Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support provisioning instances without public IPs on AWS #1201

Closed
r4victor opened this issue May 7, 2024 · 0 comments · Fixed by #1203
Closed

Support provisioning instances without public IPs on AWS #1201

r4victor opened this issue May 7, 2024 · 0 comments · Fixed by #1203
Assignees
Labels

Comments

@r4victor
Copy link
Collaborator

r4victor commented May 7, 2024

Currently, dstack-provisioned instances always have public IP addresses assigned. Users may want to provision instances without public IPs and connect to instances via internal VPC addresses for security reasons.

The proposal is to introduce public_ips: true/false field to the backend config:

type: aws
  creds:
    type: default
  public_ips: false

When public_ips: true, dstack provisions a new instance with a public IP (the current behavior). When public_ips: false, dstack assigns no public IP and uses a private IP to connect to the instance.

Users need to make sure that the dstack server, gateways, and dev machines can access the instances via internal IPs. For example:

  • To access instance from dev machines, users set up VPN to the VPC, e.g. AWS Client VPN.
  • To connect different VPCs in different regions, VPC-peering can be used.

We'll start by supporting instances without public IPs on AWS. We can then support Azure, GCP, etc.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant