Forge can create and manage servers on the following cloud server providers:
Bring Your Own Provider
If your preferred server provider is not supported by Forge, you may use Forge's "Custom VPS" option to create your server. Custom VPS servers receive all of the same functionality as first-party supported server providers.
You can link server providers from your Server Providers dashboard. It is possible to link any number of supported provider accounts, including multiple accounts for one provider.
There are a few requirements you should review to ensure Forge works correctly with your linked AWS account:
Type | Protocol | Port Range | Source | Description | |
---|---|---|---|---|---|
HTTP | TCP | 80 | Custom | 0.0.0.0/0 | |
HTTP | TCP | 80 | Custom | ::/0 | |
SSH | TCP | 22 | Custom | YOUR_IP_ADDRESS/32 | SSH from your IP |
SSH | TCP | 22 | Custom | 159.203.150.232/32 | SSH from Forge |
SSH | TCP | 22 | Custom | 159.203.150.216/32 | SSH from Forge |
SSH | TCP | 22 | Custom | 45.55.124.124/32 | SSH from Forge |
HTTPS | TCP | 443 | Custom | 0.0.0.0/0 | |
HTTPS | TCP | 443 | Custom | ::/0 |
When creating a new Akamai Cloud API token for your Akamai account, Akamai will ask you to select which permissions are needed by the token. You will need to select the following permissions:
In addition, you may wish to set the token to never expire.
The Vultr server provider requires you to add the Forge IP addresses to an IP address allow list so that Forge can communicate with your servers. You should ensure that you do this before provisioning a Vultr server via Forge.
Hetzner API tokens are specific to a Hetzner Project. If you utilize Hetzner Projects, you should ensure that Forge has an API token for each Hetzner Project.
Alongside supporting several first-party server providers, Forge also supports the ability to use your own custom server. To do so, select the Custom VPS option when creating a new server.
In addition, you should review the following server requirements:
root
SSH access enabled.Please refer to the Forge IP address documentation if you restrict SSH access to your server by IP addresses.
If you are protecting your internal network through Network Address Translation and you are mapping public SSH ports to different internal SSH ports, you may let Forge know about this by checking the This server is behind a NAT checkbox. This will show an extra input field, NAT SSH Port, that you can use to tell Forge about the SSH port to which SSH traffic is mapped. Forge will use this port to allow traffic into the server via ufw
. If the internal SSH port is the same as the public SSH port, you may leave the NAT SSH Port field empty.