Skip to content

Commit b046a1e

Browse files
committed
Merge branch '70-improve-core-recipe-descriptions' into 'main'
Resolve "Improve descriptions for core recipes" Closes #70 See merge request mwvaughn/aws-hpc-recipes!170
2 parents 773507b + 45c179a commit b046a1e

File tree

11 files changed

+81
-13
lines changed

11 files changed

+81
-13
lines changed

recipes/net/hpc_basic/assets/public-private.yaml

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,14 @@
11
---
22
AWSTemplateFormatVersion: '2010-09-09'
3-
Description: Create one public and one private subnet. Can create a VPC or use an existing one.
3+
Description: Basic VPC with Public/Private Subnets.
4+
This template creates a simple VPC architecture with one public and one private subnet in a single Availability Zone.
5+
The template offers flexibility by allowing you to either create a new VPC or use an existing one.
6+
When creating a new VPC, it provisions an Internet Gateway for public subnet connectivity.
7+
A NAT Gateway is deployed in the public subnet to enable outbound internet access for resources in the private subnet.
8+
Appropriate route tables are configured to direct traffic between the subnets and the internet.
9+
The template supports customizable CIDR ranges for both the VPC and subnet configurations.
10+
Use this template as a starting point for creating basic two-tier architectures with public-facing and backend resources.
11+
Refer to the Outputs tab of the deployed stack for important resource identifiers including VPC ID, subnet IDs, and internet gateway ID.
412

513
### Stack metadata
614
Metadata:

recipes/net/hpc_large_scale/assets/main.yaml

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,13 @@
11
AWSTemplateFormatVersion: '2010-09-09'
2-
Description: Create public and private subnets in two or three AZs. Specified CIDR blocks allow 4096 IPs each.
2+
Description: HPC-scale VPC with Multi-AZ Architecture.
3+
This template creates a highly available VPC infrastructure optimized for HPC workloads across multiple Availability Zones.
4+
It provisions both public and private subnets in two or optionally three AZs, with each subnet configured for 4096 IP addresses.
5+
The template sets up NAT Gateways and Internet Gateway for secure outbound connectivity from private subnets.
6+
VPC Flow Logs are enabled and directed to CloudWatch for comprehensive network traffic monitoring.
7+
An S3 VPC Endpoint is configured to allow private subnet resources to access S3 without traversing the internet.
8+
A VPC-wide security group is created to enable communication between resources within the VPC.
9+
Use this template as a foundation for creating custom launch templates tailored to your specific HPC infrastructure requirements.
10+
Refer to the Outputs tab of the deployed stack for important resource identifiers including VPC ID, subnet IDs, security group ID, and internet gateway ID.
311

412
Metadata:
513
AWS::CloudFormation::Interface:

recipes/net/hpc_zonal_networking/assets/network.cfn.yaml

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,13 @@
66
# Authors: J. Lowell Wofford <jlowellw@amazon.com>, Matthew Vaughn <mwvaughn@amazon.com>
77

88
AWSTemplateFormatVersion: '2010-09-09'
9-
Description: >
10-
Creates a 4-zone subnet structure for NIST 800-223-aligned HPC networking. Each AZ is allocated separate Access, Management, Storage, and Compute subnets corresponding to the 4 security zones. See https://csrc.nist.gov/pubs/sp/800/223/final for details.
9+
Description: NIST 800-223 Aligned HPC Network Architecture.
10+
This template creates separate Access, Management, Storage, and Compute subnets aligned with NIST SP 800-223 security zones (https://csrc.nist.gov/pubs/sp/800/223/final).
11+
It automatically selects Availability Zones with HPC instance support and provides optional backup AZ subnets for high availability.
12+
External connectivity can be configured through transit gateway, direct access, or full isolation modes.
13+
NAT Gateways and route tables enforce proper network segmentation between zones.
14+
Use this template as a foundation for building NIST-compliant HPC environments.
15+
Refer to the Outputs tab for IDs of all created network resources.
1116

1217
Parameters:
1318

recipes/pcluster/latest/assets/launch.yaml

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,11 @@
11
AWSTemplateFormatVersion: '2010-09-09'
2-
Description: >
3-
Deploy a demo of the latest AWS ParallelCluster release.
2+
Description: AWS ParallelCluster Demo Environment.
3+
This template deploys a demonstration HPC cluster using the latest AWS ParallelCluster release with key enterprise features.
4+
It creates a VPC with public/private subnets, a head node with DCV support, and a dynamically scaling Slurm compute fleet.
5+
The cluster supports multiple architectures (x86, Graviton, GPU) and operating systems with configurable queue sizes.
6+
Shared storage is implemented through either EFS or EBS, with SSM integration for simplified access.
7+
Use this template as a foundation for evaluating ParallelCluster capabilities and features.
8+
Refer to the Outputs tab for the head node IP address and Systems Manager access URL.
49

510
### Stack metadata
611
Metadata:

recipes/pcs/try_amd/assets/cluster.cfn.yaml

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,12 @@
11
AWSTemplateFormatVersion: '2010-09-09'
22
Transform: AWS::Serverless-2016-10-31
3-
Description: Get started with AWS PCS and Amazon EC2 instances with AMD processors
3+
Description: AWS PCS Getting Started Environment with AMD Instances.
4+
This template deploys a demonstration cluster using AMD-based instances and AWS Parallel Computing Service (PCS).
5+
It configures a multi-tier network with FSx Lustre and EFS storage, EFA-enabled instances, and auto-scaling Slurm queues.
6+
The cluster includes a login node (c7a.xlarge) and two compute queues - high-performance (hpc7a.48xlarge) and general purpose (c7a.xlarge).
7+
Network security is managed through security groups with client IP restrictions and EFA support.
8+
Use this template as a starting point for evaluating AWS PCS capabilities with AMD processors.
9+
Refer to the Outputs tab for cluster access URLs and SSH key pair information.
410

511
### Stack metadata
612
Metadata:

recipes/pcs/try_graviton/assets/cluster.cfn.yaml

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,12 @@
11
AWSTemplateFormatVersion: '2010-09-09'
22
Transform: AWS::Serverless-2016-10-31
3-
Description: Get started with AWS PCS and Amazon EC2 instances with Graviton processors
3+
Description: AWS PCS Getting Started Environment with Graviton Instances.
4+
This template deploys a demonstration cluster using Graviton-based instances and AWS Parallel Computing Service (PCS).
5+
It configures a multi-tier network with FSx Lustre and EFS storage, EFA-enabled instances, and an auto-scaling Slurm queue.
6+
The cluster includes a login node (c7g.2xlarge) and a compute queue with high-performance instances (hpc7g.16xlarge).
7+
Network security is managed through security groups with client IP restrictions and EFA support.
8+
Use this template as a starting point for evaluating AWS PCS capabilities with Graviton processors.
9+
Refer to the Outputs tab for cluster access URLs and SSH key pair information.
410

511
### Stack metadata
612
Metadata:

recipes/storage/efs_simple/assets/main.yaml

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,11 @@
11
AWSTemplateFormatVersion: '2010-09-09'
2-
Description: Creates an EFS filesystem, mount targets, and a client security group for access to the filesystem
2+
Description: EFS Filesystem with Multi-AZ Mount Targets.
3+
This template creates an Amazon EFS filesystem with configurable mount targets across multiple Availability Zones.
4+
It supports encrypted data at rest, enforced TLS for data in transit, and automatic backups through AWS Backup.
5+
Security is managed through dedicated security groups that control NFS access to the filesystem.
6+
Throughput can be configured for either bursting or elastic modes to match workload requirements.
7+
Use this template as a foundation for deploying shared storage solutions with customized security and performance settings.
8+
Refer to the Outputs tab for the filesystem ID and security group ID needed to mount the filesystem.
39

410
Metadata:
511
AWS::CloudFormation::Interface:

recipes/storage/fsx_lustre/assets/persistent.yaml

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,11 @@
11
AWSTemplateFormatVersion: '2010-09-09'
2-
Description: Creates a PERSISTENT_2 FSx for Lustre filesystem and a client security group for access to the filesystem
2+
Description: FSx for Lustre PERSISTENT_2 Filesystem.
3+
This template creates a persistent FSx for Lustre filesystem optimized for high-performance workloads.
4+
It configures a single-AZ deployment with customizable storage capacity, throughput, and compression settings.
5+
Security groups are configured to enable required Lustre network ports (988, 1021-1023) between clients and servers.
6+
The filesystem supports Lustre versions 2.12 and 2.15 with LZ4 compression for optimized storage efficiency.
7+
Use this template as a foundation for deploying high-performance shared storage solutions.
8+
Refer to the Outputs tab for the filesystem ID, mount name, and security group ID needed to mount the filesystem.
39

410
### Stack metadata
511
Metadata:

recipes/storage/fsx_lustre/assets/scratch.yaml

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,11 @@
11
AWSTemplateFormatVersion: '2010-09-09'
2-
Description: Creates a SCRATCH FSx for Lustre filesystem and a client security group for access to the filesystem
2+
Description: FSx for Lustre SCRATCH_2 Filesystem.
3+
This template creates a scratch FSx for Lustre filesystem optimized for temporary high-performance workloads.
4+
It configures a single-AZ deployment with customizable storage capacity and compression settings.
5+
Security groups are configured to enable required Lustre network ports (988, 1021-1023) between clients and servers.
6+
The filesystem supports Lustre versions 2.12 and 2.15 with LZ4 compression for optimized storage efficiency.
7+
Use this template as a foundation for deploying high-performance temporary storage solutions.
8+
Refer to the Outputs tab for the filesystem ID, mount name, and security group ID needed to mount the filesystem.
39

410
### Stack metadata
511
Metadata:

recipes/storage/fsx_ontap/assets/main.yaml

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,11 @@
11
AWSTemplateFormatVersion: '2010-09-09'
2-
Description: Creates a basic Single-AZ FSx for NetApp ONTAP file system and a storage virtual machine with a non-root volume.
2+
Description: FSx for NetApp ONTAP Single-AZ Filesystem.
3+
This template creates a Single-AZ FSx for ONTAP filesystem with a storage virtual machine and non-root volume.
4+
It supports FLEXVOL or FLEXGROUP volume types with customizable storage capacity and throughput settings.
5+
Optional Active Directory integration enables Windows SMB client access with automatic CIFS share creation.
6+
Security groups are configured to enable required NFS/SMB ports with client CIDR-based access control.
7+
Use this template as a foundation for deploying enterprise storage solutions with NetApp ONTAP features.
8+
Refer to the Outputs tab for filesystem, storage virtual machine, volume, and security group IDs.
39

410
Metadata:
511
AWS::CloudFormation::Interface:

0 commit comments

Comments
 (0)