Skip to content

Commit edcb69a

Browse files
authored
Feat: Adding new AWS modules to provision E2 workspaces using different configurations. And examples using these module (#35)
* docs:Updating main Readme * docs:Updating main Readme * docs:Updating main Readme * docs:Updating main Readme * feat:Push the terraform plan as a Pull request comment in ADO * feat:Push the terraform plan as a Pull request comment in ADO * feat:Push the terraform plan as a Pull request comment in ADO * feat:Push the terraform plan as a Pull request comment in ADO * feat:Push the terraform plan as a Pull request comment in ADO * Adding an Lakehouse platform module on Azure * Adding an Lakehouse platform module on Azure * Adding an Lakehouse platform module on Azure * Adding an Lakehouse platform module on Azure * Adding an Lakehouse platform module on Azure * Adding an Lakehouse platform module on Azure * Adding an Lakehouse platform module on Azure * Adding an Lakehouse platform module on Azure * Adding an Lakehouse platform module on Azure * Adding an Lakehouse platform module on Azure * Adding an Lakehouse platform module on Azure * Adding an Lakehouse platform module on Azure * Adding an Lakehouse platform module on Azure * Adding an Lakehouse platform module on Azure * Adding an Lakehouse platform module on Azure * Adding an Lakehouse platform module on Azure * Adding an Lakehouse platform module on Azure * Feat: Adding a new module to provision Databricks on Azure with Private Link - Standard deployment. And an example using this module * Fix: Removing route_table_id variable as it is not used * Feat: Adding a new module for exfiltration protection. And an example using this module * Feat: Adding a new module for exfiltration protection. And an example using this module * Feat: Adding a new module for exfiltration protection. And an example using this module * Feat: Adding a new module for exfiltration protection with Azure private link. And an example using this module * Feat: Adding a new module for exfiltration protection with Azure private link. And an example using this module * Feat: Adding new AWS modules to provision E2 workspaces using different configurations. And examples using these module * Feat: Adding new AWS modules to provision E2 workspaces using different configurations. And examples using these module
1 parent 689b442 commit edcb69a

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

76 files changed

+1842
-35
lines changed

README.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,10 @@ The folder `examples` contains the following Terraform implementation examples :
4242
| Azure | [adb-squid-proxy](examples/adb-squid-proxy/) | ADB clusters with HTTP proxy |
4343
| Azure | [adb-teradata](examples/adb-teradata/) | ADB with single VM Teradata integration |
4444
| Azure | [adb-uc](examples/adb-uc/) | ADB Unity Catalog Process |
45+
| AWS | [aws-workspace-basic](examples/aws-workspace-basic/) | Provisioning AWS Databricks E2 |
46+
| AWS | [aws-workspace-with-firewall](examples/aws-workspace-with-firewall/) | Provisioning AWS Databricks E2 with an AWS Firewall |
47+
| AWS | [aws-exfiltration-protection](examples/aws-exfiltration-protection/) | An implementation of [Data Exfiltration Protection on AWS](https://www.databricks.com/blog/2021/02/02/data-exfiltration-protection-with-databricks-on-aws.html) |
48+
| AWS | aws-workspace-with-private-link | Coming soon |
4549
| AWS | [aws-databricks-flat](examples/aws-databricks-flat/) | AWS Databricks simple example |
4650
| AWS | [aws-databricks-modular-privatelink](examples/aws-databricks-modular-privatelink/) | Deploy multiple AWS Databricks workspaces |
4751
| AWS | [aws-databricks-uc](examples/aws-databricks-uc/) | AWS UC |
@@ -61,7 +65,10 @@ The folder `modules` contains the following Terraform modules :
6165
| Azure | [adb-with-private-link-standard](modules/adb-with-private-link-standard/) | Provisioning Databricks on Azure with Private Link - Standard deployment |
6266
| Azure | [adb-exfiltration-protection](modules/adb-exfiltration-protection/) | A sample implementation of [Data Exfiltration Protection](https://www.databricks.com/blog/2020/03/27/data-exfiltration-protection-with-azure-databricks.html) |
6367
| Azure | [adb-with-private-links-exfiltration-protection](modules/adb-with-private-links-exfiltration-protection/) | Provisioning Databricks on Azure with Private Link and [Data Exfiltration Protection](https://www.databricks.com/blog/2020/03/27/data-exfiltration-protection-with-azure-databricks.html) |
64-
| AWS | Coming soon | |
68+
| AWS | [aws-workspace-basic](modules/aws-workspace-basic/) | Provisioning AWS Databricks E2 |
69+
| AWS | [aws-workspace-with-firewall](modules/aws-workspace-with-firewall/) | Provisioning AWS Databricks E2 with an AWS Firewall |
70+
| AWS | [aws-exfiltration-protection](modules/aws-exfiltration-protection/) | An implementation of [Data Exfiltration Protection on AWS](https://www.databricks.com/blog/2021/02/02/data-exfiltration-protection-with-databricks-on-aws.html) |
71+
| AWS | aws-workspace-with-private-link | Coming soon |
6572
| GCP | Coming soon | |
6673

