Skip to content

Commit

Permalink
feat: Warnings added to all public endpoints and IGW etc.
Browse files Browse the repository at this point in the history
  • Loading branch information
vara-bonthu committed Sep 22, 2023
1 parent 53b77e8 commit f3715f6
Show file tree
Hide file tree
Showing 30 changed files with 69 additions and 7 deletions.
1 change: 0 additions & 1 deletion ai-ml/emr-spark-rapids/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,6 @@ Checkout the [documentation website](https://awslabs.github.io/data-on-eks/docs/
| <a name="module_eks_data_addons"></a> [eks\_data\_addons](#module\_eks\_data\_addons) | aws-ia/eks-data-addons/aws | ~> 1.0 |
| <a name="module_emr_containers"></a> [emr\_containers](#module\_emr\_containers) | terraform-aws-modules/emr/aws//modules/virtual-cluster | ~> 1.0 |
| <a name="module_s3_bucket"></a> [s3\_bucket](#module\_s3\_bucket) | terraform-aws-modules/s3-bucket/aws | ~> 3.0 |
| <a name="module_vpc"></a> [vpc](#module\_vpc) | terraform-aws-modules/vpc/aws | ~> 5.0 |

## Resources

Expand Down
1 change: 1 addition & 0 deletions ai-ml/emr-spark-rapids/eks.tf
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,7 @@ module "eks" {
cluster_name = local.name
cluster_version = var.eks_cluster_version

#WARNING: Avoid using this option (cluster_endpoint_public_access = true) in preprod or prod accounts. This feature is designed for sandbox accounts, simplifying cluster deployment and testing.
cluster_endpoint_public_access = true # if true, Your cluster API server is accessible from the internet. You can, optionally, limit the CIDR blocks that can access the public endpoint.

vpc_id = module.vpc.vpc_id
Expand Down
1 change: 1 addition & 0 deletions ai-ml/jark-stack/terraform/eks.tf
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ module "eks" {

# if true, Your cluster API server is accessible from the internet.
# You can, optionally, limit the CIDR blocks that can access the public endpoint.
#WARNING: Avoid using this option (cluster_endpoint_public_access = true) in preprod or prod accounts. This feature is designed for sandbox accounts, simplifying cluster deployment and testing.
cluster_endpoint_public_access = true

vpc_id = module.vpc.vpc_id
Expand Down
3 changes: 3 additions & 0 deletions ai-ml/jark-stack/terraform/vpc.tf
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,9 @@ locals {
#---------------------------------------------------------------
# VPC
#---------------------------------------------------------------
# WARNING: This VPC module includes the creation of an Internet Gateway and NAT Gateway, which simplifies cluster deployment and testing, primarily intended for sandbox accounts.
# IMPORTANT: For preprod and prod use cases, it is crucial to consult with your security team and AWS architects to design a private infrastructure solution that aligns with your security requirements

module "vpc" {
source = "terraform-aws-modules/vpc/aws"
version = "~> 5.0"
Expand Down
1 change: 1 addition & 0 deletions ai-ml/jupyterhub/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,7 @@ module "eks" {
cluster_name = local.name
cluster_version = var.eks_cluster_version

#WARNING: Avoid using this option (cluster_endpoint_public_access = true) in preprod or prod accounts. This feature is designed for sandbox accounts, simplifying cluster deployment and testing.
cluster_endpoint_public_access = true # if true, Your cluster API server is accessible from the internet. You can, optionally, limit the CIDR blocks that can access the public endpoint.

vpc_id = module.vpc.vpc_id
Expand Down
3 changes: 3 additions & 0 deletions ai-ml/jupyterhub/vpc.tf
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,9 @@ locals {
#---------------------------------------------------------------
# VPC
#---------------------------------------------------------------
# WARNING: This VPC module includes the creation of an Internet Gateway and NAT Gateway, which simplifies cluster deployment and testing, primarily intended for sandbox accounts.
# IMPORTANT: For preprod and prod use cases, it is crucial to consult with your security team and AWS architects to design a private infrastructure solution that aligns with your security requirements

module "vpc" {
source = "terraform-aws-modules/vpc/aws"
version = "~> 5.0"
Expand Down
5 changes: 3 additions & 2 deletions ai-ml/ray/terraform/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -92,8 +92,9 @@ module "eks" {
source = "terraform-aws-modules/eks/aws"
version = "~> 19.15"

cluster_name = local.name
cluster_version = local.cluster_version
cluster_name = local.name
cluster_version = local.cluster_version
#WARNING: Avoid using this option (cluster_endpoint_public_access = true) in preprod or prod accounts. This feature is designed for sandbox accounts, simplifying cluster deployment and testing.
cluster_endpoint_public_access = true

vpc_id = module.vpc.vpc_id
Expand Down
3 changes: 3 additions & 0 deletions ai-ml/ray/terraform/vpc.tf
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,9 @@
# VPC
#---------------------------------------------------------------

