatchAll.xml"}, - "simulation": {"atomic_red_team_branch":"master","atomic_red_team_repo":"redcanaryco"}, -} diff --git a/terraform/ansible/vars/nginx_vars.json b/terraform/ansible/vars/nginx_vars.json deleted file mode 100644 index 914714b98..000000000 --- a/terraform/ansible/vars/nginx_vars.json +++ /dev/null @@ -1,6 +0,0 @@ -{ - "ansible_python_interpreter": "/usr/bin/python3", - "general": {"attack_range_name":"ar","attack_range_password":"5kVkrkns0eL2TN23Ir2","carbon_black_cloud":"0","carbon_black_cloud_agent_name":"installer_vista_win7_win8-64-3.8.0.627.msi","carbon_black_cloud_company_code":"","carbon_black_cloud_s3_bucket":"","cloud_provider":"aws","crowdstrike_agent_name":"WindowsSensor.exe","crowdstrike_customer_ID":"","crowdstrike_falcon":"0","crowdstrike_logs_access_key_id":"","crowdstrike_logs_region":"","crowdstrike_logs_secret_access_key":"","crowdstrike_logs_sqs_url":"","install_contentctl":"0","ip_whitelist":"84.174.73.25/32","key_name":"pbareiss-09129","statepath":"/Users/pbareiss/projects/attack_range/modules/../terraform/aws/state/ar.terraform.tfstate","use_prebuilt_images_with_packer":"0"}, - "splunk_server": {"byo_splunk":"0","byo_splunk_ip":"","ingest_bots3_data":"0","install_dltk":"0","install_es":"1","s3_bucket_url":"https://attack-range-appbinaries.s3-us-west-2.amazonaws.com","splunk_apps":"splunk-add-on-for-microsoft-windows_880.tgz,splunk-timeline-custom-visualization_162.tgz,status-indicator-custom-visualization_150.tgz,splunk-sankey-diagram-custom-visualization_160.tgz,punchcard-custom-visualization_150.tgz,splunk_attack_range_reporting-1.0.9.tar.gz,splunk-common-information-model-cim_532.tgz,DA-ESS-ContentUpdate-latest.tar.gz,python-for-scientific-computing-for-linux-64-bit_420.tgz,splunk-machine-learning-toolkit_541.tgz,splunk-security-essentials_380.tgz,splunk-add-on-for-sysmon_400.tgz,splunk-add-on-for-sysmon-for-linux_100.tgz,splunk-add-on-for-amazon-web-services-aws_760.tgz,splunk-add-on-for-microsoft-office-365_451.tgz,splunk-add-on-for-amazon-kinesis-firehose_131r7d1d093.tgz,splunk-add-on-for-unix-and-linux_910.tgz,ta-for-zeek_108.tgz,splunk-add-on-for-nginx_322.tgz,phantom-app-for-splunk_4035.tgz,TA-osquery.tar.gz,splunk-add-on-for-microsoft-cloud-services_530.tgz,splunk-add-on-for-crowdstrike-fdr_150.tgz,vmware-carbon-black-cloud_115.tgz,splunk-add-on-for-carbon-black_210.tgz,TA-aurora-0.2.0.tar.gz,snort-alert-for-splunk_111.tgz","splunk_es_app":"splunk-enterprise-security_731.spl","splunk_uf_url":"https://download.splunk.com/products/universalforwarder/releases/9.3.0/linux/splunkforwarder-9.3.0-51ccf43db5bd-linux-2.6-amd64.deb","splunk_uf_win_url":"https://download.splunk.com/products/universalforwarder/releases/9.3.0/windows/splunkforwarder-9.3.0-51ccf43db5bd-x64-release.msi","splunk_url":"https://download.splunk.com/products/splunk/releases/9.3.0/linux/splunk-9.3.0-51ccf43db5bd-Linux-x86_64.tgz"}, - "nginx_server": {"hostname":"nginx","nginx_server":"1","proxy_server_ip":"10.0.1.12","proxy_server_port":"8000"}, -} diff --git a/terraform/ansible/vars/phantom_vars.json b/terraform/ansible/vars/phantom_vars.json deleted file mode 100644 index b2ed49576..000000000 --- a/terraform/ansible/vars/phantom_vars.json +++ /dev/null @@ -1,5 +0,0 @@ -{ - "general": {"attack_range_name":"ar","attack_range_password":"5kVkrkns0eL2TN23Ir2","carbon_black_cloud":"0","carbon_black_cloud_agent_name":"installer_vista_win7_win8-64-3.8.0.627.msi","carbon_black_cloud_company_code":"","carbon_black_cloud_s3_bucket":"","cloud_provider":"aws","crowdstrike_agent_name":"WindowsSensor.exe","crowdstrike_customer_ID":"","crowdstrike_falcon":"0","crowdstrike_logs_access_key_id":"","crowdstrike_logs_region":"","crowdstrike_logs_secret_access_key":"","crowdstrike_logs_sqs_url":"","install_contentctl":"0","ip_whitelist":"84.174.73.25/32","key_name":"pbareiss-09129","statepath":"/Users/pbareiss/projects/attack_range/modules/../terraform/aws/state/ar.terraform.tfstate","use_prebuilt_images_with_packer":"0"}, - "aws": {"cloudtrail":"0","cloudtrail_sqs_queue":"https://sqs.us-west-2.amazonaws.com/111111111111/cloudtrail-cloud-attack-range","private_key_path":"/Users/pbareiss/projects/attack_range/pbareiss-09129.key","region":"eu-central-1","tf_remote_state_dynamo_db_table":"test","tf_remote_state_s3_bucket":"test","use_elastic_ips":"1","use_remote_state":"0"}, - "phantom_server": {"phantom_app":"splunk_soar-unpriv-6.2.2.134-8f694086-el7-x86_64.tgz","phantom_byo":"0","phantom_byo_api_token":"","phantom_byo_ip":"","phantom_server":"1"}, -} diff --git a/terraform/ansible/vars/snort_vars.json b/terraform/ansible/vars/snort_vars.json deleted file mode 100644 index 4e3ee9b65..000000000 --- a/terraform/ansible/vars/snort_vars.json +++ /dev/null @@ -1,6 +0,0 @@ -{ - "ansible_python_interpreter": "/usr/bin/python3", - "general": {"attack_range_name":"ar","attack_range_password":"5kVkrkns0eL2TN23Ir2","carbon_black_cloud":"0","carbon_black_cloud_agent_name":"installer_vista_win7_win8-64-3.8.0.627.msi","carbon_black_cloud_company_code":"","carbon_black_cloud_s3_bucket":"","cloud_provider":"aws","crowdstrike_agent_name":"WindowsSensor.exe","crowdstrike_customer_ID":"","crowdstrike_falcon":"0","crowdstrike_logs_access_key_id":"","crowdstrike_logs_region":"","crowdstrike_logs_secret_access_key":"","crowdstrike_logs_sqs_url":"","install_contentctl":"0","ip_whitelist":"84.174.73.25/32","key_name":"pbareiss-09129","statepath":"/Users/pbareiss/projects/attack_range/modules/../terraform/aws/state/ar.terraform.tfstate","use_prebuilt_images_with_packer":"0"}, - "splunk_server": {"byo_splunk":"0","byo_splunk_ip":"","ingest_bots3_data":"0","install_dltk":"0","install_es":"0","s3_bucket_url":"https://attack-range-appbinaries.s3-us-west-2.amazonaws.com","splunk_apps":"splunk-add-on-for-microsoft-windows_880.tgz,splunk-timeline-custom-visualization_162.tgz,status-indicator-custom-visualization_150.tgz,splunk-sankey-diagram-custom-visualization_160.tgz,punchcard-custom-visualization_150.tgz,splunk_attack_range_reporting-1.0.9.tar.gz,splunk-common-information-model-cim_532.tgz,DA-ESS-ContentUpdate-latest.tar.gz,python-for-scientific-computing-for-linux-64-bit_420.tgz,splunk-machine-learning-toolkit_541.tgz,splunk-security-essentials_380.tgz,splunk-add-on-for-sysmon_400.tgz,splunk-add-on-for-sysmon-for-linux_100.tgz,splunk-add-on-for-amazon-web-services-aws_760.tgz,splunk-add-on-for-microsoft-office-365_451.tgz,splunk-add-on-for-amazon-kinesis-firehose_131r7d1d093.tgz,splunk-add-on-for-unix-and-linux_910.tgz,ta-for-zeek_108.tgz,splunk-add-on-for-nginx_322.tgz,phantom-app-for-splunk_4035.tgz,TA-osquery.tar.gz,splunk-add-on-for-microsoft-cloud-services_530.tgz,splunk-add-on-for-crowdstrike-fdr_150.tgz,vmware-carbon-black-cloud_115.tgz,splunk-add-on-for-carbon-black_210.tgz,TA-aurora-0.2.0.tar.gz,snort-alert-for-splunk_111.tgz","splunk_es_app":"splunk-enterprise-security_731.spl","splunk_uf_url":"https://download.splunk.com/products/universalforwarder/releases/9.3.0/linux/splunkforwarder-9.3.0-51ccf43db5bd-linux-2.6-amd64.deb","splunk_uf_win_url":"https://download.splunk.com/products/universalforwarder/releases/9.3.0/windows/splunkforwarder-9.3.0-51ccf43db5bd-x64-release.msi","splunk_url":"https://download.splunk.com/products/splunk/releases/9.3.0/linux/splunk-9.3.0-51ccf43db5bd-Linux-x86_64.tgz"}, - "snort_server": {"snort_server":"1"}, -} diff --git a/terraform/ansible/vars/splunk_vars.json b/terraform/ansible/vars/splunk_vars.json deleted file mode 100644 index b751a6fcc..000000000 --- a/terraform/ansible/vars/splunk_vars.json +++ /dev/null @@ -1,13 +0,0 @@ -{ - "ansible_python_interpreter": "/usr/bin/python3", - "general": {"attack_range_name":"ar","attack_range_password":"5kVkrkns0eL2TN23Ir2","carbon_black_cloud":"0","carbon_black_cloud_agent_name":"installer_vista_win7_win8-64-3.8.0.627.msi","carbon_black_cloud_company_code":"","carbon_black_cloud_s3_bucket":"","cloud_provider":"aws","crowdstrike_agent_name":"WindowsSensor.exe","crowdstrike_customer_ID":"","crowdstrike_falcon":"0","crowdstrike_logs_access_key_id":"","crowdstrike_logs_region":"","crowdstrike_logs_secret_access_key":"","crowdstrike_logs_sqs_url":"","install_contentctl":"0","ip_whitelist":"84.174.73.25/32","key_name":"pbareiss-09129","statepath":"/Users/pbareiss/projects/attack_range/modules/../terraform/aws/state/ar.terraform.tfstate","use_prebuilt_images_with_packer":"0"}, - "aws": {"cloudtrail":"0","cloudtrail_sqs_queue":"https://sqs.us-west-2.amazonaws.com/111111111111/cloudtrail-cloud-attack-range","private_key_path":"/Users/pbareiss/projects/attack_range/pbareiss-09129.key","region":"eu-central-1","tf_remote_state_dynamo_db_table":"test","tf_remote_state_s3_bucket":"test","use_elastic_ips":"1","use_remote_state":"0"}, - "splunk_server": {"byo_splunk":"0","byo_splunk_ip":"","ingest_bots3_data":"0","install_dltk":"0","install_es":"0","s3_bucket_url":"https://attack-range-appbinaries.s3-us-west-2.amazonaws.com","splunk_apps":"splunk-add-on-for-microsoft-windows_880.tgz,splunk-timeline-custom-visualization_162.tgz,status-indicator-custom-visualization_150.tgz,splunk-sankey-diagram-custom-visualization_160.tgz,punchcard-custom-visualization_150.tgz,splunk_attack_range_reporting-1.0.9.tar.gz,splunk-common-information-model-cim_532.tgz,DA-ESS-ContentUpdate-latest.tar.gz,python-for-scientific-computing-for-linux-64-bit_420.tgz,splunk-machine-learning-toolkit_541.tgz,splunk-security-essentials_380.tgz,splunk-add-on-for-sysmon_400.tgz,splunk-add-on-for-sysmon-for-linux_100.tgz,splunk-add-on-for-amazon-web-services-aws_760.tgz,splunk-add-on-for-microsoft-office-365_451.tgz,splunk-add-on-for-amazon-kinesis-firehose_131r7d1d093.tgz,splunk-add-on-for-unix-and-linux_910.tgz,ta-for-zeek_108.tgz,splunk-add-on-for-nginx_322.tgz,phantom-app-for-splunk_4035.tgz,TA-osquery.tar.gz,splunk-add-on-for-microsoft-cloud-services_530.tgz,splunk-add-on-for-crowdstrike-fdr_150.tgz,vmware-carbon-black-cloud_115.tgz,splunk-add-on-for-carbon-black_210.tgz,TA-aurora-0.2.0.tar.gz,snort-alert-for-splunk_111.tgz","splunk_es_app":"splunk-enterprise-security_731.spl","splunk_uf_url":"https://download.splunk.com/products/universalforwarder/releases/9.3.0/linux/splunkforwarder-9.3.0-51ccf43db5bd-linux-2.6-amd64.deb","splunk_uf_win_url":"https://download.splunk.com/products/universalforwarder/releases/9.3.0/windows/splunkforwarder-9.3.0-51ccf43db5bd-x64-release.msi","splunk_url":"https://download