Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

What's the best practice to expose Solana RPC calls to the internet with selected ips? #95

Closed
day-xy opened this issue Jul 23, 2024 · 3 comments

Comments

@day-xy
Copy link

day-xy commented Jul 23, 2024

  • [ Y] ✋ I have searched the open/closed issues and my issue is not listed.

Please describe your question here

I want to call the RPC methods from my local workspace to test something. I'd like to know what the best practice is to do so. E.g., API gateway? Also, do I need to change any configuration in the script before exposing the RPC calls to the internet?

Provide a link to the example/module related to the question

Additional context

@evertonfraga
Copy link
Contributor

Hi @day-xy.

For testing, the easiest would be to include your IP on the security group that rules over your EC2 instance.

You can choose "My IP" option on Inbound rules. And naturally, if your local IP changes, you'll have to make the change in the security group as well.

https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/working-with-security-groups.html#adding-security-group-rule

@frbrkoala
Copy link
Contributor

frbrkoala commented Aug 1, 2024

The more secure way will be to use AWS Client VPN, as described in this post for Arbitrum nodes on ECS: https://aws.amazon.com/blogs/database/run-a-serverless-arbitrum-full-node-on-aws/ . Thanks for the tip, we'll work on adding a doc on how to do that.

@frbrkoala
Copy link
Contributor

UPD: created new Issue with request to add new doc: #104

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants