You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently, dstack-provisioned instances always have public IP addresses assigned. Users may want to provision instances without public IPs and connect to instances via internal VPC addresses for security reasons.
The proposal is to introduce public_ips: true/false field to the backend config:
type: awscreds:
type: defaultpublic_ips: false
When public_ips: true, dstack provisions a new instance with a public IP (the current behavior). When public_ips: false, dstack assigns no public IP and uses a private IP to connect to the instance.
Users need to make sure that the dstack server, gateways, and dev machines can access the instances via internal IPs. For example:
To access instance from dev machines, users set up VPN to the VPC, e.g. AWS Client VPN.
To connect different VPCs in different regions, VPC-peering can be used.
We'll start by supporting instances without public IPs on AWS. We can then support Azure, GCP, etc.
The text was updated successfully, but these errors were encountered:
Currently, dstack-provisioned instances always have public IP addresses assigned. Users may want to provision instances without public IPs and connect to instances via internal VPC addresses for security reasons.
The proposal is to introduce
public_ips: true/false
field to the backend config:When
public_ips: true
, dstack provisions a new instance with a public IP (the current behavior). Whenpublic_ips: false
, dstack assigns no public IP and uses a private IP to connect to the instance.Users need to make sure that the dstack server, gateways, and dev machines can access the instances via internal IPs. For example:
We'll start by supporting instances without public IPs on AWS. We can then support Azure, GCP, etc.
The text was updated successfully, but these errors were encountered: