Skip to content

Commit 19b4ba7

Browse files
committed
docs: reorder AWS console setup so target group is created before NLB
1 parent 8037c2e commit 19b4ba7

1 file changed

Lines changed: 28 additions & 41 deletions

File tree

docs/private-networking/aws-console-setup.mdx

Lines changed: 28 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -27,35 +27,9 @@ Before you start you'll need:
2727
multiple AZs.
2828
</Note>
2929

30-
## Step 1: Create an internal Network Load Balancer
30+
## Step 1: Create a target group pointing at your resource
3131

32-
The NLB is what PrivateLink exposes to Trigger.dev. It must be **internal** (not internet-facing).
33-
34-
<Steps>
35-
<Step title="Open the EC2 console">
36-
Go to **EC2 → Load Balancers → Create load balancer** and choose **Network Load Balancer**.
37-
</Step>
38-
<Step title="Configure the basics">
39-
- **Name**: something descriptive, e.g. `trigger-postgres-nlb`
40-
- **Scheme**: **Internal**
41-
- **IP address type**: IPv4
42-
</Step>
43-
<Step title="Choose VPC and subnets">
44-
Pick the VPC where your resource lives. Select one private subnet per AZ that should serve traffic.
45-
Each subnet you select adds an availability zone to the endpoint.
46-
</Step>
47-
<Step title="Skip the listener for now">
48-
You'll add a listener after creating the target group. You can leave the default placeholder
49-
listener and update it later, or remove it.
50-
</Step>
51-
<Step title="Create the load balancer">
52-
Click **Create load balancer**. Provisioning takes 1–2 minutes.
53-
</Step>
54-
</Steps>
55-
56-
## Step 2: Create a target group pointing at your resource
57-
58-
The target group is how the NLB knows where to forward traffic.
32+
The target group is how the NLB will know where to forward traffic. AWS requires a target group when creating a load balancer, so we'll set this up first.
5933

6034
<Steps>
6135
<Step title="Open the target groups page">
@@ -74,7 +48,7 @@ The target group is how the NLB knows where to forward traffic.
7448
- **Name**: e.g. `trigger-postgres-tg`
7549
- **Protocol**: TCP
7650
- **Port**: the port your resource listens on (5432 for Postgres, 6379 for Redis, 3306 for MySQL, etc.)
77-
- **VPC**: same VPC as the NLB
51+
- **VPC**: the VPC where your resource lives (this must match the VPC you'll use for the NLB)
7852
- **Health check protocol**: TCP
7953
</Step>
8054
<Step title="Register your targets">
@@ -94,19 +68,32 @@ The target group is how the NLB knows where to forward traffic.
9468
</Step>
9569
</Steps>
9670

97-
## Step 3: Add a listener on the NLB
71+
## Step 2: Create an internal Network Load Balancer
72+
73+
The NLB is what PrivateLink exposes to Trigger.dev. It must be **internal** (not internet-facing).
9874

9975
<Steps>
100-
<Step title="Open the NLB you created">
101-
Go to **EC2 → Load Balancers**, select your NLB, and switch to the **Listeners** tab.
76+
<Step title="Open the EC2 console">
77+
Go to **EC2 → Load Balancers → Create load balancer** and choose **Network Load Balancer**.
78+
</Step>
79+
<Step title="Configure the basics">
80+
- **Name**: something descriptive, e.g. `trigger-postgres-nlb`
81+
- **Scheme**: **Internal**
82+
- **IP address type**: IPv4
10283
</Step>
103-
<Step title="Add a TCP listener">
84+
<Step title="Choose VPC and subnets">
85+
Pick the same VPC as your target group. Select one private subnet per AZ that should serve traffic.
86+
Each subnet you select adds an availability zone to the endpoint.
87+
</Step>
88+
<Step title="Add a TCP listener forwarding to your target group">
89+
Under **Listeners and routing**, configure:
90+
10491
- **Protocol**: TCP
105-
- **Port**: same as your target group port (5432, 6379, etc.)
106-
- **Default action**: forward to the target group you just created
92+
- **Port**: same as your target group port (5432 for Postgres, 6379 for Redis, etc.)
93+
- **Default action**: forward to the target group you created in Step 1
10794
</Step>
108-
<Step title="Save">
109-
Click **Add**. The listener becomes active immediately.
95+
<Step title="Create the load balancer">
96+
Click **Create load balancer**. Provisioning takes 1–2 minutes.
11097
</Step>
11198
</Steps>
11299

@@ -116,7 +103,7 @@ The target group is how the NLB knows where to forward traffic.
116103
PrivateLink connection won't either.
117104
</Tip>
118105

119-
## Step 4: Create a VPC Endpoint Service
106+
## Step 3: Create a VPC Endpoint Service
120107

121108
This is the resource that PrivateLink consumers connect to.
122109

@@ -148,7 +135,7 @@ This is the resource that PrivateLink consumers connect to.
148135
</Step>
149136
</Steps>
150137

151-
## Step 5: Authorize the Trigger.dev AWS account
138+
## Step 4: Authorize the Trigger.dev AWS account
152139

153140
By default, no one can connect to your endpoint service. You need to explicitly allow Trigger.dev's AWS account.
154141

@@ -178,7 +165,7 @@ By default, no one can connect to your endpoint service. You need to explicitly
178165
</Step>
179166
</Steps>
180167

181-
## Step 6: Add the connection in Trigger.dev
168+
## Step 5: Add the connection in Trigger.dev
182169

183170
<Steps>
184171
<Step title="Open the dashboard">
@@ -189,7 +176,7 @@ By default, no one can connect to your endpoint service. You need to explicitly
189176
Then fill in:
190177

191178
- **Friendly name**: a short, human-readable label for this connection.
192-
- **VPC Endpoint Service name**: paste the `com.amazonaws.vpce.<region>.vpce-svc-...` value from Step 4.
179+
- **VPC Endpoint Service name**: paste the `com.amazonaws.vpce.<region>.vpce-svc-...` value from Step 3.
193180
- **Target region**: the AWS region your endpoint service lives in.
194181

195182
</Step>

0 commit comments

Comments
 (0)