Using Amazon VPC with Device Farm desktop browser testing
You can give Device Farm desktop browser testing access to an Amazon Virtual Private Cloud (Amazon VPC) environment, enabling testing of isolated, non-internet-facing services and apps through an elastic network interface. For more information on VPCs, see the Amazon VPC User Guide.
If you have private DNS enabled within your VPC, you can use the DNS names within the VPC to access those resources.
Once you configure VPC access, the browsers that you use for your tests won't be able to connect to resources outside of the VPC, such as public CDNs, unless there is a NAT gateway that you specify within the VPC. For more information, see NAT gateways in the Amazon VPC User Guide.
As part of using Amazon VPC endpoints with Device Farm desktop browser testing, Device Farm creates an AWS Identity and Access Management (IAM) service-linked role. For more information, see Using service-linked roles for Device Farm.
Device Farm can connect to VPCs only within the us-west-2
AWS Region. To access
resources in a VPC in another Region, you must create a VPC in the us-west-2
Region
and peer the VPCs. For information on peering VPCs, see the Amazon VPC Peering Guide.
For information on using AWS CloudFormation to automatically create and peer VPCs, see the VPCPeering templates
Topics
Configuring your project to use Amazon VPC endpoints
You must configure Amazon VPC connections on a per-project basis. At this time, you can configure only one endpoint per project. When you configure a VPC, Device Farm creates an interface within your VPC and assigns it to the specified subnets and security groups. All future sessions associated with the project use the configured VPC connection.
Important
If you use your VPC with a TestGrid session, you may incur additional bandwidth charges if your VPC has a public-facing NAT gateway and isn't using an S3 gateway endpoint.
The reason for this is desktop browser sessions provide test artifacts after your tests
are complete and, to make them readily available after your session has been closed, the
host used for your desktop browser test session will periodically synchronize your session's
artifacts into Device Farm's S3 bucket. When you use a public-facing NAT gateway without an S3
gateway endpoint with your VPC, all traffic for test artifact synchronization traverses
through the NAT gateway, which may incur additional bandwidth charges. For more information,
seeĀ Amazon VPC Pricing
To avoid incurring additional bandwidth charges, we recommend that you use an S3 gateway endpoint in your VPC if your VPC has a public-facing NAT gateway. For more information, seeĀ Gateway endpoints in the AWS PrivateLink Guide.
To configure VPC access for a project, you must know:
-
The VPC ID where your app is hosted.
-
The applicable security groups to apply to the connection.
-
The subnets which will be associated with the connection. When a session starts, the largest available subnet is used.
Additionally, to verify that you have access to your specified VPC when you configure the connection, you must configure certain Amazon Elastic Compute Cloud (Amazon EC2) permissions for Device Farm. For more information, see the relevant IAM policy in this guide for configuring VPC connections.
For existing Device Farm desktop browser testing projects, you can update the Amazon VPC configuration using the console or the AWS Command Line Interface (AWS CLI):