Skip to main content

Access a Private AWS Resource

Retool Cloud relies on customer data in APIs or Databases via Retool Connect. Often these resources are protected by placing them in private subnets within a VPC. What approach should a customer use to allow Retool to access these services while maintaining existing security controls?

Pattern solution

Because Retool Cloud is running external to a customer’s VPC, the customer will need to provide an ingress mechanism. This can be done through the use of a Network Load Balancer, that provides an Elastic IP address. The NLB can then use a target group to forward the traffic to an EC2 instance, RDS instance or an Application Load Balancer that is fronting the API for example. The security group of the resource will need to allow ingress from the NLB security group. The NLB security group will need to allow ingress from the Retool CIDR range defined here. The following architecture diagram provides an example:

AWS architecture

Once this has been configured in AWS, Retool Resource (e.g., REST API, Database) can be configured to use the NLB Elastic IP address.

Pattern resources

The following AWS Blog covers some of the same topics related to NLB to ALB integration.