Skip to content

Endpoints🔗

Information about endpoints that Apheris Compute Gateways communicate with.

Note

The connection to all endpoints is via HTTPS (TCP port 443).

The exception are connections to NVFlare servers (*.nvflare..apheris.net`) on the Apheris Compute orchestrator that use mTLS on TCP port 8002.

Orchestrator endpoints🔗

The following endpoints must be accessible to the Apheris Compute Gateway pods at runtime to ensure proper communication with our Compute Orchestrator.

Name URL Description
Auth0 <env>.eu.auth0.com Apheris authentication endpoint
Backend API api.<subdomain>.apheris.net Apheris backend endpoint (used by computations, CLI and Apheris website)
NVFlare *.nvflare.<subdomain>.apheris.net Apheris NVFlare endpoints (used by NVFlare clients)
Orchestrator orchestrator.<subdomain>.apheris.net Apheris Orchestrator endpoint (used by the Gateway agent)
Quay quay.io Apheris Custom Models

AWS EKS Compute Gateways🔗

For the Gateways deployed in an AWS environment, the following endpoints must be accessible to different components of the EKS cluster and Kubernetes services.

The AWS endpoints are public and should be reachable using a NAT Gateway from private subnets. However, such AWS endpoints can be reached internally by enabling VPC Endpoints for each of above services. The Apheris reference setup creates VPC Endpoints for S3 and ECR by default.

Name URL Description
Auth0 <env>.eu.auth0.com Apheris authentication endpoint
Backend API api.<subdomain>.apheris.net Apheris backend endpoint (used by computations, CLI and Apheris website)
Cloudwatch logs.<region>.amazonaws.com In case EKS audit logs are enabled
EC2 ec2.<region>.amazonaws.com So Kubernetes nodes can join the cluster
ECR api.ecr.<region>.amazonaws.com Access to private ECR images
NVFlare *.nvflare.<subdomain>.apheris.net Apheris NVFlare endpoints (used by NVFlare clients)
Orchestrator orchestrator.<subdomain>.apheris.net Apheris Orchestrator endpoint (used by the Gateway agent)
Private ECR (EKS specific) <account>.dkr.ecr.<region>.amazonaws.com EKS images (CNI, CoreDNS, EBS, Kube-Proxy)
Public ECR public.ecr.aws Karpenter
Quay quay.io Apheris Custom Models
S3 <bucket>.s3.<region>.amazonaws.com Access to S3 objects (data)
SSM ssm.<region>.amazonaws.com Required by Karpenter autoscaler
STS sts.<region>.amazonaws.com IAM roles assumed by Kubernetes service accounts

Gateway Installer🔗

Our Gateway Installer downloads and deploys several components and needs to be able to reach the following domains (egress only):

Name URLs Description
AWS ECR public.ecr.aws for Open Policy Agent Gatekeeper
AWS S3 amazonaws.com public tutorial datasets
Auth0 <env>.eu.auth0.com Apheris authentication endpoint
Cilium cilium.io Cilium Helm chart
DockerHub cloudfront.net, docker.com, docker.io
GitHub github.com, github.io, githubusercontent.com
Helm helm.sh Helm binary
NVFlare *.nvflare.<subdomain>.apheris.net Apheris NVFlare endpoints (used by NVFlare clients)
Orchestrator orchestrator.<subdomain>.apheris.net Apheris Orchestrator endpoint (used by the Gateway agent)
Quay quay.io Apheris Gateway agent image, Apheris Gateway Helm chart and Cilium images
k3s k3s.io K3s installer
keybase keybase.io GPG keys for validation
Auth0 <env>.eu.auth0.com Apheris authentication endpoint
Backend API api.<subdomain>.apheris.net Apheris backend endpoint (used by computations, CLI and Apheris website)
NVFlare *.nvflare.<subdomain>.apheris.net Apheris NVFlare endpoints (used by NVFlare clients)
Orchestrator orchestrator.<subdomain>.apheris.net Apheris Orchestrator endpoint (used by the Gateway agent)
Quay quay.io Apheris Custom Models