Skip to Content
Getting StartedOverview

Getting Started Overview

🚀 Welcome to AlertD Setup

This guide will walk you through deploying AlertD in your AWS environment and connecting your infrastructure. The entire process takes about 25-35 minutes and consists of two main phases.


📋 What You’ll Need Before Starting

Before beginning the deployment, make sure you have:

AWS Requirements

  1. AWS Account with appropriate permissions

    • CloudFormation stack creation and management
    • IAM role creation and policy attachment
    • ECS, VPC, ALB, Secrets Manager, and CloudWatch access
    • Ability to create service-linked roles for ECS/ELB
  2. Supported AWS Region

    • AlertD supports the following regions:
    Region GroupRegion Codes
    USus-east-1, us-east-2, us-west-1, us-west-2
    Europeeu-central-1, eu-north-1, eu-south-1, eu-south-2, eu-west-1, eu-west-3, il-central-1, me-central-1
    Asia-Pacificap-northeast-1, ap-northeast-2, ap-northeast-3, ap-south-1, ap-south-2, ap-southeast-1, ap-southeast-2, ap-southeast-3, ap-southeast-4, ap-southeast-5, ap-southeast-7
  3. DNS Domain & SSL Certificate

  4. LLM Provider Choice

    • Amazon Bedrock (Claude) - Fully managed through AWS, no external API calls
    • OpenAI - Requires OpenAI API key
    • Anthropic - Requires Anthropic API key (direct, not via Bedrock)

Authentication Provider

  • Google Account or GitHub Account for team authentication
  • You’ll use this to set up your AlertD workspace and authorize team members

Network Access

Your deployment and end-user browsers must be able to reach:

  • auth.demo.alertd.ai over TCP 443
  • api.openai.com over TCP 443 (if using OpenAI as LLM provider)

🗺️ Setup Roadmap

Phase 1: Deploy AlertD Infrastructure

In this phase, you’ll:

  • Subscribe to AlertD on AWS Marketplace (free during design partner phase)
  • Deploy the AlertD CloudFormation stack to your AWS account
  • Configure networking (new or existing VPC)
  • Set up load balancer and ECS Fargate services
  • Configure your chosen LLM provider

Time: ~15-20 minutes

Go to Deployment Guide →


Phase 2: Choose Your Setup Path

After deployment, the setup steps depend on how you plan to use AlertD:

  • Simple Setup — If you are deploying AlertD in the same AWS account that AlertD will monitor, use the simple setup. During deployment, the CloudFormation template automatically creates the IAM monitoring role for you (via the CreateMonitoringRole parameter, which defaults to true). You only need to authenticate and you’re ready to go.

  • Advanced Setup — If you want AlertD to monitor a different AWS account than the one it is deployed in, you need to proceed through the advanced setup. This involves manually creating an IAM role in the target account with the correct trust policy and read-only permissions, then providing that role ARN to AlertD.

Simple Setup (Same Account)

Once deployed, you’ll:

  • Access the AlertD application URL from CloudFormation outputs
  • Connect your Google or GitHub account for authentication
  • The monitoring role is already configured — no manual IAM steps needed

Time: ~5-10 minutes

Go to Simple Setup →

Advanced Setup (Cross-Account)

Once deployed, you’ll:

  • Access the AlertD application URL from CloudFormation outputs
  • Connect your Google or GitHub account for authentication
  • Create an IAM role with read-only access in the target AWS account
  • Configure AlertD with the role ARN to access your infrastructure

Time: ~10-15 minutes

Go to Advanced Setup →


🏗️ Architecture Overview

AlertD deploys as a fully containerized web application on AWS ECS Fargate. You have two deployment options:

Public Load Balancer Deployment

Standard deployment with a public Application Load Balancer for end-user access via HTTPS.

Public ALB Architecture

Private Load Balancer Deployment

Fully private deployment using a private ALB, suitable for organizations requiring all traffic to remain within their VPC.

Private ALB Architecture


🔒 Security Model

AlertD is designed with security as a top priority:

  • Read-Only Access: AlertD only requests CloudWatch read permissions
  • Ephemeral Credentials: Uses AWS STS tokens, not permanent access keys
  • No Write Permissions: Cannot modify, change, or write to any AWS infrastructure
  • Immediately Revocable: Remove the IAM role at any time to revoke access
  • Encrypted Transit: All data transmission uses 256-bit encryption

🆘 Design Partner Support

During the design partner phase, AlertD support may need temporary access to gather usage metrics. If deploying with a private load balancer, you can provide access via VPC endpoint service. This access will be disabled before production usage.


✅ Ready to Begin?

Once you have all prerequisites ready, proceed to the deployment guide. After deployment, follow the Simple Setup if monitoring the same account, or the Advanced Setup for cross-account monitoring.

Start Deployment →

Last updated on