Danny Xie
03/14/2023, 7:00 PMStarted Dagster code server for file dagster/repository.py on port 4000 in process 1
daniel
03/14/2023, 7:01 PMdaniel
03/14/2023, 7:01 PMDanny Xie
03/14/2023, 7:02 PMdaniel
03/14/2023, 7:03 PM- The VPC needs to use route53 for DNS
- You can verify this by looking at the DHCP option set on the VPC
- The VPC needs to have assign_hostnames enabled
- The "default" security group in the VPC needs the following rules
- An ingress rule that allows traffic from other addresses within the default security group. this allows the agent and grpc server to communicate with each other
- Open egress from addresses in the Security Group to the internet, this allows the agent to communicate with Dagster Cloud
- (if using private subnets) The network ACL should allow the same rules as the security group, egress to the public internet and ingress from other hosts in the private subnet
How to check things:
- For the VPC DNS you can go to the VPC console, find the VPC the user wants and click on the DHCP option set
- For the security group go to the security groups section in the VPC console, filter for your VPC and find the one named "default"
- For the network ACLs you'll first need to find the subnet which you can also find from the VPC console and click on the tab for network ACLs
Danny Xie
03/14/2023, 7:07 PM