Networking flowchart
Open Networking
Private Networking
Next
, you will find the available configuration options in the template as parameters:Private Networking
Parameter Name | Description | Required |
---|---|---|
Primary CIDR for the VPC | CIDR to be used as the primary CIDR range for the VPC. It has to be at least a block of CIDR with prefix /22 to meet the IP needs of the network. This is the range you may have to route from your transit gateway (Default range: 10.106.188.0/22 ). | Yes |
Transit Gateway ID | If you want Gitpod instance to access resources from your internal network (like SCM, SSO, etc.), then you can allow that by using AWS transit gateways. The transit gateway that provides access to your internal network can be attached to the VPC by providing the ID here. This is optional. | No |
CIDR to route Via the Transit Gateway | If you have provided a transit gateway ID, and have one CIDR range for internal resources, provide the IP range here. | No |
Prefix List ID containing CIDRs to route via the Transit Gateway | If you have provided a transit gateway ID, you have to also specify the CIDR ranges that should be access via this transit gateway. Create a prefix list, containing the IP ranges associated with your internal resources, and provide the prefix list ID here. | No |
Next
Submit
on the last page to stack deploying the networking configurationPrivate Networking
Private Networking
Private Networking landing
Next
, you will find the available configuration options in the template as parameters:Private Networking paramas
Parameter Name | Description | Required |
---|---|---|
Primary CIDR for the VPC | Since the Gitpod network will have to be routed to from your internal network, we make the primary CIDR of the network configurable. It has to be at least a block of CIDR with prefix /22 to meet the IP needs of the network (Default range: 10.106.188.0/22 ). | Yes |
Transit Gateway ID | You must associate your VPC with a transit gateway ID that will control the inbound and outbound communication from the VPC. All the traffic outside of the VPC will be routed via the transit gateway | Yes |
Submit
on the last page to stack deploying the networking configurationPrivate Networking
/24
CIDR block in each availability zone recommended. We suggest the VPC primary CIDR be at least /22
or bigger.Rough pictorical representation of resource distribution across the three subnets
Networking logical split
execute-api
VPC endpoint created in your VPC with Private DNS named enabled
set to Yes
, and allowing HTTPS
(port 443) communication for the entire VPC CIDR. The endpoint should span across all the availability zones being used by the VPC.
gitpod-network-check
CLI tool that is a part of our Enterprise deployment toolkit. Please refer the README in the repo to use it.