You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/private-networking/troubleshooting.mdx
+33Lines changed: 33 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,3 +43,36 @@ Trigger.dev cannot provision a VPC Endpoint until your endpoint service explicit
43
43
</Steps>
44
44
45
45
For full setup instructions including this step, see [Setting up PrivateLink in the AWS Console](/private-networking/aws-console-setup).
46
+
47
+
## Connection is Active but the assigned IP is not reachable from tasks
48
+
49
+
If your private connection shows **Active** in the Trigger.dev dashboard and the NLB target group reports healthy targets, but tasks still cannot reach the assigned IP, the most common cause is that your Network Load Balancer is enforcing security group rules on PrivateLink traffic.
50
+
51
+
When a security group is attached to an NLB, AWS exposes a separate setting called **Enforce inbound rules on PrivateLink traffic**. When this is **on**, the NLB applies its security group's inbound rules to traffic arriving from VPC endpoints — and the source IP it evaluates is the **private IP of the consumer's VPC endpoint network interface**, not an IP in your own VPC. Because that IP belongs to Trigger.dev's VPC and isn't known ahead of time, the SG rule almost never matches, and traffic is silently dropped at the NLB.
52
+
53
+
### How to fix it
54
+
55
+
<Steps>
56
+
<Steptitle="Open your Network Load Balancer in the AWS console">
57
+
Go to **EC2 → Load balancers** in the region where your NLB lives and select the load balancer
58
+
backing your endpoint service.
59
+
</Step>
60
+
<Steptitle="Edit the security group settings">
61
+
On the **Security** tab, click **Edit**.
62
+
</Step>
63
+
<Steptitle="Turn off PrivateLink enforcement">
64
+
Uncheck **Enforce inbound rules on PrivateLink traffic** and save.
65
+
66
+
<Note>
67
+
This only changes how the NLB itself filters traffic. Authorization is still enforced by the
68
+
endpoint service's **Allow principals** list, so only AWS accounts you've explicitly
69
+
allow-listed can connect.
70
+
</Note>
71
+
72
+
</Step>
73
+
<Steptitle="Retry from your task">
74
+
Re-run a task that dials the assigned private IP. The connection should now succeed.
75
+
</Step>
76
+
</Steps>
77
+
78
+
If you need to keep the enforcement on for compliance reasons, the alternative is to widen your NLB's security group inbound rule to `0.0.0.0/0` on the listener port. Allow-listing the consumer endpoint's CIDR is not practical because it lives in Trigger.dev's VPC and may change.
0 commit comments