# WARNING: This VPC module includes the creation of an Internet Gateway and NAT Gateway, which simplifies cluster deployment and testing, primarily intended for sandbox accounts.
# IMPORTANT: For preprod and prod use cases, it is crucial to consult with your security team and AWS architects to design a private infrastructure solution that aligns with your security requirements

module "vpc" {
source = "terraform-aws-modules/vpc/aws"
version = "~> 5.0"
Expand Down
1 change: 1 addition & 0 deletions ai-ml/trainium-inferentia/eks.tf
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,7 @@ module "eks" {
cluster_name = local.name
cluster_version = var.eks_cluster_version

#WARNING: Avoid using this option (cluster_endpoint_public_access = true) in preprod or prod accounts. This feature is designed for sandbox accounts, simplifying cluster deployment and testing.
cluster_endpoint_public_access = true # if true, Your cluster API server is accessible from the internet. You can, optionally, limit the CIDR blocks that can access the public endpoint.

vpc_id = module.vpc.vpc_id
Expand Down
3 changes: 3 additions & 0 deletions ai-ml/trainium-inferentia/vpc.tf
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,9 @@ locals {
#---------------------------------------------------------------
# VPC
#---------------------------------------------------------------
# WARNING: This VPC module includes the creation of an Internet Gateway and NAT Gateway, which simplifies cluster deployment and testing, primarily intended for sandbox accounts.
# IMPORTANT: For preprod and prod use cases, it is crucial to consult with your security team and AWS architects to design a private infrastructure solution that aligns with your security requirements

module "vpc" {
source = "terraform-aws-modules/vpc/aws"
version = "~> 5.0"
Expand Down
3 changes: 3 additions & 0 deletions analytics/terraform/datahub-on-eks/vpc.tf
Original file line number Diff line number Diff line change
@@ -1,6 +1,9 @@
#---------------------------------------------------------------
# Supporting Network Resources
#---------------------------------------------------------------
# WARNING: This VPC module includes the creation of an Internet Gateway and NAT Gateway, which simplifies cluster deployment and testing, primarily intended for sandbox accounts.
# IMPORTANT: For preprod and prod use cases, it is crucial to consult with your security team and AWS architects to design a private infrastructure solution that aligns with your security requirements

module "vpc" {
source = "terraform-aws-modules/vpc/aws"
version = "~> 5.0"
Expand Down
3 changes: 3 additions & 0 deletions analytics/terraform/emr-eks-ack/vpc.tf
Original file line number Diff line number Diff line change
@@ -1,6 +1,9 @@
#---------------------------------------------------------------
# VPC and Subnets
#---------------------------------------------------------------
# WARNING: This VPC module includes the creation of an Internet Gateway and NAT Gateway, which simplifies cluster deployment and testing, primarily intended for sandbox accounts.
# IMPORTANT: For preprod and prod use cases, it is crucial to consult with your security team and AWS architects to design a private infrastructure solution that aligns with your security requirements

module "vpc" {
source = "terraform-aws-modules/vpc/aws"
version = "~> 5.0"
Expand Down
5 changes: 3 additions & 2 deletions analytics/terraform/emr-eks-fargate/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -43,8 +43,9 @@ module "eks" {
source = "terraform-aws-modules/eks/aws"
version = "~> 19.15"

cluster_name = local.name
cluster_version = var.eks_cluster_version
cluster_name = local.name
cluster_version = var.eks_cluster_version
#WARNING: Avoid using this option (cluster_endpoint_public_access = true) in preprod or prod accounts. This feature is designed for sandbox accounts, simplifying cluster deployment and testing.
cluster_endpoint_public_access = true

vpc_id = module.vpc.vpc_id
Expand Down
3 changes: 3 additions & 0 deletions analytics/terraform/emr-eks-fargate/vpc.tf
Original file line number Diff line number Diff line change
@@ -1,6 +1,9 @@
#---------------------------------------------------------------
# Supporting Network Resources
#---------------------------------------------------------------
# WARNING: This VPC module includes the creation of an Internet Gateway and NAT Gateway, which simplifies cluster deployment and testing, primarily intended for sandbox accounts.
# IMPORTANT: For preprod and prod use cases, it is crucial to consult with your security team and AWS architects to design a private infrastructure solution that aligns with your security requirements

module "vpc" {
source = "terraform-aws-modules/vpc/aws"
version = "~> 5.0"
Expand Down
1 change: 1 addition & 0 deletions analytics/terraform/emr-eks-karpenter/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -75,6 +75,7 @@ module "eks" {
cluster_version = var.eks_cluster_version

