Proxy support: Enterprise runners support HTTP proxy configuration. Add
.internal, 169.254.0.0/16, app.gitpod.io, and .amazonaws.com to NO_PROXY. See proxy configuration.Ona services
Management plane
https://app.gitpod.iohttps://app.ona.com
VS Code
Server downloads and extension marketplace:https://update.code.visualstudio.com/api/commits/stable/server-linux-x64-webhttps://update.code.visualstudio.com/api/commits/stable/server-linux-arm64-webhttps://update.code.visualstudio.com/commit:*/server-linux-x64/stablehttps://update.code.visualstudio.com/commit:*/server-linux-arm64/stablehttps://*.vscode-unpkg.nethttps://marketplace.visualstudio.comhttps://*.gallerycdn.vsassets.iohttps://*.prss.microsoft.comhttps://*.vscode-gitpod-cdn.com(required for VS Code Web functionality)https://vscode.gitpod.io(required for VS Code Web functionality)
JetBrains
IDE downloads and services:https://www.jetbrains.comhttps://download.jetbrains.comhttps://download-cf.jetbrains.comhttps://download-cdn.jetbrains.comhttps://data.services.jetbrains.comhttps://plugins.jetbrains.comhttps://downloads.marketplace.jetbrains.comhttps://account.jetbrains.com
Release artifacts
Updates, CLI binaries, and agent components:https://releases.gitpod.io/ec2/stable/manifest.jsonhttps://releases.gitpod.io/ec2/stable/supervisor-amd64.xzhttps://releases.gitpod.io/ec2/stable/gitpod-ec2-runner.jsonhttps://releases.gitpod.io/ec2/stable/gitpod-ec2-runner-enterprise.jsonhttps://releases.gitpod.io/ec2/stable/gitpod-ec2-multi-org-runner.jsonhttps://releases.gitpod.io/cli/stable/manifest.jsonhttps://releases.gitpod.io/cli/stable/gitpod-linux-amd64https://releases.gitpod.io/cli/stable/gitpod-linux-amd64.exehttps://releases.gitpod.io/cli/stable/gitpod-linux-amd64.sha256https://releases.gitpod.io/cli/stable/gitpod-linux-arm64https://releases.gitpod.io/cli/stable/gitpod-linux-arm64.sha256https://releases.gitpod.io/vscode/releases/*/vscode-remote.vsixhttps://releases.gitpod.io/vscode/releases/*/vscode-agent-amd64https://releases.gitpod.io/vscode/releases/*/vscode-agent-arm64https://releases.gitpod.io/jetbrains/releases/*/jetbrains-agent-amd64https://releases.gitpod.io/jetbrains/releases/*/jetbrains-agent-arm64
Container registries
Default Dev Container image:https://mcr.microsoft.com/devcontainers/base:ubuntu-24.04
<region> with your AWS region):
https://api.ecr.<region>.amazonaws.com- ECR APIhttps://<account-id>.dkr.ecr.<region>.amazonaws.com- Docker registry protocolhttps://s3.<region>.amazonaws.com- Image layer storage
Your infrastructure
SCM and SSO providers
Configure access to your providers:- GitHub, GitLab, Bitbucket URLs
- SSO provider URLs (Okta, Azure AD, etc.)
Optional services
Prometheus remote write
- Your metrics endpoint URL (HTTPS 443)
Additional container registries
Common registries:https://index.docker.iohttps://registry-1.docker.iohttps://auth.docker.iohttps://ghcr.io- Your private registry URLs (HTTPS 443)
AWS services
Replace<region> with your AWS region and <account-id> with your AWS account ID.
Instance metadata
- Endpoint:
169.254.169.254 - Protocol: HTTP (80)
Regional APIs
https://ec2.<region>.amazonaws.comhttps://<account-id>.dkr.ecr.<region>.amazonaws.comhttps://s3.<region>.amazonaws.comhttps://ssm.<region>.amazonaws.comhttps://sts.<region>.amazonaws.comhttps://dynamodb.<region>.amazonaws.comhttps://cloudformation.<region>.amazonaws.comhttps://secretsmanager.<region>.amazonaws.comhttps://logs.<region>.amazonaws.comhttps://acm.<region>.amazonaws.comhttps://ecs.<region>.amazonaws.comhttps://ecs-agent.<region>.amazonaws.comhttps://ecs-telemetry.<region>.amazonaws.comhttps://ssmmessages.<region>.amazonaws.comhttps://ec2messages.<region>.amazonaws.comhttps://elasticloadbalancing.<region>.amazonaws.com
AMI requirements
If your AWS Organization restricts AMI access, ensure your account can launch from these AMIs:Required AMIs
| AMI Name | Owner Account ID | Owner | Purpose |
|---|---|---|---|
bottlerocket-aws-ecs-1-x86_64 | 149721548608 | Amazon | Runner service |
gitpod/images/gitpod-next/ec2-runner-ami-* | 995913728426 | Ona | Development environments |
Allowlisting by owner account ID
Allow by Owner Account ID rather than specific AMI ID. This ensures automatic access to new versions and security patches. Configure your AWS Organization’s AMI access policies to:- Allow Owner Account IDs from the table above
- Include both Amazon (
149721548608) and Ona (995913728426) accounts - Test that your deployment account can launch from these AMIs
Test AMI access
SSH domain aliases
Ona uses aliases like<workspace-id>.gitpod.remote and <workspace-id>.gitpod.environment for SSH connectivity.
These are SSH configuration aliases (not internet domains) that map to EC2 instance IP addresses:
- The Ona CLI automatically updates your SSH config with actual instance IPs
- Provides clean identifiers instead of complex AWS hostnames like
ec2-18-184-202-80.region.compute.amazonaws.com - When you connect via SSH or VS Code, your SSH client resolves the alias to the actual IP