Do not use this method for new deployments. We recommend using our Terraform self-hosting instead.
- Use the
braintrustcommand-line (CLI) tool. This is the recommended method and requires just a single command. - Use the AWS console. If you need more control or cannot get AWS credentials for the CLI, this option allows you to run the whole process within the CLI.
Setting up the stack: CLI
1
2
Create the CloudFormation stack
There are just a few relevant parameters you should consider for most use cases:- A stack name. This is arbitrary and allows you to refer back to the stack later. A name like “braintrust” or “braintrust-dev” should be fine.
--org-nameshould be the name of your organization (you can find this in your URL on the app, e.g.https://www.braintrust.dev/app/<YOUR_ORG_NAME>/...). This will ensure that only users with access to your organization can invoke commands on your Braintrust endpoint.--provisioned-concurrencythe number of lambda workers to keep running in memory. This is useful if you expect to have a lot of concurrent users, or if you want to reduce the cold-start latency of your API calls. Each increment costs about $40/month in AWS costs. The default is 0.--templateif you are deploying in a region other thanus-east-1, you should specify the template for that region.
Setting up the stack: CloudFormation console
1
Create the CloudFormation
The latest CloudFormation template for Braintrust is available in the following regions:US East 1
US East 2
US West 2
To start in us-east-1, click here to open up the CloudFormation setup window. If you prefer, you can also click “Create Stack” directly in the CloudFormation console and specify one of the URLs above as the S3 template link.

These instructions walk through how to setup through the AWS UI, but you are
welcome to install it via the command line too if you prefer.
OrgName- The name of your organization. This will restrict access to users in your organization. By default it is set to*which means all users can query the endpoint. However, rest assured, only users in your org will be able to access its resources (due to access control checks).ProvisionedConcurrency- The number of lambda workers to keep running in memory. This is useful to set if you want to minimize the cold-start latency of your API calls. Each increment costs about $40/month in AWS costs. The default is 0.

Behind the scenes, the template sets up a few key resources:
- A VPC with public & private subnets for networking
- A few lambda functions which contain the logic for executing Braintrust commands
- An API gateway that runs commands against the lambda functions
- An auto-scaling group for Brainstore
- A Postgres database, Redis cache, and S3 buckets
2
Getting the Universal URL
Once the stack is provisioned, you should seeUPDATE_COMPLETE as its status:
UniversalURL. We’ll use this to test your endpoint and configure Braintrust to access your org through it. For the rest of the doc, we’ll refer to it as <YOUR_UNIVERSAL_URL>.
Verifying the stack
Run the following command to test that the stack is running. The first time you run it, AWS may do some setup work to provision your lambda function, and it can take up to 30 seconds to run.{"id":"80c48a10-4888-4382-a55b-255018e70fe5","email":"[email protected]","organizations":[]}.
Configure your organization’s endpoint
Visit your organization’s settings page and set the API URL captured above. You can skip the realtime URL and proxy URL, unless you have an advanced need that requires it (see the docker guide for more information). Once you configure the URL, select Save. The page automatically attempts to test that you’re authorized to access the URL.
The
braintrust install api command tries to install these values for you. So if you see them already filled in, no need to change them!Test the application end-to-end
Hooray! At this point you should be able to test the full application. The easiest way to do this is by using the Python SDK. This simple Python script will run a full loop of using Braintrust and setting up an experiment.Maintaining your installation
Most new Braintrust releases do not require stack updates. Occasionally, however, you will need to update the stack to get access to new features and performance enhancements. Like installation, you can update the stack through either the CLI or AWS console.Using the Braintrust CLI
To update your stack, run the following (replacing<YOUR_STACK_NAME>):
8 to your lambda functions, run
Using the AWS interface
You can also update the stack directly through AWS. Their docs walk through how to update through the console and theaws cli.
The rest of the guide covers topics only needed for advanced
configurations.
Connect Braintrust’s VPC to other internal resources
To permit incoming and outgoing traffic between Braintrust’s lambda functions and other internal cloud resources, you can either run everything in the same VPC or setup VPC peering. This is necessary if you want to access resources like an LLM gateway or a database that is not publicly accessible.VPC Peering
When you create your Braintrust CloudFormation, it automatically creates a VPC with the same name as your CloudFormation. You can access the Braintrust VPC’s name and ID from the CloudFormation’sOutputs tab (named pubPrivateVPCID).

- Create a VPC peering connection
- Accept a VPC peering connection
- View your VPC peering connections
- Update your route tables for a VPC peering connection
- Make sure to update the route tables in both VPCs.
- Update your security groups to reference peer security groups. We recommend allowing “All Traffic” from Braintrust’s VPC.
Troubleshooting
- If you continue to see errors after updating the VPC peering group, you may need to update your CloudFormation template (which will effectively reboot your Lambda functions). You can do this by triggering an update on the CloudFormation and letting it run. You may need to change a stack parameter and then change it back to trigger the updates.
- You can manually test network settings by booting up an EC2 machine in the Braintrust VPC to test connectivity. Make sure to assign a public IP to the instance and use the public subnet of the VPC while initializing.