.splunk.com/products/splunk/releases/9.3.0/linux/splunk-9.3.0-51ccf43db5bd-Linux-x86_64.tgz"}, - "phantom_server": {"phantom_app":"splunk_soar-unpriv-6.2.2.134-8f694086-el7-x86_64.tgz","phantom_byo":"0","phantom_byo_api_token":"","phantom_byo_ip":"","phantom_server":"0"}, - "simulation": {"atomic_red_team_branch":"master","atomic_red_team_repo":"redcanaryco"}, - "kali_server": {"kali_server":"0"}, - "zeek_server": {"zeek_server":"0"}, - "windows_servers": [{"advanced_logging":"0","aurora_agent":"0","bad_blood":"0","create_domain":"0","hostname":"ar-win","install_red_team_tools":"0","join_domain":"0","win_sysmon_config":"SwiftOnSecurity.xml","windows_ami":"Windows_Server-2019-English-Full-Base-*","windows_image":"windows-server-2019"}], - "linux_servers": [{"hostname":"ar-lin","sysmon_config":"SysMonLinux-CatchAll.xml"}], - "snort_server": {"snort_server":"0"} -} diff --git a/terraform/ansible/vars/windows_vars.json b/terraform/ansible/vars/windows_vars.json deleted file mode 100644 index ce74cf2f3..000000000 --- a/terraform/ansible/vars/windows_vars.json +++ /dev/null @@ -1,9 +0,0 @@ -{ - "ansible_user": "Administrator", - "ansible_password": 5kVkrkns0eL2TN23Ir2, - "attack_range_password": 5kVkrkns0eL2TN23Ir2, - "general": {"attack_range_name":"ar","attack_range_password":"5kVkrkns0eL2TN23Ir2","carbon_black_cloud":"0","carbon_black_cloud_agent_name":"installer_vista_win7_win8-64-3.8.0.627.msi","carbon_black_cloud_company_code":"","carbon_black_cloud_s3_bucket":"","cloud_provider":"aws","crowdstrike_agent_name":"WindowsSensor.exe","crowdstrike_customer_ID":"","crowdstrike_falcon":"0","crowdstrike_logs_access_key_id":"","crowdstrike_logs_region":"","crowdstrike_logs_secret_access_key":"","crowdstrike_logs_sqs_url":"","install_contentctl":"0","ip_whitelist":"84.174.73.25/32","key_name":"pbareiss-09129","statepath":"/Users/pbareiss/projects/attack_range/modules/../terraform/aws/state/ar.terraform.tfstate","use_prebuilt_images_with_packer":"0"}, - "splunk_server": {"byo_splunk":"0","byo_splunk_ip":"","ingest_bots3_data":"0","install_dltk":"0","install_es":"0","s3_bucket_url":"https://attack-range-appbinaries.s3-us-west-2.amazonaws.com","splunk_apps":"splunk-add-on-for-microsoft-windows_880.tgz,splunk-timeline-custom-visualization_162.tgz,status-indicator-custom-visualization_150.tgz,splunk-sankey-diagram-custom-visualization_160.tgz,punchcard-custom-visualization_150.tgz,splunk_attack_range_reporting-1.0.9.tar.gz,splunk-common-information-model-cim_532.tgz,DA-ESS-ContentUpdate-latest.tar.gz,python-for-scientific-computing-for-linux-64-bit_420.tgz,splunk-machine-learning-toolkit_541.tgz,splunk-security-essentials_380.tgz,splunk-add-on-for-sysmon_400.tgz,splunk-add-on-for-sysmon-for-linux_100.tgz,splunk-add-on-for-amazon-web-services-aws_760.tgz,splunk-add-on-for-microsoft-office-365_451.tgz,splunk-add-on-for-amazon-kinesis-firehose_131r7d1d093.tgz,splunk-add-on-for-unix-and-linux_910.tgz,ta-for-zeek_108.tgz,splunk-add-on-for-nginx_322.tgz,phantom-app-for-splunk_4035.tgz,TA-osquery.tar.gz,splunk-add-on-for-microsoft-cloud-services_530.tgz,splunk-add-on-for-crowdstrike-fdr_150.tgz,vmware-carbon-black-cloud_115.tgz,splunk-add-on-for-carbon-black_210.tgz,TA-aurora-0.2.0.tar.gz,snort-alert-for-splunk_111.tgz","splunk_es_app":"splunk-enterprise-security_731.spl","splunk_uf_url":"https://download.splunk.com/products/universalforwarder/releases/9.3.0/linux/splunkforwarder-9.3.0-51ccf43db5bd-linux-2.6-amd64