Request your Enterprise trial
- Communication with Account Managers: Your journey begins by communicating your AWS account ID and chosen region to your Gitpod account manager. This initial step ensures that our team is aligned with your setup preferences and requirements.
- Applying CloudFormation (CF) Stacks: You will receive deep links to CloudFormation templates tailored for Gitpod deployment. The process starts with applying a CF stack that creates an IAM role with the necessary permissions, followed by the main Gitpod CF stack. These templates simplify the setup, allowing for a secure and compliant infrastructure deployment.
- Setting Up SSO with Admin URL: After the infrastructure is in place, the next step involves setting up Single Sign-On (SSO). We’ll provide you with an admin URL to configure SSO, ensuring secure access control to your Gitpod Enterprise environment.
- Sit Back and Relax: Once the setup is complete, you can relax while we manage your Gitpod installation. Our team monitors your system around the clock, providing uninterrupted service on your Gitpod instance, ensuring everything is optimized for performance and security.
- Regular Updates: Gitpod Enterprise is continually improving, and you’ll receive updates for your CloudFormation templates. These updates can be applied with a one-click solution, keeping your environment up to date with the latest features and security enhancements.
AWS Support and Regions
Gitpod Enterprise is currently supported exclusively on AWS, leveraging its robust and scalable infrastructure to provide a seamless development environment. Here are the key points regarding our AWS support:Exclusive AWS Support:
Our deep integration with AWS services and infrastructure ensures that Gitpod Enterprise leverages the best of cloud technology, offering scalability, security, and reliability.Supported AWS Regions:
To ensure optimal performance and compliance with data residency requirements, Gitpod Enterprise is available in specific AWS regions. Currently, we support the following regions:us-east-1
us-east-2
us-west-2
eu-west-1
eu-west-2
eu-west-3
eu-central-1
sa-east-1
me-south-1
me-central-1
us-west-1
ap-northeast-1
ap-southeast-2
ap-southeast-1
Frequently Asked Questions
Q. Why two templates?
A. The
gitpod-role
CloudFormation template is used to create a role with the minimum permissions required to install and update Enterprise. This role and its policies are used to install the second Cloudformation template.
Q. Can the stack created by
gitpod-role
be deleted after executing the <company>-gitpod-template.json
? A. No, the stack created by
gitpod-role
should be maintained. The role created is also used when updates are provided to the <company>-gitpod-template.json
template. For more details on infrastructure updates, please see Deployment and Updates.
Q. What happens if my Cloudformation stack fails to install? A. If the stack fails to install, you should delete the stack and try again. There are a few resources that need to be cleaned up manually before you attempt another installation. See Deleting your Gitpod installation for details.
Q. Can we grant public access to webhooks and IDP services without exposing the entire Gitpod application to the Internet?
A. Yes. Enterprise can be configured to expose webhooks and IDP services on public endpoints. This can be helpful for connecting to OIDC providers such as Okta, Azure AD. This option also makes it easy for developers to connect to your instance without having to route through a VPN or transit gateway. See Networking and Data flows for more information. Q. How can we audit the templates before applying them? A. AWS CloudFormation template deep links shared with you are designed to be readable only from the AWS account associated with your Gitpod account managers. Your template is stored in an S3 bucket accessible only from that AWS account. You can obtain the S3 bucket name from the deep link URL of your template or by requesting the S3 URLs from your Gitpod account manager. Here’s how to generate the template URL from the Deep Link URL shared with you:
- The deep link should be in the following format:
https://eu-central-1.console.aws.amazon.com/cloudformation/home?region=eu-central-1#/stacks/create?templateURL=https://cell-877922613839-e674f78d2bf55fd93c878f7f.s3.eu-central-1.amazonaws.com/infrastructure/template.json&stackName=gitpod-instance
. - In this example, the S3 bucket name is
cell-877922613839-e674f78d2bf55fd93c878f7f
and the path to the template JSON isinfrastructure/template.json
. Therefore, you can generate the S3 URL ass3://cell-877922613839-e674f78d2bf55fd93c878f7f/infrastructure/template.json
.
- Open CloudShell in the Gitpod AWS account or configure the AWS CLI in a terminal.
-
Run the following command to download the template:
❓ Got Questions? Contact Support