# if true, Your cluster API server is accessible from the internet. You can, optionally, limit the CIDR blocks that can access the public endpoint.
#WARNING: Avoid using this option (cluster_endpoint_public_access = true) in preprod or prod accounts. This feature is designed for sandbox accounts, simplifying cluster deployment and testing.
cluster_endpoint_public_access = true

vpc_id = module.vpc.vpc_id
Expand Down
3 changes: 3 additions & 0 deletions analytics/terraform/emr-eks-karpenter/vpc.tf
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,9 @@ locals {
#---------------------------------------------------------------
# VPC
#---------------------------------------------------------------
# WARNING: This VPC module includes the creation of an Internet Gateway and NAT Gateway, which simplifies cluster deployment and testing, primarily intended for sandbox accounts.
# IMPORTANT: For preprod and prod use cases, it is crucial to consult with your security team and AWS architects to design a private infrastructure solution that aligns with your security requirements

module "vpc" {
source = "terraform-aws-modules/vpc/aws"
version = "~> 5.0"
Expand Down
1 change: 1 addition & 0 deletions analytics/terraform/spark-k8s-operator/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,7 @@ module "eks" {
cluster_name = local.name
cluster_version = var.eks_cluster_version

#WARNING: Avoid using this option (cluster_endpoint_public_access = true) in preprod or prod accounts. This feature is designed for sandbox accounts, simplifying cluster deployment and testing.
cluster_endpoint_public_access = true

vpc_id = module.vpc.vpc_id
Expand Down
3 changes: 3 additions & 0 deletions analytics/terraform/spark-k8s-operator/vpc.tf
Original file line number Diff line number Diff line change
@@ -1,6 +1,9 @@
#---------------------------------------------------------------
# Supporting Network Resources
#---------------------------------------------------------------
# WARNING: This VPC module includes the creation of an Internet Gateway and NAT Gateway, which simplifies cluster deployment and testing, primarily intended for sandbox accounts.
# IMPORTANT: For preprod and prod use cases, it is crucial to consult with your security team and AWS architects to design a private infrastructure solution that aligns with your security requirements

module "vpc" {
source = "terraform-aws-modules/vpc/aws"
version = "~> 5.0"
Expand Down
3 changes: 3 additions & 0 deletions distributed-databases/cloudnative-postgres/vpc.tf
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,9 @@
# Supporting Resources
#---------------------------------------------------------------

# WARNING: This VPC module includes the creation of an Internet Gateway and NAT Gateway, which simplifies cluster deployment and testing, primarily intended for sandbox accounts.
# IMPORTANT: For preprod and prod use cases, it is crucial to consult with your security team and AWS architects to design a private infrastructure solution that aligns with your security requirements

module "vpc" {
source = "terraform-aws-modules/vpc/aws"
version = "~> 5.0"
Expand Down
1 change: 1 addition & 0 deletions schedulers/terraform/argo-workflow/eks.tf
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,7 @@ module "eks" {
cluster_name = local.name
cluster_version = var.eks_cluster_version

#WARNING: Avoid using this option (cluster_endpoint_public_access = true) in preprod or prod accounts. This feature is designed for sandbox accounts, simplifying cluster deployment and testing.
cluster_endpoint_public_access = true # if true, Your cluster API server is accessible from the internet. You can, optionally, limit the CIDR blocks that can access the public endpoint.

vpc_id = module.vpc.vpc_id
Expand Down
3 changes: 3 additions & 0 deletions schedulers/terraform/argo-workflow/vpc.tf
Original file line number Diff line number Diff line change
@@ -1,3 +1,6 @@
# WARNING: This VPC module includes the creation of an Internet Gateway and NAT Gateway, which simplifies cluster deployment and testing, primarily intended for sandbox accounts.
# IMPORTANT: For preprod and prod use cases, it is crucial to consult with your security team and AWS architects to design a private infrastructure solution that aligns with your security requirements

module "vpc" {
source = "terraform-aws-modules/vpc/aws"
version = "~> 5.0"
Expand Down
1 change: 1 addition & 0 deletions schedulers/terraform/managed-airflow-mwaa/eks.tf
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,7 @@ module "eks" {
cluster_name = local.name
cluster_version = var.eks_cluster_version

#WARNING: Avoid using this option (cluster_endpoint_public_access = true) in preprod or prod accounts. This feature is designed for sandbox accounts, simplifying cluster deployment and testing.
cluster_endpoint_public_access = true # if true, Your cluster API server is accessible from the internet. You can, optionally, limit the CIDR blocks that can access the public endpoint.

