Transit Gateway Peering #
🔄 Transit Gateway Peering Setup Between Workspaces and DB VPCs #
🧭 Objective #
Establish successful bi-directional connectivity between the Workspaces VPC and multiple DB VPCs across AWS accounts using Transit Gateway (TGW) peering.
🛠️ Steps Taken #
-
Source TGW Route Table Update (Workspaces VPC)
- Identified that the TGW route table [tgw-rtb-0ce6425b61b4b023a] lacked a route to the DB VPC CIDR (10.80.96.0/19).
- ✅ Route added pointing to the peering attachment.
-
Peering TGW Route Table Propagation
- The TGW route table [tgw-rtb-022e56c20124fc292] associated with the peering had no DB VPC routes.
- ✅ Propagation of DB VPCs into the peering route table was configured.
-
Return Path Setup in DB TGW Route Tables
- Verified and added return routes to the Workspaces VPC CIDR in each DB VPC’s TGW route table:
- tgw-rtb-06397d477fd853f3b
- tgw-rtb-08d79219f77eead64
- tgw-rtb-0b26d6befa805b82c4
- Verified and added return routes to the Workspaces VPC CIDR in each DB VPC’s TGW route table:
-
Validation
- All Transit Gateway route configurations were reviewed and confirmed from AWS’s side.
- Next step: Customer team to test connectivity between Workspaces and DB VPCs.
🔁 Traffic Flow Path #
Forward Path: Workspaces VPC → TGW Attachment (Virginia) → TGW Peering Attachment (Ohio) → DB VPC
Return Path: DB VPC → TGW Attachment (Ohio) → TGW Peering Attachment (Virginia) → Workspaces VPC