6774
## CICD pipelines

examples/adb-exfiltration-protection/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ To find IP and FQDN for your deployment, go to: https://docs.microsoft.com/en-us
1111

1212
## Overall Architecture
1313

14-
![alt text](https://raw.githubusercontent.com/databricks/terraform-databricks-examples/main/examples/adb-exfiltration-protection/images/adb-exfiltration-classic.png?raw=true)
14+
![alt text](https://raw.githubusercontent.com/databricks/terraform-databricks-examples/main/modules/adb-exfiltration-protection/images/adb-exfiltration-classic.png?raw=true)
1515

1616
Resources to be created:
1717
* Resource group with random prefix
@@ -24,7 +24,7 @@ Resources to be created:
2424

2525
1. Update `terraform.tfvars` file and provide values to each defined variable
2626
2. (Optional) Configure your [remote backend](https://developer.hashicorp.com/terraform/language/settings/backends/azurerm)
27-
4. Run `terraform init` to initialize terraform and get provider ready.
27+
3. Run `terraform init` to initialize terraform and get provider ready.
2828
4. Run `terraform apply` to create the resources.
2929

3030
## How to fill in variable values
Binary file not shown.

examples/adb-lakehouse/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,5 +24,5 @@ This example can be used to deploy the following:
2424

2525
1. Update `terraform.tfvars` file and provide values to each defined variable
2626
2. (Optional) Configure your [remote backend](https://developer.hashicorp.com/terraform/language/settings/backends/azurerm)
27-
4. Run `terraform init` to initialize terraform and get provider ready.
27+
3. Run `terraform init` to initialize terraform and get provider ready.
2828
4. Run `terraform apply` to create the resources.

examples/adb-lakehouse/data.tf

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
data "azurerm_client_config" "current" {
2+
}

examples/adb-lakehouse/providers.tf

Lines changed: 0 additions & 4 deletions
This file was deleted.

examples/adb-with-private-link-standard/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,5 +22,5 @@ This example can be used to deploy the following:
2222

2323
1. Update `terraform.tfvars` file and provide values to each defined variable
2424
2. (Optional) Configure your [remote backend](https://developer.hashicorp.com/terraform/language/settings/backends/azurerm)
25-
4. Run `terraform init` to initialize terraform and get provider ready.
25+
3. Run `terraform init` to initialize terraform and get provider ready.
2626
4. Run `terraform apply` to create the resources.

examples/adb-with-private-link-standard/providers.tf

Lines changed: 0 additions & 4 deletions
This file was deleted.

examples/adb-with-private-links-exfiltration-protection/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ Include:
1010
5. Private Endpoint for web-auth traffic.
1111

1212
Overall Architecture:
13-
![alt text](https://raw.githubusercontent.com/databricks/terraform-databricks-examples/main/examples/adb-with-private-links-exfiltration-protection/images/adb-private-links-general.png?raw=true)
13+
![alt text](https://raw.githubusercontent.com/databricks/terraform-databricks-examples/main/modules/adb-with-private-links-exfiltration-protection/images/adb-private-links-general.png?raw=true)
1414

1515
With this deployment, traffic from user client to webapp (notebook UI), backend traffic from data plane to control plane will be through private endpoints. This terraform sample will create:
1616
* Resource group with random prefix
@@ -23,5 +23,5 @@ With this deployment, traffic from user client to webapp (notebook UI), backend
2323

2424
1. Update `terraform.tfvars` file and provide values to each defined variable
2525
2. (Optional) Configure your [remote backend](https://developer.hashicorp.com/terraform/language/settings/backends/azurerm)
26-
4. Run `terraform init` to initialize terraform and get provider ready.
26+
3. Run `terraform init` to initialize terraform and get provider ready.
2727
4. Run `terraform apply` to create the resources.

0 commit comments

Comments
 (0)