vpc_id = module.vpc.vpc_id
Expand Down
3 changes: 3 additions & 0 deletions schedulers/terraform/managed-airflow-mwaa/vpc.tf
Original file line number Diff line number Diff line change
@@ -1,6 +1,9 @@
#---------------------------------------------------------------
# Supporting Resources
#---------------------------------------------------------------
# WARNING: This VPC module includes the creation of an Internet Gateway and NAT Gateway, which simplifies cluster deployment and testing, primarily intended for sandbox accounts.
# IMPORTANT: For preprod and prod use cases, it is crucial to consult with your security team and AWS architects to design a private infrastructure solution that aligns with your security requirements

module "vpc" {
source = "terraform-aws-modules/vpc/aws"
version = "~> 5.0"
Expand Down
1 change: 1 addition & 0 deletions schedulers/terraform/self-managed-airflow/eks.tf
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,7 @@ module "eks" {
cluster_name = local.name
cluster_version = var.eks_cluster_version

#WARNING: Avoid using this option (cluster_endpoint_public_access = true) in preprod or prod accounts. This feature is designed for sandbox accounts, simplifying cluster deployment and testing.
cluster_endpoint_public_access = true # if true, Your cluster API server is accessible from the internet. You can, optionally, limit the CIDR blocks that can access the public endpoint.

vpc_id = module.vpc.vpc_id
Expand Down
3 changes: 3 additions & 0 deletions schedulers/terraform/self-managed-airflow/vpc.tf
Original file line number Diff line number Diff line change
@@ -1,6 +1,9 @@
#---------------------------------------------------------------
# Supporting Network Resources
#---------------------------------------------------------------
# WARNING: This VPC module includes the creation of an Internet Gateway and NAT Gateway, which simplifies cluster deployment and testing, primarily intended for sandbox accounts.
# IMPORTANT: For preprod and prod use cases, it is crucial to consult with your security team and AWS architects to design a private infrastructure solution that aligns with your security requirements

module "vpc" {
source = "terraform-aws-modules/vpc/aws"
version = "~> 5.0"
Expand Down
3 changes: 3 additions & 0 deletions streaming/flink/vpc.tf
Original file line number Diff line number Diff line change
@@ -1,6 +1,9 @@
#---------------------------------------------------------------
# Supporting Network Resources
#---------------------------------------------------------------
# WARNING: This VPC module includes the creation of an Internet Gateway and NAT Gateway, which simplifies cluster deployment and testing, primarily intended for sandbox accounts.
# IMPORTANT: For preprod and prod use cases, it is crucial to consult with your security team and AWS architects to design a private infrastructure solution that aligns with your security requirements

module "vpc" {
source = "terraform-aws-modules/vpc/aws"
version = "~> 5.0"
Expand Down
5 changes: 3 additions & 2 deletions streaming/kafka/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -33,8 +33,9 @@ module "eks" {
source = "terraform-aws-modules/eks/aws"
version = "~> 19.15"

cluster_name = local.name
cluster_version = local.cluster_version
cluster_name = local.name
cluster_version = local.cluster_version
#WARNING: Avoid using this option (cluster_endpoint_public_access = true) in preprod or prod accounts. This feature is designed for sandbox accounts, simplifying cluster deployment and testing.
cluster_endpoint_public_access = true

vpc_id = module.vpc.vpc_id
Expand Down
3 changes: 3 additions & 0 deletions streaming/kafka/vpc.tf
Original file line number Diff line number Diff line change
@@ -1,3 +1,6 @@
# WARNING: This VPC module includes the creation of an Internet Gateway and NAT Gateway, which simplifies cluster deployment and testing, primarily intended for sandbox accounts.
# IMPORTANT: For preprod and prod use cases, it is crucial to consult with your security team and AWS architects to design a private infrastructure solution that aligns with your security requirements

module "vpc" {
source = "terraform-aws-modules/vpc/aws"
version = "~> 5.0"
Expand Down
3 changes: 3 additions & 0 deletions streaming/nifi/vpc.tf
Original file line number Diff line number Diff line change
@@ -1,6 +1,9 @@
#---------------------------------------------------------------
# VPC
#---------------------------------------------------------------
# WARNING: This VPC module includes the creation of an Internet Gateway and NAT Gateway, which simplifies cluster deployment and testing, primarily intended for sandbox accounts.
# IMPORTANT: For preprod and prod use cases, it is crucial to consult with your security team and AWS architects to design a private infrastructure solution that aligns with your security requirements

module "vpc" {
source = "terraform-aws-modules/vpc/aws"
version = "~> 5.0"
Expand Down
3 changes: 3 additions & 0 deletions workshop/emr-eks/modules/vpc/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,9 @@ locals {

data "aws_availability_zones" "available" {}

# WARNING: This VPC module includes the creation of an Internet Gateway and NAT Gateway, which simplifies cluster deployment and testing, primarily intended for sandbox accounts.
# IMPORTANT: For preprod and prod use cases, it is crucial to consult with your security team and AWS architects to design a private infrastructure solution that aligns with your security requirements

module "vpc" {
source = "terraform-aws-modules/vpc/aws"
version = "~> 5.0"
Expand Down

0 comments on commit f3715f6

Please sign in to comment.