Skip to content

Commit e56880e

Browse files
committed
docs: correct NLB inbound-rules step to Security tab and exact AWS label
1 parent 757a216 commit e56880e

1 file changed

Lines changed: 8 additions & 7 deletions

File tree

docs/private-networking/aws-console-setup.mdx

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -127,13 +127,14 @@ The NLB is what PrivateLink exposes to Trigger.dev. It must be **internal** (not
127127
column shows **Active** before moving on. The endpoint service in the next step won't list the
128128
NLB until it's fully active.
129129
</Step>
130-
<Step title="Disable the inbound rules option on the NLB">
131-
Once the NLB is **Active**, open it and go to its **Settings** tab. AWS now enables an
132-
**Inbound rules** feature on NLBs by default — leaving it on can cause traffic from the
133-
Trigger.dev VPC Endpoint to be silently dropped before reaching your listener. Switch the
134-
**Inbound rules** option to **Disabled** and save.
135-
136-
![Disable the NLB inbound rules option](/images/priv-connections-nlb-disable-inbound-rules-options.png)
130+
<Step title="Disable PrivateLink inbound rules enforcement on the NLB">
131+
Once the NLB is **Active**, open it and go to its **Security** tab, then click **Edit**. If a
132+
security group is attached, AWS enables **Enforce inbound rules on PrivateLink traffic** by
133+
default — leaving it on can cause traffic from the Trigger.dev VPC Endpoint to be silently
134+
dropped before reaching your listener. Uncheck **Enforce inbound rules on PrivateLink traffic**
135+
and save.
136+
137+
![Uncheck Enforce inbound rules on PrivateLink traffic on the NLB](/images/priv-connections-nlb-disable-inbound-rules-options.png)
137138

138139
</Step>
139140
</Steps>

0 commit comments

Comments
 (0)