A collection of Terraform modules and examples demonstrating common Databricks networking scenarios across AWS and Azure. This repository provides practical, ready-to-use infrastructure code for evaluating and implementing secure networking patterns with Databricks.
This cookbook is designed for:
- Proof of Concepts (POCs) - Quickly spin up networking infrastructure to test scenarios
- Learning & Evaluation - Understand Databricks networking patterns through working examples
- Architecture Reference - Use as a foundation for production designs (not production-ready as-is)
⚠️ Important: These examples are for evaluation and learning purposes. Review security settings, sizing, and configurations before adapting for production use.
- AWS ↔ Azure Site-to-Site VPN with BGP routing
- ...more to follow!
├── examples/ # Complete deployment scenarios
│ └── cross-cloud/ # AWS-Azure VPN with Databricks + RDS
├── modules/ # Reusable Terraform modules
│ ├── aws/ # AWS networking components
│ └── azure/ # Azure networking components
├── configs/ # YAML configuration files
└── docs/ # Architecture diagrams
- VPC & Networking: VPCs, subnets, route tables, internet/NAT gateways
- VPN Components: Virtual private gateways, customer gateways, VPN connections
- Security: Security groups, VPC endpoints
- Connectivity: EC2 Connect endpoints
- Services: RDS instances, S3 buckets
- Virtual Networks: VNets, subnets, route tables
- VPN Components: Virtual network gateways, local network gateways, connections
- Security: Network security groups (NSGs), private endpoints
- DNS: Private DNS zones
- Services: Databricks workspaces
- Terraform >= 1.0
- AWS CLI configured with appropriate permissions
- Azure CLI configured with appropriate permissions
cd examples/cross-cloud
terraform init
terraform plan
terraform applyFor detailed instructions, see example scenario READMEs, e.g., cross-cloud README.
- YAML-driven configuration for easy customization
- Modular design for reusable components
- Multi-cloud support (AWS + Azure)
- Production-like patterns with proper security
- BGP routing for dynamic failover
- Private connectivity for secure data transfer
- Cross-cloud data federation (Databricks ↔ external databases)
- Hybrid connectivity evaluation
- VPN tunnel testing and configuration
- Network security pattern validation
- Private endpoint connectivity testing
- Multi-cloud architecture prototyping
- Review all security group/NSG rules before deployment
- Customize CIDR blocks to avoid conflicts
- Enable logging and monitoring in production
- Follow principle of least privilege for access
- Use private endpoints where available
- Use
terraform destroywhen done with testing - Consider smaller instance sizes for evaluation
- Monitor data transfer costs between clouds
- Review all billable resources before deployment
- Follow the established module structure
- Include comprehensive variable definitions
- Add outputs for key resource attributes
- Update relevant configuration YAML files
- Document new scenarios in example READMEs
- This repository creates billable cloud resources. Always review costs and clean up unused resources to avoid unexpected charges.
- This is not an official Databricks product. All opinions and recommendations expressed here are my own and do not represent Databricks Inc.