.deb","splunk_uf_win_url":"https://download.splunk.com/products/universalforwarder/releases/9.3.0/windows/splunkforwarder-9.3.0-51ccf43db5bd-x64-release.msi","splunk_url":"https://download.splunk.com/products/splunk/releases/9.3.0/linux/splunk-9.3.0-51ccf43db5bd-Linux-x86_64.tgz"}, - "simulation": {"atomic_red_team_branch":"master","atomic_red_team_repo":"redcanaryco"}, - "windows_servers": {"advanced_logging":"0","aurora_agent":"0","bad_blood":"0","create_domain":"0","hostname":"ar-win","install_red_team_tools":"0","join_domain":"0","win_sysmon_config":"SwiftOnSecurity.xml","windows_ami":"Windows_Server-2019-English-Full-Base-*","windows_image":"windows-server-2019"}, -} diff --git a/terraform/ansible/vars/zeek_vars.json b/terraform/ansible/vars/zeek_vars.json deleted file mode 100644 index 63467e053..000000000 --- a/terraform/ansible/vars/zeek_vars.json +++ /dev/null @@ -1,5 +0,0 @@ -{ - "ansible_python_interpreter": "/usr/bin/python3", - "general": {"attack_range_name":"ar","attack_range_password":"5kVkrkns0eL2TN23Ir2","carbon_black_cloud":"0","carbon_black_cloud_agent_name":"installer_vista_win7_win8-64-3.8.0.627.msi","carbon_black_cloud_company_code":"","carbon_black_cloud_s3_bucket":"","cloud_provider":"aws","crowdstrike_agent_name":"WindowsSensor.exe","crowdstrike_customer_ID":"","crowdstrike_falcon":"0","crowdstrike_logs_access_key_id":"","crowdstrike_logs_region":"","crowdstrike_logs_secret_access_key":"","crowdstrike_logs_sqs_url":"","install_contentctl":"0","ip_whitelist":"84.174.73.25/32","key_name":"pbareiss-09129","statepath":"/Users/pbareiss/projects/attack_range/modules/../terraform/aws/state/ar.terraform.tfstate","use_prebuilt_images_with_packer":"0"}, - "splunk_server": {"byo_splunk":"0","byo_splunk_ip":"","ingest_bots3_data":"0","install_dltk":"0","install_es":"1","s3_bucket_url":"https://attack-range-appbinaries.s3-us-west-2.amazonaws.com","splunk_apps":"splunk-add-on-for-microsoft-windows_880.tgz,splunk-timeline-custom-visualization_162.tgz,status-indicator-custom-visualization_150.tgz,splunk-sankey-diagram-custom-visualization_160.tgz,punchcard-custom-visualization_150.tgz,splunk_attack_range_reporting-1.0.9.tar.gz,splunk-common-information-model-cim_532.tgz,DA-ESS-ContentUpdate-latest.tar.gz,python-for-scientific-computing-for-linux-64-bit_420.tgz,splunk-machine-learning-toolkit_541.tgz,splunk-security-essentials_380.tgz,splunk-add-on-for-sysmon_400.tgz,splunk-add-on-for-sysmon-for-linux_100.tgz,splunk-add-on-for-amazon-web-services-aws_760.tgz,splunk-add-on-for-microsoft-office-365_451.tgz,splunk-add-on-for-amazon-kinesis-firehose_131r7d1d093.tgz,splunk-add-on-for-unix-and-linux_910.tgz,ta-for-zeek_108.tgz,splunk-add-on-for-nginx_322.tgz,phantom-app-for-splunk_4035.tgz,TA-osquery.tar.gz,splunk-add-on-for-microsoft-cloud-services_530.tgz,splunk-add-on-for-crowdstrike-fdr_150.tgz,vmware-carbon-black-cloud_115.tgz,splunk-add-on-for-carbon-black_210.tgz,TA-aurora-0.2.0.tar.gz,snort-alert-for-splunk_111.tgz","splunk_es_app":"splunk-enterprise-security_731.spl","splunk_uf_url":"https://download.splunk.com/products/universalforwarder/releases/9.3.0/linux/splunkforwarder-9.3.0-51ccf43db5bd-linux-2.6-amd64.deb","splunk_uf_win_url":"https://download.splunk.com/products/universalforwarder/releases/9.3.0/windows/splunkforwarder-9.3.0-51ccf43db5bd-x64-release.msi","splunk_url":"https://download.splunk.com/products/splunk/releases/9.3.0/linux/splunk-9.3.0-51ccf43db5bd-Linux-x86_64.tgz"}, -}