Operating AWS Batch on a public subnet

0

We want to move our AWS Batch computing environment from a private subnet to a public subnet to reduce communication costs for the NAT Gateway, but are there any security risks associated with doing so? Even if we assign a public IP, we do not see any problem as long as the inbound rules for the security group are properly configured.

kakeke
已提問 1 年前檢視次數 423 次
2 個答案
0

Public subnet means that the instances can be directly accessible from the internet with their public IP address (or EIP). There are a lot of bots constantly crawling IP addresses. If they get a response from a server, they know that it could potentially be breached or brute-forced.

I understand the cost consideration of using the NAT Gateway. I would make use of NACL (first) + Security group (second). NACL is setup on the subnet level, protecting all the instances within that subnet. Security group works at the instance level. If you are using Linux you can also look to use IP Tables which is Linux firewall.

profile pictureAWS
專家
已回答 1 年前
0

So, AWS Batch is the orchestration tool not where batch runs.
Are you referring to the compute pools, if so then as with any workload you would not want those to be in public subnets.

What data costs are you generating?
It may be that VPC Endpoints might be useful in reducing costs.
If all your data is in Dynamo DB or S3 then a gateway load balance endpoint is a about a tenth of the cost.
Other AWS Services would be an interface endpoint for which data processing is about 25% of the cost.

If your data is not in AWS then my preferred method to reduce cost and keep security is an NLB.
Put the NLB in the public subnet with targets as your data source and have your batch use the NLB as it's data source.
This can be secured and is about half the cost of NAT but operates in a similar way in terms of system protection.

profile picture
已回答 1 年前

您尚未登入。 登入 去張貼答案。

一個好的回答可以清楚地回答問題並提供建設性的意見回饋,同時有助於提問者的專業成長。

回答問題指南