The Standard AWS Runner provides a complete, easy-to-deploy solution for running Gitpod Environments in your AWS infrastructure. It connects securely through our central gateway, ensuring your Environments stay protected while maintaining simplicity.

Key Features

  • Super easy setup with CloudFormation template
  • Complete AWS EC2 Runner solution
  • Secure connectivity through Gitpod’s central gateway

Standard Runner

Gitpod Gateway

The Standard AWS Runner uses Gitpod Gateway to establish secure connectivity between your Runner infrastructure and Gitpod services. Gateway is an overlay network that creates encrypted tunnels to expose Environment ports and logs, as well as OAuth redirect URLs for Runners.

This eliminates the need to configure load balancers, SSL certificates, or custom DNS settings in your AWS environment. Gateway handles secure routing and authentication automatically, allowing users to access Environment services through Gitpod-managed domains while keeping your infrastructure private.

Prerequisites

Before deploying your Standard AWS Runner, ensure you have:

  1. AWS Account - Use either an existing AWS account or create a new one
  2. AMI Access - If your organization restricts AMI usage, review our AMI Requirements guide
  3. Optional IAM Role - Configure an IAM role if needed for enhanced permissions and security

Network Requirements

Network Configuration Diagram

Your Standard AWS Runner requires specific network connectivity. This applies to both deployment options below.

Required Ports

User Access:

  • Port 29222 (TCP): SSH access from your users to development Environments

Internal Communication:

  • Port 22999 (HTTP): Gitpod Runner to Environments
  • Port 9090 (HTTP): Internal healthcheck within Gitpod Runner ECS task

Required Outbound Endpoints

Your subnets must have outbound access to these endpoints:

EndpointPurposeProtocolPort
app.gitpod.ioGitpod Service (management plane)HTTPS443
*.us01.gitpod.devGitpod Service (gateway)HTTPS443, 8443
*.us01.gitpod.devGitpod Service (gateway)UDP4242
35.171.240.32Gitpod Service (gateway)UDP4242
13.216.138.24Gitpod Service (gateway)UDP4242
44.223.157.13Gitpod Service (gateway)UDP4242
54.163.142.39Gitpod Service (gateway)UDP4242
35.171.31.215Gitpod Service (gateway)UDP4242
releases.gitpod.io/*Gitpod Release ArtifactsHTTPS443
update.code.visualstudio.com/*VS Code ServerHTTPS443
*.vscode-unpkg.netVS Code ExtensionsHTTPS443
marketplace.visualstudio.comVS Code MarketplaceHTTPS443
*.gallerycdn.vsassets.ioVS Code AssetsHTTPS443
*.jetbrains.comJetBrains IDEsHTTPS443
public.ecr.awsContainer imagesHTTPS443
*.amazonaws.comAWS API callsHTTPS443
SCM ServicesSource code repositoriesHTTPS443
(optional) Prometheus Remote writeMetrics endpointHTTPS443
(optional) Container RegistriesCustom container registriesHTTPS443

For complete connectivity requirements, see Connectivity Requirements.

Deployment Options

Choose the deployment option that best fits your needs:

Option 1: Quick Start (AWS Default VPC)

Get a working Runner with minimal configuration in under 30 minutes.

Requirements:

Ready to start? Go to Setup and use the quick start options.

Option 2: Custom VPC Setup

Full control over networking, security, and deployment architecture.

Requirements:

  • Capacity Planning - Follow our Capacity Planning guide to determine your infrastructure requirements
  • Custom VPC with your preferred networking setup:
    • Private subnets with NAT Gateway, Transit Gateway, VPN, or other connectivity solutions
    • Outbound internet access to all required endpoints listed above
  • Optional VPC endpoints for cost optimization

Important: If using private subnets, ensure connectivity is available to the private IP addresses of the VPC from your local machine, as you’ll need to connect to the EC2 instances.

VPC Endpoints (Optional)

VPC endpoints can help reduce data transfer costs and improve security by keeping traffic within the AWS network. For a complete list of supported AWS services, see the AWS Services page.

Note: Even with VPC endpoints, outbound internet access to Gitpod services is still required.

Security Group Configuration

The CloudFormation template automatically creates a default security group for EC2 Environments with the necessary rules for Gitpod to function. This security group controls access to your development Environments.

Default security group includes:

  • Inbound: Port 29222 (TCP) from any IP address (0.0.0.0/0) - for user SSH access to Environments
  • Inbound: Port 22999 (HTTP) within VPC - for Runner orchestrator communication
  • Outbound: All traffic to required endpoints

Using a Custom Security Group (Optional)

Important: This security group is applied to EC2 Environments. Incorrect configuration can disrupt user connections to Environments or communication between the Runner orchestrator and Environments.

If you need to restrict access further (recommended for production), you can create your own security group and provide it as a CloudFormation template parameter.

Your custom security group must include these rules:

Inbound Rules:

  • Port 29222 (TCP): Allow from your users’ IP ranges (restrict as needed for production)
  • Port 22999 (HTTP): Allow from VPC CIDR block or from Gitpod Runner security group

Outbound Rules:

  • Allow all outbound traffic to the endpoints listed in the Network Requirements section above

Next Steps