Why Whitelist Spur’s IPs?
Spur runs automated browser tests against your application from our cloud infrastructure. If your staging, development, or production environment is behind a firewall, VPN, or IP-restricted access layer, you need to allow traffic from Spur’s IP addresses so that tests can reach your application.Spur IP Addresses
Contact the Spur team to get the current list of IP addresses you need to whitelist.Contact Us
Reach out to the Spur team to request the IP addresses for your allowlist.
How to Whitelist
The exact steps depend on where your application is hosted. Below are instructions for common providers.AWS Security Groups
AWS Security Groups
Open the EC2 Console
Go to the EC2 Console and select Security Groups from the left sidebar.
Select your security group
Find and click the security group attached to your application’s instance or load balancer.
Edit inbound rules
Click Edit inbound rules and add a new rule:
- Type: HTTPS (port 443) or HTTP (port 80), depending on your setup
- Source: Custom, then enter each Spur IP address
- Description: Spur test runners
Google Cloud Firewall Rules
Google Cloud Firewall Rules
Open VPC Network
Go to the VPC Firewall Rules page in the Google Cloud Console.
Create a firewall rule
Click Create Firewall Rule and configure:
- Name:
allow-spur-test-runners - Direction: Ingress
- Targets: Select the target tags or service accounts for your application
- Source IP ranges: Enter each Spur IP address
- Protocols and ports: Allow TCP on port 443 (and 80 if needed)
Azure Network Security Groups
Azure Network Security Groups
Open Network Security Groups
Go to Network Security Groups in the Azure Portal.
Add an inbound rule
Go to Inbound security rules and click Add:
- Source: IP Addresses
- Source IP addresses: Enter each Spur IP address (comma-separated)
- Destination port ranges: 443 (and 80 if needed)
- Protocol: TCP
- Action: Allow
- Name:
AllowSpurTestRunners
Vercel / Netlify / Cloudflare
Vercel / Netlify / Cloudflare
Most modern hosting platforms like Vercel, Netlify, and Cloudflare do not block incoming traffic by default. If you have configured IP-based access restrictions (such as Cloudflare Access or Vercel’s IP allowlisting), add Spur’s IP addresses to your allowlist through that platform’s dashboard.
Nginx or Apache
Nginx or Apache
If you manage access control at the web server level, add Spur’s IPs to your configuration.Nginx — add inside your Apache — add inside your Reload your web server after making changes.
server or location block:<Directory> or <Location> block:Verifying the Setup
After whitelisting, run a quick test from Spur to confirm connectivity:Create or open a test
Navigate to any existing test or create a new one that targets the environment behind your firewall.
Run the test
Execute the test. If the first step (navigating to your URL) completes successfully, whitelisting is working.
